Skip to main content

Home/ Hospitality Technology/ Group items matching "from" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
24More

Securing the Big Game: Emerging Technologies for Event Security - Police Chief Magazine - 0 views

  • Interconnectivity
  • there is still much work to be done to ensure seamless interconnectivity, communication, and data sharing among systems and technologies
  • high-tech solutions like advanced video surveillance with video from multiple sources—venues, traffic cameras, and more—that will be fed directly into first responder vehicles and a fully integrated security operations center to provide situational awareness
  • ...20 more annotations...
  • Large security operations centers must also all be integrated and interconnected
  • Every new technology and device used to secure an event adds to the growing list of devices deployed to secure the event, which must be able to communicate with each other and with security operations centers
  • Communication
  • Both public-private partnership models can help deter crime
  • When law enforcement is able to tie systems in together and make sure officers can communicate with each other, this leads to faster response times, improved communication, and better overall safety and security
  • forging public-private technology partnerships for sharing video and other information is an excellent way to improve security for these events
  • There are a lot of different entities that must work together. As such, cost becomes a factor, as do installed legacy systems, as well as the argument that one size can’t possibly fit all
  • Mobile technology has in many ways alleviated some of these concerns
  • Video Surveillance
  • A primary technology that is used to deliver security for high-profile events is video surveillance
  • Despite the possible deterrence factor, the main goal of video systems is to provide situational awareness
  • A smart camera or sensor deployed in a particular location can provide early warning that something may be about to happen in that area
  • Identifying and Securing the Perimeter
  • Smart traffic technology with capabilities such as incident detection could alert law enforcement to further investigate a particular area of interest or to work with transportation teams to more quickly respond and clear the way faster to avoid increasing congestion and related incidents
  • Surveillance cameras are now equipped with technologies that allow them to be those eyes and ears for law enforcement
  • When it comes to actually planning out and selecting the technologies to be deployed, another positive trend is more cooperation because city-wide systems are coming into play
  • Having the technology for law enforcement to support big public venue events is challenging, but, in many ways, public and private entities are now working collectively to get the most out of the resources they each have available
  • Computer analytics solutions have evolved to a point where these technologies are readily available and relatively easy to deploy
  • The day is coming when smart city technology will be more reality than concept
  • deploying the right mix of advanced technology and best practices for cooperation and public-private partnerships between various stakeholders, law enforcement can help ensure that the trend of safety and security at high-profile sporting events
  •  
    This article focus on using smart city technology to assist law enforcement with securing big city sporting events. The article highlights the need for seamless interconnectivity with local law enforcement technologies in order to streamline response time. Communication and video surveillance are all enhanced by the use of emergent security technology that allows for officers to work with other agencies and the community to keep large events safe.
26More

How Hotels can use Beacons to Improve Experiences | Beaconstac - 0 views

  • For an application, location is one of the most powerful triggers of action
  • technologies available have suffered from three significant limitations: accuracy, granularity and power consumption.This is where beacons come into picture
  • ibeacon, one of the most ‘disruptive’ technologies of 2014, is already making waves across various industry verticals for all the revenue opportunities and enhanced customer experience it offers businesses
  • ...22 more annotations...
  • beacon’s micro-location capabilities to deliver specifically targeted personalized messages, alerts and more on mobile devices
  • iBeacons implements a Bluetooth Low Energy (BLE) profile for micro-location, which opens up new possibilities for hotels and resorts using geo-fencing
  • Hotel apps in combination with beacons can take away many of the hotel formalities and make aspects such as room service, contact with staff, and in-room entertainment more interactive. The app is thus, more than just a tool, it is a personal concierge in itself
  • Check-in
  • Passbook integration, the reservation details would pop up on the phone screen when the guest crosses the geo-fence threshold of a defined iBeacon location
  • Finding the room and indoor navigation
  • Using beacons, you can define targeted ‘micro-locations’ to trigger an alert, an offer, or a special discount for a beverage to a guest who is already at the ba
  • These can also be used to build an interactive tour of a hotel or a resort, where users’ attention is directed to specific exhibits as they walk freely within the building. This feature enables indoor navigation similar to GPS
  • Using beacons you can provide guests with virtual maps and turn-by-turn directions to their favorite destinations inside the premises of your hotel
  • Keyless entry into rooms
  • iBeacon picks up the guest’s phone when in close proximity and unlocks the room door, giving the guest a keyless entry to his room
  • In-room controls
  • Room service
  • Offers, Loyalty programs
  • One can enable a mobile user to navigate and interact with specific regions geo-fenced using beacons. These devices can be used to determine the position of a guest in a large hotel, and direct him to his room
  • iBeacons, you will be able to customize promotions to specific locations in the hotel premises and send them right to a user’s smartphone
  • Check-out
  • Upgrade and upsell
  • Analytics
  • Gain customer insights
  • measure dwell times, measuring how much time visitors spend at different locations of the hotel, or which areas are most popular, when guests walk around the property
  • Staff Productivity
  •  
    This article serves to showcase how beacons can serve as effective tools for hotels. The beacons deploy micro-location capabilities that allow for targeted personalized messaging. Utilizing Bluetooth Low Energy and a property's geo-fencing, beacons can transform the check-in and out processes, room and indoor navigation, keyless room entry and in-room controls, room service, loyalty offers, upgrades and analytics. The beacon technology can also used with staff to maximize productivity and evaluate where resources are able to be saved.
7More

Disruption In The Business Events Industry: Rising To The Challenges Of COVID-19 - Cong... - 0 views

  • If there is one subject driving the conversation among meeting and event planners and organisers today, that has to be disruption. In a matter of weeks, the global landscape has changed enormously, and professionals in the meetings industry now face the pressing need to make tough decisions quickly.
  • In this unusual scenario, event organisers are required to reconsider their options and to balance two priorities: on the one hand, it is crucial to uphold the health and safety of staff, sponsors, and attendees; and on the other, it is necessary to meet financial obligations – or at the very least to minimise the losses caused by disruption.
  • Over the past few weeks, a significant number of meetings and conferences have been redesigned as virtual events. If adaptable, this meeting format is probably the best alternative in these challenging times.
  • ...4 more annotations...
  • Hybrid events feature a mix of live and virtual components. In this model, a number of people may be present at a physical location, while the audience at large attends the event remotely. Hybrid events have several advantages: they may attract sponsors who would not have otherwise been drawn to a live event, and if needed, they can be easily modified and turned into virtual events.
  • Professional events have several key functions: bring brand awareness and revenue for the organiser, sharing up-to-date information, and networking.
  • With the current technology, anything from scientific sessions to workshops and exhibitions can be delivered virtually.
  • Do not overlook the social aspect of meetings. Remember that virtual meetings should fulfil two critical functions: circulating information and providing a space for professionals to network.
12More

THE EVENT INDUSTRY AFTER COVID-19 | Meetingmax - 0 views

    • torte003
       
      In event planning a lot of new changes are focused on paying attention to contracts and financially binding contracts. Also it seems that hotels might require upfront payments as well so they don't loose money. event  planners will use this opportunity to freelance because alot of companies will n to be rehiring to save on budget they would more rather outsource for work.
  • COVID-19 was the hospitality and events industry
  • (5) Meeting planners will outsource work
  • ...9 more annotations...
  • (2) Initially, hotels will be in a period of ‘any deal goes’
  • (3) Hotels will require more financial security upfront
  • (4) We’ll face supply and demand issues
  • (1) Event planners will pay more attention to contracts
  • (6) Focus on revenue generation from value added se
  • rvices
  • (7) We’ll see an increase in hybrid events
  • (8) There will be an increase in local travel
  • (9) Future hiring will be impacted by how you act now
14More

Hotel Kiosks | Five Key Benefits of Self-Service Check-In/Out - 2 views

  • Mobile hotel kiosks are digital touchscreens or smartphone applications where guests complete tasks themselves instead of relying on hotel front desk staff.
  • Almost 78 percent of their respondents admitted they wanted to see self-serving mobile kiosks to complete the check-in process at more hotels.
  • provide guests with a convenient, hassle-free way to check in
  • ...10 more annotations...
  • Mobile hotel kiosks
  • enables individuals to bypass the line at the front desk, so they can go directly to their rooms
  • Each hotel kiosk check-in app has an intuitive interface and simple commands to walk the guest through a secure, fast, check-in process
  • Guests can also use these kiosks to order room service, extra towels, set reminders, or complete other essential tasks
  • Mobile hotel kiosks can provide a more personalized experience for your customers. They connect to your hotel’s property management system (PMS).
  • These kiosk software solutions collect valuable data on your guests, including which rooms they prefer to book
  • Mobile hotel kiosks increase the opportunity to upsell packages and services to people
  • Mobile hotel kiosks increase accuracy because customers enter this information themselves during the check-in process. So the possibility of errors is minimal.
  • Mobile kiosks also offer an uncomplicated way to speak with your hotel’s brand throughout the customer journey from the pre-stay registration, hotel kiosk check-in/check-out process, reviews, and re-discovery
  • Increase revenues: Our application helps your hotel brand upsell services to customers.Improve Staff Coordination: Our hotel kiosk software allows your housekeeping and maintenance staff to communicate and collaborate better.Self-Check-In – Your customers can check-in using their mobile phones instead of relying on the front desk.
  •  
    This article was provided by Protel - a developer of hotel check-in software. The focus of the article is to convince hotels of the benefits of the check-in software. The article acknowledges that the technology allows guests to complete the check-in/out process without having to endure log lines and also by customizing the guests' stay. The software also allows the hotel integrate with their PMS. This allows for the teams on property to communicate more effectively about the guest experience, provide much needed marketing data and helping to eliminate many human-related errors.
5More

How Event Management Software Is Helping Schools Reopen - 1 views

  • None of us can tell what the next day or week will hold. But, that comes in conflict with your critical responsibility as education operation professionals: to be prepared – for what today holds as well as tomorrow.  
  • Event ManagerTM is helping them more easily:   Host/manage virtual events  Assign and track when classes need to be cleaned   Track who is on campus to manage contact tracing while mitigating risk and liability 
  • Check out the stories below of how education operations professionals like you are utilizing Event Manager in unique ways. Our hope is that these examples might aid you in navigating COVID-19 and in reopening schools so that your staff, faculty and students can be as safe as possible.
  • ...1 more annotation...
  • Virginia Western Community College
  •  
    This article is about two schools that used Event Manager Software to help them get and stay organized. From knowing what areas/classes were clean and ready for use to knowing where certain groups were going to be located on campus for events. They were able to apply the same issues with organizing large groups for events to organizing the daily needs of the school.
14More

10 Event Planning Software Options: Made Simple - 0 views

  • For event planners that are in the beginning stages of their event planning career, and who don’t have a large budget to purchase event planning software, there are (nearly) free options like Basecamp, Trello or Smartsheet (excel spreadsheets still work well, too!).
  • Paid Event Planning Software
  • Planning Pod –
  • ...11 more annotations...
  • Etouches
  • Offering solutions for event registration, floor plans, timelines and task assignments, etouches is a great option for all cycles of your event.
  • Eventbrite
  • One of the most popular event planning software options for event organizers (professional planners and community organizers) looking to sell tickets and manage event registration is Eventbrite.
  • Evolero – With a free two week trial, Evolero was developed by an event planner and has all your event software needs in one place so you don’t have to switch between platforms – everything from managing event registration and websites, to ticketing, planning and promoting.
  • Cvent – A leader in the cloud based, event management systems, Cvent offers event planning software for mobile apps for events, email marketing and web surveys, targeted advertising, and online registration and venue selection.
  • Azavista – Planning an event of any size, Azavista may be a good option for you. Offering flexibility, their platform allows event planners to set up a new event within minutes.
  • Basecamp
  • Trello
  • Smartsheet
  • Evernote
11More

5 Hotel Digital Marketing Trends That You Need To Know - 0 views

  • remain competitive means constantly being up to date with the latest digital marketing trends
  • Maximise local SEO
  • maximise your customer base
  • ...7 more annotations...
  • Google My Business, Yelp, and TripAdvisor
  • mobile-friendly website is a necessity for growth in the Hotel industry
  • Bookings on mobile devices have leaped from 13% to 20% in the space of 12 months
  • Content marketing is an important part of your hotel’s marketing strategy
  • putting a strong social media strategy in place, this can help you build engagement with existing and potential guests, create brand awareness, and it lets you target new audiences.
  • Use video in your marketing strategy
  • 80% of internet users prefer to watch a video than to read the same content in text.
  •  
    Technology is always expanding. Products that we are using today- can be obsolete in a few months. For businesses to be successful, they need to be willing to adapt to change- as technology is always evolving. This article recommends "maximizing local search engine optimization" which can assist a person searching for something online- and could possibly increase sales and "customer base." SEO (Search Engine Optimization) reminds me of GDS's, as it brings more "brand awareness." Travel agents can also assist with "local SEO opportunities." The article also suggests have a "mobile-friendly website." With billions of people using smart phones on a daily basis- having an accessible, and available website is important. Furthermore, the article states that bookings made on the phone have increased in the past year 7%. Content marketing plays a key role in hotel's marketing. Replying to feedback, or having a strong online presence on social media can increase brand awareness. It is important to stay up to date with digital trends, as this can help build relationships with guests too. Video marketing, which is showing the costumer's what they should be expecting at the hotel- is a practical virtual experience. These current eMarketing trends are transforming the hospitality industry.
20More

Top 10 reasons for data backup - 0 views

  • 1. Data Loss Prevention
  • save important files if a system crash or hard drive failure occurs.
  • 2. Operation Plan B
  • ...16 more annotations...
  • Additional backups are necessary if natural or man-made disasters occur.
  • 3. Tax Reporting and Audits
  • it is important for companies to save financial and accounting data for tax reporting purposes.
  • 4. Client Relationship
  • Saved information improves client relationship management, which leads to increased marketing and sales
  • 5. Investor Relations
  • aved information symbolizes a company's due diligence and organization. Without data backup, shareholders cannot make informed decisions or determine a company's value.
  • 6. Archiving
  • Backed up information streamlines the development of archives
  • 7. Competitive Gain
  • there are many businesses that fail to data backup important information.
  • 8. Improved Productivity
  • Archived files lead to comparative studies of the past and present to devise a more effective plan.
  • 9. No Wasted Time
  • 10. Peace of Mind
  • data backup is necessary to save the business from losing investors and customers and closing down.
  •  
    This article of Swift Digital supports talks about the importance of backing up data and how it's crucial for not only your businesses's data, but your personal data as well.
21More

The Importance of Hotel Staff Safety Technology During and Post-Pandemic - By Robb Monk... - 0 views

  • he discussion of hospitality staff safety has gained significant momentum, as workers from hotels around the world have come forward with cautionary stories of workplace injury, guest misconduct, or harassment.
  • many properties are using this downtime to make sure they comply with the deployment of personal alert systems, also known as panic buttons.
  • he devices are intuitive, require little training, and easily integrated with existing hotel systems
  • ...17 more annotations...
  • The Stand-Alone LTE device offers hotels an all-in-one solution capable of protecting employees both on and off property without the need for a tethered smart device.
  • Sidekick
  • s designed to pair with company-issued mobile devices to provide a truly seamless safety solution for the mobile workforce
  • BLE beacon device is a discreet, easy to conceal device that allows our safety platform to deliver precise room level location accuracy indoors in multi-story buildings.
  • In a crisis scenario, hotel staff can press their React Mobile Sidekick panic button to transmit an SOS signal.
  • making personal safety accessible at the touch of a button
  • mmediately identify the precise location of an incident.
  • he device identifies the closest BLE beacon. It then reports the precise room number and GPS coordinates,
  • a Stand-alone LTE panic button, which transmits the same, location-specific information
  • apable of connecting to any available cellular network, and is compatible with third-party hardware.
  • better reliability and lower service costs for hoteliers.
  • the system relies on GPS coordinates to follow an incident in real-time, relaying that information back to support services
  • BLE 5.0 Beacon provides incredibly precise location information even within a high-rise building.
  • Bluetooth beacons placed throughout the property,
  • o remedy any concerns, hotel properties will be expected to adopt frequent and stringent disinfection measures of guest rooms and public areas, with some staff members dedicated solely to the upkeep of new protocols.
  • housekeeping department
  • ill be more integral to successful operations than ever before. Ultimately, workers should feel confident, and with the peace of mind of knowing that help is just a click away,
  •  
    The article is interesting as it talks about the use of proximity beacons that we have been learning about this week for marketing purposes; however, this article highlights the technology being used in employee security. In recent years hotels have increasingly committed to enhancing employee safety policies, training, and resources such as employee safety devices or ESDs. These are mostly implemented in the housekeeping department, where the employees are often alone in guest rooms and can be vulnerable. Amid the global pandemic, safety for both guests and employees is at the forefront of the industry's priority list. Many companies are taking advantage of this downtime to install personal alert systems or panic buttons. While ESDs are not necessarily new and have been around for some time, the technology has drastically improved. React Mobile, a leading provider of panic button solutions for hotels, has three updated products for the modern age. The Sidekick, which needs to be tethered to a smartphone, is a small panic button that transmits an SOS signal to alert management that an employee is in an emergency situation and requires assistance. The device is discrete and wearable, and with the aid of Bluetooth beacons, it can identify the employee's precise location. The Stand-alone LTE panic button has all the same features of the Sidekick; however, it does not need to be tied to a cellphone. It automatically connects to any available 4G cellular network to send out the SOS transmission. The BLE 5.0 Beacon offers the most advanced and incredibly accurate location information, even within high-rise hotels. When activated, it is so precise that it can provide the exact room number in which the incident occurs. These technologies can also be used outside the hotel property, where the system sends out GPS coordinates to follow an incident in real-time. This security technology provides hotels with the ability to immediately respond in emergency situations and gives t
1More

Visioning PMS On-Premise & Cloud Technology in The Post COVID Era | By Warren Dehan - H... - 0 views

  •  
    Ideally, Maestro explores the operational features and functionalities underutilized and yet very critical, especially in this COVID era. Among such quality is the idea of reporting capabilities (Dehan, 2020). For example, through this feature, the guest's data becomes essential in making various decisions by management and the staff. This includes knowing when the guest is arriving, budgeting, and congestion at the front office. In this sense, it becomes effortless to determine the requisite measures to minimize physical contact. Equally, to eliminate the physical contact between the guest and the staff, Maestro provides integrated technological infrastructures such as touchless tools and mobile apps (Dehan, 2020). This system is set to perform very many functions. For instance, "Online web and mobile guest registration/check -in, online prepayment portal, express mobile check-out…." Besides, using a mobile key ensures that the guest is exempted from the contact at the front desk. All these efforts are meant to create contactless interaction between the staff and the guest and thereby enhancing the safety both the staff and the customer. Further, the article identifies data control and security as a significant element for using the cloud for PMS (Dehan, 2020). While using the private cloud, such as Maestro, it's the IT system that takes care of the data without a third-party having access or control of such information. This becomes fundamental in enhancing customer confidentiality and security in the process. The on-premises PMS, misses this feature as it's the customer taking care of their data Moreover, the article identifies internet connectivity as one of the fundamental challenges of using the cloud for PMS. That, it submits, "For those operating in remote areas, the cloud is wrong platform for the environment" (Dehan, 2020). Such outages are demeriting since they result in the disruption of the flow of services and time-consumin
15More

Protecting the Hospitality Sector With Security Intelligence - 1 views

  • A decade ago in 2009, hospitality was — by some reports — the most widely attacked industry of all. And while other industries have now surpassed it, a 2019 report by Trustwave still ranks hospitality as the third most-breached industry, accounting for 10% of all breaches.
  • the average hospitality data breach costs $1.99 million to contain, at a cost per record of $123. These high costs are due in part to the time needed to adequately respond to a breach. On average, it takes 200 days to identify a hospitality data breach and a further 75 days to contain it
  • attacks targeting the hospitality industry are mostly aimed at stealing payment card data.
  • ...10 more annotations...
  • Why Is Hospitality So Hard to Secure?
  • 1. They often have large, complex networks.
  • 2. Customers are onsite — and attackers could be too.
  • 3. Staff churn.
  • 4. Franchising.
  • 5. Third-party risk.
  • Protecting the hospitality industry from cyber threats isn’t an easy job. Security professionals in the industry are tasked with defending highly complex networks with many endpoints against a constant barrage of attacks and a constantly churning workforce. On top of all of that, they have limited security resources to work with.
  • Comprehensive security intelligence helps security teams identify unknown threats to the organization, and make informed decisions about how and where to allocate time and resources for maximum effect.
  • Threat intelligence provides the context analysts need to quickly distinguish between valuable alerts and false positives, drastically improving their ability to respond to genuine cyber threats.
  • Threat intelligence can help security teams drastically reduce the time needed to identify and contain a breach by alerting them the moment stolen assets (e.g., guest or passenger data) are made available for sale via the dark web.
  •  
    (1 of 2) "The hospitality sector has always been a popular target for cyberattacks." This is the first line of this Recorded Future article published in January. The article discusses breaches that happened for both Marriott and British Airways and how this is a regular occurrence in the industry as it is such a big target with so many possible points that can be attacked. While the statistics for the hospitality industry have improved greatly in the last decade, in 2019, they were still accounting for 10% of all breaches. Not only does a breach affect the way an organization operates, but also it also severely effects their bottom-line and takes quite a but of time for them to recover. "According to Ponemon's 2019 Cost of a Data Breach Report, the average hospitality data breach costs $1.99 million to contain, at a cost per record of $123. These high costs are due in part to the time needed to adequately respond to a breach. On average, it takes 200 days to identify a hospitality data breach and a further 75 days to contain it." The article continues by stating that hackers are typically seeking payment card data when compromising the hospitality industry.
  •  
    (2 of 2) The article then discusses the many reasons why it is so difficult for hospitality-oriented companies to secure their assets versus other organizations of similar stature. Some of these reasons include the large, complex networks which are typically publicly accessible and contain many customers in the databases, the fact that customers are always onsite and so are attackers, the high turnover leading to inconsistent training and sharing of credentials, franchisers owning the responsibility of security yet not knowing much about it, and the risk associated with all of the various third parties the hotels do business with. While intelligence has come a very long, "security professionals in the industry are tasked with defending highly complex networks with many endpoints against a constant barrage of attacks and a constantly churning workforce… [AND] they have limited security resources to work with." Comprehensive security intelligence systems are now capable of protecting many aspects of the organization. Some of these updated features include responding rapidly to security incidents, blocking online brand abuse and impersonation, managing third-party risk, reducing breach containment times, and better allocating security resources. Property data security is so important to the hospitality industry. If a business does not take the proper precautions to protect their systems and their customers, then it could lead to a devastating event for the business. While security intelligence has progressed within the last decade, a business needs to make sure that they have chosen a reliable agent to partner with who will produce consistent service. If the business keeps up with their system updates and protections, they should not have to worry about their security system failing.
7More

How proximity marketing can help the high street | The Drum - 0 views

  • beacons haven’t taken over the marketing world in the way so many predicted, however, some of the world’s biggest brands are redefining the customer experience with proximity marketing - with or without beacons.
  • Amazon is trying to reshape the in-store customer experience with a fleet of Amazon Go stores where customers can simply walk in, pick the items they want and walk right out - no queues and no physical payments action whatsoever.
  • One of the most successful uses of proximity marketing also happens to be one of the oldest, though. The Starbucks mobile app allows customers to place orders, pay in-store, collect rewards and receive custom offers from the biggest name in high street coffee.
  • ...3 more annotations...
  • shopping habits are changing and online spending continues to increase. Yet, there are parts of the consumer journey that online-only technology can’t fulfil - and this is where retailers need to innovate most.
  • The technology that powers proximity marketing is only going to improve as smart cities grow and IoT becomes a part of our everyday lives. But the technology, in its current state, is already there to redefine customer experiences and the way consumers engage with brands, based on their immediate location.
  • When Apple launched iBeacons in 2013, proximity marketing became the industry’s favourite trend. With the right technology, this hyper-localised strategy was supposed to bridge the divide between online content and offline consumer action but Apple’s iBeacon platform ultimately failed to take off.
  •  
    Module 6: Proximity Marketing This article focuses on the use of proximity marketing in 2020, and discusses how beacons have not taken over the offline and online market like Apple and Google originally hoped they would. Discussed in the article is how Amazon is utilizing proximity marketing in their Amazon Go stores This technology in a COVID-19 world will allow shoppers the flexibility to go outside of their homes and continue to social distance as all payments occur as, " customers can simply walk in, pick the items they want and walk right out - no queues and no physical payments action whatsoever." Similar to Starbucks where guests pay directly on their phones, the proximity marketing market will continue to grow as technology continues to advance. According to the article, "The technology, in its current state, is already there to redefine customer experiences and the way consumers engage with brands, based on their immediate location."
13More

Proximity Marketing: Often Creepy, but It Doesn't Have to Be. | Center for Digital Ethi... - 0 views

  • Imagine you’re out shopping one Saturday afternoon. You walk into a department store and see a big sign that reads, “Get our app and save!” You love a good deal so you scan the QR code and select “download.” You scroll through a user agreement with about 10,000 words of legalese and click “agree.”
  • As you walk down the street later, your phone is abuzz with notifications you’ve never received before: a constant stream of ads from each store you pass. You wonder how they’re reaching you, until you realize the department store app is still running — it must connect to other stores.
  • Target merged its “Cartwheel” coupon app — used by 27 million shoppers, saving them more than $1 billion — with the main Target app and incorporated new features.
  • ...9 more annotations...
  • This beats traditional advertising, which connects to consumers before they’re in a store — while they’re sitting on the couch at home watching television, for instance — and relies on them to remember the message later.
  • By using proximity marketing technology, stores can catch up by providing some of the perks of online shopping in person, like easy access to discounts, saved shopping lists and personalized recommendations.
  • Lastly, proximity marketing tools allow companies to gather behavioral data about their customers, including how often they visit a store and when, how long they stay and what areas of the store they gravitate toward.
  • Proximity marketing — location-based direct marketing in which a business or other organization sends offers, promotions, alerts or other messages to a person's smartphone based on the device’s location — is annoying, creepy and downright invasive in this story. But it doesn’t have to be. When implemented ethically, proximity marketing can provide worthwhile benefits to marketers and consumers alike.
  • But completely opting-out of proximity marketing — agreeing to all or nothing — should not be the only way consumers can protect themselves.
  • Their recommendations include displaying in-store signage notifying shoppers that their location data is being collected, letting consumers opt-out of analytics services, limiting how data is used and never selling personally identifiable data to a third party.
  • If retailers want their customers to shed the “malicious” connotation that comes with data tracking, they need to be upfront about how they are using that data, including location.
  • Target’s privacy notice is currently 4,359 words and the top of the page reads, “We may change or add to this privacy policy, so we encourage you to review it periodically.” How many customers read the whole statement and check back periodically for updates?
  • So let’s reimagine our scene in the department store: Again, you download its app. This time, the user agreement is a few clear bullet points. The app walks you through a quick Q&A to find out if it can access your location to make your shopping experience easier. It asks if it can share your information with its partners — other stores, whose names the user agreement lists out explicitly — and gives you an option to opt out.
  •  
    This article addresses what proximity marketing is and how it can be beneficial to marketers and consumers if done right. It talks about how companies throw hundreds of pages of legalese when downloading new apps that people never read. They recommend to include displaying in store signage notifying shoppers that their location data is being collected, letting consumers opt out of analytic services and limiting how data is used without selling personal identifiable data to third party. I believe if companies make it easier for us to trust them with our data more people will use this style of marketing.
26More

Cyber Security Marketing Tactics That Actually Work - 0 views

  • Whether you want to attribute it to the rise of interconnected devices in the IoT revolution or just the growing instances of cybercrime, the cyber security industry has seen immense growth in recent years and shows no signs of stopping.
  • This should come as no surprise given that the average annual cost of cyberattacks worldwide is about $9.5 million, according to Ponemon Institute.
  • clearly a need for effective cyber security products and services, there are also many solutions on the market, making it more difficult to capture the attention of your target audience.
  • ...22 more annotations...
  • New cyber security companies are popping up all the time in response to the heightened demand. This can make it hard to stand out in the crowd, and it makes it essential for you to communicate what makes your brand different.
  • you also want to be credible.
  • your potential customers need a significant amount of education to understand what threats they face and what solutions they may need.
  • This is especially true given that CEOs and other C-level executives are not as well versed in information security, which can impact a company’s decision to include cyber security as part of their overall preparedness plan.
  • Though there is plenty of evidence pointing to the necessity of cyber security in protecting valuable data, the truth is that many businesses just don’t prioritize cyber security until it is too late.
  • only one in five, or 22% of those surveyed said that they fully incorporate information security into their strategy and planning.
  • data suggests that cyber security marketers must find ways to create a sense of urgency for potential customers
  • Content marketing can help you build credibility while addressing the major challenge of educating your prospects. In order for your content to be effective,
  • ensure that it is unique.
  • Blogs are great for attracting prospects in every stage of the buyer’s journey. Try to create some evergreen blog content that will be universally relevant
  • Offering downloadable content like e-books and whitepapers is also an excellent way to convert your site traffic into leads that you can later nurture.
  • Another aspect of downloadable content that you’ll need to consider is the landing page.
  • case studies are one of the most important tactics for B2B companies.
  • Email Marketing
  • Downloadable content like e-books, case studies, and reports that provide readers with a more in-depth understanding of important cyber security topics. Links to your most recent blog posts talking about recent attacks or security concerns and those that break down complex cyber security topics for a wider reading audience. Video content that emphasizes the importance of cyber security and communicates the value of your company’s offering. A digest of relevant articles from reputable industry publications that helps readers better understand hot topics in cyber security. Monthly offers and sales promotions like a free trail, which can encourage prospects to sign up.
  • Webinars are a great way for cyber security marketers to connect with bottom-of-the-funnel leads.
  • interactive element.
  • Webinars can sometimes be costly to produce. However, as with other parts of your marketing campaign, there is also an opportunity to repurpose your webinar to get more out of this content.
  • Paid campaigns are great at accomplishing two goals – amplifying your content marketing efforts and getting prospects to arrive at your demo request landing page.
  • Don’t exaggerate your solution’s results.
  • Use data in your messaging. 
  • Create an easy-to-navigate library of premium content. 
  •  
    The Cyber-security Market report has predicted worldwide spending on cyber-security will surpass $1 trillion by 2021. This is a result of annual cyber-attacks costing $9.5 million in global damages. The many solutions on the market require cyber-security services to be innovative on how they market. Cyber security companies want to stand out to customers while still remaining credible. Many businesses are also uneducated and/or don't prioritize cyber-security. The use of blogs and downloadable e-books allow marketers to educate while promoting their product. Cyber security marketers have to make sure they have an easy user-interface, use data in messaging, and don't over exaggerate the capabilities of their products.
5More

Industry Leading Property Management Company UR Concierge Services Inc. Chooses RentMoo... - 0 views

  • With RentMoola 360° payments, URCSI customers can access multiple forms of payments from credit, debit, bank transfer, digital wallet, and even pay over the phone or in-store in over 85,000 locations.
  • This collaboration allows both companies to provide their solutions to more customers and help a larger population be more financially and socially secure.
  • Through URCSI, RentMoola will be able to provide customers a way to seamlessly communicate and engage digitally.
  • ...1 more annotation...
  • The communication platform makes it easy to manage maintenance requests, send out news and updates, organize community events, and provide property managers a new revenue stream by promoting utilities, cable, bundles, and more.
  •  
    With the rising of Cloud-Based PMS, most of traditional PMS company are trying to change things. They hope to make their system more flexible and easy to use. So, URCSI start with exclusive payment platform and build closer relationships and interactions with customers.
5More

Top 5 Trends In Modern Hotel PMS Technology - 0 views

  • a recent study showed that in 2015 on average 4.9% of hotel revenue was allocated to the IT budget vs. 2.6% in 2014. Similarly, software accounted for 12% of hospitality IT spend but is forecast to grow at 7% pa from 2015-18, outstripping other segments and 22% of hotels earmarked migrating to the cloud as a top tech priority in 2015.
  • cloud-based PMS also offers immediate advantages like remote login allowing for anytime, real time access, distribution management, automated tasks, multi property management, mobile guest journey, and real-time data analytics, to name just to name a few.
  • “True mobility is the key to enabling your employees to deliver the ultimate in guest service at every touch point. Mobility empowers staff to build relationships with guests beyond the essential meet and greet upon arrival or wave goodbye when guests depart.”
  • ...1 more annotation...
  • One of the biggest strengths of a cloud-based hotel management system is that it can be easily connected to other software applications, even if these applications don’t share the same provider.
  •  
    The article showed us top 5 trends in modern hotel PMS technology. They are Cloud, Mobility, Guest engagement, Endless integration and Sleek design.
12More

For hotels, COVID-19 has created an operational "perfect storm" | PhocusWire - 0 views

  • As recovery starts in some regions, hotels are reporting dramatic and unexpected spikes in occupancy numbers, swinging from 20% to 80% occupancy and back down to 20% in a matter of days.
  • The guest profile of businesses is changing too in many instances. Many business travel hotels are having to work out how to pivot to attract and profitably service leisure guests in the absence of a business travel market currently.
  • On top of the basic need to have the right amount of staff in place for a highly unpredictable amount and type of guests, hotels also have to process systemic change in the way their operations run to be able to guarantee the care of their staff and their guests. Surgical precision also needs to be applied to cost control.
  • ...8 more annotations...
  • One of the biggest challenges for operations managers and housekeepers alike is in implementing the new cleaning protocols. Extra time needs to be planned per hotel room to make sure that the right processes are followed, and the correct manpower needs to be available to execute the new protocols adequately for the number of rooms in service.
  • Some hotels are also deploying cleaning techniques that require rooms to be left for three hours after spraying, others have a policy of allocating 24 hours per room before another guest can be checked in to ensure there is time to fulfill the new procedures.
  • We found that the average guest departure room cleaning time has increased by around 11% overall. In fact, over half of the hotels we spoke to report an increase in minutes spent cleaning each room of at least 15% or more. Ivaylo Ivanov, senior vice president of hotel operations for Okada Manila, estimates that at his 5-star resort, an additional 25% to 30% time is required to clean each room.
  • Expense control pressures are increasing as the costs of these operations continue to spiral with hotels having to outlay hundreds of thousands of dollars on new cleaning products and protective equipment.
  • With supplementary costs like these to balance against occupancy rates of 20% on average, hotels have to find sophisticated ways to save on costs that won’t compromise the all‐important guest experience.
  • We expected hotels to turn to a reduction in stayover cleans as a key way to balance out the additional time spent cleaning check-out stays. However, our survey found that only 12% of the hotels we have spoken to have actually gone down this route.
  • As a five‐star resort where guests know to expect exemplary service, Ivaylo at the Okada resort just simply does not feel this option is open to them as standard (although, if guests request it, that would of course be accommodated). Indeed, where guests do want stayover cleans, the hotels we surveyed found that cleaning time significantly increases by around 35%.
  • When all the strings of the current environment for operations staff are pulled together, it is easy to see that not only have their jobs fundamentally shifted but that there is a huge amount expected of them. Technology has played a vital role in helping teams to communicate and operate during the lockdown, and it will be even more essential to equip teams with the right tools in this next stage so that hotel operations can be optimized to the maximum and these key members of the team are properly supported.Now is the time to assess each process to gain a full picture of exactly what labor and time is needed to continue to operate at the level guests expect whilst adapting to the regulations of the new normal. Any investment made now to support this essential part of any hotel will pay dividends in terms of lowering staff turnover and increasing guest satisfaction as well as realizing business-critical cost savings.
  •  
    On this article you may learn about the security protocols of cleanliness rooms that hotels had to implement due to Covid-19. This challenges comes with the accompanion of controlling opertional costs and what labor and time is needed to continue to operate at the level guests expect whilst adapting to the regulations of the new normal.
4More

New Waste Management Technologies for Cruise Ship Industry Promoting Sustainability - 0 views

  • he industry's $22 billion investment in the development of new energy efficient technologies, partnerships with local governments in key destinations, and a commitment to reducing its rate of carbon emissions by 40% by 2030
  • Revolution Series Digesters as well as ongoing cloud-based data analytics and supplies
  • will help reduce the environmental impact of Carnival's operations by safely disposing of food waste on-site, limiting the amount of greenhouse gases emitted from conventional processing systems
  •  
    The initial focus of this article is on the cruise line industry's multi-billion undertaking in developing new energy efficient technology. The technology that will be deployed will be integrated with the cruise system in order to assist in reducing carbon emissions by 40% by 2030. BioHiTech Global, Inc has taken a leading role with the development of their new system - Revolution Series Digesters. This system provides both supplies and continuous cloud-based analytics that will help its inaugural client, Carnival Corporation, to reduce their environmental footprint.
7More

How restaurants are using Facebook Messenger to boost traffic - 0 views

  • The Culver City, Calif.-based social media marketing company leverages Facebook Messenger as a modern direct marketing tool.
  • Misfit doesn’t cast a wide net. It targets Facebook users who are most likely to become repeat customers for a restaurant.
  • In the case of 5 Napkin Burger, an upscale full-service restaurant in New York City, Misfit ran a Facebook ad promoting a 2-for-1 burger special. Misfit aimed its advertising at people within proximity to one of the brand’s four Manhattan restaurants.
  • ...3 more annotations...
  • The 5 Napkin Messenger campaign, which occurred in early 2019, resulted in 77 in-store redemptions. Five Napkin also gained 2,500 new Messenger and email subscribers from the campaign.
  • Once diners and restaurants are connected through Messenger, Linkletter said restaurants can continue to market to customers acquired through the initial promotion.
  • Once a diner clicks on the first promotional link, the restaurant never has to “spend a dollar on them again,” he said.
  •  
    This article describes Misfit Media's interesting variation on the proximity marketing concept by leveraging Facebook Messenger to target likely customers. The firm has obtained impressive and cost-effective results for clients with techniques that combine advertising, promo redemptions and the collection of customer e-mails, all through a widely-used external app. Repeat business has also seen dramatic benefits.
« First ‹ Previous 3021 - 3040 of 3221 Next › Last »
Showing 20 items per page