Skip to main content

Home/ Hospitality Technology/ Group items matching "ceo" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
10More

Trends in Events and Meetings That Will Shape 2020 - By Lauren Hall, Founder & CEO, IVvy - 1 views

  • we’ve pieced together those innovations and trends across the event and event planning industry that are positioned to shape the next decade
  • it’s important to remember that the experience doesn’t begin and end with the stay or the event itself; instead, it starts before a planner books your venue, long before that first attendee checks-in.
  • When hotels and venue spaces utilize a venue management platform, they’re able to effectively market their space globally, while catering specifically to the needs and process of modern planners.
  • ...6 more annotations...
  • Ensure your venue space is equipped for events and meetings of various scale, and work closely with planners to ensure an attentive, personalized experience while bringing their event or meeting to life.
  • In the modern world of events, it’s not just about large-scale experiences and conferences. In fact, meeting and small group travel make up a significant portion of the growing demand.
  • event planners are frequently opting for non-traditional settings for their events
  • Hotels should keep in mind that the nature of events may be “non-traditional” as well.
  • In that same breath, we’re witnessing the rapid rise in popularity of wellness-focused events, interactive live experiences, experiencing enhancing AI and VR components, Instagram-worthy backdrops, events centered around sustainability, and more.
  • event planners and venue owners are implored to leverage event technology in a way that strikes a balance between face-to-face and virtual elements. It’s not about using technology for every moment or touch-point, but about using new-age features and platforms to create a frictionless event, engage attendees on a deeper level, and create meaningful, memorable experiences.
  •  
    This article provides a concise overview of trends in event planning. First, the importance of the pre-stay experience is addressed, with a mention of venue management technology as an important tool in this regard. Secondly, being prepared to host events of various scales is discussed. Thirdly, alternative venue spaces and experiences are mentioned as fundamental aspects of the current event planning sphere. Finally, the balance between state of the art technology and a personal human touch is brought up as being a defining features of events going forward.
21More

The Importance of Hotel Staff Safety Technology During and Post-Pandemic - By Robb Monk... - 0 views

  • he discussion of hospitality staff safety has gained significant momentum, as workers from hotels around the world have come forward with cautionary stories of workplace injury, guest misconduct, or harassment.
  • many properties are using this downtime to make sure they comply with the deployment of personal alert systems, also known as panic buttons.
  • he devices are intuitive, require little training, and easily integrated with existing hotel systems
  • ...17 more annotations...
  • The Stand-Alone LTE device offers hotels an all-in-one solution capable of protecting employees both on and off property without the need for a tethered smart device.
  • Sidekick
  • s designed to pair with company-issued mobile devices to provide a truly seamless safety solution for the mobile workforce
  • BLE beacon device is a discreet, easy to conceal device that allows our safety platform to deliver precise room level location accuracy indoors in multi-story buildings.
  • In a crisis scenario, hotel staff can press their React Mobile Sidekick panic button to transmit an SOS signal.
  • making personal safety accessible at the touch of a button
  • mmediately identify the precise location of an incident.
  • Bluetooth beacons placed throughout the property,
  • a Stand-alone LTE panic button, which transmits the same, location-specific information
  • apable of connecting to any available cellular network, and is compatible with third-party hardware.
  • better reliability and lower service costs for hoteliers.
  • the system relies on GPS coordinates to follow an incident in real-time, relaying that information back to support services
  • BLE 5.0 Beacon provides incredibly precise location information even within a high-rise building.
  • he device identifies the closest BLE beacon. It then reports the precise room number and GPS coordinates,
  • o remedy any concerns, hotel properties will be expected to adopt frequent and stringent disinfection measures of guest rooms and public areas, with some staff members dedicated solely to the upkeep of new protocols.
  • housekeeping department
  • ill be more integral to successful operations than ever before. Ultimately, workers should feel confident, and with the peace of mind of knowing that help is just a click away,
  •  
    The article is interesting as it talks about the use of proximity beacons that we have been learning about this week for marketing purposes; however, this article highlights the technology being used in employee security. In recent years hotels have increasingly committed to enhancing employee safety policies, training, and resources such as employee safety devices or ESDs. These are mostly implemented in the housekeeping department, where the employees are often alone in guest rooms and can be vulnerable. Amid the global pandemic, safety for both guests and employees is at the forefront of the industry's priority list. Many companies are taking advantage of this downtime to install personal alert systems or panic buttons. While ESDs are not necessarily new and have been around for some time, the technology has drastically improved. React Mobile, a leading provider of panic button solutions for hotels, has three updated products for the modern age. The Sidekick, which needs to be tethered to a smartphone, is a small panic button that transmits an SOS signal to alert management that an employee is in an emergency situation and requires assistance. The device is discrete and wearable, and with the aid of Bluetooth beacons, it can identify the employee's precise location. The Stand-alone LTE panic button has all the same features of the Sidekick; however, it does not need to be tied to a cellphone. It automatically connects to any available 4G cellular network to send out the SOS transmission. The BLE 5.0 Beacon offers the most advanced and incredibly accurate location information, even within high-rise hotels. When activated, it is so precise that it can provide the exact room number in which the incident occurs. These technologies can also be used outside the hotel property, where the system sends out GPS coordinates to follow an incident in real-time. This security technology provides hotels with the ability to immediately respond in emergency situations and gives t
26More

Cyber Security Marketing Tactics That Actually Work - 0 views

  • Whether you want to attribute it to the rise of interconnected devices in the IoT revolution or just the growing instances of cybercrime, the cyber security industry has seen immense growth in recent years and shows no signs of stopping.
  • This should come as no surprise given that the average annual cost of cyberattacks worldwide is about $9.5 million, according to Ponemon Institute.
  • clearly a need for effective cyber security products and services, there are also many solutions on the market, making it more difficult to capture the attention of your target audience.
  • ...22 more annotations...
  • New cyber security companies are popping up all the time in response to the heightened demand. This can make it hard to stand out in the crowd, and it makes it essential for you to communicate what makes your brand different.
  • you also want to be credible.
  • your potential customers need a significant amount of education to understand what threats they face and what solutions they may need.
  • This is especially true given that CEOs and other C-level executives are not as well versed in information security, which can impact a company’s decision to include cyber security as part of their overall preparedness plan.
  • Though there is plenty of evidence pointing to the necessity of cyber security in protecting valuable data, the truth is that many businesses just don’t prioritize cyber security until it is too late.
  • only one in five, or 22% of those surveyed said that they fully incorporate information security into their strategy and planning.
  • data suggests that cyber security marketers must find ways to create a sense of urgency for potential customers
  • Content marketing can help you build credibility while addressing the major challenge of educating your prospects. In order for your content to be effective,
  • ensure that it is unique.
  • Blogs are great for attracting prospects in every stage of the buyer’s journey. Try to create some evergreen blog content that will be universally relevant
  • Offering downloadable content like e-books and whitepapers is also an excellent way to convert your site traffic into leads that you can later nurture.
  • Another aspect of downloadable content that you’ll need to consider is the landing page.
  • case studies are one of the most important tactics for B2B companies.
  • Email Marketing
  • Downloadable content like e-books, case studies, and reports that provide readers with a more in-depth understanding of important cyber security topics. Links to your most recent blog posts talking about recent attacks or security concerns and those that break down complex cyber security topics for a wider reading audience. Video content that emphasizes the importance of cyber security and communicates the value of your company’s offering. A digest of relevant articles from reputable industry publications that helps readers better understand hot topics in cyber security. Monthly offers and sales promotions like a free trail, which can encourage prospects to sign up.
  • Webinars are a great way for cyber security marketers to connect with bottom-of-the-funnel leads.
  • interactive element.
  • Webinars can sometimes be costly to produce. However, as with other parts of your marketing campaign, there is also an opportunity to repurpose your webinar to get more out of this content.
  • Paid campaigns are great at accomplishing two goals – amplifying your content marketing efforts and getting prospects to arrive at your demo request landing page.
  • Don’t exaggerate your solution’s results.
  • Use data in your messaging. 
  • Create an easy-to-navigate library of premium content. 
  •  
    The Cyber-security Market report has predicted worldwide spending on cyber-security will surpass $1 trillion by 2021. This is a result of annual cyber-attacks costing $9.5 million in global damages. The many solutions on the market require cyber-security services to be innovative on how they market. Cyber security companies want to stand out to customers while still remaining credible. Many businesses are also uneducated and/or don't prioritize cyber-security. The use of blogs and downloadable e-books allow marketers to educate while promoting their product. Cyber security marketers have to make sure they have an easy user-interface, use data in messaging, and don't over exaggerate the capabilities of their products.
15More

Cyber Attacks Are Spiking - Is Your Hotel Prepared? | By Jeff Venza - Hospitality Net - 0 views

  • “Thinking of cybersecurity solely as an IT issue is like believing that an entire company’s workforce, from the CEO down, is just one big HR issue.”
  • recent reports reveal at least 16 billion records
  • have been exposed through data breaches since 2019
  • ...11 more annotations...
  • The COVID-19 pandemic was, in many ways, the perfect storm for an influx in cyber exploitation
  • With this in mind, cybersecurity should be viewed as a company-wide initiative, with considerations made across each level of any tech-driven organization.
  • we must also recognize that more sophisticated technology creates an environment for increasingly sophisticated cybercrime
  • studies show that nearly 80% of senior IT and IT security leaders believe their organizations lack sufficient protection against cyberattacks.
  • only 5% of companies’ folders are adequately protected
  • To this effect, global cybercrime damages are predicted to cost up to $10.5 trillion annually by 2025
  • And for hotels, a security breach resulting in compromised guest data can damage a property’s reputation beyond repair
  • Instead, companies today should be leveraging a formal cybersecurity program in conjunction with dedicated technology and resources to effectively protect the information housed within their digital infrastructure.
  • Much like cyber risks are ever-evolving, a hotels’ cybersecurity protocol must also evolve and adapt based on frequent reassessments of risks and vulnerabilities
  • cybersecurity cannot be treated as an afterthought, nor should it be viewed as an optional investment; rather, it’s the cost of doing business in any data and tech-driven landscape.
  • the average cost of a data breach is $3.86 million as of 2020
  •  
    This article stresses the importance of cyber security specifically within the hospitality industry. The author of the article describes how a strong cyber security management system should not be an afterthought for hotels and should be seen as a cost of doing business especially in a tech driven industry. The article lists some key components and areas to focus on for hotels to manage cyber risks and threats
20More

Cyberattack hits world's largest meat supplier - 0 views

  • It might be days before production resumes after an “organized cybersecurity attack” affected IT systems in North America and Australia
  • The world's largest beef supplier has been hit with a ransomware attack, threatening some of the U.S. meat supply.
  • The hack came less than four weeks after a similar one by Russian criminals against Colonial Pipeline
  • ...16 more annotations...
  • JBS, one of the world's largest international meat processors, was hacked
  • forcing the company to take systems offline and stop work
  • 11 beef processing facilities in Australia and 26 chicken processing plants in the U.S
  • The company told the White House on Sunday that it was a ransomware attack,
  • JBS notified the administration that the ransom demand came from a criminal organization, likely based in Russia.
  • Ransomware, an extremely lucrative type of cybercrime, is malicious software that lets hackers encrypt a victim's files and demand a ransom to make them functional again.
  • he hackers will steal and threaten to publish those files if their demands aren't met.
  • Ransomware attacks have grown rapidly in recent years.
  • Criminal hackers,
  • often based countries like Russia where they are largely protected from U.S. law enforcement
  • have targeted practically every major industry to shake down victims for payment.
  • about 40 food and beverage companies around the world have had confirmed ransomware attacks since May 2020.
  • Colonial's hackers, an established ransomware gang called DarkSide, shut down its website amid international attention from that attack, but not before receiving a $4.4 million payment from Colonial.
  • regularly hit manufacturers, school systems and city governments.
  • ransomware attack had already affected the cattle market.
  • If this goes beyond a week, you start to really worry about these animals building up on farm sites where they just don't have the capacity to hold them
  •  
    An example of a cyber attack or ransomware, in a manufacturer. Shows some effects of a ransomware and what a consumer may experience.
8More

Cloud Computing in the Travel Industry | Accenture - 0 views

  • Before the pandemic, companies were managing under legacy on-premise technology, hesitant to make big investments in cloud due to concerns about cost, time and security. But in a world after the pandemic, the travel industry must adapt fast to survive
  • The value it delivers goes beyond technology to organizational transformation, making the journey through cloud in travel a key CEO priority.
  • Airlines and airports reinventing airport experiences: From contactless, smooth passage, through bag drop and security to airside shopping for travelers who have pre-filled biometric data
  • ...4 more annotations...
  • Travel companies must future-proof their businesses built upon living systems and processes enabled by agility and scale. They need to take a deep relook at strategy, organization, practices, technology and talent functions.
  • Compete for investment capital Cloud-related investments drive business changes needed for increased productivity, smoother traveler experience, vertical integration & resilience.
  • Rehost scalable functions Rehost high-volume, scalable functions on Infrastructure-as-a-Service (IaaS).
  • Cloud is central to the travel industry’s survival and future growth. There’s no time for delay. Companies must use this crisis as a springboard to scale up cloud adoption, improve resilience and innovation capabilities, and create the seamless, contactless and effortless experiences travelers demand
  •  
    Before the pandemic, companies were afraid to invest in cloud due to the concerns of the cost, time, and security. But in today's world technology is something companies need to adopt. It's time for travel companies to see the cloud for what it is, the passport to future value. All sections can benefit from this technology including hotels, airlines, and airports. This is the best time to invest into technology to benefit the industry by taking a deep relook at strategy, organization, practices, technology, and talent function. As travel is being rebuilt, cloud-related investments will deliver higher returns on capital than investment in new aircraft, new hotels, and new ships. This is the perfect time to invest into cloud adoption.
7More

Executive Recycling Company And Executives Sentenced For Fraud And International Enviro... - 1 views

  • xecutive Recycling, Inc. (a corporation) and Brandon Richter, age38, of Highlands Ranch, Colorado, the owner and chief executive officer of Executive Recycling, were sentenced today by U.S. District Court Judge William J. Martinez for their roles in a fraudulent scheme related to the disposal and exportation of electronic waste to foreign countries,
    • cingram21
       
      This article discusses the penalties the CEO and COO of Executive Recycling received for violating the laws that were exposed on 60 minutes
    • teresastas
       
      Thanks for posting this...I was interested to see how this all turned out! Looks like it didn't turn out well for them!
  • significant portion of electronic waste collected by the defendants were Cathode Ray Tubes (CRTs). CRTs are the glass video display component of an electronic device, usually a computer or television monitor, and are known to contain lead. The defendants engaged in the practice of exporting electronic waste, including CRTs, from the United States to foreign countries, including the People’s Republic of China.
  • Executive Recycling appeared as the exporter of record in over 300 exports from the United States between 2005 and 2008. Approximately 160 of these exported cargo containers contained a total of more than 100,000 CRTs.
  • ...2 more annotations...
  • The defendants’ misrepresentation induced customers to enter into contracts or agreements with the defendants for electronic waste disposal. Each victim paid the defendants to recycle their electronic waste in accordance with the representations made by the defendants. Contrary to their representations, the defendants sold the electronic waste they received from customers to brokers for export overseas to the People’s Republic of China and other countries.
  • The defendants claimed to safely recycle e-waste in the U.S., but regularly exported obsolete and discarded electronic equipment with toxic materials to third-world countries,” said Jeff Martinez, Special Agent in Charge of EPA’s criminal enforcement office in Colorado. 
7More

Press release: Target Field becomes first MLB stadium to achieve LEED Platinum Certific... - 0 views

  • Target Field becomes first Major League Baseball stadium to achieve LEED Platinum Certification via new rating system
  • Minnesota Twins receive highest honor bestowed by the U.S. Green Building Council for continued excellence in Operations and Maintenance at the “Greenest Ballpark in America”
  • Minnesota Twins announced today that they have been awarded LEED Platinum certification for Existing Buildings: Operations & Maintenance – making Target Field the first Major League Baseball venue to receive the U.S. Green Building Council’s highest possible honor via the new LEED v4.1 rating system.
  • ...3 more annotations...
  • LEED (Leadership in Energy and Environmental Design), developed by the U.S. Green Building Council (USGBC), is the most widely used green building rating system in the world and an international symbol of excellence.
  • Target Field is also the nation’s first sports venue to earn three levels of LEED certification through Arc, the state-of-the-art digital platform that uses real-world data to help benchmark, measure and improve sustainability performance.
  • “The Minnesota Twins’ fifth LEED certification at Target Field demonstrates tremendous green building leadership,” said Peter Templeton, interim president and CEO, USGBC.
  •  
    The Minnesota Twins are leading the way in green initiatives in becoming the first MLB stadium to achieve LEED Platinum Certification. As the landscape has changed with the desires of fans and guests to public assembly venues, venues across the country are doing their part to go green and obtain LEED certification. It is a great initiative the venue management industry has engaged on, not only at the major league level, but stadiums, convention centers and performing arts venues are all doing the same.
19More

Hospitality unions have spent a decade fighting to protect workers, bu - 1 views

  • cheap gadgets might bring new problems
  • The hospitality industry is in the process of introducing remote panic buttons in an effort to address the widespread issue of violence and sexual assault against hotel staff
  • 20,000 hotel properties in Canada and the United States have committed to providing an estimated 1.2 million employees with Employee Safety Devices
  • ...15 more annotations...
  • all housekeeping staff to carry a panic button device on them at all times
  • low-quality versions of the technology that pose significant privacy and security risks to the people who carry them. Weak password protections and a lack of encryption leave users vulnerable to cyberattacks, which could render the devices unusable—or, worse, be used to invade hotel employees’ privacy
  • 58% of hotel workers and 77% of casino workers have been sexually harassed by a guest. Nearly half have had guests answer the door naked or expose themselves, and nearly 15% have been cornered.
  • casino giants MGM Resorts International and Caesars Entertainment agreed to equip nearly 38,000 hotel staff with safety devices during contract negotiations
  • the CEOs of a number of major hotel chains—including Hilton, Hyatt, IHG, Marriott, and Wyndham—joined the pledge
  • Safe but insecureThe discovery of vulnerabilities in certain versions of this technology may pose a potential challenge
  • lack of encryption that compromised the device’s security
  • the software powering the tracker was hosted on a cloud-based service, which it used to communicate with a mobile application. But the cloud software didn’t require any authorization. A hacker could connect to the service and “instruct any tracker in the world to do things,” he explains.
  • Among the vulnerabilities a hacker could exploit are the ability to see the real-time location of users and to gain access to built-in microphones and cameras
  • That poses a problem for the hotel industry, Hron believes, because establishments not  bound by union or legislative requirements may buy inferior devices without vetting them properly, merely to satisfy new regulations. “Each hotel is buying these devices themselves—it’s not like some central authority is giving these devices to hotels,” he says. “My guess is [some are] going to buy a cheap device, and in this case, it’s pretty reasonable to think that there aren’t any analysts doing security checks on them.”
  • The lack of clear legislation also leaves workers vulnerable in jurisdictions that don’t explicitly ban employers using the devices to track the movements of hotel staff
  • technology isn’t capable of real-time tracking because it runs on WiFi and Bluetooth Low Energy, or BLE, and only transmits a signal when activated. Other devices that utilize GPS or WiFi connectivity, however, have the ability to transmit real-time location data on an ongoing basis
  • “The technology has to work every time, but the product only works if the right policies, procedures, and personnel are put in place that allow the system to function as a system
  • While the initial reason for the solution was to address sexual assault, there are other things that happen to housekeepers in hotel rooms as well,” says Ogle. “We’ve had team members that have had medical issues themselves, or found guests in rooms with medical conditions that were asking for assistance
  • Providing precise location data to first responders in the event of an emergency actually has the potential to save lives, but the technology will only be adopted if users believe it is being used appropriately
  •  
    The major hotel chains are influencing legislation and also now requiring employee safety devices (ESDs) to make the workplace safer for employees (i.e. room service attendants or housekeepers) who find themselves alone in guest rooms with ill-intentioned guests. ESDs can also be appropriate for large resorts with beach personnel, activities personnel, or other positions that find themselves in enclosed, or remote areas with less security. Not every hotel has a security department that can constantly monitor cameras and ESDs. Will these devices present more strain on hotel wireless networks? That depends. Hoteliers need to consider whether these devices will be provided by or monitored through their keylock vendor, through their guest room entertainment vendor, or through a wireless provider. Could there be a benefit to an ESD interface with the PMS? I'm not finding an obvious answer. Hotels, varying in room count, are providing ESDs that range from whistles to wireless to BLE or RFID enabled. Hotel owners and management companies have the responsibility to research the most appropriate solution for their hotel without undermining the safety and privacy of their employees and their hotel networks.
29More

Green Computing, a contribution to save the environment | Lancaster University - 1 views

  • Going Green" is a rising trend establishing itself as the preferred way of doing things while saving the environment.
  • Green computing is the environmentally responsible and eco-friendly use of computers and their resources. In broader terms, it is also defined as the study of designing, engineering, manufacturing, using and disposing of computing devices in a way that reduces their environmental impact.
  • Green Computing involves reducing the environmental impact of technology. That means using less energy, reducing waste and promoting sustainability. Green computing aims to reduce the carbon footprint generated by the Information Technology and Systems business and related industries
  • ...25 more annotations...
  • Energy-efficiency and e-waste are two major techniques involved in green computing. Energy efficiency involves implementation of energy-efficient central processing units (CPUs), servers and peripherals as well as reduced resource consumption. And e-waste is the proper disposal of electronic waste.
  • It is estimated that out of $250 billion per year spent on powering computers worldwide only about 15% of that power is spent computing, the rest is wasted idling (i.e. consumed by computers which are not in use but still turned ON).
  • A recent example is seen in Intel's 2030 strategy. Intel has been committed to continued progress on achieving net positive water use, 100% green power and zero waste to landfills across Intel's global manufacturing operations.
  • Because "one company can't solve climate change" according to Intel CEO Bob Swan, Intel is marking a new era of shared corporate responsibility and collaboration.
  • Green design: Designing energy-efficient computers, servers, printers, projectors and other digital devices.
  •  Green manufacturing: Minimising waste during the manufacturing of computers and other subsystems to reduce the environmental impact of these activities.
  •  Green use: Minimising the electricity consumption of computers and their peripheral devices and using them in an eco-friendly manner.
  • Green disposal: Repurposing existing equipment or appropriately disposing of, or recycling, unwanted electronic equipment.
  • Going Green" is a rising trend establishing itself as the preferred way of doing things while saving the environment
  • Green Computing, a contribution to save the environment
  • hat means
  • The world is facing challenges that we understand better each day as we collect and analyse more data, but they go unchecked without a collective response - from climate change to deep digital divides around the world to the current pandemic that has fundamentally changed all our lives. We can solve them, but only by working together.
  • G
  • T
  • using less energy, reducing waste and promoting sustainability. Green computing aims to reduce the carbon footprint generated by the Information Technology and Systems business and related industries. Energy-efficiency and e-waste are two major techniques involved in green computing. Energy efficiency involves implementation of energy-efficient central processing units (CPUs), servers and peripherals as well as reduced resource consumption. And e-waste is the proper disposal of electronic waste.
  • If we think computers are non-polluting and consume very little energy, in fact the use of computer plays a big role in environment pollution. It is estimated that out of $250 billion per year spent on powering computers worldwide only about 15% of that power is spent computing, the rest is wasted idling
  • the U.S. Environmental Protection Agency (EPA) launched the Energy Star program, a controlled labelling program to promote and recognise energy-efficiency. The Energy Star label has now certified more than 75 different product categories, homes, commercial buildings and industrial plants. The program has also resulted in the widespread adoption of sleep mode among electronics' consumers.
  • in 1992,
  • The IT industry is putting efforts in all its sectors to achieve Green Computing.
  • Equipment recycling, reduction of paper usage, virtualisation, cloud computing, power management, green manufacturing are the key initiatives towards Green Computing
  • one company can't solve climate change
  • reen Computing involves reducing the environmental impact of technology.
  • Designing energy-efficient computers, servers, printers, projectors and other digital devices.
  • Minimising waste during the manufacturing of computers and other subsystems to reduce the environmental impact of these activities.
  • Green Computing has an optimistic future for saving the environment with ample avenues for making it possible. Hope we move forward with the goal of efficient computing while making the earth greener.
  •  
    Green computing, commonly referred to as "green technology," is the study of creating, utilizing, and disposing of computing systems in a way that minimizes their impact on the environment. The ecologically friendly and ethical use of computers and their resources is known as "green computing." A growing trend that has established itself as the preferred method of doing things while preserving the environment is "Going Green." Green computing aims to lessen technology's negative effects on the environment. This entails conserving energy, cutting waste, and fostering sustainability. The goal of "green computing" is to lessen the carbon footprint left by the information technology and systems sector and allied businesses. Green computing mainly uses two methods: e-waste and energy efficiency. Reduced resource use as well as the use of energy-efficient servers, peripherals, and CPUs are all part of energy efficiency. And e-waste is how electronic garbage should be disposed of properly. Even while we may believe that computers are non-polluting and require relatively little energy, their use really contributes significantly to environmental pollution. Only 15% of the estimated $250 billion annually spent on powering computers globally is thought to be used for computation; the remaining energy is lost idling on inactive machines. Since energy consumption is the primary cause of CO2 emissions, any energy saved on computer hardware and computing will result in tons of CO2 emissions being avoided every year. The Energy Star program was established by the U.S. Environmental Protection Agency (EPA) in 1992 as a controlled labeling initiative to promote and reward energy efficiency. More than 75 different product categories, as well as residences, office buildings, and industrial facilities, have already received the Energy Star badge. Consumers of devices have widely embraced sleep mode because of the campaign. The IT industry is working to implement Green Computing across a
« First ‹ Previous 141 - 150 of 150
Showing 20 items per page