Skip to main content

Home/ Groups/ Hospitality Technology
matthewpadillaes

Better tech and decision-making are hotel trends to watch for in 2022 | PhocusWire - 0 views

  • This dynamic is one of the key factors that has required a change in the way hotels operate. Hoteliers have had to find the most efficient way to run leaner and sometimes less knowledgeable teams, as well as using smart ways to onboard and train up newcomers.
  • As the pandemic continues, we expect that many hotels will be forced to re-examine their tech stack and could end up directing a large proportion of their focus and investment towards adjusting and simplifying their hotel operations technology over the next year.
  • Another consequence of pandemic cost cutting has been reducing in-house tech teams so in this environment, where there is minimal tech support and a great deal of newcomers to the industry, operations technology has to be intuitive to use, fast to roll out and it must add value quickly upon installation.
  • ...2 more annotations...
  • Hoteliers need to be able to make the best decisions for their operations and guests which are based on real-time insights and data. When it comes to groups and multiple property hotels, hoteliers want to ensure consistency of brand across departments and properties, something that guests are expecting more than ever during COVID-19.
  • Housekeeping teams and those working in hotel operations have faced one of the most challenging times in their industry and have adapted at incredible speed, so it is important to take note of this and celebrate your team. That way hotels can help create a new generation of loyal and motivated hotel staff.
  •  
    As the pandemic continues to create changes in the world hotel management are forced to adapt to new ways to make better decision-making abilities for the future of their establishment. One factor is retaining staff and attracting new groups as some hotels face labor shortages. 2022 has the potential to be a great year for the hotel industry as we continue to take the pandemic in our stride.
sarahcarniglia

Pandemic Has Changed The Future Of Cloud Computing - 2 views

  •  
    This article talks about cloud computing and how the pandemic has increased the demand of internet. The demand has came alongside employees working from home, education being brought online and e-commerce activities. Cloud computing is being integrated into businesses because of this flexibility, cost efficiency, and security.
fischerc014

These Are the Robots Taking Up Dallas' Open Restaurant Jobs - D Magazine - 0 views

  • owner told the Dallas Morning News that robots have saved him thousands of dollars a month in labor costs as well as the trouble of finding enough human servers to staff his restaurant in a tight market for low-wage workers.
  • the robots can perform a variety of functions, but their basic competence is simple: delivery and display.
  • Chen says we shouldn’t worry. Not about a robot uprising—I neglected to ask him about it—but about the displacement of workers by automation.
  • ...1 more annotation...
  • “Robotics is doing repetitive things, which maybe nobody wants to do anymore,”
  •  
    Robots are being used more in replace of low-wage workers to reduce labor costs at a restaurant. The robots have proven to be efficient and reliable in the restaurant setting. The (human) server is able to serve more tables with the robot helping with food-running/cleaning and doesn't have to split tips with the robot. The downside is the displacement of workers by automation. Will we see robots being implemented more in restaurants?
waldjustin13

Father of Disruption Theory on Why Netflix Not Uber Is the Perfect Example - 3 views

  • The primary reason why Netflix is disruptive is that, when it launched its mail-in subscription service, it didn't go after the core customers of competitors like Blockbuster.
  • A disruptive company targets segments of the population that have been overlooked by its competitors, delivering an inferior (but more tailored) alternative, often at a lower price.
  • In the case of Netflix, the huge shift came with the rise of streaming video.
  • ...4 more annotations...
  • The reason why disruptive companies are often able to rise so quickly is that their larger competitors overlook them.
  • But not every company that is innovative is disruptive
  • When it launched, Uber didn’t go after overlooked segments of the population, or provide a cheaper alternative to taxis. Uber just made a more convenient taxi system using your smartphone, going after the taxi companies’ core business right from the start.
  • It keeps the advantages it had at the beginning, and adds the things mainstream customers want.
  •  
    This article discusses why Netflix is the perfect example of a disruptive innovation and why Uber is not a disruptive company. "Not every company that is innovative is disruptive." Before Netflix exploded, it was overlooked by its competitors, which is part of the reason why it was able to rise so quickly.
kbroo026

Why restaurant data analytics are a necessary tool for success | Nation's Restaurant News - 0 views

  • Recent trends such as diverse sales channels
  • create a multi-layered restaurant operating environment, turning data analytics into a necessity rather than an option.
  • A central repository refers to
  • ...5 more annotations...
  • the harmonization of records that creates a platform for activities, records, and transactions to be easily accessed, shared, and analyzed.
  • Information from data analytics should be simple, relevant, and accommodative to operations. Easily understandable metrics, such as weight-based food waste
  • represents simplicity.
  • Management should foster culture on “let’s look at the data first” instead of solving issues based on anecdotes and hypothetical terms.
  • Similar to an organized kitchen with streamlined production, restaurant management should take the same approach with data analytics. Organized data enables organizations to get a finger on the pulse of their business.
  •  
    Restaurants have long focused on improving kitchen efficiencies, but they now need to also focus on data efficiencies. Analyzing sales and labor reports on a daily basis rather than weekly allows managers to make more timely decisions that impact revenue and profit. Data should also be presented in simple, meaningful terms which benefit managers and line staff. Owners and GMs need to foster a "data first" culture when seeking to improve efficiency, service, and value.
katvillaverde

Cybersecurity: A modern hospitality challenge - 2 views

  • These examples show that cybersecurity is an essential concern for both our private and our professional lives, as it can avert potentially disastrous information leaks.
  • T
  • hey are a specially weak spot for hotels, as every process, be it online bookings, drinks at the bar or treatments at the spa, requires payment by credit card.
  • ...4 more annotations...
  • The hotel Wi-Fi, for example, could be used to access guest’s private devices, such as mobile phones and laptops, or personal guest information could be leaked from hotel servers and databases if their protection is lacking
  • The hotel’s problems start with a loss of trust and therefore business by the guests who were affected, and go on to legal issues which could potentially lead to time and money consuming lawsuits.
  • his could include staff training and awareness, regular system checks, as well as the conducting of regular risk assessments.
  • By being ready and equipped to deal with such incidents, the impacts of cyberattacks can be managed and therefore lessened.
  •  
    This article explains how hotels are very prone to cyber attacks since they store personal information of millions of travelers every day. They need to win over the trust of the guests.
georgemacintyre

Robot Delivery Service Coco Opens With Austin Restaurants - Eater Austin - 0 views

  • Los Angeles-based robot delivery service Coco made its way into Austin this month.
  • Vaquero Taquero, Arpeggio Grill, Bambo Bistro, Clay Pit, DeSano Pizzeria, Tuk Tuk Thai, and Aviator Pizza.
  • robots, which will be controlled remotely, will make deliveries in the South Lamar, South Congress, general South Austin, downtown, North, North Loop, and Domain areas.
  • ...1 more annotation...
  • food delivery service company Refraction AI debuted its robots with Southside Flying Pizza.
  •  
    The company Coco uses robots to deliver food to customers. In the world we live in today food delivery is bigger than ever. Coco uses robot delivery rather than using humans driving cars. This is a relatively new technology and is something that has just recently been adopted by restaurants in Austin, TX.
amoon008

Tackling Security Threats In The Hospitality Industry | MetaCompliance - 0 views

  • The hospitality industry faces vast security threats, making it a natural target for cybercriminals because of the value and volume of personally identifiable information that these organisations hold.
  • Marriott, Radisson Hotel Group, InterContinental, Four Seasons, and Hilton Hotels are just some of the major corporations that have hit the headlines in recent years as a result of a data security attack.
  • approximately 55 million online hotel bookings are affected by fraudulent websites and call centers posing as hotel websites, according to the American Hotel and Lodging Association.
  • ...7 more annotations...
  • The majority of all cyber-attacks can be traced back to a phishing email that tricks the victim into divulging their credentials or downloading malicious malware.
  • A study conducted by Intel found that 97% of security experts fail at identifying phishing emails from genuine emails.
  • many hotels becoming completely digitalised in a bid to gain competitive advantage and keep up with online travel agencies such as Expedia and Hotels.com
  • Worryingly, ransomware is evolving into a new type of threat where cybercriminals are not just encrypting data but are also stealing it and threatening to release it on the internet
  • In recent years, hackers have been deploying new tactics and Distributed Denial of Service (DDoS) attacks have been growing in popularity. This type of attack is an attempt to make an online service unavailable by overwhelming it with huge volumes of traffic from multiple sources to cause great damage. This can include loss of data, loss of revenue, reputational damage, and a loss of customers.
  • According to a survey, almost half (44%) of firms have experienced a significant, business-altering data breach caused by a vendor.
  • With the hotel industry increasingly prone to malicious cyber attacks, there are a number of ways organisations can combat cyber security threats
sydneywolfson

What is Contact Tracing? - 0 views

  • Contact tracing is a public health practice that health departments use to identify and notify people who have been exposed to someone with an infectious disease.
  • Public health workers reach out to these exposed people to tell them that they've been in close contact with an infected person and to give them information and support to help them keep themselves and their loved ones safe.
  • People who have tested positive for COVID-19 infection receive a phone call or a short survey by text or email from the health department, asking them who they may have exposed while they were contagious
  • ...2 more annotations...
  • Your identity and health information that you provide to a contact tracer is always kept confidential. It will not be shared with anyone who may have been exposed. 
  • Anyone who was within 6 feet (2 meters) of an infected person for a total of 15 minutes or more within 24 hours is considered to be a "close contact."
  •  
    This article talks contact tracing with Covid-19. Health care works will contact anyone that person has been in contact with via phone call or text to let them know about the exposure.
avanzado

Hotel Safety: Security for Hospitality and Hotel Management Companies | By Kacey Bradley - 1 views

  • improved software allows hotel owners to match up specific transactions with the surveillance footage,
  • IT and security departments should work in conjunction
  • Offering employees profit-sharing, a stake in the hotel's future is an effective way to improve security.
  • ...8 more annotations...
  • Mobile keys, on the other hand, strengthen security and allow guests to bypass the front desk altogether.
  • Most commercial properties have some type of video surveillance system.
  • Profit-sharing gives employees room to grow in a chaotic industry. Most profits come in the form of an end-of-year bonus people can use to their hearts' desire. Beyond increased loyalty, employees with profit-sharing options are more likely to take ownership of their role in the business and improve productivity.
  • Your Wi-Fi should be a secure network users must log in to before using. Make the username and password easy to find. Also, alert guests about possible security risks, such as connecting to public Wi-Fi networks nearby that don't require a password.
  • A straightforward update is an in-room safe. It's easy to come up with relevant items to stash inside, especially when traveling. Guests can stow essential documents, passports, collectible coins, souvenir gifts and more.
  • A safe and secure environment all starts with knowledgeable staff. Set up regular meetings with all employees to talk about guest safety. Go over OSHA requirements and how the team can stay safe in the event of fire and evacuation. You should also provide training on compliance regulations and bloodborne pathogens.
  • In today's technologically advanced world, guest and staff security are more critical than ever. Luckily, you can take plenty of steps to make improvements. From smart surveillance technology to secure Wi-Fi networks, read the advice below to improve your hotel's setup.
  • In today's technologically advanced world, guest and staff security are more critical than ever. Luckily, you can take plenty of steps to make improvements. From smart surveillance technology to secure Wi-Fi networks, read the advice below to improve your hotel's setup.
  •  
    This article basically gives tips about how to create a safe hotel. There are many ways you can ensure that your staff and hotel guests are protected.
  • ...2 more comments...
  •  
    Among other ways that hotels in the modern are using to ensure safety and security, the article looks at cybersecurity. The author proposes that hotels' security and IT departments should work together to create a safe online environment that "prevents unwanted third parties, like hackers, from intercepting private guest data." This reiterates the significance of updating computer equipment to mitigate potential threats.
  •  
    This is a great article that explains the different ways hotels are trying to make staying at a hotel safer. They start by explaining how they have surveillance cameras placed around the hotel to help them see everything that is happening all at once. Cybersecurity protects the hotels computer systems from being hacked and having people steal all the hotels and customers information. Mobile room keys helps guests find their keys faster because they will now have it on their mobile devices. For hotels the guests safety are their top priority and they train their staff to believe in the same thing.
  •  
    This article is about steps a property can take in order to ensure the safety of their employees and guests. This includes: surveillance cameras, cybersecurity, mobile room keys, safes in rooms, among other things. - Be sure to invest in high-quality cameras that can pick up the little details, such as facial features and bill amounts. - Your Wi-Fi should be a secure network users must log in to before using. Make the username and password easy to find. - Mobile keys strengthen security and allow guests to bypass the front desk altogether. -Set up regular meetings with all employees to talk about guest safety. -In terms of profit-sharing, workers feel a sense of pride or ownership, they will keep their eyes and ears open for signs of waste, fraud or theft.
  •  
    This article talks about hotel's safety and the usage of surveillance cameras, cybersecruity, mobile room keys, guest safety, staff training, and profit sharing. Each section talks about the procedures that should be taken to keep guest and staff safe.
rosedelice

Why Is Hotel Security Important? - American Protection Group - 0 views

  • Hotels are part of the hospitality industry, where providing good customer service is essential. A hotel’s reputation is staked largely on the guest experience, and investing in proper security services plays a central role in ensuring guests feel safe and protected. It also protects owners from the damages and costs that may arise from criminal activity such as theft.
  • Security officers patrolling the hotel’s grounds can look out for suspicious activity. Hotels should have security officers regularly patrol the hallways, stairwells, lobbies, parking lots, restaurants and bars.
  • Security officers can handle unruly guests or visitors and prevent negative situations from spiraling out of control. Officers can also provide additional protection to VIP or controversial guests of the hotel that might attract public attention or protests.
  • ...4 more annotations...
  • Security officers can prevent hotels from incurring property damage, particularly if officers are patrolling the hotel’s grounds. They can also assist in incidents involving guests damaging their rooms.
  • In addition, the presence of security officers at a hotel can make guests and employees feel safer and more at ease. Many hotel guests are in an unfamiliar location, and this sense of security can increase their satisfaction with the hotel.
  • Security officers on the premises of a hotel can react appropriately and rapidly when emergencies occur. In the case of a fire, they can help evacuate guests and maintain order. In a shooting or other act of violence, they can stop the perpetrator and protect guests and staff from danger. They can also provide valuable assistance and information to law enforcement when they arrive on the scene.
  • Hotel guests may occasionally become unruly or intoxicated, particularly in hotels with bars. Security officers follow hotel policy for dealing with these guests by escorting them either off of the premises or to a taxi, or detaining them for the police as appropriate. They can also escort trespassers and loiterers off the premises. In addition, security officers can safely help staff and guests to their vehicles upon request if they feel unsafe.
  •  
    It is very important for hotels to provide excellent security. It makes the customers feel safe and enhance their confidence and safety.Security officers patrolling the hotel's grounds can look out for suspicious activity.Security officers can prevent hotels from incurring property damage, particularly if officers are patrolling the hotel's grounds. They can also assist in incidents involving guests damaging their rooms.
chadidscha

Cyberattacks are surging. CT's workforce isn't keeping up - 0 views

  • A growing wave of cyberattacks is threatening governments, businesses and everyday residents. Across the globe, there is a critical shortage of skilled professionals to guard against these criminals.
  • The state’s cybersecurity workforce increased by only 1 percent between 2015 and 2020, which was the seventh slowest rate in the nation, according to data from the Bureau of Labor Statistics. By comparison, the ranks of these key professionals more than doubled in a dozen states over that timeframe.
  • Globally, cybersecurity experts are in extraordinarily high demand. An analysis from Cyberseek, a public-private partnership that measures cybersecurity workforce shortages in the United States, notes the talent gap is severe in every state besides Maine.
  • ...1 more annotation...
  • Nationally, the number of unfilled cybersecurity jobs is estimated to be 464,000, including 3,800 in Connecticut, according to Cyberseek, which is backed by a subdivision of the U.S. Department of Commerce.
  •  
    Cyber-attacks has become an increasing problem within the US and the lack of unfulfilled jobs regarding cyber security poses just as big, if not bigger, of a problem. All states, besides Maine, are in dire need to fulfill jobs across the private business sector and government related positions. At this point, many companies, including the government, offer free training (acquiring proper certifications) in hopes of gaining more employees to help with the fight against cyber war.
kbroo026

What hotels need to know about biometric privacy laws - Document - Gale OneFile: Hospit... - 0 views

  • In order to avoid liability, employers should become familiar with biometric privacy acts, consumer privacy acts and data breach notification requirements.
  • Currently, three states have enacted biometric privacy laws: Illinois, Texas and Washington.
  • Illinois Biometric Information Privacy Act.
  • ...6 more annotations...
  • BIPA restricts the ability of a privacy entity to "collect, capture, purchase, receive through trade, or otherwise obtain a person's or a customer's biometric identifier or biometric information."
  • The Illinois legislature stated that heightened protection for biometric information is justified by the fact that once this type of information has been compromised, it obviously can't be changed (without some serious cosmetic surgery, anyway).
  • Employers also need to be aware of local laws and regulations.
  • Portland
  • bans the use of facial recognition technology by private entities in places of public accommodation, which include hotels and restaurants.
  • With the patchwork of laws and enforcement procedures, the enactment of a uniform federal law would be beneficial.
  •  
    Several states have implemented some form of biometric privacy laws, with the gold standard coming from Illinois. Illinois' BIPA allows for private enforcement, stiff fines, and paying of attorney fees. BIPA prohibits collection, capture, purchasing or receiving a customer's biometric identifier/information. Safeguarding this data is perhaps more important than any other because it cannot be easily changed, if at all. Current lack of federal law and a patchwork of local regulations means that businesses and employees must be knowledgeable of rules and rights that affect them.
mmoutsatsos

Nail The Basics Of Cybersecurity With Multifactor Authentication (MFA) - 0 views

  • When it comes to the basics of cybersecurity, nothing is so elemental as the password.
  • the simple password has endured as the first and last guardian of consumer and business data. 
  • But with the rise of sophisticated hacking techniques, passwords alone can no longer protect against unauthorized access and security attacks.
  • ...22 more annotations...
  • Enter multifactor authentication (MFA). By adding extra layers of security to a user's login process and requiring they enter two or more pieces of evidence (e.g., factors) to prove they are who they say they are,
  • MFA is a great method for boosting protection against everyday threats like credential stuffing, phishing attacks and account takeovers.
  • 1. Passwords alone are no longer enough to protect against security attacks.
  • it's critical every company apply effective security measures to protect their data.
  • to protect business and customer data, it begins and ends with preventing unauthorized account access.
  • MFA is the most direct and effective way to do that.
  • A familiar example of MFA at work is the two factors needed to withdraw money from an ATM.
  • Your ATM card is the something that you have, and your PIN is the something you know.
  • companies can require all employees to verify their identities with two or more pieces of evidence to prove they are who they say they are.
  • 2. Companies around the world (from Fortune 500s to small businesses) are feeling the urgency to adopt MFA — but a knowledge gap persists.
  • It's imperative companies invest in training employees on how using MFA is essential to securing access to both work and personal accounts.
  • industries in our everyday lives — led by social media platforms and financial services — requiring consumers use MFA to secure their personal accounts, both businesses and employees are normalizing the everyday routine of MFA. 
  • make the connection between security at work and in their personal lives and understanding they're two sides of the same coin.
  • 3. MFA adoption can seem overwhelming, but it doesn't have to be.
  • By recognizing any technical, change management and financial challenges to user adoption, committing to open communication, and providing the resources and training your employees need, any business can conquer that fear of the unknown. 
  • When adopting MFA, prioritize identifying the strongest and most user-friendly authentication method possible for your organization.
  • that means using an authenticator generator app, a hardware security key or a combination.
  • the reality is a large percentage of U.S.-based employees are also consumers with a smartphone in their pocket.
  • on that phone, the employee is already using multiple apps that require MFA.
  • 4. Balance security with ease of use when identifying a preferred authentication method for your organization
  • With options like hardware keys, you often see employees run into issues losing, replacing or breaking them. But a (TOTP) mobile app can be continuously updated in ways that make the MFA process more seamless (e.g, an app that verifies automatically from trusted locations like an employee's home office).
  • authenticator apps on devices like iPhones have the added benefit of extra layers of security at the phone level like PINs and biometrics like Face ID.
  •  
    This article talks about companies transitioning to multifactor authentication as an added layer of protection of cybersecurity.
kbroo026

In trust we must trust, Travelport research. - Document - Gale OneFile: Hospitality and... - 0 views

  • "The travel industry needs to sharpen its focus on trust,"
  • four trust gaps
  • PRICE TRANSPARENCY
  • ...10 more annotations...
  • the two most important factors in building consumer trust in travel agencies and travel suppliers
  • are having 'no hidden costs'
  • DATA PRIVACY
  • "To put it into context, having no hidden costs is a full 16 per cent more influential on trust than an airline's long-term safety record.
  • COVID-19 HEALTH & SAFETY
  • What we learned from the study, however, is that travel suppliers and agencies will benefit from being clearer in their communication on certain measures, like social distancing."
  • and 'fully flexible or refundable products'
  • travellers said they are most comfortable with companies using data that they have actively shared with them through one-to-one conversations (46 per cent), past booking behaviour (46 per cent) and loyalty activity (44 per cent).
  • INFORMATION CREDIBILITY
  • the most trusted sources of travel-related information that travellers use when researching a trip are those perceived to have aligned interests: friends and family (67 per cent) and review websites (50 per cent).
  •  
    Travelport's recent survey found four trust gaps that exist between the travel industry and its consumers. One of those is data privacy, with only 40% of travelers currently trusting companies to responsibly use their data. While the majority of consumers are still not comfortable with companies using any shared data, they are most comfortable with them using data that was sourced from the company and not acquired from external companies or mining.
melnetra112

Why Hoteliers May Want to Step Up Their Game on Security Technology | - 0 views

  • Why Hoteliers May Want to Step Up Their Game on Security Technology
  • Within the hospitality industry, we are all quite aware that Covid continues to spook people all over the world, which will lead to depressed overall travel numbers for quite some time to come. Add to that the various automated systems that together mean hotels may never need to hire back a large portion of their former employees
  • Problems may come about in the form of snatched purses from restaurant tables, missing bags left at the bell desk or minor vandalism of cars left by the front entrance.
  • ...7 more annotations...
  • As we’ve all now promised heightened guest safety in the wake of this rampant virus, so too must we protect our visitors and their belongings during any subsequent increases in criminality. Anything stolen will not only leave guests heartbroken, but this will also reflect quite poorly on the property
  • Beyond retaining a strong security department, much of the contactless technology that hotels have set up in the past months can luckily pull double duty to help prevent theft or other transgressions.
  • Nevertheless, an absence of human eyeballs should be another reason to emphasize touchless technologies including mobile keycards, online payment platforms and elevator floor access systems.
  • Elevator floor access restrictions are often only deployed at night, but these should now be set up for all times of day while also considering elevator cameras
  • The technology underpinning self check-in and mobile key cards can also be used to grant or deny access to other areas on property
  • Even niche operations like poolside or oceanside lounge chairs can be put through an online booking portal to better inhibit unauthorized visitors
  • While cyber threats may still have a much bigger financial impact on hotel companies than any misconduct on a more personal level, it still doesn’t hurt to look at how all the new hardware and software your property has set up to combat Covid might also be redeployed for other safety purposes.
  •  
    To Sum the article, Hoteliers consider high-tech security technology since the outbreak of the coronavirus and the safety of residents in hotel. In order for hotel to prevent the virus from spreading they'll consider limiting who has access to the facility. Another, to prevent criminal activity to take place within hotels by granting access to person who notify resident who stays and to be buzz in, contactless on key card and more.
georgemacintyre

How Digital Transformation Can Reshape Guest Experience In The New Pandemic Era - 0 views

  • For half a decade, the travel and hospitality industry has been trying to incorporate technology to enhance the way it interacts with its customers. Perhaps, the pandemic has been the major catalyst to accelerate digital transformation initiatives in the hospitality industry
  • But what exactly is digital transformation? Digital transformation is the implementation of the latest digital technology into a company’s business operations, processes and people to improve and optimize the customer experience.
  • The modern, tech-savvy traveler is more informed, empowered and wants to feel valued. Now, there is a demand for a frictionless, intuitive, hyper-personalized experience at every touchpoint in their travel journey. And digital transformation technologies such as AI, robotics, big data, IoT, cloud, mobile and AR/VR underpin a successful personalized guest experience.
  • ...5 more annotations...
  • The things that power this disruptive technology — smartphones, on-demand apps, social media — are powering the change in guest behaviors.
  • 1. Leverage customer data to increase subscriptions: 
  • 2. Implement an agile leadership mindset:
  • 3. Omnichannel experience:
  • Brands must observe and compare the existing guest experience with what they prefer. With insightful data in hand, decision-makers need to modernize products and offerings, deliver innovative solutions and implement agile models in their business culture and operations.
  •  
    The hospitality industry has needed to dive all in on technology for a while now. The pandemic kickstarted the industry to really go all in. Many of todays guests really want a very personalized experience. Hospitality companies are using technology to provide guests with a very unique experience personalized exactly for them. The use of new technology from some companies is just going to have to make other companies try and keep up with them. An arms race of technology is likely to happen in the industry.
amoon008

Green Computing | University of Puget Sound - 0 views

  • Technology Services (TS) supports sustainability in several ways. Examples include: Purchasing from Environmentally Committed Companies Participating in Electronic Recycling Programs Deploying Virtual Technologies Limiting Printing and Recycling Paper
  • Responsible handling of electronic equipment is critical in order to minimize the university’s impact on the environment. TS purchases campus computers from Dell and Apple.
  • Dell also banned the export of their electronic waste to developing nations. They offer a strong trade-in program for used equipment. Dell focuses in every way on being environmentally and ethically responsible corporate stewards.
  • ...9 more annotations...
  • Dell supported a multi-stakeholder group in developing the Electronics Products Environmental Assessment Tool (EPEAT). All Dell computers purchased by the university meet the EPEAT standard
  • Outdated Apple equipment is processed through Apple’s Trade-In Program, often for purchase credit. Apple either refurbishes the equipment or recycles it in an environmentally safe manner.
  • All electronic waste on the Puget Sound campus is recycled in one of the following ways:
  • Apple focuses on a comprehensive strategy for their machines, with specific goals for each phase of product development, use, and disposal. Every computer Apple sells has earned the highest rating of EPEAT Gold.
  • Other outdated equipment is processed through the university’s recycling partner, GreenPC Electronic Recycling. Such equipment is then refurbished and resold to other users.
  • By employing virtualization technology for servers and desktops, Technology Services promotes sustainability while also improving services!
  • Through PrintGreen, instituted in Fall 2012, students were allotted 750 free prints each semester - an amount that the majority of students did not exceed based on past usage records.
  • The ultimate goal of PrintGreen is to provide students with better information on the environmental impact of their printing and to promote the sustainable use of campus resources.
  • Recycling bins are placed prominently in all computing labs, Print & Copy Services, and TS offices.
  •  
    This article talks about what the University of Puget Sound in Tacoma, WA is doing regarding green computing on campus and how their students can also get involved.
rosedelice

How to Combat the Negative Side of Consumer Behavior With Societal Marketing - 0 views

  • Some companies treat corporate social responsibility primarily as a form of branding. For instance, a company that donates 10 percent of profits to cancer research might develop a marketing plan to let the public know about its good works so customers will feel better about buying its products. A more comprehensive approach to societal marketing would include an examination of the company's products and services and what effect they have on the customer and the society.
  • Consumers generally say they want to buy products that are more environmentally sustainable or socially responsible, but that doesn't translate to actual sales if the product costs too much or doesn't perform as well as its rivals. It might seem as if there's a gap between what customers say they want and what they really want, but in reality they want it all. An unpleasant-tasting, expensive brand of fair trade coffee is not going to outsell a delicious and affordable rival just because it is fair trade. However, a delicious and affordable fair trade brand could do very well. The fact that the coffee is fair trade is a benefit to the consumer, but only if the coffee meets the customer's other requirements for taste and price. Effective societal marketing treats the social responsibility aspect as an extra benefit to choosing an already fine product.
  • Sometimes a company can make its marketing campaign more socially responsible by making relatively small changes to a popular product. For example, if a restaurant offers a children's meal option including a grilled cheese sandwich, chips and a soda, it could improve the menu by offering fresh fruit and milk or juice as options. Some parents will still decide to order the chips and soda, but some will choose the fruit and milk. The company is giving customers what they want either way, but by including healthier options the company is doing what it can to have a positive impact on society.
  •  
    Consumers generally say they want to buy products that are more environmentally sustainable or socially responsible.Effective societal marketing treats the social responsibility aspect as an extra benefit to choosing an already fine product. The company needs to give customers what they want either way by including healthier options.
« First ‹ Previous 441 - 460 of 5534 Next › Last »
Showing 20 items per page