Skip to main content

Home/ Groups/ Hospitality Technology
mmoutsatsos

The Rich World's Electronic Waste, Dumped in Ghana - Bloomberg - 0 views

  • the Agbogbloshie dump, a wasteland dotted with burning mounds of trash in Ghana’s capital, Accra.
  • Up to 10,000 workers wade through tons of discarded goods as part of an enormous, informal recycling process, in what has become one of the world’s largest destinations for used electronic goods.#lazy-img-360452765:before{padding-top:66.70212765957447%;}
  • Burns, back problems, and infected wounds
  • ...26 more annotations...
  • respiratory problems, chronic nausea, and debilitating headaches
  • —brought on by the hazardous working environment and toxic air pollution.
  • smashing up old computers and televisions in search of valuable parts and burning insulated cables to recover copper.
  • The Agbogbloshie dump is a result of the world’s increasing demand for electronic equipment as consumers continually upgrade their devices and throw out the older ones.
  • The e-waste problem could expand into a global health crisis,
  • significant proportion of this electronic waste is sent, often illegally, from the West to developing countries across Africa and Asia.
  • Around 50 million tons of electronic waste, or e-waste, is being thrown away each year, according to a report published this year by the United Nations.
  • figure is projected to double by 2050.
  • only 20 percent of e-waste is thought to be recycled appropriately.
  • The rest “ends up in landfill, or is disposed of by informal workers in poor conditions,” the UN found.
  • A
  • “E-waste is a growing global challenge that poses a serious threat to the environment and human health worldwide,”
  • In Ghana, the waste arrives via the Port of Tema, 20 miles to the east of the Agbogbloshie dump.
  • They are often labeled as secondhand consumer products, health experts said, so they are not strictly considered waste.
  • “There are skin diseases and ailments [at Agbogbloshie], but the worst problem here is respiratory illnesses, because the amount of pollution here is so high,”
  • the quality of air is terrible
  • “The workers can’t do anything about it because they have to earn a living, so it’s a trade-off. They earn money but their health suffers.”
  • These health risks are entering the food chain. The Agbogbloshie area is home to one of the largest food markets in Accra, and haggard livestock roam freely and graze on the dumpsite.
  • Agbogbloshie contained some of the most hazardous chemicals on earth.
  • One egg hatched by a free-range chicken in Agbogbloshie exceeded European Food Safety Authority limits on chlorinated dioxins, which can cause cancer and damage the immune system, 220 times over.
  • about 80,000 men, women, and children subsist from the Agbogbloshie dump, living either on-site or in the adjacent slum.
  • Ghana imports about 150,000 tons of secondhand electronics a year,
  • an international treaty that since 1989 has forbidden developed nations from carrying out unauthorized dumping of e-waste in less developed countries.
  • It is very important the issue of waste export to developing countries such as Africa and other countries in transition should be looked at critically.”
  • The German development agency GIZ is in the midst of delivering a €5 million ($5.5 million) project to build a sustainable, efficient recycling system at Agbogbloshie, as well as a health clinic and football pitch for workers.
  • But as the world’s appetite for electronics keeps growing, preventing the illegal dumping of electronic waste and the devastating impact it has on places like Agbogbloshie will prove an even greater challenge.
  •  
    The effects of electronic waste dumping in the Agbogbloshie dump in Accra, the capital of Ghana. It also talks about the health issues workers suffer from working there, and the problem is predicted to get much worse than it already is.
chadidscha

Why CapEx spend is rising-and how hoteliers are spending money | Hotel Management - 0 views

  • Hanson said it’s important to remember that a hotel that looks new and fresh will outperform a hotel that doesn’t.
  • Curb appeal is No. 1
  • Hotels are adding new tech in lobbies, including directory boards with interactive screens and big-screen TVs, he said.
  • ...1 more annotation...
  • Another trend Hanson sees is that hoteliers are spending money on improvements that offer no additional stream of revenue. For example, a huge area of improvement comes in the way of adding more internet bandwidth.
  •  
    The article address the importance of today's capital expenditure and how it attracts new and recurring guests to its properties. Some of these capital expenditures are executed for solely esthetic reasons, even adding more bandwidth to the internet is done to show its clientele that they no longer offer just the average features anymore.
chadidscha

4 Ways Cloud Computing Can Save Money | TechnologyAdvice - 0 views

  • Even though it’s a time-consuming process, the cloud can provide extensive financial benefits like budget savings and increased workplace productivity.
  • companies can save an average of 15 percent on all IT costs by migrating to the cloud.
  • Less demanding labor and maintenance Higher productivity Lower initial capital investment Top public cloud computing providers
  •  
    Although cloud computing is not the be-all and end-all in the world of IT, it is, however, the latest technique many, personally and professionals/ companies, flock to due to its convenience, financial benefits, and the lack of required hardware.Therefore, reducing, or depleting, the costs associated with hardware finances. Additionally, it reduces the peremptory requests in regards to labor and the need to maintain and/ or preserve of any machinery.
chadidscha

Electronic Waste Recycling: A Global Problem in Need of Solutions - 0 views

  • Cellphones, computers, and other technological products contain a number of valuable materials that must be mined. Rare earths, gold, palladium, copper, and more all reside within our cell phones, TVs, and more.
  • These valuable materials are acquired through intensive mining operations. The recycling of such materials from our old gadgets would allow us to reuse these valuable materials, ultimately requiring less mining and conserving our finite resources. According to the EPA, the recycling of one million cell phones yields 35,000 lbs. of
  • The toxic components in e-waste not only pose risks to workers in developing nations, but they also pose risks to the environment; where e-waste is either improperly handled or disposed of, there is risk of soil and groundwater contamination.
  • ...2 more annotations...
  • Many have pinpointed improved legislation, advancement in recycling technologies, increased education, and more convenient recycling programs for resolving the electronic waste crisis. Some companies have already jumped on the bandwagon toward finding improved recycling methods.
  • The Washington-based company behind Redbox and Coinstar has developed a line of ecoATM kiosks, where consumers can conveniently sell their old phones for cash on the spot where they already shop.
  •  
    Electronic waste is a growing problem which affects our soil, groundwater, and more due to improper disposal. This problem was considered a conflicting issue in developing countries in the past; however, that no longer holds truth. Many nations and various companies have become more and more of this issue and try to tackle it by implementing legislations and recycling centers, which allow for proper e-waste disposal. The problem at hand can be dealt with, but a world-wide team effort is needed in order to combat this dilemma.
sydneywolfson

What Does LEED Certification Mean to the Hotel Industry - 0 views

  • LEED certification is a growing trend and concern among hotel developers, architects, hotel brands and consumers.
  • To earn LEED certification, a building is awarded points for satisfying certain green requirements in six categories- Sustainable Sites, Water Efficiency, Energy & Atmosphere, Materials & Resources, Indoor Environmental Quality and Innovation in Design.
  • istorically it was believed that there is a cost associated in building a LEED-certified hotel; however, it is arguable if this cost differential exists in today’s construction market. The USGBC reports that as of 2007, the cost to develop a green hotel, if any, is only one to two percent above that of a conventional hotel’s cost
  • ...3 more annotations...
  • In addition to selling more room nights at potentially higher rates, LEED-certified buildings typically save 30-50 percent in energy usage, 35 percent in carbon emissions, 40 percent in water emissions, and 70 percent in solid waste.
  • Currently there are only eight hotels in the U.S. that are LEED-certified, but over 100 more hotels have made their intentions known to become LEED-certified.
  • Green hotels offer recycling options, water-efficient toilets and faucets, energy-saving lighting, and recycled paper goods; many hotels have even begun to clean guestrooms and public space with non-toxic cleansers.
  •  
    This article talks about how LEED certification is increasing in the hotel industry. Buildings who are LEED certified save a lot more energy and offer recycling options.
rosedelice

How to Combat the Negative Side of Consumer Behavior With Societal Marketing - 0 views

  • Some companies treat corporate social responsibility primarily as a form of branding. For instance, a company that donates 10 percent of profits to cancer research might develop a marketing plan to let the public know about its good works so customers will feel better about buying its products. A more comprehensive approach to societal marketing would include an examination of the company's products and services and what effect they have on the customer and the society.
  • Consumers generally say they want to buy products that are more environmentally sustainable or socially responsible, but that doesn't translate to actual sales if the product costs too much or doesn't perform as well as its rivals. It might seem as if there's a gap between what customers say they want and what they really want, but in reality they want it all. An unpleasant-tasting, expensive brand of fair trade coffee is not going to outsell a delicious and affordable rival just because it is fair trade. However, a delicious and affordable fair trade brand could do very well. The fact that the coffee is fair trade is a benefit to the consumer, but only if the coffee meets the customer's other requirements for taste and price. Effective societal marketing treats the social responsibility aspect as an extra benefit to choosing an already fine product.
  • Sometimes a company can make its marketing campaign more socially responsible by making relatively small changes to a popular product. For example, if a restaurant offers a children's meal option including a grilled cheese sandwich, chips and a soda, it could improve the menu by offering fresh fruit and milk or juice as options. Some parents will still decide to order the chips and soda, but some will choose the fruit and milk. The company is giving customers what they want either way, but by including healthier options the company is doing what it can to have a positive impact on society.
  •  
    Consumers generally say they want to buy products that are more environmentally sustainable or socially responsible.Effective societal marketing treats the social responsibility aspect as an extra benefit to choosing an already fine product. The company needs to give customers what they want either way by including healthier options.
amoon008

Green Computing | University of Puget Sound - 0 views

  • Technology Services (TS) supports sustainability in several ways. Examples include: Purchasing from Environmentally Committed Companies Participating in Electronic Recycling Programs Deploying Virtual Technologies Limiting Printing and Recycling Paper
  • Responsible handling of electronic equipment is critical in order to minimize the university’s impact on the environment. TS purchases campus computers from Dell and Apple.
  • Dell also banned the export of their electronic waste to developing nations. They offer a strong trade-in program for used equipment. Dell focuses in every way on being environmentally and ethically responsible corporate stewards.
  • ...9 more annotations...
  • Dell supported a multi-stakeholder group in developing the Electronics Products Environmental Assessment Tool (EPEAT). All Dell computers purchased by the university meet the EPEAT standard
  • Outdated Apple equipment is processed through Apple’s Trade-In Program, often for purchase credit. Apple either refurbishes the equipment or recycles it in an environmentally safe manner.
  • All electronic waste on the Puget Sound campus is recycled in one of the following ways:
  • Apple focuses on a comprehensive strategy for their machines, with specific goals for each phase of product development, use, and disposal. Every computer Apple sells has earned the highest rating of EPEAT Gold.
  • Other outdated equipment is processed through the university’s recycling partner, GreenPC Electronic Recycling. Such equipment is then refurbished and resold to other users.
  • By employing virtualization technology for servers and desktops, Technology Services promotes sustainability while also improving services!
  • Through PrintGreen, instituted in Fall 2012, students were allotted 750 free prints each semester - an amount that the majority of students did not exceed based on past usage records.
  • The ultimate goal of PrintGreen is to provide students with better information on the environmental impact of their printing and to promote the sustainable use of campus resources.
  • Recycling bins are placed prominently in all computing labs, Print & Copy Services, and TS offices.
  •  
    This article talks about what the University of Puget Sound in Tacoma, WA is doing regarding green computing on campus and how their students can also get involved.
krikooo94

Cleaning Up Electronic Waste (E-Waste) | US EPA - 0 views

  • EPA works bilaterally with governments and environmental officials around the world on e-waste management.  U.S. EPA and Taiwan Environmental Protection Administration (Taiwan EPA) coordinate the International E-Waste Management Network (IEMN), which has brought together environmental officials from Asia, Latin America, the Caribbean, Africa, and North America to exchange best practices on e-waste management since 2011. 
  • EPA also collaborates with the Solving the E-waste Problem Initiative (Step)Exit Exit EPA website  to jointly address the e-waste problem in developing countries. Step, formerly known as UNU-Step, was previously an initiative under the United Nations University (UNU)
  • “E-waste”, “electronic waste”, “e-scrap” and “end-of-life electronics” are terms often used to describe used electronics that are nearing the end of their useful life, and are discarded, donated or given to a recycler.
  • ...4 more annotations...
  • An undetermined amount of used electronics is shipped from the United States and other developed countries to developing countries that lack the capacity to reject imports or to handle these materials appropriately. Without proper standards and enforcement, improper practices may result in public health and environmental concerns, even in countries where processing facilities exist.
  • For example, there are problems with open-air burning and acid baths being used to recover valuable materials from electronic components, which expose workers to harmful substances. There are also problems with toxic materials leaching into the environment. These practices can expose workers to high levels of contaminants such as lead, mercury, cadmium and arsenic, which can lead to irreversible health effects, including cancers, miscarriages, neurological damage and diminished IQs.
  • To this end, EPA funded UNU-StEP to lead a study on US exports of used electronics in an attempt to better define the US contribution to the overall e-waste problem.  StEP collaborated with the Massachusetts Institute of Technology (MIT) and the National Center for Electronics Recycling (NCER)
  • In July 2011, the Task Force released the National Strategy for Electronics Stewardship report, which details the federal government’s plan to enhance the management of electronics by: 1) incentivizing greener design of electronics; 2) leading by example; 3) increasing domestic recycling; and 4) reducing harmful exports of e-waste and building capacity in developing countries.  
  •  
    This article is explaining electronic waste and its danger to developing countries when the materials are not properly disposed of. Many countries have joined forces to create the International E-Waste Management Network (IEMN).
georgemacintyre

How Digital Transformation Can Reshape Guest Experience In The New Pandemic Era - 0 views

  • For half a decade, the travel and hospitality industry has been trying to incorporate technology to enhance the way it interacts with its customers. Perhaps, the pandemic has been the major catalyst to accelerate digital transformation initiatives in the hospitality industry
  • But what exactly is digital transformation? Digital transformation is the implementation of the latest digital technology into a company’s business operations, processes and people to improve and optimize the customer experience.
  • The modern, tech-savvy traveler is more informed, empowered and wants to feel valued. Now, there is a demand for a frictionless, intuitive, hyper-personalized experience at every touchpoint in their travel journey. And digital transformation technologies such as AI, robotics, big data, IoT, cloud, mobile and AR/VR underpin a successful personalized guest experience.
  • ...5 more annotations...
  • The things that power this disruptive technology — smartphones, on-demand apps, social media — are powering the change in guest behaviors.
  • 1. Leverage customer data to increase subscriptions: 
  • 2. Implement an agile leadership mindset:
  • 3. Omnichannel experience:
  • Brands must observe and compare the existing guest experience with what they prefer. With insightful data in hand, decision-makers need to modernize products and offerings, deliver innovative solutions and implement agile models in their business culture and operations.
  •  
    The hospitality industry has needed to dive all in on technology for a while now. The pandemic kickstarted the industry to really go all in. Many of todays guests really want a very personalized experience. Hospitality companies are using technology to provide guests with a very unique experience personalized exactly for them. The use of new technology from some companies is just going to have to make other companies try and keep up with them. An arms race of technology is likely to happen in the industry.
kbroo026

Why restaurant data analytics are a necessary tool for success | Nation's Restaurant News - 0 views

  • Recent trends such as diverse sales channels
  • create a multi-layered restaurant operating environment, turning data analytics into a necessity rather than an option.
  • A central repository refers to
  • ...5 more annotations...
  • the harmonization of records that creates a platform for activities, records, and transactions to be easily accessed, shared, and analyzed.
  • Information from data analytics should be simple, relevant, and accommodative to operations. Easily understandable metrics, such as weight-based food waste
  • represents simplicity.
  • Management should foster culture on “let’s look at the data first” instead of solving issues based on anecdotes and hypothetical terms.
  • Similar to an organized kitchen with streamlined production, restaurant management should take the same approach with data analytics. Organized data enables organizations to get a finger on the pulse of their business.
  •  
    Restaurants have long focused on improving kitchen efficiencies, but they now need to also focus on data efficiencies. Analyzing sales and labor reports on a daily basis rather than weekly allows managers to make more timely decisions that impact revenue and profit. Data should also be presented in simple, meaningful terms which benefit managers and line staff. Owners and GMs need to foster a "data first" culture when seeking to improve efficiency, service, and value.
melnetra112

Why Hoteliers May Want to Step Up Their Game on Security Technology | - 0 views

  • Why Hoteliers May Want to Step Up Their Game on Security Technology
  • Within the hospitality industry, we are all quite aware that Covid continues to spook people all over the world, which will lead to depressed overall travel numbers for quite some time to come. Add to that the various automated systems that together mean hotels may never need to hire back a large portion of their former employees
  • Problems may come about in the form of snatched purses from restaurant tables, missing bags left at the bell desk or minor vandalism of cars left by the front entrance.
  • ...7 more annotations...
  • As we’ve all now promised heightened guest safety in the wake of this rampant virus, so too must we protect our visitors and their belongings during any subsequent increases in criminality. Anything stolen will not only leave guests heartbroken, but this will also reflect quite poorly on the property
  • Beyond retaining a strong security department, much of the contactless technology that hotels have set up in the past months can luckily pull double duty to help prevent theft or other transgressions.
  • Nevertheless, an absence of human eyeballs should be another reason to emphasize touchless technologies including mobile keycards, online payment platforms and elevator floor access systems.
  • Elevator floor access restrictions are often only deployed at night, but these should now be set up for all times of day while also considering elevator cameras
  • The technology underpinning self check-in and mobile key cards can also be used to grant or deny access to other areas on property
  • Even niche operations like poolside or oceanside lounge chairs can be put through an online booking portal to better inhibit unauthorized visitors
  • While cyber threats may still have a much bigger financial impact on hotel companies than any misconduct on a more personal level, it still doesn’t hurt to look at how all the new hardware and software your property has set up to combat Covid might also be redeployed for other safety purposes.
  •  
    To Sum the article, Hoteliers consider high-tech security technology since the outbreak of the coronavirus and the safety of residents in hotel. In order for hotel to prevent the virus from spreading they'll consider limiting who has access to the facility. Another, to prevent criminal activity to take place within hotels by granting access to person who notify resident who stays and to be buzz in, contactless on key card and more.
kbroo026

In trust we must trust, Travelport research. - Document - Gale OneFile: Hospitality and... - 0 views

  • "The travel industry needs to sharpen its focus on trust,"
  • four trust gaps
  • PRICE TRANSPARENCY
  • ...10 more annotations...
  • the two most important factors in building consumer trust in travel agencies and travel suppliers
  • are having 'no hidden costs'
  • DATA PRIVACY
  • "To put it into context, having no hidden costs is a full 16 per cent more influential on trust than an airline's long-term safety record.
  • COVID-19 HEALTH & SAFETY
  • What we learned from the study, however, is that travel suppliers and agencies will benefit from being clearer in their communication on certain measures, like social distancing."
  • and 'fully flexible or refundable products'
  • travellers said they are most comfortable with companies using data that they have actively shared with them through one-to-one conversations (46 per cent), past booking behaviour (46 per cent) and loyalty activity (44 per cent).
  • INFORMATION CREDIBILITY
  • the most trusted sources of travel-related information that travellers use when researching a trip are those perceived to have aligned interests: friends and family (67 per cent) and review websites (50 per cent).
  •  
    Travelport's recent survey found four trust gaps that exist between the travel industry and its consumers. One of those is data privacy, with only 40% of travelers currently trusting companies to responsibly use their data. While the majority of consumers are still not comfortable with companies using any shared data, they are most comfortable with them using data that was sourced from the company and not acquired from external companies or mining.
mmoutsatsos

Nail The Basics Of Cybersecurity With Multifactor Authentication (MFA) - 0 views

  • When it comes to the basics of cybersecurity, nothing is so elemental as the password.
  • the simple password has endured as the first and last guardian of consumer and business data. 
  • But with the rise of sophisticated hacking techniques, passwords alone can no longer protect against unauthorized access and security attacks.
  • ...22 more annotations...
  • Enter multifactor authentication (MFA). By adding extra layers of security to a user's login process and requiring they enter two or more pieces of evidence (e.g., factors) to prove they are who they say they are,
  • MFA is a great method for boosting protection against everyday threats like credential stuffing, phishing attacks and account takeovers.
  • 1. Passwords alone are no longer enough to protect against security attacks.
  • it's critical every company apply effective security measures to protect their data.
  • to protect business and customer data, it begins and ends with preventing unauthorized account access.
  • MFA is the most direct and effective way to do that.
  • A familiar example of MFA at work is the two factors needed to withdraw money from an ATM.
  • Your ATM card is the something that you have, and your PIN is the something you know.
  • companies can require all employees to verify their identities with two or more pieces of evidence to prove they are who they say they are.
  • 2. Companies around the world (from Fortune 500s to small businesses) are feeling the urgency to adopt MFA — but a knowledge gap persists.
  • It's imperative companies invest in training employees on how using MFA is essential to securing access to both work and personal accounts.
  • industries in our everyday lives — led by social media platforms and financial services — requiring consumers use MFA to secure their personal accounts, both businesses and employees are normalizing the everyday routine of MFA. 
  • make the connection between security at work and in their personal lives and understanding they're two sides of the same coin.
  • 3. MFA adoption can seem overwhelming, but it doesn't have to be.
  • By recognizing any technical, change management and financial challenges to user adoption, committing to open communication, and providing the resources and training your employees need, any business can conquer that fear of the unknown. 
  • When adopting MFA, prioritize identifying the strongest and most user-friendly authentication method possible for your organization.
  • that means using an authenticator generator app, a hardware security key or a combination.
  • the reality is a large percentage of U.S.-based employees are also consumers with a smartphone in their pocket.
  • on that phone, the employee is already using multiple apps that require MFA.
  • 4. Balance security with ease of use when identifying a preferred authentication method for your organization
  • With options like hardware keys, you often see employees run into issues losing, replacing or breaking them. But a (TOTP) mobile app can be continuously updated in ways that make the MFA process more seamless (e.g, an app that verifies automatically from trusted locations like an employee's home office).
  • authenticator apps on devices like iPhones have the added benefit of extra layers of security at the phone level like PINs and biometrics like Face ID.
  •  
    This article talks about companies transitioning to multifactor authentication as an added layer of protection of cybersecurity.
kbroo026

What hotels need to know about biometric privacy laws - Document - Gale OneFile: Hospit... - 0 views

  • In order to avoid liability, employers should become familiar with biometric privacy acts, consumer privacy acts and data breach notification requirements.
  • Currently, three states have enacted biometric privacy laws: Illinois, Texas and Washington.
  • Illinois Biometric Information Privacy Act.
  • ...6 more annotations...
  • BIPA restricts the ability of a privacy entity to "collect, capture, purchase, receive through trade, or otherwise obtain a person's or a customer's biometric identifier or biometric information."
  • The Illinois legislature stated that heightened protection for biometric information is justified by the fact that once this type of information has been compromised, it obviously can't be changed (without some serious cosmetic surgery, anyway).
  • Employers also need to be aware of local laws and regulations.
  • Portland
  • bans the use of facial recognition technology by private entities in places of public accommodation, which include hotels and restaurants.
  • With the patchwork of laws and enforcement procedures, the enactment of a uniform federal law would be beneficial.
  •  
    Several states have implemented some form of biometric privacy laws, with the gold standard coming from Illinois. Illinois' BIPA allows for private enforcement, stiff fines, and paying of attorney fees. BIPA prohibits collection, capture, purchasing or receiving a customer's biometric identifier/information. Safeguarding this data is perhaps more important than any other because it cannot be easily changed, if at all. Current lack of federal law and a patchwork of local regulations means that businesses and employees must be knowledgeable of rules and rights that affect them.
chadidscha

Cyberattacks are surging. CT's workforce isn't keeping up - 0 views

  • A growing wave of cyberattacks is threatening governments, businesses and everyday residents. Across the globe, there is a critical shortage of skilled professionals to guard against these criminals.
  • The state’s cybersecurity workforce increased by only 1 percent between 2015 and 2020, which was the seventh slowest rate in the nation, according to data from the Bureau of Labor Statistics. By comparison, the ranks of these key professionals more than doubled in a dozen states over that timeframe.
  • Globally, cybersecurity experts are in extraordinarily high demand. An analysis from Cyberseek, a public-private partnership that measures cybersecurity workforce shortages in the United States, notes the talent gap is severe in every state besides Maine.
  • ...1 more annotation...
  • Nationally, the number of unfilled cybersecurity jobs is estimated to be 464,000, including 3,800 in Connecticut, according to Cyberseek, which is backed by a subdivision of the U.S. Department of Commerce.
  •  
    Cyber-attacks has become an increasing problem within the US and the lack of unfulfilled jobs regarding cyber security poses just as big, if not bigger, of a problem. All states, besides Maine, are in dire need to fulfill jobs across the private business sector and government related positions. At this point, many companies, including the government, offer free training (acquiring proper certifications) in hopes of gaining more employees to help with the fight against cyber war.
barbaraw12

The Importance Of Proximity In Hospitality SEO - Wpromote - 0 views

  • Domain clustering can be a factor in why your hotel is not ranking in organic search results for “hotels near Times Square NY,” especially if there are multiple hotels in your area. Google wants to make sure users are receiving diverse and relevant search results for their queries. That means that sharing a domain name can sometimes work against you because Google is unlikely to serve a user several hotels that are on the same domain.
  • It’s important to put yourself in a customer or potential customer’s shoes and approach your keyword strategy from that point of view while also considering algorithms, domain crowding, competition, and user intent.
  • Closeness to area attractions and venues is important to SEO, and proximity of your address to a point of interest has become the top-ranking factor in Google. This makes it much harder for your hotel to rank for attractions and points of interest if they truly are not “near” your hotel.
  • ...4 more annotations...
  • In 2016, the Google Possum algorithm update caused Proximity of the Address to the Point of Interest to become more important.
  • In 2017, the Google Hawk algorithm update eliminated some of the local search filters that were put in place by the Google Possum update and focused on showing search results in the immediate area or in close proximity of the search query.
  • f your hotel lies outside that area, it will be seen as irrelevant to the search query and most likely will not rank for that phrase organically.
  • Hotels that are in rural or suburban areas, however, typically have fewer large attractions or points of interest nearby, so they may rank for attractions that are further away due to less competition in the area.
  •  
    Proximity marketing is and has become the new method of advertising on a device which virtually anyone has; the cell phone. However, due to its popularity it has turned into something more complex due to the amount of organizations using this feature and the somewhat tight geographic locations. A city like New York is a prime example to how many businesses fight for a glimpse of spotlight regarding proximity marketing. Although, Google plays a huge role in helping locate a business, it does not seem to be an equal opportunist for all hotels, for instance.
  •  
    proximity accurately represent your location in relation to major points of interest in your area becomes even more important for the guest experience. Imagine that same hotel really tries to drive home the point that is it near Times Square on its website, only to have visitors disappointed that the attraction is really much further than expected and that other hotels are much closer.
rosedelice

Why Is Hotel Security Important? - American Protection Group - 0 views

  • Hotels are part of the hospitality industry, where providing good customer service is essential. A hotel’s reputation is staked largely on the guest experience, and investing in proper security services plays a central role in ensuring guests feel safe and protected. It also protects owners from the damages and costs that may arise from criminal activity such as theft.
  • Security officers patrolling the hotel’s grounds can look out for suspicious activity. Hotels should have security officers regularly patrol the hallways, stairwells, lobbies, parking lots, restaurants and bars.
  • Security officers can handle unruly guests or visitors and prevent negative situations from spiraling out of control. Officers can also provide additional protection to VIP or controversial guests of the hotel that might attract public attention or protests.
  • ...4 more annotations...
  • Security officers can prevent hotels from incurring property damage, particularly if officers are patrolling the hotel’s grounds. They can also assist in incidents involving guests damaging their rooms.
  • In addition, the presence of security officers at a hotel can make guests and employees feel safer and more at ease. Many hotel guests are in an unfamiliar location, and this sense of security can increase their satisfaction with the hotel.
  • Security officers on the premises of a hotel can react appropriately and rapidly when emergencies occur. In the case of a fire, they can help evacuate guests and maintain order. In a shooting or other act of violence, they can stop the perpetrator and protect guests and staff from danger. They can also provide valuable assistance and information to law enforcement when they arrive on the scene.
  • Hotel guests may occasionally become unruly or intoxicated, particularly in hotels with bars. Security officers follow hotel policy for dealing with these guests by escorting them either off of the premises or to a taxi, or detaining them for the police as appropriate. They can also escort trespassers and loiterers off the premises. In addition, security officers can safely help staff and guests to their vehicles upon request if they feel unsafe.
  •  
    It is very important for hotels to provide excellent security. It makes the customers feel safe and enhance their confidence and safety.Security officers patrolling the hotel's grounds can look out for suspicious activity.Security officers can prevent hotels from incurring property damage, particularly if officers are patrolling the hotel's grounds. They can also assist in incidents involving guests damaging their rooms.
sydneywolfson

What is Contact Tracing? - 0 views

  • Contact tracing is a public health practice that health departments use to identify and notify people who have been exposed to someone with an infectious disease.
  • Public health workers reach out to these exposed people to tell them that they've been in close contact with an infected person and to give them information and support to help them keep themselves and their loved ones safe.
  • People who have tested positive for COVID-19 infection receive a phone call or a short survey by text or email from the health department, asking them who they may have exposed while they were contagious
  • ...2 more annotations...
  • Your identity and health information that you provide to a contact tracer is always kept confidential. It will not be shared with anyone who may have been exposed. 
  • Anyone who was within 6 feet (2 meters) of an infected person for a total of 15 minutes or more within 24 hours is considered to be a "close contact."
  •  
    This article talks contact tracing with Covid-19. Health care works will contact anyone that person has been in contact with via phone call or text to let them know about the exposure.
amoon008

Tackling Security Threats In The Hospitality Industry | MetaCompliance - 0 views

  • The hospitality industry faces vast security threats, making it a natural target for cybercriminals because of the value and volume of personally identifiable information that these organisations hold.
  • Marriott, Radisson Hotel Group, InterContinental, Four Seasons, and Hilton Hotels are just some of the major corporations that have hit the headlines in recent years as a result of a data security attack.
  • approximately 55 million online hotel bookings are affected by fraudulent websites and call centers posing as hotel websites, according to the American Hotel and Lodging Association.
  • ...7 more annotations...
  • The majority of all cyber-attacks can be traced back to a phishing email that tricks the victim into divulging their credentials or downloading malicious malware.
  • A study conducted by Intel found that 97% of security experts fail at identifying phishing emails from genuine emails.
  • many hotels becoming completely digitalised in a bid to gain competitive advantage and keep up with online travel agencies such as Expedia and Hotels.com
  • Worryingly, ransomware is evolving into a new type of threat where cybercriminals are not just encrypting data but are also stealing it and threatening to release it on the internet
  • In recent years, hackers have been deploying new tactics and Distributed Denial of Service (DDoS) attacks have been growing in popularity. This type of attack is an attempt to make an online service unavailable by overwhelming it with huge volumes of traffic from multiple sources to cause great damage. This can include loss of data, loss of revenue, reputational damage, and a loss of customers.
  • According to a survey, almost half (44%) of firms have experienced a significant, business-altering data breach caused by a vendor.
  • With the hotel industry increasingly prone to malicious cyber attacks, there are a number of ways organisations can combat cyber security threats
« First ‹ Previous 5401 - 5420 Next › Last »
Showing 20 items per page