Skip to main content

Home/ Groups/ Hospitality Technology
teresastas

Railroads say they don't need cybersecurity mandates - The Washington Post - 0 views

  • The Biden administration plans to impose new cybersecurity mandates on railroad and rail transit systems.But a leading railroad association insists it's already voluntarily following the practices that are now going to be required by the federal government.
    • teresastas
       
      Biden administration is planning on imposing new cybersecurity mandates on railroad and rail transit systems. This includes passenger rail systems like Amtrak and large subway systems like those in New York. Homeland Security Secretary announced the new proposed regulations under TSA eelier this week. The new regulations came as a surprise to the rail industy who feel that they are already taking cyber security seriously and don't need the government's heavy hand involved. They have three day's to submit feedback.
  • Our freight rail system is essential not only to our economic well-being, but also to the ability of our military to move equipment from ‘fort to port’ when needed,” the secretary said at the virtual Billington Cybersecurity Summit, where he announced the intended new regulations.
    • teresastas
       
      We often forget about Rail when we think about Transportation but it is essential for our military and for our major cities like New York. As well as the transport of goods across country.
  • In fall 2020, ransomware hit the Southeastern Pennsylvania Transportation Authority, which operates Philadelphia’s transit network. And in April, a hacker group believed to be linked to the Chinese government breached the computers of the Metropolitan Transportation Authority (MTA), which operates New York City’s subway system — the country’s largest.
    • teresastas
       
      We often don't hear about the hacks that aren't successful but how awful would it have been if hackers would have breached into MTA and taken over NYC's subway system!
xrive007

Cyberattack hits world's largest meat supplier - 0 views

  • It might be days before production resumes after an “organized cybersecurity attack” affected IT systems in North America and Australia
  • The world's largest beef supplier has been hit with a ransomware attack, threatening some of the U.S. meat supply.
  • The hack came less than four weeks after a similar one by Russian criminals against Colonial Pipeline
  • ...16 more annotations...
  • JBS, one of the world's largest international meat processors, was hacked
  • forcing the company to take systems offline and stop work
  • 11 beef processing facilities in Australia and 26 chicken processing plants in the U.S
  • The company told the White House on Sunday that it was a ransomware attack,
  • JBS notified the administration that the ransom demand came from a criminal organization, likely based in Russia.
  • Ransomware, an extremely lucrative type of cybercrime, is malicious software that lets hackers encrypt a victim's files and demand a ransom to make them functional again.
  • he hackers will steal and threaten to publish those files if their demands aren't met.
  • Ransomware attacks have grown rapidly in recent years.
  • Criminal hackers,
  • often based countries like Russia where they are largely protected from U.S. law enforcement
  • have targeted practically every major industry to shake down victims for payment.
  • about 40 food and beverage companies around the world have had confirmed ransomware attacks since May 2020.
  • Colonial's hackers, an established ransomware gang called DarkSide, shut down its website amid international attention from that attack, but not before receiving a $4.4 million payment from Colonial.
  • regularly hit manufacturers, school systems and city governments.
  • ransomware attack had already affected the cattle market.
  • If this goes beyond a week, you start to really worry about these animals building up on farm sites where they just don't have the capacity to hold them
  •  
    An example of a cyber attack or ransomware, in a manufacturer. Shows some effects of a ransomware and what a consumer may experience.
svail001

Cyber Attacks Are Spiking - Is Your Hotel Prepared? | By Jeff Venza - Hospitality Net - 0 views

  • “Thinking of cybersecurity solely as an IT issue is like believing that an entire company’s workforce, from the CEO down, is just one big HR issue.”
  • recent reports reveal at least 16 billion records
  • have been exposed through data breaches since 2019
  • ...11 more annotations...
  • The COVID-19 pandemic was, in many ways, the perfect storm for an influx in cyber exploitation
  • With this in mind, cybersecurity should be viewed as a company-wide initiative, with considerations made across each level of any tech-driven organization.
  • we must also recognize that more sophisticated technology creates an environment for increasingly sophisticated cybercrime
  • studies show that nearly 80% of senior IT and IT security leaders believe their organizations lack sufficient protection against cyberattacks.
  • only 5% of companies’ folders are adequately protected
  • To this effect, global cybercrime damages are predicted to cost up to $10.5 trillion annually by 2025
  • And for hotels, a security breach resulting in compromised guest data can damage a property’s reputation beyond repair
  • Instead, companies today should be leveraging a formal cybersecurity program in conjunction with dedicated technology and resources to effectively protect the information housed within their digital infrastructure.
  • Much like cyber risks are ever-evolving, a hotels’ cybersecurity protocol must also evolve and adapt based on frequent reassessments of risks and vulnerabilities
  • cybersecurity cannot be treated as an afterthought, nor should it be viewed as an optional investment; rather, it’s the cost of doing business in any data and tech-driven landscape.
  • the average cost of a data breach is $3.86 million as of 2020
  •  
    This article stresses the importance of cyber security specifically within the hospitality industry. The author of the article describes how a strong cyber security management system should not be an afterthought for hotels and should be seen as a cost of doing business especially in a tech driven industry. The article lists some key components and areas to focus on for hotels to manage cyber risks and threats
isabelladlp

Confidentiality in the Hospitality Industry - 0 views

  • No specific laws govern confidentiality in the hospitality industry, but your contracts and policies should clearly dictate what degree of privacy customers can expect.
  • Hospitality businesses routinely swipe customer credit cards and may gain other sensitive financial data, such as a customer's bank account information.
  • If you inadvertently leak this data, you could be legally liable for your negligence, resulting in costly lawsuits.
  • ...18 more annotations...
  • If your connection isn't password protected, anyone can access the system.
  • And even with a password, computer-savvy network users can gain access to another user's data.
  • Hospitality workers don't have any special legal authority, so they can't physically restrain a customer. Instead, they should call the police if they suspect criminal activity.
  • Your company's confidentiality policy can educate customers about the amount of privacy they can expect.
  • If you promise a customer a specific amount of confidentiality and then break that agreement, you've broken your contract and can be sued.
  • No one can contract to engage in illegal behavior, and if someone is in immediate danger, it's your duty to take steps to protect him.
  • It also establishes guidelines for employees to follow, and a clear policy can even protect you against lawsuits.
  • The U.S. Supreme Court has established that hotel customers have a "reasonable expectation of privacy" in hotel rooms.
  • You can't enter or search a guest's room without her explicit consent, but guests are not entitled to any special privacy
  • As a business owner, you value the privacy of company secrets and procedures, which is why you expect your employees to maintain some standard of confidentiality
  • confidentiality in employment is implicit, regardless of whether employees have signed an agreement.
  • If a member of your staff violates this explicit or implicit agreement, the penalty for breach of confidentiality can be severe and long-lasting.
  • an employee who signs this type of agreement agrees that a violation of confidentiality is also a violation of the employment contract. The penalty for breach of confidentiality isn’t restricted to employees who have signed confidentiality agreements,
  • if you own a computer security company and an employee’s laptop is stolen, and that employee didn’t encrypt sensitive data on that computer per company policy, it could constitute a breach of confidentiality.
  • Healthcare privacy is essential, not only to protect a patient’s right to decide who has access to sensitive information but also to protect doctors and other healthcare professionals from malpractice claims.
  • Theft is a violation of criminal law that in some instances can be punishable by a stiff fine or imprisonment.
  • As a business owner, you would report the theft to law enforcement, and the state or federal government would charge your employee with the crime.
  • Employers will not look favorably on any prospective employees who were terminated due to a confidentiality breach, or convicted of a crime related to that type of violation.
kmill139

Big Brother is watching: Chinese city with 2.6m cameras is world's most heavily surveil... - 0 views

  • The city’s surveillance system scans facial features of people on the streets from frames of video footage in real time, creating a virtual map of the face. It can then match this information against scanned faces of suspects in a police database. If there is a match that passes a preset threshold, typically 60% or higher, the system immediately notifies officers. Three days later the police captured the man, who eventually admitted that he was the suspect.
  • media access control address of users’ smartphone devices, a request sent when a device is searching for a wifi connection, to track their travel journeys precisely. It was only after the media raised awareness of the project that TfL widely informed its passengers.
  • Eight of the 10 most surveilled cities in the analysis are in China. London ranked sixth with 627,707 cameras covering 9 million residents and Atlanta, Georgia, came 10th with 7,800 cameras for 501,178 people.
  • ...11 more annotations...
  • Many crimes committed in a certain area of Chongqing were committed by non-residents, so facial recognition cameras were seen as a way to combat this.
  • But critics warn such widespread surveillance violates internationally guaranteed rights to privacy. To meet international privacy standards enshrined in the International Covenant on Civil and Political Rights, both collection and use of biometric data should be limited to people found to be involved in wrongdoing, and not broad populations who have no specific link to crime. Individuals should have the right to know what biometric data the government holds on them. China’s automated facial recognition systems violate those standards.
  • “These systems are being developed and implemented without meaningful privacy protections against state surveillance. The depth, breadth and intrusiveness of the Chinese government’s mass surveillance on its citizens may be unprecedented in modern history.”
  • Cities elsewhere may not be too far behind China’s mass surveillance.
  • With 2.58m cameras covering 15.35 million people – equal to one camera for every six residents – Chongqing has more surveillance cameras than any other city in the world for its population, beating even Beijing, Shanghai and tech hub Shenzhen.
    • kmill139
       
      In the near future you will be able to find camera anywhere you go
  • “With the rise of things like facial recognition, that is why we need new legislation that decides what is in the public’s interest and the legal structure within which they can be used. We shouldn’t drift there by accident.”
  • And part of that is building trust with the community based on good community information, not on Big Brother technology.”
  • Since then, two more Californian cities, Oakland and Berkeley, have also passed bans on all government use of facial recognition technology. Somerville, Massachusetts, passed a similar law this summer.
  • Some people support facial recognition on the basis that technology has always driven change and is a force for good if used responsibly and proportionately.
  • Omanovic argues that live facial recognition fundamentally threatens free societies. “It might start with the monitoring of just a few thousand people but it definitely won’t end there,” says Omanovic. “Authorities need to permanently ban its roll out now before it’s too late.”
  • “Singapore has plans to install 100,000 facial-recognition cameras on lampposts, Chicago police have asked for 30,000 more, and Moscow intends to have 174,000 by the end of this year.”
  •  
    Super important and relevant article about how big brother is watching us
teallemejia

Guest Privacy - It's Your Business | Robert Braun | By Robert Braun - Hospitality Net - 0 views

  • This focus must be seen in the context of two key issues: first, that hotels collect large amounts of data from their guests, both directly and through third parties; and second, that the hospitality industry has a checkered track record in protecting personal information.
  • Trustwave's 2018 Global Security Report reported that nearly 12% of the incidences investigated by Trustwave originated at hotels
  • Almost every breach involving hotels that have been reported over the past several years generated not with core hotel functions - check-in and check-out, reservations, etc. – but from companies engaged by hotels to provide services to the hotel.
  • ...3 more annotations...
  • Hotels use a variety of different systems for operations, ranging from off-the-shelf, commercial programs to specialty programs. Each of these programs presents the potential for breach and, as noted above, a single weakness can create a weak system. Moreover, the transfer of information from one system to another is, in itself, a source of weakness.
  • Take Control. Cybersecurity cannot be relegated to a single party; owners, operators and brands all need to take an active role in reducing cyber risks.
  • The hospitality industry is facing both continuing challenges protecting the personal data of guests, as well as grappling with a new legal landscape. Companies need to recognize that while the trials are great, success will create trust in the industry's most important commodity - its guests. A comprehensive approach can give companies the chance not only to confront these issues, but create brand value in doing so.
  •  
    Hotels collect large amounts of data from guests staying at their hotel directly and through third parties. As hotels continue to invest into technology to improve their guests' experience technology can also lead to more breaches. When guests use their smartphone to customize their stay by ordering room service, planning activities or purchasing upgrades it increases the chances of a breach and allows the hotel to collect more data. Multiple systems that a hotel uses can also create potential risks. Hotels need to take control, prepare for the inevitable, respond to breaches and create a culture of security.
nashalsiddiqi

Why is it important to keep my IT systems up to date? - 0 views

  • software upgrades are essential for continued operation. On the technical side of things, these upgrades provide fixes for known issues, provide new enhanced features, and often resolve and fix major security flaws or other types of flaws inside of software that could put your company and your company’s data at risk.
  • very important to keep track of updates and test them whenever possible before deploying them to a production environment. On some complicated infrastructures, applying something as small as a small security fix could bring down multiple integrated Line of Business applications. In an event like this it could cause huge problems!
  • ignoring security updates could leave a huge security hole that could be exploited by a virus, or malicious piece of software and infect many of your systems.
  • ...7 more annotations...
  • is when it comes time to do larger upgrades, or migrate systems to new servers, the migration/implementation time could be multiplied 2-10 times just because you haven’t kept your systems up to date.
  • In situations where you do have a valid good warranty from a recommended vendor, you can often have hardware replaced under warranty by the next business day, minimizing downtime.
  • Equipment Age – They need to purchase new equipment, since replacement parts aren’t available anymore, and the equipment’s warranty has expired.
  • Consumer Grade Equipment – Some IT Solution providers, and/or IT staff feel they can build their own servers, or purchase off-the-shelf consumer grade equipment for business use.
  • Vendor Warranty – We are called in to resolve an issue on a new server environment, but it turns out the equipment just came off warranty after 3 months.
  • Security and critical updates need to be applied urgently when possible. Upgrades or updates that increase features, functionalities, and correct software flaws are also important, but not as important as security/critical updates.
  • Hardware should be upgraded when either the equipment is coming off warranty, or when you need to upgrade for performance/capacity reasons.
  •  
    the article emphasizes the importance of conducting constant updates and upgrades on software and hardware, as it will help to protect the company data and systems from any possible hacks or viruses or data loses.
sdavi111

7 Steps to Securing Your Point-of-Sale System | PCMag - 0 views

  • Consider how the Target store hack in 2014 was one of the biggest point-of-sale (POS) system data breaches in United States history that exposed more than 70 million customer records to hackers, and cost the retailer's CEO and CIO their jobs. It was later revealed that the attack could have been avoided if Target had just implemented the auto-eradication feature within its FireEye anti-malware system.
  • the reality is that most POS attacks can be avoided.
  • be sure your company has a virtual private
  • ...18 more annotations...
  • network (VPN) in place to safeguard data that's traveling back and forth on your company's
  • network.
  • Most of the aforementioned attacks have been the result of malware applications loaded into
  • the POS system's memory.
  • important point to note here is that a second app must be running (in addition to the POS app),
  • This is why iOS has traditionally facilitated fewer attacks. Because iOS is only able to fully run one app at a time, these types of attacks rarely occur on Apple-made devices.
  • otherwise the attack can't occur.
  • Companies such as Verifone offer software that's designed to guarantee your customer's data is
  • never exposed to hackers.
  • These tools encrypt credit card information the second it's received on the POS device and once again when it's sent to the software's server. This means that the data is never vulnerable, regardless of where hackers might be installing malware.
  • install endpoint protection software on your device.
  • Employees can steal devices with POS software installed on them, or accidentally leave the device at the office or in a store, or lose the device. If devices are lost or stolen, anyone who then accesses the device and the software (especially if you didn't follow rule #2 above) will be able to view and steal customer records.
  • Systems that connect
  • to external networks are more susceptible to attacks from hackers
  • Consider keeping things internal and secure, use a corporate network to handle critical tasks like payment processing.
  • you'll want to comply with the Payment Card
  • Industry Data Security Standard (PCI DSS) across all card readers, networks, routers, servers, online shopping carts, and even paper files. The PCI Security Standards Council suggests companies actively monitor and take inventory of IT assets and business processes in order to
  • detect any vulnerability.
  •  
    Even though this article is from 2019 it is still extremely relevant today. POS systems are found in most hospitality outlets and the chances for a security breach are high. I have often thought when I had my credit card to a waiter and they are gone for 10 minutes are they copying the number, is it being added to a database that can then be hacked? The importance of having the proper securities in place, the proper malware and security software is really important. Having had a catering company for 20 years I had to do PCI compliance tests every 6 months and for years I just handed it over to my IT to do the test. He would suggest things to make us safer and since it usually cost money I would shake it off. It wasnt until the credit card processing company i was using had a security breach that I realized how important these PCI rules were. It is something going forward I will always pay attention to!
dlevine4195

Has COVID-19 Made Hotels More Sustainable? | The Manual - 0 views

  • These changes have largely been in the form of eliminating that most universal embodiment of hotel amenities, single-use plastic bottles for things like shampoo and soap, and reducing water usage.
  • hotels are also being savvier with energy usage, like using LED light bulbs and taking steps to gain environmental certifications like the Leadership in Energy and Environmental Design (LEED) certification from the US Green Building Council.
  • But the pandemic boosted the necessity of being able to do things while having limited contact with other people, and many hotels implemented remote, contactless check-in, room entry, and even food or amenities access.
  • ...10 more annotations...
  • Among its benefits, touchless tech is more energy-efficient and can eliminate the need for paper or the increased usage of non-ecofriendly cleaners. 
  • due to the lack of guests, there was a decline in the use of chemicals from cleaners and a reduction in carbon emissions.
  • This included a “dramatic increase in the use of disposable utensils, packaging, etc.”, that some sustainability initiatives were canceled or put on hold, and that “stronger, more toxic” chemicals were being used for cleaning and sanitizing.
  • Some hotels, though, took the pandemic as an opportunity to switch to more eco-friendly cleaning options
  • 2018, Hilton announced a whole host of environmental and social responsibility goals as part of its Travel with Purpose 2030 Goals
  • setting carbon reduction goals in line with the Paris Climate Accord, reducing water use by half, sending no leftover soap to landfills, and overall cutting its environmental impact in half by 2030.
  • However, that lack of guests allowed Hilton to start implementing other parts of their impact reduction plan, like having some of their hotels switch to using renewable energy. 
  • heir guests. Sustainability and eco-friendliness are more important for travelers and hotel guests than ever.
  • global travelers want to “travel more sustainably in the future,” and their 2019 Sustainable Travel Report highlighted that 70% of travelers are more likely to choose and book accommodations that are eco-friendly. 
  • Although current practices like using non-eco-friendly cleaning products and getting rid of unwanted waste may be cost-effective and save hotels money now, these and other findings show that travelers are willing to pay for hotels that go the extra mile for the planet, which will earn hotels loyalty.
  •  
    This article discusses how the pandemic has strongly impacted many hospitality companies to be more "green" for the future.. From contactless key options, to minimizing food waste, to using technology to reduce unwanted waste like paper, it is helping set new green goals for the our planet and future of the industry.
ldeur001

How Travel and Tourism Brands Can Leverage Social Media to Attract New Customers - 0 views

  • Social media is one of the most effective ways to attract new customers for any brand, but the travel and tourism industry can leverage it a bit differently.
  • When consumers look for information regarding traveling, hotels, resorts, restaurants, local activities and more, they turn to the internet, specifically social media.
  • The best part is the return because social-media marketing can drive the healthiest ROI out of all your online marketing campaigns when executed correctly.
  • ...4 more annotations...
  • Social media provides an opportunity to showcase a brand’s personality,
  • starting a blog for your business
  • complement your search-engine-optimization strategy when you apply keyword research to new blog topics. 
  • Run paid Facebook and Instagram ads
  •  
    Social media is an incredibly effective way to attract new business. It's cost effective and easy. Your can use apps like tiktok and instagram that are very picture/video driven to showcase your business, but also blog posts can be great to boost your SEO.
rhera004

A Brief History of Event Management: Event Planning Then and Now - LocalHop Software - 0 views

    • rhera004
       
      Roaring 20's should also be noted
  • Individuals can now create, locate, register, and document an event by using one small portable device.
  • Then vs. Now
  • ...8 more annotations...
  • Registration
  • Locating
  • Attendees
  • Advertising and Finding Events
  • The earliest recorded events and gatherings promoted peace and friendship between tribes and clans, and the first known event planner was Cleopatra
  • However, Cleopatra’s events would not have been possible without her servants and free labor. Communication was very limited, and messages were often hand delivered which usually took weeks, if not months, to be delivered.
  • Wealthy aristocratic women were in charge of event management, the most notable being Madame Pompadour, the mistress to King Louis XV of France and Marie Antoine.
  • People were making more money, which meant that they could spend more on hosting events.
  •  
    Quick article on the differences between event planning past and present.
rhera004

A History of Event Planning (And Why It Matters) | Social Tables - 0 views

    • rhera004
       
      Matchmaking purposes as well
  • Being an event organizer is one of the most stressful careers, but when things come together, there’s nothing like it.
  • 82 percent of small business owners say face-to-face events and in-person meetings are important.
  • ...7 more annotations...
  • 97 percent say that meetings deliver return on investment.
  • 2013, employing 2.3 million Americans and generating $42 billion in tax revenue.
  • But the first CVB wasn’t established until 1896, in Detroit, Mich.
  • International Association of Exhibitions and Events (IAEE), came into being in 1928. The Convention Industry Council (CIC) and Professional Convention Management Association (PCMA) were founded in the 1950s.
  • Now people not only have individual personal and professional email accounts, they multitask, prospect, network and curate content on a variety of social and digital platforms.
  • It’s that the French Revolution began with a meeting on a tennis court.
  • Meetings catalyze change.
  •  
    Quick History of Meetings/ Events info.
rhera004

10 Jaw-Dropping Event Marketing Stats That Point to the Future of the Industry - Endles... - 0 views

  • November 2, 2017
  • In fact, it’s the intersection of digital marketing and event marketing that makes the latter as effective as it is.
  • They are absolutely critical for outpacing and outlasting competitors.
  • ...11 more annotations...
  • To paraphrase the mantra of the Instagram era: “Events or it didn’t happen.”
  • Businesses invested heavily in the online world, but a response from consumers was inevitable.
  • advertisers have to fight tooth and claw with one another to be noticed.
  • Every minute 3.8 million Google searches are made, 1,440 blog posts are published and nearly 150,000 emails are sent.
  • The ability to track, attribute and analyze event ROI just wasn’t there before.
  • be it attendee engagement, contacts management or marketing automation
  • Whereas 63% of all of the marketers surveyed said that they plan on investing more in live events in the years to come, 80% of marketers from organizations that are overperforming in regards to their business goals plan on investing more in events.
  • “Live events are a great way for generating leads, if your annual contract for a client is large enough. If you’re selling 10 dollar stuff it’s not worth it, a way to primarily generate leads. Otherwise, it’s a great opportunity engage your community and to build products, to understand what your community cares about. Because as a business you should always be talking to your customers.”
  • In fact, 80% of marketers plan on investing more in event technology and they plan on doing so with thousands of more dollars than marketers from organizations that are underperforming or performing as expected.  
  • The combination of both the modern CRM and the modern marketing automation system has given rise to the modern event management platform, which enables marketers to manage, measure and grow their events like never before.
  • One of the biggest obstacles for organizations in the past was accurately attributing and measuring event ROI
  •  
    Statistics re: the use of tech in events and its importance/future
rhera004

How to Use Technology in Your Event's Favor - 0 views

  • Alex Nuttall | Jan 30, 2020
  • That complaint is increasingly significant because events and their accompanying technology have become inextricably linked in
  • the attendee experience.
  • ...12 more annotations...
  • In fact, 86 percent of event marketers feel that technology plays a key role in event success.
  • With the increasing use of technology in events, proper execution becomes essential to success.
  • Technology is often an indicator of innovation
  • Apps provide easy access to things like session details, speaker information, and a convenient map of the event or exhibit floor
  • Festivals, corporate events, conventions, and conferences are often hosted in large venues where it’s easy for attendees to feel lost.
  • If you fail to provide high-speed coverage, then attendees may become frustrated.
  • Depending on implementation, tech tools can either become problem solvers or problem causers.
  • increase engagement
  • By creating in-house spaces and using event technology tools to prompt networking, you can encourage attendee engagement.
  • 3. Impress with augmented reality
  • onstage and experiential
  • With AR, there’s no limit to creativity.
  •  
    Blog post talking about implementation of technology for events
teresastas

Executive Recycling Company And Executives Sentenced For Fraud And International Enviro... - 1 views

  • xecutive Recycling, Inc. (a corporation) and Brandon Richter, age38, of Highlands Ranch, Colorado, the owner and chief executive officer of Executive Recycling, were sentenced today by U.S. District Court Judge William J. Martinez for their roles in a fraudulent scheme related to the disposal and exportation of electronic waste to foreign countries,
    • cingram21
       
      This article discusses the penalties the CEO and COO of Executive Recycling received for violating the laws that were exposed on 60 minutes
    • teresastas
       
      Thanks for posting this...I was interested to see how this all turned out! Looks like it didn't turn out well for them!
  • significant portion of electronic waste collected by the defendants were Cathode Ray Tubes (CRTs). CRTs are the glass video display component of an electronic device, usually a computer or television monitor, and are known to contain lead. The defendants engaged in the practice of exporting electronic waste, including CRTs, from the United States to foreign countries, including the People’s Republic of China.
  • Executive Recycling appeared as the exporter of record in over 300 exports from the United States between 2005 and 2008. Approximately 160 of these exported cargo containers contained a total of more than 100,000 CRTs.
  • ...2 more annotations...
  • The defendants’ misrepresentation induced customers to enter into contracts or agreements with the defendants for electronic waste disposal. Each victim paid the defendants to recycle their electronic waste in accordance with the representations made by the defendants. Contrary to their representations, the defendants sold the electronic waste they received from customers to brokers for export overseas to the People’s Republic of China and other countries.
  • The defendants claimed to safely recycle e-waste in the U.S., but regularly exported obsolete and discarded electronic equipment with toxic materials to third-world countries,” said Jeff Martinez, Special Agent in Charge of EPA’s criminal enforcement office in Colorado. 
teresastas

Skullcandy Promises to Slash 1 Million Pounds of E-Waste - 0 views

  • EPA says recycling, reusing or donating electronics prevents pollution and carbon emissions because fewer materials for items such as plastics or batteries do not have to be produced again. The energy saved from recycling 1 million laptops, for example, is equivalent to powering 3,500 homes in the US for a year, according to the agency.
    • teresastas
       
      This comparison is really eye opening for me. I know. Sometimes we get lost in all the numbers but when you look at it this way it's crazy to think about.
  • Skullcandy also says it will eliminate the use of plastics entirely by 2023 and shift to using only FSC certified paper products.
    • teresastas
       
      I think it is very important that companies that contribute to the e waste problem also help to fix the problem like Skullcandy is working towards doing. The idea of eliminating the use of plastics entirely on top of their e-waste pledge is making the right moves.
  • company has a partnership with environmental intelligence platform EcoChain, which helps the company analyze the carbon footprint of its manufacturing. One impact of that program is the development of a smaller battery.
  • ...2 more annotations...
  • recycling by letting customers send any type or brand of headphones to the company to be properly recycled, giving them discounts for doing so.
  • Skullcandy Promises to Slash 1 Million Pounds of E-Waste
    • teresastas
       
      Headphone and Speaker company Skullcandy is making moves towards helping the fight against e-waste (short of closing it's doors of course). It recently pledged this month that it would eliminate one million pounds of e-waste by 2025 its new upcycling program. This program includes a few factors including a no plastic packing plan, an upcycling endeavor, and discounts to customers for responsible recycling of any headphone brands.
bruss031

The future of hospitality tech: keyless entries, welcome robots, and more - 0 views

  • Tourism is an industry that merges markets with the power of defining entire local
  • es.
  • With the amazing advances in technology we see these days, it shouldn’t come as a shock to anyone that tech affects these industries as well.
  • ...6 more annotations...
  • These tours would provide you with clearer walkthroughs of hotels before they book them. This way, you’ll have an opportunity to get a deeper preview of where you’ll be staying.
  • They’re there to greet you kindly and provide information—even drinks and snacks! It’s a nice touch that’s sure to enhance your guest experience.
  • So it’s nice to see that some hotels are looking to adopt smart home features to create advanced and comfortable environments for their guests.
  • Additionally, keyless entry is also trending.
  • In a time of COVID-19, it makes sense, too, that some might want to limit contact, so the ability to place an order electronically and receive food or items is a nice option to have.
  • Given the above examples, it really is quite exciting to see how the hospitality industry is evolving. It’s only natural for establishments to embrace technology as it becomes more commonplace, and many hotels can feel a little behind in doing so.
  •  
    This is a great article to visualize and read about all the technologies that are changing the way we as consumers are able to enjoy hospitality and tourism. The large portion of this article encompasses all of the technologies being implemented around the world in a variety of tourism settings. Everything from allowing consumers to take a virtual tour of a hotel room before booking a stay to welcome robots that greet patrons after a long travel journey to their final destination. Technologies like these are a nice breath of fresh air within the industry and are being used to help elevate the guest experience without removing the personal touch the hospitality industry has become known for.
cingram21

Report by TINT Emphasizes Importance of Authentic Marketing Content for Tourism and Hos... - 0 views

  • The report also considers the impact of COVID-19 on traveler expectation and social media usage, along with "The Way Forward", a framework for the creation and application of social content by travel brands.
    • cingram21
       
      This article is a summary of a detailed report on the status of social media marketing and offers up some really great statistics on the current status of social media and the travel industry
  • - Content created by real consumers and trusted influencers alleviates travel concerns and aids in conversion. 97% of people who were influenced by social media had also discussed a recent leisure trip with a trusted source
  • participation due to pent-up demand after more than a year of travel restrictions and extended lockdowns. Brands should use this opportunity to lay the groundwork for future success by building relationships, and thus brand affinity, with travelers.
  • ...4 more annotations...
  • he leading User-Generated Content platform trusted by over 5,000 global brands, stresses the importance of using authentic social media and marketing content for travel-related industries as they recover from the global impacts of COVID-19. Travel-centric brands face a "next normal" in a world where social media adoption and consumer expectations have increased exponentially.
  • More than 30% of social media users will make at least one purchase directly through their social platform of choice; meaning that brands with emphasis on social media or digital marketing should also invest in social commerce and shoppable social technologies.
  • brand trust is not only about marketing to the public, but also communicating with current and future employees. Employee Advocacy is taking a step outside of Human Resources and moving closer to Marketing and Communications.
  • Trendwatching indicates six social-driven trends that will affect tourism and hospitality organizations for the next three years: Social Commerce, physical and digital accessibility, hybrid experiences, sustainability, the new Business Travel, and Hyper-personalization.
cingram21

How Artificial Intelligence Is Changing the Future of Digital Marketing - Business 2 Co... - 0 views

  • Artificial Intelligence (AI) can think, read, and react almost like humans when trained with a large enough data set.
    • cingram21
       
      This provides some insight into artificual intelligence with a primary focus on developments in digital marketing. I especially found this helpful because it discusses analyzing large amounts of data that we as humans cannot make fair and unbiased decisions on. This is similar to the revenue management systems in use today. It also discusses the role fo chatbots in marketing. The article also ends with a few case studies.
  • Menial and redundant tasks like data entry, segregating leads from a marketing campaign, and responding to FAQs by customers can be easily handed over to chatbots and AI.
  • a machine learning model estimating the likelihood that a customer will churn can uncover factors driving churn rates and enable decision-makers to change business strategies and processes.
  • ...8 more annotations...
  • By analyzing data, AI can easily predict the purchasing behavior and decision-making of target customers, improve user experience, and provide customers with what they really need.
  • AI is unlocking the potential of hyper-personalization through personalized product recommendations, intelligent content recommendations, and customer support suggestions.
  • According to a recent survey, 71% of marketing respondents say that brands do not understand consumer fundamentals. Therefore, 66% of marketers said they want brands to invest more to build customer awareness and relationships.
  • You no longer need to invest your time into menial tasks like responding to repetitive queries or FAQs to market yourself and your business because AI assistants like AmazonEcho can do it for you.
  • From purchase to flight booking, to giving you necessary recommendations and even financial management.
  • Product recommendation utilizes technology to create personalized content recommendations for users, such as people who buy X also buy Y.
  • Machine learning and auto-learning analyze the data of millions of consumers and generate the best time and day of the week to contact users, recommended frequency, and the most intriguing content in the subject and title of the email, which will lead to more clicks of the mail. The A / B test is time-consuming and may have some errors. So, in this sense, AI is your best friend in personalizing each subscriber’s email content.
  • By 2021, 75% of enterprises will use AI for their businesses.
« First ‹ Previous 561 - 580 of 5534 Next › Last »
Showing 20 items per page