facebook

How Facebook is Adapting to be More Competitive for Hotels

Sharing content on a hotel’s Facebook page without paying to promote doesn't typically generate much of a return—if any—for hoteliers. That's thanks to the...

Garden Court Hotel Offering Startups a Hand

With its central location in Silicon Valley and its close proximity to Stanford University, the Garden Court Hotel knows that the business community surrounding...

Perch App Helps Hotels Track Competitors

Social media offers hotel owners and managers a wealth of information at their fingertips, but being able to access it all can be a...
revenue management

Why Revenue and Marketing Managers Should Work Together

“You might feel a slight sting.” These are the last words we hear before the prick of the needle, but with that little sting comes...

Liberty Hotel Builds Brand With Local Events

Rachel Moniz first set foot in the Liberty Hotel in early 2008 as a guest, soon after the Beacon Hill property had opened. Carpenter and...
meetings

Seven Ways To Make Meetings and Events More Sustainable

Meetings and events are big business in the U.S. They are valued at about $1 trillion and invariably listed as one of the ten...
Advertisement
Four Seasons Hotels and Resort - Fortune Best Companies to Work For

Five Hotel Companies Among Fortune’s 100 Best Companies to Work For

Five hotel companies made the recently released 21st annual Fortune 100 Best Companies to Work For list, which is based on surveyed employee ratings...
New York City

Five Markets With the Most Hotel Construction

Analysts at Lodging Econometrics recently reported the top five markets with the largest hotel construction pipelines for the third quarter of 2018. The number...
Linens

What Are Your True Variable Costs Per Occupied Room?

Knowing the average, actual costs incurred per occupied guestroom enables a manager to make more prudent pricing and marketing decisions and to monitor expenses....
Hotel security

12 Ways To Increase Hotel Security

Even when hotels have strong security policies and procedures in place, they are still vulnerable to cyber attacks, break-ins, theft, fraud, and other crimes....
CLOSE
CLOSE