A Comprehensive Guide To Corporate Travel Management

A Comprehensive Guide To Corporate Travel Management

A Comprehensive Guide To Corporate Travel Management

Yes, yes, we can certainly video conference, and I am one of the first persons to say that however, there are times we cannot do without actually traveling to the location and handling things in person. This article is for those times.

And yes, I realize it’s not really a technical paper as is the norm here at CloudTweaks. However, we have sometimes featured non-technical assets that we feel will benefit our business readership – on sales methodologies, human resources, etc. On that ground, this asset can truly be an asset to our readers. Also, we can’t escape the fact that travel today is highly technical; in such an environment, this guide can greatly improve an organization’s efficiency and effectiveness.

travel

(Image Source: Shutterstock)

This guide, titled Global Corporate Travel Forecast: A Guide for Pricing and Negotiations in 2013 , has been developed after considerable research. According to the publishers Egencia, an Expedia company, “This guide is designed to help CFOs, CEOs, and anyone in charge of corporate travel understands industry pricing and negotiations for 2013.  We examine the supply environment at a market-level for over 50 destinations in North America, Europe, and Asia- Pacific. In addition, we share recommendations and best practices on how to manage travel programs, anticipate travel industry changes, and optimize business results amidst the 2013 supply landscape.”

What I like about this guide is that it’s comprehensive; it does not merely gloss over generalizations like “book airline tickets early,” but examines the current and projected airfare and hotel landscapes to deliver recommendations that are backed by data. For example, it identifies that in wake of the Olympics, London has a lot of excess hotel inventory that lends itself to aggressive negotiations. No wonder its 10 pages long. However, the content is well-written and does not drag.

Whenever you read a white paper or guide, you have to be cognizant of its publishers and whether the asset actively promotes specific products which may not always be beneficial to readers. However, this guide steers clear of such issues with no product recommendations at all. In conclusion, this is a guide that I believe decision-makers will definitely find useful and I can strongly recommend it to our readers.

By Sourya Biswas

Sorry, comments are closed for this post.

5 Things To Consider About Your Next Enterprise Sharing Solution

5 Things To Consider About Your Next Enterprise Sharing Solution

Enterprise File Sharing Solution Businesses have varying file sharing needs. Large, multi-regional businesses need to synchronize folders across a large number of sites, whereas small businesses may only need to support a handful of users in a single site. Construction or advertising firms require sharing and collaboration with very large (several Gigabytes) files. Financial services…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

Ending The Great Enterprise Disconnect

Ending The Great Enterprise Disconnect

Five Requirements for Supporting a Connected Workforce It used to be that enterprises dictated how workers spent their day: stuck in a cubicle, tied to an enterprise-mandated computer, an enterprise-mandated desk phone with mysterious buttons, and perhaps an enterprise-mandated mobile phone if they traveled. All that is history. Today, a modern workforce is dictating how…

The Cancer Moonshot: Collaboration Is Key

The Cancer Moonshot: Collaboration Is Key

Cancer Moonshot In his final State of the Union address in January 2016, President Obama announced a new American “moonshot” effort: finding a cure for cancer. The term “moonshot” comes from one of America’s greatest achievements, the moon landing. If the scientific community can achieve that kind of feat, then surely it can rally around…

7 Common Cloud Security Missteps

7 Common Cloud Security Missteps

Cloud Security Missteps Cloud computing remains shrouded in mystery for the average American. The most common sentiment is, “It’s not secure.” Few realize how many cloud applications they access every day: Facebook, Gmail, Uber, Evernote, Venmo, and the list goes on and on… People flock to cloud services for convenient solutions to everyday tasks. They…

Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

Federal Government Cloud Adoption No one has ever accused the U.S. government of being technologically savvy. Aging software, systems and processes, internal politics, restricted budgets and a cultural resistance to change have set the federal sector years behind its private sector counterparts. Data and information security concerns have also been a major contributing factor inhibiting the…

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups Cloud platforms have become a necessary part of modern business with the benefits far outweighing the risks. However, the risks are real and account for billions of dollars in losses across the globe per year. If you’ve been hacked, you’re not alone. Here are some other companies in the past…

Cloud Services Providers – Learning To Keep The Lights On

Cloud Services Providers – Learning To Keep The Lights On

The True Meaning of Availability What is real availability? In our line of work, cloud service providers approach availability from the inside out. And in many cases, some never make it past their own front door given how challenging it is to keep the lights on at home let alone factors that are out of…