Free Essay

Cmn 279 Module 5: Social Media

In:

Submitted By GC1994
Words 272
Pages 2
Thank you for taking the time to write a review for our hotel. I am sorry that this incident had unfortunately ruined what seemed to otherwise be a pleasant experience. Our hotel is currently in the process of a rejuvenation project and from time to time there had been some leakage in a select number of rooms. This leaking has since ceased in all rooms, with the completion of our pipeline replacement project concluding this past Monday. At the Crone Plaza Hotel we are nothing if not a promoter of respect and fairness for our guests, but even we make mistakes.

I feel terrible about the damages and hardship you encountered, our facilities department doesn't start work until 8:30am, so I apologize for your extended wait. As the manager, I am always working to provide my guests with the best customer service available. When you were asked go switch rooms my staff was just looking out for the best interest of yourself and other guests so they could correct the problem and maintain the high standards expected at the Crone Plaza Hotel.

I work towards providing all my guests with the same hospitality that I'd give my own family, so it personally hurts me that you didn't enjoy your stay. I've sent you an inbox message with my personal contact information. I'd like you to please contact me directly, so that I can learn all the details and the extent of the damage and we can work towards righting our wrong. I sincerely hope this experience doesn't discourage you from staying with us the next time you visit Toronto.

Sincerely,

Similar Documents

Free Essay

Hacking the Art of Exploitation

...2nd Edition Hacking the art of exploitation jon erickson PRAISE FOR THE FIRST EDITION OF HACKING: THE ART OF EXPLOITATION “Most complete tutorial on hacking techniques. Finally a book that does not just show how to use the exploits but how to develop them.” —PHRACK “From all the books I’ve read so far, I would consider this the seminal hackers handbook.” —SECURITY FORUMS “I recommend this book for the programming section alone.” —UNIX REVIEW “I highly recommend this book. It is written by someone who knows of what he speaks, with usable code, tools and examples.” —IEEE CIPHER “Erickson’s book, a compact and no-nonsense guide for novice hackers, is filled with real code and hacking techniques and explanations of how they work.” —COMPUTER POWER USER (CPU) MAGAZINE “This is an excellent book. Those who are ready to move on to [the next level] should pick this book up and read it thoroughly.” —ABOUT.COM INTERNET/NETWORK SECURITY ® San Francisco HACKING: THE ART OF EXPLOITATION, 2ND EDITION. Copyright © 2008 by Jon Erickson. All rights reserved. No part of this work may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage or retrieval system, without the prior written permission of the copyright owner and the publisher. Printed on recycled paper in the United States of America 11 10 09 08 07 123456789 ISBN-10: 1-59327-144-1 ISBN-13: 978-1-59327-144-2 Publisher:...

Words: 139438 - Pages: 558