November 30, 2016
The Louisiana Department of Health responded to flooding with the help of GIS software that located trouble spots with at-risk hospitals. Ease of use was welcome, according to a preparedness manager.
September 13, 2016
Aruba is drawing together six network product offerings to create a new mobile first platform underpinned by APIs.
July 07, 2016
EMM adoption is on the rise, as customers seek out these platforms' data protection capabilities, such as remote wipe and file-level security.
April 12, 2016
Cloudian adds stronger data durability and resiliency capabilities to its HyperStore object software. The management software now includes an object GPS.
GPS Get Started
Bring yourself up to speed with our introductory content
Accurate positioning boosts functionality and flexibility in internet of things measurement, sensing and control applications. Continue Reading
In this excerpt from chapter five of Google Earth Forensics, authors Michael Harrington and Michael Cross discuss the process of digital forensics. Continue Reading
Data is the cornerstone of any geospatial workflow. Learn why the cloud will become an essential part of data collection, processing, modeling and analysis. Continue Reading
Evaluate GPS Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Geofencing technology is increasingly being used as a security tactic, such as to control access to servers with DNS settings. Expert Michael Cobb explains how it works. Continue Reading
Geolocation mapping -- which enables us to use maps in revolutionary ways -- will become increasingly important to IoT. Continue Reading
BLE beacons and Wi-Fi technology promise enormous potential for accuracy in location and tracking of wireless devices. But is one option better than the other? Continue Reading
Learn to apply best practices and optimize your operations.
It's still early days for location-based marketing, but recent integrations and acquisitions by Microsoft indicate it has LBM on its roadmap. Continue Reading
In the never-ending quest to gain and retain customers while ensuring brand loyalty in a highly competitive global marketplace where the multichannel consumer rules, companies see significant value in mobile location-based services. Utilizing a collection of technologies, including mobile devices, beacon sensors, light beams and software apps, LBS can provide companies a competitive advantage by pinpointing physical locations of consumers in real time, capturing their attention and targeting them with personalized messages. Though this embryonic marketing concept can boast pockets of success in engaging consumers and enhancing the customer journey, LBS can also have a dark side when it comes to respecting and protecting personal information.
In the first feature of this handbook on mobile location-based services, editor Lauren Horwitz presents early, innovative and in some ways experimental applications of LBS by the likes of Nordstrom, Regal Entertainment Group and the Golden State Warriors. In the second feature, marketing professional Matt James sees LBS as a powerful way for companies to gather data about their customers, develop meaningful customer relationships and streamline marketing strategies, but there's always the potential for being overly intrusive and violating customer trust. Targeted personal messages can make consumers feel special but, if not done properly, can make them feel creepy. And in the third feature, James points out that the ethical issues associated with LBS is two-way street. While the burden is on companies to walk a fine line and show sensitivity toward customer privacy, consumers willing to surrender personal information in exchange for discounts and exclusive offers likewise need to be cautious.Continue Reading
A manufacturing engineer explains how cheap Internet-connected devices and sensors can help plants and supply chains run more responsively -- with the right big data analytics. Continue Reading
Problem Solve GPS Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Spyware was found on infected Android apps, which were meant to convey embassy information and news, in the Google Play Store. Expert Michael Cobb explains how the spyware works. Continue Reading
Attackers can use accelerometer tracking on mobile devices as an eavesdropping tool. Here are some ways to reduce the threat to your device. Continue Reading
Motion and gestures are being used for mobile malware detection on smartphones. Learn how this method works and whether it is a worthy addition to an enterprise security strategy. Continue Reading