Is 2010 the year of location-based services?
- 29 January, 2010 07:51
In my opinion, one of the most interesting technology trends of 2010 promises to be location based services. These can be described as services that utilise a user or object's physical location to deliver relevant information. One example is the tracking of trucks or ships moving freight so customers can be informed more accurately about arrival times. Another is the delivery of a discount voucher to a mobile phone user as they walk past a store which stocks a product of interest.
Location based services are not a new idea. In fact, 10 years ago there was a lot of hype around them, fuelled by the froth in the mobile telco market (remember the billions that were bid for UK 3G licenses?). I have to confess a very personal interest in them too, as they featured heavily in my PhD thesis, completed in 1998.
In 2010 they're finally going to become mainstream. Why?
It's all down to the rise of the smartphone. And specifically, the fact that most smartphones now have in-built GPS. Combined with always-on wireless connectivity, it means that applications running on these phones can report a user's current location on a regular basis.
As GPS-equipped smartphone use has taken off, so the applications that use the location information have also begun to. Mapping is perhaps the most obvious -- dynamically update a map, centred on the user's current location, as the user moves around. Very useful when you're trying to find the nearest outlet of your favourite coffee purveyor in an unfamiliar area.
Photographs taken on smartphones can have latitude and longitude information encoded with them. So, photographs can be then combined with mapping information -- perhaps someone has a good meal at a restaurant and wants to remember where the restaurant is. The addition of location information gives some extra context to the photograph making the event more memorable.
Twitter, the micro-blogging service, is now beginning to support location information. Updates to Twitter are tagged with the phone's location. Shortly, users will be able to browse tweets by location or identify when people they follow are near them. With all these examples, it's important to recognise that the use of location is more than the simple adding of a feature. Location information will significantly change the way in which applications that support it are used.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Why IT projects really fail
The enlightened CIO’s guide to running projects
Why IT projects really fail
Queensland government to provide 200 services online by 2015
Call Centers Suffer From Big Data Overload
Efficient Data Management in Three Simple Steps
Gartner reports that Business Intelligence, Mobile Technologies and Cloud Computing rank 1-2-3 as the 2013 Global CIO Technology Priorities. These three trends, labelled the “Perfect Storm” of new technologies, are transforming every link in the IT value chain, promising to deliver more efficient, responsive and dynamic IT operations. But this also means massive shifts in the way IT applications and services are created, deployed and maintained. This whitepaper aims to help you begin the journey to efficient modern data management
Delivering Private Clouds Today
Developing effective private cloud management and implementation plans is a top priority for many IT decision makers. Highly integrated management environments can monitor and optimize complex, heterogeneous private cloud applications, while infrastructure can provide IT staff with self-service provisioning capabilities and tools to automate many routine processes and workflows. This white paper discusses industry-wide views on private cloud management trends and priorities, while case studies highlight the benefits of using enhanced architecture and highlight the lessons learned.
Delivering Enterprise Information Securely on Android and Apple Devices
This whitepaper describes, from an IT perspective, the issues that arise when allowing Android and iOS-based tablets and smartphones into the enterprise network—and the steps IT must take to maintain control while encouraging productivity and mobility. We outline the security considerations, risk mitigation options and the architecture required to support tablets and smartphones as consumer-grade devices accessing sensitive enterprise data. Download to find out more!