GPS tracking
GPS tracking is the surveillance of location through use of the Global Positioning System (GPS ) to track the location of an entity or object remotely. The technology can pinpoint longitude, latitude, ground speed, and course direction of the target.
The GPS is a "constellation" of 24 well-spaced satellites that orbit the Earth and make it possible for people with ground receivers to pinpoint their geographic location. The location accuracy is anywhere from 100 to 10 meters for most equipment. Accuracy can be pinpointed to within one meter with special military-approved equipment. GPS equipment is widely used in science and has now become sufficiently low-cost so that almost anyone can own a GPS and many do in a smartphone, tablet or GPS navigation device.
GPS tracking is invaluable for police, firefighters, military personnel and large courier businesses. Many of these use automatic vehicle locator (AVL) systems. AVL systems generally include a network of vehicles that are each equipped with a mobile radio receiver, a GPS receiver, a GPS modem and a GPS antenna. This network connects with a base radio consisting of a PC computer station as well as a GPS receiver and interface. GPS uses interactive maps rather than static map images on the Web. AVL systems can be used to increase the accountability of field personnel and boost the efficiency of a company's dispatching procedure through tracking and communication.
Other GPS tracking technologies include GPS guns that law enforcement can fire at a fleeing car, avoiding a dangerous pursuit. In some places, law enforcement representatives also use GPS dust, which consists of GPS trackers so small they might be blown or rubbed on a target’s clothing.
GPS devices in smartphones and other mobile devices are often used to track employee location. Privacy advocates warn that the technology can also make it possible for advertisers, government, hackers and cyberstalkers to track users through their mobile devices.
Join the conversation
3 comments
-ADS BY GOOGLE
File Extensions and File Formats
SearchCompliance
risk management
Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.
compliance as a service (CaaS)
Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...
data protection impact assessment (DPIA)
A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...
SearchSecurity
Port Scan
A port scan is a series of messages sent by someone attempting to break into a computer to learn which computer network services ...
DMZ (networking)
In computer networks, a DMZ (demilitarized zone), also sometimes known as a perimeter network or a screened subnetwork, is a ...
quantum supremacy
Quantum supremacy is the experimental demonstration of a quantum computer's dominance and advantage over classic computers by ...
SearchHealthIT
medical practice management (MPM) software
Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...
Regional Health Information Organization (RHIO)
A Regional Health Information Organization (RHIO) is a group of organizations within a specific area that share ...
remote patient monitoring (RPM)
Remote patient monitoring (RPM) is a subcategory of homecare telehealth that allows patients to use mobile medical devices or ...
SearchDisasterRecovery
business continuity plan (BCP)
A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...
disaster recovery team
A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...
cloud insurance
Cloud insurance is any type of financial or data protection obtained by a cloud service provider.
SearchStorage
iSCSI (Internet Small Computer System Interface)
ISCSI is a transport layer protocol that describes how Small Computer System Interface (SCSI) packets should be transported over ...
DRAM (dynamic random access memory)
Dynamic random access memory (DRAM) is a type of semiconductor memory that is typically used for the data or program code needed ...
RAID 10 (RAID 1+0)
RAID 10, also known as RAID 1+0, is a RAID configuration that combines disk mirroring and disk striping to protect data.