Location? Location! (Wi-Fi Location Services)

Rie Vainstein • April 26, 2019

Bring Me My Goodies!

Ordering your groceries online, and having them delivered to your home, is becoming a commonplace event, but new innovations being rolled out around the world are still inspiring awe.

In the UK, in a small city about 50 miles north-west of London, one of these new innovations has been in existence for about a year. Small, remotely-controlled mini robotic vehicles are programmed to bring groceries to your door.

Here is an interesting little video to explain the concept:  https://bit.ly/2JNbGEP

How does the system work? In three short words: Wi-Fi Location Services. Maps are programmed into the machines, then the system infrastructure manages where the vehicles go from, and to, and controls their return to their point of origin. The system wirelessly monitors their progress to their goal destination and back, using a series of tracking “pings” – requests (“where are you?”) and responses (“I am here”) – so that the system constantly knows exactly where each vehicle is at any time. These “where are you?” exchanges occur in computer language, so are done extremely fast.

If the battery power runs low, or if the vehicle is interfered with in any way, the system alerts the human support team who immediately come to its aid. Humans turn up in a truck and provide new batteries or rescue the robot if necessary. Since they are equipped with anti-theft devices – cameras and alarms – these independent little robots are relatively safe.

There are pluses and minuses to this use of technology: on the positive side, it saves us all so much time to have our groceries delivered straight to our door. In this busy world, where time is one of the most precious commodities we possess, saving the trip to the store might give a person those valuable minutes in which they can get a report completed or prepare for a meeting. But, on the other hand, it also alienates people from human interaction. Some people might like being isolated but, as we grow more and more distant from one another, we may end up becoming very lonely.

Already Being Tracked?

The interesting thing about this technology is that it is already in use in many more places than you might think. Have you ever been walking around a mall when an advertisement for a nearby store pops up on your phone? Coincidence? Probably not. It is more likely to be wireless-enabled “location services” in action. The computer system at the mall builds a general profile on you, based on your route around the mall. It notices where you slow down, where you stop, and what stores you enter. Adding this data up builds a general picture of the kinds of things you might like, then the system sends messages to you about sales and deals that it thinks may be of interest. In this scenario, location services are being used as a marketing tool – a vendor’s subtle but smart way of letting you know they exist.

Lots of companies use this technology in a similar way to the grocery delivery – they track the location of their vehicles. Taxi companies are also capitalizing on the convenience of location services: you can now track the location of the taxi you just called, so that you can see where it is, and estimate how long it will take to get to your location.

Location services is a fascinating, and versatile, area of technology and one we expect to see a lot more of, in the future.

If you want to learn more about the technical aspects of Wireless Location Services, we have classes that include this – call us today!

NC-Expert Blog

By Rie Vainstein March 31, 2025
A Digital Shield for Your Online Adventures As tech professionals, we often spend a good chunk of our lives navigating the digital realm. Whether you’re troubleshooting a network, coding a new app, or just binge-watching the latest series, one thing is clear: your connection to the internet is a double-edged sword. It’s both incredibly convenient and, if not properly secured, a potential vulnerability. Enter the VPN (Virtual Private Network) our trusty, digital bodyguard. If you’re not already using one, or if you’re not entirely sure why you should, let’s walk through some of the reasons why a VPN is essential for anyone working in IT and, frankly, for anyone who uses the internet. What Is a VPN? In simple terms, a VPN creates a secure, encrypted tunnel between your device and the internet. It allows your data to travel securely, masking your IP address, and ensuring that no one (be it hackers or nosy advertisers) can track or intercept your online activity. Think of it as your personal “cloak of invisibility” in the digital world! 
By Phil Morgan March 13, 2025
Troubleshooting Wireless Networks with Ekahau: A Professional Engineer’s Guide Wireless networks have become the backbone of modern business infrastructure. From office environments to large-scale enterprises, ensuring a seamless wireless experience is essential for productivity. However, despite advancements in Wi-Fi technology, network performance issues often arise, ranging from signal interference and dead zones to capacity overloads and channel mismanagement. To tackle these issues efficiently, professional engineers rely on powerful tools. One such tool, Ekahau AI Pro, has become a gold standard in the wireless industry for troubleshooting and optimizing Wi-Fi networks. This blog delves into troubleshooting wireless networks using Ekahau tools, providing practical examples and technical insights to guide professional engineers in improving network performance.
By Rie Vainstein March 3, 2025
Futureproofing Our Security In our increasingly connected world, the security of digital information has never been more critical. From banking transactions to private communications, our data is constantly transmitted and stored across the internet. The current systems that protect this data rely on cryptography, a branch of mathematics that helps keep information secure by encoding it in ways that are difficult to decode without the proper key. However, with the rise of quantum computers, traditional cryptography is facing new and significant threats. This is where Post-Quantum Cryptography comes into play. What is Post-Quantum Cryptography? Post-Quantum Cryptography (PQC) [1] refers to cryptographic algorithms that are specifically designed to be secure against the power of quantum computers. Quantum computers, once they become practical, will be capable of solving complex mathematical problems much faster than classical computers. This will render many of the encryption methods we rely on today [such as RSA (Rivest, Shamir, and Adleman – initials of the inventors) and ECC (Elliptic Curve Cryptography)] vulnerable to attack. Quantum computers operate on quantum bits, or “qubits”, which can exist in multiple states simultaneously, unlike classical bits that are either a zer (0) or one (1). This allows quantum computers to perform certain calculations exponentially faster than classical computers. For example, in a matter of seconds, a quantum computer could potentially break an RSA key, which is considered secure by today’s standards. As quantum computing technology advances, the need for PQC becomes even more urgent.