1

The Harlow Report

The Harlow Report-GIS

2024 Edition

ISSN 0742-468X
Since 1978
On-line Since 2000


GIS News Snippets

For the week of
January 29, 2024


  Remember When?
A "Harlow Report" From January 30, 2023

The Threat of Location Spoofing and Fraud


by André Ferraz, CEO at Incognia

This video with Incognia discusses the impact of location spoofing and location-based fraud, and offers protection tips.

In this Help Net Security video, André Ferraz, CEO at Incognia , discusses the impact of location spoofing and location-based fraud

Any tool that enables users to alter the location information given by their device is known as location spoofing. Scammers are increasingly utilizing this technique as a standard tactic.

 Watch video here: Help Net Security

 Now back to 2024


3 Top-Rated Affordable GIS Software

by  Shephalii Kapoor

Geospatial professionals, such as city planners, environmental scientists, and GIS analysts, often find themselves amidst confusing maps and data overloads, trying to make sense of coordinates and hidden patterns.

To help you find the right tool, we have highlighted the three top-rated affordable GIS software based on their pricing, as found on vendor websites and verified software reviews. Based on our research, we've considered products priced less than $33 per month as affordable software and have arranged them in ascending order.

The tools listed in this article are either web mapping platforms or drone deployment and data management solutions with GIS capabilities. Nonetheless, they all offer data visualization and map creation as common features.

 Read full story at Software Advice


Esri Launches Maps.com, a Content Platform for Creators Demonstrating the Power of Maps

by  Esri Press Release

New Website Showcases the Maps That Are Helping People Better Understand the World through Cartography

Maps.com is focused on spotlighting distinctive, powerful maps and those who make them. As a creator-focused platform, Maps.com encourages individuals as well as organizations to submit their maps to be featured on the site. Submissions that are visually engaging, dramatic, and bold but understandable, with both style and substance, have already been highlighted on the site during soft launch.

 Read full story at Esri


Google Maps Introduces a New Feature Allowing Users to Navigate Within Tunnels

by  Staff

Google has introduced a new feature in its Maps app that allows users to navigate even in areas with poor satellite signals, such as tunnels or dead zones.

This functionality is achieved through the support for ‘Bluetooth beacons,’ a feature that has been widely rolled out on Google Maps for Android. However, it is currently not available in the iOS version of the application, as reported by 9to5Google.

…The introduction of Bluetooth beacons in Google Maps for Android is a significant step forward in providing a more reliable and accurate navigation experience, especially in areas where traditional GPS signals may struggle, such as tunnels and locations with poor satellite connectivity.

 Read full story at ITVoice


How Location Technology is Reshaping Industries from Logistics to Tourism

by  Sushant Wason

The rise of location technology marks a significant shift in how industries operate and interact with consumers.

…This technological advancement has altered the fundamental dynamics between businesses and consumers. Industries that once relied on traditional methods are now embracing the precision and agility offered by location technology. It has enabled a more responsive and customer-centric approach, transforming not just the operational aspects but also enhancing overall consumer engagement.

 Read full story at Newstrail.com


The Language of Maps: A Guide to Geospatial Data Formats and Coordinates

by  Ben Chamblee

From GeoJSON to UTM, these tools help map the world!

In this article, I’d like to walk you through some of the most popular data formats and coordinates that data scientists and engineers use for geographic data. I’ve you’ve ever taken a look at map projections of the world, you’ll know that there are many many ways to visualize spatial geography and while this guide does not go through ALL of the tools, it should provide a good overview of some of the more popular ones.

 Read full story at Medium


Industry News


In Government

6 Ways Generative AI Will Transform Government in 2024

by  Raj Iyer

State and local agencies can embrace the technology to speed citizen services.

Artificial intelligence is no longer an intangible concept; it’s actively reshaping every aspect of our society. From healthcare to education, from transportation to defense, AI is enabling new levels of efficiency, innovation and impact. 2023 saw the emergence and rapid advancement of generative AI, which has the potential to significantly alter the ways government operates and interacts with citizens.

As a new year unfolds, there are already clear indications that adoption of generative AI in government will accelerate, bringing benefits to citizen services, cybersecurity, procurement and more. Here’s what could come next.

 Read full story at StateTech

FTC Bans Data Broker from Selling Precise Consumer Location Data

by  Hunton Andrews Kurth,LLP Staff

On January 18, 2024, the Federal Trade Commission announced a proposed order against geolocation data broker InMarket Media, barring the company from selling or licensing precise location data. According to the FTC’s charges, InMarket failed to obtain informed consent from users of applications developed by the company and its third-party partners.

InMarket is a data aggregator company that developed a software tool for use in mobile applications developed by InMarket or third-party developers. The software tool allowed the company to track users’ geolocation and analyze points of interest visited by such users. InMarket then used data from this analysis to sort consumers into audience segments for targeted advertising.

 Read full story at Hunton Andrews Kurth LLP

How Small Contractors Can Prepare for New Cybersecurity Rules

by  Michelle Jenkins

Some contractors are slowly reassessing spend in other areas of the company and applying larger budgets to future IT and cyber compliance.

Defense Industrial Base (DIB) partners will eventually be subject to increased assessment and certification of their cybersecurity programs and systems. The Defense Department is codifying a more stringent phase of Cybersecurity Maturity Model Certification (CMMC) rules.

Small contractors and subcontractors are not excluded from what is being called CMMC 2.0. All contractors will need to provide specific assurance that they “are meeting the cybersecurity requirements that apply to acquisition programs and systems that process controlled unclassified information.”

 Read full story at Federal News Network




In Technology

Apple Releases iOS 17.3 … Introduces New Stolen Device Protection Tool

by  Lawrence Bonk

There’s also a refreshed iPadOS, with the same feature.

…This is a modest refresh, so don’t go looking for anything too crazy. There is, however, a new feature called Stolen Device Protection. This isn’t used to locate a stolen iPhone or iPad, but rather to keep the thieves from accessing your personal data.

… If someone manages to steal your iPhone or iPad, and you are updated to OS 17.3, you can lock them out of the system by forcing Face ID or Touch ID access.

 Read full story at engadget

Don’t Make This Mistake or You’ll Get Nasty Adware and Trackers

by  Lawrence Bonk

There’s also a refreshed iPadOS, with the same feature.

…This is a modest refresh, so don’t go looking for anything too crazy. There is, however, a new feature called Stolen Device Protection. This isn’t used to locate a stolen iPhone or iPad, but rather to keep the thieves from accessing your personal data.

… If someone manages to steal your iPhone or iPad, and you are updated to OS 17.3, you can lock them out of the system by forcing Face ID or Touch ID access.

 Read full story at engadget

Microsoft Network Breached Through Password-Spraying by Russia-State Hackers

by  Dan Gordin

Senior execs' emails accessed in network breach that wasn't caught for 2 months

Russia-state hackers exploited a weak password to compromise Microsoft’s corporate network and accessed emails and documents that belonged to senior executives and employees working in security and legal teams, Microsoft said late Friday.

The attack, which Microsoft attributed to a Kremlin-backed hacking group it tracks as Midnight Blizzard, is at least the second time in as many years that failures to follow basic security hygiene have resulted in a breach that has the potential to harm customers

 Read full story at arsTechnica




In Utilities

Compare 10 Smart Meter Solutions Based on 500+ Review

by  AIMultiple

Smart meters eliminate constraints of traditional electricity meters, improving the advanced metering infrastructure.

…Despite growing interest, the smart metering landscape remains intricate, featuring a multitude of tools and diverse contributing technologies. This article aims to disentangle this complexity, offering clarity and insights into the diverse facets of smart meter solutions.

Despite growing interest, the smart metering landscape remains intricate, featuring a multitude of tools and diverse contributing technologies. This article aims to disentangle this complexity, offering clarity and insights into the diverse facets of smart meter solutions.

 Read full story at EINPresswire


Cybersecurity Resource Guide for Public Power Utilities

by  American Public Power Assoc.

Implementing and sustaining cybersecurity best practices is the first step to protecting against cyberattacks, breaches, and other incidents.

The American Public Power Association acknowledges the importance of protecting the confidentiality, integrity, and availability of critical infrastructure systems and digital assets. This comprehensive, high-level cybersecurity guide, developed by APPA, offers reliable industry guidance and resources aligned with a high-level outline of the National Institute of Standards and Technology’s Cybersecurity Framework.

 Read full story at American Public Power Assoc.


FERC Approves Gas Pipeline Needed for TVA Plan to Shutter 2.5-GW Coal-Fired Power Plant

by  Ethan Howland

Replacing the Cumberland power plant with gas-fired generation will reduce carbon emissions by about 7 million metric tons a year, FERC said.

The Federal Energy Regulatory Commission on Thursday approved two natural gas pipeline projects, including one that will supply a planned power plant the Tennessee Valley Authority intends to use to help replace a 2,470-MW coal-fired generating station.

Earlier this month, the TVA, a federal power agency, said it might delay retiring its Cumberland power plant in Tennessee if FERC didn’t promptly approve a 32-mile pipeline to be built by Tennessee Gas Pipeline.

 Read full story at UtilityDive




Unsubscribe from The Harlow Report-GIS

As an Amazon Associate, I earn from qualifying purchases.