1
The Harlow Report

The Harlow Report-GIS

2024 Edition

ISSN 0742-468X
Since 1978
On-line Since 2000


GIS News Snippets

For the week of
May 13, 2024


  Remember When?
A "Harlow Report" From May 15, 2023

Professional Drone Mapping Software: How to Determine What's Best for Your Project

by  João Antunes

Drones are versatile, efficient tools that provide a unique perspective on our world. Equipped with mapping software, they are a go-to tool for professionals in a wide range of industries, including Agriculture, Construction, Mining, and Surveying.

With so many options available, it can be challenging to determine which drone mapping software is best for your specific project. In this article, we'll explore the key factors to consider when choosing professional drone mapping software.

Accuracy and Precision

One of the most important considerations when selecting drone mapping software is accuracy and precision. In many industries, such as construction or surveying, even minor errors can significantly impact the outcome. Look for software with high accuracy and precision ratings, ideally with less than one-inch error margins. Additionally, ensure the software is compatible with GPS or other location-based technologies to provide precise measurements.

 Read full story at Commercial UAV News

 Now back to 2024


Some Insight Into Google Maps: How the World Is Remapped Through Google Maps?

by  Arun Dhital

 Google Maps utilises a vast array of data sources, including satellite imagery, aerial photography, and street-level mapping

Google Maps is a powerful web mapping service developed by Google that has revolutionised the way people navigate and explore the world. The service provides users with comprehensive features that make it an indispensable tool for personal and professional use.

At its core, Google Maps utilises a vast array of data sources, including satellite imagery, aerial photography, and street-level mapping, to create detailed and accurate maps of the world. The service's ability to integrate real-time traffic data, public transportation schedules, and information about local businesses and points of interest sets it apart from traditional paper maps.

 Read full story at PragNews


The Sky Is the Limit for the Possible Uses of Drone Technology

by  Andrew Rasmussen

 Students and faculty at South Dakota State University with support from Lake Area Technical College participated in the second annual “Drone Day” on the SDSU campus

Drone Day aimed to demonstrate to students the possibilities and uses of unmanned aircraft technology in their future careers.

SDSU offers a minor and certificate program in unmanned aircraft system through the Department of Geography and Geospatial Sciences. The certificate program prepares students to pursue FAA licensing.

…Career opportunities with these programs include agriculture, conservation, delivery/fulfillment, disaster mitigation and relief, logistics, filming and photography, geographic information systems mapping technician, law enforcement and real estate.

 Read full story at South Dakota State University


How Law Enforcement Can Track Persons of Interest Without Relying on Facial Recognition

by  Jon Gacek

The sheer volume of video evidence available for investigative teams has reached unprecedented levels. According to the Bureau of Justice Assistance, approximately 80% of crimes involve some form of video evidence, and this trend shows no signs of slowing down. 

According to the Bureau of Justice Assistance, approximately 80% of crimes involve some form of video evidence, and this trend shows no signs of slowing down.

Various sources contribute to this influx of video evidence, ranging from security cameras and traffic footage to body cameras, dashcams, and handheld devices. With 97% of Americans owning a mobile device, the availability of such footage has become ubiquitous in both public and private sectors. Moreover, the widespread deployment of body-worn cameras by local police departments and sheriff's offices further amplifies the prevalence of video evidence: over 47% of general-purpose law enforcement agencies and 80% of large police departments use body-worn cameras.

 Read full story at Unite A.I.


Kentucky, the First State to Capture Oblique Photography of Its Entire Geography From the Sky

by  Stan Ingold

Kentucky is now the first state in the nation to capture oblique photography of its entire geography from the sky. This is photography taken from a side angle, or parallel view. 

Kent Anness is the Geographic Information Officer for the Commonwealth of Kentucky. He said this will have multiple uses, especially when it comes to first responders.

“For examples, one of the first integrations that is occurring is in the 911 call centers. So, for example, when they get a call, there is a dot on the map, they can click on that, it launches this viewer and it lets them see that structure from four different sides.”

Aerial images make it easier for emergency management leaders to assess damage after natural disasters and find safer places to rebuild. They can also enhance:

 Read full story at WEKU


What's New for the ArcGIS Utility Network with the 2024 Network Management Release

by  Jon DeRose

The 2024 Network Management Release (ArcGIS Pro 3.3 and ArcGIS Enterprise 11.3) includes exciting new enhancements aimed at enabling you to maximize your investment with the ArcGIS Utility Network.  

This release also introduces the Utility Network Version 7 (UNv7) which brings valuable new features and enhancements including support for 64-bit Object IDs and big integer fields, the ability to perform directional traces using the digitized direction of the line, and more.

We understand that many who follow the network management release plan are likely upgrading directly from an earlier release. As a result, in this article, we will also explore some of the key features and improvements introduced since the previous Network Management release (ArcGIS Pro 3.1/ArcGIS Enterprise 11.1).

 Read full story at ArcGIS Blog


Industry News


In Government

Microsoft Deploys Air-Gapped AI for Classified Defense, Intelligence Customers

by  Adam Mazmanian

GPT-4 will be on offer for classified workloads via Azure Government Top Secret. 

Users of top secret IT systems may soon have access to generative artificial intelligence tools to draft documents, write code and analyze information.

Microsoft will announce later today the availability of GPT-4 in the Azure Government Top Secret cloud. The tech giant has been working for about 18 months on this effort, which includes the first-ever establishment of a new instance of ChatGPT specifically for classified U.S. government workloads.

 Read full story at NextGov/FCW


What Does Law Enforcement Really Think About Digital IDs?

by  Nikki Davidson

 While many states have rolled out digital ID programs, the number of law enforcement agencies who accept them remains limited. One agency shared with Government Technology the challenges and successes they’ve experienced conducting traffic stops with users of digital wallets.

When state patrol officers in Colorado pull over someone and ask for their license and registration, there’s a chance they’ll be shown a QR code.

…“I’d say from a technology side, I don’t know of any problems we’ve run into. It’s pretty slick,” said Colorado State Patrol Sgt. Patrick Rice in an interview with Government Technology. “Once you’re in the system and logged in and somebody presents it, it’s super easy. You just scan it, it shows up and you don’t have to take anything back to the car with you.”

However, according to Sgt. Rice, the amount of times interactions with this technology actually occur is limited. He shared that while there are now 1.34 million people registered for the myColorado app, there were only 82 QR code scans by state patrol in 2022, and 191 scans in 2023.

 Read full story at Government Technology


White House in Talks With Industry to Build Legal Framework for Software Liability

by  David DiMolfetta

As part of a broad cybersecurity strategy, the U.S. wants to create incentives for the tech industry to manufacture products and software that don’t contain major security flaws 

Nick Leiserson, the Office of the National Cyber Director’s assistant director for cyber policy and programs, told an audience at the RSA Conference in San Francisco that the White House began outreach efforts to software makers in March to pick their brains about how to best craft legal clauses that shift software liability away from customers and more onto manufacturers.

“This [engagement] is all very much over the next, you know, eight to 10 months,” he said on the sidelines of the conference. “Much of our focus is saying the goal isn’t liability for liability sake. It’s to incentivize different or incentivize improved software development practices.”

 Read full story at NextGov/FCW





In Technology

Jamf Brings Powerful New Compliance Tools to Apple IT

by  Jonny Evans

 The tools, unveiled at a special event this week, also include managed device support for Apple Watch, Vision Pro, and privilege elevation.

As Apple becomes more deeply embedded in increasingly regulated enterprises, IT needs new tools for security compliance to keep their fleets in shape. Jamf introduced a batch of solutions to achieve this at a special event this week. I spoke again with Michael Covington, vice president of portfolio strategy at Jamf, to learn more about what the company has made available.

“We see organizations of all sizes struggle to establish good security hygiene for their Apple devices,” Covington said. “Our research shows 39% of organizations operate at least one device with known vulnerabilities, so improving basic endpoint configuration is low hanging fruit for security teams, and it can significantly improve their overall risk posture.”

 Read full story at 


Passkeys Explained: How to Embrace a Passwordless Future Today

by  Peter Stelzel-Morawietz

Passkeys are increasingly replacing traditional passwords. This makes logging on to the internet much more convenient and secure. You can create your first passkey in just one minute.  

…We focus on the practical use of passkeys and only explain the technology behind them to the extent that it helps you understand them and have the necessary trust. Passkeys are a further development of the established Fido 2 security standard with asymmetric encryption.

When you set up a passkey to log in to an online service, your PC or mobile phone generates a key pair. The public key is sent to the website and stored there, the private key is secret and remains in the crypto chip of your device — i.e. in the Trusted Platform Module (TPM) on a computer.

Once a passkey has been set up, the next time you visit the website (or app), you simply tell it that you want to log in. The online service then sends your device a so-called challenge: a task that can only be solved with the help of your private key stored in your device and which you authorize using your fingerprint, face scan, or PIN.

 Read full story at PCWorld


These Dangerous Scammers Don’t Even Bother to Hide Their Crimes

by  Matt Burgess

“Yahoo Boy” cybercriminals are openly running dozens of scams across Facebook, WhatsApp, Telegram, TikTok, YouTube, and more.

Most scammers and cybercriminals operate in the digital shadows and don’t want you to know how they make money. But that’s not the case for the Yahoo Boys, a loose collective of young men in West Africa who are some of the web’s most prolific—and increasingly dangerous—scammers.

…Inside the groups, there’s a hive of fraudulent activity with the cybercriminals often showing their faces and sharing ways to scam people with other members. They openly distribute scripts detailing how to blackmail people and how to run sextortion scams—that have driven people to take their own lives—sell albums with hundreds of photographs, and advertise fake social media accounts. Among the scams, they’re also using AI to create fake “nude” images of people and real-time deepfake video calls.

 Read full story at Wired





In Utilities

Individual Data Center Campuses Now Need “Several Gigawatts” of Power, Dominion Says

by  Kevin Clark

The utility has not only seen a larger number of data center customer requests in recent years, but the size of each facility request (in megawatts) has grown larger. 

Dominion Energy is receiving requests to power larger data center campuses that require total capacity ranging from 300 megawatts to as many as “several gigawatts,” CEO Bob Blue said during the utility’s first-quarter earnings call this week.

… Dominion has connected 94 data centers totaling over four GW of capacity over the last approximately five years, Blue told investors. …Blue said the utility expects to connect an additional 15 data centers in 2024.

 Read full story at Power Engnineering


DOE Taps 3 Long-Duration Energy Storage Projects to Receive $15M

by  Robert Walton

New Lab, Battery Council International and CleanTech Strategies will each receive about $5 million for projects that address key development barriers to domestic energy storage. 

The U.S. Department of Energy on Monday announced three organizations will be awarded about $5 million each to help advance long-duration energy storage projects.

… The selected projects include a New Lab effort to enable high-capacity zinc utilization through electrode and electrolyte fundamentals; Battery Council International’s “Consortium for Lead Battery Leadership in LDES project;” and CleanTech Strategies’ work to accelerate the development of flow battery technologies.

 Read full story at UtilityDive


Leveraging Quantum Computing to Tackle Power Grid Challenges

by  Jonathan Spencer Jones

The US Oak Ridge National Laboratory is collaborating with quantum computing company IonQ to help solve power grid challenges and drive infrastructure improvements. 

The Oak Ridge National Laboratory (ORNL) is collaborating with quantum computing company IonQ to help solve power grid challenges and drive infrastructure improvements.

… The project is focused on addressing the challenges of increasing demand and the proliferation of distributed energy resources, with the need for innovative solutions that can address both optimization and security challenges.

 Read full story at PowerGrid International




Unsubscribe from The Harlow Report-GIS

As an Amazon Associate, I earn from qualifying purchases.