Geographic Information System
Where am I?
Where do I need to go?
How do I get there?
- Solar Compass
- Magnetic Compass
- Database Engine
- Apps and Processing
- Remote Sensing
- Temporal data
- Image(Vector and Raster) and Videos metadata
- Set Operations (Union intersection)
- Google Map Pro
- QGIS - FOSS
- Leaflet - FOSS
- OpenStreetMaps - Crowd sourced wikipedia for maps.
- D3 - Visualization library.
Application: Maps (2D and 3D)
Layers, visualization, navigation, etc.
Application: Navigation, routing and scheduling
Telephone, internet, self driving car roads, drone delivery and shipping networks making efficient use of all available network bandwidth.
Application: Accident Analysis and hot spot analysis
Simulation, prevention, mitigation of accidents as a whole.
Application: Urban Planning
Road networks, fiber networks, delivery networks, drainage systems, electricity transmission line, etc.
Irrigation, Crops monitoring, Pest Control, Mosture control, etc.
Application: Disaster management
Forecasting, planning, mitigation of flood, landslides, earthquakes, vulcanos, fires, pest control, etc
Application: Geology and Archaeology
Tracking environmental changes, landscape changes, preserving a digital copy of archaelogical ornament for study, etc
Application: Crime Control
Tracking of criminals, using geostatistics to predict crimes, planning for response, etc.
Application: Location Intelligence
Geofencing, location aware application, location aware projection, etc.
Application: Every IoT application
IoT incorporates GIS one way or other.
- Virtual Environments, AR and maps
- Indoor maps
- Building plans, on place drone delivery.
- Pokemon Go like AR environments, geofencing, projected imagery,
Threat: Hoarding of Private Data
Facebook, Google and other large companies are collecting data on every individual, using profiles as well as shadow profiles
Threat: Tracking of every move
Image metadata, web mining and cookies create a history of every move you made in the internet as well as in real world.
Threat: Misuse of data.
Military as well as terrorists can misuse your data. Even worse, politicians.
When guns get more powerful, you are as secure as your shield.
Proper handling of data
- Compartmentalize your data
- Share when it helps
- Find who is using which of your personal data, and how.
- Be cautious
- Add some randomness
- Use tools that you have control over. Find alternatives.