Integrating location data into enterprise applications

By David Allen, CTO, Locaid Technologies, Network World |  Software, Location data

    o If the phone is in Ohio, but the card is being used in China, it might be a cause for concern. That information is added to the fraud determination algorithm to see if the transaction might be fraudulent.

3. If the transaction is deemed suspect, then the financial institution can ask for more information or deny the transaction.

* Location verification: Location verification can be used for a host of different applications, including proximity marketing, consumer apps, industry-specific uses (e.g., online gambling) and more. [also see: "What's shaking in location technology?"]

For proximity marketing and consumer apps, network location can identify where subscribers' devices are regardless of major carrier mobile network; whether the subscriber is indoors or outdoors; whether the subscribers' mobile device is GPS-enabled or not; and whether it is a smartphone running apps or a feature phone that is not. This information is critical to ensuring a positive customer experience with a brand and driving bottom-line sales.

* Internal/employee applications and services: One advantage of network location is its utility in non-mobile applications. For Web services and cloud services, network location can be easily integrated via an API into enterprise applications such as Salesforce.com, Oracle, SAP or other enterprise resource planning (ERP) solutions; customer relationship management (CRM) solutions; as well as other proprietary tools.

Top use cases include analytics and measurement, asset tracking and fleet management, call center/IVR, fraud prevention, identity protection, proximity marketing and usage-based insurance. In addition, location can play a huge role for companies that support employees bringing their own device to work by better enabling the delivery of services, both in and out of the office.

Integrating location with enterprise apps


Originally published on Network World |  Click here to read the original story.
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Ask a Question