Cloud computing Edit
|“||[d]etermining the approximate physical location of an object, such as a cloud computing server. . . . Geolocation can be accomplished in many ways, with varying degrees of accuracy, but traditional geolocation methods are not secured and they are enforced through management and operational controls that cannot be automated and scaled, and therefore traditional geolocation methods cannot be trusted to meet cloud security needs.||”|
|“||the identification of the real-world geographic location of an Internet-connected computer, mobile device, website visitor or other. Geolocation technologies can track the individual carrying the device in real-time or near real-time.||”|
IP address geolocation data can include information such as country, region, city, postal/zip code, latitude, longitude and time zone. Geolocation may refer to the practice of assessing the location, or to the actual assessed location, or to locational data.
|“||Geo-location technology is another technique to limit Internet users by determining where they are or, conversely, where they are not. Geo-location software inspects and analyzes the small bits of time required for Internet communications to move through the network. These electronic travel times are converted into cyberspace distances. After these cyberspace distances have been determined for a user, they are compared with cyberspace distances for known locations. If the comparison is considered reasonable, the user's location can be authenticated. If the distance is considered unreasonable or for some reason is not calculable, the user will not be authenticated.||”|
See also Edit
|This page uses Creative Commons Licensed content from Wikipedia (view authors).|