Want a Better GDP? Close the Gender-Wage Gap

On April 12, 2016, the United States celebrated Equal Pay Day, a day that symbolizes how far into the year women must work to earn what men earned in the previous year (www.pay-equity.org). Although closing the gender pay gap has made progress over the past few decades since the Equal Pay Act (EPA) was passed in 1963, the United States has still works to achieve gender-wage equality. Not only is equal pay a step forward for women, but studies show it would also be beneficial to the United States’ gross domestic product (GDP) and the economy as a whole.

In a recent report published by the McKinsey Global Institute (MGI), findings show that greater gender parity in the workplace—in terms of pay, hours worked, and access to full-times jobs—the greater the benefit the country’s overall economy (www.govexec.com). The findings in the report strongly recommend that both government and businesses take a more proactive stance in effectuating gender equality. Currently, economists are concerned that as America’s population ages and retires, there will not be enough young workers to take their place, which would have a harmful effect on the economy, as there would be fewer people to provide goods and services, to work and earn wages, as well as lower levels of productivity. Each of these factors would likely culminate in a slowing of GDP growth (www.govexec.com).

In spite of economists’ worries, the GDP will not suffer if employers aim to bridge the pay gap by making more room for women and paying them the same wages as men in the workforce. At present, women work fewer hours, mostly in lower-paying sectors, and have a lower labor force participation rate than men. However, if employers increase women’s labor force participation and assist them with entering and staying in more lucrative and highly-productive jobs, it will be easier to maintain current levels of economic activity and production even as the aging population retires, which will ultimately prevent economic deceleration in the United States.

Although the infographic below was published in 2012, the information is still relevant to the issue of pay disparity in 2016:

The McKinsey report provides number estimates on how the current gender pay gap could be closed. According to the report, if by the year 2025 women are paid equally as men, work the same number of hours as men, and are represented equally in every sector, an additional $4.3 trillion could be added to the United States GDP. This number is 20 percent greater than in a business-as-usual scenario, which does not account for closing the gender pay gap. Since this number is a high estimate given that women’s paid labor would have to precisely echo that of a man’s paid labor, McKinsey researchers also created a more plausible scenario in which each U.S. state matches the level of pay with other states currently making the greatest progress toward gender-wage equality. In this situation, an additional $2.1 trillion could be added to the GDP by 2025.

While Equal Pay Day was established by the National Committee on Pay Equity (NCPE) in 1996 as a public awareness event, women, men and the economy may rather want to make this a celebration of the past the moment gender-wage equality becomes a fact of existence in the United States.

Natural Disaster Crises? Technology May be the Answer

Whether it be a tornado, tsunami, earthquake, monsoon, hurricane, flood, or any other natural phenomena, no one person can be fully prepared for the aftermath of such disasters. Even with around-the-clock efforts from dedicated responders, disaster victims most always outnumber the help that is available to them, fostering a sense of unfair importance for which victims are priority versus those who can hold out just a little longer. Luckily, One Concern, Inc.—a startup that earned a coveted spot on GovTech100, the top 100 companies focused on government customers—aims to be one of the first to utilize artificial intelligence to save lives through analytical disaster assessment and calculated damage estimates.

The idea of One Concern was born from CEO and co-founder, Ahmad Wani, whose hometown of Kashmir, India is located in a region that is especially prone to earthquakes and floods. In 2005, Kashmir was hit by an earthquake that took the lives of 70,000 people—one of two disasters that inspired Wani to pursue his graduate level studies in earthquake engineering research at Stanford University. On another occasion in 2014, a large flood engulfed the state of Kashmir while Wani was visiting his parents—a disaster that left eighty percent of Kashmir underwater in a few short minutes. According to Wani, people had to resort to camping out on their rooftops for up to a week without food and clean water while waiting for uncertain rescue by ad hoc response teams.

The infographic below demonstrates the detrimental impact that various natural disasters have on communities in which they occur:

Although Wani is cognizant that his experiences occurred in a developing country, people in both developing and developed countries experience the same difficulty and chaos in the event of a natural disaster. Wani is trying to us his experiences to solve the problem of post-disaster reconnaissance and rescue through artificial intelligence with the intent of saving lives and strengthening communities. Indeed, by using their core product and web platform, “Seismic Concern,” the company is able to alert those located in jurisdictions affected by an earthquake by displaying a color-coded map of the likely structural damage as well as alerting emergency operation centers, which allows them to allocate their limited resources to rescue and recovery. Seismic Concern not only fosters response prioritization, but also recovery operations such as material staging and shelter management by compiling an Initial Damage Estimate (IDE), which is critical for emergency operation centers to request financial assistance from state and federal level institutions.

Furthermore, One Concern is using state-of-the-art machine learning algorithms, stochastic modeling, training modules, as well as geophysical and seismological research to enable emergency operation centers to train based on actual earthquake simulations before an actual earthquake strikes. According to One Concern, this can aid in personnel readiness and planning development, thus making a community more proactive and resilient.

For now, One Concern is relatively unknown to cities and countries that may be interested in adopting the revolutionary technology in which it specializes. Fortunately, Wani’s company is in the business of being ready and able to respond to anything at any time—an industry that spans the globe. By empowering rescuers and first responders with such valuable resources in times of crisis, they will be equipped with the resources necessary to save lives.

Eye-phone: A technology that powers the blind

In the past, visually impaired people had to shell out thousands of dollars for technology that magnified their computer screens, spoke navigation directions, identified their money and recognized the color of their clothes. Today, users only need smartphones and a handful of apps and accessories to help them get through their physical and online worlds. New software is helping people with limited or no sight navigate around town and across the Internet.

Luis Perez carefully frames his photo to get the best shot for Instagram. Gripping his white cane in one hand and his iPhone in the other, Perez squints at the screen and points the display toward the sunset. His iPhone speaks: “One face. Small face. Face near top left edge.”

Perez snaps several photos and then puts his iPhone back in his pocket, with plans to examine the images later. Taking sunset pictures with an iPhone is nothing remarkable — until you consider that Perez, a 44-year-old who lives in St. Petersburg, Florida, is legally blind. Not being able to clearly see the photos he’s taking doesn’t slow him down. By using technology built into the iPhone, along with apps from the App Store, Perez has developed quite a photography habit.

“My time with vision is limited,” says Perez, who began losing his sight about 15 years ago from retinitis pigmentosa, a genetic eye disease. He now sees only a small circle of what’s directly in front of him, and that will deteriorate over the next few years. “I have to enjoy it as much as I can, and photography is part of that.”

VoiceOver, the screen-reading technology powers this technology.

VoiceOver first turns off the iPhone’s single-tap function on the display. After that, users can move their fingers across the screen to hear what’s on the display. That could be anything from the names of the apps themselves to words in an email, a text message or a social media post. When users turn on the “Speak Hints” function, VoiceOver will say what an app is and then give instructions for using it. Users can even adjust the voice’s speaking rate and pitch.

Lay of the land

By itself, VoiceOver makes it easier for people with limited sight to use their iPhones. But the technology really comes into its own when mobile apps hook into its features. BlindSquare, which talks to users as they walk along crowded city streets and inside busy shopping malls, is a great example.

In addition to VoiceOver, the mobile app taps into the iPhone’s built-in GPS, FourSquare — which knows local landmarks and surrounding areas — and a crowdsourced map of the world. That combination allows BlindSquare to speak names of landmarks, such as cafes, shops and libraries, as the user walks by. Shaking the iPhone prompts BlindSquare to say the current address and nearest intersection. It will even, for example, tell the user that the entry to her destination has “four doors, two of which are automated, and there’s a second set of doors after the vestibule.”

“Twenty years ago, there’s no way we’d be able to walk on our own to find a restaurant,” says Kevin Satizabal, a blind musician and an online communities assistant for the Royal London Society for Blind People. “That’s the great thing about technology. It’s letting people blend in and do everyday tasks with a lot greater ease.”

 

This is the best time in history to be blind. – Luis Perez

Voice Dream reads out text from Web pages, PDFs, PowerPoint presentations and other files. The Be My Eyes app lets blind users video-chat with sighted volunteers for things like distinguishing between two cans of soup. KNFB Reader pulls text from photos taken with the iPhone.

But it’s not just purpose-built apps for the blind that tap into the iPhone’s assistive technology. Many people say some mainstream apps, such as Twitter and Periscope for social media and Uber and Lyft for ride-booking services, have well-designed accessibility, too.

“What I really get excited about are all these mainstream apps,” says Blanks. “That’s what really makes me feel part of society.” Blanks’ sentiment would likely have pleased Apple’s late co-founder, Steve Jobs, who famously said “it just works” when talking about his company’s products.

“We consider accessibility an integral part of what we build into our technology, not an add-on,” says Sarah Herrlinger, Apple’s senior manager for global accessibility policy and initiatives. “It’s a basic human right.”

Almost there

Apple’s device isn’t the only smartphone to have accessibility features. Google’s Android software also has text-to-speech and screen-reading features for phone makers to use. Microsoft, working with Guide Dogs UK, has developed a wearable system that creates a “3D soundscape” similar to BlindSquare.

But not all apps are created equal. Some lose their assistive benefits after being updated. Others add the features as an afterthought, instead of from the get-go.

Lisamaria Martinez, a blind woman who lives in Union City, California, likes a parenting app that explains her baby’s milestones. But the app presents the information in an image of text, not text on its own. That means VoiceOver doesn’t work. To get around it, Martinez takes a screenshot of the images, uses another app to pull the text out of the image and then translates the text into speech.

“It’s super annoying,” says Martinez, who works with Blanks at LightHouse. “The problem is people don’t think about accessibility from the design stage.” That’s what LightHouse and other advocacy groups want to change. “With the right support, we can do a lot of things that people didn’t think we could do,” says Perez, the avid photographer who also teaches people to use technology.

 


Shara Tibken. “Seeing Eye phone: Giving independence to the blind– c|net.”

c|net. N.p., Web. 25 Mar. 2016.

How Telework May be Bad for Business

Living in the information age and the world of technology provides employees with 24-hour access to work-related material and information, which is often convenient when working outside of the office, working after office hours, or working from home entirely. Though this convenience can help business staff to be available and responsive at any time, telework may be bad for business. Indeed, the National Institute of Standards and Technology (NIST) suggests that employees who access work content on their personal computers, smartphones, and tablet devices may make companies more vulnerable to hackers and breaches in network security because attackers are more able to steal confidential information from a network by first hacking devices used for telework as opposed to technologies accessed from inside the organization.

For several business organizations, their employees, contractors, business partners, vendors, and other users may find it more convenient and more preferable to work from home for a plethora of reasons. With this in mind, NIST is currently drafting new security related recommendations for both businesses and employees, which include suggestions to create separate and external networks for personal devices. Furthermore, NIST suggests organizations that already have agreements with employees and third parties requiring client devices to be secure generally fail to account for potential use of unsecured, malware-infected, and/or otherwise compromised devices may already be connected to confidential company-related material (NIST).

One draft of a March 2016 publication by NIST made a rather pragmatic suggestion to “plan their remote access security on the assumption that the networks between the telework client device and the organization cannot be trusted” (United States Department of Commerce). Businesses and organizations are urged to heed these suggestions because having a secure network is just as imperative as it is for employees to be productive as they engage in telework.

The infographic below highlights the growing trend and benefits of teleworking among various companies around the globe. While employee productivity may be higher and even preferred for individuals who engage in telework, NIST evidence suggests that companies have thus far been reluctant to insure critical network security as a necessary precaution for those who perform telework.

While the agency is collecting public comment on its drafts until April 15 2016, it currently recommends that employees practice network safety by creating unique security access codes and passwords for personal devices, setting automatic locks when devices are idle, and disabling Bluetooth and Near Field Communication features except when necessary in order to protect their organization’s network security and overall bottom-line (www.nextgov.com).

Ear authentication; a new security recipe?

We’ve had our fingers, voices and irises scanned, but there’s now a new biometric en vogue – ears.

NEC, the inventor of this new personal identification technology, says it has an accuracy rating of 99%.

It measures the unique effect your ears have on sound. By identifying how sound resonation is changed by the unique pattern of each person’s ears, security systems can now distinguish accurately between millions of individuals.

In case you’re wondering what the effect of modifications to your ear shape are, don’t worry. Those over sized ear rings and studs and the severe boxing ring pummelings you’ve imposed on yourself won’t affect the accuracy of the system. The new system works by measuring how sound is determined by the shape of human ear cavities to distinguish individuals.

The advantages of the new system are that it is more natural. It does not require particular actions, such as scanning a part of the body over an authentication device, which makes it easier to conduct continuous authentication, according to a statement from Shigeki Yamagata, general manager, Information and Media Processing Laboratories, NEC Corporation.

The system works everywhere, even when the user is moving and working.

For those not already sold on the idea, here’s the technical details of how it works. For a few hundred milliseconds, an earphone with a built-in microphone generates acoustic signals from the earphone speaker.

It then receives the signals transmitted within the ear through the microphone. During this process, the soundwaves transmitted are changed by the time they are received back. This varies from ear to ear. The data on the measurement of those changes created by each ear gives every person their unique digital signature.

The change measurement is made using a synchronous addition method, which adds and obtains the average of the waveforms of the multiple signals received. This is used to eliminate noise from the received signals. The system then calculates how the sound resonates within the ear – i.e. the acoustics of each ear.

All this happens within a second.

NEC tests have shown that there are two main sets of sound data that can be used for recognition. Firstly, there are the signal components that travel through the external ear canal and are reflected by the tympanic membrane. Secondly, there are signal components that pass through the tympanic membrane and are reflected within the inner parts of the ear.

NEC plans to commercialise the technology around 2018.

A wide range of applications is planned, including fraud and identity theft prevention. It will help to secure critical infrastructure and take the risk out of wireless communications and telephone calls, NEC says.

Editor’s Note: Ideas inspired from;


Nick Booth. “Forget fingerprints, ears are so next season in biometrics– NakedSecurity by Sophos.”

N.p., Web. 10 Mar. 2016.

And the Award Goes to…Women-Owned Businesses!

Women-owned businesses can now count another victory as the federal government has reached its goal of awarding five percent of the money spent on contractors to businesses owned by women. The government defines a women-owned businesses as those that are at least 51 percent controlled by women. In 1994, the federal government set a goal of awarding five percent of the money it spent on contractors to businesses owned by women (www.nytimes.com). Twenty-two years later, the federal government has for the first time finally met its goal.

According to the Small Business Administration (SBA), small businesses earned nearly 29 percent or $90.7 billion of the government’s contracting dollars during the 2015 fiscal year, which ended on September 30th, 2015. Out of that $90.7 billion earned by small businesses, women-owned businesses captured nearly $18 billion of those dollars. The government set this goal as companies owned by women tend to be younger and smaller than other businesses. Although women-owned businesses may be young and fewer in number, analysis by the department of commerce shows that women-owned business are indeed 21 percent less likely to be awarded government contracts than small businesses that are not women-owned.

The infographic below explains the growth and importance of women-owned businesses in America:

This goal was achieved mostly as a result of rules that were implemented by the government five years ago in 2011, which mandated that agencies set aside specific contracts allowing bids from only women-owned businesses as well as rules making them eligible for no-bid contracts—ultimately permitting women-owned businesses to not only gain experience, but to also provide them with the past performance necessary to win other competitive projects. Another reason why the government was able to meet its goal can be attributed to the Small Business Administration, which increased its outreach efforts over the past several years to teach women entrepreneurs about federal procurement opportunities—guiding them through the often complex process of preparing bids. Maria Contreras-Sweet, the 24th Administrator of the Small Business Administration, also made the recent achievement a top priority.

While five percent may seem like a small number, it is a significant achievement for women in the federal marketplace who have long been underrepresented. With this milestone, Washington has shown all Americans that if the government is determined enough, it can produce positive and impactful outcomes.

 

 

PaaS (Platform as a Service) is the next step towards Cloud Technology

Platform as a service (PaaS) is a category of cloud computing services that provides a platform allowing customers to develop, run, and manage applications without the complexity of building and maintaining the infrastructure typically associated with developing and launching it. PaaS can be delivered in two ways: as a public cloud service from a provider, where the consumer controls software deployment and configuration settings, and the provider provides the networks, servers, storage and other services to host the consumer’s application; or as software installed in private data centers or public infrastructure as a service and managed by internal IT departments.

Platform as a service promises significant savings of both time and money. The biggest names in cloud computing all offer PaaS solutions — as do countless providers that specialize in everything from mapping to content management to mobile app development. A few offerings already comply with the Federal Risk and Authorization Management Program, and a 2013 survey of federal IT professionals found that 95 percent believed their agency would benefit from migrating to PaaS.

Now the reason why PaaS is mysterious for many is a matter of structure and security. Many of the most popular early PaaS solutions, such as Heroku and Engine Yard, were available only in the public cloud, limiting their practical appeal for most federal agencies. Today, however, a wide array of PaaS providers offer private enterprise versions, while Pivotal’s Cloud Foundry and Red Hat’s OpenShift also come in downloadable, open-source versions that can be hosted locally or in a user’s own cloud.

A more significant challenge, however, might be pinning down what qualifies as PaaS. While software as a service (SaaS) is now a familiar concept and the paired pressures of FedRAMP and data center consolidation have put infrastructure as a service (IaaS) on most agencies’ radar, PaaS remains something of the muddle in the middle — more easily defined by what it isn’t than what it is. The National Institute of Standards and Technology has detailed the differences between PaaS and its sibling services, but it boils down to this: In addition to virtualized and easily scalable hardware, PaaS provides a ready-to-use suite of code libraries, change-management tools and other application-building resources that the provider installs and maintains.

Federal Communications Commission CIO David Bray said PaaS lets agencies “ideally begin to build up this library of reusable modules, much like a quilt,” so that functions such as user authentication or map-based data visualization can be built once and then used by many different systems. “Then in the future, if Congress…or the president asks us to do something, it’s not a matter of building a system from scratch.” There are many organizations adopting PaaS. “There are some early adopters scattered throughout government,” Bray said, particularly in the Defense Department and the intelligence community. However, PaaS remains aspirational for many agencies. In the 2013 survey (a Red Hat-sponsored MeriTalk study) that showed overwhelming belief in the benefits of PaaS, just 12 percent of respondents said they were already using it. And although 71 percent said they were at least considering a transition to PaaS, a recent search of FedBizOpps found just one solicitation in the past year that explicitly called for PaaS.

Other IT leaders said the slow embrace likely reflects uncertainty — not about PaaS’ potential benefits but about most agencies’ specific needs and the type of developer skills that will be available. Compared to IaaS, “PaaS has a greater degree of ease and efficiency, but it also comes with a significant loss of freedom,” one agency’s senior developer said. “The needs [can be] so diverse that paying for and committing to a platform as a service doesn’t make a lot of sense right now.”

A year to 18 months down the road, “once things settle down a bit,” the developer added, “that’s when we would commit to PaaS.” And even when an agency is prepared to zero in on a particular platform, there’s still the small matter of payment. With the operation and maintenance of legacy systems consuming 70 percent or more of agency IT budgets, there’s precious little money available to try something new — particularly when a PaaS investment cannot be directly tied to a mission system.

“That’s why we have to make the case to Congress for the initial investment” in PaaS, the FCC’s Bray said. “We need that little bit of breathing room so that we get out of the existing legacy model. Otherwise, the legacy model is just going to get more and more expensive.”

 

Editor’s Note: Ideas inspired from;


Tony K. Schneider. “Can PaaS carve out its place in the federal cloud?– FCW.”

FCW. N.p., Web. 28 Feb. 2016.

Who Will Protect the Government Against Cybercrime?

For the general public, identity theft, online security, and credit card fraud are an ever increasing concern in the technology age in which we live. But what about the federal government? Most people may think the government is impenetrable to cyber threats, hackers, and security breaches, but this is far from true. In fact, hackers are now probing the deepest layers of every federal government agency according to the Department of Homeland Security. The good news is that the cyber intruders are from the Department of Homeland Security. That’s right, DHS is conducting exercises to test vulnerabilities in federal computer systems that contain sensitive data, which are also prime targets for legitimately malicious hackers.

The strategy is part of the greater Cybersecurity National Action Plan (CNAP), a plan proposed by President Obama that takes near-term actions and puts in place a long-term strategy to increase cybersecurity awareness and protections, protect privacy, maintain public safety as well as economic and national security and empower Americans to have more control of their digital security (www.whitehouse.gov).

When we think about how much of our personal information is stored online (e-mail, bank information, online stores, bill payment information, etc.), it’s important to remember that going paperless gives experienced hackers more ease of access to our digitized information especially when operating on unprotected networks or repeatedly using weak or multiple identical passwords. The infographic below explains how hackers think and what little regard they can have when it comes to stealing digital information.

After the 2015 breach of information from the Office of Personnel Management’s (OPM) system wherein the information of 21.5 million United States national security professionals and their families’ information was exposed, the Department of Homeland Security devised a civilian agency cybersecurity strategy as a part of the Cybersecurity National Action Plan. The agency’s utilization of the abovementioned authorized hacking comes as federal government agencies are taking stock of information technology tools and databases that would ultimately send the government into disarray if these tools and databases become compromised (www.nextgov.com).

Although this is not President Obama’s first endeavor to protect the United States against cybercrime, the plan does symbolize Obama’s last effort to ensure progress in an ongoing effort to strengthen the nation’s online security. Since 2010, $73 billion has been spent to protect the nation against organized cybercrime, but the President’s most recent plan will request an additional $19 billion in funding to support cybersecurity activities, which include a commission on enhancing national cybersecurity, public service campaigns, and funds for replacing antiquated, unsecure government information technology.

Just ten years ago, the idea of spending billions on the nations’ digital safety would have been unthinkable, but in 2016 and beyond, the concept of creating multibillion-dollar information technology systems and security is all too real. According to nextgov.com, designing new and more secure systems is an imperative as the latest high-profile hack of a Justice Department computer system leaked the contact information of 9,000 Department of Homeland Security personnel as well as 20,000 Federal Bureau of Investigation employees. With that being said, there is still much work to be done as adversaries of the United States are quickly learning that it may be easier to attack the nations’ cyber networks in both the public and private sector than it is to attack tangible areas.

As the President stated on Tuesday, 9 February 2016, “More and more, keeping America safe is not just a matter of more tanks, more aircraft carriers; not just a matter of bolstering our security on the ground. “It also requires us to bolster our security online” (www.nextgov.com). Obama’s plan allows the Federal Government to acquire new information now and lays forward the conditions necessary for long-term progression in the government’s approach to protecting the cybersecurity of the Federal Government, the private sector, and in personal lives (Fact Sheet: Cybersecurity National Action Plan). Thus, President Obama’s cybersecurity plan is designed not only to protect the government and individual citizens, but to also protect the companies that store vast amounts of sensitive data belonging to the general American public.

 

 

Crowd GPS Technology busy in wooing the world?

Habit of forgetting things often? Propensity to misplace car-keys knowing how irritating it is to look for them whilst you are running late? Well, technology companies have solution for every little problem these days. When you’ve lost something, another set of eyes can spot clues that your own eyes inadvertently ignore.

In 2013, a crowdfunded project known as the Tile became a smash hit, racking up over $2,500,000 in funding from nearly 50,000 backers. The secret to its success? Simple: The Tile promised to help users locate any object attached to the coin-sized Bluetooth-connected tag priced at $20. Similar Project; Phone Halo’s TrackR was trying to establish this idea. However, both these projects TrackR and Tile used similar technology. This technology uses a small handy instrument (TrackR is a small, circular device and Tile is a small, square device). You attach them to things you’d miss if they went missing, and when those things inevitably do go missing, you can use your smartphone app to make the TrackR or Tile beep so as to find them. They also try to find your stuff when it’s farther away near you. Both of these products use the concept of “crowdsourcing” and Crowd GPS.

Crowd GPS is based on the idea that if you can’t find something, say, your keys, maybe someone else can — as long as they also happen to be using the TrackR or Tile app (iOS and Android), with Bluetooth turned on and crowd GPS enabled. Your lost keys will give off a unique identifier that can be detected by other people’s apps, sending you GPS data about where they are.

In addition to using the crowd to learn your lost item’s GPS coordinates, the TrackR app also helps you find things that are close by, and alerts you before you walk away from a spot without bringing your phone or TrackR-labeled device. This works by setting off an alarm on the device when it and your phone are separated by more than 100 feet. Likewise, if you press a tiny button on the TrackR, it can locate your iPhone or Android phone by setting off an alarm on the phone, even if the phone is in silent mode.

So what happens when your Tile/ TrackR can’t be located by going back to the last place your app saw it?

Tile calls it the “Community Find” feature. Turns out, every person who keeps the Tile app open on their iOS device becomes a node in a much larger Tile network. For example, were there 5 Tiles at the Starbucks this morning? Your Tile app took note of them. Your cubicle mate left their Tiled keys at their desk during lunch while you worked straight through? Your Tile app knows that too, even if you and your cube mate don’t. The same will be true for your Tiles.

If there’s a killer ingredient to the Tile, this is it: By leveraging the combined tracking power of thousands of Tile users (er, Tilers?), that paltry 150-foot Bluetooth radius is amplified many times over

While Tile’s ability to notify you of nearby lost items via alarms is helpful, it’s not unique. They need enough people to use its app to make its crowd tracking worthwhile, and they won’t likely use the app unless they have a device. The Community Find method relies on people having the Tile app installed — and running — on their iOS device. If the app is closed, it cannot track the presence of Tiles.

One key factor to remember with both of these networks is that their crowd GPS techniques rely on strong communities of users. That means that people who live in more densely populated areas, like big cities, are more likely to have luck when tapping the crowd for finding lost things. And, of course, the product has to have a lot of people using it in order for the crowd GPS to really work well.