Google’s Eddystone is another heavyweight announcement to the services market indoor location. With the support of beacon location, Bluetooth Low Energy is in effect for micro-location applications. The Eddystone nuances are the key items worth considering for any organization.
The driver for beacons is based on the search for suitable mobile devices as indoor positioning technology, enabling navigation for real-time and for mobile apps location awareness. The Apple’s iBeacon was the foremost implementation as a BLE beacon. Sensing iBeacon is same as sensing a Wi-Fi access point. However, the differences in approach relates to implementation and packaging. BLE beacons are fully cordless, portable and inexpensive. A BLE beacon designed for location is cheaper and less complex.
Additionally, beacons also present real-time accuracy advantage as the location is calculated by the app that monitors beacons continuously transmit, instead of a Wi-Fi infrastructure in a handset to awaken from different power-save windows.
iBeacons have inherent advantages and they gain indoor positioning traction. Google recently entered the arena of Beacon with Eddystone and asserts to extend capabilities widely in Apple’s adopted iBeacon protocol.
Google was considering pushing its notifications to users even without the app as it can manage deployments of beacon. To attain this, Eddystone is customized to support new data packets and this includes Eddystone- UID, URL ad TLM.
Eddystone-UID is not different from iBeacon and so it also locats a beacon and perimits on a device an app to further a desired action. Nevertheless, Eddystone-UID is different from iBeacon that is 16 bytes long and is split into two parts.
Eddystone-URL sends to a mobile device, a URL compressed, based on Android 5.0 or more to further the events that relying on a devoted app. On iOS devices, users must enable notifications and install the Chrome browser, so that the app is required. Android users may check for beacons of Eddystone-URL, thereby making it a Pull notification. Push-based, unsolicited notifications can present risks of phishing, although Google mitigates the risk by brokering the transactions, retrieving the site titles and description Meta tags, thereby embedding them in the notification. This ensures users are aware the site they are about to visit before clicking through a notification link.
Eddystone-URL seems interesting; the caveats in the cross-platform and the recent concerns about privacy highlighted in Google’s project will restrict its appeal. The TLM sends data and health statistics such as battery voltage, uptime and beacons temperature. Eddystone tells more about BLE innovations to be coming, thus Google will have equal control of this space in future.