Geo-Fence

Geo-fencing, or geofencing, is a term that refers to software tools or applications that utilize global positioning systems (GPS) or radio frequency identification (RFID) to establish a virtual perimeter or barrier around a physical geographical area.

Geo-fence apps and tools monitor when mobile devices or other physical objects enter or exit an established geo-fenced area and provide administrators with alerts when there s a change in status for a device. These alerts can take the form of text messages, e-mail notifications, phone calls or similar means of communication.

Popular Uses for Geo-Fencing

Geo-fencing is frequently deployed by companies to monitor and restrict the use of mobile devices beyond a geo-fenced perimeter. Another popular geo-fencing use is by advertisers to serve customized advertising content to potential or existing customers based on their current location and proximity to nearby retail locations.

Geo-fenced ads often provide higher conversion rates for companies as a result of being tied to a user s location as well as taking into account in many cases their personal shopping history and preferences.

Vangie Beal
Vangie Beal
Vangie Beal is a freelance business and technology writer covering Internet technologies and online business since the late '90s.

Top Articles

List of Windows Operating System Versions & History [In Order]

The Windows operating system (Windows OS) refers to a family of operating systems developed by Microsoft Corporation. We look at the history of Windows...

How to Create a Website Shortcut on Your Desktop

Website Shortcut on Your Desktop reviewed by Web Webster   This Webopedia guide will show you how to create a website shortcut on your desktop using...

What are the Five Generations of Computers? (1st to 5th)

Reviewed by Web Webster Each generation of computer has brought significant advances in speed and power to computing tasks. Learn about each of the...

Hotmail [Outlook] Email Accounts

Launched in 1996, Hotmail was one of the first public webmail services that could be accessed from any web browser. At its peak in...

SHA-256

SHA-256 is an algorithm used for hash functions and is a vital component...

Document Management System

A document management system is an automated software solution businesses and organizations use...

Conti Ransomware

Conti ransomware first emerged in 2020. It uses a ransomware as a service...