Welcome!

AJAX & REA Authors: Liz McMillan, Elizabeth White, David H Deans, Pat Romanski, Scott Hirsch

Blog Feed Post

Purple WiFi launches Presence Analytics and Location Based Services, allowing venues to track and engage consumers directly based on behaviour and location

Purple WiFi, the cloud-based Social WiFi software company, has added Presence Analytics and Location Based Services to its Guest WiFi product.

Presence Analytics bridges the gap between Google Analytics and the real world, offering real time data and reporting using WiFi technology, similar to how cookies track user browsing online.

This arms the venue with an unprecedented level of insight into consumer behaviour and opportunities to engage customers directly. Purple WiFi already serves demographic and engagement information from users to the venue through its Purple Portal, which allows the business to understand who is visiting and using the hotspot, how long they are online, as well as their age, gender and any other relevant information that they offer in their social networking profile.

Purple WiFi's Presence Analytics feature also incorporates Customer Tracking, which is facilitated by tracking the MAC address (unique number associated with any WiFi enabled device), and the received signal strength indicator (RSSI) which identifies roughly how far away the device is from the Access Point. This tracking capability is relevant to all devices regardless of whether the user authenticates onto the network.

From the continual storage of this intelligence key elements can be identified, such as how long the devices stay in a location and how often the device returns. Reports can then be generated on data such as; footfall, repeat vs new visitors, average number of visits, average visitor duration and recency of visits.

Location Based Services utilise Geo-fencing technology to allow this data to be taken one step further by drawing invisible lines around specific sales areas or locations, to identify behaviour patterns within that area. This is facilitated by setting up WiFi grids where activity is monitored, allowing instant confirmation of who is using the network and where.

Purple WiFi can then gauge how long consumers will remain in these areas, what purchases they are considering and assist venues to develop marketing engagement strategies that can then be implemented in real time, including email and messages sent to a consumer's phone, highlighting offers in the store.

The customer has the right to opt-in or opt-out of tracking. If a customer is not opted in, Purple WiFi's software can still detect an anonymous MAC address, confirm whether that MAC address is a new or repeat visitor, and see how long that device stays.

Using Purple WiFi's Location Based Services (only available with certain hardware manufacturers) the device can be tracked within the specific venue. The accuracy of the location-based tracking also depends on the number of access points in the space.

If a customer is opted in, the device MAC address can be linked to personal data, such as their age, gender, name, email address, location, language, Likes, etc. meaning relevant vouchers can be pushed to the visitor.

The issue of privacy has been raised in relation to customer tracking and it must be addressed to allow both retailers and their customers to feel comfortable and have clear guidelines on analytics use. After all, if the retailers better understand the needs of their customers, the outcome will be better store layouts, improved traffic flow, evacuation points, safety and removing the frustrations that customers often feel when receiving non-specific and irrelevant marketing messages.

Gavin Wheeldon, CEO, Purple WiFi comments: "Purple WiFi's social login feature provides a wealth of understanding, but when added to Presence Analytics and Location Based Services, things start to get really interesting.

"We support an individual's right to privacy and right to control the collection of information. They need to feel confident that information collection is in their best interest and once they understand the advantages of opting-in, in terms of better targeting and relevant offers, it is our belief that they won't be opting out."

Notes to editors
Purple WiFi is cloud-based which means that it can work with practically any hardware and it currently supports location analytics on Cisco, Cisco Meraki, AirTight and very soon Ruckus, Xirrus, Enterasys and Purple WiFi's own firmware.

Purple WiFi brings all the expected benefits of an enterprise WiFi system, with the additional benefits of enhanced social media interaction and real-time insight and analytics.

We install carrier class WiFi equipment, improving bandwidth availability wherever practical and cost effective. This ensures that the user experience for both end users and staff is second to none.

About Purple WiFi http://purplewifi.net
Purple WiFi provides a fast, secure, social WiFi solution to businesses wishing to offer free WiFi to visitors. The business is provided with valuable analytical data to enable more effective marketing.

Purple WiFi is cloud-based and works with any hardware, with native integrations with Cisco Meraki, AirTight Networks and Ruckus in place.

The company is a member of the Internet Watch Foundation (IWF), highlighting Purple WiFi's commitment to content filtering and minimising access to abusive online content.

Press contacts:
Lloyd Gofton [email protected] Mobile: +44 (0)7919 353484
Jeremy Lloyd [email protected] Mobile: +44 (0)7808 608416

Source: RealWire

Read the original blog entry...

More Stories By RealWire News Distribution

RealWire is a global news release distribution service specialising in the online media. The RealWire approach focuses on delivering relevant content to the receivers of our client's news releases. As we know that it is only through delivering relevance, that influence can ever be achieved.

@CloudExpo Stories
Leysin American School is an exclusive, private boarding school located in Leysin, Switzerland. Leysin selected an OpenStack-powered, private cloud as a service to manage multiple applications and provide development environments for students across the institution. Seeking to meet rigid data sovereignty and data integrity requirements while offering flexible, on-demand cloud resources to users, Leysin identified OpenStack as the clear choice to round out the school's cloud strategy. Additional...
The major cloud platforms defy a simple, side-by-side analysis. Each of the major IaaS public-cloud platforms offers their own unique strengths and functionality. Options for on-site private cloud are diverse as well, and must be designed and deployed while taking existing legacy architecture and infrastructure into account. Then the reality is that most enterprises are embarking on a hybrid cloud strategy and programs. In this Power Panel at 15th Cloud Expo (http://www.CloudComputingExpo.com...
We are all here because we are sold on the transformative promise of The Cloud. But what good is all of this ephemeral, on-demand infrastructure if your usage doesn't actually improve the agility and speed of your business? How must Operations adapt in order to avoid stifling your Cloud initiative? In his session at DevOps Summit, Damon Edwards, co-founder and managing partner of the DTO Solutions, will highlight the successful organizational, process, and tooling patterns of high-performing c...
The definition of IoT is not new, in fact it’s been around for over a decade. What has changed is the public's awareness that the technology we use on a daily basis has caught up on the vision of an always on, always connected world. If you look into the details of what comprises the IoT, you’ll see that it includes everything from cloud computing, Big Data analytics, “Things,” Web communication, applications, network, storage, etc. It is essentially including everything connected online from ha...
Software-driven innovation is becoming a primary approach to how businesses create and deliver new value to customers. A survey of 400 business and IT executives by the IBM Institute for Business Value showed businesses that are more effective at software delivery are also more profitable than their peers nearly 70 percent of the time (1). DevOps provides a way for businesses to remain competitive, applying lean and agile principles to software development to speed the delivery of software that ...
Docker offers a new, lightweight approach to application portability. Applications are shipped using a common container format and managed with a high-level API. Their processes run within isolated namespaces that abstract the operating environment independently of the distribution, versions, network setup, and other details of this environment. This "containerization" has often been nicknamed "the new virtualization." But containers are more than lightweight virtual machines. Beyond their small...
The move in recent years to cloud computing services and architectures has added significant pace to the application development and deployment environment. When enterprise IT can spin up large computing instances in just minutes, developers can also design and deploy in small time frames that were unimaginable a few years ago. The consequent move toward lean, agile, and fast development leads to the need for the development and operations sides to work very closely together. Thus, DevOps become...
Cloud Expo 2014 TV commercials will feature @ThingsExpo, which was launched in June, 2014 at New York City's Javits Center as the largest 'Internet of Things' event in the world.

ARMONK, N.Y., Nov. 20, 2014 /PRNewswire/ --  IBM (NYSE: IBM) today announced that it is bringing a greater level of control, security and flexibility to cloud-based application development and delivery with a single-tenant version of Bluemix, IBM's

An entirely new security model is needed for the Internet of Things, or is it? Can we save some old and tested controls for this new and different environment? In his session at @ThingsExpo, New York's at the Javits Center, Davi Ottenheimer, EMC Senior Director of Trust, reviewed hands-on lessons with IoT devices and reveal a new risk balance you might not expect. Davi Ottenheimer, EMC Senior Director of Trust, has more than nineteen years' experience managing global security operations and asse...
Explosive growth in connected devices. Enormous amounts of data for collection and analysis. Critical use of data for split-second decision making and actionable information. All three are factors in making the Internet of Things a reality. Yet, any one factor would have an IT organization pondering its infrastructure strategy. How should your organization enhance its IT framework to enable an Internet of Things implementation? In his session at Internet of @ThingsExpo, James Kirkland, Chief Ar...
Technology is enabling a new approach to collecting and using data. This approach, commonly referred to as the "Internet of Things" (IoT), enables businesses to use real-time data from all sorts of things including machines, devices and sensors to make better decisions, improve customer service, and lower the risk in the creation of new revenue opportunities. In his General Session at Internet of @ThingsExpo, Dave Wagstaff, Vice President and Chief Architect at BSQUARE Corporation, discuss the ...
The security devil is always in the details of the attack: the ones you've endured, the ones you prepare yourself to fend off, and the ones that, you fear, will catch you completely unaware and defenseless. The Internet of Things (IoT) is nothing if not an endless proliferation of details. It's the vision of a world in which continuous Internet connectivity and addressability is embedded into a growing range of human artifacts, into the natural world, and even into our smartphones, appliances, a...
"BSQUARE is in the business of selling software solutions for smart connected devices. It's obvious that IoT has moved from being a technology to being a fundamental part of business, and in the last 18 months people have said let's figure out how to do it and let's put some focus on it, " explained Dave Wagstaff, VP & Chief Architect, at BSQUARE Corporation, in this SYS-CON.tv interview at @ThingsExpo, held Nov 4-6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
The 4th International DevOps Summit, co-located with16th International Cloud Expo – being held June 9-11, 2015, at the Javits Center in New York City, NY – announces that its Call for Papers is now open. Born out of proven success in agile development, cloud computing, and process automation, DevOps is a macro trend you cannot afford to miss. From showcase success stories from early adopters and web-scale businesses, DevOps is expanding to organizations of all sizes, including the world's large...
Verizon Enterprise Solutions is simplifying the cloud-purchasing experience for its clients, with the launch of Verizon Cloud Marketplace, a key foundational component of the company's robust ecosystem of enterprise-class technologies. The online storefront will initially feature pre-built cloud-based services from AppDynamics, Hitachi Data Systems, Juniper Networks, PfSense and Tervela. Available globally to enterprises using Verizon Cloud, Verizon Cloud Marketplace provides a one-stop shop fo...
"Our premise is Docker is not enough. That's not a bad thing - we actually love Docker. At ActiveState all our products are based on open source technology and Docker is an up-and-coming piece of open source technology," explained Bart Copeland, President & CEO of ActiveState Software, in this SYS-CON.tv interview at DevOps Summit at Cloud Expo®, held Nov 4-6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
DevOps Summit 2015 New York, co-located with the 16th International Cloud Expo - to be held June 9-11, 2015, at the Javits Center in New York City, NY - announces that it is now accepting Keynote Proposals. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long development cycles that produce software that is obsolete...
Infor has announced a new feature Infor CloudSuite™ Aerospace & Defense (A&D) to aid compliance with International Traffic in Arms Regulations (ITAR). The ITAR function will serve as a complementary function for new or existing Infor CloudSuite A&D customers, to facilitate compliance for Infor customers that are creating a US defense article or performing a US defense service and wish to benefit from cloud-services. The ITAR regulation serves to manage handling and access requirements for dat...
What do a firewall and a fortress have in common? They are no longer strong enough to protect the valuables housed inside. Like the walls of an old fortress, the cracks in the firewall are allowing the bad guys to slip in - unannounced and unnoticed. By the time these thieves get in, the damage is already done and the network is already compromised. Intellectual property is easily slipped out the back door leaving no trace of forced entry. If we want to reign in on these cybercriminals, it's hig...