The capability of Apple’s forthcoming mobile operating system to determine the geographic positioning of a device and its user is a crucial element. This feature allows applications and system services to adapt their behavior based on the device’s whereabouts, providing a contextually relevant user experience. For example, a mapping application can provide directions, or a social media platform can allow users to share their location with friends.
This functionality is critical for various applications, ranging from navigation and local search to emergency services and security features. The historical development of this feature has been marked by increasing accuracy and privacy considerations. Modern implementations prioritize user control, allowing granular permissions for applications to access location data. Benefits include tailored content, improved device security through features like “Find My,” and more efficient resource management by adapting system behavior based on location.
The following sections will delve deeper into specific aspects of this feature’s integration within the new operating system, including privacy enhancements, developer APIs, and potential impacts on user experience and application development. We will also discuss how this feature interacts with other system services and hardware components.
1. Precision
Precision in geographical positioning is a cornerstone of the forthcoming operating system’s location-based services. The degree of accuracy with which a device can determine its location directly impacts the usability and effectiveness of numerous applications and system functionalities.
-
GPS and GNSS Integration
The operating system leverages Global Positioning System (GPS) and other Global Navigation Satellite Systems (GNSS) like GLONASS, Galileo, and BeiDou to achieve high-accuracy outdoor positioning. Enhanced algorithms for signal processing and multi-constellation support contribute to improved accuracy and reliability, even in challenging environments with obstructed satellite visibility. For instance, urban canyons with tall buildings often degrade GPS signals; improved GNSS integration mitigates this issue, enabling more precise navigation.
-
Wi-Fi Positioning and Triangulation
When satellite signals are unavailable or weak, the system utilizes Wi-Fi positioning. By analyzing the signal strength of nearby Wi-Fi access points and comparing them to a database of known locations, the device can estimate its position. This is particularly useful indoors, where GPS signals are typically blocked. Triangulation further refines this accuracy by using multiple Wi-Fi access points to pinpoint the device’s location with greater precision. An example is indoor navigation within a shopping mall, where GPS is ineffective but Wi-Fi positioning provides relatively accurate guidance.
-
Cellular Triangulation
Cellular triangulation provides another means of location estimation, especially in areas with limited GPS or Wi-Fi coverage. The device measures the signal strength from nearby cellular towers and uses this information to estimate its distance from each tower. By triangulating the device’s position based on its proximity to multiple towers, a rough location can be determined. While less precise than GPS or Wi-Fi positioning, cellular triangulation provides a fallback mechanism to maintain location awareness even in challenging environments, such as rural areas with sparse infrastructure.
-
Sensor Fusion and Calibration
The operating system integrates data from various sensors, including accelerometers, gyroscopes, and magnetometers, to further enhance positioning accuracy. Sensor fusion algorithms combine these data streams to compensate for inaccuracies in GPS, Wi-Fi, or cellular positioning, particularly during periods of signal loss or interference. Calibration routines continuously refine the sensor data to minimize drift and improve overall accuracy. Pedestrian dead reckoning, which uses accelerometer and gyroscope data to estimate movement, is one example. These technologies work together to deliver the best possible location accuracy.
The collective impact of these precision-enhancing technologies within the forthcoming operating system significantly elevates the user experience. Applications that rely on accurate location data, such as ride-sharing services, augmented reality games, and location-based reminders, benefit directly from these advancements, offering users a more seamless and reliable experience. Furthermore, precise location data is crucial for emergency services, enabling faster and more accurate responses in critical situations.
2. Privacy controls
The forthcoming operating system places significant emphasis on privacy controls related to geographical positioning. These controls aim to provide users with granular control over how applications and system services access and utilize location data. The implementation reflects a growing awareness of the potential risks associated with unchecked access to sensitive user information.
-
Precise vs. Approximate Location Permissions
Users can grant applications the ability to access either precise or approximate location data. Precise location provides granular positioning data accurate to within a few meters, useful for navigation and location-specific services. Approximate location, on the other hand, provides a less precise area, typically a neighborhood or city, sufficient for services that do not require pinpoint accuracy. This differentiation empowers users to limit the level of detail shared with applications, reducing the potential for misuse or tracking. A weather application, for instance, may function adequately with approximate location, eliminating the need for precise tracking of the user’s movements.
-
“Ask Next Time” and “While Using the App” Permissions
The operating system enhances user awareness by prompting for location access permissions each time an application requests it (“Ask Next Time”). Alternatively, applications can be granted permission to access location only while they are actively in use (“While Using the App”). These features limit background access and prevent applications from collecting location data when they are not actively providing a service. A ride-sharing application, for example, might request location access “While Using the App” to facilitate navigation during a ride but should not collect location data when the application is closed.
-
Background Location Access Limitations
Recognizing the potential for abuse, the operating system significantly restricts background location access. Applications that request background location access are subject to stricter scrutiny and require a compelling justification. Users are regularly notified when an application is accessing their location in the background, and they have the option to revoke permissions at any time. This feature helps prevent applications from silently tracking user movements without their explicit knowledge or consent. Continued background tracking can be flagged by the operating system, prompting a review of permissions.
-
Location Services Indicators and Transparency
The operating system provides clear visual indicators to signal when an application is actively accessing location data. A prominent icon in the status bar alerts users whenever location services are in use, promoting transparency and enabling users to identify potentially unauthorized access. Furthermore, the operating system provides detailed logs of location access requests, allowing users to review which applications have accessed their location and when. This enhanced transparency empowers users to make informed decisions about their privacy settings and to revoke permissions from applications that exhibit suspicious behavior.
These privacy controls collectively aim to foster a more secure and transparent environment for users of the forthcoming operating system. By providing granular control over location access, limiting background tracking, and enhancing user awareness, these features empower individuals to protect their privacy while still benefiting from the functionality of location-based services. The emphasis is on user consent and informed decision-making, ensuring that individuals are in control of their location data.
3. API access
Application Programming Interfaces (APIs) serve as the critical interface through which third-party applications interact with the location services provided by the forthcoming operating system. Controlled and secure access to these APIs is paramount to ensuring both functionality and user privacy. The design of these APIs dictates the capabilities available to developers while simultaneously enforcing limitations that protect user data.
-
Core Location Framework
The Core Location framework remains the primary means for applications to request and receive location data. This framework provides classes and protocols for managing location updates, monitoring geographic regions (geofencing), and determining device orientation. Developers must explicitly request authorization from the user before accessing location data through this framework. The system presents a standard authorization dialog, ensuring transparency and user control. The framework’s design encourages efficient battery usage by allowing developers to specify the desired accuracy and frequency of location updates.
-
Privacy Manifest Integration
The operating system mandates the use of a privacy manifest, a structured file that declares how an application collects, uses, and shares user data, including location information. This manifest is reviewed by the system during the application submission process to ensure compliance with privacy policies. The manifest requires developers to explicitly state the purpose for which location data is being collected, providing greater transparency for both the system and the user. Failure to accurately describe the use of location data can result in application rejection or revocation of access privileges.
-
Location Push Notifications
The API facilitates the use of location-based push notifications, enabling applications to trigger notifications when the user enters or exits a defined geographic region. This functionality requires explicit user authorization and is subject to strict limitations to prevent abuse. The API restricts the number of geofences an application can register and imposes limits on the frequency of notifications. These restrictions are designed to minimize battery drain and prevent applications from bombarding users with irrelevant or unwanted notifications. Location-triggered reminders or alerts are common examples of this API’s usage.
-
Nearby Interaction Framework
The Nearby Interaction framework allows devices to discover and interact with nearby devices or accessories using ultra-wideband (UWB) technology. This framework enables precise proximity detection and direction finding, opening up possibilities for location-aware interactions and augmented reality experiences. Access to this framework is restricted and requires specific entitlements to ensure that it is used responsibly and does not compromise user privacy. Applications using this framework must clearly indicate the purpose for which they are seeking nearby device information. This enables functionalities like digital car keys unlocking upon approach.
Collectively, these API access mechanisms, alongside their inherent restrictions and associated privacy protocols, are integral to maintaining a secure and user-centric location services environment within the forthcoming operating system. These interfaces represent a careful balance between providing developers with the tools they need to create innovative location-aware experiences and safeguarding user privacy through rigorous controls and transparency measures.
4. Background usage
The interplay between background usage and geographical positioning within the forthcoming operating system is a critical factor influencing both device performance and user experience. Constant activation of location services in the background consumes battery power and processes resources, potentially leading to reduced device lifespan and diminished overall system responsiveness. The effect is compounded when multiple applications simultaneously request background location access. An application configured to regularly update its location, even when not actively in use, exemplifies this drain. Unoptimized background usage negatively impacts user satisfaction and necessitates careful management by both the operating system and application developers.
Efficient management of background location usage is paramount. The operating system incorporates mechanisms to limit the frequency and duration of background location requests, optimizing battery life. Applications requesting background location access are subject to scrutiny, and users are provided with tools to monitor and control such access. Geofencing, a feature allowing an application to trigger actions based on a device entering or exiting a defined area, is a prime example where optimized background processing is essential. A smart home application might adjust thermostat settings based on the user’s proximity to the house; the background processing supporting geofencing must be efficient to avoid excessive power consumption. The operating system also learns usage patterns to optimize battery consumption, prioritizing location updates based on user behavior.
In summation, background location usage is an integral component of the location services offered in the forthcoming operating system, but it presents challenges concerning battery life and system performance. The operating system seeks to mitigate these challenges through intelligent resource management, user controls, and developer guidelines. Understanding the implications of background location usage is crucial for both developers and end-users to ensure optimal device performance and privacy.
5. Battery impact
The power consumption associated with geographical positioning services represents a significant consideration within the forthcoming operating system. Continuous or frequent location updates, particularly when relying on GPS, exert a considerable drain on battery resources. Optimized strategies are therefore necessary to balance the utility of location-based features with the need for prolonged device usability.
-
GPS Usage and Power Consumption
The Global Positioning System (GPS) component, while offering high accuracy, is among the most power-intensive subsystems employed for location determination. Activating GPS necessitates the processing of signals from multiple satellites, which consumes significant energy. Applications that continuously monitor location using GPS contribute substantially to battery depletion. For example, prolonged use of navigation applications or location-based fitness trackers can noticeably shorten battery life. Limiting GPS usage to on-demand requests or utilizing alternative, less power-hungry methods like Wi-Fi positioning when appropriate is critical for mitigating this impact.
-
Wi-Fi and Cellular Location Services
Wi-Fi and cellular location services offer a less power-intensive alternative to GPS, albeit with reduced accuracy. These methods rely on triangulating the device’s position based on the proximity to Wi-Fi access points or cellular towers. While less precise, they consume significantly less energy, making them suitable for applications that do not require pinpoint location accuracy. An example would be a weather application that only needs to know the user’s general vicinity. The system can intelligently switch between GPS and Wi-Fi/cellular positioning based on accuracy requirements and power constraints, thereby optimizing battery life.
-
Background Location Updates
Allowing applications to access location data in the background presents a particular challenge for battery management. Unfettered background access can result in significant battery drain as applications continuously monitor location even when not actively in use. The operating system implements restrictions and notifications to alert users when applications are accessing their location in the background. Users retain the ability to limit or revoke background location access, preventing applications from unnecessarily consuming battery power. An application frequently updating its location in the background for targeted advertising exemplifies this concern.
-
Geofencing and Optimized Monitoring
Geofencing, the practice of defining virtual boundaries and triggering actions when a device enters or exits those boundaries, also contributes to battery consumption. Efficient geofencing implementations rely on optimized monitoring techniques that minimize the frequency of location checks while still providing timely notifications. Inefficient implementations can lead to excessive battery drain as the system continuously monitors location even when the device is far from any defined geofences. Optimizations such as coalescing location requests and using low-power location monitoring modes can significantly reduce the battery impact of geofencing.
Ultimately, the integration of geographical positioning within the forthcoming operating system necessitates a delicate balance between functionality and power efficiency. The system is designed to provide users with granular control over location access, enabling them to prioritize battery life by limiting or disabling location services for specific applications or for all background processes. Smart use of available tools can preserve available power.
6. Geofencing
Geofencing, a core capability reliant upon the geographical positioning infrastructure within the forthcoming operating system, iOS 18, defines virtual perimeters and triggers actions when a device crosses these boundaries. This functionality, inherently dependent on “ios 18 location” services, enables context-aware behaviors within applications. The precision and responsiveness of geofencing are directly determined by the accuracy and efficiency of the underlying location determination mechanisms. The creation of a geofence centered around a retail store, for example, can initiate a push notification to a customer’s device advertising special offers upon entry into that defined area. The functionality hinges on the operating system’s capability to ascertain the device’s position accurately and promptly relative to the established boundary. Any imprecision in location data or latency in processing compromises the effectiveness of the geofence, potentially resulting in missed opportunities or unwanted activations.
The practical applications of geofencing within the iOS 18 ecosystem are diverse, ranging from enhanced security measures to automated home control. Within a corporate environment, geofencing can restrict access to sensitive data based on the device’s geographical location, ensuring compliance with security protocols. Similarly, smart home systems can leverage geofencing to adjust lighting, temperature, and security settings automatically as the user approaches or departs from their residence. The effective implementation of these scenarios requires careful consideration of battery consumption, location accuracy, and user privacy. Overly aggressive geofencing configurations, characterized by frequent location checks or numerous defined boundaries, can negatively impact battery life and raise privacy concerns. The operating system’s ability to efficiently manage geofence monitoring and provide users with granular control over location permissions is therefore critical.
In summary, geofencing represents a significant application of the operating system’s location capabilities. Its utility spans a wide range of use cases, from commercial advertising to security enhancements. However, the effectiveness of geofencing is intrinsically linked to the accuracy, efficiency, and privacy considerations associated with location services. Understanding the technical constraints and user expectations surrounding these factors is crucial for successful implementation. Challenges remain in balancing precision, battery life, and user privacy, requiring ongoing optimization of algorithms and privacy controls within the operating system.
7. Emergency services
The effective deployment of emergency services is intrinsically linked to the geographical positioning capabilities within the forthcoming operating system. Precise location data is critical for dispatching first responders accurately and efficiently, particularly in situations where the individual requiring assistance is unable to provide specific location information.
-
Enhanced 911 (E911) Integration
The operating system’s integration with Enhanced 911 (E911) systems provides emergency responders with accurate location data during an emergency call. This data is automatically transmitted to the Public Safety Answering Point (PSAP), enabling dispatchers to pinpoint the caller’s location even if the caller is incapacitated or unsure of their surroundings. The improved accuracy and reliability of E911 data within the operating system directly translate to faster response times and more effective emergency assistance. An example would be a hiker lost in a remote area; E911 data could provide rescuers with the hiker’s coordinates, facilitating a more rapid and targeted search.
-
Emergency SOS and Automatic Location Sharing
The Emergency SOS feature enables users to quickly contact emergency services and automatically share their location with designated emergency contacts. Activating Emergency SOS triggers a call to the local emergency number and simultaneously sends a message to pre-selected contacts containing the user’s current location. As the user moves, the location information is periodically updated and re-transmitted, providing ongoing situational awareness to emergency contacts. The automatic location sharing component of Emergency SOS is particularly valuable in situations where the user is injured or unable to communicate effectively. The system prioritizes the transmission of location data, ensuring that it is delivered even under conditions of limited network connectivity.
-
Car Crash Detection and Automated Emergency Calls
The operating system incorporates car crash detection capabilities that automatically detect severe vehicle accidents and initiate an emergency call. Using a combination of sensors, including accelerometers, gyroscopes, and barometers, the system can identify sudden changes in motion, impact forces, and cabin pressure indicative of a collision. Upon detecting a crash, the system initiates a countdown timer, providing the user with an opportunity to cancel the call if it was triggered in error. If the user is unresponsive, the system automatically contacts emergency services and provides them with the vehicle’s location. This feature is especially crucial in situations where the driver is incapacitated or unable to call for help themselves.
-
Medical ID and Accessibility for First Responders
The Medical ID feature allows users to store critical medical information, such as allergies, medications, and emergency contacts, on their device. This information is accessible from the lock screen, enabling first responders to quickly access vital medical details in the event of an emergency. The operating system also incorporates accessibility features that assist users with disabilities in contacting emergency services. For example, users can activate voice control to initiate an emergency call or send a text message to 911 without physically interacting with the device. The combination of Medical ID and accessibility features ensures that individuals with medical conditions or disabilities can effectively access emergency assistance.
The advancements in geographical positioning within the operating system significantly enhance the effectiveness of emergency services. These features reduce response times, improve situational awareness, and empower users to access help quickly and efficiently. Continuous refinements in location accuracy, reliability, and privacy controls are crucial for ensuring that these capabilities are deployed responsibly and effectively.
8. Indoor positioning
Indoor positioning, a subset of the broader “ios 18 location” framework, addresses the challenge of determining a device’s location within buildings where GPS signals are often obstructed or unreliable. As a crucial component of the operating system’s location capabilities, indoor positioning extends location-based services into environments where satellite-based solutions are ineffective. The absence of reliable indoor positioning would significantly limit the scope and utility of location-aware applications within the “ios 18 location” ecosystem. For example, a museum guide app relying solely on GPS would be rendered useless within the confines of the museum, whereas an indoor positioning system would enable real-time navigation and information delivery. The underlying technology and infrastructure supporting indoor positioning directly contribute to the comprehensiveness and user experience of the “ios 18 location” framework.
Several technologies are employed to facilitate indoor positioning within iOS 18, each offering varying degrees of accuracy and infrastructure requirements. Wi-Fi fingerprinting leverages the unique signal characteristics of Wi-Fi access points to estimate a device’s location based on a pre-existing database of signal strengths. Bluetooth beacons, strategically deployed throughout an indoor space, transmit signals that a device can detect to determine its proximity to specific points of interest. Ultra-Wideband (UWB) technology offers more precise positioning capabilities through time-of-flight measurements, enabling centimeter-level accuracy. The selection of the appropriate technology depends on the specific application requirements, the physical characteristics of the indoor environment, and considerations such as cost and scalability. The Apple Park visitor navigation system, for example, likely employs a combination of Wi-Fi, Bluetooth, and potentially UWB to guide visitors within the complex structure.
In summary, indoor positioning is an essential element of the “ios 18 location” ecosystem, extending location-based services into indoor environments where GPS signals are unavailable. The challenges associated with indoor positioning include achieving sufficient accuracy, maintaining scalability, and ensuring user privacy. Continuous advancements in positioning technologies and privacy protocols are crucial for realizing the full potential of indoor positioning within the operating system. The integration of robust and reliable indoor positioning capabilities will enhance the user experience across a wide range of applications, from retail navigation to asset tracking and emergency response within buildings, thereby making “ios 18 location” a more complete and versatile system.
9. Data security
The security of location data is paramount within the operating system’s design. The capabilities of “ios 18 location” inherently involve the collection, storage, and transmission of sensitive information detailing user whereabouts. Consequently, vulnerabilities in data security practices could expose users to significant risks, including unauthorized tracking, identity theft, and even physical harm. The compromise of a user’s location history, for instance, could reveal patterns of behavior, making them susceptible to targeted attacks or stalking. Therefore, robust data security measures are not merely an ancillary concern but a fundamental requirement for responsible implementation of “ios 18 location” services. For example, data breaches affecting location service providers have previously demonstrated the potential for widespread exposure of sensitive user data, highlighting the criticality of proactive security measures.
The operating system employs a multi-layered approach to secure location data. This includes encryption of data at rest and in transit, strict access controls to limit which applications and system processes can access location information, and data minimization techniques to reduce the amount of location data collected and stored. Furthermore, differential privacy techniques may be employed to add noise to location data, obfuscating individual user movements while still enabling aggregate analysis for purposes such as traffic management or urban planning. Ongoing security audits and penetration testing are essential to identify and address potential vulnerabilities in the system. The practical application involves developers adhering to secure coding practices, utilizing provided APIs responsibly, and respecting user privacy preferences.
In conclusion, the security of location data is inextricably linked to the responsible implementation of “ios 18 location.” Weaknesses in data security can undermine user trust and expose individuals to significant risks. A proactive and comprehensive approach to data security, encompassing encryption, access controls, data minimization, and ongoing monitoring, is essential for mitigating these risks and ensuring that “ios 18 location” services are deployed in a manner that protects user privacy and security. The challenges of balancing functionality with security require continuous vigilance and adaptation to emerging threats, underscoring the importance of data security as an integral component of “ios 18 location”.
Frequently Asked Questions About iOS 18 Location Services
This section addresses common inquiries and clarifies potential misconceptions surrounding location services in the forthcoming operating system. The information provided is intended to offer a comprehensive understanding of this critical functionality.
Question 1: What types of location data does the operating system collect?
The operating system collects various types of location data, including GPS coordinates, Wi-Fi network information, cellular tower IDs, and sensor data (accelerometer, gyroscope). The specific data collected depends on the application’s permission level and the available positioning technologies.
Question 2: How does the operating system protect user privacy when using location services?
The operating system employs several privacy-enhancing techniques, including granular permission controls, approximate location options, background location access restrictions, and data anonymization. These measures aim to minimize the risk of unauthorized tracking and data misuse.
Question 3: What impact does continuous use of location services have on battery life?
Frequent use of location services, especially GPS, can significantly impact battery life. The operating system incorporates power-saving optimizations and allows users to manage application access to location data to mitigate this impact.
Question 4: How accurate is indoor positioning within the operating system?
Indoor positioning accuracy varies depending on the underlying technology (Wi-Fi, Bluetooth beacons, UWB) and the density of deployed infrastructure. Accuracy can range from several meters to sub-meter levels in well-equipped environments.
Question 5: What steps can users take to improve the security of their location data?
Users can enhance location data security by reviewing and adjusting application permissions, limiting background location access, enabling two-factor authentication, and regularly updating their operating system.
Question 6: How are location data used to improve emergency services in the operating system?
Location data is used to provide accurate location information to emergency responders during 911 calls, facilitate car crash detection and automated emergency calls, and enable automatic location sharing with designated contacts in SOS situations.
In summary, the operating system balances the utility of location-based services with the need for privacy and security. Users are encouraged to understand the available controls and make informed decisions regarding location data access.
The next section will explore the developmental aspects of integrating location services into applications designed for the new operating system.
Tips for Optimizing iOS 18 Location Services
This section provides guidance for users and developers on effectively managing and utilizing location services within the forthcoming operating system. These tips aim to maximize functionality while minimizing privacy risks and battery consumption.
Tip 1: Regularly Review Application Location Permissions: Routinely examine the location permissions granted to applications. Revoke access for applications that do not require precise location or those that access location data in the background without legitimate justification. This minimizes unauthorized data collection.
Tip 2: Utilize Approximate Location Where Possible: When granting location permissions, opt for “Approximate Location” whenever the application functionality permits. This limits the granularity of location data shared, reducing the risk of precise tracking without compromising core features.
Tip 3: Limit Background Location Access: Restrict background location access to essential applications only. Regularly monitor background activity through system settings and revoke permissions from applications exhibiting excessive or unwarranted background location usage. Unnecessary background activity drains battery and raises privacy concerns.
Tip 4: Optimize Geofencing Parameters: When using geofencing, carefully define the size and number of monitored regions. Overly large or numerous geofences increase the computational burden on the system, impacting battery life. Optimize geofence parameters to align with specific application requirements.
Tip 5: Leverage Location Visit Monitoring Sparingly: Exercise caution when utilizing the significant-change location service or visit monitoring. These features can consume substantial battery power, especially in areas with frequent network changes. Prioritize alternative, less power-intensive methods whenever feasible.
Tip 6: Manage System Services Location Access: Review system services that request location access, such as location-based alerts and Find My. Disable unnecessary services to reduce the overall demand on location services and preserve battery life.
Tip 7: Employ Wi-Fi Positioning for Indoor Environments: When operating in indoor environments where GPS signals are weak or unavailable, enable Wi-Fi positioning. This provides a more accurate and power-efficient alternative to relying solely on cellular triangulation.
Effectively managing location services requires a proactive approach. By implementing these tips, users can optimize their experience, protect their privacy, and minimize the impact on battery life.
The concluding section will provide a comprehensive summary and final recommendations for using location services effectively in the new operating system.
Conclusion
This document has explored the multifaceted nature of “ios 18 location” services. Critical aspects such as precision, privacy controls, API access, background usage, battery impact, geofencing, emergency services, indoor positioning, and data security have been examined. The analysis has underscored the intricate balance between functionality, user privacy, and resource management that characterizes the implementation of these services within the forthcoming operating system. Advanced technologies, stringent privacy safeguards, and robust developer tools are essential components.
The ongoing evolution of geographical positioning technologies necessitates continuous vigilance regarding data security and user privacy. Responsible development and deployment of “ios 18 location” capabilities are paramount to ensuring that these services contribute positively to user experience and societal well-being. Further research and innovation are required to address the remaining challenges and to fully realize the potential benefits of location-aware technologies while mitigating associated risks. The future trajectory of location services demands a sustained commitment to ethical considerations and technological advancements.