Feeds

Stick your own pin in Google maps

Mark spot. Add text. Email link

Providing a secure and efficient Helpdesk

We reckon this will appeal to anyone who's trying to organise a wedding reception and is dreading the obligatory "yeah, well, the map you sent was bloody awful so we ended up driving the wrong way up the M1 for three hours" - a smart new initiative which allows you to mark a spot on Google maps, stick a pin in it with added text details and then email the link.

Yup, try Pin in the map, developed by Winchester-based software outfit Eden Development. Company supremo Chris Parsons explained: "Pin in the map was designed for the simple reason that we discovered we needed it. Before this, we were forever printing out maps to write on, and or marking the exact location on a map in a paint program.

"After plenty of frustration, we thought, 'There must be a better way to do this!' And now there is."

Well, we gave it a spin and here's the result. Eden says the links are permanent, and it won't pass any info your enter in the text field to third parties. You currently can't edit your pin once it's stored, but that's a forthcoming feature, as is the "premium pin" for businesses allowing them to have a "proper" url for their pin (i.e., http://pininthemap.com/companyname), which will link to an ad-free page.

Of course, we imagine Reg readers will think up plenty of non-business-orientated ways of having fun with Pin in the map. Go to it. ®

Bootnote

Just to pre-empt the inevitable emails demanding to know how much we were paid for this shameless product plug, here's what it cost Eden Development:

  • One hundred pints of Olde Productflogger
  • Three kilos of choice Bolivian marching powder
  • The services of six Colombian escorts for the evening
  • A free "premium pin" for every Reg hack
  • Six bags of pork scratchings

So now you know. Businesses wishing to avail themselves of our world-class product-plugging team are directed here.

Reducing the cost and complexity of web vulnerability management

More from The Register

next story
'Windows 9' LEAK: Microsoft's playing catchup with Linux
Multiple desktops and live tiles in restored Start button star in new vids
Not appy with your Chromebook? Well now it can run Android apps
Google offers beta of tricky OS-inside-OS tech
New 'Cosmos' browser surfs the net by TXT alone
No data plan? No WiFi? No worries ... except sluggish download speed
SUSE Linux owner Attachmate gobbled by Micro Focus for $2.3bn
Merger will lead to mainframe and COBOL powerhouse
iOS 8 release: WebGL now runs everywhere. Hurrah for 3D graphics!
HTML 5's pretty neat ... when your browser supports it
Greater dev access to iOS 8 will put us AT RISK from HACKERS
Knocking holes in Apple's walled garden could backfire, says securo-chap
NHS grows a NoSQL backbone and rips out its Oracle Spine
Open source? In the government? Ha ha! What, wait ...?
Google extends app refund window to two hours
You now have 120 minutes to finish that game instead of 15
Intel: Hey, enterprises, drop everything and DO HADOOP
Big Data analytics projected to run on more servers than any other app
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.