Feeds
75%
Race Telcom WiGoMo One

Race Telcom WiGoMo One

The mobile phone for overprotective parents

  • alert
  • submit to reddit

The Power of One Infographic

Review Tracking someone’s location using GPS technology is often regarded as sneaky or underhand, but what if you’re simply a paranoid protective parent craving the security of knowing your child’s whereabouts – day or night?

Race Telcom WiGoMo One

Intensive care: Race Telcom's WiGoMo One and GPS beacon

Manufacturer Race Telecom aims to allay that fear with WiGoMo – a child-friendly handset-cum-tracker that relays its coordinates over GPS to an online parental portal where guardians can monitor the phone’s movements on an atlas akin to Google Maps.

The portal also gives parents remote access to the WiGoMo, allowing them to stop incoming and outgoing calls at specific times such as school hours, plus the option to switch off the phone’s 2.2Mp rear-mounted camera.

To do all this, the WiGoMo comes with an external GPS beacon – roughly the size of a 10p coin and attaches to the phone with a mini coaxial connector. First, register the phone with the WiGoMo site to access the portal. From here you can define the location report frequency for every 15, 30, 60 or 180 minutes.

Having set WiGoMo to plot my location every 60 minutes, I slipped the 79g handset into my pocket and ambled around London for 24 hours to test the phone’s location accuracy. It proved impressive. The portal revealed that I’d been in the King’s Cross area at 3pm and in Soho come 9pm. I was also mapped in various other London boroughs throughout the day.

Race Telcom WiGoMo One

Portal protection

Plotted locations are fairly accurate too. Instead of being tagged as simply somewhere in the Soho area that evening, the WiGoMo said I was actually stood on the corner of Dean Street and Oxford Street at 9pm. Accuracy aside, tethering the WiGoMo to an external GPS beacon isn’t ideal. The short wire that connects it to the handset is always exposed and in the pocket, the beacon’s cable easily became tangled with keys.

Top three mobile application threats

More from The Register

next story
Child diagnosed as allergic to iPad
Apple's fondleslab is the tablet dermatitis sufferers won't want to take
Microsoft takes on Chromebook with low-cost Windows laptops
Redmond's chief salesman: We're taking 'hard' decisions
For Lenovo US, 8-inch Windows tablets are DEAD – long live 8-inch Windows tablets
Reports it's killing off smaller slabs are greatly exaggerated
Seventh-gen SPARC silicon will accelerate Oracle databases
Uncle Larry's mutually-optimised stack to become clearer in August
EU dons gloves, pokes Google's deals with Android mobe makers
El Reg cops a squint at investigatory letters
Big Blue Apple: IBM to sell iPads, iPhones to enterprises
iOS/2 gear loaded with apps for big biz ... uh oh BlackBerry
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.