To deploy Beacons you need a strong background of systems integration in stitching the network, devices and software application together to make it all work. This is another exciting phase of Digital Disruption and will pose challenges to our privacy and the way we live. Beacons are susceptible to various cyber attacks including Sniffer attacks, password based attacks, DOS attacks, Man in the Middle Attacks and Compromised key attacks to name a few, hence a secure application architecture will play a significant role in deployment of Beacons. But if you are adventurous, there is no harm in buying a dozen beacons bundled with a SDK and stringing an application together and start enjoying the benefits. You can consider placing beacons on the art collections and antiques in the boardroom and educate your Board and Leadership Team about the benefits of beacons by throwing light on the paintings and antiques on their mobile devices.
This was published at Information Week India : http://www.informationweek.in/informationweek/perspective/299041/beacons-wave-digital-disruption?utm_source=referrence_article