05.03.2013 Views

Data Hacking

Data Hacking

Data Hacking

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

260 Part IV — Playtime<br />

One variation is the use of travel bugs. These are trinkets that move (with the help of other geocachers,<br />

of course) from geocache to geocache. Their movements are logged online and their<br />

progress monitored.<br />

Just think about it for a moment and I think you will be impressed. I can take an average lunchbox<br />

and place it anywhere on the Earth (with a view of the sky) and give you those coordinates,<br />

and you will be able to navigate to it to within a few yards thanks to a handheld receiver, access<br />

to a constellation of satellites orbiting the Earth, and billions of dollars of hardware.<br />

Once the GPS has taken you to within a few yards of the cache, the rest is up to you. You<br />

might need to have a good scrabble around the place before you find it. However, at least you<br />

are now looking at scouring an area a few tens of square yards (see Figure 11-3) . . .<br />

FIGURE 11-3: A smaller area to search in<br />

...rather than hundreds of square yards (see Figure 11-4)!<br />

So how do you find the cache in the last 20 yards? Many cache listings, but not all, will provide<br />

clues as to where the cache is hidden, such as “in the roots of the rotten tree.” Of course, you<br />

will often find that there are many such rotting trees in the search area. This is where your<br />

GPS skills really come into play!

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!