Cloud Accessories – Future Trends

Cloud Accessories – Future Trends

If CES told us anything, it is that the next trend of consumer electronics will be focused on wearable technology. Fitness bands, smart watches and smart bands plagued the floors of the convention, with everyone from Metawatch to Razer showing off wearables.

(Image Source: Google)

ABI Research, a firm with 20 years experience in the technology market, claims this year will be big for wearables. The firm projects over 90 million wearable devices will be shipped in 2014, but the consumer market will not be the biggest buyer, with enterprise claiming wearables first. The benefits for wearables are huge, we have already seen cases of surgeons, firefighters and police using Google Glass to take in data on the go, stream their view to other people and save data for analysis later.

 

Cloud computing will play a big part in making wearables usable in public services and enterprise. Internal storage is clearly not the solution with small devices like Google Glass and Pebble, meaning cloud storage and on-the-go streaming solutions will become embraced.

Health trackers will also gain larger market share, according to ABI. The health tracking market has been growing for a few years now, with Nike and Fitbit working on different bands and health apps, allowing users to keep track of what they eat and how much exercise they do daily.

The impact of Google Glass and Apple’s iWatch is still unknown, we cannot see both products flopping on the market. The developer interest surrounding Google Glass right now is enough to secure them a few hundred thousand sales, even more if they reveal some killer apps.

According to ABI Research, the main problems wearable manufacturers have to overcome is price and battery life. Google will obviously have to drop the price of Glass to a more reasonable amount since $1,500 is way out of reach for most consumers.

We believe the iWatch will come at the same price as the iPod Touch. The Pebble smartwatch already offers a good amount of functionality, but there have been reports of Apple creating a whole new iOS interface, just for the iWatch.

By Walter Bailey

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comics
7 Common Cloud Security Missteps

7 Common Cloud Security Missteps

Cloud Security Missteps Cloud computing remains shrouded in mystery for the average American. The most common sentiment is, “It’s not secure.” Few realize how many cloud applications they access every day: Facebook, Gmail, Uber, Evernote, Venmo, and the list goes on and on… People flock to cloud services for convenient solutions to everyday tasks. They are so easy to start using that consumers rarely think twice about setting up an account or downloading a new…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago. The market persevered, weathering the “end of perimeter security” claims and adapting to become more flexible and dynamic, reaching beyond…

Through the Looking Glass: 2017 Tech and Security Industry Predictions

Through the Looking Glass: 2017 Tech and Security Industry Predictions

2017 Tech and Security Industry Predictions As we close out 2016, which didn’t start off very well for tech IPOs, momentum and performance has increased in the second half, and I believe that will continue well into 2017. M&A activity will also increase as many of the incumbents will realize that they need to inject new DNA into their stagnant cultures and flat to declining revenue numbers. Cyber Security Market Expands My first prediction, which…

2017 Brings DLP Technology and IoT’s Weaknesses to Light

2017 Brings DLP Technology and IoT’s Weaknesses to Light

DLP Technology In regards to data loss prevention (DLP), in the last five years many companies rushed to implement DLP solutions without taking the time to first identify the data that should not transit egress points. Most of these rushed implementations have not been successful. Security analysts, in particular 451 Research, have been recommending that companies should first identify and classify data before deploying DLP. Unfortunately, we are just now seeing companies execute this approach.…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards. It’s getting worse: McKinsey in conjunction with the World Economic Forum have estimated that failing cyber security approaches could have…

Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to being a mission-critical component, BODs are also becoming more interested in what their organizations are doing to plan their incident…

How Strategy – Not Technology – Is The Real Driver For Digital Transformation

How Strategy – Not Technology – Is The Real Driver For Digital Transformation

The Real Driver For Digital Transformation Business owners and executives today know the power of social media, mobile technology, cloud computing, and analytics. If you pay attention, however, you will notice that truly mature and successful digital businesses do not jump at every new technological tool or platform. While they do not sit and wait for months or years to create social media pages or to take advantage of new analytical services, they do approach…

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this question: how in the world do you eat cloud software? Cybersecurity today seems to have an unfortunate Catch-22. You want…

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to secure their sensitive information across the Internet. This approach made do in the early days of ecommerce, but with the…