The Future Of Smartwear Technology

The Future Of Smartwear Technology

The Future Of Smartwear Technology

Wearable Technology

Recent advances in smart devices and ubiquitous computing devices have fostered a dramatic growth of interest for wearable technology. “Wearable technology is defined as the intersection of the fields ubiquitous computing and functional clothing design”. To put it simply, wearable technology is a category of technology devices that can be worn by a consumer and can be networked. Wearable technologies typically contain a range of different sensors that can gather, store data, and can transfer information to other devices. Wearable devices are designed based on three goals. The first and most obvious is that they must be mobile. The second goal is to enhance the real environment. The third goal is to provide context sensitivity to exploit the intimacy between human, computer, and environment. Wearable technology consists of many different forms of body mounted technology such as wearable computers, functional clothing, and smart clothing.

Wearable Computers

According to Barfield and Caudell (2001), a wearable computer is defined as a “fully functional, self-powered, self-contained computer that is worn on the body, provides access to information, and interaction with information, anywhere and at any time”. When we hear wearable computing, Google Glass which is complex, multifunctional device probably comes to our mind. This amazing gadget has various interesting functions such as showing text messages, finding information easily, taking video and snapshot, broadcasting the live video, and translating languages. Moreover, other wearable devices like fitness bands or heart-rate monitors focus on a narrower range of purpose with a limited set of features. These smart devices increase self-awareness of the wearer to determine their health, fitness, or peak performance. In general, wearable computers are especially useful for applications (e.g. military applications, industrial applications and developer applications) that require more complex computational support than just hardware coded logics. Consistency and the ability to multi-task are the main characteristics of a wearable computer.

Functional Clothing

Functional clothing consists of all types of clothing or assemblies that are specifically engineered to deliver a pre-defined performance or functionality to the user, over and above its normal functions. Functional clothing provides special functionality to the wearer. In other words, it is worn for special functional needs and can be categorized into several classes which are Protective-functional, Medical-functional, Sports-functional, Vanity-functional, Cross-functional assemblies, and Clothing for special needs.

Smart ClothingOM-Signal

Smart clothing or intelligent clothing integrates functional clothing design and portable technology. It can provide interactive reactions by sending signals, processing information, and actuating the responses. According to Ariyatum & Holland (2003), the major applications of smart clothing can be categorized into military, medical, communication, entertainment and particularly sports. OMSignal’s Biometric Smartwear , for example, is an amazing smart cloth which has all the sensors needed to track and monitor not only heart rate, breathing and steps during workout but also health, weight, activity, and stress during the day. In fact, this data can help us get healthier and fitter.

Wearable technology presents many new challenges to designers. Designer of wearable technology should understand not only human interaction with computing devices but also human interaction with clothing for successful design. In general, “product strategists must embrace a human-centric approach to design — the person is the focus of innovation, not the device.” In fact, devices and garments hold very different cultural roles in terms of duration and frequency of use, range of usage situations, product life cycle, price point, care, cleaning, and many other factors. Hence, a team including textile technologist, electronic experts, garment engineers, biologist, computer scientists, and multimedia experts should work effectively together to design a new product.

By Mojgan Afshari

About Mojgan Afshari

Mojgan Afshari is a senior lecturer in the Department of Educational Management, Planning and Policy at the University of Malaya. She earned a Bachelor of Science in Industrial Applied Chemistry from Tehran, Iran. Then, she completed her Master’s degree in Educational Administration. After living in Malaysia for a few years, she pursued her PhD in Educational Administration with a focus on ICT use in education from the University Putra Malaysia.She currently teaches courses in managing change and creativity and statistics in education at the graduate level. Her research areas include teaching and learning with ICT, school technology leadership, Educational leadership, and creativity. She is a member of several professional associations and editor of the Journal of Education. She has written or co-authored articles in the following journals: Journal of Technology, Pedagogy and Education, The Turkish Online Journal of Educational Technology, International Journal of Education and Information Technologies, International Journal of Instruction, International Journal of Learning, European Journal of Social Sciences, Asia Pacific Journal of Cancer Prevention, Life Science Journal, Australian Journal of Basic and Applied Sciences, Scientific Research and Essays.

View All Articles

Sorry, comments are closed for this post.

Comic
SWIFT Says Bank Hacks Set To Increase

SWIFT Says Bank Hacks Set To Increase

Bank Hacks Set To Increase SWIFT, whose messaging network is used by banks to send payment instructions worth trillions of dollars each day, said three clients were hacked over the summer and cyber attacks on banks are set to increase. The theft of $81 million in February from Bangladesh’s central bank using SWIFT messages rocked…

Security: Avoiding A Hatton Garden-Style Data Center Heist

Security: Avoiding A Hatton Garden-Style Data Center Heist

Data Center Protection In April 2015, one of the world’s biggest jewelry heists occurred at the Hatton Garden Safe Deposit Company in London. Posing as workmen, the criminals entered the building through a lift shaft and cut through a 50cm-thick concrete wall with an industrial power drill. Once inside, the criminals had free and unlimited…

The Lighter Side Of The Cloud – Data Merge

The Lighter Side Of The Cloud – Data Merge

By Christian Mirra Please feel free to share our comics via social media networks such as Twitter, Facebook, LinkedIn, Instagram, Pinterest. Clear attribution (Twitter example: via @cloudtweaks) to our original comic sources is greatly appreciated.

The Rise Of Threat Intelligence Sharing

The Rise Of Threat Intelligence Sharing

Threat Intelligence Sharing  Security has been discussed often on CloudTweaks and for good reason. It is one of the most sought after topics of information in the technology industry.  It is virtually impossible to wake up and not read a headline that involves the words “Breached, Hacked, Compromised or Extorted (Ransomware)“. Included (below) is an…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…

How You Can Improve Customer Experience With Fast Data Analytics

How You Can Improve Customer Experience With Fast Data Analytics

Fast Data Analytics In today’s constantly connected world, customers expect more than ever before from the companies they do business with. With the emergence of big data, businesses have been able to better meet and exceed customer expectations thanks to analytics and data science. However, the role of data in your business’ success doesn’t end…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

Are CEO’s Missing Out On Big Data’s Big Picture?

Are CEO’s Missing Out On Big Data’s Big Picture?

Big Data’s Big Picture Big data allows marketing and production strategists to see where their efforts are succeeding and where they need some work. With big data analytics, every move you make for your company can be backed by data and analytics. While every business venture involves some level of risk, with big data, that risk…

Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…

Cloud Infographic – What Is The Internet of Things?

Cloud Infographic – What Is The Internet of Things?

What Is The Internet of Things? “We’re still in the first minutes of the first day of the Internet revolution.”  – Scott Cook The Internet of Things (IOT) and Smart Systems are based on the notions of Sensors, Connectivity, People and Processes. We are creating a new world to view and measure anything around us through…

Low Cost Cloud Computing Gives Rise To Startups

Low Cost Cloud Computing Gives Rise To Startups

Balancing The Playing Field For Startups According to a Goldman Sachs report, cloud infrastructure and platform spending could reach $43 billion by 2018, which is up $16 billion from last year, representing a growth of around 30% from 2013 said the analyst. This phenomenal growth is laying the foundation for a new breed of startup…

Cloud Computing Is Greener Than You Think

Cloud Computing Is Greener Than You Think

Cloud Computing Is Greener Than You Think Last week we touched upon how a project in Finland had blended two of the world’s most important industries, cloud computing and green technology, to produce a data centre that used nearby sea water to both cool their servers and heat local homes.  Despite such positive environmental projects, there…

Three Factors For Choosing Your Long-term Cloud Strategy

Three Factors For Choosing Your Long-term Cloud Strategy

Choosing Your Long-term Cloud Strategy A few weeks ago I visited the global headquarters of a large multi-national company to discuss cloud strategy with the CIO. I arrived 30 minutes early and took a tour of the area where the marketing team showcased their award winning brands. I was impressed by the digital marketing strategy…

SaaS And The Cloud Are Still Going Strong

SaaS And The Cloud Are Still Going Strong

SaaS And The Cloud With the results of Cisco Global Could Index: 2013-2018 and Hosting and Cloud Study 2014, predictions for the future of cloud computing are notable. Forbes reported that spending on infrastructure-related services has increased as public cloud computing uptake spreads, and reflected on Gartner’s Public Cloud Services Forecast. The public cloud service…

Disaster Recovery And The Cloud

Disaster Recovery And The Cloud

Disaster Recovery And The Cloud One of the least considered benefits of cloud computing in the average small or mid-sized business manager’s mind is the aspect of disaster recovery. Part of the reason for this is that so few small and mid-size businesses have ever contemplated the impact of a major disaster on their IT…