The Future Of Smartwear Technology

The Future Of Smartwear Technology

The Future Of Smartwear Technology

Wearable Technology

Recent advances in smart devices and ubiquitous computing devices have fostered a dramatic growth of interest for wearable technology. “Wearable technology is defined as the intersection of the fields ubiquitous computing and functional clothing design”. To put it simply, wearable technology is a category of technology devices that can be worn by a consumer and can be networked. Wearable technologies typically contain a range of different sensors that can gather, store data, and can transfer information to other devices. Wearable devices are designed based on three goals. The first and most obvious is that they must be mobile. The second goal is to enhance the real environment. The third goal is to provide context sensitivity to exploit the intimacy between human, computer, and environment. Wearable technology consists of many different forms of body mounted technology such as wearable computers, functional clothing, and smart clothing.

Wearable Computers

According to Barfield and Caudell (2001), a wearable computer is defined as a “fully functional, self-powered, self-contained computer that is worn on the body, provides access to information, and interaction with information, anywhere and at any time”. When we hear wearable computing, Google Glass which is complex, multifunctional device probably comes to our mind. This amazing gadget has various interesting functions such as showing text messages, finding information easily, taking video and snapshot, broadcasting the live video, and translating languages. Moreover, other wearable devices like fitness bands or heart-rate monitors focus on a narrower range of purpose with a limited set of features. These smart devices increase self-awareness of the wearer to determine their health, fitness, or peak performance. In general, wearable computers are especially useful for applications (e.g. military applications, industrial applications and developer applications) that require more complex computational support than just hardware coded logics. Consistency and the ability to multi-task are the main characteristics of a wearable computer.

Functional Clothing

Functional clothing consists of all types of clothing or assemblies that are specifically engineered to deliver a pre-defined performance or functionality to the user, over and above its normal functions. Functional clothing provides special functionality to the wearer. In other words, it is worn for special functional needs and can be categorized into several classes which are Protective-functional, Medical-functional, Sports-functional, Vanity-functional, Cross-functional assemblies, and Clothing for special needs.

Smart ClothingOM-Signal

Smart clothing or intelligent clothing integrates functional clothing design and portable technology. It can provide interactive reactions by sending signals, processing information, and actuating the responses. According to Ariyatum & Holland (2003), the major applications of smart clothing can be categorized into military, medical, communication, entertainment and particularly sports. OMSignal’s Biometric Smartwear , for example, is an amazing smart cloth which has all the sensors needed to track and monitor not only heart rate, breathing and steps during workout but also health, weight, activity, and stress during the day. In fact, this data can help us get healthier and fitter.

Wearable technology presents many new challenges to designers. Designer of wearable technology should understand not only human interaction with computing devices but also human interaction with clothing for successful design. In general, “product strategists must embrace a human-centric approach to design — the person is the focus of innovation, not the device.” In fact, devices and garments hold very different cultural roles in terms of duration and frequency of use, range of usage situations, product life cycle, price point, care, cleaning, and many other factors. Hence, a team including textile technologist, electronic experts, garment engineers, biologist, computer scientists, and multimedia experts should work effectively together to design a new product.

By Mojgan Afshari

About Mojgan Afshari

Mojgan Afshari is a senior lecturer in the Department of Educational Management, Planning and Policy at the University of Malaya. She earned a Bachelor of Science in Industrial Applied Chemistry from Tehran, Iran. Then, she completed her Master’s degree in Educational Administration. After living in Malaysia for a few years, she pursued her PhD in Educational Administration with a focus on ICT use in education from the University Putra Malaysia.She currently teaches courses in managing change and creativity and statistics in education at the graduate level. Her research areas include teaching and learning with ICT, school technology leadership, Educational leadership, and creativity. She is a member of several professional associations and editor of the Journal of Education. She has written or co-authored articles in the following journals: Journal of Technology, Pedagogy and Education, The Turkish Online Journal of Educational Technology, International Journal of Education and Information Technologies, International Journal of Instruction, International Journal of Learning, European Journal of Social Sciences, Asia Pacific Journal of Cancer Prevention, Life Science Journal, Australian Journal of Basic and Applied Sciences, Scientific Research and Essays.

View All Articles

Sorry, comments are closed for this post.

Comics
The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…

Four Trends Driving Demand For Data Security In 2017

Four Trends Driving Demand For Data Security In 2017

Data Security Trends 2017 will be a hallmark year for security in the enterprise as all industries have reached a tipping point with respect to cloud and mobile adoption, forcing more and more data beyond the corporate firewall. Over 100 IT executives weighed in on their plans for 2017 in our latest survey; buried among…

Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to…

Don’t Be Intimidated By Data Governance

Don’t Be Intimidated By Data Governance

Data Governance Data governance, the understanding of the raw data of an organization is an area IT departments have historically viewed as a lose-lose proposition. Not doing anything means organizations run the risk of data loss, data breaches and data anarchy – no control, no oversight – the Wild West with IT is just hoping…

How The CFAA Ruling Affects Individuals And Password-Sharing

How The CFAA Ruling Affects Individuals And Password-Sharing

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home computing. Time magazine declared 1982 was “The Year of the Computer.” By 1983, there were an estimated 10 million personal computers in the United States alone. As soon as computers became popular, the federal government…

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

Embracing The Cloud We love the stories of big complacent industry leaders having their positions sledge hammered by nimble cloud-based competitors. Saleforce.com chews up Oracle’s CRM business. Airbnb has a bigger market cap than Marriott. Amazon crushes Walmart (and pretty much every other retailer). We say: “How could they have not seen this coming?” But, more…

Adopting A Cohesive GRC Mindset For Cloud Security

Adopting A Cohesive GRC Mindset For Cloud Security

Cloud Security Mindset Businesses are becoming wise to the compelling benefits of cloud computing. When adopting cloud, they need a high level of confidence in how it will be risk-managed and controlled, to preserve the security of their information and integrity of their operations. Cloud implementation is sometimes built up over time in a business,…

Journey Science In Telecom: Take Customer Experience To The Next Level

Journey Science In Telecom: Take Customer Experience To The Next Level

Journey Science In Telecom Journey Science, being derived from connected data from different customer activities, has become pivotal for the telecommunications industry, providing the means to drastically improve the customer experience and retention. It has the ability to link together scattered pieces of data, and enhance a telco business’s objectives. Siloed approaches are becoming obsolete…

Cloud Services Providers – Learning To Keep The Lights On

Cloud Services Providers – Learning To Keep The Lights On

The True Meaning of Availability What is real availability? In our line of work, cloud service providers approach availability from the inside out. And in many cases, some never make it past their own front door given how challenging it is to keep the lights on at home let alone factors that are out of…