The Internet of Everything: Wearables

The Internet of Everything: Wearables

The Internet of Everything: Wearables

Imagine a hospital gown capable of reading a patient’s vital signs even during a walk to the washroom or around the grounds. Imagine military fatigues capable of detecting gunshots and allowing for split-second protective or retaliatory action against snipers. Imagine your next smartphone as a color-coordinated piece of jewelry mounted in your lapel or worn as a necklace allowing hands-free communication with your clients, your car and your home-delivery grocery list, or one that could transmit business contact information and up-to-date product website links to a prospect through a handshake.

internetofeverything

These are just a few of the types of applications that fall under the category of wearables in the expanding universe of the Internet of Everything. They represent the next generation of Internet usage, following in the footsteps of Generation 1 (web pages and email), and Generation 2 (social media), in which technology is not merely placed on the physical body, but is in touch with dozens, hundreds or thousands of other devices, not just computers, through a wide range of networks, from traditional Wi-Fi through to a personal body area network connected, for example, to a heart and health monitor worn on the wrist.

Wearables are coming…

Wearables are coming to the consumer and industrial markets quickly and from all directions, and analysts, both technical and financial, are expecting the total market value in this area to increase ten-fold – from $3-5 billion to $30-50 billion – over the next three to five years.

When confronted with the term wearables, many people think first of Google Glass, the lens-mounted computer that is still in its early days in terms of functionality and acceptance. But Google Glass is not so much a wearable as it is a wearable smartphone. True wearables are integrated into a person’s physical space and compute and communicate in a more subtle and agile fashion. Imagine, for example, a personal monitor in the form of a tattoo that detects rising levels of stress through electrical signals, heart rate and hydration levels – a monitor that automatically talks to your house to set the lighting and temperature to an optimum level for relaxation and health, suggests an ideal low-sugar, low sodium snack, and where to buy it, and also chats with your car to program the best route home in order to avoid traffic jams and to maximize a decompression environment. Imagine a Bluetooth enabled dental implant that monitors chewing technique or alcohol intake.

If these ideas seem far-fetched or unnecessary, it is important to recognize that many innovations seem that way at first glance. From backup cameras to baby monitors to Aspirin, all new devices and solutions always seem unnecessary until they suddenly become indispensable. Sometimes the initial prototype even seems to lack a purpose – why after all, would anyone want a Bluetooth chip in their teeth – until someone else comes along and integrates this idea with one of their own. In the same vein, people once asked why anyone would want a camera in their phone, or a computer in their house. Further back in time people once asked why anyone would want to use a plastic card to make purchases when paper cash was already good enough. Or even why anyone would want to travel in a horseless carriage.

Amid the reactions posited by the naysayers, innovations have a marvelous habit of tweaking, evolving and parlaying themselves into useful inventions through a dynamic and growing web of interconnected minds, now no longer held apart by distance, country or even age.

Success secret for wearables

The success secret for wearables in the next five years will be in its sources of power. With conventional batteries, such as Lithium-Ion, reaching a plateau in terms of power-versus-size-and-cost, other sources are being developed, which include rechargeable silicon wafer-based solid-state batteries, near-field charging, which picks up energy waves from a transmitter (the same way a radio does), or energy harvesting, which converts energy either from sunlight exposure or kinetic movement. Many wearables will be built to take advantage of all of these sources, switching between them as circumstances allow.

In addition to the power source, wearables will also work using ultra-low-power processors, tiny mobile sensors and wireless networking, all built on a scale that makes a penny or dime huge in comparison, and which essentially “disappear” into any product.

Wearables form a key component of the Internet of Everything revolution, and they reinforce the notion that ultimately everything can become smart. As opposed to being merely gadgets, IoE wearables will become smart versions of already useful products.

The potential for mobile applications in the business sphere is huge and essentially unlimited. Basically anything that an individual carries on their person at this moment, from car keys to business cards, from a phone to bank cards, can and will eventually be absorbed into some type of wearable, replacing today’s hard devices in exactly the same way that bank cards did actually replace most paper money in many parts of the world, and cellphones eclipsed payphones.

As companies and entrepreneurs assess the growing and ever-changing frontier of cloud-based computing, there is constant challenge and wonder in visualizing just how a wearable technology could improve life and maximize opportunity for people all over the planet.

This is a sponsored post by InnovateThink and Cisco.

By Steve Prentice

About Steve Prentice

Steve Prentice is a project manager, writer, speaker and expert on productivity in the workplace, specifically the juncture where people and technology intersect. He is a senior writer for CloudTweaks.

View Website
View All Articles

Sorry, comments are closed for this post.

Connecting With Customers In The Cloud

Connecting With Customers In The Cloud

Customers in the Cloud Global enterprises in every industry are increasingly turning to cloud-based innovators like Salesforce, ServiceNow, WorkDay and Aria, to handle critical systems like billing, IT services, HCM and CRM. One need look no further than Salesforce’s and Amazon’s most recent earnings report, to see this indeed is not a passing fad, but…

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

Embracing The Cloud We love the stories of big complacent industry leaders having their positions sledge hammered by nimble cloud-based competitors. Saleforce.com chews up Oracle’s CRM business. Airbnb has a bigger market cap than Marriott. Amazon crushes Walmart (and pretty much every other retailer). We say: “How could they have not seen this coming?” But, more…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

Lavabit, Edward Snowden and the Legal Battle For Privacy

Lavabit, Edward Snowden and the Legal Battle For Privacy

The Legal Battle For Privacy In early June 2013, Edward Snowden made headlines around the world when he leaked information about the National Security Agency (NSA) collecting the phone records of tens of millions of Americans. It was a dramatic story. Snowden flew to Hong Kong and then Russia to avoid deportation to the US,…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Disaster Recovery – A Thing Of The Past!

Disaster Recovery – A Thing Of The Past!

Disaster Recovery  Ok, ok – I understand most of you are saying disaster recovery (DR) is still a critical aspect of running any type of operations. After all – we need to secure our future operations in case of disaster. Sure – that is still the case but things are changing – fast. There are…

Adopting A Cohesive GRC Mindset For Cloud Security

Adopting A Cohesive GRC Mindset For Cloud Security

Cloud Security Mindset Businesses are becoming wise to the compelling benefits of cloud computing. When adopting cloud, they need a high level of confidence in how it will be risk-managed and controlled, to preserve the security of their information and integrity of their operations. Cloud implementation is sometimes built up over time in a business,…

How To Overcome Data Insecurity In The Cloud

How To Overcome Data Insecurity In The Cloud

Data Insecurity In The Cloud Today’s escalating attacks, vulnerabilities, breaches, and losses have cut deeply across organizations and captured the attention of, regulators, investors and most importantly customers. In many cases such incidents have completely eroded customer trust in a company, its services and its employees. The challenge of ensuring data security is far more…

Three Tips To Simplify Governance, Risk and Compliance

Three Tips To Simplify Governance, Risk and Compliance

Governance, Risk and Compliance Businesses are under pressure to deliver against a backdrop of evolving regulations and security threats. In the face of such challenges they strive to perform better, be leaner, cut costs and be more efficient. Effective governance, risk and compliance (GRC) can help preserve the business’ corporate integrity and protect the brand,…