The Internet of Everything: Wearables

The Internet of Everything: Wearables

The Internet of Everything: Wearables

Imagine a hospital gown capable of reading a patient’s vital signs even during a walk to the washroom or around the grounds. Imagine military fatigues capable of detecting gunshots and allowing for split-second protective or retaliatory action against snipers. Imagine your next smartphone as a color-coordinated piece of jewelry mounted in your lapel or worn as a necklace allowing hands-free communication with your clients, your car and your home-delivery grocery list, or one that could transmit business contact information and up-to-date product website links to a prospect through a handshake.

internetofeverything

These are just a few of the types of applications that fall under the category of wearables in the expanding universe of the Internet of Everything. They represent the next generation of Internet usage, following in the footsteps of Generation 1 (web pages and email), and Generation 2 (social media), in which technology is not merely placed on the physical body, but is in touch with dozens, hundreds or thousands of other devices, not just computers, through a wide range of networks, from traditional Wi-Fi through to a personal body area network connected, for example, to a heart and health monitor worn on the wrist.

Wearables are coming…

Wearables are coming to the consumer and industrial markets quickly and from all directions, and analysts, both technical and financial, are expecting the total market value in this area to increase ten-fold – from $3-5 billion to $30-50 billion – over the next three to five years.

When confronted with the term wearables, many people think first of Google Glass, the lens-mounted computer that is still in its early days in terms of functionality and acceptance. But Google Glass is not so much a wearable as it is a wearable smartphone. True wearables are integrated into a person’s physical space and compute and communicate in a more subtle and agile fashion. Imagine, for example, a personal monitor in the form of a tattoo that detects rising levels of stress through electrical signals, heart rate and hydration levels – a monitor that automatically talks to your house to set the lighting and temperature to an optimum level for relaxation and health, suggests an ideal low-sugar, low sodium snack, and where to buy it, and also chats with your car to program the best route home in order to avoid traffic jams and to maximize a decompression environment. Imagine a Bluetooth enabled dental implant that monitors chewing technique or alcohol intake.

If these ideas seem far-fetched or unnecessary, it is important to recognize that many innovations seem that way at first glance. From backup cameras to baby monitors to Aspirin, all new devices and solutions always seem unnecessary until they suddenly become indispensable. Sometimes the initial prototype even seems to lack a purpose – why after all, would anyone want a Bluetooth chip in their teeth – until someone else comes along and integrates this idea with one of their own. In the same vein, people once asked why anyone would want a camera in their phone, or a computer in their house. Further back in time people once asked why anyone would want to use a plastic card to make purchases when paper cash was already good enough. Or even why anyone would want to travel in a horseless carriage.

Amid the reactions posited by the naysayers, innovations have a marvelous habit of tweaking, evolving and parlaying themselves into useful inventions through a dynamic and growing web of interconnected minds, now no longer held apart by distance, country or even age.

Success secret for wearables

The success secret for wearables in the next five years will be in its sources of power. With conventional batteries, such as Lithium-Ion, reaching a plateau in terms of power-versus-size-and-cost, other sources are being developed, which include rechargeable silicon wafer-based solid-state batteries, near-field charging, which picks up energy waves from a transmitter (the same way a radio does), or energy harvesting, which converts energy either from sunlight exposure or kinetic movement. Many wearables will be built to take advantage of all of these sources, switching between them as circumstances allow.

In addition to the power source, wearables will also work using ultra-low-power processors, tiny mobile sensors and wireless networking, all built on a scale that makes a penny or dime huge in comparison, and which essentially “disappear” into any product.

Wearables form a key component of the Internet of Everything revolution, and they reinforce the notion that ultimately everything can become smart. As opposed to being merely gadgets, IoE wearables will become smart versions of already useful products.

The potential for mobile applications in the business sphere is huge and essentially unlimited. Basically anything that an individual carries on their person at this moment, from car keys to business cards, from a phone to bank cards, can and will eventually be absorbed into some type of wearable, replacing today’s hard devices in exactly the same way that bank cards did actually replace most paper money in many parts of the world, and cellphones eclipsed payphones.

As companies and entrepreneurs assess the growing and ever-changing frontier of cloud-based computing, there is constant challenge and wonder in visualizing just how a wearable technology could improve life and maximize opportunity for people all over the planet.

This is a sponsored post by InnovateThink and Cisco.

By Steve Prentice

About Steve Prentice

Steve Prentice is a project manager, writer, speaker and expert on productivity in the workplace, specifically the juncture where people and technology intersect. He is a senior writer for CloudTweaks.

Find out more
View All Articles

Sorry, comments are closed for this post.

Comic
In The Fast Lane: Connected Car Hacking A Big Risk

In The Fast Lane: Connected Car Hacking A Big Risk

Connected Car Hacking Researchers and cybersecurity experts working hard to keep hackers out of the driver’s seat. Modern transportation has come a million miles, and most all of today’s vehicles are controlled entirely by digital technology. Millions of drivers are not aware that of the many devices in their digital arsenal, the most complex of…

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…

Building a Data Security Strategy – More Important Than Ever

Building a Data Security Strategy – More Important Than Ever

Data Security Strategy Article sponsored by SAS Software and Big Data Forum Security and privacy have been an integral concern of the IT industry since its very inception, but as it expands through web-based, mobile, and cloud-based applications, access to data is magnified as are the threats of illicit penetration. As enterprises manage vast quantities…

Pitney Bowes Selects Aria Systems for Billing on the New Commerce Cloud

Pitney Bowes Selects Aria Systems for Billing on the New Commerce Cloud

Top-Ranked Cloud Billing Company Enables Greater Speed and Frictionless Billing for Unparalleled Customer Experience San Francisco, CA – August 23, 2016 – Aria Systems, which helps enterprises grow subscription and usage-based revenue, today announced that Pitney Bowes has selected Aria’s cloud-based monetization platform as the key billing and monetization component of their new Commerce Cloud…

The Golden Age of Wearable Technology

The Golden Age of Wearable Technology

The Golden Age One of the biggest fads in the technology sector right now is wearable tech. From Smartwatches that let you check your emails, chat with friends and search the web, to fitness accessories that monitor your heart rate and your sleep patterns, this is truly the Golden Age of wearable technology. But some…

Adopting A Cohesive GRC Mindset For Cloud Security

Adopting A Cohesive GRC Mindset For Cloud Security

Cloud Security Mindset Businesses are becoming wise to the compelling benefits of cloud computing. When adopting cloud, they need a high level of confidence in how it will be risk-managed and controlled, to preserve the security of their information and integrity of their operations. Cloud implementation is sometimes built up over time in a business,…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

Rounding Out Your Security Strategy With The Enterprise Cloud

Rounding Out Your Security Strategy With The Enterprise Cloud

Enterprise Cloud Security Strategy No company wants to be the one to have to announce one of the world’s biggest data breaches. From managing networks and datacenters to protecting hundreds of applications, today’s enterprises face enormous challenges. With all the surface area that needs to be tracked and protected including APIs on the front-end, customer integrations…

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Infrastructure-as-a-Service Security It’s no secret many organizations rely on popular cloud providers like Amazon and Microsoft for access to computing infrastructure. The many perks of cloud services, such as the ability to quickly scale resources without the upfront cost of buying physical servers, have helped build a multibillion-dollar cloud industry that continues to grow each…

5 Surprising Ways Cloud Computing Is Changing Education

5 Surprising Ways Cloud Computing Is Changing Education

Cloud Computing Education The benefits of cloud computing are being recognized in businesses and institutions across the board, with almost 90 percent of organizations currently using some kind of cloud-based application. The immediate benefits of cloud computing are obvious: cloud-based applications reduce infrastructure and IT costs, increase accessibility, enable collaboration, and allow organizations more flexibility…

Using Big Data To Make Cities Smarter

Using Big Data To Make Cities Smarter

Using Big Data To Make Cities Smarter The city of the future is impeccably documented. Sensors are used to measure air quality, traffic patterns, and crowd movement. Emerging neighborhoods are quickly recognized, public safety threats are found via social networks, and emergencies are dealt with quicklier. Crowdsourcing reduces commuting times, provides people with better transportation…

Cloud Infographic – Big Data Analytics Trends

Cloud Infographic – Big Data Analytics Trends

Big Data Analytics Trends As data information and cloud computing continues to work together, the need for data analytics continues to grow. Many tech firms predict that big data volume will grow steadily 40% per year and in 2020, will grow up to 50 times that. This growth will also bring a number of cost…

Protecting Your Web Applications In A Hybrid Cloud Environment

Protecting Your Web Applications In A Hybrid Cloud Environment

Protecting Your Web Applications It’s no secret that organizations are embracing the cloud and all the benefits that it entails. Whether its cost savings, increased flexibility or enhanced productivity – businesses around the world are leveraging the cloud to scale their business and better serve their customers. They are using a variety of cloud solutions…

Infographic Introduction – Benefits of Cloud Computing

Infographic Introduction – Benefits of Cloud Computing

Benefits of Cloud Computing Based on Aberdeen Group’s Computer Intelligence Dataset, there are more than 1.6 billion permutations to choose from when it comes to cloud computing solutions. So what, on the face of it, appears to be pretty simple is actually both complex and dynamic regardless of whether you’re in the market for networking,…

The Future Of Cybersecurity

The Future Of Cybersecurity

The Future of Cybersecurity In 2013, President Obama issued an Executive Order to protect critical infrastructure by establishing baseline security standards. One year later, the government announced the cybersecurity framework, a voluntary how-to guide to strengthen cybersecurity and meanwhile, the Senate Intelligence Committee voted to approve the Cybersecurity Information Sharing Act (CISA), moving it one…