Five Weird And Wonderful Pieces Of Wearable Tech

Five Weird And Wonderful Pieces Of Wearable Tech

Five Weird And Wonderful Pieces Of Wearable Tech

Although mainstream news sites carry a constant flow of articles about smart-watches, fitness bands and health monitors, anyway from these conventional devices there is a thriving industry producing unique and fascinating wearable gadgets. Here are some of the more interesting devices available on the market today:

Golf Swing Glovesgolf-stats

Golfing is famous for being a pastime of retirees and millionaires, and while the majority of the former group may not have too much interests in honing their swing to a professional standard, the latter group certainly might.

Luckily for such people, Zepp have developed and released the ‘GolfSense’. The glove measures information such as swing speed, plane, tempo, and hip angle before sending the data to a smartphone app. Once the data has been loaded into the app, users can review golf stats, create detailed reports as well as create a 3D animation of their swing along with tips and advice on how to improve.

Smart Tattoos

While devices to monitor your health are nothing new, monitoring your health via a temporary tattoo is certainly a unique proposition.

ElectroZyme have developed a printed electrochemical biosensor which gives the wearer feedback about biomarkers such as pH and salt levels. The ‘tattoo’ is applied directly on to the skin before a special armband is placed over the top that can read the measurements.

The company already have a history of producing outlandish wearable tech – Co-Founders Joshua Windmiller and Jared Tangey started to develop chemical sensing ‘smart underwear’ as long ago as 2010.

Wi-Fi Detection Hat

Although computers, tablets, smartphones and handheld games consoles can all tell you when a Wi-Fi signal is available in a public place, Brando Workshop obviously felt that still omitted some users and consequently introduced the ‘Wi-Fi Detection Hat.

The hat, which can detect 802.11 b/g/n Wi-Fi signals, uses coloured LEDs to show wearers information about show network strength and availability – though it is not clear how users are expected to see this information while the device is actually being worn.

The hat comes in three colours and retails for around $15.

Remotely Hugged

If you are the type of person who craves social validation via ‘Likes’, ‘+1s’ and ‘retweets’, then the Like-a-Hug could be the perfect device for you.

Developed by MIT student Melissa Kit Chow, the Like-a-Hug claims it allows users to “feel the warmth, encouragement, support, or love that [they] feel when [they] receive hugs”. The device is actually a vest worn underneath a person’s normal clothes which inflates to mimic the feeling of a hug when a user receives a social media endorsement. Users can even hug the original person back in return, they just need to squeeze and deflate their own vest.

Powerful Wellies

For people of a certain disposition the summer means one thing – music festivals. Following the sequence, music festivals often mean mud, and mud means wellies. Thankfully, GotWind and UK-based mobile operator Orange have teamed up to put all those wellie-clad feet to good use.

Connectivity-conscious wellie-wearers can now purchase ‘thermoelectric wellies’ – devices which give users a way to charge their devices on-the-go by converting heat from a person’s feet into an electrical current. Sadly, despite the developer’s noble intentions, wearers will have to do a lot of walking to fully charge their devices – twelve hours of wear will provide a typical smartphone with just one hour of power.

Do you know about any bizarre uses of wearable technology? Let us know in the comments below.

By Daniel Price

About Daniel Price

Daniel is a Manchester-born UK native who has abandoned cold and wet Northern Europe and currently lives on the Caribbean coast of Mexico. A former Financial Consultant, he now balances his time between writing articles for several industry-leading tech (CloudTweaks.com & MakeUseOf.com), sports, and travel sites and looking after his three dogs.

Find out more
View All Articles

Sorry, comments are closed for this post.

What Do You Do With A Drunken Sailor? Look To The Cloud

What Do You Do With A Drunken Sailor? Look To The Cloud

Saferide App Petty officer Michael Daigle of the US Navy has rolled out an app to curb drunken driving in the Navy ranks. His Saferide ride-sharing service runs on Voxox’s Cloud Phone service which costs just $15 a month and is popular among US Service members abroad, where mobile phones are not permitted for use…

Red Hat Offers Container Native Persistent Storage for Linux Containers

Red Hat Offers Container Native Persistent Storage for Linux Containers

Red Hat Offers Container Storage Latest Red Hat Gluster Storage release enables greater agility and efficiency for OpenShift developers deploying application containers in production SAN FRANCISCO – RED HAT SUMMIT – June 28, 2016 – Red Hat, Inc. (NYSE: RHT), the world’s leading provider of open source solutions, today announced new storage innovations designed to enable developers to…

Controversial Chinese Cybersecurity Law Under Review Again

Controversial Chinese Cybersecurity Law Under Review Again

Cybersecurity Law BEIJING. The National People’s Congress, the equivalence of the Chinese Parliament, moved forward in drafting a second version of a controversial cybersecurity law first introduced almost a year ago. This means the law is thought to be closer to passing and will bring greater censorship for both foreign and domestic citizens and businesses.…

How You Can Improve Customer Experience With Fast Data Analytics

How You Can Improve Customer Experience With Fast Data Analytics

Fast Data Analytics In today’s constantly connected world, customers expect more than ever before from the companies they do business with. With the emergence of big data, businesses have been able to better meet and exceed customer expectations thanks to analytics and data science. However, the role of data in your business’ success doesn’t end…

Data Protection and Session Fixation Attacks

Data Protection and Session Fixation Attacks

Keeping the man out of the middle: preventing session fixation attacks In a nutshell, session fixation is a type of man in the middle attack where an attacker is able to pretend to be a victim using a session variable. For instance, let’s say you have an application that uses sessions to validate the user.…

Cloud Security: The Top 8 Risks According To ENISA

Cloud Security: The Top 8 Risks According To ENISA

Cloud Security Risks Does security in the cloud ever bother you? It would be weird if it didn’t. Cloud computing has a lot of benefits, but also a lot of risks if done in the wrong way. So what are the most important risks? The European Network Information Security Agency did extensive research on that,…

Five Signs The Internet of Things Is About To Explode

Five Signs The Internet of Things Is About To Explode

The Internet of Things Is About To Explode By 2020, Gartner estimates that the Internet of Things (IoT) will generate incremental revenue exceeding $300 billion worldwide. It’s an astoundingly large figure given that the sector barely existed three years ago. We are now rapidly evolving toward a world in which just about everything will become…

New Report Finds 1 Out Of 3 Sites Are Vulnerable To Malware

New Report Finds 1 Out Of 3 Sites Are Vulnerable To Malware

1 Out Of 3 Sites Are Vulnerable To Malware A new report published this morning by Menlo Security has alarmingly suggested that at least a third of the top 1,000,000 websites in the world are at risk of being infected by malware. While it’s worth prefacing the findings with the fact Menlo used Alexa to…

The Industries That The Cloud Will Change The Most

The Industries That The Cloud Will Change The Most

The Industries That The Cloud Will Change The Most Cloud computing is rapidly revolutionizing the way we do business. Instead of being a blurry buzzword, it has become a facet of everyday life. Most people may not quite understand how the cloud works, but electricity is quite difficult to fathom as well. Anyway, regardless of…

Digital Marketing Driven by Cloud, Big Data and IoT

Digital Marketing Driven by Cloud, Big Data and IoT

Digital Marketing Successful digital marketing campaigns are being driven largely by trending technologies, specifically the Internet of Things (IoT), Big Data, and The Cloud. These may be used for a huge number of marketing applications, from optimizing the performance of sports teams to improving science and research, even helping to aid law enforcement. Amazon Web…

Moving Your Enterprise Apps To The Cloud Is A Business Decision

Moving Your Enterprise Apps To The Cloud Is A Business Decision

Moving Your Enterprise Apps Whether it be enterprise apps or any other, if there is any heavy data that is going to be transacted in and through an app, then affiliating it with the Cloud becomes a must. And then an important question arises: How do you decide when to integrate your enterprise app with…

Teach Yourself The Cloud: Cloud Computing Knowledge In 5 Easy Steps

Teach Yourself The Cloud: Cloud Computing Knowledge In 5 Easy Steps

Teach Yourself The Cloud Learn how to get to grips with cloud computing in business  Struggling to get your head around the Cloud? Here are five easy ways you can improve your cloud knowledge and perhaps even introduce cloud systems into your business.  Any new technology can appear daunting, and cloud computing is no exception.…