Five Weird And Wonderful Pieces Of Wearable Tech

Five Weird And Wonderful Pieces Of Wearable Tech

Five Weird And Wonderful Pieces Of Wearable Tech

Although mainstream news sites carry a constant flow of articles about smart-watches, fitness bands and health monitors, anyway from these conventional devices there is a thriving industry producing unique and fascinating wearable gadgets. Here are some of the more interesting devices available on the market today:

Golf Swing Glovesgolf-stats

Golfing is famous for being a pastime of retirees and millionaires, and while the majority of the former group may not have too much interests in honing their swing to a professional standard, the latter group certainly might.

Luckily for such people, Zepp have developed and released the ‘GolfSense’. The glove measures information such as swing speed, plane, tempo, and hip angle before sending the data to a smartphone app. Once the data has been loaded into the app, users can review golf stats, create detailed reports as well as create a 3D animation of their swing along with tips and advice on how to improve.

Smart Tattoos

While devices to monitor your health are nothing new, monitoring your health via a temporary tattoo is certainly a unique proposition.

ElectroZyme have developed a printed electrochemical biosensor which gives the wearer feedback about biomarkers such as pH and salt levels. The ‘tattoo’ is applied directly on to the skin before a special armband is placed over the top that can read the measurements.

The company already have a history of producing outlandish wearable tech – Co-Founders Joshua Windmiller and Jared Tangey started to develop chemical sensing ‘smart underwear’ as long ago as 2010.

Wi-Fi Detection Hat

Although computers, tablets, smartphones and handheld games consoles can all tell you when a Wi-Fi signal is available in a public place, Brando Workshop obviously felt that still omitted some users and consequently introduced the ‘Wi-Fi Detection Hat.

The hat, which can detect 802.11 b/g/n Wi-Fi signals, uses coloured LEDs to show wearers information about show network strength and availability – though it is not clear how users are expected to see this information while the device is actually being worn.

The hat comes in three colours and retails for around $15.

Remotely Hugged

If you are the type of person who craves social validation via ‘Likes’, ‘+1s’ and ‘retweets’, then the Like-a-Hug could be the perfect device for you.

Developed by MIT student Melissa Kit Chow, the Like-a-Hug claims it allows users to “feel the warmth, encouragement, support, or love that [they] feel when [they] receive hugs”. The device is actually a vest worn underneath a person’s normal clothes which inflates to mimic the feeling of a hug when a user receives a social media endorsement. Users can even hug the original person back in return, they just need to squeeze and deflate their own vest.

Powerful Wellies

For people of a certain disposition the summer means one thing – music festivals. Following the sequence, music festivals often mean mud, and mud means wellies. Thankfully, GotWind and UK-based mobile operator Orange have teamed up to put all those wellie-clad feet to good use.

Connectivity-conscious wellie-wearers can now purchase ‘thermoelectric wellies’ – devices which give users a way to charge their devices on-the-go by converting heat from a person’s feet into an electrical current. Sadly, despite the developer’s noble intentions, wearers will have to do a lot of walking to fully charge their devices – twelve hours of wear will provide a typical smartphone with just one hour of power.

Do you know about any bizarre uses of wearable technology? Let us know in the comments below.

By Daniel Price

About Daniel Price

Daniel is a Manchester-born UK native who has abandoned cold and wet Northern Europe and currently lives on the Caribbean coast of Mexico. A former Financial Consultant, he now balances his time between writing articles for several industry-leading tech (CloudTweaks.com & MakeUseOf.com), sports, and travel sites and looking after his three dogs.

View Website
View All Articles

Sorry, comments are closed for this post.

Comics
Is Machine Learning Making Your Data Scientists Obsolete?

Is Machine Learning Making Your Data Scientists Obsolete?

Machine Learning and Data Scientists In a recent study, almost all the businesses surveyed stated that big data analytics were fundamental to their business strategies. Although the field of computer and information research scientists is growing faster than any other occupation, the increasing applicability of data science across business sectors is leading to an exponential…

Cloud Services Providers – Learning To Keep The Lights On

Cloud Services Providers – Learning To Keep The Lights On

The True Meaning of Availability What is real availability? In our line of work, cloud service providers approach availability from the inside out. And in many cases, some never make it past their own front door given how challenging it is to keep the lights on at home let alone factors that are out of…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to…

Cyber Security: McAfee on IoT Threats and Autonomous Cars

Cyber Security: McAfee on IoT Threats and Autonomous Cars

IoT Threats and Autonomous Cars Autonomous cars are just around the corner, there have been controversies surrounding their safety, and a few doubts still hang in the minds of people who don’t like the idea of a computer driving their car. However, the biggest news stories surrounding this topic have been to do with how…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

Three Tips To Simplify Governance, Risk and Compliance

Three Tips To Simplify Governance, Risk and Compliance

Governance, Risk and Compliance Businesses are under pressure to deliver against a backdrop of evolving regulations and security threats. In the face of such challenges they strive to perform better, be leaner, cut costs and be more efficient. Effective governance, risk and compliance (GRC) can help preserve the business’ corporate integrity and protect the brand,…

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks Does cloud security risks ever bother you? It would be weird if it didn’t. Cloud computing has a lot of benefits, but also a lot of risks if done in the wrong way. So what are the most important risks? The European Network Information Security Agency did extensive research on that, and…