Auxiliary Cloud: How The Cloud And Big Data Can Help The Elderly

Auxiliary Cloud: How The Cloud And Big Data Can Help The Elderly

Auxiliary Cloud: How The Cloud And Big Data Can Help The Elderly

Growing old can be challenging, confusing and most certainly frustrating. The ongoing economic development will account for lower birth rates worldwide and, subsequently, an increase in demand for auxiliary technologies that assist the elderly. There are already many cloud-based tools that help the elderly live longer, healthier and more fulfilling lives.elderly-care

To counter diminished reflexes and weakening eyesight that leads to impaired driving ability, a variety of car monitoring tools are available on the market to keep senior citizens safe on the roads. Apps such as Automatic measure driving ability by assessing the speed, acceleration time, number of hard stops, swerves, etc.

On average, more than 500 seniors are injured every day in car accidents (Source). The Cloud can help reduce this stat.

While using this information to revoke a driver’s license of a loved one may seem cruel and heartless, it is much better than needing to use the app’s built-in emergency-response feature. However, the cloud can also be used as a tool to help seniors live on their own for longer periods of time.

Cloud-based programs such as medication reminders, Personal Emergency Response Systems (PERS) and GPS tools ensure the safety and general well-being of seniors living on their own.

Not only that. Researchers have come up with ‘magic carpets’ that notify the emergency services if an elderly resident falls; but in the Nordic countries, and recently the UK as well, a company named Abilia is offering home systems that cater to people with disabilities. The home systems are connected to caretakers and doctors via Skype, and, along with improving communication, provide people with the tools required to care for themselves—and their loved ones with a direct link to put them at ease.

LG Smart Refrigerator at CES 2011.jpgWhat about eating? How can the cloud help manage their food? There are cloud-connected refrigerators that notify the owner when certain foods are in low supply. Your fridge can send a message to you or anyone else informing them it’s high time to go shopping. It is expected that these fridges will soon be able to place an order for you and have the food delivered to your house.

The knowledge of cloud-based computing is going to take this one step further.

Currently researchers are creating a framework for a ubiquitous health care system that will allow the elderly to live alone for longer periods of time. This system will interact with the home resident, providing medical assistance, family interaction and emergency services.
The auxiliary cloud

These are just a few of the ways cloud-based computing is changing the lives of elderly and disabled everywhere. Because of cloud technologies, life will become a little safer for people living on their own.

Do you know someone who already uses the services or devices discussed above? What do you think about this, in moral terms? Let us know in the comments.

(Image Source: “LG Smart Refrigerator at CES 2011” by David Berkowitz . Licensed under CC BY 2.0 via Wikimedia Commons.)

By Lauris Veips

About Lauris Veips

Lauris Veips is a freelance writer, hailing from cold and distant Latvia. A cloud enthusiast and supporter of anything innovative.

View All Articles

Sorry, comments are closed for this post.

Lavabit, Edward Snowden and the Legal Battle For Privacy

Lavabit, Edward Snowden and the Legal Battle For Privacy

The Legal Battle For Privacy In early June 2013, Edward Snowden made headlines around the world when he leaked information about the National Security Agency (NSA) collecting the phone records of tens of millions of Americans. It was a dramatic story. Snowden flew to Hong Kong and then Russia to avoid deportation to the US,…

Ending The Great Enterprise Disconnect

Ending The Great Enterprise Disconnect

Five Requirements for Supporting a Connected Workforce It used to be that enterprises dictated how workers spent their day: stuck in a cubicle, tied to an enterprise-mandated computer, an enterprise-mandated desk phone with mysterious buttons, and perhaps an enterprise-mandated mobile phone if they traveled. All that is history. Today, a modern workforce is dictating how…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

Embracing The Cloud We love the stories of big complacent industry leaders having their positions sledge hammered by nimble cloud-based competitors. Saleforce.com chews up Oracle’s CRM business. Airbnb has a bigger market cap than Marriott. Amazon crushes Walmart (and pretty much every other retailer). We say: “How could they have not seen this coming?” But, more…

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Infrastructure-as-a-Service Security It’s no secret many organizations rely on popular cloud providers like Amazon and Microsoft for access to computing infrastructure. The many perks of cloud services, such as the ability to quickly scale resources without the upfront cost of buying physical servers, have helped build a multibillion-dollar cloud industry that continues to grow each…

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…

Maintaining Network Performance And Security In Hybrid Cloud Environments

Maintaining Network Performance And Security In Hybrid Cloud Environments

Hybrid Cloud Environments After several years of steady cloud adoption in the enterprise, an interesting trend has emerged: More companies are retaining their existing, on-premise IT infrastructures while also embracing the latest cloud technologies. In fact, IDC predicts markets for such hybrid cloud environments will grow from the over $25 billion global market we saw…