heart-tech

Don’t Go Breaking my Heart – Wearables and Your Health

Wearables and Your Health

Former Vice President Dick Cheney famously admitted recently that he had the wireless feature of his pacemaker turned off. The ex-VP, who has a history of cardiac trouble, recently underwent a pacemaker upgrade, but is naturally reluctant to leave it exposed to hackers who might find a way of remotely shutting it down. Mr. Cheney’s situation is one of the more famous examples of the dangers lurking within wearables, those devices that connect humans to the Internet of Things more closely and more permanently.

Jimmy Nichols of CBR points out a number of distinct areas of vulnerability for wearables wearers, which include, on the health front, privacy violations and compilation of data regarding the products we consume and even our state of health – which might adversely affect insurance rates; and medical failure, in which connected technologies that ordinarily allow physicians or nurses to access patients’ vital signs and machinery remotely, might fall into the wrong hands.

Such dire yet legitimate warnings tend to scare away many who fear the dangers of technological progress more than they revel in its promise. But alongside, or in spite of, the efforts of the bad guys, wearable technology continues to offer great leaps forward in health care. External technologies range from intelligent tracking devices that monitor a hospital inpatient’s vital signs through RFID, through to new methods of diagnosis and drug-free healing.

Jim-Johnson
CEO-Jim-Johnson

Just one of these, called “below sensory nocturnal therapy DC stimulation” offers DC electrical stimulation into a patient’s tissue during sleeping hours when the body’s immune and regenerative systems are most active. The developers of this therapy, Prizm Medical, showcased its potential at the Wearable Technologies Show in Dusseldorf, in November 2014. Prizm CEO Jim Johnson acknowledged that the big players, such as Apple and Google are getting into the medical and sports medicine market space, which means everyone should pay attention.

Wearables are also making their mark in the treatment of Ebola and other highly infectious diseases.

These range from hand washing hygiene monitors to infrared cameras that can detect higher-than-normal body heat and which can be mounted on a cellphone camera case. Additional technologies include 48-hour body thermometers that attach to the skin, and location software that help calculate the risk to caregivers based on time spent at a specific location where an Ebola patient was situated.

Another vendor at the Dusseldorf MEDICA show, Evena Medical, demonstrated their smart glasses, which help in the difficult process of venipuncture (inserting needles into patients’ veins.) This seemingly common procedure is very difficult when dealing with Ebola patients, and according to the Infusion Nurses Society (INS), first attempts fail 40 percent of the time. The smart glasses help make “invisible” veins visible to medical staff, speeding up the process and rendering it safer.

Wearables promise to deliver major innovations in health care and treatment. As with all other types of intelligent devices, however, the human operators themselves must seek to remain on guard. They must change their perception of a simple device such as a thermometer from being an isolated device to being part of a matrix of shared information and access. This will serve as a major barrier against invasion and criminal misuse.

By Steve Prentice

Steve Prentice

Steve Prentice is a project manager, writer, speaker and expert on productivity in the workplace, specifically the juncture where people and technology intersect. He is a senior writer for CloudTweaks.

View Website

CONTRIBUTORS

Combatting Malware in the Cloud Requires a New Way of Thinking

Combatting Malware in the Cloud Requires a New Way of Thinking

Malware in the Cloud It’s no secret that cloud adoption has exploded in the enterprise over last few years. However, ...
The Cloudification of Healthcare: Benefits and Risks

The Cloudification of Healthcare: Benefits and Risks

Cloud Healthcare: Benefits and Risks Many organizations are moving most of their business-critical applications and workloads to the cloud. The ...
Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

Federal Government Cloud Adoption No one has ever accused the U.S. government of being technologically savvy. Aging software, systems and processes, ...
The Future For Cyber Security Looks Uncertain

The Future For Cyber Security Looks Uncertain

Future For Cyber Security From the inception of the internet, cyber security has become increasingly more important. As the internet ...
Cloud Migration Strategies and Their Impact on Security and Governance

Cloud Migration Strategies and Their Impact on Security and Governance

Cloud Migration Strategies Public cloud migrations come in different shapes and sizes, but I see three major approaches. Each of ...
IoT Trends

The Internet of Attacks: Disturbing Online IoT Trends

Disturbing Online IoT Trends If you thought the worst thing to come out of the Internet of Things (IoT) trend ...
GDPR Compliance: A Network Perspective

GDPR Compliance: A Network Perspective

GDPR Compliance Regulations can be a tricky thing. For the most part, they’re well thought out in terms of mandating ...
How Big Data Is Aiding Police And Security Officers

How Big Data Is Aiding Police And Security Officers

Big Data Is Aiding Police Officers Big data has become a trusted resource for people in industries ranging from health ...
Cyber Security Tips For Digital Collaboration

Cyber Security Tips For Digital Collaboration

Cyber Security Tips October is National Cyber Security Awareness Month – a joint effort by the Department of Homeland Security ...
Part 1 - Identity Assurance by Our Own Volition and Memory

Part 1 – Identity Assurance by Our Own Volition and Memory

In an earlier article we discussed what technology can displace the password. The proposition of Expanded Password System (EPS) that ...