• Home
  • Archive
  • Tools
  • Contact Us

The Customize Windows

Technology Journal

  • Cloud Computing
  • Computer
  • Digital Photography
  • Windows 7
  • Archive
  • Cloud Computing
  • Virtualization
  • Computer and Internet
  • Digital Photography
  • Android
  • Sysadmin
  • Electronics
  • Big Data
  • Virtualization
  • Downloads
  • Web Development
  • Apple
  • Android
Advertisement
You are here: Home » Introduction To Wearable Computing

By Abhishek Ghosh September 26, 2014 5:41 am Updated on September 26, 2014

Introduction To Wearable Computing

Advertisement

The steady use of information and communication technology becoming increasingly relevant. Nowadays it is important that the information is available to the mobile devices at any time, any place, whether in professional or private life. Computers are becoming smaller and more compact, since the invention of digital watches, towards the thought of carrying a mobile computer on the wrist. This is why many companies have thoughts about how to manufacture computers and watches or bracelets connected together and brought some models on the market. The generic term for these portable computers is wearable computing. Here is basics on Wearable Computing as hardware.

 

Introduction To Wearable Computing

 

Wearable computers have already gained an important place in our daily lives. In order to ensure smooth communication to take place between the terminals, standards are necessary, which are used between the devices. This article provides an overview of the current possibilities of communication between the terminals. Moreover, chances and risks of wearable computing are worked out for the future.

 

The term Wearable Computing, is a collective term for computer systems intended to support the users in their work during use, without the focus to the computer system itself. Miniaturized electronic devices in clothing, eyeglasses or jewelry pieces can enhance the safety of the user and facilitate the users’ work. However, ubiquitous computing enables not only new forms of interest or enforcement of a data breach, but changed the interaction of people with the information technology in principle.

Advertisement

---

Introduction To Wearable Computing

 

Operating Modes and Features of Wearable Computing

 

In wearable computing, there are three basic modes and six basic properties :

  1. Constancy : Compared to a notebook computer, a wearable need not to be only opened and turned on for usage. Communication between user and computer is permanent, because the computer is never turned off.
  2. Augmentation : The user can, while working with the computer, execute a wide variety of work. The computer is designed to improve the users’ mind and the senses.
  3. Mediation : The wearable computer can make the user independent. This concept allows a much greater independence than other portable devices such as notebooks. There are two aspects of this independence:
  4. Solitude : The computer can act as an information filter and influence the perception of our environment. In this way, unwanted advertisements are hidden or specific content presented differently.
  5. Privacy : The Wearable computers help us in processing the data and information. Since the computer is constantly worn on the body, there is a much lower probability of an attack; i.e. theft of the device itself. A smartphone, on other hand, could be easily stolen.

 

The following six characteristics make a wearable computer :

 

  1. Un-monopolizing : The user during use of wearables can carry on the other activities and is not cut off from the real world, such as in a virtual reality game. This set has improved with sensor capabilities.
  2. Un-restrictiveness : The user is hindered in the exercise of functions and can for example write a message while he/she jogs. The Wearable purports to be an extension and improvement of the user skills.
  3. Observable : The computer can ever be perceived by the user and should always and everywhere available to the user everywhere.
  4. Controllable : The user can at any time take control of the computer and use it. It not must to be removed from the pocket compared to the smartphone to operate it.
  5. Attentiveness : Since the computer is always on, it can analyze the environment through its sensors and enable the user to optimally behave appropriate to the situation. He can, for example, when entering the movie hall in the evening, turn on the light.
  6. Communicativeness : The computer can be used as a means of communication or a communication aid.
Tagged With Introduction to Wearable Computing , wearable computer language:en , the ubiquitous nature of information technology in a wearable computer , introduction to wearable technology , introduction to wearable computer 2017 , introduction to wearable computer , introduction on wearable it , introduction of wearable computer , introduction foe wearable and mobile devices , INTRODUCTION about wearable computing

This Article Has Been Shared 231 Times!

Facebook Twitter Pinterest

Abhishek Ghosh

About Abhishek Ghosh

Abhishek Ghosh is a Businessman, Surgeon, Author and Blogger. You can keep touch with him on Twitter - @AbhishekCTRL.

Here’s what we’ve got for you which might like :

Articles Related to Introduction To Wearable Computing

  • Plug and play or Legacy PnP

    Plug and play terminology is describes two different characteristics, one Plug and play is device specification and another one which we use is Legacy PnP.

  • Which CDN is Best for Serving Static Contents and Streaming

    Which CDN is Best has one answer – Akamai. Akamai is the global standard and used by IBM to Microsoft. You have to find someone using their infrastructure.

  • VMWare Fusion or VirtualBox for Mac ?

    VMWare Fusion and VirtualBox both are virtualization softwares. First is a paid software and second one is a Free Software. Which one is right for your Mac ?

  • Cloud computing is Not Equal to the Future of Computing

    Cloud computing is Not Equal to the Future of Computing. Cloud Computing is an marketing term which is closer to the technology of grid computing since decades.

  • How to Keep Massive Photo Archive Tidy and Secure

    How to Keep Massive Photo Archive Tidy and Secure ? How many pictures do you have on the hard drive of your computer ? How and When to Take Backups ?

Additionally, performing a search on this website can help you. Also, we have YouTube Videos.

Take The Conversation Further ...

We'd love to know your thoughts on this article.
Meet the Author over on Twitter to join the conversation right now!

If you want to Advertise on our Article or want a Sponsored Article, you are invited to Contact us.

Contact Us

Subscribe To Our Free Newsletter

Get new posts by email:

Please Confirm the Subscription When Approval Email Will Arrive in Your Email Inbox as Second Step.

Search this website…

 

Popular Articles

Our Homepage is best place to find popular articles!

Here Are Some Good to Read Articles :

  • Cloud Computing Service Models
  • What is Cloud Computing?
  • Cloud Computing and Social Networks in Mobile Space
  • ARM Processor Architecture
  • What Camera Mode to Choose
  • Indispensable MySQL queries for custom fields in WordPress
  • Windows 7 Speech Recognition Scripting Related Tutorials

Social Networks

  • Pinterest (24.3K Followers)
  • Twitter (5.8k Followers)
  • Facebook (5.7k Followers)
  • LinkedIn (3.7k Followers)
  • YouTube (1.3k Followers)
  • GitHub (Repository)
  • GitHub (Gists)
Looking to publish sponsored article on our website?

Contact us

Recent Posts

  • Zebronics Pixaplay 16 : Entry Level Movie Projector Review February 2, 2023
  • What is Voice User Interface (VUI) January 31, 2023
  • Proxy Server: Design Pattern in Programming January 30, 2023
  • Cyberpunk Aesthetics: What’s in it Special January 27, 2023
  • How to Do Electrical Layout Plan for Adding Smart Switches January 26, 2023

About This Article

Cite this article as: Abhishek Ghosh, "Introduction To Wearable Computing," in The Customize Windows, September 26, 2014, February 3, 2023, https://thecustomizewindows.com/2014/09/introduction-wearable-computing/.

Source:The Customize Windows, JiMA.in

PC users can consult Corrine Chorney for Security.

Want to know more about us? Read Notability and Mentions & Our Setup.

Copyright © 2023 - The Customize Windows | dESIGNed by The Customize Windows

Copyright  · Privacy Policy  · Advertising Policy  · Terms of Service  · Refund Policy

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Do not sell my personal information.
Cookie SettingsAccept
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT