Tag Archives: Tech

athos-smart-clothes-wearable-technology

How Wearable Smart Clothing Will Revolutionize Health, Fitness, and Fashion

Wearables are in a nascent stage since coming into vogue through the advent of Samsung Galaxy Gear in 2013 and the Apple Watch in 2015. Smartwatches and fitness devices like Fitbit continue to reign supreme and help us make our lives more efficient while tracking vital health data and improving our workouts.

The next generation of wearables will be able to cultivate even more data and transmit that information to health professionals with the help of 5G. Machine learning algorithms will help predict potential health issues based on the data gathered. In order to cultivate this data, we predict that wearable clothes fitted with sensors will rise in popularity, yielding ground-breaking applications in Fitness, Healthcare, Emergency Services, and Fashion.

FITNESS

The release of Fitbit in 2009 marked the first consumer-grade wearable focused on activity tracking, precipitating the advent of the smartwatch by four years. Since then, Fitbit has designed and released a line of products focusing on activity tracking, including the Fitbit Versa, a health and fitness smartwatch, and the Fitbit Ace, an activity tracker for children 8+.

Screen Shot 2019-02-19 at 9.08.59 AM

Fitbit isn’t the only major player in the wearables game. Nadi X Yoga Pants use built-in haptic vibrations to encourage wearers to move and hold positions.

Sensoria’s second generation connected socks use textile pressure sensors to track the pressure put on the user’s foot when running and inform the user when it senses too much pressure on a particular body part to prevent injury. They also track time, cadence, pace, speed, and distance.

The Thin Ice smart vest cools your body using thermo receptors, activating the bodies brown fat pathways which effectively burns white fat (bad fat).

OMsignal’s OmBra measures heart rate and breathing rhythm in addition to time, distance, cadence pace, and impact for runners.

athos

The Athos Core is perhaps the most thorough and expansive application in smart clothes today. Athos Core collects data from a line of clothing embedded with micro-EMG sensors and analyzes it to help improve your workout. Athos shirts can evaluate electrical activity produced by your muscles to track the exertion of major upper-body muscle groups (pecs, bis, tris, delts, lats, and traps).

HEALTHCARE AND EMERGENCY SERVICES

As cited in our last blog on 5G and healthcare, 86% of doctors say wearables increase patient engagement with their own health.

cleansock_phone-02

The second generation Owlet Smart Sock is a smart-sock made for babies which uses pulse oximetry technology to monitor heart rate and sleep patterns.

Siren Smartsocks are designed to prevent diabetics from suffering from foot injuries. They have microsensors designed to continuously monitor temperature for inflammation and alert users through their smartphone app.

As wearable clothes become more popular, applications will automatically contact emergency services when the wearer’s health shows major warning signs.

Invisiwear offers wearable smart jewelry and other accessories with a panic button which gives the option to share your location with loved ones and 9-1-1.

The iBeat Heart Watch monitors health and notifies your loved ones and an EMT team in emergency situations.

FASHION

“Fashion tech” is gradually earning adoption.

On a mass consumer level, Levi’s teamed up with Google’s Project Jacquard to offer a smart trucker jacket designed for urban cyclists. Conducive yarn makes it easy for the user to tap, swipe, or hold the sleeve to fulfill simple tasks like changing music tracks, block or answer calls, or access navigation information.

Vicenza-headdress-by-The-Unseen-for-Swarovski_dezeen_468_SQ5

A London-based design firm THE UNSEEN created a line of luxury accessories including a backpack, phone case, scarf, and more which respond to air pressure, body temperature, wind, sunlight, and touch to change colors.

THE FUTURE OF WEARABLE CLOTHES

Recently, NBA commissioner Adam Silver unveiled the future of the NBA Jersey: a line of smart jerseys that allow you to customize the name and number on the jersey.

There’s no doubt that the future of wearable clothes is still unveiling itself to us as 5G receives mass adoption and programmers continue to uncover potential applications of machine learning. What is clear at this point is that wearable clothes will help make the human race smarter, stronger, healthier, and more efficient.

Securing Your IoT Devices Must Become a Top Priority

The Internet of Things has seen unprecedented growth the past few years. With an explosion of commercial products arriving on the marketplace, the Internet of Things has entered the public lexicon. However,  companies rushing to provide IoT devices to consumers often cut corners with regard to security, causing major IoT security issues nationwide.

In 2015, hackers proved to Wired they could remotely hack a smartcar on the highway, kill the engine and control key functions. Dick Cheney’s cardiologist disabled WiFi capabilities on his pacemaker, fearing an attack by a hacker.  Most recently, the October 21st cyber attack on Dyn brought internet browsing to a halt for hours while Dyn struggled to restore service.

Although the attack on Dyn seems to be independent of a nation-state, it has caused a ruckus in the tech community. A millions-strong army of IoT devices, including webcams and DVRs, were conscripted with a botnet which launched the historically large denial-of-service attack. Little effort has been made to make common consumers aware of the security threats posed by IoT devices. A toy Barbie can become the back door to the home network, providing access to PCs, televisions, refrigerators and more. Given the disturbing frequency of hacks in the past year, IoT security has come to the forefront of top concerns for IoT developers.

SECURING CURRENT DEVICES

The amount of insecure devices already in the market complicates the Internet of Things security problem. IoT hacks will continue to happen until the industry can shrink vulnerable devices. Securing current devices is a top priority for app developers. Apple has made an effort to combat this problem by creating very rigorous security requirements for HomeKit compatible apps.

The European Union is currently considering laws to force compliance with security standards. The plan would be for secure devices to have a label which ensures consumers the internet-connected device complies with security standards. The current EU labeling system which rates devices based on energy consumption could prove an effective template for this new cybersecurity rating system.

ISPs COULD BE THE KEY

Internet service providers could be a major part of the solution when it comes to IoT Security. Providers can block or filter malicious traffic driven by malware through recognizing patterns. Many ISPs use BCP38, a standard which reduces the process hackers use to transmit network packets with fake sender addresses.

ISPs can also notify customers, both corporate and individuals, if they find a device on their network sending or receiving malicious traffic. ISPs already comply with the Digital Millennium Copyright Act which requires internet providers to warn customers if they detect possible illegal file sharing.

With the smarthome and over 1.9 billion devices predicted to be shipped in 2019, IoT security has never been a more important issue. Cyber attacks within the US frequently claim the front page of the mainstream media. CIO describes the Dyn attacks as a wake-up call for retailers. The combination of a mass adoption of IoT and an environment fraught with security concerns means there will be big money in IoT security R & D and a potential slow-down in time-to-market pipeline for IoT products.

Will the federal government get involved in instituting security regulations on IoT devices, or will it be up to tech companies and consumers to demand security? Whatever the outcome, this past year has proved IoT security should be a major concern for developers.

Water Cooler Tech Talk: What iOS 10 Can Do For Your Business

As we detailed last week, the release of iOS 10 marks a major turning point for the software. By opening up internal apps to developers, Apple has offered a major opportunity for businesses to improve and expand the functionality of their apps. Here are a few ways that iOS 10 can help your business.

CISCO INTEGRATION

Apple & Cisco (image via Apple)

While Apple announced their partnership with Cisco in August 2015, iOS 10 introduces the fruits of that partnership. Businesses which utilize Cisco networks and iOS devices will see a major improvement in functionality and compatibility. Companies with Cisco networks would be smart to encourage employees to switch to iOS, and companies which use other networks may want to take note of the new changes as they are designed to improve business processes.

OPTIMIZING WIFI

Finding the right AP can make or break major business processes. As a leading network provider, Cisco understands this issue and has used iOS 10 as an opportunity to address it. Devices with iOS 10 recognize Cisco networks, enabling WiFi optimization and prioritization for business critical apps. So if an employee is walking as they take a WebEx meeting on their iPad, rather than scanning all channels for the next strongest signal, Cisco networks use a 801.11k to provide a list of the top six neighboring APs. This saves time and battery. As iPhones reach the end of a cell, they check the location and create a short list of the next best AP based on signal and utilization.

BUSINESS APP PRIORITIZATION

With the bevy of applications, devices and content constantly occupying business networks, network connections can easily become bogged down, slowing business critical processes. Networks typically give apps the same level of priority, regardless of whether they are business apps like voice, messaging, video conferencing and document sharing, or non-business apps like games, movies and social media apps.

Cisco networks allow users to not only configure QoS (Quality of Service) on company infrastructure, but to control the link from client to AP. Thus, even if a wireless network is congested with different app traffic, businesses can “whitelist” critical apps to prioritize them over noncritical apps. IT managers can even whitelist by SSID, allowing them to customize each user profile so that apps are prioritized by what is critical to the individual’s performance. Users can have different settings for different networks, optimizing connections for apps based on whether they are at their office network, school network, home network or somewhere else.

CISCO SPARK INTEGRATION

iOS 10 also includes CallKit, a new API which allows VoIP apps like Cisco Spark to be built to take advantage of the accessibility of iOS 10. CallKit enables VoIP apps to utilize the native phone app, ensuring continuity of habit with the native iPhone call experience, while allowing for the superior capabilities of Cisco Spark.

TAKEAWAYS

Cisco’s tests on iOS 10 integrated with Cisco networks have yielded the following results:

  • Up to 8 times faster roaming
  • 90 percent reduction in web browsing failures
  • Up to 66 percent more reliable calling
  • Management overhead can be reduced by 50 percent

iMESSAGE FOR BUSINESSES

iMessage (Image via Silicon Angle)

iMessage has opened its doors to developers, and with it, billions of dollars in market potential. Forbes recently commented: “The launch of the iMessage platform will mint a new generation of billionaire entrepreneurs and become the most valuable social platform in the west over the next five years.”

With a billion active iOS devices worldwide, the iMessage app store has 100 times the distribution footprint compared to the App Store when it launched in  2008. The iMessage store allows for Sticker Packs and iMessage Apps for free or purchase. Aside from creating branding opportunities for celebrities and a whole new platform for social gaming, the iMessage app store opens the door for companies to create extension of their existing apps which utilize iMessage. By integrating internal business apps with internal iOS apps, companies can simplify communication by keeping everything on the same thread.

iOS 10 FOR BUSINESSES

Utilizing the latest software will only improve business processes. iOS 10 provides numerous opportunities for businesses to create more efficient business processes and consolidate business communication on personal devices. It also opens the door for a bevy of future possibilities for businesses to take advantage of as the software evolves. Bring it up at the water cooler and you could change your company for the better.

Mind Over Matter: Why Apple Downsized with the iPhone SE

On March 21st, Apple announced a smaller 9.7 inch iPad Pro modela price drop for Apple Watch and new nylon bands, and most importantly, their latest smartphone: the iPhone SE. While the iPhone 6 and 6+ represented the largest phones in Apple history, Apple elected to go smaller with their latest release. The iPhone SE is the size of an iPhone 5 with the processor of an iPhone 6, essentially recycling the aesthetic design of the iPhone with the speed of an iPhone 6.

When it comes to smartphones, screen size matters. Statistics show over half of YouTube views come from mobile devices and the average YouTube session lasts for over 40 minutes. Although people are watching more video than ever on their phones, it doesn’t mean bigger is always better. Many scorned the iPhone 6+ for being too large and clunky. The iPhone SE represents a more affordable option with all the processing power of an iPhone 6 on a smaller screen.

iPhone SE vs. iPhone 6s (via 9 to 5 Mac)

When it comes to specs, the iPhone SE is no slouch. The iPhone SE screen measures at 4.87 x 2.31 x .30 inches, the exact same dimensions as the iPhone 5. Like the iPhone 6, the iPhone SE has retina display. The phone has an A8 chip with 64-bit architecture and an M8 motion coprocessor, like the iPhone 6. While the iPhone 6 has 1334 x 750 pixels (326 PPI), iPhone SE has slightly fewer with 1136 x 640 pixels. The SE’s rear camera is identical to the iPhone 6. The one area in which the SE exceeds the iPhone 6 is in battery life: iPhone SE has 1642 mAh while iPhone 6S has 1715. The SE’s smaller, lower-resolution display ensures users will receive 20% longer 3G internet surfing time on the SE, 30% more 4G, and 20% longer when watching video.

Check out this awesome video review of the iPhone SE by The Verge:

Apple is expected to announce the iPhone 7 in 2017. Techies expect the iPhone 7 to be a major advancement in the Apple lineage. With a large announcement looming, the iPhone SE is designed to diversify their product line with a cost-friendly option to hold Apple lovers over and combat the probability that iPhone sales will decline for the first time in company history in 2016.

At $399 without a contract, Apple seems to be aiming to take a bite out of the cost-friendly Android market. Although the average price for an Android smartphone was about $215 at the end of 2015, the difference may entice those drawn by the allure of Apple products.

Last year, Apple took a big bite out of China. In the 4th Quarter of 2015, iPhone sales grew 33% in China. Having recently lost their crown as largest smartphone vendor in China to Xiaomi, the Chinese market represents a major area of potential growth for Apple. Affordable options with premium processing power have the potential to eat into Android’s sales in rural and urban Chinese markets.

The move to more affordable iPhones began with the iPhone 5c; however, supply chain problems taught Apple that using new material can produce unforeseen difficulties. Foxconn announced that the iPhone 5 was the most difficult device they have ever assembled. By recycling iPhone 5 design, materials, and supply chain, iPhone SE is a much cheaper product to create and manufacture.

Some argue that smartphone UX has not advanced with screen-size and few phones have UX features specifically designed for large-screen devices. Whether or not this influenced Apple’s decision to downsize, the affordability, overseas sales potential, and diversified design certainly make the iPhone SE an attractive device for the company. The question now becomes: will Apple unveil a larger iPhone 7 in 2017 with groundbreaking large-screen UX? We’ll have to wait and see.

Safety First: Mobile Security Is More Than Worth the Investment

Having established the top mobile app trends for 2016 with our blog App to the Future, the Mystic Media blog is currently exploring each of the top trends in greater detail with a five-part series. This week, in Part 3 of our Top Mobile App Development Trends series, we will be examining security.

2015 saw several major data breaches, including 87 million patient records from Anthem and 21.5 million security clearance apps from the U.S. Office of Personnel Management. The European Union is currently crafting a General Data Protection Regulation designed to strengthen and unify data protection.

Gartner correctly predicted that over 75% of mobile applications would fail basic security tests in 2015. Many mobile companies are sacrificing security to attain quicker turn-around on smaller budgets, and the result has been disastrous for many. Even Apple hasn’t been safe from mobile app hacks.

Mobile application security is an integral part of the app development process worthy of the same level of attention as app creators give to design, marketing and functionality. With that in mind, here are some of the top app security trends for 2016:

DevOps Protocol on the Rise

In a recent RackSpace Survey of 700 IT manager and business leaders, 66% of respondents had implemented DevOps practices and 79% of those who had yet to implement DevOps planned to by the end of 2015.

DevOps is an approach to app development that emphasizes collaboration between software development, IT operations, security and quality assurance through all stages of the app development process under one automated umbrella. Utilizing a DevOps protocol improves app security by bringing the IT security team in at an early stage to guide the development process away from potential security threats. App Developers gravitate toward DevOps since it speeds up the time to market while increasing innovation. Like a conveyer belt, DevOps puts a system of checks and balances in place at all stages to ensure that the product will be sufficient for delivery.

By opening up the app development process, security team members can inject security into the code early in the development process and eliminate vulnerabilities before they become threats.

Security Risks In Wearable Tech

Wearable technology is on the rise not only in the marketplace, but as a major security vulnerability for businesses. With the technology in nascent stages, developers have been more concerned with creating a functional strategy for the wearable platform than they have been with improving security. Health and Fitness apps leave users the most vulnerable by constantly monitoring the user’s heartbeat, movement and location. With limited UI and an emphasis on usability, wearables severely lack in security features. App developers looking to create safe apps for this platform will have to innovate and dictate the trends in order to create apps that don’t put the user at risk.

IoT (Internet of Things) & BYOD (Bring-Your-Own-Device)

With the workplace increasingly becoming virtual, malicious hackers acting through the Internet of Things are targeting personal mobile devices in order to find vulnerabilities in businesses.

Bring-Your-Own-Device (BYOD) has increased in popularity in work cultures, each of which represents a potential vulnerability . Smartphone owners generally don’t invest in security on their personal devices with the same thoroughness as a business would when issuing work devices. Due to the boon of mobile work apps, many app developers are cutting corners to meet demand by sacrificing security in service of quicker turnover.

Wise and experienced app developers know you can’t put a price on safety, and they take the necessary precautions to protect the integrity of the app for its users and the app owner.

Major organizations must understand IoT and how it can improve or threaten their business through their employees’ mobile devices. By encouraging a culture of collaboration and welcoming unique expertise into the app development process at an early stage, DevOps practices help ingrain necessary knowledge about IoT and mobile security into organizations.

That’s it for app security! Be on the lookout for part 4 of our series on the top mobile app development trends for 2016 next week when we explore the Internet of Things.