Skip to main content

Smart Apparel



As technology is evolving at an unbelievable pace, we are not far seeing clothes getting connect to our tech Eco system. Major step has been already taken by some clothing companies and collaborating with tech companies. 

One of the great examples is of Alphabet's Google and Levi Strauss in May 2015 started the concept of making a x-jacket which get connect to the phone provide some necessary features in the jacket itself.

"I think we are going to see a lot of partnerships like that, and that's what is going to push the market forward," he said. "This combination of design and technology is a really important part of the story."

Other smart apparel which are been introduced are the self-tying shoes, clothes showing direction, measuring pulse rate using smart fibre, changing colour in real time.


Earlier in 2017, wearable technology pioneer Polar introduced the Polar Team Pro Shirt, which features heart-rate capture points incorporated into the fabric and a small sensor pod that tracks speed, distance, and acceleration. All data is captured in real time and transmits wirelessly to a mobile device via a special app. Another activewear producer, Athos, has developed shirts and shorts that record muscle activity, calorie burn, and other biometrics.

What's the future of smart apparel?/Will people buy smart clothes?

For mass adoption to occur, consumers will have to overcome a few anxieties. For one, battery-powered clothes, like phones, will carry the risk of exploding. But given the ubiquity of smartphones, wearables, and other personal gadgets, consumers have shown they can live with that risk.

"Over the next few years it will be more experimental, getting consumers comfortable with the idea of having smart apparel," Clinton said. "There's always a bridge where you have to integrate the consumer into the new world. But I think once people see the benefits of the clothes, the demand for them will be pretty significant."

Comments

Post a Comment

Popular posts from this blog

Secure Network(Week 4)

Network hardening is the process of securing a network by reducing its potential vulnerabilities through configuration changes and taking specific steps.   Implicit deny is a network security concept where anything not explicitly permitted or allowed should be denied. Analyzing logs is the practice of collecting logs from different networks and sometimes client devices on your network, then performing an automated analysis on them. Correlation analysis is the process of taking log data from different systems and matching events across the systems. Flood guards provide protection against Dos or denial of service attacks. EAP-TLS is an authentication type supported by EAP that uses TLS to provide mutual authentication of both the client and the authenticating server.   if you really want to lock down your network, you can implement 802.1x . DHCP Snooping Attack Why WEP Encryption fall apart? A general concept in security and encryption is to never send the plain ...

Authentication Authorization Accounting(week 3)

Identification is the idea of describing an entity uniquely. Biometric authentication is the process of using unique physiological characteristics of an individual to identify them. C.R.L(Certificate revocation list) :This is a signed list published by the CA which defines certificates that have been explicitly revoked. Lightweight Directory Access Protocol(LDAP): LDAP is an open industry-standard protocol for accessing and maintaining directory services. Authentication is related to verifying the identity a user, authorization pertains to describing what the user account has access to or doesn't have access to. An access control list or ACL , is a way of defining permissions or authorizations for objects.  RADIUS or Remote Authentication Dial-In User Service , is a protocol that provides AAA services for users on a network.It's a very common protocol used to manage access to internal networks, WiFi networks, email services and VPN services. when a client wants to access a r...

TCP Segment

A TCP segment is made up of a TCP header and a data section. Source Port :  A source port is a high numbered port chosen from a special section of ports known as ephemeral ports. A source port is needed so that when the web server replies, the computer making the original request can send this data to the program that was actually requesting it. It is in this way that when it web server responds to your requests to view a web page that this response gets received by your web browser and not your word processor. Destination Port : port on which the client in request the data( The destination port is the port of the service the traffic is intended for ) Sequence Number :This is a 32-bit number that's used to keep track of where in a sequence of TCP segments this one is expected to be.There are limits to the total size of what we send across the wire. In Ethernet frame, it's usually limited in size to 1,518 bytes, but we usually need to send way more data than that. At the transp...