Seriously, SmartWig? Impact of Wearable Technology on IT

Share this story:Tweet about this on Twitter0Share on LinkedIn0Share on Google+0Share on Facebook0

Today Sony brings us the SmartWig, the latest in wearable technology. It has filed a patent application and claims it can be worn “in addition to natural hair”. It will be able to process data. And communicate wirelessly with other external devices. Wearable technology has gone to Sony’s head.

Consumers could use the SmartWig to navigate roads or check blood pressure. The wig will also have practical uses in business. Sony says it can change slides in a presentation by simply raising an eyebrow.

wearable technology

Who’s going to be the spokesperson for the SmartWig?

As silly as it sounds, companies like Google, Sony and Samsung are working under the belief that wearable technology will be a money maker.  Gartner predicts the global wearable computing market could be worth $10 billion in just two years. Juniper Research estimates the market will reach $19 billion in five years.

How does this apply to you? Here are a few ways wearable technology could impact your network.


Consider SmartWigs, watches, glasses and gloves as commonplace as iPhones and Droids. I wear my Samsung Galaxy Gear Smartwatch to work everyday. Wearable gadgets need to pair with an original device like a phone or tablet. This will essentially multiply the number of devices accessing your network. Your wireless bandwidth may take a hit. It will be important to monitor networks for bandwidth hoarders. You don’t want wearable technology slowing down access to critical business applications.


Google Glass enables the wearer to record everything that he/she sees. Similarly, smartwatches have cameras and recording facilities. Discreetly transferring sensitive data outside the network could become as easy as a flick of the wrist or the scratch of an ear. Event and log management could be used for real-time and forensic analysis.

Don’t wig out. Wearable technology is not at the top of many Christmas wish lists this year. What if Gartner and Juniper are close to correct? It may be worth a pause to think about how it may affect network performance and security.






This entry was posted in Application Performance Monitoring, Bandwidth Hoarding, BYOD, Event Log Management and tagged , , . Bookmark the permalink. Trackbacks are closed, but you can post a comment.

Subscribe to our Network Monitor Blog

Blog subscribers get email updates once a week.

Post a Comment

Your email is never published nor shared. Required fields are marked *


You may use these HTML tags and attributes <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>

  • Subscribe to our mailing list

    * indicates required
  • Categories

  • Featured Content

    9 Noble Truths of Network, Server and Application Monitoring

    Ipswitch 9 Noble Truths of Network, Server and Application Monitoring

    How IT teams can thrive while dealing with complexity

  • Recent Posts