Attend IT Blog

Attend IT Limited has been serving the Brentford area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Could an AI-Enhanced Wearable Proactively Monitor Your Health?

Could an AI-Enhanced Wearable Proactively Monitor Your Health?

While we typically focus on how various technologies can be used in business applications as a way to boost a small or medium-sized organization’s capabilities, we occasionally come across a topic that is just undeniably cool (and that we can bring back around to business concerns, to boot). We recently heard about the development of a flexible new wearable that uses AI to monitor the health of the wearer that we wanted to discuss with you.

Let’s examine this developing technology and consider a few ways that the same concepts could eventually make their way into modern businesses.

Researchers at the University of Chicago are Developing a Health Monitor Housed in an Adhesive Patch

Under the leadership of Assistant Professor Sihong Wang—who, incidentally, was named one of MIT’s 35 Innovators Under 35 in 2020 for precisely this work—the team at the Pritzker School of Molecular Engineering has been generating a chip that uses machine learning to process data collected from various biosensors. By creating this chip using flexible polymers, it effectively becomes a sticker, capable of utilizing artificial intelligence and machine learning to draw conclusions about the wearer’s health.

As Wang puts it, “With this work we’ve bridged wearable technology with artificial intelligence and machine learning to create a powerful device which can analyze health data right on our own bodies.”

Should their work pan out (as it seems to be), this will mean that wearable biosensors will one day be available to assist us in managing our health, helping us to keep track of various health indicators like blood sugar, oxygen levels, and other metabolites. So far, they’ve shown that this technology can accurately track electrocardiogram data, and the potential for these devices is considerable.

It is important to recognize, however, that this data is inherently sensitive in nature. This means that it will be important to focus on how this data is to be secured.

There’s a Lot Here That Could Play into Business Operations

While a flexible diagnostic chip may have limited functionality in the office space, it demonstrates how capable technology can potentially be—largely independent of human interaction in many cases. Instead of a neuromorphic computing chip meant to collect and analyze health data, businesses now have access to tools that can independently track data, kicking off workflows based on certain inputs and automating many processes.

In short, while the team at the Pritzker School are focused on proactively monitoring human health, your business has the opportunity to use IT to proactively monitor your technology infrastructure.

We’re here to help you embrace this opportunity, ensuring that you do so securely and effectively. Learn more by giving us a call at 020 8626 4485.

How to Tell If an Upgrade is In Order
With Innovation Lagging, How Should You Choose You...
 

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Business Computing Network Security Productivity Best Practices Cloud Tip of the Week Managed IT Services Data Backup IT Services communications Data Recovery Hackers Disaster Recovery Data Business IT Support VoIP Privacy Hosted Solutions Innovation Backup Cybersecurity Malware Small Business Software Mobile Devices Efficiency Business Continuity Hardware Computer Outsourced IT Internet Cloud Computing Email Phishing Business Management BDR Automation Saving Money Productivity IT Support Internet of Things User Tips Collaboration Information Technology Microsoft Ransomware Smartphones Upgrade Server Smartphone Managed IT Managed IT services Covid-19 Mobility Mobile Device Management Risk Management Budget Workplace Tips Compliance Meetings Workplace Strategy Save Money Managed Service Provider BYOD Training Users Communication Network Artificial Intelligence Passwords Avoiding Downtime Remote Human Resources Gadgets Spam Quick Tips Remote Workers Wi-Fi Google Mobile Device Windows 7 Computers Employee-Employer Relationship Android Printing Wireless Time Management Firewall Document Management Virtual Private Network History MSP Content Filtering Hosted Solution Windows 10 VPN Remote Work Data Management Microsoft Office Remote Computing Networking Managed Service Password Chrome Cost Management Instant Messaging Paperless Office Manufacturing Personal Information Project Management Employer-Employee Relationship Mobile Office Conferencing Value Backup and Disaster Recovery Software as a Service Government Recovery Marketing Wireless Internet Telephone Systems Router Saving Time Computing Data Breach Hacker Maintenance Printer Data Security End of Support Help Desk Redundancy Encryption Hard Drives Tech Term IT Service Monitoring Social Media Mobile Audit Laptop Telephony Printers Solid State Drive Office Hybrid Cloud Big Data Machine Learning Automobile Video Conferencing Information Voice over Internet Protocol Business Technology Devices Managed Services Business Telephone Lifestyle The Internet of Things Unified Communications Administration Travel Browser Windows 11 Connectivity Outsourcing Holiday Wireless Technology Azure Outsource IT WPA3 Education Cleaning e-waste Fiber Optics Work/Life Balance Troubleshooting Social Engineering Wasting Money Spyware Commerce Hacking Smartwatch Computer Repair IoT Bitcoin Remote Monitoring Colocation Phone System Cybersecurty Upgrades Streaming Media File Sharing Money Entertainment SMB Samsung Active Directory Business Intelligence File Storage Application Windows Server 2008 Office 365 Development Workstations Customer Service Amazon Disaster Black Market Break/Fix Window 10 Apple Save Time Smart Technology Dark Web Finance Payroll Current Events Downtime Cabling Content Filter intranet Remote Working Gamification HIPAA Flexibility Windows Server Evernote App Bandwidth Battery Two-factor Authentication Employees Inventory Management Telephone iPhone Transportation Copier Analysis Virtual Assistant Electronic Medical Records Online Storage User Error Infrastructure Virtualization Windows 10 Cybercrime E-Commerce Word PCI DSS Proactive IT Private Cloud Vulnerability Regulation Facebook Company Culture SaaS Managed IT Service Hiring/Firing Chromebook Operating System Copiers Employer/Employee Relationships Going Green OneNote Alexa for Business Customer Relationship Management Mobile Computing Data Loss Applications Management Nanotechnology Videoconferencing Shadow IT Advertising Payment Cards Regulations Compliance Data Protection Voiceover Internet Protocol Blockchain Leadership Students Utility Computing Update Professional Services Workers RMM Smart Tech Vendor Cost Antivirus Legal Vendor Management Financial Technology Proactive AI Streaming Going Paperless PC Identities Biometrics Keyboard Shortcuts Experience Humor Updates Unified Threat Management Audits Screen Mirroring Microsoft Excel Windows 10s Outlook PowerPoint Accessory Search Adobe Robot Wireless Charging Settings Authentication Identity Display Websites Augmented Reality Computer Tips Virtual Reality PDF Best Practice Facebook Privacy Policy Print Management Legislation Computer Fan How To Tablets Microsoft Word Solutions Cast Supply Chain Testing Hard Disk Drive Innovations Shortcut Remote Management Peripheral WannaCry Business Strategy Internet Service Provider Windows 8.1 Data Privacy Worker YouTube Healthcare Google Assistant Co-Managed Services Relocation CRM Gifts Data Theft Apps Miscellaneous Tech Support Procedure Law Enforcement Server Maintenance Inventory Comparison Language Financial Music Myths NFL Consultant Camera Storage Excel Telephone System Access Control Licensing Voice Hard Drive Holidays Emails Organization IT Solutions Twitter Video Games Computer Accessories Keyboard Television CrashOverride Text Messaging 5G Fraud Projects Reputation Investment Communitications Specifications Computer Care Bring Your Own Device Analytics Threats eWaste HBO Environment Sports IT budget Reviews Print Memory Admin Scalability Security Cameras Processor Workstation Point of Sale OneDrive Edge Webinar WIndows Server 2008 Computer Forensics Hyperlink Health Micrsosoft Credit Cards Net Neutrality Work App store Office Tips Safety Medical IT Identity Theft ROI Hosted Desktop Sales Virus Unsupported Software Scams Windows Ink Google Drive Device Security Touchscreen Workplace Strategies Cortana iOS Sync Database Internet Exlporer Politics Charger Benchmarks WiFi Telework Data Storage HaaS Sabotage Google Docs Alert Ciminal IT solutions Patch Management SSD Gmail Wasting Time Windows Digital Signage FAQ Mobile Security Managing Stress Emergency eCommerce Social Worker Commute Scam Windows Server 2008 R2 Smart Devices Retail Root Cause Analysis USB Books Employee Managed Services Provider Google Maps IT Management