Browse Definitions :
Definition

wearables OS (wearables operating system)

Contributor(s): Matthew Haughn

A wearable OS is an operating system designed or refactored to satisfy the requirements of wearable computers, which can be significantly from one type of device to another and also different from the requirements of both desktop and mobile devices.

Wearable computers include smartwatches, smart rings, embedded clothing, fitness and health monitors in various form factors and headsets, such as Google Glass and Microsoft’s HoloLens.

In addition to the multiplicity of devices and the diversity of their physical sizes, there are two main operational modes: Some wearable devices operate in standalone mode, while others use a wireless connection to an Internet-connected device, typically a smartphone.

Most smartwatches, for example, connect to the user’s smartphone to enable their Web interface. In that case, the wearable OS is essentially a mobile operating system adapted to allow the watch to serve as a user interface.  The watch itself is effectively a wireless Bluetooth adaptor that extends smartphone capabilities to the watch, allowing the user to answer and initiate phone calls, read and dictate email and text messages, get weather reports or sports scores, listen to music or ask a digital assistant a question. 

A standalone smartwatch, on the other hand, is typically dedicated to a particular purpose, such as GSP navigation or healthcare-related data monitoring, recording and transmitting.

Wearable operating systems include Android Wear, Tizen for Wearables, Google Fit, Apple's watchOS and MediaTek’s LinkIt.

.

This was last updated in October 2015

Continue Reading About wearables OS (wearables operating system)

Join the conversation

1 comment

Send me notifications when other members comment.

Please create a username to comment.

Probably, wearable devices will repeat the evolution of their predecessors. At first, there's a variety and little standardization, then the fittest survive and become the mainstream. 
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

SearchSecurity

  • juice jacking

    Juice jacking is a form of hacking that compromises a device's USB charging port or charging cable, allowing hackers to break ...

  • DNS attack

    A DNS attack is an exploit in which an attacker takes advantage of vulnerabilities in the domain name system (DNS).

  • Advanced Encryption Standard (AES)

    The Advanced Encryption Standard, or AES, is a symmetric block cipher chosen by the U.S. government to protect classified ...

SearchHealthIT

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks or ...

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

Close