recommended reading

2014 Will Be the Year You Actually Want a Smart Watch

A model displays the new Samsung Galaxy Gear after a presentation in Berlin, Germany.

A model displays the new Samsung Galaxy Gear after a presentation in Berlin, Germany. // Gero Breloer/AP

2014 will probably be the year of the smart watch. Apple is expected to unveil one, which might do better than the disappointments from Samsung and Sony. Google will come out with one too (paywall), reports the Wall Street Journal. It could be unlike any other on the market, with a unique two-mode display that is both reflective like e-paper and backlit like an LCD display. Google’s watch may function essentially as a one-inch (2.5 cm) square computer that could be used in a number of settings, not just on your wrist.

Meanwhile, in the health, fitness and life-tracking arena, popular wristbands like the Fitbit, Jawbone’s Up and the Nike Fuelband will be joined by an avalanche of competitors. One of the most interesting is the Basis fitness tracker, which adds so many sensors that it can track heart rate and caloric consumption as well as general activity.

At the same time, the makers of the pioneering Pebble smartwatch have demonstrated something interesting: It’s possible to turn a device widely dismissed as a dud at launch into one that more and more reviewers are finding genuinely useful merely by dint of software upgrades. One big improvement involves the notifications system built into Apple’s iOS 7. Using this system as a common language, any app on an iPhone can now push data—text or graphics—to the Pebble, as well as gather information from the Pebble’s sensors. The result is a plethora of new applications for Pebble, from remembering where you parked your Mercedes to alerting you minutes before it’s going to rain wherever you’re standing.

Read the full story at Quartz.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.


When you download a report, your information may be shared with the underwriters of that document.