(707) 268-8850    Get SUPPORT

Network Management Services Blog

The Internet of Things Gives Great Power to Our Phones

The Internet of Things Gives Great Power to Our Phones

The Internet of Things is a bit of a paradox in and of itself. It has been leveraged to accomplish great things, but at the same time, it can be used in a way that can create considerable problems. However, innovations have proven that the IoT isn’t going anywhere, anytime soon, especially now that it can use the devices that we carry in our pockets.

Taking the IoT to New Heights
Smartphones are notorious for swiftly becoming obsolete, which means that there is a great opportunity to repurpose them and give them new life as a critical component of an IoT device. Just ask NASA.

The National Aeronautics and Space Administration has long been sending satellites into orbit - despite the intense costs to construct them, let alone get them where they need to go. To help decrease these costs without sacrificing the insight that these satellites provide, NASA started the PhoneSat Project in 2009. Rather than sending a few conventional, expensive satellites into orbit, many nanosatellites can be built from off-the-shelf components and sent into space. These nanosatellites rely on smartphones in order to function.

This initiative has appeared to be very successful, as version 2.4 of PhoneSat, “CubeSat,” reentered the atmosphere on January 31, 2017 after spending more than three years orbiting Earth. These nanosatellites have a relatively tiny price tag of $8000, and have, thus far, proved massively successful.

Bringing the IoT Down to Earth
Of course, the IoT has far more uses that are much more practical to the user who is not affiliated with NASA. Samsung Electronics created a team whose task was to figure out ways of taking older models from the Galaxy line of phones and figuring out how to leverage them as an IoT device. This “Galaxy Upcycling” team created a huge variety of IoT-powered purposes - including a few for the owners of hungry pets. The Smart Fish Tank they developed could feed the fish through a text message, and the Smart Pet Bowl would send the doting pet owner a picture whenever Fido or Fluffy chows down. This project has since been completed, the final product anticipated to be released soon.

Security Concerns
Of course, the same issues plague the IoT powered by a smartphone as have plagued all IoT devices that have come before: namely, security concerns. The IoT is notorious for its devices not having sufficient security installed, and often have no real way to update later. Time will only tell if this will eventually be a fatal flaw for the IoT, or if it will be overcome.

What do you think? Would you consider using an old smartphone to make another object smarter? Tell us why or why not in the comments!

Know Your Tech: Wizard
Is Blockchain the Future of Cybersecurity?
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, February 16 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Cloud Best Practices Network Security Business Computing Privacy Managed IT Services Hackers Malware Data Backup Backup Hosted Solutions Mobile Devices VoIP Innovation Email Google Outsourced IT Tech Term Data Recovery Data IT Support Saving Money Internet Internet of Things Microsoft IT Services Software Cloud Computing Communications Hardware BDR Business Continuity Efficiency Cybersecurity Ransomware Smartphones Business Communication Small Business Cybercrime User Tips Server Disaster Recovery Android Artificial Intelligence Network Computers Alert Managed IT Services Smartphone Windows Avoiding Downtime Gadgets Save Money Browser How To Managed IT Miscellaneous Workplace Tips Business Intelligence Mobility Social Media Money Mobile Device Management Business Management Data Security Data Protection Windows 10 Collaboration Two-factor Authentication Computer Vulnerability Router Passwords BYOD Social Engineering Chrome Law Enforcement Phishing Firewall Productivity Applications Telephone Systems Upgrade Proactive IT Connectivity IT Support Spam VPN Redundancy Managed Service Provider Document Management Private Cloud Compliance Identity Theft Facebook Blockchain Budget Remote Monitoring Word Productivity Virtualization Operating System Flexibility Office 365 Bandwidth App Infrastructure Mobile Computing Value Solid State Drive Holiday Hacking Spam Blocking Networking Password Sports Bring Your Own Device Information Windows 10 File Sharing Business Owner Automation Unified Threat Management Physical Security Information Technology Data loss Work/Life Balance CES Wi-Fi Government Managed Service Comparison OneNote IT Management Encryption Google Drive Content Management Paperless Office Training Workers Windows 7 Access Control Apps Quick Tips Smart Tech Virtual Assistant Employer-Employee Relationship IT Plan Settings Public Cloud Update Microsoft Office Data Breach Data storage Credit Cards Content Filtering Office Tips Unsupported Software Mobile Device Analysis Big Data Data Storage Website Servers eWaste Wire Conferencing Monitor History Excel Workforce USB Fraud Practices Root Cause Analysis Botnet Storage Electronic Medical Records Network Congestion Software Tips Accountants Safe Mode FENG Start Menu MSP Google Docs Staff Electronic Health Records Internet exploMicrosoft HVAC Flash PDF Black Market Fiber-Optic Travel Data Management Criminal Tip of the week Telecommuting Amazon Hosted Computing Meetings Password Manager IT Consultant Cortana Keyboard Office Mobile Remote Worker Data Warehousing Voice over Internet Protocol Digital Signature Machine Learning Advertising Enterprise Content Management Windows 10s Cables Devices Supercomputer Smart Office User Error Windows Server 2008 Remote Work Hosted Solution Amazon Web Services Inventory Emergency Business Mangement Addiction Leadership Colocation HBO IoT SaaS Relocation Business Technology Professional Services Hiring/Firing Health Wiring Multi-Factor Security Legal Risk Management YouTube Augmented Reality Cleaning Netflix Password Management Sync Education Unified Communications Thought Leadership Screen Mirroring Software as a Service Wireless Technology Recovery Online Shopping Patch Management Gmail Cache Safety Computing Infrastructure Outlook Specifications IBM Humor CrashOverride Tools Save Time Current Events Files Camera Trending Strategy The Internet of Things Computer Care NIST Audit Telephony Theft Marketing Streaming Media Hacker Cast HaaS Students Reputation Internet Exlporer Regulations Evernote Authentication Scam Apple Recycling Wireless Internet webinar Frequently Asked Questions Millennials Insurance Telephone System Downtime Content Filter Knowledge Lifestyle HIPAA Samsung Hybrid Cloud Cryptocurrency Computer Fan Skype Google Apps Entertainment Human Resources Healthcare Charger Emails Customer End of Support Wireless Charging Nanotechnology Hard Drives iPhone Automobile Customer Service Books Television Search Regulation Mobile Office Worker Commute Domains Webinar Benefits Wireless Worker Instant Messaging Troubleshooting Public Computer Twitter Video Games Loyalty Public Speaking IT solutions Battery Smart Technology Techology Presentation Rootkit How to Lithium-ion battery Employer Employee Relationship Remote Computing Experience Content 5G Tech Support Proactive Computer Accessories Scalability Music Fun Two Factor Authentication Best Practice Politics Company Culture Remote Monitoring and Maintenance Audiobook Vendor Management Shadow IT Competition Bluetooth Administration Wearable Technology Customer Relationship Management Assessment IP Address Printers Managing Stress Virtual Reality Line of Business WiFi Users Transportation