(707) 268-8850    Get SUPPORT

Network Management Services Blog

The Internet of Things Gives Great Power to Our Phones

The Internet of Things Gives Great Power to Our Phones

The Internet of Things is a bit of a paradox in and of itself. It has been leveraged to accomplish great things, but at the same time, it can be used in a way that can create considerable problems. However, innovations have proven that the IoT isn’t going anywhere, anytime soon, especially now that it can use the devices that we carry in our pockets.

Taking the IoT to New Heights
Smartphones are notorious for swiftly becoming obsolete, which means that there is a great opportunity to repurpose them and give them new life as a critical component of an IoT device. Just ask NASA.

The National Aeronautics and Space Administration has long been sending satellites into orbit - despite the intense costs to construct them, let alone get them where they need to go. To help decrease these costs without sacrificing the insight that these satellites provide, NASA started the PhoneSat Project in 2009. Rather than sending a few conventional, expensive satellites into orbit, many nanosatellites can be built from off-the-shelf components and sent into space. These nanosatellites rely on smartphones in order to function.

This initiative has appeared to be very successful, as version 2.4 of PhoneSat, “CubeSat,” reentered the atmosphere on January 31, 2017 after spending more than three years orbiting Earth. These nanosatellites have a relatively tiny price tag of $8000, and have, thus far, proved massively successful.

Bringing the IoT Down to Earth
Of course, the IoT has far more uses that are much more practical to the user who is not affiliated with NASA. Samsung Electronics created a team whose task was to figure out ways of taking older models from the Galaxy line of phones and figuring out how to leverage them as an IoT device. This “Galaxy Upcycling” team created a huge variety of IoT-powered purposes - including a few for the owners of hungry pets. The Smart Fish Tank they developed could feed the fish through a text message, and the Smart Pet Bowl would send the doting pet owner a picture whenever Fido or Fluffy chows down. This project has since been completed, the final product anticipated to be released soon.

Security Concerns
Of course, the same issues plague the IoT powered by a smartphone as have plagued all IoT devices that have come before: namely, security concerns. The IoT is notorious for its devices not having sufficient security installed, and often have no real way to update later. Time will only tell if this will eventually be a fatal flaw for the IoT, or if it will be overcome.

What do you think? Would you consider using an old smartphone to make another object smarter? Tell us why or why not in the comments!

Know Your Tech: Wizard
5G is Still Going to Take A While
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, July 15 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Cloud Best Practices Network Security Business Computing Privacy Managed IT Services Malware Hackers Backup Data Backup Google VoIP Mobile Devices Hosted Solutions Email IT Support Outsourced IT Innovation Microsoft Software Data Recovery Cloud Computing Business Continuity Saving Money Internet Data Tech Term Internet of Things BDR Efficiency Business Cybercrime Ransomware Communications Small Business IT Services Hardware Cybersecurity Disaster Recovery Android Artificial Intelligence Windows Browser Avoiding Downtime User Tips Smartphones How To Managed IT Server Computers Communication Alert Smartphone Vulnerability Router Chrome Law Enforcement BYOD Social Engineering Phishing Save Money Mobile Device Management Network Two-factor Authentication Business Intelligence Mobility Money Business Management Data Security Data Protection Collaboration Managed IT Services Document Management Gadgets Budget Private Cloud Compliance Office 365 Identity Theft Firewall Upgrade Remote Monitoring Word Social Media Operating System Spam Productivity Virtualization Bandwidth Flexibility Telephone Systems Computer Connectivity Proactive IT VPN Passwords Windows 10 Redundancy Managed Service Provider OneNote Comparison Google Drive IT Management Windows 7 Big Data Content Management Paperless Office Workers Website Smart Tech Facebook Quick Tips Public Cloud Employer-Employee Relationship IT Plan Miscellaneous Data Breach Update Blockchain Credit Cards Content Filtering Office Tips Data storage Unsupported Software Mobile Device Analysis Servers Windows 10 Data Storage App Value Solid State Drive Infrastructure Wi-Fi Spam Blocking Networking Holiday Hacking Bring Your Own Device Password IT Support Business Owner Physical Security Information Technology Automation Apps Productivity Government Data loss Work/Life Balance CES Microsoft Office IoT SaaS Relocation Professional Services Business Mangement Addiction Leadership Colocation HBO Password Management Sync Education Unified Communications Thought Leadership Hiring/Firing Health Multi-Factor Security Legal Risk Management Encryption YouTube Cleaning Netflix Recovery Online Shopping Access Control Patch Management Screen Mirroring Software as a Service Training Humor Virtual Assistant CrashOverride Tools Save Time Gmail Cache Computing Infrastructure Outlook Specifications Settings NIST Audit Telephony Applications Theft Streaming Media Current Events Files Trending Strategy Computer Care Regulations Evernote Authentication Scam Apple Cast HaaS Students Reputation Internet Exlporer Insurance Downtime Recycling Wireless Internet webinar Frequently Asked Questions Millennials Samsung Hybrid Cloud Cryptocurrency Computer Fan Skype Google Apps Content Filter Knowledge Lifestyle HIPAA Wireless Charging Nanotechnology Hard Drives iPhone Entertainment Human Resources Healthcare Charger Emails Customer End of Support USB Fraud Practices Root Cause Analysis Botnet eWaste Wire Conferencing Monitor History Excel Workforce Workplace Tips Safe Mode FENG Start Menu Storage Electronic Medical Records Network Congestion Software Tips Mobile Computing Accountants Internet exploMicrosoft HVAC Flash PDF Black Market Fiber-Optic Google Docs Staff Electronic Health Records Amazon Hosted Computing Meetings Travel Data Management Criminal Sports Tip of the week Telecommuting Office Mobile Password Manager IT Consultant Cortana Keyboard Wireless Technology Advertising Enterprise Content Management Windows 10s IBM Cables Devices Supercomputer Data Warehousing Voice over Internet Protocol Safety Digital Signature Machine Learning Unified Threat Management Remote Work Hosted Solution The Internet of Things Amazon Web Services Inventory Emergency Marketing Hacker Smart Office User Error Windows Server 2008 Business Technology Employer Employee Relationship Remote Computing Experience Customer Relationship Management Competition Content IP Address Fun Users Computer Accessories Scalability Music Customer Service Two Factor Authentication Best Practice Politics Company Culture Shadow IT Audiobook Mobile Office Vendor Management Domains Assessment Telephone System Bluetooth Administration Wearable Technology Virtual Reality Wireless Managing Stress Transportation WiFi Public Speaking Books Television Search Automobile Worker Commute Presentation Benefits Lithium-ion battery Webinar Instant Messaging Troubleshooting Augmented Reality Public Computer Worker Loyalty File Sharing Tech Support Twitter Video Games 5G Battery Smart Technology IT solutions How to Techology Rootkit