(707) 268-8850    Get SUPPORT

Network Management Services Blog

The Internet of Things Gives Great Power to Our Phones

The Internet of Things Gives Great Power to Our Phones

The Internet of Things is a bit of a paradox in and of itself. It has been leveraged to accomplish great things, but at the same time, it can be used in a way that can create considerable problems. However, innovations have proven that the IoT isn’t going anywhere, anytime soon, especially now that it can use the devices that we carry in our pockets.

Taking the IoT to New Heights
Smartphones are notorious for swiftly becoming obsolete, which means that there is a great opportunity to repurpose them and give them new life as a critical component of an IoT device. Just ask NASA.

The National Aeronautics and Space Administration has long been sending satellites into orbit - despite the intense costs to construct them, let alone get them where they need to go. To help decrease these costs without sacrificing the insight that these satellites provide, NASA started the PhoneSat Project in 2009. Rather than sending a few conventional, expensive satellites into orbit, many nanosatellites can be built from off-the-shelf components and sent into space. These nanosatellites rely on smartphones in order to function.

This initiative has appeared to be very successful, as version 2.4 of PhoneSat, “CubeSat,” reentered the atmosphere on January 31, 2017 after spending more than three years orbiting Earth. These nanosatellites have a relatively tiny price tag of $8000, and have, thus far, proved massively successful.

Bringing the IoT Down to Earth
Of course, the IoT has far more uses that are much more practical to the user who is not affiliated with NASA. Samsung Electronics created a team whose task was to figure out ways of taking older models from the Galaxy line of phones and figuring out how to leverage them as an IoT device. This “Galaxy Upcycling” team created a huge variety of IoT-powered purposes - including a few for the owners of hungry pets. The Smart Fish Tank they developed could feed the fish through a text message, and the Smart Pet Bowl would send the doting pet owner a picture whenever Fido or Fluffy chows down. This project has since been completed, the final product anticipated to be released soon.

Security Concerns
Of course, the same issues plague the IoT powered by a smartphone as have plagued all IoT devices that have come before: namely, security concerns. The IoT is notorious for its devices not having sufficient security installed, and often have no real way to update later. Time will only tell if this will eventually be a fatal flaw for the IoT, or if it will be overcome.

What do you think? Would you consider using an old smartphone to make another object smarter? Tell us why or why not in the comments!

Know Your Tech: Wizard
Is Blockchain the Future of Cybersecurity?


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, September 19 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Cloud Best Practices Network Security Business Computing Privacy Managed IT Services Hackers Malware Data Backup Backup Hosted Solutions VoIP Innovation Mobile Devices Email Google Tech Term Data Recovery Outsourced IT IT Support Data Cloud Computing Saving Money Internet Microsoft Software Internet of Things Communications Hardware IT Services Business Continuity BDR Efficiency Business Cybercrime Ransomware Cybersecurity Small Business User Tips Smartphones Server Disaster Recovery Communication Android Artificial Intelligence Avoiding Downtime Network Save Money How To Computers Managed IT Smartphone Windows Alert Managed IT Services Gadgets Browser Phishing Miscellaneous Firewall Data Security Data Protection Applications Windows 10 Social Media Mobile Device Management Money Vulnerability Two-factor Authentication Mobility Passwords Business Management Collaboration Social Engineering Productivity Law Enforcement Router Chrome Business Intelligence BYOD Virtualization Operating System Facebook Upgrade Redundancy Spam Productivity Flexibility Bandwidth VPN Workplace Tips Telephone Systems Computer Identity Theft Proactive IT Managed Service Provider IT Support Blockchain Private Cloud Word Budget Document Management Compliance Remote Monitoring Connectivity Office 365 Sports Settings Managed Service Data Breach Data loss CES Office Tips Content Filtering Mobile Device Comparison Hacking Windows 10 OneNote IT Management Encryption Virtual Assistant Access Control Wi-Fi Content Management Paperless Office Windows 7 App Physical Security Solid State Drive Value Smart Tech Automation Holiday Networking IT Plan Government Update Password Bring Your Own Device Apps Google Drive Business Owner Credit Cards Unsupported Software Information Technology Unified Threat Management Analysis Data Storage Quick Tips Microsoft Office Servers Work/Life Balance Employer-Employee Relationship Public Cloud Infrastructure Mobile Computing Big Data Information Data storage Training Website Workers Spam Blocking File Sharing Travel Remote Worker Criminal Tip of the week Telecommuting Enterprise Content Management Hybrid Cloud Save Time Amazon Hosted Computing Meetings Current Events Password Manager Customer End of Support Computer Care Mobile Hard Drives iPhone HaaS Scam Cables Devices Data Warehousing Voice over Internet Protocol Monitor History Digital Signature Windows 10s Machine Learning Business Technology Wiring webinar Smart Office Windows Server 2008 Remote Work Password Management Amazon Web Services Inventory HIPAA Knowledge Business Mangement Addiction HBO Internet exploMicrosoft Samsung IoT Professional Services Entertainment Unified Communications Thought Leadership Multi-Factor Security Charger Emails YouTube Sync Online Shopping Screen Mirroring Software as a Service Cortana USB Conferencing NIST Office Electronic Medical Records Network Congestion Gmail Cache Outlook Specifications Advertising CrashOverride Tools Theft Streaming Media Trending User Error PDF Black Market Augmented Reality Strategy Audit Telephony Telephone System Evernote Authentication Cast Colocation Wireless Technology Students Regulations Cryptocurrency Relocation Data Management Hiring/Firing Health Keyboard IT Consultant Safety Recycling Wireless Internet Frequently Asked Questions Millennials IBM Insurance Downtime Marketing Supercomputer Hacker Google Apps Content Filter Lifestyle The Internet of Things Computer Fan Skype Wireless Charging Nanotechnology Computing Infrastructure Hosted Solution Human Resources Healthcare Safe Mode Humor Emergency MSP Files Leadership eWaste Wire Excel Workforce HVAC SaaS Fraud Practices Root Cause Analysis Botnet Legal Risk Management Storage Software Tips Reputation Internet Exlporer Education Cleaning Netflix Accountants FENG Start Menu Apple Patch Management Fiber-Optic Google Docs Recovery Staff Electronic Health Records Flash Scalability Music Computer Accessories Customer Service Best Practice Politics Two Factor Authentication Mobile Office Twitter Audiobook Shadow IT Vendor Management Domains Search Wearable Technology Bluetooth Wireless Assessment Virtual Reality Proactive Transportation Public Speaking Camera Presentation Automobile Books Television Lithium-ion battery Worker Commute Remote Monitoring and Maintenance Benefits Webinar Company Culture Printers Instant Messaging Troubleshooting Worker 5G Public Computer Tech Support Video Games Loyalty Line of Business Smart Technology Battery IT solutions Managing Stress Regulation WiFi How to Rootkit Fun Techology Remote Computing Experience Employer Employee Relationship Competition Customer Relationship Management IP Address Users Administration Content