(707) 268-8850    Get SUPPORT

Network Management Services Blog

The Internet of Things Gives Great Power to Our Phones

The Internet of Things Gives Great Power to Our Phones

The Internet of Things is a bit of a paradox in and of itself. It has been leveraged to accomplish great things, but at the same time, it can be used in a way that can create considerable problems. However, innovations have proven that the IoT isn’t going anywhere, anytime soon, especially now that it can use the devices that we carry in our pockets.

Taking the IoT to New Heights
Smartphones are notorious for swiftly becoming obsolete, which means that there is a great opportunity to repurpose them and give them new life as a critical component of an IoT device. Just ask NASA.

The National Aeronautics and Space Administration has long been sending satellites into orbit - despite the intense costs to construct them, let alone get them where they need to go. To help decrease these costs without sacrificing the insight that these satellites provide, NASA started the PhoneSat Project in 2009. Rather than sending a few conventional, expensive satellites into orbit, many nanosatellites can be built from off-the-shelf components and sent into space. These nanosatellites rely on smartphones in order to function.

This initiative has appeared to be very successful, as version 2.4 of PhoneSat, “CubeSat,” reentered the atmosphere on January 31, 2017 after spending more than three years orbiting Earth. These nanosatellites have a relatively tiny price tag of $8000, and have, thus far, proved massively successful.

Bringing the IoT Down to Earth
Of course, the IoT has far more uses that are much more practical to the user who is not affiliated with NASA. Samsung Electronics created a team whose task was to figure out ways of taking older models from the Galaxy line of phones and figuring out how to leverage them as an IoT device. This “Galaxy Upcycling” team created a huge variety of IoT-powered purposes - including a few for the owners of hungry pets. The Smart Fish Tank they developed could feed the fish through a text message, and the Smart Pet Bowl would send the doting pet owner a picture whenever Fido or Fluffy chows down. This project has since been completed, the final product anticipated to be released soon.

Security Concerns
Of course, the same issues plague the IoT powered by a smartphone as have plagued all IoT devices that have come before: namely, security concerns. The IoT is notorious for its devices not having sufficient security installed, and often have no real way to update later. Time will only tell if this will eventually be a fatal flaw for the IoT, or if it will be overcome.

What do you think? Would you consider using an old smartphone to make another object smarter? Tell us why or why not in the comments!

Know Your Tech: Wizard
Is Blockchain the Future of Cybersecurity?
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, November 15 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Cloud Best Practices Network Security Business Computing Privacy Managed IT Services Hackers Malware Data Backup Hosted Solutions Innovation Backup Mobile Devices VoIP Email Google Data Recovery Data Outsourced IT Tech Term IT Support Microsoft Software Internet of Things Cloud Computing Saving Money Internet IT Services Business Continuity Efficiency BDR Communications Hardware Communication Cybercrime Small Business Ransomware Smartphones Business Cybersecurity Server Disaster Recovery Android User Tips Artificial Intelligence Avoiding Downtime Save Money Managed IT Managed IT Services Gadgets Network Browser Computers Alert Smartphone How To Windows Applications Two-factor Authentication Computer Passwords Business Management Vulnerability Productivity Workplace Tips Mobility Chrome Phishing Firewall Money Collaboration Miscellaneous Social Media Router Business Intelligence BYOD Mobile Device Management Data Security Data Protection Social Engineering Windows 10 Law Enforcement Proactive IT Redundancy Blockchain IT Support Remote Monitoring Operating System Flexibility Virtualization Connectivity Budget Telephone Systems Compliance Word Office 365 VPN Upgrade Document Management Managed Service Provider Productivity Spam Bandwidth Private Cloud Identity Theft Facebook Wi-Fi Quick Tips Networking Public Cloud Bring Your Own Device Data loss Employer-Employee Relationship Credit Cards Comparison Office Tips Information OneNote Analysis Data storage File Sharing Unified Threat Management Mobile Device IT Management Windows 7 Apps Infrastructure App Managed Service Microsoft Office Solid State Drive IT Plan Training Workers Sports Holiday Update Big Data Hacking Password Unsupported Software Website Business Owner Virtual Assistant Settings Information Technology Servers CES Data Breach Data Storage Physical Security Work/Life Balance Content Filtering Automation Mobile Computing Government Encryption Access Control Spam Blocking Content Management Paperless Office Windows 10 Google Drive Smart Tech Value Evernote Computing Infrastructure Authentication Safe Mode Windows 10s Humor Students Data Warehousing Voice over Internet Protocol HVAC Windows Server 2008 Remote Work Recycling HaaS Wireless Internet MSP Files Insurance IT Consultant HBO Augmented Reality Reputation Google Apps Internet Exlporer Content Filter Professional Services Apple Wireless Technology Wireless Charging Nanotechnology Sync Human Resources Healthcare HIPAA Supercomputer Multi-Factor Security Practices Enterprise Content Management IBM eWaste Hybrid Cloud Wire Entertainment Remote Worker Emergency Screen Mirroring Software as a Service Safety Fraud Leadership Outlook Specifications The Internet of Things Customer End of Support Storage SaaS CrashOverride Tools Marketing Hacker Hard Drives iPhone Accountants USB Trending Monitor Fiber-Optic History Business Technology Cleaning Netflix Audit Telephony Staff Electronic Health Records Amazon PDF Hosted Computing Black Market Password Management Regulations Criminal Wiring Patch Management Cast Frequently Asked Questions Millennials Password Manager Internet exploMicrosoft Data Management Downtime Lifestyle Cables Devices Computer Care Computer Fan Skype Digital Signature Machine Learning Keyboard Current Events Cortana Amazon Web Services Inventory NIST Office Smart Office Camera Scam webinar Excel Workforce Business Mangement Advertising Addiction Root Cause Analysis Botnet IoT Hosted Solution Software Tips Unified Communications User Error Thought Leadership Telephone System Samsung FENG Start Menu YouTube Knowledge Online Shopping Colocation Education Cryptocurrency Charger Emails Flash Relocation Legal Risk Management Google Docs Conferencing Tip of the week Telecommuting Gmail Cache Meetings Travel Hiring/Firing Health Recovery Theft Streaming Media Save Time Mobile Strategy Electronic Medical Records Network Congestion Presentation Webinar Fun Best Practice Politics Benefits Worker Audiobook Public Computer Lithium-ion battery Shadow IT Loyalty Managing Stress Wearable Technology 5G Administration Virtual Reality IT solutions Tech Support Smart Technology Rootkit Employer Employee Relationship Automobile Worker Commute Search Customer Relationship Management Competition Computer Accessories Twitter Proactive IP Address Instant Messaging Troubleshooting Users Video Games Two Factor Authentication Battery Vendor Management Customer Service WiFi Bluetooth Techology Remote Monitoring and Maintenance Assessment Mobile Office How to Domains Remote Computing Experience Wireless Printers Transportation Content Line of Business Books Television Public Speaking Regulation Scalability Company Culture Music