Male Rep 2


 "Customer's perception is our reality"

Have IT Questions?
Call us now (888) 894-6411

TWINTEL Solutions Blog

The Internet of Things Gives Great Power to Our Phones

The Internet of Things Gives Great Power to Our Phones

The Internet of Things is a bit of a paradox in and of itself. It has been leveraged to accomplish great things, but at the same time, it can be used in a way that can create considerable problems. However, innovations have proven that the IoT isn’t going anywhere, anytime soon, especially now that it can use the devices that we carry in our pockets.

Taking the IoT to New Heights
Smartphones are notorious for swiftly becoming obsolete, which means that there is a great opportunity to repurpose them and give them new life as a critical component of an IoT device. Just ask NASA.

The National Aeronautics and Space Administration has long been sending satellites into orbit - despite the intense costs to construct them, let alone get them where they need to go. To help decrease these costs without sacrificing the insight that these satellites provide, NASA started the PhoneSat Project in 2009. Rather than sending a few conventional, expensive satellites into orbit, many nanosatellites can be built from off-the-shelf components and sent into space. These nanosatellites rely on smartphones in order to function.

This initiative has appeared to be very successful, as version 2.4 of PhoneSat, “CubeSat,” reentered the atmosphere on January 31, 2017 after spending more than three years orbiting Earth. These nanosatellites have a relatively tiny price tag of $8000, and have, thus far, proved massively successful.

Bringing the IoT Down to Earth
Of course, the IoT has far more uses that are much more practical to the user who is not affiliated with NASA. Samsung Electronics created a team whose task was to figure out ways of taking older models from the Galaxy line of phones and figuring out how to leverage them as an IoT device. This “Galaxy Upcycling” team created a huge variety of IoT-powered purposes - including a few for the owners of hungry pets. The Smart Fish Tank they developed could feed the fish through a text message, and the Smart Pet Bowl would send the doting pet owner a picture whenever Fido or Fluffy chows down. This project has since been completed, the final product anticipated to be released soon.

Security Concerns
Of course, the same issues plague the IoT powered by a smartphone as have plagued all IoT devices that have come before: namely, security concerns. The IoT is notorious for its devices not having sufficient security installed, and often have no real way to update later. Time will only tell if this will eventually be a fatal flaw for the IoT, or if it will be overcome.

What do you think? Would you consider using an old smartphone to make another object smarter? Tell us why or why not in the comments!

Know Your Tech: Wizard
5G is Still Going to Take A While


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, February 20 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!


Our 10 Benefits

Our 10 Benefits Whitepaper

This whitepaper will evaluate the differences between traditional technical support practices and modern managed IT practices and the pros and cons of both in regards to small and medium-sized businesses.

Download Now!   Need A Consultation?

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Privacy Business Computing Hackers Network Security Backup Hosted Solutions Malware Mobile Devices Google VoIP Data Microsoft Disaster Recovery Business Business Continuity bgc communications roundup Email Internet nonprofit Software Outsourced IT Managed IT Services Alert User Tips Innovation IT Services Smartphones Hardware Tech Term Data Backup Productivity Managed IT Services Windows 10 Browser Ransomware Computer Data Recovery Server Saving Money Smartphone Cloud Computing Efficiency IT Support Android Workplace Tips Internet of Things Cybercrime Computers Communication Small Business Business Management Network BDR IT Support Cybersecurity Office Save Money Miscellaneous Productivity Quick Tips Artificial Intelligence Windows Passwords Recovery Gadgets Holiday Mobile Device Management Chrome Applications Telephone Systems Windows 10 BYOD Router Managed IT Money Mobile Device Social Engineering Mobility Proactive IT Health Work/Life Balance Wi-Fi Private Cloud Social Media Office 365 Virtualization Phishing Collaboration Upgrade Law Enforcement Hacking Automation Facebook Vulnerability Firewall App How To Password Bandwidth Bring Your Own Device Compliance Microsoft Office Remote Monitoring Google Drive Managed Service Provider Two-factor Authentication Word Flexibility Budget Information Office Tips Avoiding Downtime VPN Data Protection Keyboard Redundancy Value Remote Computing Voice over Internet Protocol Software as a Service Data Security Sports Servers Mobile Computing Identity Theft Information Technology Data Breach HaaS Save Time Business Intelligence History Black Market Safety Connectivity Operating System Spam Apps Scam Settings Encryption Managed Service The Internet of Things Data Storage Website Data storage Content Management Access Control Electronic Medical Records Entertainment Battery Content Filtering Business Owner IT Management Worker Blockchain Virtual Assistant Employer-Employee Relationship Emergency Government Comparison PDF Unified Threat Management Spam Blocking Big Data Document Management IT Plan Computing Infrastructure Human Resources Telephone System Solid State Drive Update Hiring/Firing Marketing SaaS Legal Infrastructure Paperless Office Cleaning Wireless Technology Hacker Training Workers HIPAA WiFi Risk Management Credit Cards YouTube Machine Learning Physical Security Computer Care Patch Management Automobile Google Docs Windows 7 Fraud CES OneNote Samsung Data Management Unsupported Software End of Support Charger USB Telephony Worker Commute Devices Printer User Error Bluetooth Netflix Bing Regulations Amazon Safe Mode Television CrashOverride Downtime Leadership Video Games Frequently Asked Questions Telecommuting Gmail Networking Wireless Audit Google Search Professional Services Transportation Current Events Chromecast Software Tips Cortana Wire Reputation Advertising Security Cameras Troubleshooting Laptop Skype Cables Accountants MSP Thought Leadership Mouse Monitor Colocation Help Desk Scalability Experience Amazon Web Services Hard Drives Public Computer Meetings Authentication Robot Excel Remote Work Recycling Enterprise Content Management Loyalty Computer Fan Net Neutrality Education File Sharing Benefits Knowledge Google Apps Smart Office Customers Botnet Touchpad Start Menu Unified Communications Techology NarrowBand Multi-Factor Security Twitter Administrator Rootkit Shortcuts Online Shopping Relocation Data loss Nanotechnology Camera Files Tip of the week eWaste Password Management FENG ISP Practices Augmented Reality Smart Technology Network Congestion HBO Specifications Windows 10s Smartwatch Shadow IT Books Tools Theft Trending Addiction Social Instant Messaging Going Green Flash Evernote Staff Regulation Humor Screen Mirroring Smart Tech Printers Employer Employee Relationship webinar Microchip Windows Server 2008 Criminal NIST Users Hosted Computing Remote Worker Apple Two Factor Authentication Best Practice Content Outlook Millennials Password Manager Public Cloud Employee Hosted Solution IBM Data Warehousing Lifestyle Cache Internet Exlporer Vendor Management Vendor Search Sync Wireless Charging Digital Signature Virtual Reality Cast Warranty Computer Accessories Conferencing Search Engine Politics Cryptocurrency Assessment Inventory Wiring iPhone IT Consultant Audiobook Workforce Business Mangement HVAC Digital Signage Mobile Supercomputer Wireless Internet Display How to Fiber-Optic Congratulations GDPR E-Commerce nonprofits Thank You