Female Rep 3


 "Quality is Job One"

Have IT Questions?
Call us now (888) 894-6411


The Internet of Things Gives Great Power to Our Phones

The Internet of Things Gives Great Power to Our Phones

The Internet of Things is a bit of a paradox in and of itself. It has been leveraged to accomplish great things, but at the same time, it can be used in a way that can create considerable problems. However, innovations have proven that the IoT isn’t going anywhere, anytime soon, especially now that it can use the devices that we carry in our pockets.

Taking the IoT to New Heights
Smartphones are notorious for swiftly becoming obsolete, which means that there is a great opportunity to repurpose them and give them new life as a critical component of an IoT device. Just ask NASA.

The National Aeronautics and Space Administration has long been sending satellites into orbit - despite the intense costs to construct them, let alone get them where they need to go. To help decrease these costs without sacrificing the insight that these satellites provide, NASA started the PhoneSat Project in 2009. Rather than sending a few conventional, expensive satellites into orbit, many nanosatellites can be built from off-the-shelf components and sent into space. These nanosatellites rely on smartphones in order to function.

This initiative has appeared to be very successful, as version 2.4 of PhoneSat, “CubeSat,” reentered the atmosphere on January 31, 2017 after spending more than three years orbiting Earth. These nanosatellites have a relatively tiny price tag of $8000, and have, thus far, proved massively successful.

Bringing the IoT Down to Earth
Of course, the IoT has far more uses that are much more practical to the user who is not affiliated with NASA. Samsung Electronics created a team whose task was to figure out ways of taking older models from the Galaxy line of phones and figuring out how to leverage them as an IoT device. This “Galaxy Upcycling” team created a huge variety of IoT-powered purposes - including a few for the owners of hungry pets. The Smart Fish Tank they developed could feed the fish through a text message, and the Smart Pet Bowl would send the doting pet owner a picture whenever Fido or Fluffy chows down. This project has since been completed, the final product anticipated to be released soon.

Security Concerns
Of course, the same issues plague the IoT powered by a smartphone as have plagued all IoT devices that have come before: namely, security concerns. The IoT is notorious for its devices not having sufficient security installed, and often have no real way to update later. Time will only tell if this will eventually be a fatal flaw for the IoT, or if it will be overcome.

What do you think? Would you consider using an old smartphone to make another object smarter? Tell us why or why not in the comments!

Know Your Tech: Wizard
5G is Still Going to Take A While

Related Posts



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, September 21 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!


Our 10 Benefits

Our 10 Benefits Whitepaper

This whitepaper will evaluate the differences between traditional technical support practices and modern managed IT practices and the pros and cons of both in regards to small and medium-sized businesses.

Download Now!   Need A Consultation?

Tag Cloud

Security Tip of the Week Best Practices Cloud Privacy Technology Business Computing Hackers Network Security Backup Malware Hosted Solutions Mobile Devices Google Microsoft VoIP Email Data bgc roundup Software nonprofit Disaster Recovery Alert Managed IT Services Business Continuity Outsourced IT Innovation Internet Business Smartphones Hardware IT Services Tech Term communications Windows 10 Ransomware Saving Money Managed IT Services Cybercrime Android Data Backup Server Browser Computer Cloud Computing Computers Efficiency Small Business Internet of Things IT Support Network Office Windows BDR Passwords Data Recovery Smartphone User Tips Quick Tips Save Money Business Management Productivity Telephone Systems BYOD Miscellaneous Recovery Communication Applications Artificial Intelligence Mobile Device Management Money Managed IT Social Engineering Cybersecurity IT Support Mobility Work/Life Balance Social Media Phishing Virtualization Upgrade Law Enforcement Workplace Tips Hacking Facebook Collaboration Gadgets Productivity Vulnerability Firewall Health Compliance Managed Service Provider App Chrome Wi-Fi Microsoft Office Data Protection Password VPN Holiday Windows 10 Office 365 Proactive IT Two-factor Authentication Remote Monitoring Private Cloud Bandwidth Bring Your Own Device Router Office Tips Avoiding Downtime Flexibility Budget Automation How To Redundancy Safety Data Breach Google Drive Remote Computing Information Technology History Data Security HaaS Black Market Sports Identity Theft Operating System Connectivity Mobile Computing Business Intelligence Value Mobile Device Word Apps Data Management YouTube Employer-Employee Relationship Content Management USB Windows 7 Keyboard Unified Threat Management Spam Blocking Spam Entertainment Battery Content Filtering Hiring/Firing Blockchain Virtual Assistant Unsupported Software SaaS Business Owner Government PDF Data Storage Website Cleaning Computing Infrastructure Training Workers Emergency Solid State Drive The Internet of Things Big Data Marketing Document Management IT Management Computer Care Patch Management Infrastructure Paperless Office OneNote Legal Comparison Save Time Servers HIPAA Physical Security IT Plan Samsung Scam Risk Management Update Charger Settings Information Automobile Electronic Medical Records CES Credit Cards End of Support Data storage Wireless Technology Worker Encryption Managed Service Devices Downtime Sync Wireless Charging How to Safe Mode Wireless Data Warehousing Lifestyle Loyalty Computer Fan Access Control Fraud Benefits Knowledge Gmail Networking Reputation Advertising Cast Google Docs Worker Commute Workforce Video Games Cortana Wire Monitor Colocation Mobile Rootkit Accountants MSP Hard Drives FENG Thought Leadership Robot Telephony Fiber-Optic Troubleshooting Authentication Regulations Amazon Smart Technology Network Congestion Scalability Recycling Experience Enterprise Content Management Customers Windows 10s Frequently Asked Questions Telecommuting Google Apps Smart Office Professional Services Education File Sharing Relocation Twitter Files Skype Cables Employer Employee Relationship webinar Human Resources Telephone System Software Tips Techology Nanotechnology Camera Amazon Web Services Two Factor Authentication eWaste Password Management Voice over Internet Protocol Public Cloud Humor Laptop Excel Remote Work IBM Hacker Chromecast Meetings Software as a Service Vendor Management Practices Augmented Reality Assessment Addiction Start Menu Unified Communications Computer Accessories Conferencing Shadow IT Staff Books Regulation Smart Tech Apple Online Shopping IT Consultant Instant Messaging Criminal NIST Multi-Factor Security Touchpad Tip of the week Supercomputer Password Manager Machine Learning Internet Exlporer Data loss Users Hosted Computing Remote Worker Specifications Television CrashOverride Best Practice Content Cache NarrowBand Tools Theft Bluetooth Netflix Digital Signature Hosted Solution HBO iPhone Flash Evernote Leadership Search Cryptocurrency Trending Audit Windows Server 2008 Transportation Current Events Business Mangement Politics HVAC Screen Mirroring WiFi Virtual Reality Inventory Wiring Outlook Millennials Public Computer Audiobook Wireless Internet User Error Going Green GDPR Thank You E-Commerce Congratulations nonprofits Printers