Male Rep 4

 

 "There is only one Boss. The Customer"

Have IT Questions?
Call us now (888) 894-6411

Blog

TWINTEL Solutions has been serving the Orange County, Los Angeles County, Riverside County, and San Diego County, areas. Since 2005, TWINTEL has provided IT Support such as technical help desk support, computer support, and overall IT consulting to small and medium-sized businesses.

The Internet of Things Gives Great Power to Our Phones

The Internet of Things Gives Great Power to Our Phones

The Internet of Things is a bit of a paradox in and of itself. It has been leveraged to accomplish great things, but at the same time, it can be used in a way that can create considerable problems. However, innovations have proven that the IoT isn’t going anywhere, anytime soon, especially now that it can use the devices that we carry in our pockets.

Taking the IoT to New Heights
Smartphones are notorious for swiftly becoming obsolete, which means that there is a great opportunity to repurpose them and give them new life as a critical component of an IoT device. Just ask NASA.

The National Aeronautics and Space Administration has long been sending satellites into orbit - despite the intense costs to construct them, let alone get them where they need to go. To help decrease these costs without sacrificing the insight that these satellites provide, NASA started the PhoneSat Project in 2009. Rather than sending a few conventional, expensive satellites into orbit, many nanosatellites can be built from off-the-shelf components and sent into space. These nanosatellites rely on smartphones in order to function.

This initiative has appeared to be very successful, as version 2.4 of PhoneSat, “CubeSat,” reentered the atmosphere on January 31, 2017 after spending more than three years orbiting Earth. These nanosatellites have a relatively tiny price tag of $8000, and have, thus far, proved massively successful.

Bringing the IoT Down to Earth
Of course, the IoT has far more uses that are much more practical to the user who is not affiliated with NASA. Samsung Electronics created a team whose task was to figure out ways of taking older models from the Galaxy line of phones and figuring out how to leverage them as an IoT device. This “Galaxy Upcycling” team created a huge variety of IoT-powered purposes - including a few for the owners of hungry pets. The Smart Fish Tank they developed could feed the fish through a text message, and the Smart Pet Bowl would send the doting pet owner a picture whenever Fido or Fluffy chows down. This project has since been completed, the final product anticipated to be released soon.

Security Concerns
Of course, the same issues plague the IoT powered by a smartphone as have plagued all IoT devices that have come before: namely, security concerns. The IoT is notorious for its devices not having sufficient security installed, and often have no real way to update later. Time will only tell if this will eventually be a fatal flaw for the IoT, or if it will be overcome.

What do you think? Would you consider using an old smartphone to make another object smarter? Tell us why or why not in the comments!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, July 21 2018
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

QR-Code

Our 10 Benefits

Our 10 Benefits Whitepaper

This whitepaper will evaluate the differences between traditional technical support practices and modern managed IT practices and the pros and cons of both in regards to small and medium-sized businesses.

Download Now!   Need A Consultation?

Tag Cloud

Security Tip of the Week Best Practices Privacy Cloud Technology Business Computing Backup Hackers Network Security Malware Hosted Solutions Microsoft VoIP Google roundup nonprofit Mobile Devices Software bgc Managed IT Services Email Disaster Recovery Alert Business Business Continuity Data Outsourced IT Internet communications Windows 10 Innovation Smartphones Ransomware Browser IT Services Cybercrime Android Saving Money Hardware Computers Small Business Managed IT Services Cloud Computing Data Backup Computer Tech Term Server Efficiency IT Support BDR Office Smartphone Business Management Productivity Internet of Things Windows Data Recovery Mobile Device Management Quick Tips Managed IT Telephone Systems Social Engineering Network Recovery Cybersecurity User Tips Save Money Money BYOD Passwords IT Support Communication Law Enforcement Hacking Artificial Intelligence Mobility Collaboration Work/Life Balance Productivity Upgrade Phishing Vulnerability Virtualization Budget Private Cloud Bandwidth Flexibility Automation Avoiding Downtime Holiday Managed Service Provider Two-factor Authentication Health VPN Office 365 Proactive IT Social Media Microsoft Office How To Miscellaneous Applications Bring Your Own Device Firewall Facebook Chrome Router Office Tips App Remote Monitoring Wi-Fi Password Data Protection Value Gadgets Google Drive HaaS Data Security Operating System Connectivity Apps Windows 10 Safety Redundancy Workplace Tips Remote Computing Compliance Information Technology History Black Market Identity Theft Mobile Device Data Breach Business Intelligence Word Government Document Management Infrastructure Computing Infrastructure Worker Marketing Save Time Paperless Office USB Sports Entertainment Comparison Automobile Mobile Computing Servers SaaS Physical Security Update Workers Wireless Technology Data Management Big Data End of Support Data storage Battery OneNote Spam Charger Risk Management Electronic Medical Records Website PDF Data Storage Solid State Drive Legal IT Management Employer-Employee Relationship Spam Blocking Keyboard Content Filtering Hiring/Firing CES IT Plan Cleaning Emergency Content Management YouTube Credit Cards Computer Care Patch Management Blockchain Windows 7 Samsung HIPAA Business Owner Scam Unsupported Software The Internet of Things Amazon Techology Regulations Audit Smart Office Customers Transportation Laptop Professional Services Current Events Telephone System Software Tips Nanotechnology Audiobook Staff Shadow IT Amazon Web Services Computer Fan Loyalty Benefits Password Manager Touchpad Software as a Service Hacker Knowledge Rootkit Smart Tech Digital Signature NarrowBand Online Shopping FENG Apple Machine Learning Troubleshooting Smart Technology Business Mangement Internet Exlporer Network Congestion HBO Training Encryption Specifications Evernote Flash iPhone HVAC Two Factor Authentication Gmail WiFi Screen Mirroring Outlook Vendor Management Devices Accountants Millennials Wireless Charging Sync Assessment Networking Books Recycling Scalability Google Docs Advertising Cast IT Consultant Hard Drives Settings Thought Leadership Monitor Education Workforce Fiber-Optic Telephony CrashOverride Television Enterprise Content Management Hosted Solution eWaste Leadership Frequently Asked Questions Relocation Twitter Politics Practices Telecommuting Chromecast Cables Skype Meetings Files Public Computer Password Management Criminal Instant Messaging Voice over Internet Protocol Excel Humor Unified Threat Management Addiction Hosted Computing Users Remote Work Content Unified Communications Best Practice Start Menu Data loss NIST Search Multi-Factor Security Tip of the week Windows 10s Cache Experience Inventory Virtual Reality Theft Going Green Tools Cryptocurrency webinar Employer Employee Relationship How to Trending Windows Server 2008 Public Cloud Wireless Internet Access Control Worker Commute Cortana Video Games User Error IBM Safe Mode Data Warehousing Conferencing Computer Accessories Downtime Lifestyle Wireless Fraud Wire Authentication Reputation Google Apps Mobile Colocation Supercomputer Virtual Assistant Netflix Bluetooth Human Resources Robot nonprofits Thank You Congratulations