Male Rep 3V1

 

 "Exceeding Customer Expectations"

Have IT Questions?
Call us now (888) 894-6411

TWINTEL Solutions Blog

The Internet of Things Gives Great Power to Our Phones

The Internet of Things Gives Great Power to Our Phones

The Internet of Things is a bit of a paradox in and of itself. It has been leveraged to accomplish great things, but at the same time, it can be used in a way that can create considerable problems. However, innovations have proven that the IoT isn’t going anywhere, anytime soon, especially now that it can use the devices that we carry in our pockets.

Taking the IoT to New Heights
Smartphones are notorious for swiftly becoming obsolete, which means that there is a great opportunity to repurpose them and give them new life as a critical component of an IoT device. Just ask NASA.

The National Aeronautics and Space Administration has long been sending satellites into orbit - despite the intense costs to construct them, let alone get them where they need to go. To help decrease these costs without sacrificing the insight that these satellites provide, NASA started the PhoneSat Project in 2009. Rather than sending a few conventional, expensive satellites into orbit, many nanosatellites can be built from off-the-shelf components and sent into space. These nanosatellites rely on smartphones in order to function.

This initiative has appeared to be very successful, as version 2.4 of PhoneSat, “CubeSat,” reentered the atmosphere on January 31, 2017 after spending more than three years orbiting Earth. These nanosatellites have a relatively tiny price tag of $8000, and have, thus far, proved massively successful.

Bringing the IoT Down to Earth
Of course, the IoT has far more uses that are much more practical to the user who is not affiliated with NASA. Samsung Electronics created a team whose task was to figure out ways of taking older models from the Galaxy line of phones and figuring out how to leverage them as an IoT device. This “Galaxy Upcycling” team created a huge variety of IoT-powered purposes - including a few for the owners of hungry pets. The Smart Fish Tank they developed could feed the fish through a text message, and the Smart Pet Bowl would send the doting pet owner a picture whenever Fido or Fluffy chows down. This project has since been completed, the final product anticipated to be released soon.

Security Concerns
Of course, the same issues plague the IoT powered by a smartphone as have plagued all IoT devices that have come before: namely, security concerns. The IoT is notorious for its devices not having sufficient security installed, and often have no real way to update later. Time will only tell if this will eventually be a fatal flaw for the IoT, or if it will be overcome.

What do you think? Would you consider using an old smartphone to make another object smarter? Tell us why or why not in the comments!

Know Your Tech: Wizard
5G is Still Going to Take A While
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, November 20 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code

Our 10 Benefits

Our 10 Benefits Whitepaper

This whitepaper will evaluate the differences between traditional technical support practices and modern managed IT practices and the pros and cons of both in regards to small and medium-sized businesses.

Download Now!   Need A Consultation?

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Privacy Hackers Network Security Business Computing Backup Malware Hosted Solutions VoIP Mobile Devices Google Data Business Microsoft Software bgc roundup Disaster Recovery nonprofit Email Managed IT Services Business Continuity Alert Innovation Internet communications Hardware Outsourced IT Smartphones IT Services Managed IT Services Tech Term User Tips Windows 10 Data Backup Browser Computer Ransomware Server Saving Money Android Cloud Computing Data Recovery Efficiency Cybercrime Internet of Things IT Support Computers Workplace Tips Small Business Business Management Network Smartphone BDR Save Money Office Productivity Miscellaneous Productivity Quick Tips Communication Windows Passwords IT Support Social Engineering Recovery Chrome Mobile Device Management Applications Managed IT Telephone Systems BYOD Artificial Intelligence Cybersecurity Money Work/Life Balance Gadgets Virtualization Phishing Collaboration Windows 10 Social Media Vulnerability Upgrade Law Enforcement Hacking Facebook Firewall Mobility Wi-Fi Compliance Proactive IT Password Holiday Private Cloud Office 365 Health Bandwidth Bring Your Own Device Remote Monitoring Microsoft Office Two-factor Authentication Automation Data Protection Flexibility Budget Information Managed Service Provider Router How To Office Tips VPN App Avoiding Downtime Identity Theft Remote Computing Business Intelligence Redundancy Word Sports Data Breach HaaS Spam Mobile Computing Google Drive Information Technology Safety Scam Connectivity Mobile Device History Apps Value Black Market Data Security Keyboard Servers Operating System The Internet of Things Employer-Employee Relationship Update Unified Threat Management Spam Blocking Blockchain Virtual Assistant End of Support Business Owner Data storage Emergency SaaS Credit Cards Big Data Hiring/Firing WiFi Document Management Cleaning Telephone System Training Workers Legal Infrastructure Paperless Office Windows 7 Fraud Save Time Computer Care Government HIPAA PDF Solid State Drive Unsupported Software Risk Management Patch Management Computing Infrastructure OneNote Wireless Technology Marketing Data Storage Website Automobile Samsung YouTube CES Charger Settings Voice over Internet Protocol IT Management Data Management USB Electronic Medical Records Encryption Managed Service Physical Security Software as a Service Comparison Content Management IT Plan Entertainment Battery Content Filtering Worker Cortana Loyalty Wire Computer Fan iPhone Tip of the week Troubleshooting Accountants MSP Data loss Search Engine Thought Leadership Mouse HBO Specifications Scalability Experience Benefits Knowledge Tools Theft Laptop Trending Recycling Enterprise Content Management User Error Chromecast Flash Evernote Education Rootkit Authentication Google Apps Smart Office FENG Downtime Windows Server 2008 File Sharing Wireless Screen Mirroring Bing Twitter Windows 10s Administrator Outlook Millennials Smart Technology Human Resources Network Congestion Reputation Advertising Techology Touchpad Data Warehousing Lifestyle eWaste Password Management Monitor Colocation Sync Wireless Charging Nanotechnology Camera Hard Drives Robot NarrowBand Shadow IT Books Employer Employee Relationship Practices webinar Augmented Reality Cast Google Docs Help Desk Addiction Public Cloud Workforce Instant Messaging Two Factor Authentication Staff Regulation Customers Mobile Criminal IBM NIST Telephony Fiber-Optic Users Vendor Management Smart Tech Printers Relocation Best Practice Content Password Manager Assessment Machine Learning Files Regulations Amazon Hosted Solution Computer Accessories Hosted Computing Conferencing Remote Worker Going Green Cache Frequently Asked Questions Telecommuting Search Digital Signature IT Consultant Professional Services Humor Software Tips Politics Supercomputer Cryptocurrency Hacker Skype Cables Virtual Reality Warranty Audiobook Business Mangement Television HVAC CrashOverride Amazon Web Services Bluetooth Inventory Netflix Wiring Wireless Internet Audit Apple Excel Remote Work How to Leadership Meetings Printer Transportation Current Events Safe Mode Internet Exlporer Start Menu Unified Communications Worker Commute Microchip Devices Multi-Factor Security Video Games Gmail Public Computer Networking Online Shopping Access Control Congratulations E-Commerce nonprofits Thank You GDPR