Infracore LLC Blog

The Internet of Things Gives Great Power to Our Phones

The Internet of Things Gives Great Power to Our Phones

The Internet of Things is a bit of a paradox in and of itself. It has been leveraged to accomplish great things, but at the same time, it can be used in a way that can create considerable problems. However, innovations have proven that the IoT isn’t going anywhere, anytime soon, especially now that it can use the devices that we carry in our pockets.

Taking the IoT to New Heights
Smartphones are notorious for swiftly becoming obsolete, which means that there is a great opportunity to repurpose them and give them new life as a critical component of an IoT device. Just ask NASA.

The National Aeronautics and Space Administration has long been sending satellites into orbit - despite the intense costs to construct them, let alone get them where they need to go. To help decrease these costs without sacrificing the insight that these satellites provide, NASA started the PhoneSat Project in 2009. Rather than sending a few conventional, expensive satellites into orbit, many nanosatellites can be built from off-the-shelf components and sent into space. These nanosatellites rely on smartphones in order to function.

This initiative has appeared to be very successful, as version 2.4 of PhoneSat, “CubeSat,” reentered the atmosphere on January 31, 2017 after spending more than three years orbiting Earth. These nanosatellites have a relatively tiny price tag of $8000, and have, thus far, proved massively successful.

Bringing the IoT Down to Earth
Of course, the IoT has far more uses that are much more practical to the user who is not affiliated with NASA. Samsung Electronics created a team whose task was to figure out ways of taking older models from the Galaxy line of phones and figuring out how to leverage them as an IoT device. This “Galaxy Upcycling” team created a huge variety of IoT-powered purposes - including a few for the owners of hungry pets. The Smart Fish Tank they developed could feed the fish through a text message, and the Smart Pet Bowl would send the doting pet owner a picture whenever Fido or Fluffy chows down. This project has since been completed, the final product anticipated to be released soon.

Security Concerns
Of course, the same issues plague the IoT powered by a smartphone as have plagued all IoT devices that have come before: namely, security concerns. The IoT is notorious for its devices not having sufficient security installed, and often have no real way to update later. Time will only tell if this will eventually be a fatal flaw for the IoT, or if it will be overcome.

What do you think? Would you consider using an old smartphone to make another object smarter? Tell us why or why not in the comments!

Know Your Tech: Wizard
5G is Still Going to Take A While
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, November 17 2018

Captcha Image

Tag Cloud

Tip of the Week Security Technology Privacy Best Practices Cloud Network Security Google Business computing Malware Hackers Microsoft Software Data Innovation Internet Hardware Business Backup Tech Term Smartphones Hosted Solutions Windows 10 Browser User Tips Email Mobile Devices Android Business Continuity Data Backup VoIP Computer IT Services Business Management Small Business Managed IT Services Productivity Alert Workplace Tips Communications Data Recovery Chrome Managed IT Services Ransomware Computers Outsourced IT Disaster Recovery Cloud Computing Miscellaneous Smartphone Office Network Efficiency Artificial Intelligence Communication Law Enforcement Cybercrime Passwords Telephone Systems Router Social Media Collaboration Cybersecurity Windows 10 Password Applications How To Facebook Virtualization Windows Productivity Internet of Things Money Health IT Support Server Information App Gadgets Social Engineering Office 365 Saving Money Quick Tips Upgrade Work/Life Balance BDR HaaS Word Office Tips Holiday Data Security IT Support Keyboard Data Protection Private Cloud Microsoft Office Hacking Vulnerability Scam Data Breach Spam Google Drive Two-factor Authentication Wi-Fi Automation Mobile Device Management Connectivity Apps Bring Your Own Device Save Money Phishing Firewall Networking Operating System PDF Comparison Battery Website CES Employer-Employee Relationship Unsupported Software Remote Monitoring Charger Servers Managed Service Provider Patch Management Managed IT Paperless Office Government Remote Computing Voice over Internet Protocol Content Management Flexibility Cleaning Windows 7 Managed Service Business Intelligence Worker Settings Public Cloud Virtual Assistant Blockchain BYOD Legal Big Data Update Data Storage Identity Theft Mobility Automobile Computer Care Encryption Infrastructure Telephone System OneNote Sports End of Support Electronic Medical Records IT Management History Data Management Samsung Redundancy Bandwidth Avoiding Downtime VPN Training Spam Blocking Entertainment Mobile Device Marketing IT Plan Fraud USB Value Instant Messaging Augmented Reality Data loss Accountants Virtual Reality Vendor Management Tip of the week iPhone Business Mangement Public Computer Downtime Staff Bluetooth Document Management Microchip Advertising Cortana Thought Leadership Video Games Audiobook Emergency How to Save Time webinar Relocation User Error Amazon Authentication Troubleshooting Loyalty Cryptocurrency The Internet of Things Gmail Smart Technology Current Events Remote Worker Screen Mirroring Telecommuting Worker Commute Windows 10s Windows Server 2008 Root Cause Analysis Monitor Specifications Education Search Engine HBO Google Apps Telephony Black Market Wireless Internet Conferencing Warranty Software Tips Amazon Web Services Nanotechnology SaaS Safe Mode FENG Recovery Recycling Two Factor Authentication Knowledge Wiring Cast Remote Work Practices Experience HVAC Botnet Digital Signature Computing Infrastructure Risk Management Machine Learning Bing Outlook Workers Addiction Scalability Skype Hiring/Firing Wire Emails Printer Humor Internet Exlporer Online Shopping Smart Tech eWaste Wireless Network Congestion Unified Threat Management Files Hosted Computing Music Enterprise Content Management Solid State Drive Flash Transportation Safety MSP Meetings Travel Data storage Millennials Politics Rootkit YouTube Help Desk Frequently Asked Questions Hybrid Cloud Cache Start Menu Multi-Factor Security HIPAA Employer Employee Relationship Mouse Evernote Best Practice Books Assessment WiFi Criminal IT Consultant Mobile Computing Credit Cards Inventory Wearable Technology Password Management Audit Information Technology Benefits File Sharing Workforce Techology Users Excel Apple Password Manager Tools Trending Human Resources Computer Accessories Smart Office IT solutions Administrator Physical Security Internet exploMicrosoft Wireless Charging Devices Content Television Google Docs Search Leadership Camera Access Control NIST Computer Fan Sync Managing Stress Regulation Congratulations Printers Twitter Webinar Company Culture Software as a Service Compliance CrashOverride Thank You

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

BessieLHuerta 8 Data Backup Terms You Should Know
15 November 2018
I can understand the importance of this content about the data backup and I think it will attract ma...
Constance Rowe Are You Intrigued By the Tech of CES 2018?
15 November 2018
An internal blog is intriguing for the storing of the information. The visitors of the https://www.b...
Leo Reid A Few Security Lessons Your Business Can Learn From Game of Thrones
07 November 2018
Few lessons of the learning have been consumed for the better range of the people. The sort of the i...
Risa Franklin Is a Data Backup Really That Necessary? In a Word: Yes
01 November 2018
Data protection is very important for us with we can get rid from various kinds of problems while ru...
Sybil Stephens Is a Data Backup Really That Necessary? In a Word: Yes
20 October 2018
Backup data for the word Microsoft is really needed that only some written material will be come to ...