The Internet of Things Gives Great Power to Our Phones

The Internet of Things Gives Great Power to Our Phones

The Internet of Things is a bit of a paradox in and of itself. It has been leveraged to accomplish great things, but at the same time, it can be used in a way that can create considerable problems. However, innovations have proven that the IoT isn’t going anywhere, anytime soon, especially now that it can use the devices that we carry in our pockets.

Taking the IoT to New Heights
Smartphones are notorious for swiftly becoming obsolete, which means that there is a great opportunity to repurpose them and give them new life as a critical component of an IoT device. Just ask NASA.

The National Aeronautics and Space Administration has long been sending satellites into orbit - despite the intense costs to construct them, let alone get them where they need to go. To help decrease these costs without sacrificing the insight that these satellites provide, NASA started the PhoneSat Project in 2009. Rather than sending a few conventional, expensive satellites into orbit, many nanosatellites can be built from off-the-shelf components and sent into space. These nanosatellites rely on smartphones in order to function.

This initiative has appeared to be very successful, as version 2.4 of PhoneSat, “CubeSat,” reentered the atmosphere on January 31, 2017 after spending more than three years orbiting Earth. These nanosatellites have a relatively tiny price tag of $8000, and have, thus far, proved massively successful.

Bringing the IoT Down to Earth
Of course, the IoT has far more uses that are much more practical to the user who is not affiliated with NASA. Samsung Electronics created a team whose task was to figure out ways of taking older models from the Galaxy line of phones and figuring out how to leverage them as an IoT device. This “Galaxy Upcycling” team created a huge variety of IoT-powered purposes - including a few for the owners of hungry pets. The Smart Fish Tank they developed could feed the fish through a text message, and the Smart Pet Bowl would send the doting pet owner a picture whenever Fido or Fluffy chows down. This project has since been completed, the final product anticipated to be released soon.

Security Concerns
Of course, the same issues plague the IoT powered by a smartphone as have plagued all IoT devices that have come before: namely, security concerns. The IoT is notorious for its devices not having sufficient security installed, and often have no real way to update later. Time will only tell if this will eventually be a fatal flaw for the IoT, or if it will be overcome.

What do you think? Would you consider using an old smartphone to make another object smarter? Tell us why or why not in the comments!



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, September 22 2018

Captcha Image

Tag Cloud

Tip of the Week Security Technology Privacy Best Practices Cloud Business computing Network Security Google Microsoft Software Malware Hackers Innovation Backup Internet Data Smartphones Tech Term Windows 10 Hosted Solutions Hardware Email Mobile Devices Android Business Browser Managed IT Services Small Business Alert Business Continuity VoIP Office IT Services Ransomware Outsourced IT Business Management Computers Disaster Recovery Cloud Computing Data Backup User Tips Smartphone Computer Artificial Intelligence Efficiency Law Enforcement Cybercrime Productivity Miscellaneous Communications Network Money Communication Passwords Telephone Systems Managed IT Services Router Social Media Internet of Things Chrome Collaboration Cybersecurity How To Password Applications Facebook Virtualization Windows Workplace Tips Data Recovery Productivity Health App Social Engineering Gadgets Windows 10 Office 365 Saving Money Quick Tips Upgrade Work/Life Balance Save Money HaaS Office Tips Connectivity Holiday Server IT Support Vulnerability Spam Private Cloud Microsoft Office Hacking Data Breach Wi-Fi Mobile Device Management Google Drive Data Protection Automation Phishing Two-factor Authentication Apps Bring Your Own Device IT Support Data Security Word USB Value Unsupported Software Encryption Infrastructure Remote Monitoring Firewall Networking Battery PDF Managed Service Managed IT Virtual Assistant VPN Employer-Employee Relationship Managed Service Provider Windows 7 Keyboard Charger Remote Computing Patch Management Sports Settings Government BYOD BDR Flexibility Cleaning Data Storage Comparison Website CES Scam Public Cloud Worker Legal Big Data Mobility Automobile OneNote Computer Care IT Management Redundancy Avoiding Downtime Content Management Spam Blocking End of Support Data Management Samsung IT Plan History Business Intelligence Electronic Medical Records Blockchain Bandwidth Paperless Office Operating System Training Mobile Device Information Update Marketing Identity Theft Entertainment Instant Messaging Wiring webinar Millennials Leadership Virtual Reality HVAC The Internet of Things Cache Screen Mirroring Multi-Factor Security HIPAA Machine Learning Windows 10s iPhone Windows Server 2008 Evernote Vendor Management Video Games Audiobook Root Cause Analysis Criminal Emergency Public Computer How to Wire HBO Advertising Credit Cards Inventory Bluetooth Troubleshooting Loyalty Unified Threat Management Conferencing Relocation Software Tips User Error Workforce Save Time Worker Commute Enterprise Content Management FENG Telephony Password Manager MSP Cast Trending Human Resources Smart Technology Current Events Education YouTube Wireless Charging Devices Monitor Botnet Google Docs Black Market Outlook Fraud Access Control Telephone System SaaS Mobile Computing Emails Accountants Password Management Skype Business Mangement Scalability File Sharing Staff Two Factor Authentication Knowledge Computing Infrastructure Solid State Drive Flash Cortana Thought Leadership Experience Meetings Travel Smart Office Frequently Asked Questions Amazon Authentication Risk Management Gmail Wireless Camera Humor Internet Exlporer Telecommuting Hiring/Firing NIST Start Menu Music Augmented Reality Files Specifications Network Congestion Audit Google Apps Data storage Voice over Internet Protocol Transportation Safety Document Management Excel Hybrid Cloud Amazon Web Services Nanotechnology Politics Rootkit Best Practice Recovery Recycling Books Assessment IT solutions Physical Security Remote Work Practices Employer Employee Relationship Cryptocurrency Tools Wearable Technology Information Technology Remote Worker Digital Signature Techology IT Consultant Users Servers Computer Fan Sync Workers Addiction Data loss Benefits Apple Tip of the week Online Shopping Smart Tech Content eWaste Television Search Wireless Internet Internet exploMicrosoft Hosted Computing Computer Accessories Safe Mode Downtime Thank You WiFi Congratulations Company Culture Compliance Webinar Managing Stress Twitter Regulation Printers CrashOverride

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

AgustinMMontgomery MasterCard Wants Your Selfie, But it’s Not for What You Think it’s For
19 September 2018
You have to share this wonderful article about how to handle the mobile payments and speedypaper rev...
JohnSHarper Tip of the Week: Working from Google Home
18 September 2018
Sharing these type tips are very effective for the readers and working from Google home is no secret...
Jesse Icely Study Finds that 45% of Virtual Machines Would Run More Efficiently in the Cloud
13 September 2018
Study has been pivotal goal for the generations. It has been marked with https://www.rushmyessays.or...
Malcolm Curtis Why You’ll Want to Consider Hosted VoIP Telephony
11 September 2018
VoIP was a new technology that was launched in this country this was just amazing it need 5g to get ...
Nomlanga Leach Alert: 33.7 Millions Records Released to Public Due to Leak of Massive Marketing Database
08 September 2018
Marketing database was reveal this year by a hacker that was not good news this was happened many ti...