window._mfq = window._mfq || []; (function() { var mf = document.createElement("script"); mf.type = "text/javascript"; mf.async = true; mf.src = "//cdn.mouseflow.com/projects/0148bb62-7ff8-46ae-a466-bf3fd13c7d09.js"; document.getElementsByTagName("head")[0].appendChild(mf); })();
407-478-6600    Get SUPPORT

TaylorWorks Blog

The Internet of Things Gives Great Power to Our Phones

The Internet of Things Gives Great Power to Our Phones

The Internet of Things is a bit of a paradox in and of itself. It has been leveraged to accomplish great things, but at the same time, it can be used in a way that can create considerable problems. However, innovations have proven that the IoT isn’t going anywhere, anytime soon, especially now that it can use the devices that we carry in our pockets.

Taking the IoT to New Heights
Smartphones are notorious for swiftly becoming obsolete, which means that there is a great opportunity to repurpose them and give them new life as a critical component of an IoT device. Just ask NASA.

The National Aeronautics and Space Administration has long been sending satellites into orbit - despite the intense costs to construct them, let alone get them where they need to go. To help decrease these costs without sacrificing the insight that these satellites provide, NASA started the PhoneSat Project in 2009. Rather than sending a few conventional, expensive satellites into orbit, many nanosatellites can be built from off-the-shelf components and sent into space. These nanosatellites rely on smartphones in order to function.

This initiative has appeared to be very successful, as version 2.4 of PhoneSat, “CubeSat,” reentered the atmosphere on January 31, 2017 after spending more than three years orbiting Earth. These nanosatellites have a relatively tiny price tag of $8000, and have, thus far, proved massively successful.

Bringing the IoT Down to Earth
Of course, the IoT has far more uses that are much more practical to the user who is not affiliated with NASA. Samsung Electronics created a team whose task was to figure out ways of taking older models from the Galaxy line of phones and figuring out how to leverage them as an IoT device. This “Galaxy Upcycling” team created a huge variety of IoT-powered purposes - including a few for the owners of hungry pets. The Smart Fish Tank they developed could feed the fish through a text message, and the Smart Pet Bowl would send the doting pet owner a picture whenever Fido or Fluffy chows down. This project has since been completed, the final product anticipated to be released soon.

Security Concerns
Of course, the same issues plague the IoT powered by a smartphone as have plagued all IoT devices that have come before: namely, security concerns. The IoT is notorious for its devices not having sufficient security installed, and often have no real way to update later. Time will only tell if this will eventually be a fatal flaw for the IoT, or if it will be overcome.

What do you think? Would you consider using an old smartphone to make another object smarter? Tell us why or why not in the comments!

Know Your Tech: Wizard
Is Blockchain the Future of Cybersecurity?
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, February 20 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Network Security Best Practices Cloud Business Computing Data Backup Privacy Managed IT Services Hosted Solutions Hackers Malware Data Recovery VoIP Mobile Devices Google Email Data Outsourced IT User Tips Innovation Tech Term Internet of Things Communications Cloud Computing Backup Productivity Internet Microsoft IT Services Hardware Business Continuity Software Artificial Intelligence BDR Saving Money Business Cybersecurity Efficiency Ransomware Smartphones Communication Small Business Cybercrime Android Smartphone IT Support IT Support Managed IT Services Router Disaster Recovery Chrome Gadgets Browser Workplace Tips Network Business Management Applications Windows 10 Phishing Law Enforcement Managed IT How To Computer Mobile Device Collaboration Blockchain Access Control Business Intelligence Training Save Money Computers Avoiding Downtime Data Security Office 365 Virtualization Data Protection Spam Mobile Device Management Server Holiday Money Proactive IT Encryption Two-factor Authentication Mobility BYOD Word Information Windows Apps Servers Vulnerability Compliance Social Engineering Settings Productivity Analysis Managed Service Firewall App Remote Monitoring Facebook Miscellaneous Redundancy IT Management Upgrade Automation Social Media Private Cloud Connectivity Voice over Internet Protocol Telephone Systems File Sharing Software as a Service Bandwidth Machine Learning Wi-Fi Identity Theft Document Management Alert Passwords Paperless Office Credit Cards Save Time Update Hacker Smart Tech Botnet Health Microsoft Office OneNote Budget Human Resources Business Technology Fraud Big Data Data loss Scam Employer-Employee Relationship Mobile Computing VPN Website Google Drive Infrastructure Data Breach Healthcare Virtual Assistant Google Docs Flexibility Spam Blocking Solid State Drive Password Information Technology Telephone System IT Plan Sports Windows 7 Value Operating System Business Owner CES Comparison Education Bring Your Own Device Telephony Unsupported Software Content Management Keyboard Data Storage Unified Threat Management Networking Workers Work/Life Balance Display End of Support SaaS Help Desk Marketing Risk Management Excel Millennials NIST Cleaning Remote Worker Restore Data The Internet of Things Meetings Patch Management Recycling Cache Current Events Physical Security Lifestyle Office Tips Google Search Start Menu Wireless Charging PDF Google Apps Streaming Media Administrator Students webinar Security Cameras Flash Authentication Audit Virtual Private Network Data Warehousing WiFi Technology Tips Shortcuts Tip of the week Workforce HaaS Insurance Cryptocurrency Computer Care Wiring Backup and Disaster Recovery Virtual Reality Travel eWaste Wireless Internet Knowledge Emails Proactive Black Market Content Filtering Mobile Content Filter Microchip Users Staff Conferencing Employee/Employer Relationship Instant Messaging Amazon Fiber-Optic Nanotechnology Project Management Hacking Network Congestion eCommerce HIPAA Windows Server 2008 Telecommuting Practices Safe Mode Samsung GDPR Worker Commute Screen Mirroring Criminal Wire Legal Entertainment HBO Accountants HVAC Charger Remote Monitoring and Maintenance Battery Professional Services Hard Drives Password Manager Storage Downtime Digital Signature Electronic Health Records Smartwatch Wireless USB Sync Amazon Web Services Cables Computer Fan Warranty Electronic Medical Records IT Consultant Social Remote Computing Remote Work Computing Infrastructure Hosted Computing E-Commerce Windows 10 Cast Search Engine Outlook Enterprise Content Management Line of Business File Versioning Tools Business Mangement Employee Recovery Online Shopping Public Cloud Unified Communications Devices FENG Printer Data Management Multi-Factor Security Smart Office Leadership Vendor Regulations Inventory Windows 10s Camera Government Cortana Bing Frequently Asked Questions Specifications IoT Password Management Netflix MSP Multiple Versions Augmented Reality Root Cause Analysis Gmail Addiction Trending Strategy YouTube Digital Signage Wireless Technology Skype Evernote Managed Service Provider Theft Thought Leadership Mouse Software Tips Employer Employee Relationship Safety Experience Printers IBM Hiring/Firing Company Culture Content Computer Accessories Competition Music Fun Internet exploMicrosoft Customer Relationship Management Quick Tips IP Address Politics Two Factor Authentication Audiobook Files Managing Stress Vendor Management Net Neutrality CrashOverride Bluetooth Wearable Technology Advertising Assessment Customer Service Office Mobile Office Video Games Colocation Transportation History Webinar ISP Domains Books Utility Computing Relocation How to Search Television Automobile Benefits Best Practice Techology IT solutions Public Speaking Twitter Humor Worker Regulation Presentation Troubleshooting Public Computer Lithium-ion battery Scalability Internet Exlporer Loyalty Smart Technology User Error Emergency Rootkit 5G Shadow IT Hosted Solution Hybrid Cloud Tech Support

Mobile? Grab this Article!

QR-Code dieser Seite