window._mfq = window._mfq || []; (function() { var mf = document.createElement("script"); mf.type = "text/javascript"; mf.async = true; mf.src = "//"; document.getElementsByTagName("head")[0].appendChild(mf); })();
407-478-6600    Get SUPPORT

TaylorWorks Blog

The Internet of Things Gives Great Power to Our Phones

The Internet of Things Gives Great Power to Our Phones

The Internet of Things is a bit of a paradox in and of itself. It has been leveraged to accomplish great things, but at the same time, it can be used in a way that can create considerable problems. However, innovations have proven that the IoT isn’t going anywhere, anytime soon, especially now that it can use the devices that we carry in our pockets.

Taking the IoT to New Heights
Smartphones are notorious for swiftly becoming obsolete, which means that there is a great opportunity to repurpose them and give them new life as a critical component of an IoT device. Just ask NASA.

The National Aeronautics and Space Administration has long been sending satellites into orbit - despite the intense costs to construct them, let alone get them where they need to go. To help decrease these costs without sacrificing the insight that these satellites provide, NASA started the PhoneSat Project in 2009. Rather than sending a few conventional, expensive satellites into orbit, many nanosatellites can be built from off-the-shelf components and sent into space. These nanosatellites rely on smartphones in order to function.

This initiative has appeared to be very successful, as version 2.4 of PhoneSat, “CubeSat,” reentered the atmosphere on January 31, 2017 after spending more than three years orbiting Earth. These nanosatellites have a relatively tiny price tag of $8000, and have, thus far, proved massively successful.

Bringing the IoT Down to Earth
Of course, the IoT has far more uses that are much more practical to the user who is not affiliated with NASA. Samsung Electronics created a team whose task was to figure out ways of taking older models from the Galaxy line of phones and figuring out how to leverage them as an IoT device. This “Galaxy Upcycling” team created a huge variety of IoT-powered purposes - including a few for the owners of hungry pets. The Smart Fish Tank they developed could feed the fish through a text message, and the Smart Pet Bowl would send the doting pet owner a picture whenever Fido or Fluffy chows down. This project has since been completed, the final product anticipated to be released soon.

Security Concerns
Of course, the same issues plague the IoT powered by a smartphone as have plagued all IoT devices that have come before: namely, security concerns. The IoT is notorious for its devices not having sufficient security installed, and often have no real way to update later. Time will only tell if this will eventually be a fatal flaw for the IoT, or if it will be overcome.

What do you think? Would you consider using an old smartphone to make another object smarter? Tell us why or why not in the comments!

Know Your Tech: Wizard
Is Blockchain the Future of Cybersecurity?


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, September 19 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Cloud Network Security Best Practices Privacy Managed IT Services Business Computing Hackers Data Backup Email Hosted Solutions Malware VoIP Mobile Devices Data Recovery Outsourced IT Innovation Backup Microsoft Data Google Tech Term Saving Money Internet of Things Cloud Computing Software Business Continuity Internet Cybersecurity Ransomware Efficiency Hardware IT Services Small Business BDR Android IT Support User Tips Disaster Recovery Smartphones Artificial Intelligence Communications Communication Applications Cybercrime Network Managed IT Services Router Business How To Law Enforcement Gadgets Managed IT IT Support Computers Money Business Intelligence BYOD Business Management Mobile Device Management Windows 10 Phishing Data Security Two-factor Authentication Avoiding Downtime Chrome Collaboration Data Protection Windows Virtualization Productivity Smartphone Save Money Browser Word Office 365 Proactive IT Alert Bandwidth Blockchain Social Media Spam Analysis Telephone Systems Social Engineering Vulnerability Mobility IT Management Redundancy Computer Training Document Management Remote Monitoring Passwords App Facebook Compliance Connectivity Apps Productivity Firewall Workplace Tips Identity Theft Big Data Content Management Value Operating System Website Update Servers Credit Cards Miscellaneous Upgrade Access Control Information Paperless Office Smart Tech Unified Threat Management Networking Data loss Managed Service Workers Business Owner Holiday Mobile Computing Education Bring Your Own Device Infrastructure Settings Wi-Fi VPN Employer-Employee Relationship OneNote Virtual Assistant Mobile Device Work/Life Balance IT Plan Solid State Drive Windows 7 Data Breach Flexibility File Sharing Information Technology Comparison CES Sports Password Private Cloud Unsupported Software Budget Spam Blocking Microsoft Office Data Storage Server Encryption Machine Learning Automation Inventory Frequently Asked Questions Specifications Smart Office Computer Fan Virtual Reality Scam Root Cause Analysis Electronic Medical Records IT Consultant Public Cloud Software Tips Trending Users Gmail Addiction Black Market Content Filtering Skype Evernote IoT Password Management Hacking Theft Thought Leadership MSP Cortana Instant Messaging Strategy YouTube Meetings Botnet HIPAA Excel Millennials FENG Worker Commute NIST Leadership Managed Service Provider Legal Entertainment Physical Security Lifestyle Recycling Cache Windows 10s Battery Start Menu Wireless Charging End of Support Data Warehousing Google Apps Streaming Media Remote Worker Netflix USB Flash Fraud Wireless Travel Windows 10 Authentication Remote Computing Tip of the week Workforce Human Resources Students Insurance Cryptocurrency Business Technology PDF eWaste Wireless Internet SaaS Health Office Tips Mobile Data Management Google Docs Content Filter Wiring Cleaning Technology Tips Recovery Amazon Current Events Screen Mirroring Fiber-Optic Nanotechnology Proactive Keyboard Windows Server 2008 Telecommuting Staff Healthcare HaaS Practices Safe Mode webinar Google Drive HBO Criminal Wire Audit Professional Services Augmented Reality Voice over Internet Protocol Password Manager Storage GDPR Computer Care Sync Amazon Web Services Wireless Technology Accountants HVAC Knowledge Cast Software as a Service Cables Remote Monitoring and Maintenance Emails Remote Work Digital Signature Electronic Health Records Save Time Hosted Computing Telephone System Conferencing Hard Drives Risk Management Outlook Marketing Hacker Patch Management Tools The Internet of Things Network Congestion Multi-Factor Security Business Mangement E-Commerce Samsung Telephony Online Shopping Enterprise Content Management Government Unified Communications Devices Line of Business Charger Regulations Downtime Computing Infrastructure Regulation Politics IP Address Television Techology Audiobook Camera Humor Internet Exlporer Customer Service IT solutions Wearable Technology Worker Video Games Mobile Office Public Computer User Error Transportation Hybrid Cloud Printers Loyalty Books Domains Automobile WiFi How to Company Culture Rootkit Hiring/Firing Benefits Employer Employee Relationship Best Practice Public Speaking Fun Internet exploMicrosoft Quick Tips Troubleshooting Presentation Managing Stress Scalability Lithium-ion battery Smart Technology Computer Accessories Files Emergency Advertising Tech Support Office Shadow IT Hosted Solution 5G Two Factor Authentication IBM Vendor Management Experience Safety CrashOverride Colocation Bluetooth Assessment History Search Content Twitter Relocation Customer Relationship Management Webinar Music Competition

Mobile? Grab this Article!

QR-Code dieser Seite