window._mfq = window._mfq || []; (function() { var mf = document.createElement("script"); mf.type = "text/javascript"; mf.async = true; mf.src = "//"; document.getElementsByTagName("head")[0].appendChild(mf); })();
407-478-6600    Get SUPPORT

TaylorWorks Blog

The Internet of Things Gives Great Power to Our Phones

The Internet of Things Gives Great Power to Our Phones

The Internet of Things is a bit of a paradox in and of itself. It has been leveraged to accomplish great things, but at the same time, it can be used in a way that can create considerable problems. However, innovations have proven that the IoT isn’t going anywhere, anytime soon, especially now that it can use the devices that we carry in our pockets.

Taking the IoT to New Heights
Smartphones are notorious for swiftly becoming obsolete, which means that there is a great opportunity to repurpose them and give them new life as a critical component of an IoT device. Just ask NASA.

The National Aeronautics and Space Administration has long been sending satellites into orbit - despite the intense costs to construct them, let alone get them where they need to go. To help decrease these costs without sacrificing the insight that these satellites provide, NASA started the PhoneSat Project in 2009. Rather than sending a few conventional, expensive satellites into orbit, many nanosatellites can be built from off-the-shelf components and sent into space. These nanosatellites rely on smartphones in order to function.

This initiative has appeared to be very successful, as version 2.4 of PhoneSat, “CubeSat,” reentered the atmosphere on January 31, 2017 after spending more than three years orbiting Earth. These nanosatellites have a relatively tiny price tag of $8000, and have, thus far, proved massively successful.

Bringing the IoT Down to Earth
Of course, the IoT has far more uses that are much more practical to the user who is not affiliated with NASA. Samsung Electronics created a team whose task was to figure out ways of taking older models from the Galaxy line of phones and figuring out how to leverage them as an IoT device. This “Galaxy Upcycling” team created a huge variety of IoT-powered purposes - including a few for the owners of hungry pets. The Smart Fish Tank they developed could feed the fish through a text message, and the Smart Pet Bowl would send the doting pet owner a picture whenever Fido or Fluffy chows down. This project has since been completed, the final product anticipated to be released soon.

Security Concerns
Of course, the same issues plague the IoT powered by a smartphone as have plagued all IoT devices that have come before: namely, security concerns. The IoT is notorious for its devices not having sufficient security installed, and often have no real way to update later. Time will only tell if this will eventually be a fatal flaw for the IoT, or if it will be overcome.

What do you think? Would you consider using an old smartphone to make another object smarter? Tell us why or why not in the comments!

Know Your Tech: Wizard
Is Blockchain the Future of Cybersecurity?


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, November 20 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Network Security Best Practices Cloud Managed IT Services Business Computing Privacy Data Backup Hackers Malware Data Recovery Email VoIP Data Hosted Solutions Innovation Mobile Devices Outsourced IT Tech Term Google Backup Hardware Internet Microsoft BDR User Tips Saving Money Business Internet of Things Software Business Continuity Cloud Computing Communications IT Services Cybersecurity Ransomware Android Smartphones Managed IT Services Communication Small Business IT Support Cybercrime Efficiency Artificial Intelligence Workplace Tips Productivity Network Chrome Applications Browser Disaster Recovery Managed IT IT Support Business Management Computer Windows 10 Smartphone Gadgets How To Router Law Enforcement Information Business Intelligence Save Money Computers Spam Avoiding Downtime Mobile Device Management Blockchain Data Security Two-factor Authentication Virtualization Data Protection Server Phishing Money Collaboration Windows BYOD Office 365 Firewall Social Engineering Servers Miscellaneous Upgrade Encryption Social Media Remote Monitoring Bandwidth App Proactive IT Facebook IT Management Redundancy Telephone Systems Analysis Passwords Vulnerability Mobility Document Management Apps Productivity Training Alert Compliance Identity Theft Connectivity Word Website CES Sports File Sharing Spam Blocking Update Credit Cards Automation Scam Machine Learning Managed Service Content Management Value Operating System Employer-Employee Relationship Fraud Data loss Paperless Office Mobile Computing Access Control Flexibility Solid State Drive Smart Tech Virtual Assistant Wi-Fi Unified Threat Management Information Technology Networking Business Owner Password Private Cloud Education Bring Your Own Device Workers Holiday IT Plan Voice over Internet Protocol Telephone System Settings Keyboard Infrastructure VPN Windows 7 OneNote Comparison Mobile Device Microsoft Office Unsupported Software Budget Work/Life Balance Data Storage Big Data Data Breach End of Support Software Tips Trending Users Mouse Conferencing Hosted Computing Skype Evernote Samsung Business Mangement Network Congestion Enterprise Content Management Unified Communications Devices Meetings Botnet Remote Worker PDF Virtual Reality Downtime Excel Millennials Help Desk Health Office Tips Charger Black Market Computer Fan Content Filtering Smart Office Physical Security Lifestyle Administrator Technology Tips Inventory Start Menu Wireless Charging HaaS Instant Messaging Gmail Addiction Data Warehousing WiFi Virtual Private Network Electronic Medical Records IT Consultant Hacking IoT Password Management Flash Business Technology Wireless HIPAA Theft Thought Leadership Travel Wiring Windows 10 Google Drive Worker Commute Strategy YouTube Tip of the week Workforce Proactive Battery FENG Microchip Legal Entertainment Mobile Windows 10s USB Recycling Cache Google Docs Project Management Leadership NIST Amazon Remote Computing Netflix Google Apps Streaming Media Screen Mirroring GDPR Hard Drives Windows Server 2008 Telecommuting Remote Monitoring and Maintenance Augmented Reality Human Resources Students HBO Authentication Professional Services Computing Infrastructure SaaS Recovery eWaste Wireless Internet Warranty Data Management Insurance Cryptocurrency Sync Amazon Web Services Wireless Technology Cleaning Content Filter Cast Software as a Service E-Commerce Current Events Remote Work Tools Line of Business The Internet of Things Public Cloud Staff Healthcare Outlook Marketing Search Engine Hacker Fiber-Optic Nanotechnology Audit Criminal Wire Multi-Factor Security Printer Cortana webinar Practices Safe Mode Telephony Online Shopping Computer Care Password Manager Storage Government Camera Knowledge Save Time Accountants HVAC Regulations Root Cause Analysis MSP Managed Service Provider Patch Management Digital Signature Electronic Health Records Frequently Asked Questions Specifications Bing Emails Risk Management Cables Assessment Bluetooth Content Music Twitter Printers Customer Service Hiring/Firing Mobile Office Webinar Politics Domains Fun Internet exploMicrosoft Television Quick Tips Audiobook Wearable Technology IT solutions Transportation Files Video Games Public Speaking Advertising Public Computer Books Office Worker Colocation Loyalty How to Automobile Presentation Benefits Company Culture Lithium-ion battery History Search Utility Computing Relocation Rootkit Best Practice 5G Troubleshooting Tech Support Employer Employee Relationship Scalability IBM Smart Technology Managing Stress Safety Techology Emergency Humor Regulation Internet Exlporer Shadow IT Hosted Solution Computer Accessories User Error Experience Customer Relationship Management Two Factor Authentication Competition Hybrid Cloud CrashOverride IP Address Vendor Management

Mobile? Grab this Article!

QR-Code dieser Seite