window._mfq = window._mfq || []; (function() { var mf = document.createElement("script"); mf.type = "text/javascript"; mf.async = true; mf.src = "//"; document.getElementsByTagName("head")[0].appendChild(mf); })();
407-478-6600    Get SUPPORT

TaylorWorks Blog

The Internet of Things Gives Great Power to Our Phones

The Internet of Things Gives Great Power to Our Phones

The Internet of Things is a bit of a paradox in and of itself. It has been leveraged to accomplish great things, but at the same time, it can be used in a way that can create considerable problems. However, innovations have proven that the IoT isn’t going anywhere, anytime soon, especially now that it can use the devices that we carry in our pockets.

Taking the IoT to New Heights
Smartphones are notorious for swiftly becoming obsolete, which means that there is a great opportunity to repurpose them and give them new life as a critical component of an IoT device. Just ask NASA.

The National Aeronautics and Space Administration has long been sending satellites into orbit - despite the intense costs to construct them, let alone get them where they need to go. To help decrease these costs without sacrificing the insight that these satellites provide, NASA started the PhoneSat Project in 2009. Rather than sending a few conventional, expensive satellites into orbit, many nanosatellites can be built from off-the-shelf components and sent into space. These nanosatellites rely on smartphones in order to function.

This initiative has appeared to be very successful, as version 2.4 of PhoneSat, “CubeSat,” reentered the atmosphere on January 31, 2017 after spending more than three years orbiting Earth. These nanosatellites have a relatively tiny price tag of $8000, and have, thus far, proved massively successful.

Bringing the IoT Down to Earth
Of course, the IoT has far more uses that are much more practical to the user who is not affiliated with NASA. Samsung Electronics created a team whose task was to figure out ways of taking older models from the Galaxy line of phones and figuring out how to leverage them as an IoT device. This “Galaxy Upcycling” team created a huge variety of IoT-powered purposes - including a few for the owners of hungry pets. The Smart Fish Tank they developed could feed the fish through a text message, and the Smart Pet Bowl would send the doting pet owner a picture whenever Fido or Fluffy chows down. This project has since been completed, the final product anticipated to be released soon.

Security Concerns
Of course, the same issues plague the IoT powered by a smartphone as have plagued all IoT devices that have come before: namely, security concerns. The IoT is notorious for its devices not having sufficient security installed, and often have no real way to update later. Time will only tell if this will eventually be a fatal flaw for the IoT, or if it will be overcome.

What do you think? Would you consider using an old smartphone to make another object smarter? Tell us why or why not in the comments!

Know Your Tech: Wizard
Is Blockchain the Future of Cybersecurity?


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, August 21 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Newsletter Sign Up

  • Company Name *
  • First Name *
  • Last Name *

      Tag Cloud

      Tip of the Week Security Technology Cloud Best Practices Network Security Privacy Managed IT Services Business Computing Data Backup Email Hackers VoIP Malware Outsourced IT Hosted Solutions Data Recovery Backup Tech Term Google Mobile Devices Microsoft Data Software Cloud Computing Saving Money Internet of Things Business Continuity Innovation BDR Cybersecurity Hardware Internet Android IT Support Small Business Efficiency IT Services User Tips Smartphones Cybercrime Ransomware Disaster Recovery Communications Business Applications Law Enforcement Managed IT Managed IT Services Communication Network Gadgets Router How To Artificial Intelligence Data Protection Productivity Collaboration Avoiding Downtime Windows IT Support Mobile Device Management Virtualization Two-factor Authentication Business Management Smartphone Computers Business Intelligence Money Phishing BYOD Chrome Data Security Browser Mobility Document Management Social Media App Spam Remote Monitoring Compliance Facebook Proactive IT Identity Theft Bandwidth Blockchain Word Save Money Computer Passwords Analysis Windows 10 Vulnerability Apps Alert Productivity Redundancy Telephone Systems IT Management Social Engineering Connectivity Office 365 File Sharing Information CES Miscellaneous Upgrade Spam Blocking IT Plan Windows 7 Mobile Device Automation Employer-Employee Relationship Encryption Machine Learning Comparison Work/Life Balance Content Management Value Operating System Unsupported Software Flexibility Solid State Drive Data Storage Access Control Password Information Technology Paperless Office Firewall Wi-Fi Private Cloud Smart Tech Servers Credit Cards Networking Server Update Workers Infrastructure VPN Training Budget OneNote Data loss Microsoft Office Business Owner Big Data Holiday Data Breach Education Bring Your Own Device Website Health Hosted Computing Office Tips HBO Data Management PDF Sports Professional Services Recovery Conferencing Samsung Business Mangement Sync Amazon Web Services Keyboard Network Congestion Technology Tips Enterprise Content Management Voice over Internet Protocol Charger Unified Communications Devices HaaS Remote Work Downtime Cast Software as a Service Inventory Outlook Managed Service Computer Fan Google Drive Smart Office Tools Wireless Multi-Factor Security Save Time Windows 10 Business Technology Gmail Addiction Telephony Online Shopping Electronic Medical Records IT Consultant IoT Password Management Theft Thought Leadership Regulations Risk Management Strategy YouTube Government Patch Management Frequently Asked Questions Specifications Proactive FENG Hard Drives Root Cause Analysis Software Tips Trending Virtual Assistant Windows 10s Recycling Cache Skype Workplace Tips Evernote Leadership NIST Unified Threat Management Netflix Google Apps Computing Infrastructure Streaming Media Virtual Reality Scam Augmented Reality Authentication Excel Millennials Remote Monitoring and Maintenance Human Resources Students Meetings Botnet Black Market Content Filtering Wireless Technology Physical Security Lifestyle Hacking Telephone System SaaS eWaste Public Cloud Wireless Internet Start Menu Instant Messaging Wireless Charging Insurance Cryptocurrency Cleaning Settings Content Filter Flash Fraud HIPAA Marketing Hacker Current Events Cortana Data Warehousing Worker Commute The Internet of Things Fiber-Optic Nanotechnology Tip of the week Legal Workforce Entertainment Line of Business Staff Healthcare Travel Battery Safe Mode Mobile Computing Audit Managed Service Provider Criminal Wire Mobile USB webinar Practices Computer Care Password Manager End of Support Storage Remote Computing Amazon Knowledge Accountants HVAC Google Docs Emails Cables Windows Server 2008 Telecommuting Users MSP Digital Signature Electronic Health Records Screen Mirroring Customer Service Assessment Troubleshooting Bluetooth Smart Technology Fun Internet exploMicrosoft Twitter Scalability Mobile Office Quick Tips Webinar Remote Worker Emergency Domains Files Television Shadow IT Hosted Solution Advertising Experience Office IT solutions Colocation Wiring Public Speaking History Content Public Computer Presentation Worker Loyalty Search Music Lithium-ion battery Relocation Politics Company Culture Techology Audiobook Tech Support 5G Rootkit IBM Wearable Technology Safety Employer Employee Relationship Humor Internet Exlporer Video Games Managing Stress WiFi Transportation User Error Books Automobile Customer Relationship Management Regulation Hybrid Cloud How to Competition Computer Accessories IP Address Two Factor Authentication Benefits Vendor Management Best Practice CrashOverride Hiring/Firing

      Mobile? Grab this Article!

      QR-Code dieser Seite