window._mfq = window._mfq || []; (function() { var mf = document.createElement("script"); mf.type = "text/javascript"; mf.async = true; mf.src = "//"; document.getElementsByTagName("head")[0].appendChild(mf); })();
407-478-6600    Get SUPPORT

TaylorWorks Blog

The Internet of Things Gives Great Power to Our Phones

The Internet of Things Gives Great Power to Our Phones

The Internet of Things is a bit of a paradox in and of itself. It has been leveraged to accomplish great things, but at the same time, it can be used in a way that can create considerable problems. However, innovations have proven that the IoT isn’t going anywhere, anytime soon, especially now that it can use the devices that we carry in our pockets.

Taking the IoT to New Heights
Smartphones are notorious for swiftly becoming obsolete, which means that there is a great opportunity to repurpose them and give them new life as a critical component of an IoT device. Just ask NASA.

The National Aeronautics and Space Administration has long been sending satellites into orbit - despite the intense costs to construct them, let alone get them where they need to go. To help decrease these costs without sacrificing the insight that these satellites provide, NASA started the PhoneSat Project in 2009. Rather than sending a few conventional, expensive satellites into orbit, many nanosatellites can be built from off-the-shelf components and sent into space. These nanosatellites rely on smartphones in order to function.

This initiative has appeared to be very successful, as version 2.4 of PhoneSat, “CubeSat,” reentered the atmosphere on January 31, 2017 after spending more than three years orbiting Earth. These nanosatellites have a relatively tiny price tag of $8000, and have, thus far, proved massively successful.

Bringing the IoT Down to Earth
Of course, the IoT has far more uses that are much more practical to the user who is not affiliated with NASA. Samsung Electronics created a team whose task was to figure out ways of taking older models from the Galaxy line of phones and figuring out how to leverage them as an IoT device. This “Galaxy Upcycling” team created a huge variety of IoT-powered purposes - including a few for the owners of hungry pets. The Smart Fish Tank they developed could feed the fish through a text message, and the Smart Pet Bowl would send the doting pet owner a picture whenever Fido or Fluffy chows down. This project has since been completed, the final product anticipated to be released soon.

Security Concerns
Of course, the same issues plague the IoT powered by a smartphone as have plagued all IoT devices that have come before: namely, security concerns. The IoT is notorious for its devices not having sufficient security installed, and often have no real way to update later. Time will only tell if this will eventually be a fatal flaw for the IoT, or if it will be overcome.

What do you think? Would you consider using an old smartphone to make another object smarter? Tell us why or why not in the comments!

Know Your Tech: Wizard
Is Blockchain the Future of Cybersecurity?


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, October 18 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Network Security Cloud Best Practices Privacy Managed IT Services Business Computing Hackers Data Backup Malware Email VoIP Outsourced IT Hosted Solutions Data Recovery Mobile Devices Data Tech Term Google Innovation Backup Internet Microsoft Software Business Continuity Internet of Things Saving Money Cloud Computing Ransomware Hardware IT Services Small Business Cybersecurity IT Support Android User Tips Smartphones Efficiency Communications BDR Communication Applications Browser Cybercrime Disaster Recovery Artificial Intelligence Gadgets Managed IT Services Law Enforcement Network Managed IT Workplace Tips Windows 10 Router Business How To Computer Productivity IT Support Business Intelligence Virtualization Collaboration Windows Smartphone Business Management Money Data Security Save Money Phishing Computers BYOD Data Protection Chrome Mobile Device Management Two-factor Authentication Avoiding Downtime Remote Monitoring Mobility App Document Management Facebook Apps Connectivity Productivity Proactive IT Bandwidth Compliance Server Office 365 Firewall Redundancy Miscellaneous IT Management Alert Vulnerability Upgrade Social Media Blockchain Spam Training Analysis Social Engineering Information Identity Theft Telephone Systems Passwords Word Managed Service Automation Servers Credit Cards Update Keyboard Solid State Drive Mobile Device Value Operating System Flexibility File Sharing Information Technology Budget Work/Life Balance CES Sports Password Microsoft Office Private Cloud Virtual Assistant Fraud Data loss Encryption Machine Learning Big Data Unified Threat Management Content Management Website Mobile Computing Networking Telephone System Workers Scam Access Control Settings Paperless Office Smart Tech IT Plan OneNote Windows 7 Comparison Wi-Fi Unsupported Software Data Breach Business Owner Infrastructure Data Storage VPN Bring Your Own Device Employer-Employee Relationship Holiday Spam Blocking Education Practices Safe Mode Google Drive Skype Data Management Charger Evernote Criminal Wire Wireless Technology Software Tips Recovery Trending Downtime Business Technology Password Manager Storage Virtual Private Network Computer Fan Accountants HVAC Excel Electronic Medical Records Millennials IT Consultant Cables Marketing Hacker Wiring Meetings Botnet Digital Signature Electronic Health Records The Internet of Things Hosted Computing Hard Drives Proactive Start Menu Wireless Charging Physical Security Lifestyle Enterprise Content Management Flash Save Time Business Mangement Project Management Data Warehousing FENG Tip of the week Workforce Patch Management Leadership Unified Communications Devices GDPR Travel Risk Management Windows 10s Computing Infrastructure Inventory Users Remote Monitoring and Maintenance Mobile Netflix Smart Office IoT Password Management Public Cloud Amazon Gmail Addiction Warranty Google Docs Windows Server 2008 Virtual Reality Telecommuting Theft Thought Leadership Cortana E-Commerce Screen Mirroring SaaS Strategy YouTube Line of Business Professional Services Cleaning HBO Black Market Content Filtering Current Events NIST Managed Service Provider Sync Hacking Amazon Web Services Recycling Cache Wireless Printer Instant Messaging Voice over Internet Protocol Worker Commute Remote Work webinar Google Apps Streaming Media Camera Cast Software as a Service HIPAA Audit End of Support Windows 10 Authentication MSP Legal Tools Entertainment Computer Care Human Resources Students Outlook Battery Knowledge Insurance Cryptocurrency PDF Telephony Online Shopping Emails eWaste Wireless Internet Health Office Tips Mouse Multi-Factor Security USB Regulations Conferencing Content Filter Technology Tips Remote Computing Government Specifications Network Congestion Fiber-Optic Nanotechnology Remote Worker Root Cause Analysis Samsung Staff Healthcare HaaS Augmented Reality Frequently Asked Questions Tech Support Webinar Files 5G Troubleshooting Advertising IBM Smart Technology Office Safety Scalability Television Emergency Colocation IT solutions History Shadow IT Hosted Solution Search Customer Relationship Management Worker Twitter Relocation Competition WiFi Experience Public Computer IP Address Loyalty Content Techology Customer Service Rootkit Humor Music Employer Employee Relationship Mobile Office Politics Internet Exlporer Audiobook User Error Domains Hybrid Cloud Regulation Wearable Technology Computer Accessories Transportation Video Games Company Culture Hiring/Firing Public Speaking Two Factor Authentication Books Automobile Vendor Management Presentation How to CrashOverride Bluetooth Benefits Quick Tips Lithium-ion battery Printers Assessment Managing Stress Fun Internet exploMicrosoft Best Practice

Mobile? Grab this Article!

QR-Code dieser Seite