window._mfq = window._mfq || []; (function() { var mf = document.createElement("script"); mf.type = "text/javascript"; mf.async = true; mf.src = "//"; document.getElementsByTagName("head")[0].appendChild(mf); })();
407-478-6600    Get SUPPORT

TaylorWorks Blog

The Internet of Things Gives Great Power to Our Phones

The Internet of Things Gives Great Power to Our Phones

The Internet of Things is a bit of a paradox in and of itself. It has been leveraged to accomplish great things, but at the same time, it can be used in a way that can create considerable problems. However, innovations have proven that the IoT isn’t going anywhere, anytime soon, especially now that it can use the devices that we carry in our pockets.

Taking the IoT to New Heights
Smartphones are notorious for swiftly becoming obsolete, which means that there is a great opportunity to repurpose them and give them new life as a critical component of an IoT device. Just ask NASA.

The National Aeronautics and Space Administration has long been sending satellites into orbit - despite the intense costs to construct them, let alone get them where they need to go. To help decrease these costs without sacrificing the insight that these satellites provide, NASA started the PhoneSat Project in 2009. Rather than sending a few conventional, expensive satellites into orbit, many nanosatellites can be built from off-the-shelf components and sent into space. These nanosatellites rely on smartphones in order to function.

This initiative has appeared to be very successful, as version 2.4 of PhoneSat, “CubeSat,” reentered the atmosphere on January 31, 2017 after spending more than three years orbiting Earth. These nanosatellites have a relatively tiny price tag of $8000, and have, thus far, proved massively successful.

Bringing the IoT Down to Earth
Of course, the IoT has far more uses that are much more practical to the user who is not affiliated with NASA. Samsung Electronics created a team whose task was to figure out ways of taking older models from the Galaxy line of phones and figuring out how to leverage them as an IoT device. This “Galaxy Upcycling” team created a huge variety of IoT-powered purposes - including a few for the owners of hungry pets. The Smart Fish Tank they developed could feed the fish through a text message, and the Smart Pet Bowl would send the doting pet owner a picture whenever Fido or Fluffy chows down. This project has since been completed, the final product anticipated to be released soon.

Security Concerns
Of course, the same issues plague the IoT powered by a smartphone as have plagued all IoT devices that have come before: namely, security concerns. The IoT is notorious for its devices not having sufficient security installed, and often have no real way to update later. Time will only tell if this will eventually be a fatal flaw for the IoT, or if it will be overcome.

What do you think? Would you consider using an old smartphone to make another object smarter? Tell us why or why not in the comments!

Know Your Tech: Wizard
Is Blockchain the Future of Cybersecurity?


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, February 20 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Network Security Best Practices Cloud Business Computing Data Backup Privacy Hosted Solutions Managed IT Services Hackers Data Recovery Malware VoIP Mobile Devices Email Data Google User Tips Outsourced IT Innovation Tech Term Internet of Things Cloud Computing Backup Productivity Internet Communications Microsoft Business Continuity Hardware IT Services Saving Money BDR Business Cybersecurity Efficiency Artificial Intelligence Software Ransomware Smartphones Communication Small Business Android Smartphone IT Support IT Support Router Disaster Recovery Managed IT Services Cybercrime Browser Chrome Workplace Tips Network Business Management Applications Windows 10 Gadgets Managed IT How To Computer Mobile Device Collaboration Phishing Law Enforcement Training Virtualization Save Money Office 365 Computers Server Money Data Security Spam Information BYOD Mobile Device Management Data Protection Encryption Two-factor Authentication Proactive IT Holiday Mobility Access Control Blockchain Word Windows Avoiding Downtime Business Intelligence Firewall Private Cloud Miscellaneous Upgrade Social Media Redundancy Connectivity IT Management File Sharing Alert Automation Machine Learning Voice over Internet Protocol Telephone Systems Wi-Fi Managed Service Software as a Service Bandwidth Social Engineering Passwords Document Management Identity Theft Apps App Analysis Compliance Remote Monitoring Vulnerability Productivity Servers Settings Facebook Flexibility Telephone System Botnet Solid State Drive OneNote Password VPN Information Technology Infrastructure Big Data Healthcare Fraud Scam Website Data loss Data Breach Mobile Computing Spam Blocking Google Docs CES Sports Business Owner Value Operating System IT Plan Windows 7 Education Bring Your Own Device Content Management Comparison Business Technology Health Telephony Unsupported Software Keyboard Paperless Office Networking Unified Threat Management Data Storage Smart Tech Workers Virtual Assistant Work/Life Balance Employer-Employee Relationship Hacker Save Time Google Drive Human Resources Budget Credit Cards Microsoft Office Update Excel Warranty Millennials Insurance Cryptocurrency Meetings Smartwatch eWaste Wireless Internet webinar Start Menu Social Wireless Charging Hard Drives Content Filter Audit Physical Security E-Commerce Lifestyle Staff Knowledge Users Flash Search Engine Virtual Reality Fiber-Optic Nanotechnology Computer Care Data Warehousing Line of Business WiFi File Versioning Tip of the week Printer Workforce Black Market Content Filtering Computing Infrastructure Practices Safe Mode Emails Travel Employee Criminal Wire Accountants HVAC Conferencing Mobile Vendor Hacking Password Manager Storage Camera Instant Messaging Digital Signature Electronic Health Records Network Congestion Bing Amazon Worker Commute Public Cloud Cables Samsung MSP Multiple Versions HIPAA Windows Server 2008 Mouse Telecommuting Battery Hosted Computing Charger Wireless Screen Mirroring Digital Signage Legal Entertainment Cortana Downtime USB Enterprise Content Management Professional Services Display Business Mangement Computer Fan Windows 10 HBO Electronic Medical Records IT Consultant Sync Help Desk Amazon Web Services Managed Service Provider Unified Communications Devices Remote Worker Restore Data Remote Computing Administrator Remote Work End of Support Inventory Cast Google Search Smart Office Virtual Private Network Recovery IoT Password Management Tools Security Cameras Data Management Gmail Addiction FENG Outlook Office Tips Strategy YouTube Leadership Shortcuts Online Shopping PDF Theft Thought Leadership Windows 10s Augmented Reality Wiring Multi-Factor Security Backup and Disaster Recovery Regulations Microchip Netflix Wireless Technology Proactive Government Technology Tips Frequently Asked Questions Project Management Specifications HaaS NIST Root Cause Analysis Employee/Employer Relationship Recycling Cache Marketing Skype eCommerce Evernote Google Apps Streaming Media SaaS The Internet of Things Software Tips GDPR Trending Students Current Events Patch Management Authentication Cleaning Remote Monitoring and Maintenance Risk Management Colocation Competition Content Customer Relationship Management History Computer Accessories Managing Stress IP Address Music Two Factor Authentication Search Politics Relocation Vendor Management Regulation Audiobook CrashOverride Customer Service Wearable Technology Techology Bluetooth Mobile Office Assessment Transportation Domains Video Games Humor Books Internet Exlporer Webinar How to User Error Automobile Twitter Television Printers Benefits Hybrid Cloud Public Speaking IT solutions Presentation Best Practice Troubleshooting Worker Lithium-ion battery Hiring/Firing Public Computer Smart Technology Loyalty Scalability Tech Support Emergency Fun Internet exploMicrosoft 5G Net Neutrality Quick Tips Shadow IT Hosted Solution Rootkit Safety IBM Files Employer Employee Relationship Company Culture Experience Utility Computing Advertising ISP Office

Mobile? Grab this Article!

QR-Code dieser Seite