XFER Blog

XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Internet of Things Gives Great Power to Our Phones

The Internet of Things Gives Great Power to Our Phones

The Internet of Things is a bit of a paradox in and of itself. It has been leveraged to accomplish great things, but at the same time, it can be used in a way that can create considerable problems. However, innovations have proven that the IoT isn’t going anywhere, anytime soon, especially now that it can use the devices that we carry in our pockets.

Taking the IoT to New Heights
Smartphones are notorious for swiftly becoming obsolete, which means that there is a great opportunity to repurpose them and give them new life as a critical component of an IoT device. Just ask NASA.

The National Aeronautics and Space Administration has long been sending satellites into orbit - despite the intense costs to construct them, let alone get them where they need to go. To help decrease these costs without sacrificing the insight that these satellites provide, NASA started the PhoneSat Project in 2009. Rather than sending a few conventional, expensive satellites into orbit, many nanosatellites can be built from off-the-shelf components and sent into space. These nanosatellites rely on smartphones in order to function.

This initiative has appeared to be very successful, as version 2.4 of PhoneSat, “CubeSat,” reentered the atmosphere on January 31, 2017 after spending more than three years orbiting Earth. These nanosatellites have a relatively tiny price tag of $8000, and have, thus far, proved massively successful.

Bringing the IoT Down to Earth
Of course, the IoT has far more uses that are much more practical to the user who is not affiliated with NASA. Samsung Electronics created a team whose task was to figure out ways of taking older models from the Galaxy line of phones and figuring out how to leverage them as an IoT device. This “Galaxy Upcycling” team created a huge variety of IoT-powered purposes - including a few for the owners of hungry pets. The Smart Fish Tank they developed could feed the fish through a text message, and the Smart Pet Bowl would send the doting pet owner a picture whenever Fido or Fluffy chows down. This project has since been completed, the final product anticipated to be released soon.

Security Concerns
Of course, the same issues plague the IoT powered by a smartphone as have plagued all IoT devices that have come before: namely, security concerns. The IoT is notorious for its devices not having sufficient security installed, and often have no real way to update later. Time will only tell if this will eventually be a fatal flaw for the IoT, or if it will be overcome.

What do you think? Would you consider using an old smartphone to make another object smarter? Tell us why or why not in the comments!

Know Your Tech: Wizard
Is Blockchain the Future of Cybersecurity?
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, September 20 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Saving Money Best Practices Backup Software Workplace Tips Managed Service Provider Business Computing Small Business Hackers Hosted Solutions Data Productivity Google Hardware Mobile Devices Mobile Office VoIP Email Gadgets Quick Tips Malware Network IT Support Network Security Efficiency Innovation Social Media Business Management IT Services Miscellaneous Business Continuity Smartphones Server Virtualization Upgrade Business Windows Disaster Recovery Communication Microsoft Office Managed IT Services Communications Users Computer Passwords User Tips Mobile Device Management Data Backup Android Browser Save Money Smartphone Marketing WiFi Holiday Alert Data Recovery Tech Term Mobile Computing Ransomware Vendor Management Remote Monitoring Windows 10 Internet of Things Operating System Outsourced IT Cybercrime Avoiding Downtime Bring Your Own Device Apple BYOD Cloud Computing Computers BDR Information Technology Automation VPN Big Data Remote Computing Current Events IT Solutions History Best Practice The Internet of Things Artificial Intelligence Router Going Green Firewall Chrome Telephone Systems Social Engineering Health Phone System Employer-Employee Relationship Wireless Technology Trending IT Consultant Cybersecurity Application Facebook Collaboration Hacking Spam Office Lithium-ion Battery Managed IT Services Excel Budget App Printer Money Proactive IT Bandwidth Business Intelligence Fax Server Networking iPhone Applications Maintenance Windows 8 Content Filtering Two-factor Authentication Mobility How To Recovery Unified Threat Management Business Managament Windows 10 Antivirus Website Phishing Virus Redundancy Law Enforcement Office 365 Customer Relationship Management Analytics Hard Drives Gmail Training Mouse Data Protection Value Apps Sports Managed IT User Error Data Security PowerPoint Humor Outlook Tutorials Private Cloud IT Management Data Management Office Tips Connectivity Saving Time Compliance Encryption Flexibility IT Support Vulnerability Downtime Entertainment Inbound Marketing File Sharing Memory Retail Tech Support Settings Conferencing Google Drive Administration Blockchain Word Mobile Device Tablet Network Congestion Social Networking Search Digital Payment Twitter Computer Repair Identity Theft Document Management Streaming Media Risk Management Productivity Analysis Save Time Skype Programming Webinar DDoS Servers Computer Accessories Running Cable Solid State Drive Augmented Reality Intranet CES IT Plan OneNote Virtual Assistant Wearable Technology Black Market Social Wireless Physical Security Instant Messaging Data Storage Cleaning Password Content Management Best Available Unsupported Software Environment Public Cloud Infrastructure Human Resources SaaS Bluetooth Work/Life Balance Data Breach Touchscreen Scam People Biometrics Access Control Update Data storage Samsung Smart Tech IT service Workers Comparison Hacker Machine Learning eWaste Windows 7 Video Surveillance Internet Exlporer Online Currency Point of Sale Data loss Information PDF Recycling HaaS End of Support Education Safety Wi-Fi Spam Blocking Government Statistics Robot Piracy YouTube USB IBM Meetings Credit Cards Administrator Managed Service Leadership Paperless Office Millennials Tablets Electronic Medical Records Accountants Business Technology Internet exploMicrosoft Mobile Cortana PC Care Addiction Hiring/Firing Multi-Factor Security Scheduling Strategy Windows 10s Enterprise Content Management Law Firm IT Windows Media Player Wireless Charging Business Owner Virtual Desktop 3D Wiring NarrowBand Company Culture Students Customers Frequently Asked Questions Fraud Cost Management Charger eBay Cast Hosted Computing Proactive Uninterrupted Power Supply LinkedIn Upgrades Workforce Analyitcs Hiring/Firing Advertising Professional Services Google Apps HIPAA Alerts Cache Help Desk Lifestyle Password Management Distributed Denial of Service Files Flash Fiber-Optic Customer Service Devices GDPR Chromecast Net Neutrality Healthcare Tip of the week Amazon Computer Care Text Messaging Inventory Remote Monitoring and Maintenance Windows 8.1 Update Software as a Service Consultant Hosted Solution Telecommuting Gaming Console IoT Telephone System Notifications Display Tools Keyboard Work Station Wireless Internet Audit NIST Colocation Debate Sync Cameras Cables Thought Leadership E-Commerce Laptop Electronic Health Records SharePoint Windows Server 2008 Amazon Web Services Line of Business Shadow IT Licensing Netflix Software Tips Remote Work Virtual Reality Root Cause Analysis Macro Hybrid Cloud WIndows 7 Password Manager Wire Computer Fan Cryptocurrency Co-managed IT IaaS Computing Infrastructure Telephony Printer Server Unified Communications Shortcut Supercomputer Content Filter Touchpad Relocation Worker Commute Online Shopping Authentication MSP Legal Google Docs User Staff Monitor Bloatware Insurance Botnet Managing Stress Business Mangement Domains Smart Office Data Warehousing Specifications Science Webcam FENG Safe Mode IT Security Start Menu Theft Knowledge Storage Patch Management HVAC Print Server Regulations Evernote Nanotechnology Remote Worker Voice over Internet Protocol Digital Signature Reputation nternet Crowdfunding HBO Entrepreneur Screen Mirroring Practices Remote Support Travel Criminal 360 Emails Politics Battery Transportation Television Video Games Troubleshooting Webinar Benefits Automobile Public Computer Thank You Scalability IT solutions Employer Employee Relationship CrashOverride Smart Technology Congratulations How to Loyalty Techology Books Regulation Experience Two Factor Authentication Content Camera Emergency Worker Music Audiobook Printers Assessment Rootkit

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *