XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Internet of Things Gives Great Power to Our Phones

The Internet of Things Gives Great Power to Our Phones

The Internet of Things is a bit of a paradox in and of itself. It has been leveraged to accomplish great things, but at the same time, it can be used in a way that can create considerable problems. However, innovations have proven that the IoT isn’t going anywhere, anytime soon, especially now that it can use the devices that we carry in our pockets.

Taking the IoT to New Heights
Smartphones are notorious for swiftly becoming obsolete, which means that there is a great opportunity to repurpose them and give them new life as a critical component of an IoT device. Just ask NASA.

The National Aeronautics and Space Administration has long been sending satellites into orbit - despite the intense costs to construct them, let alone get them where they need to go. To help decrease these costs without sacrificing the insight that these satellites provide, NASA started the PhoneSat Project in 2009. Rather than sending a few conventional, expensive satellites into orbit, many nanosatellites can be built from off-the-shelf components and sent into space. These nanosatellites rely on smartphones in order to function.

This initiative has appeared to be very successful, as version 2.4 of PhoneSat, “CubeSat,” reentered the atmosphere on January 31, 2017 after spending more than three years orbiting Earth. These nanosatellites have a relatively tiny price tag of $8000, and have, thus far, proved massively successful.

Bringing the IoT Down to Earth
Of course, the IoT has far more uses that are much more practical to the user who is not affiliated with NASA. Samsung Electronics created a team whose task was to figure out ways of taking older models from the Galaxy line of phones and figuring out how to leverage them as an IoT device. This “Galaxy Upcycling” team created a huge variety of IoT-powered purposes - including a few for the owners of hungry pets. The Smart Fish Tank they developed could feed the fish through a text message, and the Smart Pet Bowl would send the doting pet owner a picture whenever Fido or Fluffy chows down. This project has since been completed, the final product anticipated to be released soon.

Security Concerns
Of course, the same issues plague the IoT powered by a smartphone as have plagued all IoT devices that have come before: namely, security concerns. The IoT is notorious for its devices not having sufficient security installed, and often have no real way to update later. Time will only tell if this will eventually be a fatal flaw for the IoT, or if it will be overcome.

What do you think? Would you consider using an old smartphone to make another object smarter? Tell us why or why not in the comments!

Know Your Tech: Wizard
Is Blockchain the Future of Cybersecurity?


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, February 22 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Best Practices Saving Money Backup Workplace Tips Software Business Computing Managed Service Provider Hosted Solutions Data Hackers Google Small Business Mobile Devices Hardware VoIP Productivity Mobile Office Network Security Gadgets Malware Email Quick Tips Efficiency Network Innovation IT Support Business Management IT Services Social Media Business Business Continuity Smartphones Miscellaneous Server Upgrade Virtualization Communication User Tips Disaster Recovery Communications Windows Data Backup Computer Managed IT Services Microsoft Office Data Recovery Smartphone Users Passwords Mobile Device Management Browser Android Holiday Marketing Save Money WiFi Internet of Things Outsourced IT Tech Term Ransomware Alert Vendor Management BDR Artificial Intelligence Mobile Computing Cloud Computing Cybercrime Router Windows 10 Operating System Chrome Productivity Remote Monitoring Automation Bring Your Own Device Apple BYOD Information Technology Cybersecurity Computers Avoiding Downtime Big Data Firewall Remote Computing IT Solutions The Internet of Things Telephone Systems Health Going Green Current Events Managed IT Services History Best Practice Collaboration VPN Spam Phone System Printer Facebook Social Engineering Wireless Technology Employer-Employee Relationship Trending IT Consultant Application Proactive IT Hacking Windows 10 Lithium-ion Battery Office IT Support Mobile Device Budget Mobility Excel Money App Bandwidth Business Intelligence Training Mouse Networking Phishing Content Filtering Business Managament Two-factor Authentication Fax Server Private Cloud Maintenance Windows 8 Unified Threat Management Recovery Office 365 Encryption Applications How To iPhone Hard Drives User Error Website Antivirus Google Drive Data Security Humor Outlook Analytics Information Gmail Managed IT Tutorials Virus File Sharing Settings Apps Redundancy Law Enforcement Value PowerPoint Sports Data Protection Blockchain Word Save Time Customer Relationship Management Access Control Office Tips Social Identity Theft Saving Time Inbound Marketing Machine Learning Compliance Flexibility Voice over Internet Protocol Analysis Entertainment Downtime IT Management Administration Memory Retail Vulnerability Servers Managed Service Wi-Fi Human Resources Social Networking Conferencing Digital Payment Connectivity Computer Repair Data Management Network Congestion Hacker Tablet Software as a Service Search Twitter Tech Support Document Management Administrator Streaming Media Risk Management Scam Spam Blocking SaaS Windows 7 Skype Smart Tech Google Docs Programming Botnet Augmented Reality Intranet Running Cable Data storage Wearable Technology eWaste Credit Cards Net Neutrality Internet Exlporer Touchscreen Instant Messaging OneNote PDF Paperless Office Environment HaaS End of Support Best Available Webinar Safety Display Government Fraud Business Technology Data Storage YouTube CES Bluetooth IT Plan Help Desk Biometrics Video Surveillance People Keyboard Meetings Samsung Work/Life Balance IT service Data Breach DDoS Virtual Assistant Content Management IBM Unsupported Software Online Currency Solid State Drive Piracy Infrastructure Workers Recycling Healthcare Point of Sale Black Market Leadership Telephone System Update Education Wireless Physical Security Robot Data loss Cleaning Password Computer Accessories Statistics USB Public Cloud Telephony Comparison Wire Microchip Tablets Patch Management Colocation Online Shopping Laptop Alerts Staff SharePoint Company Culture Cryptocurrency Windows Media Player Virtual Desktop Screen Mirroring Shadow IT Business Mangement Law Firm IT Content Filter Camera File Versioning Hiring/Firing 360 Emails Specifications Vendor Cost Management Electronic Medical Records Hybrid Cloud Text Messaging Start Menu Theft Authentication MSP Smartwatch Data Warehousing Smart Office Upgrades Analyitcs Windows 10s IaaS Computing Infrastructure Gaming Console Regulations Evernote LinkedIn Insurance Business Owner Touchpad Work Station Digital Signature Relocation HBO Safe Mode Customer Service Charger Cast Legal Travel Criminal Storage Multiple Versions Millennials Windows 8.1 Update HVAC Security Cameras Hiring/Firing Mobile Cortana Nanotechnology Remote Worker Employee Consultant HIPAA Monitor Search Engine Wireless Charging Practices Multi-Factor Security Strategy Hosted Solution Frequently Asked Questions Accountants Cameras Computer Care Debate Addiction Virtual Private Network Restore Data Workforce Enterprise Content Management Employee/Employer Relationship Professional Services Google Apps Wiring Digital Signage Licensing Reputation Students Bing Virtual Reality Audit Internet exploMicrosoft Flash Fiber-Optic Hosted Computing Proactive WIndows 7 Lifestyle Backup and Disaster Recovery Netflix Webcam Tip of the week Amazon Printer Server Shortcut NarrowBand Cache Project Management Telecommuting Password Management Worker Commute Root Cause Analysis Uninterrupted Power Supply Tools Devices GDPR Google Search User Customers Shortcuts Bloatware Computer Fan Advertising Sync Cables Inventory Remote Monitoring and Maintenance Managing Stress Domains Supercomputer Science Distributed Denial of Service Files Windows Server 2008 Amazon Web Services IoT Chromecast PC Care IT Security Wireless Internet Warranty Scheduling Software Tips Remote Work NIST 3D Password Manager Print Server Thought Leadership E-Commerce Macro ISP Remote Support Electronic Health Records eCommerce Entrepreneur FENG Notifications eBay Unified Communications nternet Crowdfunding Line of Business Co-managed IT Knowledge Regulation Assessment How to Rootkit Techology Politics Utility Computing Transportation Television Webinar Printers Troubleshooting Benefits Automobile Public Computer IT solutions Employer Employee Relationship CrashOverride Thank You Smart Technology Battery Books Loyalty Video Games Experience Congratulations Two Factor Authentication Content Cryptomining Emergency Scalability Worker Music Audiobook

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *