XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Internet of Things Gives Great Power to Our Phones

The Internet of Things Gives Great Power to Our Phones

The Internet of Things is a bit of a paradox in and of itself. It has been leveraged to accomplish great things, but at the same time, it can be used in a way that can create considerable problems. However, innovations have proven that the IoT isn’t going anywhere, anytime soon, especially now that it can use the devices that we carry in our pockets.

Taking the IoT to New Heights
Smartphones are notorious for swiftly becoming obsolete, which means that there is a great opportunity to repurpose them and give them new life as a critical component of an IoT device. Just ask NASA.

The National Aeronautics and Space Administration has long been sending satellites into orbit - despite the intense costs to construct them, let alone get them where they need to go. To help decrease these costs without sacrificing the insight that these satellites provide, NASA started the PhoneSat Project in 2009. Rather than sending a few conventional, expensive satellites into orbit, many nanosatellites can be built from off-the-shelf components and sent into space. These nanosatellites rely on smartphones in order to function.

This initiative has appeared to be very successful, as version 2.4 of PhoneSat, “CubeSat,” reentered the atmosphere on January 31, 2017 after spending more than three years orbiting Earth. These nanosatellites have a relatively tiny price tag of $8000, and have, thus far, proved massively successful.

Bringing the IoT Down to Earth
Of course, the IoT has far more uses that are much more practical to the user who is not affiliated with NASA. Samsung Electronics created a team whose task was to figure out ways of taking older models from the Galaxy line of phones and figuring out how to leverage them as an IoT device. This “Galaxy Upcycling” team created a huge variety of IoT-powered purposes - including a few for the owners of hungry pets. The Smart Fish Tank they developed could feed the fish through a text message, and the Smart Pet Bowl would send the doting pet owner a picture whenever Fido or Fluffy chows down. This project has since been completed, the final product anticipated to be released soon.

Security Concerns
Of course, the same issues plague the IoT powered by a smartphone as have plagued all IoT devices that have come before: namely, security concerns. The IoT is notorious for its devices not having sufficient security installed, and often have no real way to update later. Time will only tell if this will eventually be a fatal flaw for the IoT, or if it will be overcome.

What do you think? Would you consider using an old smartphone to make another object smarter? Tell us why or why not in the comments!

Know Your Tech: Wizard
Is Blockchain the Future of Cybersecurity?
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, July 19 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Saving Money Best Practices Backup Software Managed Service Provider Workplace Tips Business Computing Small Business Google Hackers Productivity Mobile Office Data Hosted Solutions Mobile Devices Hardware VoIP Gadgets Quick Tips Email Malware Efficiency IT Support Network Social Media Business Management Business Continuity Innovation Network Security Server Virtualization Smartphones Business Upgrade IT Services Miscellaneous Windows Disaster Recovery Communication Managed IT Services Microsoft Office Computer Communications Users Mobile Device Management Passwords Android User Tips Smartphone Marketing Data Backup Browser Alert WiFi Holiday Save Money Vendor Management Cybercrime Windows 10 Operating System Data Recovery Mobile Computing Ransomware Remote Monitoring Internet of Things Bring Your Own Device Apple BYOD BDR Outsourced IT Information Technology Avoiding Downtime Computers Router Going Green Big Data Current Events Remote Computing Tech Term Telephone Systems IT Solutions Best Practice History The Internet of Things Cloud Computing VPN Chrome Wireless Technology Firewall Automation Social Engineering Spam IT Consultant Employer-Employee Relationship Health Cybersecurity Trending Application Collaboration Hacking Phone System Bandwidth Printer Money Facebook Lithium-ion Battery Proactive IT Office Budget Excel Artificial Intelligence App Content Filtering Networking Business Managament Business Intelligence Managed IT Services Fax Server Two-factor Authentication Mobility Maintenance Windows 8 How To Recovery iPhone Mouse Phishing User Error Website Humor Data Protection Outlook Tutorials Managed IT Gmail Virus Antivirus Apps Analytics Data Security PowerPoint Unified Threat Management Private Cloud Redundancy Law Enforcement Office 365 Customer Relationship Management Hard Drives Value Windows 10 Inbound Marketing Twitter Office Tips Document Management Streaming Media Risk Management Google Drive Compliance Blockchain Administration Flexibility Vulnerability Entertainment Mobile Device Connectivity Word Digital Payment Social Networking Saving Time Computer Repair Retail Identity Theft Downtime Memory Data Management Tech Support Network Congestion Conferencing Productivity Tablet Sports Search Save Time Social Public Cloud Online Currency Content Management Point of Sale Analysis SaaS Recycling Unsupported Software Education Infrastructure OneNote Touchscreen Data storage Statistics IT Support Paperless Office Update Skype Data Storage eWaste Programming Internet Exlporer Comparison Webinar PDF Video Surveillance Safety Wi-Fi Running Cable Work/Life Balance Data Breach Settings Windows 7 HaaS End of Support Intranet Environment YouTube Government Wearable Technology Human Resources Biometrics Meetings Workers Piracy File Sharing IT service IBM Best Available Credit Cards Leadership DDoS Hacker Administrator Data loss IT Management Bluetooth Access Control Solid State Drive Computer Accessories Black Market People Smart Tech Servers Scam Encryption CES Samsung Spam Blocking Robot IT Plan Training Wireless Physical Security USB Cleaning Password Entrepreneur Lifestyle Insurance Flash Fiber-Optic Notifications Smart Office Electronic Medical Records Software as a Service Text Messaging Laptop Safe Mode Business Owner Tip of the week Amazon Colocation Storage Windows 10s Tablets HVAC Charger Cast Windows Media Player Virtual Desktop Telecommuting SharePoint Work Station IT Security Nanotechnology Hiring/Firing Tools Gaming Console Shadow IT Hiring/Firing Cost Management Print Server Practices HIPAA Sync Cables Hybrid Cloud Touchpad nternet Crowdfunding Accountants Business Technology Windows Server 2008 Amazon Web Services IaaS Computing Infrastructure Remote Support Addiction Upgrades Analyitcs Legal Enterprise Content Management Computer Care Customer Service Software Tips Remote Work Relocation Hosted Solution Password Manager Instant Messaging Monitor Law Firm IT Hosted Computing Keyboard Consultant Telephony Unified Communications Company Culture Students Google Docs Staff Virtual Assistant Online Shopping Augmented Reality Cache Audit LinkedIn Password Management Cameras Help Desk Devices Netflix Botnet Business Mangement Healthcare Root Cause Analysis Data Warehousing Specifications Reputation Inventory Licensing Start Menu Theft Webcam Net Neutrality Virtual Reality Voice over Internet Protocol Digital Signature IoT Telephone System Supercomputer WIndows 7 Regulations Evernote Internet exploMicrosoft Windows 8.1 Update Wireless Internet Computer Fan NarrowBand NIST Printer Server Shortcut HBO Display Thought Leadership Travel Criminal Electronic Health Records Worker Commute Millennials PC Care Customers Debate User Mobile Cortana Uninterrupted Power Supply Bloatware Multi-Factor Security Strategy 3D Applications Knowledge Managing Stress Domains Wireless Charging Scheduling Advertising Wire FENG Macro eBay Chromecast Cryptocurrency Frequently Asked Questions Fraud Distributed Denial of Service Files Content Filter Patch Management Science Machine Learning Screen Mirroring Workforce Alerts Authentication 360 Emails Professional Services Google Apps Co-managed IT Politics How to Television Transportation Troubleshooting Webinar Techology Automobile Public Computer Benefits IT solutions Employer Employee Relationship CrashOverride Smart Technology Loyalty Books Thank You Experience Battery Content Two Factor Authentication Video Games Emergency Worker Congratulations Music Audiobook Scalability Assessment Rootkit

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *