XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Internet of Things Gives Great Power to Our Phones

The Internet of Things Gives Great Power to Our Phones

The Internet of Things is a bit of a paradox in and of itself. It has been leveraged to accomplish great things, but at the same time, it can be used in a way that can create considerable problems. However, innovations have proven that the IoT isn’t going anywhere, anytime soon, especially now that it can use the devices that we carry in our pockets.

Taking the IoT to New Heights
Smartphones are notorious for swiftly becoming obsolete, which means that there is a great opportunity to repurpose them and give them new life as a critical component of an IoT device. Just ask NASA.

The National Aeronautics and Space Administration has long been sending satellites into orbit - despite the intense costs to construct them, let alone get them where they need to go. To help decrease these costs without sacrificing the insight that these satellites provide, NASA started the PhoneSat Project in 2009. Rather than sending a few conventional, expensive satellites into orbit, many nanosatellites can be built from off-the-shelf components and sent into space. These nanosatellites rely on smartphones in order to function.

This initiative has appeared to be very successful, as version 2.4 of PhoneSat, “CubeSat,” reentered the atmosphere on January 31, 2017 after spending more than three years orbiting Earth. These nanosatellites have a relatively tiny price tag of $8000, and have, thus far, proved massively successful.

Bringing the IoT Down to Earth
Of course, the IoT has far more uses that are much more practical to the user who is not affiliated with NASA. Samsung Electronics created a team whose task was to figure out ways of taking older models from the Galaxy line of phones and figuring out how to leverage them as an IoT device. This “Galaxy Upcycling” team created a huge variety of IoT-powered purposes - including a few for the owners of hungry pets. The Smart Fish Tank they developed could feed the fish through a text message, and the Smart Pet Bowl would send the doting pet owner a picture whenever Fido or Fluffy chows down. This project has since been completed, the final product anticipated to be released soon.

Security Concerns
Of course, the same issues plague the IoT powered by a smartphone as have plagued all IoT devices that have come before: namely, security concerns. The IoT is notorious for its devices not having sufficient security installed, and often have no real way to update later. Time will only tell if this will eventually be a fatal flaw for the IoT, or if it will be overcome.

What do you think? Would you consider using an old smartphone to make another object smarter? Tell us why or why not in the comments!

Know Your Tech: Wizard
Is Blockchain the Future of Cybersecurity?


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, November 15 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Best Practices Saving Money Backup Workplace Tips Software Managed Service Provider Business Computing Hackers Data Small Business Hardware Hosted Solutions Google Mobile Devices Productivity Mobile Office VoIP Email Gadgets Malware Quick Tips Network Security Network Efficiency Innovation IT Support Business Social Media Business Management IT Services Smartphones Miscellaneous Server Business Continuity Upgrade Virtualization Communication Windows Disaster Recovery Computer User Tips Communications Data Backup Microsoft Office Managed IT Services Users Mobile Device Management Browser Passwords Android Data Recovery Smartphone WiFi Marketing Save Money Alert Ransomware Holiday Tech Term Vendor Management BDR Cybercrime Outsourced IT Mobile Computing Windows 10 Operating System Internet of Things Remote Monitoring Chrome Information Technology Avoiding Downtime Cloud Computing Computers Bring Your Own Device Apple BYOD Best Practice History VPN Cybersecurity Big Data Firewall Remote Computing IT Solutions The Internet of Things Automation Telephone Systems Artificial Intelligence Router Current Events Going Green Employer-Employee Relationship Managed IT Services Spam Printer Facebook Phone System Application Collaboration Wireless Technology Trending Hacking IT Consultant Social Engineering Health Office Money Excel Proactive IT Budget App Lithium-ion Battery Bandwidth Maintenance Windows 8 Unified Threat Management Applications Two-factor Authentication Mobility Business Intelligence iPhone Recovery How To Mouse Business Managament Content Filtering Productivity Fax Server Windows 10 Networking Sports Law Enforcement Value Gmail Office 365 PowerPoint Encryption Data Protection Blockchain Antivirus User Error Customer Relationship Management Training Hard Drives Data Security Managed IT Humor Analytics Information Outlook Tutorials Virus Website Phishing Private Cloud Redundancy Apps Search Computer Repair Tablet Flexibility IT Support Twitter Entertainment Tech Support Document Management Vulnerability Retail Streaming Media Risk Management Settings Administrator Scam Word Network Congestion Google Drive Saving Time Identity Theft Inbound Marketing Downtime Analysis File Sharing Save Time Memory IT Management Servers Conferencing Office Tips Administration Mobile Device Connectivity Digital Payment Compliance Social Networking Data Management DDoS Video Surveillance Virtual Assistant OneNote Online Currency Content Management Solid State Drive Black Market Recycling Instant Messaging Infrastructure Point of Sale Unsupported Software Data Storage Education Environment IBM Piracy Telephone System Statistics Human Resources Leadership Wireless Physical Security Keyboard Update Cleaning Password Access Control Work/Life Balance Data Breach Biometrics Public Cloud Programming SaaS Skype Comparison IT service Smart Tech Computer Accessories Windows 7 Hacker Workers Running Cable Data storage Augmented Reality Intranet Machine Learning Wearable Technology Social Data loss eWaste Voice over Internet Protocol Internet Exlporer USB Credit Cards Robot PDF Managed Service Safety Wi-Fi Paperless Office HaaS End of Support Spam Blocking Best Available Touchscreen Bluetooth Government Webinar YouTube People Fraud Meetings CES IT Plan Samsung Charger Cast Upgrades Flash Analyitcs Fiber-Optic Cache Project Management Lifestyle NarrowBand Hiring/Firing Tip of the week Amazon Devices GDPR Customers HIPAA Software as a Service Customer Service Password Management Uninterrupted Power Supply Inventory Remote Monitoring and Maintenance Tools Webcam Healthcare Advertising Consultant Telecommuting Chromecast Computer Care IT Security Sync Cables Wireless Internet Warranty Distributed Denial of Service Files Hosted Solution IoT Print Server Windows Server 2008 Amazon Web Services Thought Leadership E-Commerce Cameras NIST PC Care Macro Line of Business Remote Support Password Manager Electronic Health Records Notifications Audit nternet Licensing Software Tips Crowdfunding Remote Work Laptop Telephony Virtual Reality Unified Communications Scheduling Wire Microchip Colocation Netflix WIndows 7 3D Co-managed IT Root Cause Analysis Law Firm IT Online Shopping Content Filter Camera SharePoint Company Culture Printer Server Google Docs Shortcut Staff eBay Cryptocurrency Shadow IT User Authentication Alerts MSP Supercomputer Worker Commute Botnet Business Mangement Hybrid Cloud Computer Fan Touchpad Start Menu Bloatware Theft Smart Office IaaS Computing Infrastructure Data Warehousing LinkedIn Managing Stress Specifications Domains Insurance Regulations Science Evernote Storage Relocation Net Neutrality Digital Signature Text Messaging Safe Mode Legal HBO Nanotechnology Work Station Remote Worker Monitor Knowledge Windows 8.1 Update Travel Criminal Gaming Console HVAC FENG Display Mobile Entrepreneur Cortana Search Engine Patch Management Millennials Practices Screen Mirroring Debate Tablets Wireless Charging Addiction Virtual Private Network 360 Emails Multi-Factor Security Strategy Accountants Business Technology Hiring/Firing Frequently Asked Questions Wiring Reputation Windows Media Player Virtual Desktop Enterprise Content Management Electronic Medical Records Hosted Computing Proactive Business Owner Professional Services Cost Management Google Apps Help Desk Students Bing Internet exploMicrosoft Windows 10s Workforce Video Games Thank You Troubleshooting Webinar Automobile Public Computer Benefits Scalability Congratulations IT solutions Employer Employee Relationship CrashOverride Smart Technology How to Loyalty Books Regulation Experience Techology Content Two Factor Authentication Utility Computing Emergency Worker Printers Music Audiobook Assessment Rootkit Politics Battery Television Transportation

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *
      • Company Name
      • First Name *
      • Last Name *
      • Phone *
      • Phone Ext.
      • Comments:
      • Yes, subscribe me to: