About Us

IT Services

Understanding IT

News & Events



Contact Us

  • Register

Alternative IT Solutions Blog

The Internet of Things Gives Great Power to Our Phones

The Internet of Things Gives Great Power to Our Phones

The Internet of Things is a bit of a paradox in and of itself. It has been leveraged to accomplish great things, but at the same time, it can be used in a way that can create considerable problems. However, innovations have proven that the IoT isn’t going anywhere, anytime soon, especially now that it can use the devices that we carry in our pockets.

Taking the IoT to New Heights
Smartphones are notorious for swiftly becoming obsolete, which means that there is a great opportunity to repurpose them and give them new life as a critical component of an IoT device. Just ask NASA.

The National Aeronautics and Space Administration has long been sending satellites into orbit - despite the intense costs to construct them, let alone get them where they need to go. To help decrease these costs without sacrificing the insight that these satellites provide, NASA started the PhoneSat Project in 2009. Rather than sending a few conventional, expensive satellites into orbit, many nanosatellites can be built from off-the-shelf components and sent into space. These nanosatellites rely on smartphones in order to function.

This initiative has appeared to be very successful, as version 2.4 of PhoneSat, “CubeSat,” reentered the atmosphere on January 31, 2017 after spending more than three years orbiting Earth. These nanosatellites have a relatively tiny price tag of $8000, and have, thus far, proved massively successful.

Bringing the IoT Down to Earth
Of course, the IoT has far more uses that are much more practical to the user who is not affiliated with NASA. Samsung Electronics created a team whose task was to figure out ways of taking older models from the Galaxy line of phones and figuring out how to leverage them as an IoT device. This “Galaxy Upcycling” team created a huge variety of IoT-powered purposes - including a few for the owners of hungry pets. The Smart Fish Tank they developed could feed the fish through a text message, and the Smart Pet Bowl would send the doting pet owner a picture whenever Fido or Fluffy chows down. This project has since been completed, the final product anticipated to be released soon.

Security Concerns
Of course, the same issues plague the IoT powered by a smartphone as have plagued all IoT devices that have come before: namely, security concerns. The IoT is notorious for its devices not having sufficient security installed, and often have no real way to update later. Time will only tell if this will eventually be a fatal flaw for the IoT, or if it will be overcome.

What do you think? Would you consider using an old smartphone to make another object smarter? Tell us why or why not in the comments!

Know Your Tech: Wizard
5G is Still Going to Take A While


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, September 20, 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Cloud Business Computing Privacy Network Security Email Data Backup Tech Term Google Hackers Malware Innovation Microsoft Mobile Devices Managed IT Services VoIp Cloud Computing Outsourced IT Managed IT Services Hosted Solutions Software Internet Data Data Recovery IT Support Backup User Tips Small Business Internet of Things Saving Money Efficiency Hardware Android Communication Cybercrime Ransomware BDR Artificial Intelligence How To Cybersecurity Communications Smartphones Network Alert IT Services Data Protection Collaboration Windows Windows 10 Gadgets Smartphone Router Applications Chrome Money Browser Phishing Productivity Two-factor Authentication Business Management Mobile Device Management Data Security Computers Business Continuity Telephone Systems Server Save Money Workplace Tips Vulnerability Office 365 Remote Monitoring Facebook Social Media Business IT Management BYOD Social Engineering Identity Theft Business Intelligence Managed IT Connectivity Spam Word Disaster Recovery Servers IT Plan Encryption Settings Unsupported Software Redundancy Value Windows 7 Work/Life Balance Website Miscellaneous Law Enforcement Comparison Upgrade Data Storage Compliance Sports Wi-Fi Infrastructure OneNote CES Operating System Employer-Employee Relationship Spam Blocking Training Bring Your Own Device Computer Avoiding Downtime App Password Information Networking Content Management Update Mobile Computing Microsoft Office VPN Virtualization Budget Paperless Office Apps Managed Service Blockchain Data Breach Private Cloud Virtual Assistant Document Management Holiday Workers Passwords Credit Cards Firewall Mobile Device HBO Legal Remote Worker Software as a Service Hiring/Firing Keyboard YouTube Cryptocurrency FENG Knowledge Cast Professional Services Fraud Computer Fan Business Mangement Trending Devices Unified Threat Management Botnet Data Management Risk Management Wire Conferencing Inventory Cortana Cleaning Outlook Skype Criminal Addiction Wiring Office Tips Leadership Wireless Charging Safe Mode Network Congestion Amazon IT Support The Internet of Things Software Tips Sync Gmail Content Filtering Thought Leadership Marketing Meetings Patch Management Travel Human Resources Telecommuting Recovery Scam Access Control Google Apps Computer Care Frequently Asked Questions Specifications Government Smart Tech File Sharing HaaS Amazon Web Services Enterprise Content Management Black Market Information Technology Recycling Lifestyle Flash Staff Remote Work Smart Office Solid State Drive Netflix Voice over Internet Protocol Authentication Proactive IT Downtime Excel Start Menu Millennials Cache Windows 10s Telephony HVAC eWaste MSP IT Consultant Online Shopping Entertainment Password Management Physical Security Regulations SaaS Data loss Digital Signature Bandwidth Audit Password Manager Nanotechnology Flexibility IBM Root Cause Analysis Tip of the week Tools Workforce Wireless Internet Practices Charger Augmented Reality Google Drive Mobility Accountants Evernote Machine Learning NIST Current Events Screen Mirroring Mobile PDF Data Warehousing Big Data Multi-Factor Security Samsung Supercomputer Windows Server 2008 HIPAA Electronic Medical Records USB Automation Public Cloud webinar Google Docs Hosted Computing Theft Telephone System Congratulations Twitter Public Computer Loyalty Quick Tips Rootkit Students Business Owner Proactive Safety Consultation Bluetooth Two Factor Authentication Employer Employee Relationship IoT Vendor Management Company Culture Remote Monitoring and Maintenance Windows 10 Strategy Healthcare Worker Automobile Regulation Office GDPR Health Fiber-Optic Managing Stress Line of Business Save Time Analysis Electronic Health Records Streaming Media Managed Service Provider Bata Backup E-Commerce Hacking Insurance Cables Battery Business Technology Content Filter Assessment Camera VoIP WiFi Unified Communications Thank You Storage Television Education Instant Messaging Printers Help Desk Computer Accessories

Latest News & Events

Alternative IT Solutions is proud to announce the launch of our new website at https://www.alternative-IT.co.uk. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our ser...

Contact Us

Learn more about what Alternative IT Solutions can do for your business.

Call Us Today
Call us today
(0)20 8498 4300

Avocet House, Trinity Park, Trinity Way
London, England E4 8TD