Home

About Us

IT Services

Understanding IT

News & Events

Blog

Support

Contact Us

Blog
  • Register
2 minutes reading time (449 words)

The Internet of Things Gives Great Power to Our Phones

The Internet of Things Gives Great Power to Our Phones

The Internet of Things is a bit of a paradox in and of itself. It has been leveraged to accomplish great things, but at the same time, it can be used in a way that can create considerable problems. However, innovations have proven that the IoT isn’t going anywhere, anytime soon, especially now that it can use the devices that we carry in our pockets.

Taking the IoT to New Heights
Smartphones are notorious for swiftly becoming obsolete, which means that there is a great opportunity to repurpose them and give them new life as a critical component of an IoT device. Just ask NASA.

The National Aeronautics and Space Administration has long been sending satellites into orbit - despite the intense costs to construct them, let alone get them where they need to go. To help decrease these costs without sacrificing the insight that these satellites provide, NASA started the PhoneSat Project in 2009. Rather than sending a few conventional, expensive satellites into orbit, many nanosatellites can be built from off-the-shelf components and sent into space. These nanosatellites rely on smartphones in order to function.

This initiative has appeared to be very successful, as version 2.4 of PhoneSat, “CubeSat,” reentered the atmosphere on January 31, 2017 after spending more than three years orbiting Earth. These nanosatellites have a relatively tiny price tag of $8000, and have, thus far, proved massively successful.

Bringing the IoT Down to Earth
Of course, the IoT has far more uses that are much more practical to the user who is not affiliated with NASA. Samsung Electronics created a team whose task was to figure out ways of taking older models from the Galaxy line of phones and figuring out how to leverage them as an IoT device. This “Galaxy Upcycling” team created a huge variety of IoT-powered purposes - including a few for the owners of hungry pets. The Smart Fish Tank they developed could feed the fish through a text message, and the Smart Pet Bowl would send the doting pet owner a picture whenever Fido or Fluffy chows down. This project has since been completed, the final product anticipated to be released soon.

Security Concerns
Of course, the same issues plague the IoT powered by a smartphone as have plagued all IoT devices that have come before: namely, security concerns. The IoT is notorious for its devices not having sufficient security installed, and often have no real way to update later. Time will only tell if this will eventually be a fatal flaw for the IoT, or if it will be overcome.

What do you think? Would you consider using an old smartphone to make another object smarter? Tell us why or why not in the comments!

Know Your Tech: Wizard
5G is Still Going to Take A While
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, July 22, 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Cloud Business Computing Privacy Network Security Email Google Data Backup Malware Tech Term Managed IT Services Microsoft Hackers VoIp Cloud Computing Mobile Devices Software Managed IT Services Outsourced IT Efficiency Small Business Internet IT Support Android Data Recovery Hosted Solutions Backup How To Cybersecurity Internet of Things Alert Data Saving Money User Tips Communications Ransomware Cybercrime Innovation BDR Communication Data Protection Smartphone Chrome Router Smartphones Money Mobile Device Management Data Security Computers Artificial Intelligence Browser Windows Phishing Hardware Collaboration Productivity Two-factor Authentication Business Management Business Continuity Network IT Management Word BYOD Business Intelligence Connectivity Spam Social Engineering Office 365 Business Remote Monitoring IT Services Windows 10 Managed IT Vulnerability Disaster Recovery Telephone Systems Identity Theft Credit Cards Work/Life Balance Law Enforcement VPN Mobile Device Gadgets Paperless Office Servers Compliance Wi-Fi Blockchain Save Money Redundancy Private Cloud Employer-Employee Relationship Document Management Workers Website Comparison Computer App Upgrade Social Media Networking IT Plan Budget Unsupported Software Virtualization Data Breach Windows 7 Avoiding Downtime Server Data Storage Infrastructure Update CES Applications Microsoft Office Apps Operating System OneNote Spam Blocking Password Bring Your Own Device Facebook Holiday Value Content Management Multi-Factor Security Cleaning Windows 10s Office Tips Telephony Leadership eWaste Mobile Downtime Excel Entertainment Network Congestion Password Manager Nanotechnology Physical Security Digital Signature Google Docs Theft Data loss Marketing Practices Safe Mode Audit Wireless Internet Software as a Service Keyboard IT Support Trending Workplace Tips Computer Care Professional Services Fraud Root Cause Analysis Tip of the week Accountants Machine Learning HaaS Google Drive Big Data Botnet Risk Management PDF Cortana Screen Mirroring Hosted Computing Skype Data Warehousing Netflix HIPAA USB Wireless Charging Training Sync Content Filtering Enterprise Content Management Public Cloud Legal Amazon Proactive IT Windows Server 2008 YouTube Google Apps IT Consultant Business Mangement Devices Travel Telecommuting FENG HBO Encryption Scam SaaS Cast Inventory Specifications Computer Fan Bandwidth Data Management Wire Government Information Technology Lifestyle Password Management Criminal Addiction Amazon Web Services Flexibility IBM Voice over Internet Protocol Charger Gmail Thought Leadership Remote Work Outlook Current Events Access Control Start Menu Millennials Virtual Assistant The Internet of Things Software Tips Human Resources Sports Patch Management Smart Tech Regulations Mobile Computing NIST Samsung Automation Recovery webinar Online Shopping Passwords Firewall Meetings Supercomputer Recycling Electronic Medical Records Frequently Asked Questions Knowledge Authentication Tools Workforce Telephone System Black Market Settings Staff Smart Office Hiring/Firing Flash HVAC Cryptocurrency Solid State Drive Conferencing Cache Mobility Evernote Bluetooth Content Filter Vendor Management Windows 10 Miscellaneous Two Factor Authentication Employer Employee Relationship Automobile VoIP Storage Worker Health Office Education File Sharing Save Time Help Desk Twitter Managed Service Provider Hacking Battery Assessment Students Business Technology Fiber-Optic Company Culture Consultation IoT Television Strategy Healthcare Thank You Cables Managing Stress Computer Accessories Public Computer Streaming Media Loyalty Analysis Electronic Health Records Quick Tips Congratulations WiFi Unified Communications Unified Threat Management Insurance Business Owner Safety Bata Backup Rootkit

Latest News & Events

Alternative IT Solutions is proud to announce the launch of our new website at https://www.alternative-IT.co.uk. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our ser...

Contact Us

Learn more about what Alternative IT Solutions can do for your business.

Call Us Today
Call us today
(0)20 8498 4300

Avocet House, Trinity Park, Trinity Way
London, England E4 8TD