About Us

IT Services

Understanding IT

News & Events



Contact Us

  • Register

Alternative IT Solutions Blog

The Internet of Things Gives Great Power to Our Phones

The Internet of Things Gives Great Power to Our Phones

The Internet of Things is a bit of a paradox in and of itself. It has been leveraged to accomplish great things, but at the same time, it can be used in a way that can create considerable problems. However, innovations have proven that the IoT isn’t going anywhere, anytime soon, especially now that it can use the devices that we carry in our pockets.

Taking the IoT to New Heights
Smartphones are notorious for swiftly becoming obsolete, which means that there is a great opportunity to repurpose them and give them new life as a critical component of an IoT device. Just ask NASA.

The National Aeronautics and Space Administration has long been sending satellites into orbit - despite the intense costs to construct them, let alone get them where they need to go. To help decrease these costs without sacrificing the insight that these satellites provide, NASA started the PhoneSat Project in 2009. Rather than sending a few conventional, expensive satellites into orbit, many nanosatellites can be built from off-the-shelf components and sent into space. These nanosatellites rely on smartphones in order to function.

This initiative has appeared to be very successful, as version 2.4 of PhoneSat, “CubeSat,” reentered the atmosphere on January 31, 2017 after spending more than three years orbiting Earth. These nanosatellites have a relatively tiny price tag of $8000, and have, thus far, proved massively successful.

Bringing the IoT Down to Earth
Of course, the IoT has far more uses that are much more practical to the user who is not affiliated with NASA. Samsung Electronics created a team whose task was to figure out ways of taking older models from the Galaxy line of phones and figuring out how to leverage them as an IoT device. This “Galaxy Upcycling” team created a huge variety of IoT-powered purposes - including a few for the owners of hungry pets. The Smart Fish Tank they developed could feed the fish through a text message, and the Smart Pet Bowl would send the doting pet owner a picture whenever Fido or Fluffy chows down. This project has since been completed, the final product anticipated to be released soon.

Security Concerns
Of course, the same issues plague the IoT powered by a smartphone as have plagued all IoT devices that have come before: namely, security concerns. The IoT is notorious for its devices not having sufficient security installed, and often have no real way to update later. Time will only tell if this will eventually be a fatal flaw for the IoT, or if it will be overcome.

What do you think? Would you consider using an old smartphone to make another object smarter? Tell us why or why not in the comments!

Know Your Tech: Wizard
5G is Still Going to Take A While


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, February 16, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Cloud Business Computing Network Security Privacy Data Backup Google User Tips Hosted Solutions Mobile Devices Email Tech Term Hackers Malware Productivity Data Recovery Data VoIp Managed IT Services Cloud Computing Microsoft Outsourced IT IT Support Communications Innovation Managed IT Services Hardware IT Services Communication Efficiency Internet Internet of Things Software Backup Smartphone Smartphones Workplace Tips Business Cybersecurity Router Chrome Browser Android Windows 10 Business Continuity Network Small Business BDR Artificial Intelligence Saving Money How To Alert Business Management Cybercrime Mobile Device Gadgets Ransomware Office 365 Spam Windows Money Collaboration Information Server Disaster Recovery Holiday Phishing Word Two-factor Authentication Data Protection Applications Computer Mobile Device Management Data Security Computers Wi-Fi Remote Monitoring Voice over Internet Protocol Connectivity Identity Theft Social Media Vulnerability Managed Service Social Engineering Encryption Facebook Software as a Service Managed IT Servers IT Management Save Money BYOD Business Intelligence Telephone Systems Settings Private Cloud Miscellaneous Content Management VPN IT Plan Virtualization Paperless Office Unsupported Software Avoiding Downtime Employer-Employee Relationship Update Blockchain Windows 7 App Machine Learning Mobile Computing Document Management Microsoft Office Data Storage Apps Networking Passwords Budget Mobility Operating System OneNote Value Spam Blocking Virtual Assistant Bring Your Own Device Credit Cards Data Breach Google Docs Work/Life Balance Keyboard Telephony Compliance Telephone System Redundancy Firewall Fraud Automation Website Infrastructure Access Control Botnet Human Resources Sports Upgrade Comparison CES Workers Google Drive Training Scam Law Enforcement Password Microchip Government HVAC Public Cloud Help Desk Specifications Network Congestion Cache Windows Server 2008 Entertainment Information Technology Lifestyle Marketing eWaste FENG HBO Amazon Web Services Digital Signature Cast File Sharing Social Password Manager Nanotechnology Computer Fan Remote Work Enterprise Content Management Practices Start Menu Millennials HaaS Charger Wireless Internet Netflix Accountants Smartwatch Regulations Outlook Warranty Online Shopping Samsung PDF Vendor Proactive IT Big Data The Internet of Things Software Tips Patch Management Password Management Search Engine WiFi Electronic Medical Records Hosted Computing Recovery MSP Tools Workforce IT Consultant HIPAA USB Meetings Evernote Bandwidth YouTube Employee SaaS Hiring/Firing Legal Frequently Asked Questions Printer Display Multi-Factor Security Flexibility IBM Business Mangement Devices Black Market Camera Mobile Flash NIST Bing Theft Inventory Solid State Drive Augmented Reality Cleaning Data Management Wire Windows 10s Digital Signage Current Events Criminal Addiction Downtime Excel Mouse Security Cameras Trending Supercomputer IT Support Gmail Thought Leadership Physical Security Professional Services webinar Data loss Cryptocurrency Shortcuts Cortana Audit Remote Worker Risk Management Computer Care Wireless Charging Smart Tech Google Search Skype Knowledge Health Root Cause Analysis Tip of the week Administrator Hacker Sync Content Filtering Unified Threat Management Save Time Recycling Amazon Conferencing Smart Office Screen Mirroring Safe Mode Google Apps Authentication Data Warehousing Wiring Travel Telecommuting Office Tips Leadership Staff Fiber-Optic Insurance Remote Monitoring and Maintenance Net Neutrality Windows 10 Hacking Battery Regulation Employee/Employer Relationship Content Filter Project Management Automobile GDPR Utility Computing Cables Consultation Line of Business ISP Thank You Storage Education Business Technology E-Commerce Unified Communications Assessment Computer Accessories Congratulations Twitter Business Owner Students Rootkit Bata Backup Television Bluetooth Two Factor Authentication IoT Company Culture Instant Messaging Employer Employee Relationship Vendor Management Strategy Healthcare Printers Loyalty Worker Public Computer Office Managing Stress VoIP Proactive Quick Tips Analysis Electronic Health Records Streaming Media Virtual Private Network Safety eCommerce Managed Service Provider

Latest News & Events

Alternative IT Solutions is proud to announce the launch of our new website at https://www.alternative-IT.co.uk. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our ser...

Contact Us

Learn more about what Alternative IT Solutions can do for your business.

Call Us Today
Call us today
(0)20 8498 4300

Avocet House, Trinity Park, Trinity Way
London, England E4 8TD