Contact us today!
845-876-6561

Professional Computer Associates Blog

The Internet of Things Gives Great Power to Our Phones

The Internet of Things Gives Great Power to Our Phones

The Internet of Things is a bit of a paradox in and of itself. It has been leveraged to accomplish great things, but at the same time, it can be used in a way that can create considerable problems. However, innovations have proven that the IoT isn’t going anywhere, anytime soon, especially now that it can use the devices that we carry in our pockets.

Taking the IoT to New Heights
Smartphones are notorious for swiftly becoming obsolete, which means that there is a great opportunity to repurpose them and give them new life as a critical component of an IoT device. Just ask NASA.

The National Aeronautics and Space Administration has long been sending satellites into orbit - despite the intense costs to construct them, let alone get them where they need to go. To help decrease these costs without sacrificing the insight that these satellites provide, NASA started the PhoneSat Project in 2009. Rather than sending a few conventional, expensive satellites into orbit, many nanosatellites can be built from off-the-shelf components and sent into space. These nanosatellites rely on smartphones in order to function.

This initiative has appeared to be very successful, as version 2.4 of PhoneSat, “CubeSat,” reentered the atmosphere on January 31, 2017 after spending more than three years orbiting Earth. These nanosatellites have a relatively tiny price tag of $8000, and have, thus far, proved massively successful.

Bringing the IoT Down to Earth
Of course, the IoT has far more uses that are much more practical to the user who is not affiliated with NASA. Samsung Electronics created a team whose task was to figure out ways of taking older models from the Galaxy line of phones and figuring out how to leverage them as an IoT device. This “Galaxy Upcycling” team created a huge variety of IoT-powered purposes - including a few for the owners of hungry pets. The Smart Fish Tank they developed could feed the fish through a text message, and the Smart Pet Bowl would send the doting pet owner a picture whenever Fido or Fluffy chows down. This project has since been completed, the final product anticipated to be released soon.

Security Concerns
Of course, the same issues plague the IoT powered by a smartphone as have plagued all IoT devices that have come before: namely, security concerns. The IoT is notorious for its devices not having sufficient security installed, and often have no real way to update later. Time will only tell if this will eventually be a fatal flaw for the IoT, or if it will be overcome.

What do you think? Would you consider using an old smartphone to make another object smarter? Tell us why or why not in the comments!

Know Your Tech: Wizard
Is Blockchain the Future of Cybersecurity?
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, September 26 2018

Captcha Image

QR-Code

Tag Cloud

Security Tip of the Week Best Practices Cloud Technology Privacy Network Security Hackers Business Computing Malware Hosted Solutions Backup Managed IT Services VoIP Google Email Innovation Disaster Recovery Mobile Devices Microsoft Software Data Internet Productivity Business Outsourced IT Business Continuity Data Backup Ransomware IT Services Smartphones communications Efficiency Cybercrime Hardware Windows 10 IT Support Computer Data Recovery Tech Term Browser Cloud Computing Internet of Things Android BDR Office Saving Money Alert Telephone Systems Business Management Computers Server User Tips Workplace Tips Network Windows Applications Upgrade Small Business Cybersecurity Artificial Intelligence Save Money Smartphone Virtualization Miscellaneous Mobile Device Management Microsoft Office Firewall Law Enforcement Managed IT Collaboration BYOD Communication Social Media Facebook Chrome Social Engineering Passwords Quick Tips Hacking Mobility Productivity Router Private Cloud Automation Holiday Bandwidth Office 365 Avoiding Downtime Gadgets Password Work/Life Balance How To Office Tips Money Managed Service Provider Recovery App Information Technology Windows 10 Gmail Two-factor Authentication VPN Proactive IT Bring Your Own Device Remote Monitoring Wi-Fi Managed IT Services Health Data Protection Data Management Redundancy HaaS Phishing Budget Business Intelligence Training Data Security Flexibility Operating System Cleaning Connectivity Data Breach Document Management IT Management Black Market IT Support Big Data SaaS Word Settings Vulnerability Risk Management Google Drive Mobile Device Safety Marketing User Error Employer-Employee Relationship Apps Entertainment Encryption Mobile Computing Analysis Compliance Blockchain Spam Identity Theft Value Sports Government Windows 7 Scam PDF Data loss Content Filtering End of Support Credit Cards eWaste Computing Infrastructure Remote Computing Paperless Office Charger Instant Messaging Wireless Technology Update Networking OneNote Save Time Physical Security Legal Electronic Medical Records Best Practice IT Plan Unified Threat Management Shadow IT Streaming Media CES Access Control Automobile Worker Unsupported Software Infrastructure USB Information Smart Tech Hiring/Firing DDoS HIPAA Computer Care File Sharing Internet Exlporer Servers Downtime Data Storage Workers Website Content Management Public Cloud YouTube Managed Service History Samsung Comparison Battery Patch Management Meetings The Internet of Things Wearable Technology Business Owner Wireless Machine Learning Keyboard Apple Virtual Assistant Spam Blocking Education Data storage Solid State Drive Audiobook Vendor Management NIST Scalability Emails Multi-Factor Security Human Resources Wiring NarrowBand Evernote Conferencing HBO Software as a Service Recycling Mobile Office Touchpad Remote Monitoring and Maintenance Tools Hosted Computing Bluetooth Mouse Cortana Addiction Experience Loyalty Telephone System Windows 10s Telephony Millennials IT solutions Outlook Politics Cryptocurrency Tech Support Regulations Trending Staff Transportation GDPR Screen Mirroring Wireless Charging Devices Frequently Asked Questions Criminal Line of Business Internet exploMicrosoft Fraud Inventory Google Apps Music Environment hacker Lithium-ion battery Skype Workforce IoT Users Students Humor IT Consultant Thought Leadership Safe Mode iPhone Search Lifestyle Digital Signature Benefits Cache Running Cable E-Commerce Chromecast Supercomputer Cast Fiber-Optic Excel Google Docs Books IBM Antivirus MSP Advertising IaaS Botnet Amazon HVAC Leadership Assessment Audit Start Menu Telecommuting Virtual Reality Healthcare Monitor Cables Content Filter How to Netflix Strategy Smart Technology Wireless Internet Current Events Enterprise Content Management Uninterrupted Power Supply Tip of the week Emergency Augmented Reality Root Cause Analysis Travel Amazon Web Services Authentication Rootkit SharePoint Software Tips Password Manager Troubleshooting Television Going Green Computer Fan Mobile Remote Work Insurance Worker Commute Employer Employee Relationship WiFi Electronic Health Records Reputation Techology Distributed Denial of Service Unified Communications Storage Business Technology Files Flash Wire Robot Hard Drives Knowledge Password Management Relocation Video Games Windows Server 2008 Voice over Internet Protocol Remote Worker Hybrid Cloud Online Shopping Nanotechnology Content webinar Business Mangement Hosted Solution People Public Computer Laptop Proactive Notifications FENG Professional Services Practices Computer Accessories Customer Theft Colocation Sync Specifications Accountants Two Factor Authentication Fax Server Smart Office Network Congestion Data Warehousing Congratulations Company Culture Webinar Managing Stress Regulation IT solutions CrashOverride Administration Printers Thank You Twitter

Free Consultation

Free ConsultationSign up today for a
FREE Network Consultation
How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!