Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Internet of Things Gives Great Power to Our Phones

The Internet of Things Gives Great Power to Our Phones

The Internet of Things is a bit of a paradox in and of itself. It has been leveraged to accomplish great things, but at the same time, it can be used in a way that can create considerable problems. However, innovations have proven that the IoT isn’t going anywhere, anytime soon, especially now that it can use the devices that we carry in our pockets.

Taking the IoT to New Heights
Smartphones are notorious for swiftly becoming obsolete, which means that there is a great opportunity to repurpose them and give them new life as a critical component of an IoT device. Just ask NASA.

The National Aeronautics and Space Administration has long been sending satellites into orbit - despite the intense costs to construct them, let alone get them where they need to go. To help decrease these costs without sacrificing the insight that these satellites provide, NASA started the PhoneSat Project in 2009. Rather than sending a few conventional, expensive satellites into orbit, many nanosatellites can be built from off-the-shelf components and sent into space. These nanosatellites rely on smartphones in order to function.

This initiative has appeared to be very successful, as version 2.4 of PhoneSat, “CubeSat,” reentered the atmosphere on January 31, 2017 after spending more than three years orbiting Earth. These nanosatellites have a relatively tiny price tag of $8000, and have, thus far, proved massively successful.

Bringing the IoT Down to Earth
Of course, the IoT has far more uses that are much more practical to the user who is not affiliated with NASA. Samsung Electronics created a team whose task was to figure out ways of taking older models from the Galaxy line of phones and figuring out how to leverage them as an IoT device. This “Galaxy Upcycling” team created a huge variety of IoT-powered purposes - including a few for the owners of hungry pets. The Smart Fish Tank they developed could feed the fish through a text message, and the Smart Pet Bowl would send the doting pet owner a picture whenever Fido or Fluffy chows down. This project has since been completed, the final product anticipated to be released soon.

Security Concerns
Of course, the same issues plague the IoT powered by a smartphone as have plagued all IoT devices that have come before: namely, security concerns. The IoT is notorious for its devices not having sufficient security installed, and often have no real way to update later. Time will only tell if this will eventually be a fatal flaw for the IoT, or if it will be overcome.

What do you think? Would you consider using an old smartphone to make another object smarter? Tell us why or why not in the comments!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 25 December 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Business Google Network Security Microsoft Internet Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices Hardware IT Services VoIP Disaster Recovery Android communications Business Continuity Smartphones Communication IT Support Miscellaneous Smartphone Mobile Device Browser Small Business Network Productivity Collaboration Quick Tips Cybersecurity Business Management Users Windows Phishing Upgrade Managed IT Services Outsourced IT Ransomware Data Backup Windows 10 Data Recovery Cloud Computing Office Server Save Money Windows 10 Passwords Chrome Virtualization Gadgets Saving Money Holiday Tech Term Social Media Managed IT Services Managed Service Automation Microsoft Office Computers Artificial Intelligence Facebook Operating System Cybercrime Internet of Things Wi-Fi BYOD Mobile Device Management Networking IT Support Hacking Health Spam Alert Covid-19 Information Office 365 Telephone Systems Information Technology Managed Service Provider Remote BDR Bandwidth Recovery Employer-Employee Relationship Social Engineering Router Mobility Law Enforcement Remote Monitoring Mobile Computing Application Password Money App History Encryption Applications Data Breach Big Data Human Resources Remote Computing Private Cloud Blockchain Mobile Office Paperless Office How To Managed IT Apps Office Tips Data Storage Patch Management Training VPN Government Two-factor Authentication Avoiding Downtime Data Security Flexibility Mouse HaaS Marketing WiFi IT solutions Entertainment Bring Your Own Device Website Budget Data Management Work/Life Balance Infrastructure Voice over Internet Protocol Wireless Vulnerability Windows 7 Word Gmail Google Drive Settings Servers Virtual Reality Apple Social Vendor Managed Services User Error Save Time Software as a Service Display Telephone System Staff Meetings Machine Learning Connectivity Remote Work USB Cleaning Employee/Employer Relationship Risk Management RMM Hacker Conferencing End of Support The Internet of Things Education Physical Security Lithium-ion battery Scam Safety HIPAA Sports Data Protection Redundancy Firewall Keyboard Vendor Management SaaS CES Help Desk YouTube Charger Virus Black Market Printing Compliance Business Technology Content Management OneNote Unified Threat Management Computer Care Network Congestion Computer Accessories Current Events Access Control eWaste Document Management Telephony Managed Services Provider Wireless Technology Samsung Virtual Assistant Solid State Drive Authentication How to Database Downtime Value Remote Workers Printer Data storage Bluetooth Wearable Technology Automobile Processor Spam Blocking Electronic Medical Records Update Hard Drives Retail Instant Messaging Hard Drive Robot Computing Infrastructure Excel Hiring/Firing Google Docs Going Green Identity Theft Biometrics IT Consultant Virtual Desktop Computing Battery DDoS Humor Shadow IT Augmented Reality Legal Business Intelligence SharePoint Fraud Audit Internet Exlporer Worker Digital Signage Remote Worker IT Management Cryptocurrency Botnet Customer Service PDF Environment IT Plan Procurement Fax Server Proactive IT Comparison Net Neutrality Workplace Strategy Unsupported Software Best Practice File Sharing Employees Experience Employee/Employer Relationships Tablet Specifications ISP Supercomputer Camera Windows 365 Inventory Domains Scalability Software Tips User Wire Video Conferencing Business Owner Sync PowerPoint Evernote ROI Emails Windows Media Player Sales IaaS Bitcoin Maintenance Travel Shortcuts NarrowBand Search Millennials Cryptomining Bloatware Printers Point of Sale Personal Managing Stress Smart Office Supply Chain Management Wireless Charging iPhone Netflix Two Factor Authentication Tablets Monitoring Batteries Root Cause Analysis Digitize HBO Cameras Workforce Entrepreneur Knowledge Music Virtual Private Network Windows 8.1 Skype Cables Windows Server 2008 R2 Files Chromecast Customer relationships Shortcut Data loss Nanotechnology IT Assessment Outlook Telecommuting Manufacturing Cost Management Leadership Troubleshooting Project Management Email Best Practices Start Menu Cortana Social Networking Colocation Uninterrupted Power Supply Security Cameras Loyalty Computer Tips Digital Signature Managed IT Service Screen Mirroring OneDrive Frequently Asked Questions Printer Server Biometric Security Monitor Books Warranty Virtual CIO HVAC Peripheral Running Cable Mobile Google Apps Windows 10s Memory Digital Security Cameras Analysis Using Data Cast Devices Copiers Tip of the week 5G Reputation webinar Streaming Media Emergency Administrator Enterprise Content Management Quick Tip Content Professional Services Public Cloud Tech Support Employer Employee Relationship Smartwatch Laptop Assessment MSP Ergonomics Accountants Techology Thought Leadership Development Windows Server 2008 Credit Cards OLED Customers Microchip Password Management PCI DSS Audiobook Tools Password Manager Virtual Machine Science Multi-Factor Security Employee Touchpad Television 2FA Fiber Optics Twitter Messaging Cabling Search Engine NIST Policy Distributed Denial of Service Politics Business Mangement Hypervisor Customer Relationship Management Advertising Trending Analyitcs Public Computer Dark mode Consultant Smart Tech Trend Micro Addiction SMS Regulations Analytics Amazon Default App Programming Notifications Transportation Procedure Recycling Saving Time Computer Fan Rootkit Google Search Wiring dark theme Best Available Practices Shopping WIndows 7 Cache AI Antivirus Amazon Web Services IT Infrastructure Relocation Workers Benefits Safe Mode FinTech Criminal FENG Bing Windows 8 IBM GDPR Hosted Computing Social Network IT service Video Games Wireless Internet Worker Commute Flash Online Shopping Investment Smart Technology

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code