Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Internet of Things Gives Great Power to Our Phones

The Internet of Things Gives Great Power to Our Phones

The Internet of Things is a bit of a paradox in and of itself. It has been leveraged to accomplish great things, but at the same time, it can be used in a way that can create considerable problems. However, innovations have proven that the IoT isn’t going anywhere, anytime soon, especially now that it can use the devices that we carry in our pockets.

Taking the IoT to New Heights
Smartphones are notorious for swiftly becoming obsolete, which means that there is a great opportunity to repurpose them and give them new life as a critical component of an IoT device. Just ask NASA.

The National Aeronautics and Space Administration has long been sending satellites into orbit - despite the intense costs to construct them, let alone get them where they need to go. To help decrease these costs without sacrificing the insight that these satellites provide, NASA started the PhoneSat Project in 2009. Rather than sending a few conventional, expensive satellites into orbit, many nanosatellites can be built from off-the-shelf components and sent into space. These nanosatellites rely on smartphones in order to function.

This initiative has appeared to be very successful, as version 2.4 of PhoneSat, “CubeSat,” reentered the atmosphere on January 31, 2017 after spending more than three years orbiting Earth. These nanosatellites have a relatively tiny price tag of $8000, and have, thus far, proved massively successful.

Bringing the IoT Down to Earth
Of course, the IoT has far more uses that are much more practical to the user who is not affiliated with NASA. Samsung Electronics created a team whose task was to figure out ways of taking older models from the Galaxy line of phones and figuring out how to leverage them as an IoT device. This “Galaxy Upcycling” team created a huge variety of IoT-powered purposes - including a few for the owners of hungry pets. The Smart Fish Tank they developed could feed the fish through a text message, and the Smart Pet Bowl would send the doting pet owner a picture whenever Fido or Fluffy chows down. This project has since been completed, the final product anticipated to be released soon.

Security Concerns
Of course, the same issues plague the IoT powered by a smartphone as have plagued all IoT devices that have come before: namely, security concerns. The IoT is notorious for its devices not having sufficient security installed, and often have no real way to update later. Time will only tell if this will eventually be a fatal flaw for the IoT, or if it will be overcome.

What do you think? Would you consider using an old smartphone to make another object smarter? Tell us why or why not in the comments!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 02 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Business Google Network Security Microsoft Internet Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices Hardware IT Services VoIP Disaster Recovery Android communications Business Continuity Smartphones Communication IT Support Miscellaneous Smartphone Mobile Device Browser Small Business Network Productivity Collaboration Quick Tips Cybersecurity Business Management Users Windows Phishing Upgrade Managed IT Services Data Backup Outsourced IT Ransomware Windows 10 Data Recovery Office Cloud Computing Server Save Money Windows 10 Passwords Chrome Virtualization Gadgets Saving Money Holiday Tech Term Social Media Managed IT Services Managed Service Automation Microsoft Office Cybercrime Computers Artificial Intelligence Facebook Operating System Health Internet of Things Wi-Fi BYOD Mobile Device Management Networking IT Support Hacking Remote Alert Spam Covid-19 Information Office 365 Telephone Systems Managed Service Provider Information Technology Recovery Employer-Employee Relationship BDR Bandwidth Router Social Engineering Mobility Law Enforcement Human Resources Mobile Computing Remote Monitoring Password Application Money Encryption App History Applications Big Data Data Breach Private Cloud Remote Computing Blockchain Managed IT Mobile Office How To Paperless Office Apps Office Tips Data Storage Patch Management Training VPN Government Avoiding Downtime Servers Flexibility Two-factor Authentication Marketing Data Security WiFi Mouse IT solutions HaaS Entertainment Website Bring Your Own Device Data Management Budget Work/Life Balance Infrastructure Voice over Internet Protocol Wireless Vulnerability Google Drive Windows 7 Word Gmail Settings Vendor Management Firewall Virtual Reality Apple Save Time Social Vendor User Error Managed Services Staff Software as a Service Display Telephone System Meetings Cleaning USB Machine Learning Connectivity Remote Work Employee/Employer Relationship End of Support Risk Management RMM Hacker Education Physical Security Conferencing Safety The Internet of Things Scam Sports Lithium-ion battery HIPAA Redundancy Keyboard Data Protection YouTube Procurement Black Market Virus Fax Server Workplace Strategy Unsupported Software Comparison Net Neutrality Unified Threat Management CES Help Desk Charger SaaS Computer Accessories Printing Document Management Compliance Solid State Drive Wireless Technology Content Management OneNote Computer Care How to Downtime Business Technology Network Congestion Access Control Current Events eWaste Telephony Managed Services Provider Samsung Data storage Printer Virtual Assistant Authentication Database Automobile Bluetooth Remote Workers Value Computing Infrastructure Spam Blocking Electronic Medical Records Wearable Technology Going Green Processor Hard Drives Update Retail Instant Messaging IT Consultant Hiring/Firing Robot Excel Hard Drive Google Docs Battery Humor Shadow IT Biometrics Identity Theft Legal Virtual Desktop Computing Internet Exlporer DDoS Augmented Reality Business Intelligence PDF SharePoint Fraud Audit Worker Remote Worker IT Management Digital Signage Proactive IT Customer Service Cryptocurrency Botnet Best Practice Environment IT Plan Experience Benefits Antivirus Cache AI Amazon Web Services IT Infrastructure Workers Windows 8 Criminal FENG Bing Scalability Safe Mode FinTech PowerPoint IT service GDPR Windows Media Player Hosted Computing Social Network IBM Business Owner User Smart Technology NarrowBand Wireless Internet Flash Online Shopping Investment Tablet Employee/Employer Relationships Search File Sharing Employees iPhone Domains Camera Windows 365 Inventory Software Tips Specifications ISP Supercomputer Managing Stress Emails Wire Video Conferencing Sync Evernote ROI Bitcoin Travel Shortcuts IaaS Cameras Maintenance Sales Files Printers Point of Sale Bloatware Personal Millennials Cryptomining Netflix Two Factor Authentication Chromecast Smart Office Supply Chain Management Wireless Charging Tablets Batteries Root Cause Analysis Monitoring Music Colocation Virtual Private Network Windows 8.1 Uninterrupted Power Supply Entrepreneur Digitize HBO Workforce Knowledge Skype Cables Windows Server 2008 R2 Data loss Monitor Printer Server Shortcut Customer relationships Troubleshooting Project Management Email Best Practices Cost Management Nanotechnology IT Assessment Outlook Telecommuting Manufacturing Leadership Social Networking Start Menu Cortana Streaming Media Digital Signature Managed IT Service Screen Mirroring Security Cameras Loyalty Reputation Computer Tips Books Warranty Virtual CIO Tech Support OneDrive Frequently Asked Questions Biometric Security Content Windows 10s Techology Running Cable Laptop HVAC Peripheral Mobile Google Apps Digital Security Cameras Memory Analysis Using Data Cast Customers Emergency Administrator Devices Copiers Tip of the week 5G webinar Audiobook Public Cloud Employer Employee Relationship Touchpad Enterprise Content Management Quick Tip Professional Services MSP Ergonomics Accountants Smartwatch Assessment Advertising Microchip Thought Leadership Development Windows Server 2008 Credit Cards OLED Politics Science Password Manager Virtual Machine Consultant Password Management PCI DSS Tools 2FA Notifications Fiber Optics Multi-Factor Security Employee Television Analytics Search Engine Twitter Messaging Cabling Business Mangement Hypervisor Best Available Distributed Denial of Service Customer Relationship Management NIST Policy Dark mode Analyitcs Smart Tech Trend Micro Trending Public Computer WIndows 7 Relocation Transportation Programming Addiction SMS Regulations Amazon Default App Recycling Saving Time Computer Fan Rootkit Video Games Procedure Wiring dark theme Practices Shopping Google Search Worker Commute

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code