Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Internet of Things Gives Great Power to Our Phones

The Internet of Things Gives Great Power to Our Phones

The Internet of Things is a bit of a paradox in and of itself. It has been leveraged to accomplish great things, but at the same time, it can be used in a way that can create considerable problems. However, innovations have proven that the IoT isn’t going anywhere, anytime soon, especially now that it can use the devices that we carry in our pockets.

Taking the IoT to New Heights
Smartphones are notorious for swiftly becoming obsolete, which means that there is a great opportunity to repurpose them and give them new life as a critical component of an IoT device. Just ask NASA.

The National Aeronautics and Space Administration has long been sending satellites into orbit - despite the intense costs to construct them, let alone get them where they need to go. To help decrease these costs without sacrificing the insight that these satellites provide, NASA started the PhoneSat Project in 2009. Rather than sending a few conventional, expensive satellites into orbit, many nanosatellites can be built from off-the-shelf components and sent into space. These nanosatellites rely on smartphones in order to function.

This initiative has appeared to be very successful, as version 2.4 of PhoneSat, “CubeSat,” reentered the atmosphere on January 31, 2017 after spending more than three years orbiting Earth. These nanosatellites have a relatively tiny price tag of $8000, and have, thus far, proved massively successful.

Bringing the IoT Down to Earth
Of course, the IoT has far more uses that are much more practical to the user who is not affiliated with NASA. Samsung Electronics created a team whose task was to figure out ways of taking older models from the Galaxy line of phones and figuring out how to leverage them as an IoT device. This “Galaxy Upcycling” team created a huge variety of IoT-powered purposes - including a few for the owners of hungry pets. The Smart Fish Tank they developed could feed the fish through a text message, and the Smart Pet Bowl would send the doting pet owner a picture whenever Fido or Fluffy chows down. This project has since been completed, the final product anticipated to be released soon.

Security Concerns
Of course, the same issues plague the IoT powered by a smartphone as have plagued all IoT devices that have come before: namely, security concerns. The IoT is notorious for its devices not having sufficient security installed, and often have no real way to update later. Time will only tell if this will eventually be a fatal flaw for the IoT, or if it will be overcome.

What do you think? Would you consider using an old smartphone to make another object smarter? Tell us why or why not in the comments!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 24 January 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Business Google Network Security Microsoft Internet Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices Hardware IT Services Android VoIP Disaster Recovery communications IT Support Business Continuity Smartphones Communication Miscellaneous Smartphone Mobile Device Browser Small Business Network Productivity Collaboration Cybersecurity Quick Tips Business Management Users Windows Managed IT Services Upgrade Phishing Data Backup Outsourced IT Ransomware Windows 10 Cloud Computing Data Recovery Office Server Save Money Passwords Windows 10 Virtualization Gadgets Saving Money Holiday Tech Term Social Media Chrome Managed Service Automation Microsoft Office Managed IT Services Cybercrime Computers Artificial Intelligence Facebook Operating System Internet of Things Health Wi-Fi BYOD Mobile Device Management Networking IT Support Hacking Alert Covid-19 Spam Office 365 Information Telephone Systems Managed Service Provider Information Technology Remote Recovery Employer-Employee Relationship Bandwidth Router Social Engineering Mobility BDR Human Resources Mobile Computing Password Remote Monitoring Money Application Data Breach Encryption Applications App History Big Data Law Enforcement Private Cloud Data Storage Patch Management Remote Computing Managed IT Mobile Office Apps Blockchain Paperless Office Office Tips Training How To Government VPN Flexibility Marketing Two-factor Authentication Vulnerability WiFi IT solutions Bring Your Own Device Windows 7 Word Data Management Entertainment Mouse Work/Life Balance Website HaaS Budget Servers Google Drive Data Security Wireless Infrastructure Voice over Internet Protocol Avoiding Downtime Gmail Settings Firewall Data Protection Vendor Save Time Conferencing Virtual Reality Apple Managed Services Display Scam Social Cleaning User Error USB Employee/Employer Relationship Meetings RMM Vendor Management End of Support Telephone System Staff Software as a Service Physical Security Education Machine Learning Risk Management Safety Connectivity Hacker Remote Work HIPAA Sports Redundancy Keyboard The Internet of Things Lithium-ion battery Remote Worker Hiring/Firing Unified Threat Management Fax Server Document Management Cryptocurrency Solid State Drive Wireless Technology Computer Accessories Managed Services Provider How to Downtime SaaS Database Comparison Data storage Remote Workers Business Intelligence Automobile Network Congestion CES Printer Processor eWaste Audit Worker Bluetooth Computing Infrastructure IT Management Business Technology Content Management Going Green Botnet Hard Drive Access Control IT Plan Virtual Assistant Wearable Technology Authentication Battery IT Consultant Hard Drives Computing Shadow IT Unsupported Software Retail Instant Messaging Legal Humor Robot Charger Excel Internet Exlporer Biometrics Compliance Update OneNote Virtual Desktop Computer Care PDF Digital Signage Current Events Google Docs Telephony DDoS Samsung Identity Theft Proactive IT SharePoint Procurement Best Practice Value Workplace Strategy YouTube Net Neutrality Spam Blocking Augmented Reality Electronic Medical Records Black Market Help Desk Customer Service Fraud Environment Printing Virus Mobile PowerPoint ROI Antivirus Windows 10s Windows Media Player Smart Tech Search Trending User Video Conferencing Amazon Sales iPhone Bitcoin Cast Shortcuts Addiction Windows 8 webinar Emergency Recycling Point of Sale Personal Tip of the week Cryptomining IT service Professional Services Public Cloud Wiring Employer Employee Relationship Practices Managing Stress Supply Chain Management Amazon Web Services Monitoring Files Batteries Assessment Cache Tablet Safe Mode Criminal Windows 8.1 Digitize Chromecast Windows Server 2008 Cameras Domains Tools Windows Server 2008 R2 GDPR Hosted Computing Online Shopping Customer relationships Colocation Uninterrupted Power Supply IaaS Maintenance Television Wireless Internet File Sharing Bloatware Email Best Practices IT Assessment Manufacturing Camera Inventory Specifications Monitor Tablets Evernote Computer Tips Managed IT Service Security Cameras Public Computer Wire Entrepreneur Transportation Virtual CIO Travel OneDrive Regulations Printer Server Biometric Security Reputation Streaming Media Computer Fan Printers Rootkit Millennials Peripheral Content Wireless Charging Digital Security Cameras Using Data Tech Support Shortcut Smart Office Workers Cost Management Benefits Techology Copiers Laptop 5G Quick Tip Customers FENG Virtual Private Network Social Networking Workforce Audiobook Cables Ergonomics Smartwatch IBM OLED Smart Technology Development Touchpad Flash PCI DSS Virtual Machine Running Cable Project Management Nanotechnology Telecommuting Politics Memory Cortana 2FA Advertising Fiber Optics Software Tips Employee Supercomputer Cabling Emails Digital Signature Messaging Sync Policy Hypervisor Notifications Warranty Google Apps Dark mode Consultant Trend Micro HVAC Default App Netflix Two Factor Authentication Analysis SMS Analytics Procedure Relocation Saving Time Root Cause Analysis Administrator Devices Science Music dark theme Best Available Shopping HBO Google Search Knowledge Enterprise Content Management IT Infrastructure MSP Accountants Video Games WIndows 7 AI Skype FinTech Distributed Denial of Service Data loss Microchip Bing Customer Relationship Management Thought Leadership Worker Commute Credit Cards Experience Analyitcs Troubleshooting Password Manager Social Network Outlook Leadership Password Management Start Menu Investment Programming Scalability Multi-Factor Security Employees Employee/Employer Relationships Screen Mirroring Search Engine Loyalty Twitter Business Owner NIST Books Business Mangement Windows 365 NarrowBand Frequently Asked Questions ISP

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code