Get Started Today!  810-230-9455

croom new

NuTech Services Blog

The Internet of Things Gives Great Power to Our Phones

The Internet of Things Gives Great Power to Our Phones

The Internet of Things is a bit of a paradox in and of itself. It has been leveraged to accomplish great things, but at the same time, it can be used in a way that can create considerable problems. However, innovations have proven that the IoT isn’t going anywhere, anytime soon, especially now that it can use the devices that we carry in our pockets.

Taking the IoT to New Heights
Smartphones are notorious for swiftly becoming obsolete, which means that there is a great opportunity to repurpose them and give them new life as a critical component of an IoT device. Just ask NASA.

The National Aeronautics and Space Administration has long been sending satellites into orbit - despite the intense costs to construct them, let alone get them where they need to go. To help decrease these costs without sacrificing the insight that these satellites provide, NASA started the PhoneSat Project in 2009. Rather than sending a few conventional, expensive satellites into orbit, many nanosatellites can be built from off-the-shelf components and sent into space. These nanosatellites rely on smartphones in order to function.

This initiative has appeared to be very successful, as version 2.4 of PhoneSat, “CubeSat,” reentered the atmosphere on January 31, 2017 after spending more than three years orbiting Earth. These nanosatellites have a relatively tiny price tag of $8000, and have, thus far, proved massively successful.

Bringing the IoT Down to Earth
Of course, the IoT has far more uses that are much more practical to the user who is not affiliated with NASA. Samsung Electronics created a team whose task was to figure out ways of taking older models from the Galaxy line of phones and figuring out how to leverage them as an IoT device. This “Galaxy Upcycling” team created a huge variety of IoT-powered purposes - including a few for the owners of hungry pets. The Smart Fish Tank they developed could feed the fish through a text message, and the Smart Pet Bowl would send the doting pet owner a picture whenever Fido or Fluffy chows down. This project has since been completed, the final product anticipated to be released soon.

Security Concerns
Of course, the same issues plague the IoT powered by a smartphone as have plagued all IoT devices that have come before: namely, security concerns. The IoT is notorious for its devices not having sufficient security installed, and often have no real way to update later. Time will only tell if this will eventually be a fatal flaw for the IoT, or if it will be overcome.

What do you think? Would you consider using an old smartphone to make another object smarter? Tell us why or why not in the comments!

Know Your Tech: Wizard
5G is Still Going to Take A While
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, August 22 2018

Captcha Image

Newsletter Sign Up

  • First Name *
  • Last Name *
  • Company Name *

      Tag Cloud

      Tip of the Week Security Best Practices Technology Privacy Cloud Google Microsoft Hackers Malware Backup Business Computing Business Email Software Productivity Hosted Solutions Windows 10 Mobile Devices Internet Miscellaneous Innovation Efficiency Android Browser Data Hardware Smartphones Network Security Smartphone User Tips Workplace Tips Business Continuity Office VoIP Computer Disaster Recovery Tech Term Windows Ransomware Small Business Business Management Chrome Cybercrime Network Upgrade communications Social Media Alert Computers IT Services Holiday Data Backup Employer-Employee Relationship Microsoft Office Telephone Systems Virtualization Save Money Outsourced IT Managed IT Services Server Cloud Computing Automation Quick Tips Productivity App Collaboration Law Enforcement Hacking Social Engineering Facebook Passwords Communication How To Operating System Bandwidth Mobile Device Management Router Office Tips Data Recovery Money Health Internet of Things Artificial Intelligence Office 365 Cybersecurity Managed IT Services Marketing Gadgets Password Mobility Application Applications Spam Big Data Wi-Fi Networking Two-factor Authentication Bring Your Own Device Managed Service Provider Website Work/Life Balance Remote Computing Gmail Entertainment Remote Monitoring Lithium-ion battery BYOD Data Management BDR Safety The Internet of Things Saving Money USB Recovery Phishing HaaS Apps Encryption Mobile Computing Private Cloud Windows 10 VPN Flexibility Vulnerability IT Support Google Drive Cleaning Word Data Breach IT Support Data Protection History Mouse Connectivity Government Data Security Virtual Reality Best Practice Data Storage PDF Risk Management Worker Business Intelligence Settings Wearable Technology Samsung Data storage Blockchain Bluetooth Internet Exlporer Windows 7 IT Management Fax Server Wireless Spam Blocking Electronic Medical Records Value Sports Humor Physical Security Avoiding Downtime Retail IT Plan Excel Training Human Resources Information Redundancy Black Market Battery Biometrics Unsupported Software Apple Hiring/Firing Environment Public Cloud Keyboard Robot Meetings DDoS OneNote Automobile Comparison YouTube Legal eWaste Charger Update CES IT solutions Computer Accessories Patch Management Identity Theft Managed IT Infrastructure Paperless Office Mobile Device End of Support User Error Computer Care Downtime Content Management WiFi Budget Scam Search Botnet Password Manager Machine Learning Supercomputer Music Title II Access Control Customer Service Touchpad File Sharing Video Games Skype Wireless Charging Wireless Internet Assessment Root Cause Analysis Internet exploMicrosoft Content Accountants Social Wireless Technology Analytics WIndows 7 Tablet Devices Computer Fan Voice over Internet Protocol Programming NIST Leadership Users HBO Printer Techology Transportation Fraud How to Travel Business Mangement Bloatware Shortcut Information Technology Troubleshooting Online Authentication Rootkit Augmented Reality Scalability Start Menu Cortana Streaming Media Wire Television Unified Threat Management Advertising Audiobook Millennials People Chromecast Managing Stress Running Cable Thought Leadership Monitor FENG iPhone Multi-Factor Security HIPAA Cryptocurrency Outlook Printer Server Benefits Flash Amazon Windows Media Player Recycling Entrepreneur Uninterrupted Power Supply Servers Current Events Books Telecommuting Nanotechnology SharePoint Windows 10s Instant Messaging Save Time Tools Google Apps Analyitcs Smart Office Public Computer Data loss Politics Workforce Practices Social Networking Mobile Office Netflix Amazon Web Services Tablets Loyalty Reputation Files Worker Commute Trending Staff Safe Mode webinar Frequently Asked Questions Firewall Vendor Management Criminal HVAC Knowledge Virus Emergency Remote Work Hacker Workers Consultant Notifications Document Management Screen Mirroring Net Neutrality Hosted Computing Employer Employee Relationship Going Green Managed Service PowerPoint Smart Technology Sync Online Shopping Hard Drives Addiction SaaS Customer Virtual Assistant Conferencing Tip of the week Smart Tech Solid State Drive Relocation Education User Tech Support Enterprise Content Management Network Congestion Software Tips Science Best Available Maintenance IBM Cast Hybrid Cloud Experience FCC Inventory Customer Relationship Management Laptop MSP Two Factor Authentication Telephony Evernote Memory Distributed Denial of Service Cache Specifications Digital Signature NarrowBand Telephone System Emails Windows Server 2008 Audit Computing Infrastructure Google Docs Shadow IT Password Management IT Consultant Cameras Credit Cards Windows 8 Compliance Webinar Company Culture Regulation IT solutions Remote Worker Twitter Wiring Phone System CrashOverride

      Mobile? Grab this Article!

      Qr Code

      Upcoming Events

      No events

      Recent Comments

      No comments yet.

      Latest Blog Entry

      It’s not out of the ordinary for employees to not know the best practices surrounding email management, but it’s something that any self-respecting employer needs to consider. How are your employees using their email, and are they putting your organization at risk? The best ...

      Latest News

      NuTech Services launches new website!

      NuTech Services is proud to announce the launch of our new website at www.nutechology.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

      Read more ...

      Account Login