Get Started Today!  810-230-9455

croom new

NuTech Services Blog

The Internet of Things Gives Great Power to Our Phones

The Internet of Things Gives Great Power to Our Phones

The Internet of Things is a bit of a paradox in and of itself. It has been leveraged to accomplish great things, but at the same time, it can be used in a way that can create considerable problems. However, innovations have proven that the IoT isn’t going anywhere, anytime soon, especially now that it can use the devices that we carry in our pockets.

Taking the IoT to New Heights
Smartphones are notorious for swiftly becoming obsolete, which means that there is a great opportunity to repurpose them and give them new life as a critical component of an IoT device. Just ask NASA.

The National Aeronautics and Space Administration has long been sending satellites into orbit - despite the intense costs to construct them, let alone get them where they need to go. To help decrease these costs without sacrificing the insight that these satellites provide, NASA started the PhoneSat Project in 2009. Rather than sending a few conventional, expensive satellites into orbit, many nanosatellites can be built from off-the-shelf components and sent into space. These nanosatellites rely on smartphones in order to function.

This initiative has appeared to be very successful, as version 2.4 of PhoneSat, “CubeSat,” reentered the atmosphere on January 31, 2017 after spending more than three years orbiting Earth. These nanosatellites have a relatively tiny price tag of $8000, and have, thus far, proved massively successful.

Bringing the IoT Down to Earth
Of course, the IoT has far more uses that are much more practical to the user who is not affiliated with NASA. Samsung Electronics created a team whose task was to figure out ways of taking older models from the Galaxy line of phones and figuring out how to leverage them as an IoT device. This “Galaxy Upcycling” team created a huge variety of IoT-powered purposes - including a few for the owners of hungry pets. The Smart Fish Tank they developed could feed the fish through a text message, and the Smart Pet Bowl would send the doting pet owner a picture whenever Fido or Fluffy chows down. This project has since been completed, the final product anticipated to be released soon.

Security Concerns
Of course, the same issues plague the IoT powered by a smartphone as have plagued all IoT devices that have come before: namely, security concerns. The IoT is notorious for its devices not having sufficient security installed, and often have no real way to update later. Time will only tell if this will eventually be a fatal flaw for the IoT, or if it will be overcome.

What do you think? Would you consider using an old smartphone to make another object smarter? Tell us why or why not in the comments!

Know Your Tech: Wizard
5G is Still Going to Take A While
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, October 20 2018

Captcha Image

Newsletter Sign Up

  • First Name *
  • Last Name *
  • Company Name *

      Tag Cloud

      Tip of the Week Security Best Practices Technology Privacy Cloud Hackers Google Malware Microsoft Business Computing Backup Hosted Solutions Business Workplace Tips Software Productivity Innovation Windows 10 Mobile Devices Internet Email Data Network Security Browser Miscellaneous Smartphones Android Efficiency Hardware Computer User Tips VoIP Business Continuity Smartphone Tech Term Office Small Business IT Services Disaster Recovery Windows Ransomware Upgrade Server Business Management Chrome communications Network Cybercrime Save Money Computers Communication Data Backup Alert Social Media Telephone Systems Productivity Cloud Computing Automation Holiday Outsourced IT Microsoft Office Employer-Employee Relationship Virtualization Managed IT Services Passwords Law Enforcement Social Engineering Facebook Internet of Things Quick Tips Collaboration App Hacking Artificial Intelligence Data Recovery Office Tips Cybersecurity Managed IT Services Applications Health Marketing Gadgets How To Office 365 Operating System Router Mobile Device Management Money Windows 10 Bandwidth Password Managed Service Provider Website Entertainment Wi-Fi Mouse Remote Computing Gmail Mobility Saving Money Big Data Application Spam Mobile Computing Work/Life Balance Bring Your Own Device Two-factor Authentication Networking VPN Cleaning Information Data Security History HaaS Apps Private Cloud BYOD BDR Remote Monitoring Flexibility Lithium-ion battery Phishing Google Drive Settings Connectivity Keyboard Safety Data Management The Internet of Things Vulnerability USB Recovery Sports Word IT Support Data Breach IT Support Data Protection Scam Encryption Government Charger Update CES PDF Identity Theft Biometrics Managed IT Infrastructure Apple Black Market Computer Accessories Meetings Robot Environment Computer Care Content Management DDoS YouTube eWaste Data Storage IT solutions Electronic Medical Records Worker Managed Service Business Intelligence Samsung Blockchain Windows 7 Virtual Assistant Fraud Physical Security WiFi User Error Downtime IT Management Budget Printer Spam Blocking Risk Management Paperless Office Firewall Best Practice Virtual Reality Value Unified Threat Management Telephone System Battery Bluetooth Avoiding Downtime Public Cloud Wearable Technology Data storage IT Plan Hiring/Firing Internet Exlporer Training Automobile Wireless Humor Fax Server Legal Patch Management Redundancy Unsupported Software End of Support Excel Mobile Device Retail OneNote Human Resources Comparison Solid State Drive Thought Leadership Music Reputation Network Congestion Software Tips Tablets Cryptocurrency Search Remote Worker Internet exploMicrosoft Content IBM Cast Hacker Servers FCC Inventory Video Games Going Green Smart Office Specifications Digital Signature Techology Transportation Notifications Emails Windows Server 2008 Consultant Telephony Evernote Audit Google Docs Information Technology Troubleshooting Customer IT Consultant Hard Drives Safe Mode Credit Cards How to User Botnet Wiring Password Manager Advertising Audiobook Supercomputer Science HVAC Title II Access Control Scalability Tech Support Cameras Wireless Charging iPhone Laptop Assessment Root Cause Analysis Customer Relationship Management Document Management Accountants Maintenance Benefits Best Available Skype Analytics Computer Fan Addiction Voice over Internet Protocol Books Distributed Denial of Service Leadership HBO Memory NarrowBand Smart Tech Travel Camera Business Mangement Politics Windows 8 Enterprise Content Management Online Authentication Instant Messaging Save Time Shadow IT Users Rootkit Start Menu MSP Cortana Files Worker Commute Touchpad Television Customer Service Millennials FENG Social Cache Multi-Factor Security HIPAA Emergency Outlook Flash Amazon Wireless Technology Windows 10s Programming Recycling Current Events WIndows 7 Tablet Password Management Telecommuting Nanotechnology Printer Server Tools File Sharing Google Apps Windows Media Player Public Computer Data loss Machine Learning Workforce Practices Shortcut Smart Technology Netflix Bloatware Chromecast Loyalty Wireless Internet Trending Staff Streaming Media webinar Frequently Asked Questions Amazon Web Services Relocation Education People Vendor Management Devices Warranty Criminal Hybrid Cloud Experience Running Cable Monitor Knowledge Managing Stress NIST Remote Work Augmented Reality Workers SharePoint Screen Mirroring Net Neutrality Hosted Computing Two Factor Authentication Uninterrupted Power Supply Virus Employer Employee Relationship Entrepreneur Computing Infrastructure Mobile Office PowerPoint SaaS Social Networking Wire Conferencing Tip of the week Analyitcs Sync Online Shopping Administrator CrashOverride Twitter Phone System Webinar IT solutions Printers Compliance Company Culture Regulation

      Mobile? Grab this Article!

      Qr Code

      Upcoming Events

      No events

      Recent Comments

      No comments yet.

      Latest Blog Entry

      It is impossible to understate the importance of a server to today’s businesses. We talk a big game as to how important data is, but we don’t often broach the topic of how important it is to ensure that your server is well-maintained. Below, we discuss how to determine what ...

      Latest News

      NuTech Services launches new website!

      NuTech Services is proud to announce the launch of our new website at www.nutechology.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

      Read more ...

      Account Login