Get Started Today!  810-230-9455

croom new

NuTech Services Blog

The Internet of Things Gives Great Power to Our Phones

The Internet of Things Gives Great Power to Our Phones

The Internet of Things is a bit of a paradox in and of itself. It has been leveraged to accomplish great things, but at the same time, it can be used in a way that can create considerable problems. However, innovations have proven that the IoT isn’t going anywhere, anytime soon, especially now that it can use the devices that we carry in our pockets.

Taking the IoT to New Heights
Smartphones are notorious for swiftly becoming obsolete, which means that there is a great opportunity to repurpose them and give them new life as a critical component of an IoT device. Just ask NASA.

The National Aeronautics and Space Administration has long been sending satellites into orbit - despite the intense costs to construct them, let alone get them where they need to go. To help decrease these costs without sacrificing the insight that these satellites provide, NASA started the PhoneSat Project in 2009. Rather than sending a few conventional, expensive satellites into orbit, many nanosatellites can be built from off-the-shelf components and sent into space. These nanosatellites rely on smartphones in order to function.

This initiative has appeared to be very successful, as version 2.4 of PhoneSat, “CubeSat,” reentered the atmosphere on January 31, 2017 after spending more than three years orbiting Earth. These nanosatellites have a relatively tiny price tag of $8000, and have, thus far, proved massively successful.

Bringing the IoT Down to Earth
Of course, the IoT has far more uses that are much more practical to the user who is not affiliated with NASA. Samsung Electronics created a team whose task was to figure out ways of taking older models from the Galaxy line of phones and figuring out how to leverage them as an IoT device. This “Galaxy Upcycling” team created a huge variety of IoT-powered purposes - including a few for the owners of hungry pets. The Smart Fish Tank they developed could feed the fish through a text message, and the Smart Pet Bowl would send the doting pet owner a picture whenever Fido or Fluffy chows down. This project has since been completed, the final product anticipated to be released soon.

Security Concerns
Of course, the same issues plague the IoT powered by a smartphone as have plagued all IoT devices that have come before: namely, security concerns. The IoT is notorious for its devices not having sufficient security installed, and often have no real way to update later. Time will only tell if this will eventually be a fatal flaw for the IoT, or if it will be overcome.

What do you think? Would you consider using an old smartphone to make another object smarter? Tell us why or why not in the comments!

Know Your Tech: Wizard
5G is Still Going to Take A While


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, January 20 2019

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Google Hackers Microsoft Hosted Solutions Malware Business Computing Business Backup Mobile Devices User Tips Innovation Data Internet Email Workplace Tips Software Productivity Windows 10 Miscellaneous Browser Network Security Hardware Smartphone Efficiency Smartphones Android Business Continuity Computer Tech Term VoIP Disaster Recovery IT Services Office Chrome Network Small Business Ransomware Business Management communications Windows Data Backup Upgrade Communication Server Cybercrime Holiday Productivity Data Recovery Alert Computers Outsourced IT Automation Cloud Computing Social Media Save Money Microsoft Office Virtualization Router Artificial Intelligence Managed IT Services Managed IT Services Telephone Systems Employer-Employee Relationship Internet of Things Social Engineering Quick Tips Windows 10 Collaboration Passwords App Facebook Law Enforcement Hacking Office 365 Wi-Fi Health IT Support Marketing Money Mobility Cybersecurity Gadgets Operating System Office Tips Password How To Spam Bandwidth Applications Mobile Device Management Gmail Mobile Computing Word Settings Mouse Remote Computing Google Drive Managed Service Provider Website Information Application Entertainment Bring Your Own Device Two-factor Authentication Mobile Device Work/Life Balance Saving Money Big Data Networking BDR Connectivity Phishing HaaS Apps IT Support Data Protection Private Cloud History Flexibility Vulnerability Data Management Safety Data Breach Keyboard WiFi Sports Remote Monitoring Lithium-ion battery Encryption Voice over Internet Protocol VPN Data Security Cleaning Scam Managed Service Government The Internet of Things BYOD Recovery USB Human Resources Electronic Medical Records Value Hacker Redundancy Biometrics Budget Training Robot User Error Downtime Environment IT Plan Machine Learning Best Practice Physical Security Risk Management Comparison Update CES Internet Exlporer Firewall Identity Theft Wearable Technology Data storage Unsupported Software Computer Accessories Wireless Battery Software as a Service Managed IT Infrastructure Hiring/Firing OneNote Telephony Public Cloud Google Docs Content Management Legal Charger Automobile Virtual Reality Servers Retail Patch Management Social Access Control Botnet Business Intelligence Bluetooth Blockchain Computer Care Fax Server Windows 7 Fraud End of Support Worker Printer Apple Black Market Data Storage Virtual Assistant Meetings PDF YouTube Samsung Excel DDoS Unified Threat Management Avoiding Downtime IT solutions Spam Blocking eWaste IT Management Paperless Office Telephone System Humor Trending Staff Scalability NarrowBand FENG Amazon Web Services Advertising Distributed Denial of Service Audiobook Outlook Password Management Criminal Shadow IT Benefits Windows 10s File Sharing Remote Work iPhone Consultant Current Events Security Cameras Books Netflix Virus Net Neutrality Hosted Computing Touchpad Public Computer Hard Drives Data loss Wireless Internet Help Desk Workers NIST Instant Messaging Wireless Technology Save Time Loyalty Science Devices Warranty PowerPoint Sync Online Shopping Politics User webinar Frequently Asked Questions Vendor Management Customer Relationship Management Augmented Reality Files Worker Commute Best Available Knowledge Smartwatch Shortcut Emergency Employer Employee Relationship FCC Inventory Memory Screen Mirroring Wire Cryptocurrency Specifications Digital Signature People Chromecast SaaS Windows 8 Thought Leadership Administrator Evernote Streaming Media Conferencing Tip of the week Smart Technology Solid State Drive Customer Service Remote Worker Credit Cards Running Cable Monitor Network Congestion Software Tips Uninterrupted Power Supply Cameras Title II Relocation SharePoint Education IBM Cast Smart Office Shortcuts Password Manager Windows Server 2008 Safe Mode Accountants Mobile Office WIndows 7 Tablet Microchip Skype Wireless Charging Hybrid Cloud Experience Emails Programming Two Factor Authentication Audit Wiring Analytics Reputation IT Consultant Bloatware HVAC Business Mangement Users Online Authentication Computing Infrastructure Supercomputer Document Management Vendor Travel Millennials Search Going Green Managing Stress Assessment Root Cause Analysis Addiction Search Engine Start Menu Cortana Notifications Music Multi-Factor Security HIPAA Video Games Computer Fan Smart Tech Camera Flash Amazon Internet exploMicrosoft Content Customer Leadership Entrepreneur HBO Enterprise Content Management Recycling Techology Tech Support Transportation Rootkit Social Networking MSP Printer Server Telecommuting Nanotechnology Analyitcs Display Workforce Practices How to Laptop Television Tablets Cache Windows Media Player Bing Tools Google Apps Maintenance Information Technology Troubleshooting Printers Compliance Phone System Company Culture Regulation CrashOverride Twitter Webinar IT solutions

Mobile? Grab this Article!

Qr Code

Upcoming Events

No events

Recent Comments

No comments yet.

Latest Blog Entry

Smartwatches might be great tools for keeping yourself connected to important information, but they bring with them a considerable amount of security threats. Vulnerabilities can make using smartwatches and other wearable technology dangerous. We’ll examine some of the major...

Latest News

NuTech Services launches new website!

NuTech Services is proud to announce the launch of our new website at The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

Read more ...

Account Login