Out of the Box Solutions Blog

Smartphones Are at the Center of the Internet of Things

Smartphones Are at the Center of the Internet of Things

The Internet of Things can be used to create a lot of opportunity for your organization, but there are considerable risks that your business can’t forget about, no matter how tempting it is to take advantage of them. Even though security remains a prime concern for businesses, it’s clear that the Internet of Things isn’t going anywhere. Therefore, you might as well embrace it, or at least prepare for it.

Taking the Internet of Things to New Heights
Smartphones are a perfect example of a device that quickly grows obsolete after only a couple of years. While this means that there is a lot of opportunity to take advantage of great refurbished devices at a discount, there are a lot of other creative ways to take advantage of smartphones as Internet of Things devices. For example, NASA has been using old smartphones for satellite initiatives since 2009, when the PhoneSat Project began. The costs of launching a satellite can be astounding, and that’s not even considering the process and materials used to create them. Instead of building traditional satellites for orbit, NASA has been working on nano satellites that can be built from components found in smartphones.

This initiative has been met with no surprising amount of success. Version 2.4 of PhoneSat, “CubeSat,” came back to Earth on January 31, 2017 after spending over three years in Earth’s orbit. Compared to full-fledged satellites, the small price tag of $8,000 is a miniscule price to pay for the efficiency.

Bringing the IoT Down to Earth
The Internet of Things has uses that are only limited by the imagination of creative and innovative individuals. Samsung Electronics has built a team dedicated to transforming older Galaxy smartphones and turning them into other kinds of IoT devices. This is called Galaxy Upscaling, and it’s being used to create some really interesting things--including a smart fish tank that can feed a fish with a text message, or a smart pet bowl that can send pictures of hungry pets to their owners every time they eat.

Security Concerns
Security is still a major concern for any IoT device, especially those that access sensitive data. IoT devices in particular are known to have less-than-stellar security features, and you can forget about them being reliably updated by developers. Of course, time will tell if these issues become more than a minor annoyance, so it’s best to stay in the know about any developments regarding the Internet of Things.

What are your thoughts on this matter? Let us know in the comments.

Intro to Your Tech: Plug-In
Your Network is at Threat from the Inside, Too


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, December 13 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Network Security Tech Term User Tips Internet Privacy Cybersecurity Communication Microsoft Efficiency Browser Productivity Smartphones Email IT Support Cloud Malware Android Hardware Data Backup Google Passwords Network Windows 10 Data Small Business Business Management Data recovery IT Services Managed IT services Communications Applications Users Ransomware Backup Mobile Device Saving Money Wi-Fi Hosted Solutions Mobile Devices Business Wireless Employer-Employee Relationship Software VoIp Marketing Information Internet of Things Cloud Computing Networking Innovation Workplace Tips Business Intelligence Outsourced IT Blockchain Social Media Managed IT Services Collaboration Cortana Save Money Tech Terms Remote Monitoring and Management Automation BDR Gmail Microsoft Office Artificial Intelligence Analytics Virtual Assistant Wireless Charging Managed IT Service Hackers Connectivity Managed Service Virtualization VPN Patch Management Remote Computing Computer Apps Bandwidth Compliance Cost Management Data Management Computers Knowledge Office 365 Streaming Media Tip of the week Database Outlook Voice over Internet Protocol HIPAA Phishing Government PowerPoint Antivirus Content Filtering Environment Document Management Telecommute Comparison Inventory Microsoft Office 365 Unified Communications IT budget Websites Internet Explorer Business Continuity Hard Drive Telephony Backup and Disaster Recovery Storage Downloads Holiday Physical Security User Tip Cybercrime Profitability Data Breach Reporting Sports Staff e-waste Miscellaneous G Suite Lead Generation Network Attached Storage Upgrade Paperless Office Smartphone Specifications Data Protection Access Control RAM Battery Workers Safety Threat Processors Voice over IP Hard Drives Dark Web Trends eCommerce Laptop Amazon Tactics Eliminating Downtime Sales Medical IT Gadgets disposal Bring Your Own Device Password Analysis Printing Certification Digital Data loss Mobile Security Authentication Microsoft Teams Millennials Vulnerability Machine Learning SSD Error A.I. Online Shopping BYOD Tablet SaaS Value Troubleshooting Hybrid Cloud Dongle Paper Spam Conferencing Operating System Authorization Company Culture IT Management Business Technology Spyware Facebook Movies Plug-In Maintenance Wireless Internet Excel Technology Tips GDPR Big Data Update Cables WannaCry Server Management Ink Edge Virus Office Managing Stress Server HP Twitter Touchscreen Settings Telecommuting Proactive IT Router Help Desk Regulation Disaster Recovery Printers Alert Quick Tips