Out of the Box Solutions Blog

Smartphones Are at the Center of the Internet of Things

Smartphones Are at the Center of the Internet of Things

The Internet of Things can be used to create a lot of opportunity for your organization, but there are considerable risks that your business can’t forget about, no matter how tempting it is to take advantage of them. Even though security remains a prime concern for businesses, it’s clear that the Internet of Things isn’t going anywhere. Therefore, you might as well embrace it, or at least prepare for it.

Taking the Internet of Things to New Heights
Smartphones are a perfect example of a device that quickly grows obsolete after only a couple of years. While this means that there is a lot of opportunity to take advantage of great refurbished devices at a discount, there are a lot of other creative ways to take advantage of smartphones as Internet of Things devices. For example, NASA has been using old smartphones for satellite initiatives since 2009, when the PhoneSat Project began. The costs of launching a satellite can be astounding, and that’s not even considering the process and materials used to create them. Instead of building traditional satellites for orbit, NASA has been working on nano satellites that can be built from components found in smartphones.

This initiative has been met with no surprising amount of success. Version 2.4 of PhoneSat, “CubeSat,” came back to Earth on January 31, 2017 after spending over three years in Earth’s orbit. Compared to full-fledged satellites, the small price tag of $8,000 is a miniscule price to pay for the efficiency.

Bringing the IoT Down to Earth
The Internet of Things has uses that are only limited by the imagination of creative and innovative individuals. Samsung Electronics has built a team dedicated to transforming older Galaxy smartphones and turning them into other kinds of IoT devices. This is called Galaxy Upscaling, and it’s being used to create some really interesting things--including a smart fish tank that can feed a fish with a text message, or a smart pet bowl that can send pictures of hungry pets to their owners every time they eat.

Security Concerns
Security is still a major concern for any IoT device, especially those that access sensitive data. IoT devices in particular are known to have less-than-stellar security features, and you can forget about them being reliably updated by developers. Of course, time will tell if these issues become more than a minor annoyance, so it’s best to stay in the know about any developments regarding the Internet of Things.

What are your thoughts on this matter? Let us know in the comments.

Intro to Your Tech: Plug-In
Your Network is at Threat from the Inside, Too


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, February 19 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Network Security Productivity User Tips Tech Term Privacy Smartphones Internet Efficiency Hardware Microsoft Cybersecurity Malware Communication Data Email Innovation Mobile Device Browser Android Google Network Mobile Devices Passwords Windows 10 Small Business Ransomware Collaboration IT Support Communications Cloud Applications Wi-Fi Users Backup Business Saving Money Wireless Holiday Data recovery Internet of Things Business Management Managed IT services Software IT Services Data Backup Hosted Solutions Outsourced IT Social Media Managed IT Services Information Networking Employer-Employee Relationship Cloud Computing Hackers Workplace Tips VoIp Business Intelligence Marketing Blockchain Data Management Managed IT Service Computers Tech Terms G Suite Patch Management Save Money Remote Monitoring and Management BDR Remote Computing Computer Automation Access Control Microsoft Office Office 365 Smartphone Cortana Artificial Intelligence Medical IT Virtual Assistant Password Analytics Connectivity Wireless Charging Facebook Gmail Managed Service Mobility Apps Virtualization Cost Management Bandwidth Data Security VPN Compliance Server Touchscreen Environment Edge Virus Proactive IT Help Desk Government PowerPoint Personal Information Inventory Unified Communications Tablet HP Outlook Websites Internet Explorer Settings Business Technology HIPAA Cybercrime Conferencing Security Cameras Backup and Disaster Recovery Downloads Microsoft Office 365 e-waste Antivirus Business Continuity Sports IT budget Storage E-Commerce Data Protection RAM Excel Document Management Telecommute Profitability Safety Threat Hard Drives Trends Hard Drive Miscellaneous Tactics Office Physical Security Reporting Word Telecommuting Lead Generation Network Attached Storage disposal Bring Your Own Device Staff Upgrade Battery Dark Web Payment Mobile Security Microsoft Teams Knowledge Paperless Office Amazon Eliminating Downtime Printing Tip of the week SSD A.I. Phishing Processors Content Filtering eCommerce Laptop Wearables Authentication Value Hybrid Cloud Comparison Analysis Certification Error instant Messaging Operating System Company Culture Telephony Digital Data loss BYOD Dongle Paper User Tip Healthcare Movies Data Breach Vulnerability Machine Learning Troubleshooting Maintenance Online Shopping SaaS Workers Authorization Cables Specifications Technology Tips IT Management Vulnerabilities Managing Stress Voice over IP Spam Plug-In Wireless Internet Ink GDPR Twitter Sales Spyware Update Router Gadgets Millennials WannaCry Server Management Database Voice over Internet Protocol Big Data Training Streaming Media Cryptocurrency Disaster Recovery Regulation Printers Alert Quick Tips