Out of the Box Solutions Blog

Smartphones Are at the Center of the Internet of Things

Smartphones Are at the Center of the Internet of Things

The Internet of Things can be used to create a lot of opportunity for your organization, but there are considerable risks that your business can’t forget about, no matter how tempting it is to take advantage of them. Even though security remains a prime concern for businesses, it’s clear that the Internet of Things isn’t going anywhere. Therefore, you might as well embrace it, or at least prepare for it.

Taking the Internet of Things to New Heights
Smartphones are a perfect example of a device that quickly grows obsolete after only a couple of years. While this means that there is a lot of opportunity to take advantage of great refurbished devices at a discount, there are a lot of other creative ways to take advantage of smartphones as Internet of Things devices. For example, NASA has been using old smartphones for satellite initiatives since 2009, when the PhoneSat Project began. The costs of launching a satellite can be astounding, and that’s not even considering the process and materials used to create them. Instead of building traditional satellites for orbit, NASA has been working on nano satellites that can be built from components found in smartphones.

This initiative has been met with no surprising amount of success. Version 2.4 of PhoneSat, “CubeSat,” came back to Earth on January 31, 2017 after spending over three years in Earth’s orbit. Compared to full-fledged satellites, the small price tag of $8,000 is a miniscule price to pay for the efficiency.

Bringing the IoT Down to Earth
The Internet of Things has uses that are only limited by the imagination of creative and innovative individuals. Samsung Electronics has built a team dedicated to transforming older Galaxy smartphones and turning them into other kinds of IoT devices. This is called Galaxy Upscaling, and it’s being used to create some really interesting things--including a smart fish tank that can feed a fish with a text message, or a smart pet bowl that can send pictures of hungry pets to their owners every time they eat.

Security Concerns
Security is still a major concern for any IoT device, especially those that access sensitive data. IoT devices in particular are known to have less-than-stellar security features, and you can forget about them being reliably updated by developers. Of course, time will tell if these issues become more than a minor annoyance, so it’s best to stay in the know about any developments regarding the Internet of Things.

What are your thoughts on this matter? Let us know in the comments.

Intro to Your Tech: Plug-In
Your Network is at Threat from the Inside, Too
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, May 24 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Network Security Productivity User Tips Privacy Efficiency Communication Data Tech Term Internet Hardware Smartphones Google Microsoft Mobile Device Innovation IT Support Malware Email Cybersecurity Windows 10 Cloud Communications Mobile Devices Business Users Business Management Passwords Browser Small Business Network Android IT Services Applications Outsourced IT Hackers Managed IT Services Collaboration Ransomware Wi-Fi Data recovery Internet of Things Wireless Backup Holiday Saving Money Social Media Apps Workplace Tips Bandwidth Managed IT services Data Backup Software Gadgets Information Networking Smartphone Computer Cloud Computing Managed Service Employer-Employee Relationship Business Intelligence Gmail Blockchain Hosted Solutions VoIp Marketing Computers Remote Monitoring and Management Tech Terms Miscellaneous Save Money Access Control Managed IT Service Microsoft Office Upgrade Connectivity Automation Value Medical IT Remote Computing Patch Management Facebook Chrome Paperless Office Office Artificial Intelligence Healthcare Virtual Assistant Password Cost Management Analytics Mobility Wireless Charging Office 365 Cortana Voice over Internet Protocol Data Security Compliance Virtualization Net Neutrality Telephony VPN BDR G Suite Data Management Hard Drives Trends Microsoft Office 365 HP Sales Tactics Business Continuity Settings Storage E-Commerce HIPAA Millennials disposal Bring Your Own Device Profitability Reporting Word Mobile Security Microsoft Teams Employee-Employer Relationship Antivirus Hard Disk Drive Printing IT budget SSD A.I. Time Management Document Management Telecommute Tablet Conferencing Dark Web Payment Hard Drive Business Technology Hybrid Cloud Amazon Eliminating Downtime Physical Security Wearables Lead Generation Network Attached Storage Operating System Company Culture Electronic Health Records Staff Video Dongle Paper Battery Movies Authentication Excel Maintenance Analysis Certification Technology Tips Error instant Messaging Processors Cables BYOD eCommerce Laptop SaaS Telecommuting Managing Stress Troubleshooting Health Customer Service Ink Tip of the week Twitter Authorization Chrome OS Digital Data loss Knowledge Router Content Filtering Streaming Media Vulnerabilities Vulnerability Machine Learning Phishing Database Plug-In Wireless Internet Online Shopping GDPR Environment Update Comparison Government PowerPoint Training IT Management User Tip Inventory Unified Communications Spam Employees Websites Internet Explorer Backup and Disaster Recovery Downloads Touchscreen Cryptocurrency Spyware Data Breach Cybercrime Proactive IT Help Desk Sports Personal Information WannaCry Server Management Workers e-waste Outlook Big Data Specifications Security Cameras Server Data Protection RAM Human Resources Edge Virus Solid State Drive Safety Voice over IP Threat Windows 7 Alert Printers OneNote Quick Tips Regulation Disaster Recovery