(415) 246-0101

Microtechs Blog

Smartphones Are at the Center of the Internet of Things

Smartphones Are at the Center of the Internet of Things

The Internet of Things can be used to create a lot of opportunity for your organization, but there are considerable risks that your business can’t forget about, no matter how tempting it is to take advantage of them. Even though security remains a prime concern for businesses, it’s clear that the Internet of Things isn’t going anywhere. Therefore, you might as well embrace it, or at least prepare for it.

Taking the Internet of Things to New Heights
Smartphones are a perfect example of a device that quickly grows obsolete after only a couple of years. While this means that there is a lot of opportunity to take advantage of great refurbished devices at a discount, there are a lot of other creative ways to take advantage of smartphones as Internet of Things devices. For example, NASA has been using old smartphones for satellite initiatives since 2009, when the PhoneSat Project began. The costs of launching a satellite can be astounding, and that’s not even considering the process and materials used to create them. Instead of building traditional satellites for orbit, NASA has been working on nano satellites that can be built from components found in smartphones.

This initiative has been met with no surprising amount of success. Version 2.4 of PhoneSat, “CubeSat,” came back to Earth on January 31, 2017 after spending over three years in Earth’s orbit. Compared to full-fledged satellites, the small price tag of $8,000 is a miniscule price to pay for the efficiency.

Bringing the IoT Down to Earth
The Internet of Things has uses that are only limited by the imagination of creative and innovative individuals. Samsung Electronics has built a team dedicated to transforming older Galaxy smartphones and turning them into other kinds of IoT devices. This is called Galaxy Upscaling, and it’s being used to create some really interesting things--including a smart fish tank that can feed a fish with a text message, or a smart pet bowl that can send pictures of hungry pets to their owners every time they eat.

Security Concerns
Security is still a major concern for any IoT device, especially those that access sensitive data. IoT devices in particular are known to have less-than-stellar security features, and you can forget about them being reliably updated by developers. Of course, time will tell if these issues become more than a minor annoyance, so it’s best to stay in the know about any developments regarding the Internet of Things.

What are your thoughts on this matter? Let us know in the comments.

Intro to Your Tech: Plug-In
Your Network is at Threat from the Inside, Too

Related Posts



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, December 11 2018

Captcha Image

Mobile? Grab this Article!


Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Network Security Tech Term Privacy User Tips Internet Cybersecurity Smartphones Microsoft Browser Communication Productivity Malware Cloud Efficiency Passwords Wi-Fi Google IT Support Hardware Email Android Ransomware Network Backup Data Backup Software IT Services Windows 10 Small Business Hosted Solutions Users Data Data recovery Saving Money Business Management Mobile Device Managed IT services Communications Applications Business Intelligence Blockchain Marketing Information Cloud Computing Wireless Mobile Devices Business Internet of Things Managed IT Services Outsourced IT Employer-Employee Relationship VoIp Workplace Tips Networking Social Media Collaboration Innovation Computer VPN Data Management Cost Management Data Breach Patch Management Compliance Data Protection Tech Terms Gmail Bandwidth Cortana Remote Computing Miscellaneous Computers Remote Monitoring and Management Automation Save Money BDR Artificial Intelligence Managed IT Service Connectivity Wireless Charging Phishing Virtual Assistant Government Analytics Hackers Apps Smartphone Virtualization Excel Router Managed Service Touchscreen Law Enforcement Plug-In Business Continuity Telephony Technology Tips Streaming Media Server Server Management Content Filtering Profitability Millennials Dongle PowerPoint Business Technology GDPR Facebook Unified Communications G Suite Spyware Staff Internet Explorer Settings Knowledge Microsoft Office 365 WannaCry Telecommute Database User Tip Proactive IT Upgrade Voice over IP Big Data Downloads Environment Eliminating Downtime Edge Sports Storage Twitter RAM How To Comparison Bring Your Own Device HP Threat Gadgets Access Control HIPAA Data loss Cybercrime Holiday Backup and Disaster Recovery Trends Dark Web Network Attached Storage e-waste Amazon BYOD Inventory Apple Specifications Hybrid Cloud Troubleshooting Telecommuting Document Management Websites Printing User Security Reporting Battery IT budget A.I. Microsoft Teams Authentication Hard Drive Spam Tactics Microsoft Office eCommerce Physical Security Hard Drives Error Lead Generation Password disposal Chrome Wireless Internet Sales Mobile Security iPhone Conferencing Cables Update Paperless Office Safety Paper Medical IT SSD Movies Company Culture Authorization Tip of the week Processors Virus File Sharing Analysis Online Shopping Laptop Machine Learning Value Help Desk Office 365 Tablet IT Management Operating System Office Voice over Internet Protocol Outlook Workers Digital Ink SaaS Managing Stress Vulnerability Antivirus Maintenance Disaster Recovery Congratulations Printers Regulation Certification Alert Quick Tips Thank You