094 90 48200     Get SUPPORT

Aniar IT Services Blog

The Internet of Things Gives Great Power to Our Phones

The Internet of Things Gives Great Power to Our Phones

The Internet of Things is a bit of a paradox in and of itself. It has been leveraged to accomplish great things, but at the same time, it can be used in a way that can create considerable problems. However, innovations have proven that the IoT isn’t going anywhere, anytime soon, especially now that it can use the devices that we carry in our pockets.

Taking the IoT to New Heights
Smartphones are notorious for swiftly becoming obsolete, which means that there is a great opportunity to repurpose them and give them new life as a critical component of an IoT device. Just ask NASA.

The National Aeronautics and Space Administration has long been sending satellites into orbit - despite the intense costs to construct them, let alone get them where they need to go. To help decrease these costs without sacrificing the insight that these satellites provide, NASA started the PhoneSat Project in 2009. Rather than sending a few conventional, expensive satellites into orbit, many nanosatellites can be built from off-the-shelf components and sent into space. These nanosatellites rely on smartphones in order to function.

This initiative has appeared to be very successful, as version 2.4 of PhoneSat, “CubeSat,” reentered the atmosphere on January 31, 2017 after spending more than three years orbiting Earth. These nanosatellites have a relatively tiny price tag of $8000, and have, thus far, proved massively successful.

Bringing the IoT Down to Earth
Of course, the IoT has far more uses that are much more practical to the user who is not affiliated with NASA. Samsung Electronics created a team whose task was to figure out ways of taking older models from the Galaxy line of phones and figuring out how to leverage them as an IoT device. This “Galaxy Upcycling” team created a huge variety of IoT-powered purposes - including a few for the owners of hungry pets. The Smart Fish Tank they developed could feed the fish through a text message, and the Smart Pet Bowl would send the doting pet owner a picture whenever Fido or Fluffy chows down. This project has since been completed, the final product anticipated to be released soon.

Security Concerns
Of course, the same issues plague the IoT powered by a smartphone as have plagued all IoT devices that have come before: namely, security concerns. The IoT is notorious for its devices not having sufficient security installed, and often have no real way to update later. Time will only tell if this will eventually be a fatal flaw for the IoT, or if it will be overcome.

What do you think? Would you consider using an old smartphone to make another object smarter? Tell us why or why not in the comments!

Know Your Tech: Wizard
5G is Still Going to Take A While


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, September 26 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Tech Term Google Email Cloud Business Computing Network Security Microsoft Hackers Innovation Data Backup Malware Android Hardware Mobile Devices Internet VoIP Data Data Recovery Cloud Computing User Tips Artificial Intelligence Smartphones Managed IT Services Communication Small Business How To Internet of Things Backup Saving Money Applications IT Services Cybersecurity Smartphone Windows 10 Communications Computers Software Chrome Browser Windows Network Cybercrime Collaboration Connectivity Money Business Management IT Support Business Spam BDR Mobile Device Management Outsourced IT Facebook Two-factor Authentication Passwords Data Security Data Protection Gadgets Workplace Tips Hosted Solutions Word Efficiency Ransomware Office 365 Router Vulnerability Virtual Assistant Operating System IT Management Upgrade Law Enforcement Sports App Social Media CES Managed Service BYOD Managed IT Save Money Update Encryption Paperless Office Business Intelligence Infrastructure Content Management Business Continuity Windows 7 IT Plan Computer VPN Remote Monitoring Password Settings OneNote Managed IT services Virtualization Blockchain Redundancy Apps Telephone Systems Unsupported Software Data Storage Social Engineering Server Avoiding Downtime Microsoft Office Phishing Spam Blocking Identity Theft Comparison Website Miscellaneous Information Bring Your Own Device Gmail Tip of the week Credit Cards PDF Document Management Camera Specifications Enterprise Content Management Data Management Wiring Telephony Trending Workers Access Control HaaS Solid State Drive Scam Evernote Cleaning Meetings Recycling Devices Windows Server 2008 Windows 10s Google Drive Fraud Downtime Authentication Password Management HBO Screen Mirroring Human Resources Firewall Telecommuting Wi-Fi Cache MSP Audit Physical Security Keyboard Practices Servers Employer-Employee Relationship Botnet eWaste Thought Leadership Telephone System Private Cloud Computer Care Amazon Entertainment Root Cause Analysis Disaster Recovery Bandwidth NIST Outlook Government Cast Augmented Reality Staff Unified Threat Management Skype Travel Remote Work Wireless Internet File Sharing Voice over Internet Protocol Charger Hosted Computing HVAC Legal Automation Patch Management Public Cloud Amazon Web Services Accountants Machine Learning Tools Work/Life Balance Password Manager Nanotechnology Cryptocurrency Frequently Asked Questions Recovery The Internet of Things Mobile Computing Start Menu Data loss HIPAA USB Training Sync Computer Fan Multi-Factor Security Wireless Charging Inventory Criminal Software Tips Holiday YouTube Millennials Business Mangement Smart Tech Safe Mode Excel Big Data Digital Signature Smart Office Cortana Alert Electronic Medical Records Wire Remote Worker FENG Google Apps Mobile Device Networking Addiction Flash Google Docs Online Shopping Productivity Value Workforce Managed Service Provider Mobile Office Domains Wireless Managing Stress Hiring/Firing Windows 10 Printers Public Speaking Fun Presentation Lithium-ion battery Emergency Wireless Technology 5G Tech Support Safety Compliance IBM Hard Drives Productivity Search Marketing Hacker Budget Competition Twitter Regulation WiFi Customer Relationship Management Quick Tips CrashOverride IP Address Users Customer Service Company Culture