888.678.7282    Get SUPPORT

Strata Information Technology Blog

Smartphones Are at the Center of the Internet of Things

Smartphones Are at the Center of the Internet of Things

The Internet of Things can be used to create a lot of opportunity for your organization, but there are considerable risks that your business can’t forget about, no matter how tempting it is to take advantage of them. Even though security remains a prime concern for businesses, it’s clear that the Internet of Things isn’t going anywhere. Therefore, you might as well embrace it, or at least prepare for it.

Taking the Internet of Things to New Heights
Smartphones are a perfect example of a device that quickly grows obsolete after only a couple of years. While this means that there is a lot of opportunity to take advantage of great refurbished devices at a discount, there are a lot of other creative ways to take advantage of smartphones as Internet of Things devices. For example, NASA has been using old smartphones for satellite initiatives since 2009, when the PhoneSat Project began. The costs of launching a satellite can be astounding, and that’s not even considering the process and materials used to create them. Instead of building traditional satellites for orbit, NASA has been working on nano satellites that can be built from components found in smartphones.

This initiative has been met with no surprising amount of success. Version 2.4 of PhoneSat, “CubeSat,” came back to Earth on January 31, 2017 after spending over three years in Earth’s orbit. Compared to full-fledged satellites, the small price tag of $8,000 is a miniscule price to pay for the efficiency.

Bringing the IoT Down to Earth
The Internet of Things has uses that are only limited by the imagination of creative and innovative individuals. Samsung Electronics has built a team dedicated to transforming older Galaxy smartphones and turning them into other kinds of IoT devices. This is called Galaxy Upscaling, and it’s being used to create some really interesting things--including a smart fish tank that can feed a fish with a text message, or a smart pet bowl that can send pictures of hungry pets to their owners every time they eat.

Security Concerns
Security is still a major concern for any IoT device, especially those that access sensitive data. IoT devices in particular are known to have less-than-stellar security features, and you can forget about them being reliably updated by developers. Of course, time will tell if these issues become more than a minor annoyance, so it’s best to stay in the know about any developments regarding the Internet of Things.

What are your thoughts on this matter? Let us know in the comments.

Intro to Your Tech: Plug-In
Your Network is at Threat from the Inside, Too


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, January 16 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Business Computing Best Practices Managed IT Services Privacy Cloud Network Security Internet Malware Cybersecurity Hackers Backup Communications User Tips Ransomware Tech Term Business Management VoIP Outsourced IT Microsoft Software IT Support Productivity Smartphones Efficiency Passwords Productivity Alert IT Services Social Media Business Network Google Windows 10 Hardware Data Recovery Data Backup Email Communication Data Small Business Browser Phishing Holiday Cloud Computing Save Money Hosted Solutions Microsoft Office Mobile Device Smartphone Users Data Breach Miscellaneous Collaboration Saving Money Android App Bandwidth Twitter Internet of Things Vulnerability Business Continuity Apps Access Control Workers Employer-Employee Relationship Remote Monitoring Scam Excel Networking Wireless Company Culture Mobile Device Management Cybercrime Politics Government Wi-Fi Computer Patch Management BDR Settings Workplace Tips Compliance Applications Blockchain Law Enforcement Innovation Office 365 Word Retail Office Virtual Assistant Personal Information BYOD Education How To Spam Managing Stress Vendor Management Automation SaaS Information Mobile Devices Windows Connectivity Remote Monitoring and Management Marketing Managed IT Service Entertainment Facebook Dark Web Chrome Recovery Antivirus Virus Maintenance Password Computers Website Paperless Office Tactics Certification Apple Websites Microsoft Teams Touchscreen Encryption e-waste Upgrade Managed Service News Battery Computer Care Data Management Artificial Intelligence Trends Reporting Multi-Factor Security Specifications VoIPMyths Licensing Voice over IP Automobile IT budget PowerPoint Plug-In Email Management Net Neutrality CrashOverride SSD Voice over Internet Protocol Disaster Recovery Digital Internet Explorer Mobility iPhone Synergy Microsoft Office 365 disposal Profitability Telephone System WannaCry Gaming Console Yahoo A.I. Medical IT VoIPSavings Travel Analytics IT Management Sports Proactive IT Sales Inventory Physical Security Hard Drives Edge Threat Two-factor Authentication Training WiFi Scalability Phone System Dongle Authentication Content Filtering Spyware Value Eliminating Downtime HIPAA DDoS Video Games Google Maps Movies GDPR Router Update Live Streaming IaaS Tech Terms Tablet Worker Amazon Files Television Avoiding Downtime Information Technology Tech Support Security Cameras Telephone Systems Data Protection Dark Data Credit Cards Bring Your Own Device Authorization Gmail Smart Technology HP Wireless Internet Remote Support Hard Drive Staffing Data loss Safety Storage The Internet of Things Technology Efficiently WhatsApp Wireless Charging Cortana HaaS Printer Server Streaming Media Knowledge Printer Biometrics Gadgets Budget Remote Control Unified Threat Management Gadget Technology Tips Hybrid Cloud Managed Service Provider Cost Management Document Management Business Intelligence Database Help Desk Processors Staff RAM Error Outlook Lead Generation Cleaning Printers Downloads Regulation Comparison Managed IT Emergency Telephony Hiring/Firing Leadership Employer Employee Relationship Access Botnet Current Events VPN Shortcut Backup and Disaster Recovery Cables Troubleshooting Tip of the week Customer Service Mobile Office Fun Business Technology Domains Remote Computing Hosted Solution Machine Learning Conferencing eCommerce Virtualization Autocorrect Public Speaking Telecommuting Presentation G Suite Search Scheduling Copy Telecommute Lithium-ion battery Online Shopping Server Windows 10 Mobile Security Augmented Reality Millennials Laptop Printing Emoji VoIP Wireless Technology 5G Instagram Paste IBM Unified Communications Samsung Network Attached Storage Hacker Google Drive Money Operating System IT Support Paper Wearables File Sharing Quick Tips User Tip Customer Relationship Management Managed IT Services Competition Environment Big Data Server Management IP Address Ink Healthcare Spam Blocking User Security

Newsletter Sign Up