888.678.7282    Get SUPPORT

Strata Information Technology Blog

Smartphones Are at the Center of the Internet of Things

Smartphones Are at the Center of the Internet of Things

The Internet of Things can be used to create a lot of opportunity for your organization, but there are considerable risks that your business can’t forget about, no matter how tempting it is to take advantage of them. Even though security remains a prime concern for businesses, it’s clear that the Internet of Things isn’t going anywhere. Therefore, you might as well embrace it, or at least prepare for it.

Taking the Internet of Things to New Heights
Smartphones are a perfect example of a device that quickly grows obsolete after only a couple of years. While this means that there is a lot of opportunity to take advantage of great refurbished devices at a discount, there are a lot of other creative ways to take advantage of smartphones as Internet of Things devices. For example, NASA has been using old smartphones for satellite initiatives since 2009, when the PhoneSat Project began. The costs of launching a satellite can be astounding, and that’s not even considering the process and materials used to create them. Instead of building traditional satellites for orbit, NASA has been working on nano satellites that can be built from components found in smartphones.

This initiative has been met with no surprising amount of success. Version 2.4 of PhoneSat, “CubeSat,” came back to Earth on January 31, 2017 after spending over three years in Earth’s orbit. Compared to full-fledged satellites, the small price tag of $8,000 is a miniscule price to pay for the efficiency.

Bringing the IoT Down to Earth
The Internet of Things has uses that are only limited by the imagination of creative and innovative individuals. Samsung Electronics has built a team dedicated to transforming older Galaxy smartphones and turning them into other kinds of IoT devices. This is called Galaxy Upscaling, and it’s being used to create some really interesting things--including a smart fish tank that can feed a fish with a text message, or a smart pet bowl that can send pictures of hungry pets to their owners every time they eat.

Security Concerns
Security is still a major concern for any IoT device, especially those that access sensitive data. IoT devices in particular are known to have less-than-stellar security features, and you can forget about them being reliably updated by developers. Of course, time will tell if these issues become more than a minor annoyance, so it’s best to stay in the know about any developments regarding the Internet of Things.

What are your thoughts on this matter? Let us know in the comments.

Intro to Your Tech: Plug-In
Your Network is at Threat from the Inside, Too
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, April 19 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Business Computing Best Practices Privacy Managed IT Services Network Security Cloud Internet Hackers Malware Productivity User Tips Microsoft Cybersecurity Communications Software Business Management Outsourced IT Efficiency Backup IT Support Smartphones Business Tech Term Data Passwords Communication Ransomware Google Windows 10 VoIP Email Users Innovation Productivity Hardware Alert IT Services Network Data Backup Browser Bandwidth Social Media Data Recovery Small Business Apps Microsoft Office Save Money Hosted Solutions Cloud Computing Mobile Device Smartphone Holiday Phishing Collaboration Android App Twitter Access Control Internet of Things Office 365 Miscellaneous Saving Money Business Continuity Workplace Tips Mobile Devices Data Breach Vulnerability Net Neutrality Personal Information Settings Employer-Employee Relationship Remote Monitoring Scam Excel Company Culture Networking Politics Chrome Cybercrime Government Compliance BDR Applications Wireless Mobile Device Management Facebook Law Enforcement Wi-Fi Blockchain Patch Management Computer Workers Office Education Paperless Office BYOD Medical IT Marketing Vendor Management Automation Gadgets Managed IT Service Managing Stress SaaS Dark Web Virus Information Website Remote Monitoring and Management Windows Word Virtual Assistant Connectivity Spam How To Entertainment Antivirus Recovery Maintenance Password Healthcare Retail Data Security Computers Microsoft Teams CrashOverride Safety Mobility Remote Support Hard Drive Tactics Microsoft Office 365 Electronic Health Records Gmail Automobile Websites Profitability WhatsApp Wireless Charging Synergy e-waste Disaster Recovery The Internet of Things Knowledge Artificial Intelligence Trends Yahoo SSD Voice over Internet Protocol Proactive IT E-Commerce Remote Control IT budget PowerPoint Gaming Console Budget VoIPSavings Training Processors Digital Internet Explorer Analytics Authentication Health Eliminating Downtime Lead Generation disposal GDPR Time Management Comparison Hard Drives A.I. Scalability Phone System Telephony DDoS Inventory Payment IT Management Sports Video Games Google Maps Update Emergency Dongle Worker Security Cameras Apple Edge Threat IaaS Authorization Employees Wireless Internet News Dark Data Spyware Value Television Information Technology Upgrade Storage Multi-Factor Security Specifications Avoiding Downtime Movies Credit Cards Licensing Voice over IP Amazon Smart Technology instant Messaging Email Management Tech Terms Staffing Technology Efficiently Bring Your Own Device Printer iPhone HaaS Printer Server Cortana Gadget Help Desk Telephone System WannaCry Unified Threat Management HP Biometrics Error Human Resources Data loss Travel Business Intelligence Regulation Vulnerabilities Sales Managed Service Provider Cost Management Streaming Media Outlook Technology Tips Hybrid Cloud WiFi Managed IT Cleaning Printers Two-factor Authentication Troubleshooting Physical Security Current Events Shortcut Certification HIPAA Botnet VPN Document Management Database Leadership Access Touchscreen Employee-Employer Relationship Router Content Filtering Hiring/Firing Employer Employee Relationship Staff RAM Managed Service Live Streaming Reporting Cryptocurrency Tablet Downloads Data Management Backup and Disaster Recovery Cables Plug-In Telephone Systems Data Protection Encryption Computer Care Tech Support VoIPMyths Files Battery IBM Windows 7 Google Drive Hacker Hosted Solution File Sharing IT Support Competition Autocorrect Customer Relationship Management User Tip Virtualization Big Data Machine Learning IP Address Copy Spam Blocking User Security Search Scheduling G Suite Windows 10 Customer Service Tip of the week Server Mobile Office Emoji Chrome OS Telecommute VoIP Mobile Security Paste Domains Business Technology Instagram Wearables Money Laptop Printing Quick Tips Remote Computing Samsung Conferencing Unified Communications eCommerce Operating System Public Speaking Network Attached Storage Managed IT Services Presentation Paper Telecommuting Lithium-ion battery Online Shopping Environment Augmented Reality Server Management Wireless Technology 5G Fun Ink Millennials

Newsletter Sign Up