Contact Us Today! 800-626-8277

One World Technology Inc. Blog

One World Technology Inc. has been serving the Medina area since 2012, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Internet of Things Gives Great Power to Our Phones

The Internet of Things Gives Great Power to Our Phones

The Internet of Things is a bit of a paradox in and of itself. It has been leveraged to accomplish great things, but at the same time, it can be used in a way that can create considerable problems. However, innovations have proven that the IoT isn’t going anywhere, anytime soon, especially now that it can use the devices that we carry in our pockets.

Taking the IoT to New Heights
Smartphones are notorious for swiftly becoming obsolete, which means that there is a great opportunity to repurpose them and give them new life as a critical component of an IoT device. Just ask NASA.

The National Aeronautics and Space Administration has long been sending satellites into orbit - despite the intense costs to construct them, let alone get them where they need to go. To help decrease these costs without sacrificing the insight that these satellites provide, NASA started the PhoneSat Project in 2009. Rather than sending a few conventional, expensive satellites into orbit, many nanosatellites can be built from off-the-shelf components and sent into space. These nanosatellites rely on smartphones in order to function.

This initiative has appeared to be very successful, as version 2.4 of PhoneSat, “CubeSat,” reentered the atmosphere on January 31, 2017 after spending more than three years orbiting Earth. These nanosatellites have a relatively tiny price tag of $8000, and have, thus far, proved massively successful.

Bringing the IoT Down to Earth
Of course, the IoT has far more uses that are much more practical to the user who is not affiliated with NASA. Samsung Electronics created a team whose task was to figure out ways of taking older models from the Galaxy line of phones and figuring out how to leverage them as an IoT device. This “Galaxy Upcycling” team created a huge variety of IoT-powered purposes - including a few for the owners of hungry pets. The Smart Fish Tank they developed could feed the fish through a text message, and the Smart Pet Bowl would send the doting pet owner a picture whenever Fido or Fluffy chows down. This project has since been completed, the final product anticipated to be released soon.

Security Concerns
Of course, the same issues plague the IoT powered by a smartphone as have plagued all IoT devices that have come before: namely, security concerns. The IoT is notorious for its devices not having sufficient security installed, and often have no real way to update later. Time will only tell if this will eventually be a fatal flaw for the IoT, or if it will be overcome.

What do you think? Would you consider using an old smartphone to make another object smarter? Tell us why or why not in the comments!

Know Your Tech: Wizard
5G is Still Going to Take A While
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, July 16 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Sign up for our Newsletter!

Powered by ChronoForms - ChronoEngine.com

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Best Practices Privacy Technology Cloud Network Security Business Computing Managed IT Services Backup Hackers Malware Hosted Solutions Outsourced IT Software Google VoIP Microsoft Email Data Backup Business Data Business Continuity Mobile Devices Disaster Recovery IT Support Windows 10 Cloud Computing Smartphones Cybercrime Android Ransomware Innovation Data Recovery Efficiency Saving Money IT Services Hardware Computer Small Business Browser Alert Tech Term Communications Internet Internet of Things Productivity BDR Office Computers Business Management Server User Tips Managed IT Smartphone Cybersecurity Law Enforcement Virtualization Collaboration Windows Router Productivity Work/Life Balance Password Communication Artificial Intelligence Chrome Telephone Systems Passwords Save Money How To Mobility Quick Tips Network Office Tips Social Engineering App Facebook Managed IT Services Money Remote Monitoring Private Cloud Firewall Office 365 Social Media Budget Data Security Mobile Device Management Health Avoiding Downtime Data Protection Business Intelligence Wi-Fi Phishing Flexibility Holiday Hacking Compliance Apps Workplace Tips Spam Managed Service Provider Gadgets Connectivity Applications Vulnerability Identity Theft Word Upgrade Proactive IT Automation BYOD Mobile Device Recovery Two-factor Authentication Big Data Miscellaneous Data Breach Redundancy Document Management Bring Your Own Device HaaS Bandwidth Value Information Technology OneNote USB IT Management Scam Analysis Automobile Paperless Office Spam Blocking SaaS Two Factor Authentication Risk Management IT Plan Battery IT Support Website Training Windows 7 VPN Data Management Operating System Unsupported Software Education Electronic Medical Records CES Workers Charger Microsoft Office Legal HIPAA Content Management Servers Public Cloud Credit Cards Data loss Hiring/Firing Content Filtering Blockchain Smart Tech Business Owner Cleaning Keyboard Infrastructure Computing Infrastructure Black Market Computer Care PDF Data Storage Employer-Employee Relationship Marketing Save Time Comparison Government Entertainment Google Drive Update Remote Computing Networking Windows 10 Solid State Drive History Worker Patch Management End of Support Wireless Charging Scalability IBM Start Menu Access Control Password Management Recycling Thought Leadership User Error Conferencing Google Docs Rootkit Windows Server 2008 Internet exploMicrosoft Workforce Fiber-Optic Apple Supercomputer Mobile Authentication NIST Troubleshooting eWaste Streaming Media Transportation Students Telecommuting Root Cause Analysis Cables Instant Messaging iPhone Professional Services Nanotechnology Politics Cryptocurrency Wireless Criminal Content Filter Voice over Internet Protocol Vendor Management Assessment Regulations Benefits Accountants Healthcare Advertising Windows 10s Remote Work Unified Communications Current Events Tools Safe Mode Hosted Solution Software Tips Storage Multi-Factor Security Relocation Television Smart Technology Electronic Health Records Meetings Theft Search Knowledge Users Physical Security Virtual Reality Trending Techology Public Computer IoT Machine Learning Audit Best Practice Cortana How to Network Congestion Botnet Worker Commute Addiction Emails Lifestyle Unified Threat Management Humor Flash YouTube Hybrid Cloud Fraud Virtual Assistant Screen Mirroring Google Apps Travel Employer Employee Relationship HBO Human Resources Cache Colocation Mobile Computing Wireless Technology Insurance Content Computer Fan Amazon Cast Shadow IT Leadership Computer Accessories Books Staff Wireless Internet Outlook Safety Sync Practices Audiobook The Internet of Things Amazon Web Services Experience Password Manager Software as a Service Bluetooth Digital Signature Wire hacker Netflix Samsung Frequently Asked Questions Video Games Telephony Hosted Computing HVAC FENG Online Shopping Music Hard Drives Business Mangement Files Emergency Encryption Sports Internet Exlporer Settings Specifications Excel Skype Inventory Enterprise Content Management Evernote Wearable Technology Data Warehousing Gmail Devices webinar Strategy Smart Office Millennials Downtime Loyalty Tip of the week Robot CrashOverride File Sharing Twitter Business Technology Webinar Company Culture Telephone System IT solutions Managing Stress WiFi