631-905-9617    Get SUPPORT

Suffolk Computer Consultants Blog

Smartphones Are at the Center of the Internet of Things

Smartphones Are at the Center of the Internet of Things

The Internet of Things can be used to create a lot of opportunity for your organization, but there are considerable risks that your business can’t forget about, no matter how tempting it is to take advantage of them. Even though security remains a prime concern for businesses, it’s clear that the Internet of Things isn’t going anywhere. Therefore, you might as well embrace it, or at least prepare for it.

Taking the Internet of Things to New Heights
Smartphones are a perfect example of a device that quickly grows obsolete after only a couple of years. While this means that there is a lot of opportunity to take advantage of great refurbished devices at a discount, there are a lot of other creative ways to take advantage of smartphones as Internet of Things devices. For example, NASA has been using old smartphones for satellite initiatives since 2009, when the PhoneSat Project began. The costs of launching a satellite can be astounding, and that’s not even considering the process and materials used to create them. Instead of building traditional satellites for orbit, NASA has been working on nano satellites that can be built from components found in smartphones.

This initiative has been met with no surprising amount of success. Version 2.4 of PhoneSat, “CubeSat,” came back to Earth on January 31, 2017 after spending over three years in Earth’s orbit. Compared to full-fledged satellites, the small price tag of $8,000 is a miniscule price to pay for the efficiency.

Bringing the IoT Down to Earth
The Internet of Things has uses that are only limited by the imagination of creative and innovative individuals. Samsung Electronics has built a team dedicated to transforming older Galaxy smartphones and turning them into other kinds of IoT devices. This is called Galaxy Upscaling, and it’s being used to create some really interesting things--including a smart fish tank that can feed a fish with a text message, or a smart pet bowl that can send pictures of hungry pets to their owners every time they eat.

Security Concerns
Security is still a major concern for any IoT device, especially those that access sensitive data. IoT devices in particular are known to have less-than-stellar security features, and you can forget about them being reliably updated by developers. Of course, time will tell if these issues become more than a minor annoyance, so it’s best to stay in the know about any developments regarding the Internet of Things.

What are your thoughts on this matter? Let us know in the comments.

Intro to Your Tech: Plug-In
Your Network is at Threat from the Inside, Too


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, March 26 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Privacy Cloud Network Security Productivity User Tips Microsoft Cybersecurity Malware Smartphones Managed IT Services Tech Term Communication Communications Google Efficiency Backup Business Hardware Email Passwords Hackers Outsourced IT Internet Data Business Management Software Hosted Solutions Innovation Ransomware Small Business Android Browser Windows 10 Users Collaboration VoIP Mobile Devices IT Support IT Services Wi-Fi Data Backup Mobile Device Data Recovery Cloud Computing Managed IT Services Applications Save Money Social Media Internet of Things Smartphone Network Alert Holiday Microsoft Office Business Intelligence Miscellaneous Password Saving Money Twitter Wireless Access Control Computer Employer-Employee Relationship Apps Bandwidth Workplace Tips Router Data Breach Business Continuity Office 365 Settings Patch Management Vulnerability BDR Excel Office Information Government Chrome Blockchain Paperless Office Automation Data Management Analytics Word Phishing VoIP Marketing Virtualization Gadgets Networking Wireless Charging Data Protection Website Physical Security Managed IT Service Battery Gmail G Suite Facebook Cortana Retail Tech Terms Connectivity App Dark Web Spam Mobile Device Management VPN Remote Monitoring and Management Hacking Workers Virtual Assistant BYOD Tip of the week Remote Computing Medical IT IT Support Cost Management Virus Company Culture Data Security Remote Monitoring Computers Mobility Politics Law Enforcement Managed Service Artificial Intelligence Productivity Windows How To WiFi Cybercrime Compliance Scam disposal Tablet Plug-In Server Machine Learning Payment A.I. Big Data Travel Hard Drive Cables IT Management Security Cameras Sports Printer Server Error Google Maps Inventory Edge Wireless Internet Threat Entertainment Biometrics Dongle Chrome OS Shortcut Processors Troubleshooting Value Disaster Recovery Knowledge Proactive IT Telecommute instant Messaging Movies Upgrade Recovery Live Streaming Maintenance Telephone Systems File Sharing Voice over Internet Protocol Wearables Cleaning Printers Files Telephony Lead Generation Touchscreen Mobile Security Remote Support Laptop Help Desk Printing Access User Tip Reporting Spotify Bring Your Own Device CrashOverride Spyware Update Google Drive Comparison Data loss Vulnerabilities Unified Communications WhatsApp Antivirus Remote Control User Security Hiring/Firing Network Attached Storage Healthcare Streaming Media Voice over IP Microsoft Office 365 Operating System Hosted Solution Certification Paper Personal Information Technology Tips Hybrid Cloud Two-factor Authentication HP Outlook Database Education Smart Technology Specifications Analysis Work/Life Balance Staff Cryptocurrency RAM Phone System Spam Blocking Business Technology Amazon Server Management Managed IT Downloads eCommerce WannaCry Authentication Environment Copy Apple Botnet Ink SaaS Telecommuting GDPR Office Tips Backup and Disaster Recovery Automobile Tech Support Document Management Profitability Tactics Safety Multi-Factor Security Conferencing Websites Microsoft Teams News Email Management Sales E-Commerce Trends Staffing Licensing Online Shopping HIPAA Authorization e-waste Paste iPhone Hard Drives IT budget Training PowerPoint Millennials Storage SSD Digital Eliminating Downtime Internet Explorer Information Technology Content Filtering Time Management Managing Stress Gadget Telephone System Quick Tips IP Address Emoji Vendor Management Printer Autocorrect HaaS Regulation Avoiding Downtime Customer Service Dark Data Mobile Office Unified Threat Management Scheduling Domains Samsung Managed Service Provider Leadership Current Events DDoS Instagram Windows 10 Money Public Speaking Computer Care Presentation Employer Employee Relationship Net Neutrality Fun Lithium-ion battery Augmented Reality Gaming Console Emergency Freedom of Information Wireless Technology 5G Windows 7 IBM Scalability Hacker Synergy Encryption The Internet of Things Video Games Yahoo Worker IaaS Budget Search Competition Television Customer Relationship Management Credit Cards

Newsletter Sign Up