631-905-9617    Get SUPPORT

Suffolk Computer Consultants Blog

Smartphones Are at the Center of the Internet of Things

Smartphones Are at the Center of the Internet of Things

The Internet of Things can be used to create a lot of opportunity for your organization, but there are considerable risks that your business can’t forget about, no matter how tempting it is to take advantage of them. Even though security remains a prime concern for businesses, it’s clear that the Internet of Things isn’t going anywhere. Therefore, you might as well embrace it, or at least prepare for it.

Taking the Internet of Things to New Heights
Smartphones are a perfect example of a device that quickly grows obsolete after only a couple of years. While this means that there is a lot of opportunity to take advantage of great refurbished devices at a discount, there are a lot of other creative ways to take advantage of smartphones as Internet of Things devices. For example, NASA has been using old smartphones for satellite initiatives since 2009, when the PhoneSat Project began. The costs of launching a satellite can be astounding, and that’s not even considering the process and materials used to create them. Instead of building traditional satellites for orbit, NASA has been working on nano satellites that can be built from components found in smartphones.

This initiative has been met with no surprising amount of success. Version 2.4 of PhoneSat, “CubeSat,” came back to Earth on January 31, 2017 after spending over three years in Earth’s orbit. Compared to full-fledged satellites, the small price tag of $8,000 is a miniscule price to pay for the efficiency.

Bringing the IoT Down to Earth
The Internet of Things has uses that are only limited by the imagination of creative and innovative individuals. Samsung Electronics has built a team dedicated to transforming older Galaxy smartphones and turning them into other kinds of IoT devices. This is called Galaxy Upscaling, and it’s being used to create some really interesting things--including a smart fish tank that can feed a fish with a text message, or a smart pet bowl that can send pictures of hungry pets to their owners every time they eat.

Security Concerns
Security is still a major concern for any IoT device, especially those that access sensitive data. IoT devices in particular are known to have less-than-stellar security features, and you can forget about them being reliably updated by developers. Of course, time will tell if these issues become more than a minor annoyance, so it’s best to stay in the know about any developments regarding the Internet of Things.

What are your thoughts on this matter? Let us know in the comments.

Intro to Your Tech: Plug-In
Your Network is at Threat from the Inside, Too


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, December 19 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Cloud Privacy Cybersecurity Network Security User Tips Managed IT Services Malware Tech Term Communications Microsoft Backup Productivity Smartphones Internet Communication Business Hardware Email Business Management Passwords Google Software Hackers Outsourced IT Browser Hosted Solutions Efficiency Ransomware Data Backup VoIP Wi-Fi Data Recovery Small Business Android Social Media Smartphone IT Services Windows 10 Cloud Computing Alert Applications Mobile Device Microsoft Office Save Money IT Support Saving Money Internet of Things Mobile Devices Network Employer-Employee Relationship Computer Bandwidth Data Business Intelligence Apps Router Managed IT Services Collaboration Users Innovation Miscellaneous Twitter Blockchain Workplace Tips Access Control Excel Wireless Government Office Automation Data Management Analytics Phishing Networking VoIP Virtualization Holiday Settings Information Patch Management Marketing Vulnerability Business Continuity Gadgets Data Breach Password BDR Tip of the week Remote Computing Chrome App Hacking Workers Virus VPN Spam Compliance Computers BYOD Word Paperless Office Mobile Device Management Cost Management IT Support Artificial Intelligence Company Culture How To Politics Remote Monitoring Law Enforcement Wireless Charging Windows Physical Security Managed IT Service WiFi Cybercrime Remote Monitoring and Management Data Protection Gmail Productivity Scam Tech Terms Connectivity Dark Web Battery Website Office 365 Cortana Retail Virtual Assistant Managed Service Paper Access Authorization Upgrade Spotify Technology Tips Hybrid Cloud CrashOverride Hosted Solution Storage Specifications Staff RAM HP Database Spam Blocking Business Technology Hiring/Firing Server Management Downloads Eliminating Downtime eCommerce WannaCry Environment Antivirus Ink Telecommuting Backup and Disaster Recovery Plug-In Copy Apple Education Smart Technology Error Multi-Factor Security Conferencing Work/Life Balance Websites Microsoft Teams Phone System Cables News Document Management Tactics Email Management Sales Managed IT Trends Wireless Internet Licensing Online Shopping Two-factor Authentication HIPAA e-waste Botnet IT budget PowerPoint SaaS Troubleshooting Millennials Office Tips Automobile SSD Proactive IT Paste iPhone Touchscreen Content Filtering Managing Stress Voice over Internet Protocol Telephone System Digital Internet Explorer Reporting Tablet Machine Learning A.I. Staffing Help Desk Travel Tech Support Hard Drive disposal Safety Hard Drives IT Management Sports Update Inventory Edge Threat Information Technology Microsoft Office 365 Dongle G Suite Gadget Medical IT Knowledge Server Telecommute Movies Certification Live Streaming Processors Value Printer Server Outlook Files Telephony Google Maps Lead Generation Mobile Security Analysis Telephone Systems File Sharing Laptop Printing Entertainment Biometrics Authentication User Tip Big Data Bring Your Own Device Facebook Shortcut Amazon Remote Support GDPR Google Drive Comparison Data loss Unified Communications Recovery Mobility WhatsApp Spyware Disaster Recovery Remote Control User Security Network Attached Storage Streaming Media Cleaning Printers Profitability Voice over IP Operating System Maintenance Leadership Current Events Mobile Office Managed Service Provider Domains Instagram DDoS Money Computer Care Emergency Personal Information Quick Tips Windows 10 Employer Employee Relationship Net Neutrality Public Speaking Fun Regulation Presentation Gaming Console Freedom of Information Lithium-ion battery Augmented Reality Scalability Wireless Technology 5G Encryption Video Games Yahoo Synergy IaaS IBM Worker Television The Internet of Things Credit Cards Hacker Search Vendor Management Budget Emoji Competition Autocorrect HaaS Customer Relationship Management Printer Avoiding Downtime IP Address Scheduling Dark Data Unified Threat Management Customer Service Samsung

Newsletter Sign Up