631-905-9617    Get SUPPORT

Suffolk Computer Consultants Blog

Smartphones Are at the Center of the Internet of Things

Smartphones Are at the Center of the Internet of Things

The Internet of Things can be used to create a lot of opportunity for your organization, but there are considerable risks that your business can’t forget about, no matter how tempting it is to take advantage of them. Even though security remains a prime concern for businesses, it’s clear that the Internet of Things isn’t going anywhere. Therefore, you might as well embrace it, or at least prepare for it.

Taking the Internet of Things to New Heights
Smartphones are a perfect example of a device that quickly grows obsolete after only a couple of years. While this means that there is a lot of opportunity to take advantage of great refurbished devices at a discount, there are a lot of other creative ways to take advantage of smartphones as Internet of Things devices. For example, NASA has been using old smartphones for satellite initiatives since 2009, when the PhoneSat Project began. The costs of launching a satellite can be astounding, and that’s not even considering the process and materials used to create them. Instead of building traditional satellites for orbit, NASA has been working on nano satellites that can be built from components found in smartphones.

This initiative has been met with no surprising amount of success. Version 2.4 of PhoneSat, “CubeSat,” came back to Earth on January 31, 2017 after spending over three years in Earth’s orbit. Compared to full-fledged satellites, the small price tag of $8,000 is a miniscule price to pay for the efficiency.

Bringing the IoT Down to Earth
The Internet of Things has uses that are only limited by the imagination of creative and innovative individuals. Samsung Electronics has built a team dedicated to transforming older Galaxy smartphones and turning them into other kinds of IoT devices. This is called Galaxy Upscaling, and it’s being used to create some really interesting things--including a smart fish tank that can feed a fish with a text message, or a smart pet bowl that can send pictures of hungry pets to their owners every time they eat.

Security Concerns
Security is still a major concern for any IoT device, especially those that access sensitive data. IoT devices in particular are known to have less-than-stellar security features, and you can forget about them being reliably updated by developers. Of course, time will tell if these issues become more than a minor annoyance, so it’s best to stay in the know about any developments regarding the Internet of Things.

What are your thoughts on this matter? Let us know in the comments.

Intro to Your Tech: Plug-In
Your Network is at Threat from the Inside, Too
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, August 17 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Privacy Cloud Cybersecurity Managed IT Services Malware Communications Tech Term Backup Network Security Microsoft Smartphones Hardware Ransomware Passwords Communication Software Hackers Business Management Outsourced IT Hosted Solutions Business Email Small Business Google Alert Android Social Media Productivity Save Money VoIP Wi-Fi Smartphone Computer Data Backup Employer-Employee Relationship Data Recovery Microsoft Office Business Intelligence Applications Router Twitter Internet Government Office IT Services Data Network Apps Data Management Automation Analytics Windows 10 VoIP Cloud Computing Bandwidth Phishing Browser Virtualization Patch Management Settings BDR Vulnerability Innovation User Tips Miscellaneous Data Breach Collaboration Efficiency Blockchain Saving Money Password IT Support Mobile Devices Excel Internet of Things Word Networking Paperless Office IT Support Compliance Cost Management Company Culture How To Politics Remote Monitoring Productivity Law Enforcement Gadgets Wireless Charging Holiday Data Protection Tech Terms Physical Security Managed IT Service Gmail Windows WiFi Cybercrime Website Office 365 Scam Managed IT Services Virtual Assistant Business Continuity Information Battery Retail Wireless Cortana Spam Mobile Device Management Chrome Computers Tip of the week Remote Computing App Access Control Virus Workers VPN Artificial Intelligence Hacking Copy Apple Workplace Tips Antivirus IT budget PowerPoint Hiring/Firing Telecommuting SSD Digital Internet Explorer Multi-Factor Security Conferencing BYOD Managing Stress News Phone System Hard Drive disposal Email Management Sales Education Smart Technology Machine Learning A.I. Work/Life Balance Tech Support Licensing Online Shopping Safety Paste iPhone Plug-In IT Management Sports Managed IT Millennials Inventory Telephone System Cables Edge Threat Botnet Content Filtering SaaS Dongle G Suite Office Tips Marketing Automobile Processors Value Tablet Telecommute Movies Travel Mobile Security Proactive IT Connectivity Staffing Lead Generation Voice over Internet Protocol Laptop Printing Hard Drives Big Data Bring Your Own Device Gadget Spyware Knowledge Reporting Information Technology Data loss Unified Communications Users Live Streaming Operating System Telephone Systems File Sharing Remote Monitoring and Management Network Attached Storage Streaming Media Server Files Telephony Remote Support Paper Dark Web User Tip Printer Server Technology Tips Hybrid Cloud Google Maps Facebook Shortcut HP Database Google Drive Comparison Medical IT Entertainment Biometrics Staff RAM WhatsApp Recovery WannaCry Environment Remote Control User Security Analysis Disaster Recovery Server Management Downloads Voice over IP Hosted Solution Amazon Maintenance Ink Cleaning Printers Backup and Disaster Recovery CrashOverride Document Management Tactics Specifications GDPR Access Websites Microsoft Teams Spotify HIPAA e-waste Spam Blocking Business Technology Managed Service Trends Two-factor Authentication eCommerce Lithium-ion battery Money Computer Care Net Neutrality Augmented Reality Storage Personal Information Employer Employee Relationship Fun Wireless Technology 5G Freedom of Information IBM Gaming Console The Internet of Things Error Hacker Scalability Regulation Budget Competition Yahoo Synergy Encryption Customer Relationship Management Video Games Worker IaaS IP Address Credit Cards Search Mobile Device Television Emoji Vendor Management Customer Service Printer Autocorrect Upgrade HaaS Mobile Office Domains Avoiding Downtime Dark Data Unified Threat Management Scheduling Samsung Windows 10 Current Events Managed Service Provider Public Speaking Leadership DDoS Presentation Instagram Emergency

Newsletter Sign Up