631-905-9617    Get SUPPORT

Suffolk Computer Consultants Blog

Smartphones Are at the Center of the Internet of Things

Smartphones Are at the Center of the Internet of Things

The Internet of Things can be used to create a lot of opportunity for your organization, but there are considerable risks that your business can’t forget about, no matter how tempting it is to take advantage of them. Even though security remains a prime concern for businesses, it’s clear that the Internet of Things isn’t going anywhere. Therefore, you might as well embrace it, or at least prepare for it.

Taking the Internet of Things to New Heights
Smartphones are a perfect example of a device that quickly grows obsolete after only a couple of years. While this means that there is a lot of opportunity to take advantage of great refurbished devices at a discount, there are a lot of other creative ways to take advantage of smartphones as Internet of Things devices. For example, NASA has been using old smartphones for satellite initiatives since 2009, when the PhoneSat Project began. The costs of launching a satellite can be astounding, and that’s not even considering the process and materials used to create them. Instead of building traditional satellites for orbit, NASA has been working on nano satellites that can be built from components found in smartphones.

This initiative has been met with no surprising amount of success. Version 2.4 of PhoneSat, “CubeSat,” came back to Earth on January 31, 2017 after spending over three years in Earth’s orbit. Compared to full-fledged satellites, the small price tag of $8,000 is a miniscule price to pay for the efficiency.

Bringing the IoT Down to Earth
The Internet of Things has uses that are only limited by the imagination of creative and innovative individuals. Samsung Electronics has built a team dedicated to transforming older Galaxy smartphones and turning them into other kinds of IoT devices. This is called Galaxy Upscaling, and it’s being used to create some really interesting things--including a smart fish tank that can feed a fish with a text message, or a smart pet bowl that can send pictures of hungry pets to their owners every time they eat.

Security Concerns
Security is still a major concern for any IoT device, especially those that access sensitive data. IoT devices in particular are known to have less-than-stellar security features, and you can forget about them being reliably updated by developers. Of course, time will tell if these issues become more than a minor annoyance, so it’s best to stay in the know about any developments regarding the Internet of Things.

What are your thoughts on this matter? Let us know in the comments.

Intro to Your Tech: Plug-In
Your Network is at Threat from the Inside, Too
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, October 19 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Business Computing Technology Best Practices Cloud Privacy Cybersecurity Network Security Managed IT Services Malware Tech Term Communications Microsoft Backup Productivity Smartphones Passwords Communication Hackers Hardware Hosted Solutions Email Small Business Software Browser Efficiency User Tips Business Management Google Business Ransomware Android Outsourced IT Internet VoIP Alert Save Money Social Media Wi-Fi Computer Collaboration Data Bandwidth Twitter Smartphone Microsoft Office Data Backup Innovation Employer-Employee Relationship Miscellaneous Data Recovery Windows 10 Saving Money Cloud Computing Business Intelligence Router Applications Blockchain Password Analytics VoIP IT Support Apps Access Control Data Breach Government Gadgets Managed IT Services IT Services Users Data Management Phishing Internet of Things Excel Virtualization Office Settings BDR Patch Management Mobile Device Mobile Devices Network Vulnerability Workplace Tips Automation Dark Web Battery Politics Compliance Cortana Computers Tip of the week Remote Computing Windows Chrome App Hacking Productivity Virus Marketing Artificial Intelligence Business Continuity Word Paperless Office Cost Management Networking IT Support Retail Website Office 365 How To Remote Monitoring Information Law Enforcement VPN Wireless Charging Holiday Workers Tech Terms Physical Security Managed IT Service WiFi Cybercrime Spam Data Protection Wireless Gmail Scam Mobile Device Management Company Culture Virtual Assistant Paper User Tip SaaS Storage Technology Tips Hybrid Cloud Remote Support Staff RAM WhatsApp HP Database Google Drive Comparison Plug-In Server Management Downloads Voice over IP Tech Support Staffing WannaCry Environment Remote Control User Security Ink Spotify Error Backup and Disaster Recovery Hosted Solution Safety Cables Information Technology Websites Microsoft Teams Gadget Document Management Tactics Specifications Proactive IT Trends eCommerce Troubleshooting HIPAA e-waste Spam Blocking Business Technology Hiring/Firing IT budget PowerPoint Telecommuting Printer Server Touchscreen SSD Copy Apple Voice over Internet Protocol Conferencing Work/Life Balance Big Data Entertainment Biometrics Reporting Managing Stress News Facebook Shortcut Digital Internet Explorer Multi-Factor Security Disaster Recovery Remote Monitoring and Management Machine Learning A.I. Licensing Online Shopping Recovery Update Hard Drive disposal Email Management Sales Managed IT IT Management Sports Millennials Office Tips Automobile Cleaning Printers Microsoft Office 365 Inventory Paste iPhone Botnet Maintenance Content Filtering Access Medical IT Dongle G Suite Telephone System CrashOverride Edge Threat Analysis Telecommute Movies Travel Outlook Processors Value Tablet Amazon Connectivity Authentication Lead Generation Mobile Security Hard Drives Antivirus BYOD GDPR Bring Your Own Device Laptop Printing Education Smart Technology Managed Service Data loss Unified Communications Live Streaming Phone System Spyware Knowledge Server Network Attached Storage Streaming Media Files Telephony Google Maps Two-factor Authentication Authorization Operating System Telephone Systems File Sharing Avoiding Downtime Lithium-ion battery Scheduling Augmented Reality Dark Data Scalability Synergy Samsung Video Games Quick Tips Wireless Technology 5G IBM IaaS Managed Service Provider Worker Instagram The Internet of Things Television Regulation DDoS Hacker Credit Cards Emoji Emergency Budget Money Employer Employee Relationship Customer Relationship Management HaaS Competition Printer Fun IP Address Unified Threat Management Freedom of Information Customer Service Upgrade Leadership Mobile Office Current Events Yahoo Encryption Domains Computer Care Windows 10 Personal Information Search Net Neutrality Vendor Management Public Speaking Gaming Console Autocorrect Presentation

Newsletter Sign Up