croom new

Eclipse Integrated Systems Blog

Smartphones Are at the Center of the Internet of Things

Smartphones Are at the Center of the Internet of Things

The Internet of Things can be used to create a lot of opportunity for your organization, but there are considerable risks that your business can’t forget about, no matter how tempting it is to take advantage of them. Even though security remains a prime concern for businesses, it’s clear that the Internet of Things isn’t going anywhere. Therefore, you might as well embrace it, or at least prepare for it.

Taking the Internet of Things to New Heights
Smartphones are a perfect example of a device that quickly grows obsolete after only a couple of years. While this means that there is a lot of opportunity to take advantage of great refurbished devices at a discount, there are a lot of other creative ways to take advantage of smartphones as Internet of Things devices. For example, NASA has been using old smartphones for satellite initiatives since 2009, when the PhoneSat Project began. The costs of launching a satellite can be astounding, and that’s not even considering the process and materials used to create them. Instead of building traditional satellites for orbit, NASA has been working on nano satellites that can be built from components found in smartphones.

This initiative has been met with no surprising amount of success. Version 2.4 of PhoneSat, “CubeSat,” came back to Earth on January 31, 2017 after spending over three years in Earth’s orbit. Compared to full-fledged satellites, the small price tag of $8,000 is a miniscule price to pay for the efficiency.

Bringing the IoT Down to Earth
The Internet of Things has uses that are only limited by the imagination of creative and innovative individuals. Samsung Electronics has built a team dedicated to transforming older Galaxy smartphones and turning them into other kinds of IoT devices. This is called Galaxy Upscaling, and it’s being used to create some really interesting things--including a smart fish tank that can feed a fish with a text message, or a smart pet bowl that can send pictures of hungry pets to their owners every time they eat.

Security Concerns
Security is still a major concern for any IoT device, especially those that access sensitive data. IoT devices in particular are known to have less-than-stellar security features, and you can forget about them being reliably updated by developers. Of course, time will tell if these issues become more than a minor annoyance, so it’s best to stay in the know about any developments regarding the Internet of Things.

What are your thoughts on this matter? Let us know in the comments.

Intro to Your Tech: Plug-In
Your Network is at Threat from the Inside, Too
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, March 21 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Privacy Business Computing Cloud Network Security Google Hackers User Tips Internet Productivity Microsoft Malware Business Management Software Innovation Efficiency Tech Term Hosted Solutions Backup Email Computer Browser Mobile Devices Windows 10 Business Apps Cybersecurity Smartphones Communication Hardware Productivity Managed IT Services Data Smartphone Internet of Things Saving Money Data Recovery Windows Data Backup Collaboration Passwords Small Business Cybercrime Virtualization VoIP Data Security Holiday Workplace Tips Android communications Operating System Users Law Enforcement Microsoft Office Windows 10 Wireless Disaster Recovery Network Ransomware IT Services Mobile Device IT Support Business Continuity Mobility IT Support Chrome Office 365 Cloud Computing Miscellaneous Outsourced IT Phishing Wi-Fi Social Media Server Mobile Device Management Telephone Systems Update BDR Quick Tips Password Money Gadgets Facebook Cost Management Employer-Employee Relationship Application App Health Government Information Technology Vulnerability Upgrade Unsupported Software Best Practice Risk Management Managed IT Services Google Drive Social Networking Current Events Automation Office tips Proactive IT USB Spam Personal Information Artificial Intelligence Antivirus Alert Managed Service Provider Computers Blockchain Information Shortcut Identity Theft Hacking Patch Management Streaming Media Bandwidth Politics Data Management User Error Save Money Marketing Two-factor Authentication Sports Work/Life Balance Managed IT Save Time Excel Company Culture Recovery Storage iPhone Managing Stress HaaS Devices SaaS Commerce BYOD Remote Monitoring and Management Gmail Automobile Computer Care Tech Support Cortana Meetings Access Control Going Green Apple Medical IT Transportation G Suite Mobile Security Internet Exlporer Legal Wireless Technology Wireless Charging Search The Internet of Things Google Docs Analytics eWaste WiFi Office Hosted Solution Fraud Mobile Computing DDoS Managed Service Business Intelligence Data Storage Flexibility Cleaning Connectivity Samsung OneNote Data Protection Encryption VPN Word Router Compliance Social Engineering Applications Maintenance Telephony Humor History Outlook End of Support Battery Training Television Instant Messaging Remote Computing Touchscreen Private Cloud Audit Computing Plug-In Solid State Drive Budget Point of Sale Trends Troubleshooting Settings Teamwork Chrome OS IT Solutions FAQ Internet Explorer Microsoft Office 365 Computer Accessories Augmented Reality Google Maps Project Management Phone System Cables Electronic Medical Records Retail Chromebook Reporting Smart Technology Computer Fan Travel Microsoft Teams Security Cameras Avoiding Downtime Vulnerabilities App store Hacker Hard Disk Drive Chromecast Sync Workers Advertising Wearable Technology A.I. Profitability Video Games Files Charger Threat Data Loss IT budget Music Virus Voice over Internet Protocol Safety Emails Conferencing Reputation Printing WannaCry Tablets Spyware Wearables Unified Threat Management Cryptocurrency Analysis Keyboard Updates Movies Eliminating Downtime Laptop Legislation Webinar WIndows Server 2008 Virtual Reality PowerPoint Authentication Vendor Management Proactive HBO Gifts Black Market Google Assistant GDPR Robot NFL Entertainment Bring Your Own Device Upgrades Paperless Office Identity Adobe Microsoft Word Running Cable Wireless Internet Touchpad Healthcare Comparison IT solutions Trending Data Breach Education Authorization Data storage Microsoft Excel Identities Big Data SharePoint Websites Amazon Credit Cards Value Dark Web Scam Nanotechnology Lithium-ion battery Edge Bluetooth Distributed Denial of Service Hybrid Cloud Consultant Scalability Data Privacy Hiring/Firing iOS Administrator PDF Worker Commute Unified Communications Help Desk E-Commerce Screen Mirroring Specifications Virtual Assistant Windows 10s Evernote Downloads File Sharing Language Books Data Theft Time Management IT Management Error Employer Employee Relationship Root Cause Analysis Windows Ink Ciminal Experience Fax Server Managed IT Service How To Hard Drive Benefits Access Licensing Device Security Text Messaging RAM Certification Uninterrupted Power Supply Operating Sysytem Payment Cast Sales Cache Remote Monitoring CrashOverride Emergency Monitors Disaster Windows 7 Worker Printers Relocation Twitter Regulation

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      Latest News

      Eclipse Integrated Systems launches new website!

      Eclipse Integrated Systems is proud to announce the launch of our new website at www.eisystems.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

      Read more ...

      Account login