croom new

Eclipse Integrated Systems Blog

Smartphones Are at the Center of the Internet of Things

Smartphones Are at the Center of the Internet of Things

The Internet of Things can be used to create a lot of opportunity for your organization, but there are considerable risks that your business can’t forget about, no matter how tempting it is to take advantage of them. Even though security remains a prime concern for businesses, it’s clear that the Internet of Things isn’t going anywhere. Therefore, you might as well embrace it, or at least prepare for it.

Taking the Internet of Things to New Heights
Smartphones are a perfect example of a device that quickly grows obsolete after only a couple of years. While this means that there is a lot of opportunity to take advantage of great refurbished devices at a discount, there are a lot of other creative ways to take advantage of smartphones as Internet of Things devices. For example, NASA has been using old smartphones for satellite initiatives since 2009, when the PhoneSat Project began. The costs of launching a satellite can be astounding, and that’s not even considering the process and materials used to create them. Instead of building traditional satellites for orbit, NASA has been working on nano satellites that can be built from components found in smartphones.

This initiative has been met with no surprising amount of success. Version 2.4 of PhoneSat, “CubeSat,” came back to Earth on January 31, 2017 after spending over three years in Earth’s orbit. Compared to full-fledged satellites, the small price tag of $8,000 is a miniscule price to pay for the efficiency.

Bringing the IoT Down to Earth
The Internet of Things has uses that are only limited by the imagination of creative and innovative individuals. Samsung Electronics has built a team dedicated to transforming older Galaxy smartphones and turning them into other kinds of IoT devices. This is called Galaxy Upscaling, and it’s being used to create some really interesting things--including a smart fish tank that can feed a fish with a text message, or a smart pet bowl that can send pictures of hungry pets to their owners every time they eat.

Security Concerns
Security is still a major concern for any IoT device, especially those that access sensitive data. IoT devices in particular are known to have less-than-stellar security features, and you can forget about them being reliably updated by developers. Of course, time will tell if these issues become more than a minor annoyance, so it’s best to stay in the know about any developments regarding the Internet of Things.

What are your thoughts on this matter? Let us know in the comments.

Intro to Your Tech: Plug-In
Your Network is at Threat from the Inside, Too
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, December 17 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Privacy Business Computing Cloud Network Security Internet Google Hackers User Tips Business Management Software Malware Microsoft Productivity Tech Term Hosted Solutions Innovation Computer Efficiency Backup Windows 10 Browser Email Business Cybersecurity Apps Managed IT Services Productivity Mobile Devices Data Backup Data Recovery Saving Money Smartphones Windows Communication Small Business Virtualization Cybercrime Internet of Things Smartphone VoIP Hardware Collaboration Disaster Recovery IT Support Passwords Business Continuity Android Workplace Tips Operating System communications Law Enforcement Microsoft Office Network Ransomware IT Services Data Security Miscellaneous Mobile Device Holiday IT Support Users Wireless Cloud Computing Money Mobility Outsourced IT Data Gadgets Phishing Chrome Wi-Fi Server Office 365 BDR Social Media Windows 10 Update Mobile Device Management Telephone Systems Quick Tips Unsupported Software Vulnerability Password Upgrade Best Practice Google Drive Risk Management Social Application Cost Management Information Technology App Employer-Employee Relationship Health Government Identity Theft Hacking Shortcut Proactive IT Politics Data Management Streaming Media Blockchain Information Managed IT Services Bandwidth Save Money Sports User Error Patch Management Work/Life Balance Managed IT Marketing Facebook Office tips Current Events Automation Two-factor Authentication Spam USB Networking Artificial Intelligence Antivirus Alert Managed Service Provider Computers eWaste Flexibility Samsung OneNote WiFi Cleaning Mobile Computing DDoS VPN Router Encryption Mobile Security Wireless Charging Telephony Humor Google Docs History Social Engineering Fraud End of Support Battery Remote Computing Business Intelligence Touchscreen Data Storage Managed Service Television Connectivity Private Cloud Audit Company Culture Recovery Save Time Data Protection Applications Maintenance HaaS iPhone Managing Stress Compliance Outlook SaaS Commerce Automobile Computer Care Tech Support Gmail Personal Information Transportation Excel Meetings Storage Going Green Internet Exlporer Legal The Internet of Things Devices Apple Analytics Wireless Technology BYOD Search Hosted Solution Cortana Remote Monitoring and Management Office Charger Threat Access Control Touchpad Data Loss IT budget Virus Voice over Internet Protocol Printing Medical IT Data storage Tablets Spyware Big Data G Suite IT solutions Trending Conferencing Education Nanotechnology Lithium-ion battery Updates Movies Eliminating Downtime Consultant Legislation Running Cable Analysis Scam WIndows Server 2008 SharePoint PDF Worker Commute PowerPoint Authentication Scalability Proactive Hiring/Firing iOS Administrator Google Assistant GDPR Training NFL Books Bring Your Own Device Windows 10s HBO Gifts Bluetooth Distributed Denial of Service Employer Employee Relationship Root Cause Analysis Adobe Microsoft Word Experience Wireless Internet Comparison Instant Messaging Identity Data Breach Text Messaging Authorization Uninterrupted Power Supply Operating Sysytem Microsoft Excel Identities How To Websites Amazon Benefits Access Point of Sale Value Dark Web Settings Word Edge Hybrid Cloud Solid State Drive Budget Credit Cards Fax Server Computer Accessories Augmented Reality Phone System Unified Communications Help Desk Electronic Medical Records Screen Mirroring Specifications Data Privacy Evernote Teamwork Downloads Avoiding Downtime File Sharing Language Data Theft Virtual Assistant Smart Technology Computer Fan Advertising Error Windows Ink Ciminal Video Games Managed IT Service Hacker Hard Disk Drive Chromecast IT Management Licensing Device Security Music RAM Certification Safety Emails Files Cast Sales Hard Drive Trends Troubleshooting Unified Threat Management Wearable Technology Reputation Computing Plug-In WannaCry Internet Explorer Microsoft Office 365 Laptop Google Maps Project Management Cables Keyboard IT Solutions FAQ Chromebook Reporting Vendor Management Travel Microsoft Teams Webinar Retail Virtual Reality Robot Sync Workers Entertainment A.I. Profitability Upgrades Black Market App store Worker Relocation Printers Twitter Cache Regulation Remote Monitoring CrashOverride Emergency Disaster Monitors

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *

      Latest News

      Eclipse Integrated Systems launches new website!

      Eclipse Integrated Systems is proud to announce the launch of our new website at www.eisystems.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

      Read more ...

      Account login