Direct Technology Group Blog

Direct Technology Group provides professional IT Support and Network Services for Businesses around South Florida. Computer Services, Tech Support, IT Solutions and more!

Smartphones Are at the Center of the Internet of Things

The Internet of Things can be used to create a lot of opportunity for your organization, but there are considerable risks that your business can’t forget about, no matter how tempting it is to take advantage of them. Even though security remains a prime concern for businesses, it’s clear that the Internet of Things isn’t going anywhere. Therefore, you might as well embrace it, or at least prepare for it.

Taking the Internet of Things to New Heights
Smartphones are a perfect example of a device that quickly grows obsolete after only a couple of years. While this means that there is a lot of opportunity to take advantage of great refurbished devices at a discount, there are a lot of other creative ways to take advantage of smartphones as Internet of Things devices. For example, NASA has been using old smartphones for satellite initiatives since 2009, when the PhoneSat Project began. The costs of launching a satellite can be astounding, and that’s not even considering the process and materials used to create them. Instead of building traditional satellites for orbit, NASA has been working on nano satellites that can be built from components found in smartphones.

This initiative has been met with no surprising amount of success. Version 2.4 of PhoneSat, “CubeSat,” came back to Earth on January 31, 2017 after spending over three years in Earth’s orbit. Compared to full-fledged satellites, the small price tag of $8,000 is a miniscule price to pay for the efficiency.

Bringing the IoT Down to Earth
The Internet of Things has uses that are only limited by the imagination of creative and innovative individuals. Samsung Electronics has built a team dedicated to transforming older Galaxy smartphones and turning them into other kinds of IoT devices. This is called Galaxy Upscaling, and it’s being used to create some really interesting things--including a smart fish tank that can feed a fish with a text message, or a smart pet bowl that can send pictures of hungry pets to their owners every time they eat.

Security Concerns
Security is still a major concern for any IoT device, especially those that access sensitive data. IoT devices in particular are known to have less-than-stellar security features, and you can forget about them being reliably updated by developers. Of course, time will tell if these issues become more than a minor annoyance, so it’s best to stay in the know about any developments regarding the Internet of Things.

What are your thoughts on this matter? Let us know in the comments.

Intro to Your Tech: Plug-In
Your Network is at Threat from the Inside, Too
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 21 January 2020

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Business Computing Cloud Google Hackers Malware Microsoft Efficiency Network Security Data Innovation User Tips Software Productivity Miscellaneous Email Smartphones Business Backup Mobile Devices Internet communications Hosted Solutions Hardware Computer Workplace Tips Android Productivity Smartphone Communication Windows 10 VoIP Ransomware Business Management Cybersecurity Small Business Social Media Managed IT Services Upgrade Browser Outsourced IT Windows Tech Term Network IT Support Mobile Device Business Continuity Holiday Passwords IT Services Bandwidth Windows 10 Microsoft Office Save Money Employer-Employee Relationship Users Office Collaboration Facebook Apps Managed IT Services Automation Cloud Computing Chrome Internet of Things Data Backup Gadgets IT Support Marketing Gmail Quick Tips Wi-Fi Server Disaster Recovery Wireless Apple Router Mobile Device Management Alert Networking Applications Data Recovery Password Information Mobility Business Intelligence App Computers Managed Service Provider Office Tips VPN Managed Service Health Remote Computing Settings Hacking Virtualization Retail Website Operating System Blockchain Patch Management Office 365 Laptop Physical Security Remote Monitoring Excel Cybercrime Government Phishing Law Enforcement Analytics BYOD Application Access Control iPhone Saving Money Data Management Telephone Systems Social Engineering Bring Your Own Device Biometrics Value Going Green History Twitter Mouse BDR Word Humor Mobile Computing Google Drive Workers Safety Recovery VoIP Paperless Office Entertainment Environment Politics WiFi Managed IT Service Maintenance Compliance Big Data Data Breach Lithium-ion battery Artificial Intelligence Virus Battery Spam Mobile Office Current Events Search Batteries Social Network Human Resources Telephone System Cleaning Hosted Solution Dark Web DDoS Robot Wireless Charging Hard Drives Tech Support IT solutions Printer Tip of the week Payment Cards Customer Relationship Management Risk Management Printer Server Virtual Assistant Customer Service Windows 7 Managing Stress Data Protection Internet Exlporer HIPAA How To Streaming Media Hybrid Cloud Fax Server The Internet of Things Tech Terms Remote Monitoring and Management RAM Cost Management Two-factor Authentication Sports Net Neutrality Information Technology Employee-Employer Relationship Business Technology Vulnerability eWaste Processor Company Culture Scam Healthcare Cortana Smart Technology User Error Telephony G Suite Best Practice Data Security Files Tablet Shortcut Data storage Medical IT End of Support PowerPoint Connectivity Voice over Internet Protocol Monitor Hard Disk Drive Consultant Entrepreneur Staff GDPR Computer Accessories Access Comparison disposal Copy Internet exploMicrosoft Social Networking Eliminating Downtime Online Shopping Downloads Tablets Edge Antivirus Techology instant Messaging Meetings Reputation Video Best Available Websites Storage Cameras Printers Specifications Paste Google Maps Advertising Bitcoin Wireless Internet Distribution Trends Vulnerabilities Amazon Education HaaS Customer OneNote Dongle Error Conferencing Spotify A.I. Distributed Denial of Service Private Cloud Help Desk Fleet Management Lead Generation Cryptocurrency WIndows 7 Memory IT budget Plug-In Unified Threat Management Personal Information Remote Support Shadow IT Flexibility Hiring/Firing Budget Windows Server 2008 R2 Touchscreen Content Filtering Database Cabling Remote Control Movies Windows Media Player Botnet Public Cloud Threats Certification Multi-Factor Authentication IT Management Proactive IT SaaS Legal Staffing Touchpad Spam Blocking Taskbar Programming Technology Tips Microsoft Office 365 User Tip Tactics WannaCry Unified Communications Managed IT Scams Training Holidays Time Management File Sharing Windows XP Email Management SharePoint Relocation National Security Backup and Disaster Recovery Authentication Telecommuting Internet Explorer Hard Drive Encryption PDF Project Management Security Cameras Virtual Private Network Chrome OS Phone System Analyitcs Network Attached Storage Analysis User Security Video Games Updates User SSD Authorization Millennials Threat Hacker Processors Microsoft Teams Licensing Notifications Insurance Wearables Co-Managed IT Black Market Server Management Gadget Webcam Inventory Troubleshooting Printing Science Spyware Travel YouTube Memes Electronic Health Records Machine Learning Worker Alerts Display Bluetooth Mobile Security Update File Management Paper Windows 8 HP Live Streaming NarrowBand IT Downtime Employees Virtual Reality Telecommute Reporting Sales Work/Life Balance Avoiding Downtime Multi-Factor Security Wearable Technology Benchmarks USB Social e-waste Outlook Managed Services Provider Voice over IP Ink Document Management Cables Automobile WhatsApp Wireless Technology E-Commerce Hosted Desktop People Solid State Drive Bloatware Data loss Knowledge Running Cable Recycling Profitability Vendor eCommerce Digital News Uninterrupted Power Supply Chromecast Payment