Direct Technology Group Blog

Direct Technology Group provides professional IT Support and Network Services for Businesses around South Florida. Computer Services, Tech Support, IT Solutions and more!

Smartphones Are at the Center of the Internet of Things

The Internet of Things can be used to create a lot of opportunity for your organization, but there are considerable risks that your business can’t forget about, no matter how tempting it is to take advantage of them. Even though security remains a prime concern for businesses, it’s clear that the Internet of Things isn’t going anywhere. Therefore, you might as well embrace it, or at least prepare for it.

Taking the Internet of Things to New Heights
Smartphones are a perfect example of a device that quickly grows obsolete after only a couple of years. While this means that there is a lot of opportunity to take advantage of great refurbished devices at a discount, there are a lot of other creative ways to take advantage of smartphones as Internet of Things devices. For example, NASA has been using old smartphones for satellite initiatives since 2009, when the PhoneSat Project began. The costs of launching a satellite can be astounding, and that’s not even considering the process and materials used to create them. Instead of building traditional satellites for orbit, NASA has been working on nano satellites that can be built from components found in smartphones.

This initiative has been met with no surprising amount of success. Version 2.4 of PhoneSat, “CubeSat,” came back to Earth on January 31, 2017 after spending over three years in Earth’s orbit. Compared to full-fledged satellites, the small price tag of $8,000 is a miniscule price to pay for the efficiency.

Bringing the IoT Down to Earth
The Internet of Things has uses that are only limited by the imagination of creative and innovative individuals. Samsung Electronics has built a team dedicated to transforming older Galaxy smartphones and turning them into other kinds of IoT devices. This is called Galaxy Upscaling, and it’s being used to create some really interesting things--including a smart fish tank that can feed a fish with a text message, or a smart pet bowl that can send pictures of hungry pets to their owners every time they eat.

Security Concerns
Security is still a major concern for any IoT device, especially those that access sensitive data. IoT devices in particular are known to have less-than-stellar security features, and you can forget about them being reliably updated by developers. Of course, time will tell if these issues become more than a minor annoyance, so it’s best to stay in the know about any developments regarding the Internet of Things.

What are your thoughts on this matter? Let us know in the comments.

Intro to Your Tech: Plug-In
Your Network is at Threat from the Inside, Too


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, 13 August 2020

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Business Computing Cloud Efficiency Productivity Network Security Hackers Google Malware Microsoft Data Innovation Business Software Smartphones User Tips Hardware Email Hosted Solutions Miscellaneous Communication Backup communications Workplace Tips Computer Mobile Devices Internet Small Business Android IT Support VoIP Smartphone Productivity Business Management Ransomware Cybersecurity Outsourced IT Upgrade Mobile Device Windows 10 Windows Managed IT Services Social Media Collaboration Browser Network Users Tech Term Passwords Microsoft Office Automation IT Services Windows 10 Bandwidth Save Money Apps Business Continuity Employer-Employee Relationship Holiday Cloud Computing Facebook Phishing Quick Tips Managed IT Services Office Data Backup Marketing Chrome Gadgets Internet of Things IT Support Disaster Recovery Managed Service Wireless Data Recovery Saving Money Mobile Device Management Wi-Fi Networking Gmail Server Applications Apple Health Information Router Alert Password Office 365 Managed Service Provider Computers Access Control App Office Tips Hacking Virtualization VPN Business Intelligence Remote Computing Settings Data Breach Mobility Retail Going Green Remote Monitoring Twitter Laptop Analytics Physical Security BYOD Recovery Application Excel Cybercrime Government Blockchain Patch Management Law Enforcement Website Covid-19 BDR Data Management Operating System iPhone Remote Work Bring Your Own Device History Mouse Managed IT Service Entertainment WiFi Compliance Big Data Google Drive Workers Safety Environment Virus Maintenance Paperless Office Voice over Internet Protocol Politics Conferencing Social Engineering Lithium-ion battery Value Word Printer Spam Artificial Intelligence Battery Telephone Systems Humor Mobile Computing VoIP Biometrics Tech Support IT solutions Hard Drives Search Remote Monitoring and Management Business Technology Vulnerability Customer Relationship Management Hosted Solution Social Network Shadow IT RAM Education Cortana Risk Management Telephony Customer Service Internet Exlporer Employee-Employer Relationship Streaming Media Fax Server Processor Company Culture The Internet of Things Healthcare Two-factor Authentication HIPAA G Suite Hybrid Cloud Data Security Sports Telephone System Cost Management Net Neutrality Medical IT eWaste Wireless Charging PowerPoint Dark Web Connectivity Information Technology User Error Best Practice Tip of the week Batteries Virtual Reality Scam Content Filtering Virtual Assistant Shortcut Tablet Smart Technology Data Protection How To Payment Cards Files Tech Terms Mobile Office Printer Server Human Resources Data storage Cleaning End of Support Managing Stress Meetings Windows 7 Robot Current Events DDoS Internet exploMicrosoft Processors Licensing Scams Training Firewall Unified Communications Antivirus PCI DSS Techology Server Management Gadget Time Management National Security Printers Authentication Internet Explorer Inventory Reputation Distributed Denial of Service Advertising Spyware Travel Budget Project Management Memory Security Cameras Google Maps Profiles Chrome OS Regulations Compliance Analysis HaaS Machine Learning Phone System Updates Authorization Spotify Distribution Threat Mobile Security Customer User Microsoft Teams Private Cloud HP Live Streaming Insurance Wearables Computer Repair Programming Personal Information Flexibility Telecommute Sales Voice over IP Multi-Factor Security Troubleshooting Cabling Fleet Management Printing e-waste Public Cloud Document Management WhatsApp Botnet IT Service Electronic Health Records SaaS Legal Data loss Touchpad Knowledge SharePoint eCommerce Encryption Display Update Multi-Factor Authentication Paper Bluetooth Digital News Analyitcs Managed IT Mobile Copy Employees Reporting Staff Comparison Online Shopping Notifications Benchmarks Hacker Outlook Windows XP Holidays Ink Relocation USB Cables PDF Edge E-Commerce Remote Paste Solid State Drive Video Games Websites Specifications Recycling Science Profitability Virtual Private Network Payment Remote Workers Hard Disk Drive GDPR disposal Dongle Black Market Consultant Computer Accessories Lead Generation Windows 8 Eliminating Downtime Webcam Co-Managed IT Downloads IT budget YouTube Remote Support Hiring/Firing instant Messaging Cameras Remote Control Social Video Worker Storage Alerts Best Available Wearable Technology Bitcoin Wireless Internet Memes Trends Management Amazon IT Management NarrowBand People Staffing Bloatware Vulnerabilities Spam Blocking OneNote Error Work/Life Balance File Management Technology Tips Downtime User Tip Running Cable WannaCry Uninterrupted Power Supply Help Desk Avoiding Downtime IT A.I. Remote Working Plug-In Wireless Technology WIndows 7 File Sharing Unified Threat Management Entrepreneur Cryptocurrency Automobile Email Management Social Networking Windows Server 2008 R2 Touchscreen Managed Services Provider Database Backup and Disaster Recovery Telecommuting Hard Drive Threats Windows Media Player Tablets Certification Hosted Desktop Movies Proactive IT Network Attached Storage Chromecast User Security Taskbar Access Microsoft Office 365 Vendor Tactics SSD Monitor Millennials