facebook linkedin twitter

Tip of the Week: Don’t Let Your Old Android Device go to Waste

Tip of the Week: Don’t Let Your Old Android Device go to Waste

Unless you’re the trade-in or hand-me-down kind of person, it’s likely that you have a supply of old Android devices squirrelled away somewhere. You know, just in case the one who have now breaks. However, these old devices can be useful in other ways around the office. For this week’s tip, we’ll go over three alternate uses for your mobile device in the office.

Portable Trackpad
There are assorted applications available that allow you to link your old phone to your computer and use it as an alternative controller to your mouse. These apps often offer specialized features that give you better control over media playback and other useful workplace utilities.

Just be sure to install whatever app you select from the Google Play store, as it is the safest option out there for downloading apps. However, you should also make sure that your IT department signs off on you adding these apps to devices used for work.

Universal Remote
If you happen to use smart devices in your office, your old phone could become a central control hub for them. Download the necessary apps from the Google Play store, and in no time, you’ll be able to control any of the gadgets you have installed around your office with a dedicated remote, eliminating the need for the bulky included remotes that accompany many of these devices, as well as the need to take up space on your current mobile phone.

Security Camera
Similarly to using your old device as a universal remote, you can find apps on Google Play that can turn it into a security camera with a few different features. By doing so, you can boost your office’s security with the option to check in on goings-on via a web browser, record the footage, and even have the camera activate when motion is detected.

Bonus Purpose: Donate the Phone to BOINC
The Berkeley Open Infrastructure for Network Computing, or BOINC, allows you to donate the computing resources of your old phone to assist research teams in their efforts towards scientific breakthroughs. So far, resources dedicated to BOINC have powered research into the climate, molecular dynamics, genetic sequencing, measured the efficacy of malaria treatments and the power of earthquakes, as well as many other scientific causes.

To participate, all you have to do is download the BOINC app from the Google Play Store and select what research you want to commit your phone’s resources to. The app will only run if your device is both charged and plugged in, as so not to leave you with a drained phone, and can be set to only transmit data over Wi-Fi, saving your data.

What other uses have you come up with for your old Android devices? Let us know in the comments, and make sure to subscribe to our blog!

Looking at the Landscape of Email Fraud
Scam Leverages Email from a Reluctant Contract Kil...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, October 23, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Software Business Computing Hackers Microsoft Managed Service Provider Backup Workplace Tips Productivity Data Hardware Business Saving Money Email Malware Network Security IT Services IT Support Hosted Solutions Efficiency Google Small Business Computer Smartphones User Tips Gadgets Quick Tips Business Continuity Mobile Devices Disaster Recovery Innovation Mobile Office Virtualization Network Android Microsoft Office Social Media Server Mobile Device Management VoIP Smartphone Collaboration Communication Miscellaneous Upgrade Ransomware Windows 10 Unified Threat Management Data Backup Windows Data Recovery IT Support Passwords Tech Term Operating System Remote Monitoring BYOD Remote Computing Productivity Managed IT services Holiday Vendor Management Mobile Computing Apps Facebook WiFi communications Cybersecurity BDR Marketing The Internet of Things Analytics Firewall History Automation Users Apple Phishing Managed IT Services Outsourced IT Internet of Things Alert Mobile Device Data Management App Browser Save Money Artificial Intelligence IT Consultant Big data Antivirus Spam Gmail Maintenance Bandwidth Content Filtering Going Green Health Office Encryption Bring Your Own Device Wireless Technology Budget Search Windows 8 Outlook Two-factor Authentication Hiring/Firing Hard Drives Printer Virus Tech Support Cybercrime Best Practice Information Technology Managed IT Lithium-ion Battery Cost Management Office 365 Help Desk Business Technology Money Document Management Cloud Computing Recovery Computers Employer-Employee Relationship Saving Time VPN Travel IBM Hacking Training Update Phone System It Management Hard Drive Regulations Save Time Administration Customer Service SaaS Running Cable Website Proactive IT Humor Government Windows 10 Law Enforcement Compliance Intranet Data storage Education Access Control Risk Management Legal Networking Data Security Business Intelligence User Digital Payment Downtime Paperless Office Mobility Patch Management Blockchain Data Loss Social Engineering Applications Fax Server Sports Computing Disaster Wireless Comparison Tablet End of Support Company Culture Hosted Solution DDoS Avoiding Downtime Computer Repair Data Breach Robot iPhone Securty Social Networking Project Management Word Solid State Drive Excel Twitter Machine Learning Flexibility Telephone Systems Black Market Password Cortana Customer Relationship Management Information Hacker Laptop Augmented Reality PowerPoint Current Events Business Growth File Sharing Text Messaging Data Protection Vendor Presentation Chrome Webcam Office Tips Google Maps YouTube Virtual Desktop Virtual Reality Router Specifications Safety Politics Automobile Unified Communications Settings Computer Accessories Emails Lifestyle Social Scam Chromebook Documents Heating/Cooling Computing Infrastructure Hack Inbound Marketing Entertainment Trending Managed Service Redundancy How To Conferencing Storage Mouse IT service Download Private Cloud Programming Digital Statistics Pain Points Network Congestion Monitoring Retail Telephony Websites Start Menu Tech Terms Bluetooth Taxes eWaste Value Distributed Denial of Service Mobile Technology Streaming Media Management Cryptocurrency Software as a Service Uninterrupted Power Supply Google Docs Public Cloud Vulnerabilities Experience Processors Gaming Console USB Identity Theft Healthcare Co-managed IT Cleaning Net Neutrality Bitcoin User Error Monitors GPS Nanotechnology Social Network Webinar Advertising Flash IP Address Device Management Notifications CCTV Desktop Finance Windows 7 CIO Windows XP Application Business Metrics Content Management Computer Malfunction External Harddrive Business Cards Service Level Agreement cache Television Staffing Google Wallet Human Resources Reliable Computing Business Managemenet Startup Asset Tracking Displays In Internet of Things Unified Threat Management Backup and Disaster Recovery WannaCry Downloads Browsers Society Username 3D Ebay Screen Reader Customer Resource management Corporate Profile User Tip online Currency Thin CLient Gamification Time Management Freedom of Information Micrsooft Digital Signature Motion Sickness Smart Phones Piracy Upload Assessment SharePoint Drones Scalability Smart Tech Distribution Best Practives Teamwork Fiber-Optic Database Google Calendar Data Analysis Messenger LinkedIn Tracking HTML Tip of the week Adminstration Pirating Information Telephone System VoIP Permissions Language Rental Service Meetings Leadership Mobile Security Touchscreen News Cost Knowledge Archive Web Server Software License Trends Consultation Evernote Microserver PDF Skype Cabling Multi-Factor Security switches Writing Best Available Keyboard Wi-Fi Administrator Fraud Tactics Technology Tips Music Books Workers Devices Virtual Assistant Point of Contact Audit Proxy Server Domains Supercomputer UTM Content Fake News Get More Done Upgrades Legislation Error Electronic Medical Records Printer Server LiFi Public Speaking Microchip IT Plan Enterprise Resource Planning Data Warehousing Turn Key Worker Hard Drive Disposal Trojan Shortcut email scam Addiction Access Reading Samsung Upselling Accountants A.I. Emergency Entrepreneur G Suite Analytic Video Surveillance Computer Care Dark Web Organize Work/Life Balance Troubleshooting Recycling Employer Employee Relationship Multi-factor Authentication Microsoft Excel Deep Learning Wireless Headphones Telephone Health IT Visible Light Communication Memory HIPAA Hacks Physical Security Saving ZTime Migration Connected Devices Google Drive Windows Server 2008 Environment Product Reviews Licensing Vulnerability IT consulting Competition Banking Botnet Read Network Management Spyware Mobile Payment Electronic Payment Relocation Tablets Equifax Fleet Tracking Sync Debate Electricity Printing Bookmark Business Owner Harddrive Device security MSP CrashOverride Printers Managing Stress Fileless Malware Regulation Capital Productuvuty 3D Printing

toner1