Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Don’t Let Your Old Android Device go to Waste

Tip of the Week: Don’t Let Your Old Android Device go to Waste

Unless you’re the trade-in or hand-me-down kind of person, it’s likely that you have a supply of old Android devices squirrelled away somewhere. You know, just in case the one who have now breaks. However, these old devices can be useful in other ways around the office. For this week’s tip, we’ll go over three alternate uses for your mobile device in the office.

Portable Trackpad
There are assorted applications available that allow you to link your old phone to your computer and use it as an alternative controller to your mouse. These apps often offer specialized features that give you better control over media playback and other useful workplace utilities.

Just be sure to install whatever app you select from the Google Play store, as it is the safest option out there for downloading apps. However, you should also make sure that your IT department signs off on you adding these apps to devices used for work.

Universal Remote
If you happen to use smart devices in your office, your old phone could become a central control hub for them. Download the necessary apps from the Google Play store, and in no time, you’ll be able to control any of the gadgets you have installed around your office with a dedicated remote, eliminating the need for the bulky included remotes that accompany many of these devices, as well as the need to take up space on your current mobile phone.

Security Camera
Similarly to using your old device as a universal remote, you can find apps on Google Play that can turn it into a security camera with a few different features. By doing so, you can boost your office’s security with the option to check in on goings-on via a web browser, record the footage, and even have the camera activate when motion is detected.

Bonus Purpose: Donate the Phone to BOINC
The Berkeley Open Infrastructure for Network Computing, or BOINC, allows you to donate the computing resources of your old phone to assist research teams in their efforts towards scientific breakthroughs. So far, resources dedicated to BOINC have powered research into the climate, molecular dynamics, genetic sequencing, measured the efficacy of malaria treatments and the power of earthquakes, as well as many other scientific causes.

To participate, all you have to do is download the BOINC app from the Google Play Store and select what research you want to commit your phone’s resources to. The app will only run if your device is both charged and plugged in, as so not to leave you with a drained phone, and can be set to only transmit data over Wi-Fi, saving your data.

What other uses have you come up with for your old Android devices? Let us know in the comments, and make sure to subscribe to our blog!

Looking at the Landscape of Email Fraud
Scam Leverages Email from a Reluctant Contract Kil...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 21 April 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Microsoft Software Business Computing Hackers Backup Managed Service Provider Productivity Workplace Tips Data Hardware Saving Money Business Malware Email IT Support IT Services Hosted Solutions Network Security Google Small Business Efficiency Smartphones Gadgets Quick Tips Mobile Devices User Tips Business Continuity Computer Disaster Recovery Virtualization Mobile Office Network Microsoft Office Server VoIP Social Media Smartphone Mobile Device Management Android Windows 10 Miscellaneous Upgrade Innovation Windows Ransomware Unified Threat Management Remote Monitoring Passwords Holiday Operating System Remote Computing Mobile Computing BYOD Communication Collaboration Apps WiFi Vendor Management The Internet of Things Marketing Facebook Firewall Analytics Cybersecurity History Managed IT services Apple Users Data Management IT Support Productivity communications Alert Outsourced IT Phishing Managed IT Services IT Consultant Save Money Internet of Things Content Filtering BDR Spam Bring Your Own Device Automation Gmail Office App Big data Health Information Technology Best Practice Data Backup Going Green Outlook Mobile Device Hiring/Firing Maintenance Wireless Technology Virus Managed IT Search Browser Lithium-ion Battery Windows 8 Hard Drives Data Recovery Budget Bandwidth Tech Support Antivirus Artificial Intelligence Hacking IBM Money Office 365 Recovery Update Employer-Employee Relationship Phone System Cost Management Help Desk Printer Encryption Training Save Time Document Management Administration Law Enforcement It Management Saving Time Running Cable Hard Drive Data storage Intranet Government Cybercrime Legal Risk Management SaaS Proactive IT Humor Computers Customer Service VPN Two-factor Authentication Cloud Computing Travel Website Education Networking Business Intelligence Excel Telephone Systems Disaster End of Support Computer Repair Securty User Solid State Drive Mobility Flexibility DDoS Laptop Windows 10 Word Cortana Password Digital Payment Hacker Access Control Comparison Downtime Fax Server Augmented Reality Hosted Solution Tablet Robot PowerPoint Data Security Social Networking Company Culture Social Engineering Compliance Wireless Data Loss Twitter Avoiding Downtime Black Market Data Breach Business Growth Project Management Current Events iPhone User Error Experience eWaste Value YouTube Unified Communications Settings Distributed Denial of Service Gaming Console Trending Public Cloud Webcam Business Technology Specifications Politics Statistics Safety Social Scam Network Congestion Automobile Cryptocurrency Streaming Media Google Docs Inbound Marketing How To Cleaning Digital Office Tips Co-managed IT Websites Chrome Tech Terms Start Menu Regulations Router Paperless Office Taxes Computer Accessories Sports Software as a Service Vulnerabilities Processors Uninterrupted Power Supply Mobile Technology Computing Customer Relationship Management Lifestyle USB Identity Theft Presentation Mouse Tech Term Data Protection IT service Text Messaging Virtual Desktop Bitcoin Virtual Reality Google Maps Patch Management Documents Programming Bluetooth Heating/Cooling Blockchain Computing Infrastructure Emails Redundancy Hack Pain Points Net Neutrality Retail Telephony Monitors Private Cloud Audit Accountants Evernote Read Flash Administrator Advertising Supercomputer Upselling Google Wallet Webinar Shortcut Virtual Assistant Content Management Emergency Migration Troubleshooting Worker Displays Machine Learning Staffing Computer Care Equifax Environment Data Warehousing Banking Employer Employee Relationship Video Surveillance Drones Competition Google Drive Hard Drive Disposal Vulnerability Desktop LinkedIn Business Owner File Sharing Licensing Saving ZTime Permissions Best Practives Printing Startup Electricity Windows Server 2008 Language Botnet Business Metrics Debate Application Unified Threat Management Archive Applications Writing Microserver switches Downloads Smart Tech WannaCry Windows 7 Point of Contact Computer Malfunction Chromebook Time Management Fiber-Optic Digital Signature Mobile Security Entertainment Messenger Turn Key Thin CLient Trojan Google Calendar Multi-Factor Security Freedom of Information Work/Life Balance Motion Sickness Download Tracking Organize Touchscreen Fraud Knowledge UTM Books Analytic Leadership IT consulting Technology Tips Legislation News Web Server Microchip Workers Device Management CIO Public Speaking email scam Multi-factor Authentication Reading Windows XP Society Wireless Headphones Entrepreneur Access Fake News online Currency HIPAA Hacks Samsung Business Managemenet Micrsooft Device security Electronic Payment Relocation G Suite Spyware Microsoft Excel Physical Security Harddrive Notifications Tablets IP Address Business Cards Human Resources Reliable Computing Mobile Payment Sync External Harddrive Music GPS cache CCTV Skype Upgrades Piracy Get More Done HTML Corporate Profile Television In Internet of Things Smart Phones LiFi Ebay Printer Server 3D Assessment Teamwork Software License Storage Rental Service Recycling Deep Learning Scalability Devices PDF VoIP SharePoint Memory Visible Light Communication Pirating Information Adminstration Keyboard Consultation Tip of the week Best Available Wi-Fi Meetings IT Plan Cabling Product Reviews Domains Capital Productuvuty CrashOverride 3D Printing Nanotechnology