Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Putting Your Old Android Device to Good Use

Tip of the Week: Putting Your Old Android Device to Good Use

Considering how often smartphones are replaced, you’re bound to have a couple of them stashed away for a rainy day. These devices are particularly helpful in the event that your smartphone breaks unexpectedly, but there are other purposes that you might want to keep in mind. Here are three ways you might be able to use your old mobile devices around the office.

A Portable Trackpad
There are all sorts of applications out there that can help you use your old phone for any number of uses for your computer. For example, you could use it as an extra controller for various apps or specialized features, allowing for an alternative way to control media playback, among other functionality.

You can achieve this by using the Touchpad app  on the Google Play store. It’s not perfect, but it’s the safest way to download legitimate apps. You should also run the decision by your IT department or IT decision makers to ensure that these apps will be compatible with your technology.

A Universal Remote
An old smart device might be a great way to take control of your other office devices. You can use a universal remote app from the Google Play store to control all sorts of devices around your office, eliminating the need to hold onto that old TV remote. Plus, since you are using just one device for every single television in your office, you don’t need to keep track of multiple remotes. If you have an older smartphone that comes with an onboard IR Blaster, you can utilize it as a TV remote, since many newer smartphones don’t come with one.

Makeshift Security Cameras
There are applications that you can find on the Google Play store that can turn your device into a miniature security camera. You might be surprised by how many different features you can find for this purpose. You can boost your business’ physical security presence, all by logging into a web browser. You can even record the footage and have it activated when detecting motion.

Of course, if you want to take your security seriously, you will want to discuss integrating a network-based IP camera security system.

Donate Your Old Devices to Science
If you choose to donate your device to the Berkeley Open Infrastructure for Network Computing, or BOINC, you will be providing the organization a valuable tool that allows them to advance various research projects. Resources donated to BOINC have been used toward researching the climate, molecular dynamics, genetic sequencing, measuring earthquake magnitude, and much more, all with the intent to make a better and more informed environment.

If this sounds like a better option than letting your devices collect dust in your junk drawer, just download the BOINC app from the Google Play store and select what kind of research you want your phone’s resources to go toward. This app will only run if your device has been charged and plugged in--the app will only work in this way so that your device isn’t being drained from this type of use, and thanks to it only transmitting data via Wi-Fi, you won’t waste any of your data, either.

What are some of your favorite ways to use your old Android devices? Let us know in the comments.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 18 February 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Cloud Technology Hackers Privacy Email Malware Business Internet Hosted Solutions Business Computing Microsoft Windows 10 Computer Software Backup Android Ransomware IT Services Network Security Smartphone Small Business Google Mobile Devices Hardware Windows User Tips Productivity Gmail Data Browser Data Management Office 365 Upgrade Smartphones Saving Money Efficiency Business Continuity Phishing Internet of Things App Encryption Facebook Tip of the week Workplace Tips Managed IT Services Innovation Remote Monitoring Office Tips Microsoft Office Cloud Computing IT Support Big Data Artificial Intelligence Word Data Recovery Managed Service Provider Outsourced IT Server Content Filtering Robot Risk Management Business Management Employer-Employee Relationship IT Support WiFi Productivity Chrome Data storage Spam Miscellaneous Antivirus Cybersecurity Social Media Money Government Disaster Recovery Firewall Customer Service Two-factor Authentication Apple Windows 10 Settings Recovery Hosted Solution Scam Tablet YouTube Vulnerability communications Holiday Printing Data Security Virtual Private Network Computing Google Drive Augmented Reality End of Support Safety Managed IT Services LiFi IT Management Telephone Systems Save Money The Internet of Things Maintenance Virtual Reality Analytics Bandwidth Data Backup SaaS Outlook IBM Wireless Search Unified Threat Management Monitors Apps Customer Relationship Management Wi-Fi Administration Hacking Business Technology HIPAA Automation VoIP Infrastructure Password Passwords Mouse Communication Presentation Avoiding Downtime Mobile Device Mobile Security Hacker Network Office Wireless Technology Dark Web Patch Management Hotspot Automobile Uninterrupted Power Supply Current Events IP Address Downtime Legal Paperless Office Dark Data Alt Codes Retail Website Cybercrime Google Calendar Net Neutrality Language Solid State Drive Going Green Mobile Office Hard Drives Knowledge Networking How To Heating/Cooling IT service Typing Social Engineering Legislation Mobile Device Management FCC VPN Computing Infrastructure Hard Disk Drive Operating System Unified Communications Refrigeration Experience Firefox Servers Politics BDR Cryptocurrency Public Speaking Running Cable Comparison Lithium-ion battery Virtual Desktop Title II Alerts Collaboration Techology Document Management Server Management Tech Support Google Maps Bitcoin How To Laptop Specifications Online Mail Merge Licensing File Sharing Information Technology Google Docs Samsung Fun Network Congestion Undo Unified Threat Management Statistics Websites Windows 8 Halloween Black Friday Microsoft Excel Application Address Cooperation Gadgets Google Wallet Computers Virtualization User Error Quick Tips Bluetooth Scary Stories Cyber Monday Blockchain Staff Users Corporate Profile Drones Display Printer VoIP Social Sports Smart Technology Education Permissions Wearable Technology WannaCry Humor Deep Learning Access Control Time Management User Digital Payment Cabling Hacks Distributed Denial of Service Data loss Budget sip BYOD Bring Your Own Device Competition SharePoint Network Management Managed IT Fraud Buisness Managed IT Service 5G IT solutions Lenovo Applications Digital telephony Best Practice Downloads Computer Care Touchscreen Break Fix Shortcut Disaster Vendor Management Cortana Superfish IT Technicians Marketing Spyware Storage Business Growth Writing Multi-Factor Security Training Physical Security Twitter Mirgation CrashOverride Staffing Gadget Administrator Personal Information Remote Computing Web Server GPS Domains Computer Repair Processors Cameras Tracking Health Alert CCTV Electronic Medical Records Identity Theft Travel Notifications G Suite Supercomputer Botnet Upgrades Motion Sickness Crowdsourcing Taxes IT Budget Machine Learning 3D Printing Emergency Update IT Consultant Relocation Unsupported Software Meetings Chromebook Cleaning Private Cloud Mobile Data Webcam Emoji Work/Life Balance Error Mobile Computing Point of Sale Black Market Law Enforcement