Our Blog: Stuff we think you should know

Haber Group has been serving the New York area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Putting Your Old Android Device to Good Use

Tip of the Week: Putting Your Old Android Device to Good Use

Considering how often smartphones are replaced, you’re bound to have a couple of them stashed away for a rainy day. These devices are particularly helpful in the event that your smartphone breaks unexpectedly, but there are other purposes that you might want to keep in mind. Here are three ways you might be able to use your old mobile devices around the office.

A Portable Trackpad
There are all sorts of applications out there that can help you use your old phone for any number of uses for your computer. For example, you could use it as an extra controller for various apps or specialized features, allowing for an alternative way to control media playback, among other functionality.

You can achieve this by using the Touchpad app  on the Google Play store. It’s not perfect, but it’s the safest way to download legitimate apps. You should also run the decision by your IT department or IT decision makers to ensure that these apps will be compatible with your technology.

A Universal Remote
An old smart device might be a great way to take control of your other office devices. You can use a universal remote app from the Google Play store to control all sorts of devices around your office, eliminating the need to hold onto that old TV remote. Plus, since you are using just one device for every single television in your office, you don’t need to keep track of multiple remotes. If you have an older smartphone that comes with an onboard IR Blaster, you can utilize it as a TV remote, since many newer smartphones don’t come with one.

Makeshift Security Cameras
There are applications that you can find on the Google Play store that can turn your device into a miniature security camera. You might be surprised by how many different features you can find for this purpose. You can boost your business’ physical security presence, all by logging into a web browser. You can even record the footage and have it activated when detecting motion.

Of course, if you want to take your security seriously, you will want to discuss integrating a network-based IP camera security system.

Donate Your Old Devices to Science
If you choose to donate your device to the Berkeley Open Infrastructure for Network Computing, or BOINC, you will be providing the organization a valuable tool that allows them to advance various research projects. Resources donated to BOINC have been used toward researching the climate, molecular dynamics, genetic sequencing, measuring earthquake magnitude, and much more, all with the intent to make a better and more informed environment.

If this sounds like a better option than letting your devices collect dust in your junk drawer, just download the BOINC app from the Google Play store and select what kind of research you want your phone’s resources to go toward. This app will only run if your device has been charged and plugged in--the app will only work in this way so that your device isn’t being drained from this type of use, and thanks to it only transmitting data via Wi-Fi, you won’t waste any of your data, either.

What are some of your favorite ways to use your old Android devices? Let us know in the comments.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, 24 May 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Cloud Technology Email Privacy Hackers Malware Business Internet Business Computing Hosted Solutions Computer Microsoft Software Ransomware Backup Windows 10 Google IT Services Mobile Devices Smartphone Network Security Android User Tips Data Management Hardware Small Business Productivity Browser Windows Business Continuity Managed IT Services Server Internet of Things Saving Money App Gmail Data Tech Term Cloud Computing Artificial Intelligence Data Recovery Facebook Office 365 Managed Service Provider Upgrade Smartphones Encryption Remote Monitoring Phishing Efficiency Cybersecurity IT Support Business Management Disaster Recovery Infrastructure Productivity Workplace Tips Tip of the week Government IT Support Microsoft Office Outsourced IT Big Data Spam Innovation Social Media Word Office Tips Data Backup Data storage Customer Service Antivirus Passwords Bandwidth Two-factor Authentication Money Windows 10 Apple Employer-Employee Relationship Vulnerability Settings Content Filtering WiFi The Internet of Things Robot Risk Management Communication Miscellaneous Managed IT Services IT Management Chrome Firewall Analytics Holiday Presentation Outlook Hacker Avoiding Downtime Business Technology Office Data loss Wireless Technology Search End of Support Recovery Website Administration HIPAA VoIP Save Money Password Virtual Reality Applications Mouse Mobile Security Scam Network Tablet SaaS Storage Augmented Reality Hosted Solution Unified Threat Management Monitors Safety VPN YouTube Data Security communications Automation Virtual Private Network BYOD Printing Server Management Vendor Management Computing Mobile Device Google Drive IBM Telephone Systems Wireless Maintenance Apps Customer Relationship Management LiFi Paperless Office Wi-Fi Hacking Smart Technology Remote Computing Regulations Star Wars Social Engineering Permissions 5G Scary Stories WannaCry Time Management Staff Drones Access Control Distributed Denial of Service Cabling Social Networking Politics Marketing Cost Management Social Sports Education Network Management Collaboration Wearable Technology SharePoint Humor Managed IT Service IP Address Deep Learning Managed IT Motherboard Tech Support Assessment How To Hacks Lenovo Document Management Digital Touchscreen File Sharing Budget Downloads Network Congestion sip Break Fix Mobile Office Bring Your Own Device Shortcut Disaster Samsung Router Websites Internet Exlporer Fraud Superfish Identity Theft Hard Drives Buisness Spyware Multi-Factor Security IT solutions Computers telephony Dark Web Mobile Device Management Best Practice Patch Management Uninterrupted Power Supply Modem Value Refrigeration Google Calendar Public Speaking Cortana IT Technicians Display Net Neutrality Lithium-ion battery Business Growth Solid State Drive Cookies Downtime How To Professional Services Hotspot Current Events Networking Legal Legislation Heating/Cooling IT service Mirgation Dark Data FCC Alt Codes Cybercrime Hard Disk Drive Nanotechnology Firefox USB Language Fun Going Green Digital Payment Undo Comparison Servers Knowledge BDR Chromebook Chatbots Title II Typing Application Gadgets Screen Reader Dongle Computing Infrastructure Techology Virtualization Operating System Specifications Unified Communications Experience Google Maps Identity Online Cryptocurrency Mail Merge Computer Care Running Cable Users Smart Tech Virtual Desktop Alerts Unified Threat Management Black Friday Statistics Writing Microsoft Excel Bitcoin Address Training Laptop Connectivity Quick Tips Automobile Licensing Information Technology User Error Google Docs Cyber Monday Bluetooth User Compliance IoT Retail Blockchain Windows 8 Halloween Corporate Profile VoIP Cooperation Google Wallet Printer Competition Web Server Emergency GPS Computer Repair Cameras Processors Tracking Health CCTV Alert Electronic Medical Records Domains Travel G Suite Notifications CrashOverride Botnet Upgrades Mobile Computing Supercomputer Motion Sickness Taxes Crowdsourcing Machine Learning 3D Printing IT Budget Update IT Consultant Relocation Unsupported Software Meetings Cleaning Private Cloud Mobile Data Webcam Emoji Work/Life Balance Error Service Level Agreement Point of Sale Black Market Law Enforcement Physical Security Twitter Staffing Gadget Administrator Personal Information