Tip of the Week: Don’t Let Your Old Android Device go to Waste

Tip of the Week: Don’t Let Your Old Android Device go to Waste

Unless you’re the trade-in or hand-me-down kind of person, it’s likely that you have a supply of old Android devices squirrelled away somewhere. You know, just in case the one who have now breaks. However, these old devices can be useful in other ways around the office. For this week’s tip, we’ll go over three alternate uses for your mobile device in the office.

Portable Trackpad
There are assorted applications available that allow you to link your old phone to your computer and use it as an alternative controller to your mouse. These apps often offer specialized features that give you better control over media playback and other useful workplace utilities.

Just be sure to install whatever app you select from the Google Play store, as it is the safest option out there for downloading apps. However, you should also make sure that your IT department signs off on you adding these apps to devices used for work.

Universal Remote
If you happen to use smart devices in your office, your old phone could become a central control hub for them. Download the necessary apps from the Google Play store, and in no time, you’ll be able to control any of the gadgets you have installed around your office with a dedicated remote, eliminating the need for the bulky included remotes that accompany many of these devices, as well as the need to take up space on your current mobile phone.

Security Camera
Similarly to using your old device as a universal remote, you can find apps on Google Play that can turn it into a security camera with a few different features. By doing so, you can boost your office’s security with the option to check in on goings-on via a web browser, record the footage, and even have the camera activate when motion is detected.

Bonus Purpose: Donate the Phone to BOINC
The Berkeley Open Infrastructure for Network Computing, or BOINC, allows you to donate the computing resources of your old phone to assist research teams in their efforts towards scientific breakthroughs. So far, resources dedicated to BOINC have powered research into the climate, molecular dynamics, genetic sequencing, measured the efficacy of malaria treatments and the power of earthquakes, as well as many other scientific causes.

To participate, all you have to do is download the BOINC app from the Google Play Store and select what research you want to commit your phone’s resources to. The app will only run if your device is both charged and plugged in, as so not to leave you with a drained phone, and can be set to only transmit data over Wi-Fi, saving your data.

What other uses have you come up with for your old Android devices? Let us know in the comments, and make sure to subscribe to our blog!



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, 18 March 2018

Captcha Image

Request a Free Consultation

  • Company name *
  • First Name *
  • Last Name *
  • Title
  • Phone
  • What are your concerns?

      Sign up for our Newsletter!

      • Company *
      • First Name *
      • Last Name *

          Mobile? Grab this Article!

          QR-Code dieser Seite

          Tag Cloud

          security Tip of the Week technology Privacy Best Practices Cloud Hackers Business Computing Productivity business Malware Microsoft Internet IT Services Backup Hosted Solutions Managed Service Provider IT Support Email Mobile Devices Workplace Tips Network Communication Hardware Disaster Recovery Computer Smartphones Microsoft Office Mobile Device Management Holiday Windows Miscellaneous network security Data Windows 10 Business Continuity Small Business Efficiency Software Alert Smartphone Google Server Upgrade Saving Money Internet of Things Business Management User Tips Virtualization Innovation Social Media WiFi Ransomware Remote Monitoring Remote Computing Operating System Big Data Android Cybersecurity Gmail BYOD VoIP Passwords Mobile Computing The Internet of Things Office Browser Apps Apple Spam Vendor Management App Artificial Intelligence Business Growth Facebook Risk Management Budget Hacking Analytics Collaboration Wireless Technology Information Technology Phishing Customer Service Automation Managed IT Services Save Money Office 365 Going Green Cybercrime Money Hacker Gadgets Robot Cost Management Outsourced IT Retail Best Practice Office Tips Tech Support Bring Your Own Device IT Solutions Data Management Hosted Solution Bitcoin Outlook IT service Two-factor Authentication Application communications Data storage Recovery Presentation Content Filtering Firewall Downtime Document Management Hard Drives Cortana Lithium-ion Battery Running Cable Antivirus Customer Relationship Management virus Employer-Employee Relationship Proactive IT Current Events intranet End of Support Avoiding Downtime Computers Maintenance Managed IT Website Mobile Device Laptop IT Consultant VPN Social Engineering Saving Time Health PowerPoint Administration Samsung Cryptocurrency Blockchain Statistics Save Time Windows 8 Vulnerabilities Password Work/Life Balance Google Docs Update Hacks Augmented Reality Law Enforcement Excel Private Cloud Hiring/Firing Tablet Social Quick Tips Business Owner Company Culture LiFi Competition Cloud Computing eWaste iPhone Search Data Security Humor Mobile Technology Twitter Trending project management Education Analyitcs Safety Net Neutrality Network Congestion Mouse Data Breach Programming Encryption Data Recovery Specifications User Disaster Wireless Settings Websites IT Support Productivity Piracy Bandwidth Phone System Chrome USB Marketing Virtual Desktop risk Virtual Reality email scam Public Speaking Business Technology Documents 5G Cyber-attacks Business Intelligence Government experience downtime Google Drive Halloween Digital Signature Heating/Cooling cyberattack IBM Desktop PDF SharePoint Crowdfunding Compliance Scary Stories Tip of the week Travel cyberattacks Computing Infrastructure Applications Co-managed IT Distributed Denial of Service Regulations Paperless Office Sports Digital Data loss Online Currency businesses Unified Communications Vulnerability Printing Mobile Security Fun Evernote Gadget Storage Virtual Assistant IT Management Software as a Service Networking Printer Computing Data Warehousing Entrepreneur Politics Windows 8.1 Update Debate Dark Data Buisness Hard Drive Refrigeration Public Cloud Google Calendar Consumers IP Address Technology Tips Black Market Skype Deep Learning Business Cards Printer Server Google Wallet Knowledge Identity Theft Windows Server 2008 Telephony Memory security breach CIO Access Control Software License Mobile Office LinkedIn Users Drones Multi-factor Authentication Environment Experience Windows 7 Training Modern technology User Error Hard Drive Disposal Redundancy Mobile Payment Processors Best Available Display Identities Device security Troubleshooting Mobility Freedom of Information History File Sharing People business owners Unified Threat Management Undo Patch Management Notifications Computer Repair Video Surveillance Monitors Solid State Drive Flexibility Backups Tech Term News Word Files Downloads Router Licensing YouTube Fiber-Optic IT Plan Comparison Telephone Systems Writing Alt Codes Legal HTML Fake News Managed Service Providers data breaches Help Desk Fraud Domains Migration Wi-Fi Television Touchscreen Crowdsourcing Typing today ’s world Data Protection bdr Microsoft Excel Botnet Managed IT Services G Suite Point of Sale Devices Google Maps Machine Learning Corporate Profile Unified Threat Management SaaS Meetings Physical Security Software Tips Relocation WannaCry Webcam Motion Sickness Chromebook GPS Data Backup How To Personal Information Error Cleaning Emoji Value Tracking Upgrades Electronic Medical Records Computer Care UTM Cabling 3D Printing Automobile Staffing Infrastructure Unsupported Software Administrator Taxes Uninterrupted Power Supply Mobile Data Sync test post Web Server Supercomputer Hard Disk Drive Mobile Device Managment Cameras IT Budget CCTV Digital Payment