Tip of the Week: Don’t Let Your Old Android Device go to Waste

Tip of the Week: Don’t Let Your Old Android Device go to Waste

Unless you’re the trade-in or hand-me-down kind of person, it’s likely that you have a supply of old Android devices squirrelled away somewhere. You know, just in case the one who have now breaks. However, these old devices can be useful in other ways around the office. For this week’s tip, we’ll go over three alternate uses for your mobile device in the office.

Portable Trackpad
There are assorted applications available that allow you to link your old phone to your computer and use it as an alternative controller to your mouse. These apps often offer specialized features that give you better control over media playback and other useful workplace utilities.

Just be sure to install whatever app you select from the Google Play store, as it is the safest option out there for downloading apps. However, you should also make sure that your IT department signs off on you adding these apps to devices used for work.

Universal Remote
If you happen to use smart devices in your office, your old phone could become a central control hub for them. Download the necessary apps from the Google Play store, and in no time, you’ll be able to control any of the gadgets you have installed around your office with a dedicated remote, eliminating the need for the bulky included remotes that accompany many of these devices, as well as the need to take up space on your current mobile phone.

Security Camera
Similarly to using your old device as a universal remote, you can find apps on Google Play that can turn it into a security camera with a few different features. By doing so, you can boost your office’s security with the option to check in on goings-on via a web browser, record the footage, and even have the camera activate when motion is detected.

Bonus Purpose: Donate the Phone to BOINC
The Berkeley Open Infrastructure for Network Computing, or BOINC, allows you to donate the computing resources of your old phone to assist research teams in their efforts towards scientific breakthroughs. So far, resources dedicated to BOINC have powered research into the climate, molecular dynamics, genetic sequencing, measured the efficacy of malaria treatments and the power of earthquakes, as well as many other scientific causes.

To participate, all you have to do is download the BOINC app from the Google Play Store and select what research you want to commit your phone’s resources to. The app will only run if your device is both charged and plugged in, as so not to leave you with a drained phone, and can be set to only transmit data over Wi-Fi, saving your data.

What other uses have you come up with for your old Android devices? Let us know in the comments, and make sure to subscribe to our blog!



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, 17 January 2018

Captcha Image

Request a Free Consultation

  • Company name *
  • First Name *
  • Last Name *
  • Title
  • Phone
  • What are your concerns?

      Sign up for our Newsletter!

      • Company *
      • First Name *
      • Last Name *

          Mobile? Grab this Article!

          QR-Code dieser Seite

          Tag Cloud

          security Tip of the Week technology Privacy Best Practices Cloud Hackers Productivity Business Computing business Malware Microsoft Internet IT Services Backup Managed Service Provider IT Support Hosted Solutions Email Network Mobile Devices Workplace Tips Communication Hardware Computer Smartphones Microsoft Office Disaster Recovery Mobile Device Management Holiday Windows Miscellaneous Windows 10 network security Efficiency Data Business Continuity Small Business Server Smartphone Alert User Tips Virtualization Software Google Upgrade Saving Money Business Management Social Media WiFi Ransomware BYOD Passwords VoIP Remote Computing Operating System Internet of Things Big Data Android Gmail Cybersecurity Apple Vendor Management Spam Remote Monitoring Mobile Computing The Internet of Things App Office Innovation Browser Analytics Phishing Facebook Artificial Intelligence Collaboration Wireless Technology Budget Apps Business Growth Risk Management Office Tips Data Management Retail Best Practice IT Solutions Information Technology Tech Support Bring Your Own Device Office 365 Managed IT Services Save Money Going Green Hacker Customer Service Automation Robot Outsourced IT Money Gadgets Hacking Content Filtering End of Support Firewall Computers Proactive IT Current Events Lithium-ion Battery Running Cable Avoiding Downtime Customer Relationship Management virus Managed IT Mobile Device Hosted Solution IT Consultant Bitcoin IT service Saving Time Recovery Data storage Hard Drives Health Cortana Outlook Employer-Employee Relationship Cost Management Document Management Application Presentation Twitter iPhone Mouse Downtime Encryption IT Support intranet Business Owner Competition Website Wireless Net Neutrality eWaste Settings Bandwidth Search Humor Virtual Desktop Trending Maintenance Administration Education Network Congestion Cryptocurrency Analyitcs Social Engineering Programming Marketing Specifications User Disaster Google Docs communications Two-factor Authentication Hacks Cybercrime Work/Life Balance Laptop Windows 8 Phone System Chrome Update USB VPN Social Law Enforcement PowerPoint LiFi Samsung Statistics Save Time Password project management Quick Tips Excel Hiring/Firing Tablet Safety Antivirus Fiber-Optic Downloads Printer Server Undo Training Comparison Modern technology Solid State Drive Users Fake News Fraud Processors data breaches Backups Display Word Mobility File Sharing Television Debate YouTube business owners Managed IT Services Alt Codes Skype Consumers Microsoft Excel email scam Notifications risk Legal Monitors Memory Domains Files Cyber-attacks Flexibility Computer Repair Typing LinkedIn Wi-Fi Blockchain Environment Vulnerabilities Telephone Systems cyberattack Writing bdr Public Speaking Websites SharePoint Router Tip of the week Help Desk Best Available 5G Business Intelligence Productivity Heating/Cooling Troubleshooting Computing Infrastructure Crowdsourcing History cyberattacks Google Drive People Halloween IBM Botnet Distributed Denial of Service today ’s world Digital Touchscreen Data loss Video Surveillance Vulnerability Government businesses Scary Stories Evernote experience downtime Licensing Virtual Assistant IT Management Augmented Reality Networking Software as a Service Compliance Managed Service Providers Sports Unified Communications Data Warehousing Piracy Hard Drive Google Calendar Printing Fun Travel Business Cards Technology Tips Storage Regulations Private Cloud Windows Server 2008 Paperless Office Documents Data Security Access Control Computing Entrepreneur Refrigeration Gadget Digital Signature Mobile Technology Online Currency Dark Data Buisness Deep Learning IP Address Windows 7 PDF Hard Drive Disposal Google Wallet Crowdfunding Knowledge Politics Mobile Payment CIO Mobile Office Public Cloud Freedom of Information Company Culture Co-managed IT Unified Threat Management Black Market Data Breach Windows 8.1 Update Drones Printer Experience Telephony Patch Management User Error Identities News security breach Staffing Unsupported Software test post Administrator Taxes Mobile Data Sync Web Server Supercomputer Corporate Profile Mobile Device Managment Cameras IT Budget WannaCry CCTV Digital Payment Virtual Reality G Suite Point of Sale Data Backup Google Maps Machine Learning SaaS Unified Threat Management Meetings Cloud Computing Software Tips Relocation Physical Security Webcam Cabling Chromebook Motion Sickness GPS How To Infrastructure Error Personal Information Emoji Cleaning Tracking Upgrades Uninterrupted Power Supply Electronic Medical Records Computer Care Identity Theft 3D Printing Hard Disk Drive Automobile