Tip of the Week: Putting Your Old Android Device to Good Use

Tip of the Week: Putting Your Old Android Device to Good Use

Considering how often smartphones are replaced, you’re bound to have a couple of them stashed away for a rainy day. These devices are particularly helpful in the event that your smartphone breaks unexpectedly, but there are other purposes that you might want to keep in mind. Here are three ways you might be able to use your old mobile devices around the office.

A Portable Trackpad
There are all sorts of applications out there that can help you use your old phone for any number of uses for your computer. For example, you could use it as an extra controller for various apps or specialized features, allowing for an alternative way to control media playback, among other functionality.

You can achieve this by using the Touchpad app  on the Google Play store. It’s not perfect, but it’s the safest way to download legitimate apps. You should also run the decision by your IT department or IT decision makers to ensure that these apps will be compatible with your technology.

A Universal Remote
An old smart device might be a great way to take control of your other office devices. You can use a universal remote app from the Google Play store to control all sorts of devices around your office, eliminating the need to hold onto that old TV remote. Plus, since you are using just one device for every single television in your office, you don’t need to keep track of multiple remotes. If you have an older smartphone that comes with an onboard IR Blaster, you can utilize it as a TV remote, since many newer smartphones don’t come with one.

Makeshift Security Cameras
There are applications that you can find on the Google Play store that can turn your device into a miniature security camera. You might be surprised by how many different features you can find for this purpose. You can boost your business’ physical security presence, all by logging into a web browser. You can even record the footage and have it activated when detecting motion.

Of course, if you want to take your security seriously, you will want to discuss integrating a network-based IP camera security system.

Donate Your Old Devices to Science
If you choose to donate your device to the Berkeley Open Infrastructure for Network Computing, or BOINC, you will be providing the organization a valuable tool that allows them to advance various research projects. Resources donated to BOINC have been used toward researching the climate, molecular dynamics, genetic sequencing, measuring earthquake magnitude, and much more, all with the intent to make a better and more informed environment.

If this sounds like a better option than letting your devices collect dust in your junk drawer, just download the BOINC app from the Google Play store and select what kind of research you want your phone’s resources to go toward. This app will only run if your device has been charged and plugged in--the app will only work in this way so that your device isn’t being drained from this type of use, and thanks to it only transmitting data via Wi-Fi, you won’t waste any of your data, either.

What are some of your favorite ways to use your old Android devices? Let us know in the comments.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, February 17 2019

Captcha Image

Subscribe to Our Blog!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Email Privacy Business Computing Malware Network Security Hackers Software Tech Term User Tips Productivity Google Business Computer Internet Microsoft Mobile Devices IT Services Hosted Solutions Efficiency Ransomware Communication Small Business Android Hardware IT Support Smartphone Data Innovation Backup Saving Money Managed IT Services Internet of Things Browser Cloud Computing Data Recovery Workplace Tips Business Continuity Data Management Windows 10 Managed IT Services Windows Microsoft Office Server Cybersecurity App Business Management Data Backup Productivity Remote Monitoring Word Outsourced IT Facebook Phishing Mobile Device Windows 10 Upgrade Disaster Recovery Encryption Office 365 Passwords Vulnerability Artificial Intelligence Gmail BYOD Chrome Network Information Managed Service Provider Money IT Support Applications Employer-Employee Relationship Users Website Tip of the week Analytics Infrastructure communications VoIP Smartphones Maintenance Settings Data storage Access Control IT Management Display Router YouTube Save Money Robot Paperless Office Risk Management Google Drive Social Media Company Culture Content Filtering Bandwidth Automation Office Tips Miscellaneous Virtual Reality Antivirus Government Employee-Employer Relationship Big Data Managed Service Downtime Holiday Networking HIPAA Firewall Computers Hacker Retail Alert VPN Mobile Security Document Management Gadgets Data Security Computing Business Technology Outlook Wireless Server Management Spam Virtual Private Network Operating System Touchscreen WiFi Business Intelligence LiFi Vendor Management Quick Tips Monitors Hosted Solution Tablet Administration Mouse End of Support Two-factor Authentication Managing Stress Apple Data loss Avoiding Downtime Laptop Education Unified Threat Management Development Scam The Internet of Things Storage Telephone Systems desktop SaaS Printing Unified Communications Drones Screen Reader Charging LED Cybercrime Windows 8 Smart Office Collaboration Virtualization Search Black Friday Wires Emergency PowerPoint Licensing Dongle Dark Data Update Servers Google Calendar Marketing Laptops Dark Web Deep Learning Assessment Spyware Network Management Mobility Mobile Device Management Solar Uninterrupted Power Supply Cyber Monday Smart Tech Computer Care IBM Politics Co-Managed IT Work File Sharing Voice over Internet Protocol Solid State Drive Onboarding Alt Codes Cooperation Service Level Agreement Customer Service Legislation Software as a Service Office Samsung Microsoft Excel Slack Bring Your Own Device Hotspot Internet Exlporer Identity Theft SharePoint Print Toner Halloween Compliance Managed IT Smart Technology Budget Connectivity Training Corporate Profile Tech Support Techology Content Social IT Technicians Optimization Information Technology Modem FinTech G Suite Hard Disk Drive How To Lenovo Digital Signage Typing Humor Staff Leominster Automobile Chromebook Statistics Dell Social Engineering Mail Merge Blockchain Monitoring Best Practice Language Value Downloads Shortcuts Scary Stories Current Events Regulations Shortcut Distributed Denial of Service IoT WannaCry Websites VoIP Unified Threat Management Streaming Running Cable Mirgation Recycling Cabling Buisness Apps Cookies MSP Firefox Superfish Troubleshooting Cryptocurrency Augmented Reality K-12 Schools Google Maps Bluetooth Comparison Safety Address Permissions Spying Virtual Desktop Google Docs Computing Infrastructure Professional Services Security Cameras Sports IT solutions Going Green Social Networking Patch Management Managed IT Service Analysis Star Wars User Error Human Error Hacks Chatbots eWaste Remote Computing Google Wallet Nanotechnology Customer Relationship Management Bitcoin Wearable Technology Network upgrade Network Congestion Specifications Cables Business Growth Alerts USB Digital Payment Heating/Cooling Multi-Factor Security Managed Services Motherboard Break Fix Legal Fraud Cost Management Digital Wi-Fi Time Management Printer Device Password Identity Continuity Disaster Writing Cleaning Unsupported Software BDR CCTV Computer Repair Relocation Webcam Regulation Mobile Data How To Work/Life Balance Error Recovery Ben McDonald shares Health Private Cloud Mobile Computing Point of Sale Travel Black Market Law Enforcement Entertainment Notifications Supercomputer CrashOverride Electronic Medical Records Staffing Physical Security Motion Sickness Twitter Taxes Upgrades Gadget Administrator Emoji Web Server what was your? Crowdsourcing IT Budget GPS Personal Information Botnet IT Consultant 3D Printing Printers Cortana Cameras Processors Tracking Machine Learning Meetings

What Our Clients Say

  • BNMC has provided us with nothing less than outstanding service and results for all of our IT needs for the past few years. Every member of their staff is professional, knowledgeable, friendly and eager to solve any problem...
  • 1
  • 2
  • 3