KT Connections Blog

KT Connections has been serving the Rapid City area since 1997, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Don’t Let Your Old Android Device go to Waste

Tip of the Week: Don’t Let Your Old Android Device go to Waste

Unless you’re the trade-in or hand-me-down kind of person, it’s likely that you have a supply of old Android devices squirrelled away somewhere. You know, just in case the one who have now breaks. However, these old devices can be useful in other ways around the office. For this week’s tip, we’ll go over three alternate uses for your mobile device in the office.

Portable Trackpad
There are assorted applications available that allow you to link your old phone to your computer and use it as an alternative controller to your mouse. These apps often offer specialized features that give you better control over media playback and other useful workplace utilities.

Just be sure to install whatever app you select from the Google Play store, as it is the safest option out there for downloading apps. However, you should also make sure that your IT department signs off on you adding these apps to devices used for work.

Universal Remote
If you happen to use smart devices in your office, your old phone could become a central control hub for them. Download the necessary apps from the Google Play store, and in no time, you’ll be able to control any of the gadgets you have installed around your office with a dedicated remote, eliminating the need for the bulky included remotes that accompany many of these devices, as well as the need to take up space on your current mobile phone.

Security Camera
Similarly to using your old device as a universal remote, you can find apps on Google Play that can turn it into a security camera with a few different features. By doing so, you can boost your office’s security with the option to check in on goings-on via a web browser, record the footage, and even have the camera activate when motion is detected.

Bonus Purpose: Donate the Phone to BOINC
The Berkeley Open Infrastructure for Network Computing, or BOINC, allows you to donate the computing resources of your old phone to assist research teams in their efforts towards scientific breakthroughs. So far, resources dedicated to BOINC have powered research into the climate, molecular dynamics, genetic sequencing, measured the efficacy of malaria treatments and the power of earthquakes, as well as many other scientific causes.

To participate, all you have to do is download the BOINC app from the Google Play Store and select what research you want to commit your phone’s resources to. The app will only run if your device is both charged and plugged in, as so not to leave you with a drained phone, and can be set to only transmit data over Wi-Fi, saving your data.

What other uses have you come up with for your old Android devices? Let us know in the comments, and make sure to subscribe to our blog!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 23 January 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Privacy hackers Technology Email malware Internet Business Computing Network Security Cloud Google software User Tips Efficiency Ransomware Backup Business Data IT Support Microsoft Computer IT Support Android Small Business Mobile Device Management Productivity Gmail Network Money Managed IT Services Facebook Hardware VoIP Mobile Devices Phishing cybersecurity Smartphone Windows Hosted Solutions Microsoft Office Internet of Things Operating System Business Continuity Alert Artificial Intelligence Cloud Computing communications Windows 10 Data Security IT Management Data Management IT Services Managed IT Services Unified Communications Social Media Robot Update Hard Drive Smartphones Outlook Passwords Outsourced IT Communication Cost Management Business Management Data storage Encryption Upgrade Nextiva security cameras Networking BDR Disaster Recovery Office 365 Bandwidth data breach End of Support Apple Antivirus vulnerability Law Enforcement Word YouTube Event Marketing Local Buzz Holiday Project Management Best Practice Analytics security solutions South Dakota Social Engineering Firewall Automation Spam vulnerabilities Productivity Server Collaboration IoT Browser Google Wallet Remote Monitoring Google Docs Save Money Document Management SaaS Saving Money Legal Information Technology Politics Scam Cryptocurrency Customer Service Search Lunch and Learn IBM Bitcoin App Data Recovery Google Maps Hacking Windows 10 Drones Big Data Information Security The Internet of Things Apps Start Menu History botnet Data Backup Digital Gadgets Access Control BYOD News Patch Management Events Innovation Data Protection WiFi Virtual Assistant DDoS Redundancy Spyware Sports LastPass communication device security precautions Audit Mixer Wireless Technology Google Drive Mouse Black Market Corporate Profile Virus LiFi IT Consultation Virtual Reality Mobile Device Programming Telephony Streaming Media Rebrand business owner Maintenance Vendors Society Worker SharePoint Cloud Backup Law IT Visible Light Communication IT Assessment Unified Threat Management Retail How To Memory Hard Drive Disposal Rapid City Managed Service Provider File Sharing Cache VoIP Windows XP Applications communication solutions Fortinet Community Involvement Windows 8 Web Servers IT Security face Business Growth Virtual Machines Lawyers Website Local Technology IT Strategy Business Cards Virtualization identity theft email scam Network Congestion IoT Devices Emergency Workers Compliance Physical Security Internet 101 Tips and Tricks Deep Learning Business Security Download Tech Support Microsoft Office 365 Freedom of Information surveillance cameras Risk Creep IT Solutions Advertising Sales Tax Administration Dell ’s Sonicwall Global Management System Content Filtering media experience eWaste Business Technology Cortana Samsung Communications Time Management Virtual Desktop Internet Connected Devices Office Printing healthcare Printer Microsoft Office 365 features Fake News Trend Micro IT for Oil Companies Attorneys Password Cybercrime Managed IT information Computing Infrastructure AtomBombing Laptop Disaster Tablets Phone System Unified Threat Management Distributed Denial of Service Vendor Management Downloads tool Microsoft Excel Google Play Store Risk Management Managed Services Mobility Flash Tablet appointment Hardware as a Service enterprise productivity software Monitors Google Calendar Hosted Solution Kaseya Settings SOX Knowledge Cleaning HaaS Business Comunications Webcam Displays Business Communications botnet attack Blockchain camera Kaseya Connect VPN Press Release password manager LastPass Computer Care Workplace Tips Sarbanes-Oxley Act Tech Terms Microsoft Bookings Vendor Mangement Remote Computing Proactive IT Touchscreen Fast food Budget Comparison Bluetooth Excel macbook Quick Tips Conference Social Email Security user confidence Chamber of Commerce Hack Office Tips End User Testing booking process Running Cable Business Mangement Music Uninterrupted Power Supply Websites Education Penetration Testing Specifications DDoS attacks Safety Tip of the week Access Experience Event Cabling Software as a Service Phishing Scams Government Solid State Drive Writing Television Digital Payment breach methods base infrastructure Hacks Automobile Public Cloud Taxes Telephone Systems security solution Notifications Health Business Metrics Paperless Office Banking end-of-support date holiday season 3D Printing Rental Service Chromebook Phone Systen UTM Marketing Flexibility Protection holidays CCTV Threat management Work/Life Balance Reliable Computing IT service CrashOverride Web Server scammers Twitter Meetings Scalability collaboration capabilities Ordinary Computers Wi-Fi Downtime scams Emails G Suite Computer Malfunction Travel Processors Documents Tracking quantum computers Piracy Employer-Employee Relationship Sync Messenger Supercomputer Text Messaging Private Cloud Microchip PDF Software License In Internet of Things Computing Books IT Consultant Motion Sickness network security professionals Language Reading Hiring/Firing Training Machine Learning Bring Your Own Device Playbook Administrator Users Miscellaneous Relocation Hacker Employer Employee Relationship