crn5000-inc2015 BPTW logo
Contact us today!
(918) 770-8738
 
 

Integrated Business Technologies Blog

Integrated Business Technologies has been serving the Broken Arrow area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Lessons Your Business Can Learn From the Galaxy Note 7 and 8

Samsung fans are getting geared up for the release of their new smartphone, the Galaxy Note 8. Even though it might seem as though the technology world has moved on from the exploding Note 7, you can be sure that Samsung is still feeling the reverberations from last year’s debacle that resulted from the now-infamous exploding of their much-anticipated Galaxy Note 7.

As many of you will remember, the fall of 2017 saw the debut of the Galaxy Note 7 met almost immediately with a permanent halt in production after a massive world-wide recall was issued by Samsung because of an issue that caused the Note 7’s battery to produce excessive heat and catch on fire. Reports of exploding Note 7s and the resulting bad press damaged Samsung’s reputation so much that they’re now struggling to regain market share with the upcoming release of their Note 8.

What precautions has Samsung taken to prevent Note 8 from exploding? Well, for starters, their phones are now put through their ‘eight-step battery safety test’, which includes: durability testing, visual inspection, X-rays, charge and discharge tests, tests of total volatile organic compounds (TVOC), disassembling tests, accelerated usage tests, and open circuit voltage tests. That’s not to say that all these steps are brand new methods of testing of battery safety. Many of the steps were in place before but have been ‘enhanced’ after the exploding Note 7 batteries.

Additionally, the Note 8 has a smaller battery than its predecessor and is equipped with a stronger barrier between battery and rest of the phone. There have been no safety concerns reported thus far, but the Note 8 is still only in the infancy of its launch.

One thing that Samsung has had to focus on throughout the last year is mitigating the damage to its reputation. In February 2017, the annual Harris reputation poll showed just how much damage the exploding Note 7 had done, having gone from being ranked 7th highest regarded company in 2016, before the Note 7, to 49th in 2017, after the exploding phone was recalled and discontinued.

The development and production of the Note 8 has Samsung being uncharacteristically transparent with processes, going the extra mile to demonstrate their attention to safety concerns and details. They are aware that the damage caused by the Note 7 will likely be a point of hesitation to many of those considering a newer Note 8.

We’d love to hear your opinion on this technology hot button issue! Are you going to give the Note 8 a shot? Or are you still hesitant because of the exploding Note 7? How many of you decided to move away from Samsung products all together? Let us know in the comments!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 19 September 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      freeconsultation
       

      Tag Cloud

      Security Technology Tip of the Week Privacy Business Management Managed Service Provider Internet Cloud Microsoft Best Practices Business Computing Saving Money Productivity Workplace Tips IT Services Hosted Solutions Hackers Backup Email Malware Software Mobile Devices Business Data IT Support Small Business Network Hardware Communication Server Smartphones VoIP Upgrade Computer Windows Business Continuity Google Efficiency Mobile Device Management Virtualization Microsoft Office Disaster Recovery Innovation Mobile Office Vendor Management Miscellaneous Gadgets Social Media Holiday Tech Term Outsourced IT User Tips Quick Tips Passwords Data Backup BYOD Mobile Computing Network Security Android Smartphone Internet of Things Managed IT services WiFi Bring Your Own Device Browser Windows 10 The Internet of Things Best Practice Ransomware Spam Remote Monitoring Data Management Save Money Users Trending Operating System Apple Remote Computing Wireless Technology Data Recovery Alert Firewall Content Filtering Unified Threat Management Artificial Intelligence History Gmail Going Green Information Technology Current Events Big Data Office Analytics IT Solutions Lithium-ion Battery Facebook IT Consultant Encryption App Customer Relationship Management Cloud Computing Router Managed IT Printer Tech Support Collaboration Avoiding Downtime Two-factor Authentication Maintenance Hard Drives Antivirus Document Management Windows 8 Paperless Office Humor Employer-Employee Relationship Website Productivity Applications IT Support Saving Time Managed IT Services Apps Application Phone System Virus Fax Server Compliance Automation Cybersecurity Office Tips Outlook Retail Health Phishing Bandwidth IT service Digital Payment Mobile Device Marketing Chrome Excel Business Growth VPN Wi-Fi Risk Management Customer Service Hacking Computers Training Managed Service Administration Government Presentation Augmented Reality Budget User Error Project Management Computer Repair Co-Managed IT Proactive IT Point of Sale Regulations Recovery Mouse Money Social Net Neutrality Running Cable Licensing Data Security File Sharing PowerPoint Inbound Marketing Social Networking Unified Communications Infrastructure Tablet Office 365 Password iPhone Competition Business Intelligence Network Congestion Vulnerability Information Recycling Data loss Blockchain eWaste Downtime HIPAA BDR Search Virtual Desktop USB Piracy Redundancy Help Desk Business Owner Sports Files Hacker Programming Internet Exlporer User Storage Mobility Smart Technology Company Culture Analyitcs Twitter Education Mobile Security Safety Specifications IoT IBM Settings Flexibility Hosted Solution Cost Management Wireless Data storage Save Time Tip of the week Cybercrime Scam Wearable Technology Robot Hiring/Firing Printing Display Alerts End of Support Healthcare LiFi Computing Statistics Intranet Cache Congratulations Microsoft Excel Fun Writing LinkedIn Law Firm IT Wires Video Surveillance Operations Chromebook Data Breach Word Travel Technology Tips Public Speaking Drones Windows 8.1 Update Cookies Management Macro Cortana Social Engineering Best Available Buisness Identities Virtual Private Network Technology Laws Comparison Backups Monitoring Nanotechnology Enterprise Resource Planning How To Permissions Knowledge Environment CIO Solid State Drive Bluetooth MSP IT Technicians Telephony Unified Threat Management Identity Theft Black Friday Legal Online Currency Consulting Samsung Screen Reader Gaming Console Debate Mobile Assessment Fraud Experience Troubleshooting Heating/Cooling Alt Codes Proactive Computer Accessories Mirgation Access Control Cyber Monday Consumers Managed Services Provider Crowdfunding Smart Tech Managing Stress IT Management YouTube Typing Remote Monitoring and Management Business Technology Machine Learning SharePoint IP Address Google Drive Connectivity Enterprise Content Management Network Management How To Refrigeration Cryptocurrency Disaster WPA3 Touchscreen Networking Migration E-Commerce Adminstration Private Cloud Downloads 3D Distributed Denial of Service Google Docs Vulnerabilities Windows 10 Hotspot Bitcoin Digital Signature Fleet Tracking Chatbots Features Public Cloud Multi-Factor Security Software Tips Managed IT Service Memory Star Wars Geography Language Laptop communications Hacks Asset Tracking Identity Electronic Health Records Sync Google Calendar Break Fix Documents Conferencing Utility Computing High-Speed Internet Server Management Computing Infrastructure Scheduling Halloween Techology Entrepreneur Undo OneNote PC Care Mobile Device Managment Legislation Dark Web 5G PDF Value People Development eBay Cooperation Scary Stories Virtual Reality Disaster Resistance Employee-Employer Relationship Remote Support Motherboard Leadership Hard Drive New Additions Data Warehousing Monitors Skype Streaming Media Print Server Cables Text Messaging Patch Management Staff SaaS IT Consulting Deep Learning Software as a Service Domains Google Wallet Remote Workers Work Station Modem G Suite

      Top Blog

      Basically, any machine that uses fans and vents to cool itself can overheat if airflow is restricted. If you have used a laptop on your lap for an extended session, then you know what we are talking about when the computer becomes hot to the touch. Every portable device is designed a little diffe...
      QR-Code