crn5000-inc2015 BPTW logo
Contact us today!
(918) 770-8738
 
 

Integrated Business Technologies Blog

Integrated Business Technologies has been serving the Broken Arrow area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Lessons Your Business Can Learn From the Galaxy Note 7 and 8

Samsung fans are getting geared up for the release of their new smartphone, the Galaxy Note 8. Even though it might seem as though the technology world has moved on from the exploding Note 7, you can be sure that Samsung is still feeling the reverberations from last year’s debacle that resulted from the now-infamous exploding of their much-anticipated Galaxy Note 7.

As many of you will remember, the fall of 2017 saw the debut of the Galaxy Note 7 met almost immediately with a permanent halt in production after a massive world-wide recall was issued by Samsung because of an issue that caused the Note 7’s battery to produce excessive heat and catch on fire. Reports of exploding Note 7s and the resulting bad press damaged Samsung’s reputation so much that they’re now struggling to regain market share with the upcoming release of their Note 8.

What precautions has Samsung taken to prevent Note 8 from exploding? Well, for starters, their phones are now put through their ‘eight-step battery safety test’, which includes: durability testing, visual inspection, X-rays, charge and discharge tests, tests of total volatile organic compounds (TVOC), disassembling tests, accelerated usage tests, and open circuit voltage tests. That’s not to say that all these steps are brand new methods of testing of battery safety. Many of the steps were in place before but have been ‘enhanced’ after the exploding Note 7 batteries.

Additionally, the Note 8 has a smaller battery than its predecessor and is equipped with a stronger barrier between battery and rest of the phone. There have been no safety concerns reported thus far, but the Note 8 is still only in the infancy of its launch.

One thing that Samsung has had to focus on throughout the last year is mitigating the damage to its reputation. In February 2017, the annual Harris reputation poll showed just how much damage the exploding Note 7 had done, having gone from being ranked 7th highest regarded company in 2016, before the Note 7, to 49th in 2017, after the exploding phone was recalled and discontinued.

The development and production of the Note 8 has Samsung being uncharacteristically transparent with processes, going the extra mile to demonstrate their attention to safety concerns and details. They are aware that the damage caused by the Note 7 will likely be a point of hesitation to many of those considering a newer Note 8.

We’d love to hear your opinion on this technology hot button issue! Are you going to give the Note 8 a shot? Or are you still hesitant because of the exploding Note 7? How many of you decided to move away from Samsung products all together? Let us know in the comments!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 17 October 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      freeconsultation
       

      Tag Cloud

      Security Technology Privacy Managed Service Provider Business Management Tip of the Week Internet Microsoft Saving Money Cloud Productivity Business Computing Workplace Tips Backup Best Practices IT Services Hackers Hosted Solutions IT Support Mobile Devices Hardware Business Network Malware Email Small Business Software Data Communication Smartphones Upgrade Windows Server Business Continuity Mobile Device Management VoIP Virtualization Microsoft Office Disaster Recovery Google Efficiency Miscellaneous Mobile Office Computer Gadgets Vendor Management Innovation Social Media Quick Tips Holiday WiFi Windows 10 Mobile Computing BYOD Bring Your Own Device Smartphone Best Practice User Tips Passwords Apple Spam Users Trending Remote Monitoring Wireless Technology Operating System Content Filtering Remote Computing Going Green Android History Alert Internet of Things The Internet of Things Browser Network Security Current Events Information Technology Firewall Big Data Office IT Solutions Unified Threat Management Lithium-ion Battery Save Money Managed IT services IT Consultant Printer Ransomware Tech Support Humor Saving Time Gmail Avoiding Downtime Hard Drives App Analytics Customer Relationship Management Data Management Facebook Windows 8 Marketing Excel Office Tips Antivirus Retail Phishing IT service Artificial Intelligence Managed IT Data Backup Business Growth Apps Application Virus Customer Service Hacking Computers Maintenance Fax Server Outsourced IT Phone System Outlook Health Collaboration Automation Computer Repair Proactive IT Router Recovery Inbound Marketing Running Cable Social Mobile Device Digital Payment PowerPoint VPN Risk Management Training Employer-Employee Relationship iPhone Password Co-Managed IT Administration Presentation Budget Sports Project Management Hacker User Point of Sale Programming Cybersecurity Mouse Money Analyitcs Education Mobility Document Management Safety Net Neutrality Hosted Solution Licensing IBM Settings Wireless Data storage Chrome Cybercrime File Sharing Save Time Social Networking Robot Hiring/Firing Printing Display Tablet End of Support LiFi Website Statistics Help Desk Files User Error Intranet Competition Business Intelligence Network Congestion Data Recovery Downtime Augmented Reality Two-factor Authentication Search Virtual Desktop USB Piracy Business Owner Encryption Mobile Device Managment Heating/Cooling Alt Codes Computer Accessories Crowdfunding Consumers YouTube Scam Regulations Typing Twitter Scheduling Networking IP Address Google Drive Company Culture Bandwidth How To Refrigeration Cryptocurrency Disaster Touchscreen Data Security Google Docs Specifications Flexibility Software Tips Cost Management Bitcoin Digital Signature Memory Techology Laptop communications Hacks Wearable Technology Documents Conferencing Disaster Resistance Wi-Fi Halloween SaaS Entrepreneur Unified Communications Alerts Macro PC Care Managed IT Services Undo PDF Value People IT Consulting 5G Scary Stories Telephony eBay Remote Support Leadership Data loss Computing Skype Streaming Media New Additions Data Breach Office 365 Monitors Deep Learning Print Server Gaming Console Text Messaging Work Station Tip of the week Domains Google Wallet LinkedIn Congratulations Technology Laws Fun Writing Private Cloud Word Law Firm IT Video Surveillance Recycling Public Speaking Drones Windows 8.1 Update Best Available eWaste Buisness Unified Threat Management Cortana Social Engineering Public Cloud Identities Virtual Private Network Backups Environment CIO Adminstration Knowledge Sync Solid State Drive Bluetooth 3D Samsung Redundancy Legal Online Currency Troubleshooting Debate Experience Compliance

      Top Blog

      Basically, any machine that uses fans and vents to cool itself can overheat if airflow is restricted. If you have used a laptop on your lap for an extended session, then you know what we are talking about when the computer becomes hot to the touch. Every portable device is designed a little diffe...
      QR-Code