crn5000-inc2015 BPTW logo
Contact us today!
(918) 770-8738

Integrated Business Technologies Blog

Integrated Business Technologies has been serving the Broken Arrow area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Putting Your Old Android Device to Good Use

Considering how often smartphones are replaced, you’re bound to have a couple of them stashed away for a rainy day. These devices are particularly helpful in the event that your smartphone breaks unexpectedly, but there are other purposes that you might want to keep in mind. Here are three ways you might be able to use your old mobile devices around the office.

A Portable Trackpad
There are all sorts of applications out there that can help you use your old phone for any number of uses for your computer. For example, you could use it as an extra controller for various apps or specialized features, allowing for an alternative way to control media playback, among other functionality.

You can achieve this by using the Touchpad app  on the Google Play store. It’s not perfect, but it’s the safest way to download legitimate apps. You should also run the decision by your IT department or IT decision makers to ensure that these apps will be compatible with your technology.

A Universal Remote
An old smart device might be a great way to take control of your other office devices. You can use a universal remote app from the Google Play store to control all sorts of devices around your office, eliminating the need to hold onto that old TV remote. Plus, since you are using just one device for every single television in your office, you don’t need to keep track of multiple remotes. If you have an older smartphone that comes with an onboard IR Blaster, you can utilize it as a TV remote, since many newer smartphones don’t come with one.

Makeshift Security Cameras
There are applications that you can find on the Google Play store that can turn your device into a miniature security camera. You might be surprised by how many different features you can find for this purpose. You can boost your business’ physical security presence, all by logging into a web browser. You can even record the footage and have it activated when detecting motion.

Of course, if you want to take your security seriously, you will want to discuss integrating a network-based IP camera security system.

Donate Your Old Devices to Science
If you choose to donate your device to the Berkeley Open Infrastructure for Network Computing, or BOINC, you will be providing the organization a valuable tool that allows them to advance various research projects. Resources donated to BOINC have been used toward researching the climate, molecular dynamics, genetic sequencing, measuring earthquake magnitude, and much more, all with the intent to make a better and more informed environment.

If this sounds like a better option than letting your devices collect dust in your junk drawer, just download the BOINC app from the Google Play store and select what kind of research you want your phone’s resources to go toward. This app will only run if your device has been charged and plugged in--the app will only work in this way so that your device isn’t being drained from this type of use, and thanks to it only transmitting data via Wi-Fi, you won’t waste any of your data, either.

What are some of your favorite ways to use your old Android devices? Let us know in the comments.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, 22 October 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!


      Tag Cloud

      Security Technology Tip of the Week Privacy Business Management Managed Service Provider Internet Cloud Microsoft Business Computing Best Practices Saving Money Productivity Workplace Tips IT Services Hosted Solutions Hackers Backup Email Malware Business Software Mobile Devices Data IT Support Network Hardware Small Business Communication Server Smartphones Computer VoIP Upgrade Efficiency Business Continuity Google Windows Disaster Recovery Mobile Device Management Innovation Microsoft Office Virtualization Miscellaneous Data Backup Tech Term Mobile Office Outsourced IT Vendor Management Social Media Holiday Gadgets Network Security Quick Tips Passwords BYOD User Tips Mobile Computing Android Browser Smartphone Managed IT services WiFi Bring Your Own Device Windows 10 Productivity Internet of Things The Internet of Things Best Practice Ransomware Spam Remote Monitoring Data Recovery Users Trending Operating System Apple Remote Computing Wireless Technology Artificial Intelligence Alert Data Management Save Money Firewall Encryption Customer Relationship Management Unified Threat Management Content Filtering History Gmail Going Green Office Collaboration Facebook IT Consultant App Router Cloud Computing Managed IT Printer Tech Support Current Events Big Data Information Technology IT Support Analytics IT Solutions Lithium-ion Battery Maintenance Hard Drives Antivirus Phishing Document Management Mobile Device Windows 8 Paperless Office Humor Employer-Employee Relationship Website Saving Time Applications Avoiding Downtime Two-factor Authentication Managed IT Services Fax Server Compliance Automation Office Tips Outlook Retail Health Bandwidth Project Management Cybersecurity IT service Digital Payment Marketing Chrome Excel Business Growth VPN Wi-Fi Risk Management Customer Service Hacking Computers Apps Application Phone System Virus Government Help Desk Budget User Error Managed Service Proactive IT Computer Repair Co-Managed IT Regulations Point of Sale Mouse Files Recovery Money Net Neutrality Running Cable Social Licensing File Sharing PowerPoint Inbound Marketing Social Networking Unified Communications Tablet Data Security Office 365 Password iPhone Infrastructure Healthcare Training Administration Presentation Augmented Reality Search USB Piracy Vulnerability Virtual Desktop Business Owner Information Data loss Blockchain Sports HIPAA Hacker BDR User Programming Redundancy Company Culture Analyitcs Twitter Education Machine Learning Safety Specifications IBM Internet Exlporer Settings Flexibility Hosted Solution Storage Cost Management Wireless Data storage Mobility Smart Technology Mobile Security Cybercrime Save Time Wearable Technology Scam Robot Conferencing IoT Windows 10 Hiring/Firing Display Alerts Printing End of Support Tip of the week LiFi Computing Statistics Intranet Competition Business Intelligence Network Congestion Recycling eWaste Downtime Remote Workers Microsoft Excel Knowledge Environment CIO Cache Bluetooth Wires Operations Politics Data Breach Solid State Drive Legal Online Currency Samsung Gaming Console Cookies Favorites Meetings Technology Tips Experience Troubleshooting Debate Management Computer Accessories Virtual Private Network Telephony Technology Laws Heating/Cooling Alt Codes Consumers Monitoring Crowdfunding Nanotechnology Instant Messaging Comparison How To Permissions YouTube Enterprise Resource Planning MSP IT Technicians Unified Threat Management Typing IP Address Google Drive Screen Reader Identity Theft Black Friday Assessment Fraud How To Mobile Disaster Proactive Touchscreen Adminstration Mirgation Consulting Access Control Refrigeration Cryptocurrency Google Docs 3D Smart Tech Cyber Monday IT Management Managing Stress Digital Signature Remote Monitoring and Management Business Technology Managed Services Provider Private Cloud SharePoint Bitcoin Memory Connectivity Network Management Laptop communications Enterprise Content Management WPA3 Migration E-Commerce Public Cloud Downloads Hacks Documents Distributed Denial of Service Scheduling Hotspot Halloween Networking Entrepreneur Vulnerabilities Fleet Tracking Chatbots Features PC Care Sync Multi-Factor Security Undo 5G PDF Value People Star Wars Software Tips Managed IT Service Geography eBay Language Scary Stories Virtual Reality Asset Tracking Remote Support Identity Electronic Health Records Leadership Mobile Device Managment Google Calendar Break Fix Monitors Skype Streaming Media Utility Computing New Additions High-Speed Internet Text Messaging Server Management Computing Infrastructure SaaS Techology Deep Learning Print Server OneNote Work Station Cyberattacks Legislation Domains Google Wallet Dark Web Fun Writing LinkedIn Congratulations Development Video Surveillance Cooperation Chromebook Disaster Resistance Word Law Firm IT Drones Windows 8.1 Update Employee-Employer Relationship Motherboard Read Only G Suite Public Speaking Macro Data Warehousing Cortana Social Engineering Best Available Buisness Hard Drive Cables Patch Management Staff IT Consulting Identities Backups Modem Bookmarks Travel Software as a Service

      Top Blog

      Basically, any machine that uses fans and vents to cool itself can overheat if airflow is restricted. If you have used a laptop on your lap for an extended session, then you know what we are talking about when the computer becomes hot to the touch. Every portable device is designed a little diffe...