Get Started Today!  217-475-0226

Decatur Computers Inc. Blog

Decatur Computers Inc. has been serving the Decatur area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Don’t Let Your Old Android Device go to Waste

Tip of the Week: Don’t Let Your Old Android Device go to Waste

Unless you’re the trade-in or hand-me-down kind of person, it’s likely that you have a supply of old Android devices squirrelled away somewhere. You know, just in case the one who have now breaks. However, these old devices can be useful in other ways around the office. For this week’s tip, we’ll go over three alternate uses for your mobile device in the office.

Portable Trackpad
There are assorted applications available that allow you to link your old phone to your computer and use it as an alternative controller to your mouse. These apps often offer specialized features that give you better control over media playback and other useful workplace utilities.

Just be sure to install whatever app you select from the Google Play store, as it is the safest option out there for downloading apps. However, you should also make sure that your IT department signs off on you adding these apps to devices used for work.

Universal Remote
If you happen to use smart devices in your office, your old phone could become a central control hub for them. Download the necessary apps from the Google Play store, and in no time, you’ll be able to control any of the gadgets you have installed around your office with a dedicated remote, eliminating the need for the bulky included remotes that accompany many of these devices, as well as the need to take up space on your current mobile phone.

Security Camera
Similarly to using your old device as a universal remote, you can find apps on Google Play that can turn it into a security camera with a few different features. By doing so, you can boost your office’s security with the option to check in on goings-on via a web browser, record the footage, and even have the camera activate when motion is detected.

Bonus Purpose: Donate the Phone to BOINC
The Berkeley Open Infrastructure for Network Computing, or BOINC, allows you to donate the computing resources of your old phone to assist research teams in their efforts towards scientific breakthroughs. So far, resources dedicated to BOINC have powered research into the climate, molecular dynamics, genetic sequencing, measured the efficacy of malaria treatments and the power of earthquakes, as well as many other scientific causes.

To participate, all you have to do is download the BOINC app from the Google Play Store and select what research you want to commit your phone’s resources to. The app will only run if your device is both charged and plugged in, as so not to leave you with a drained phone, and can be set to only transmit data over Wi-Fi, saving your data.

What other uses have you come up with for your old Android devices? Let us know in the comments, and make sure to subscribe to our blog!

20-Year-Old Exploit Finds New Life as ROBOT
Scam Leverages Email from a Reluctant Contract Kil...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, June 24 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Privacy Technology Network Security Hackers IT Support Business Computing Cybersecurity Android Tech Term Smartphone Business Management Malware User Tips Internet Google Email Small Business Managed IT Services Ransomware Software Backup Innovation Data Recovery Productivity Artificial Intelligence Windows 10 Data Business Cloud Cybercrime Data Backup Efficiency Business Technology Phishing Communications Cost Management IT Management Saving Money App Outsourced IT Hardware IT Services Data Security Encryption Gadgets Blockchain Antivirus Mobile Device Management Collaboration Patch Management Network Hard Drive Computer Update Managed IT Services Hacking Business Continuity Disaster Recovery Project Management Access Control Mobile Device Data Protection BDR Data Breach Office 365 Alert Automation Applications Windows Apps VPN Server Internet of Things Operating System Bitcoin Facebook SaaS Maintenance Remote Monitoring Social Engineering Money Search Microsoft Office Social Media Gmail Save Money Touchscreen Spam Word Vulnerabilities Document Management Digital Microsoft Start Menu Law Enforcement Passwords Bandwidth Browser Scam Holiday Websites Laptop Data Management Smartphones Data loss Tech Terms Government Uninterrupted Power Supply How to Apple Chromebook Comparison Desktop Service Level Agreement Fake News Worker Google Drive Devices Legal Downtime Virus Emails Backup and Disaster Recovery Going Green Managed Service Provider Big Data Cloud Computing Telephony Samsung Compliance Google Maps Hard Drive Disposal Downloads Piracy History Specifications Unified Threat Management YouTube Bluetooth Download Emergency Microsoft Excel VoIP Regulations email scam VoIp Software License IBM Television Settings Wireless Headphones Automobile Printer Mobile Security Upload Vulnerability Cryptocurrency Hosted Solutions Accountants Audit Mobile Devices Mobility Mouse Best Practice Administration Cleaning Paperless Office Two-factor Authentication Trends DDoS Employer-Employee Relationship Time Management Corporate Profile Training eWaste Information Technology Managed IT Unsupported Software Computers Database Multi-factor Authentication Gamification Password Equifax Computer Care Robot Google Calendar Mobile Technology Nanotechnology Tactics Device security Excel Unified Threat Management Startup Augmented Reality Outlook SharePoint Upgrades Addiction Website Content Disaster Tip of the week Vendor Mangement Computing Infrastructure Screen Reader Google Docs Virtual Reality Distributed Denial of Service Access Machine Learning Running Cable Business Mangement Unified Communications Networking Solid State Drive WiFi Legislation Communication Budget Company Culture Redundancy Freedom of Information Telephone Systems Spyware Cabling IT Support HTML Knowledge Cortana Printing Business Cards Software as a Service Wireless Tablet Virtualization Conferencing Identity Theft Network Management News Consultant Analytics Virtual Assistant Twitter Office Users CrashOverride Office Tips Managing Stress Multi-Factor Security Windows 10 BYOD Marketing

Latest Blog

IT support is one of the most important parts of any modern business simply because it’s just not feasible to run a business without any form of technology at its core. For example, most businesses rely on email and other forms of communication, whereas stores might require ...

Latest News

Decatur Computers Inc. is proud to announce the launch of our new website at http://www.decaturcomputers.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.