Contact us today!

Network Solutions Unlimited Blog

Is True Wireless Charging Around the Corner?

Is True Wireless Charging Around the Corner?

Wireless charging is a challenging technology. While the benefits are clear as day (imagine, only having the one cord to supply power to the charger itself!), the concept has yet to see the mass implementation and adoption one would expect it to. Today, we’ll look at this underperforming technology’s history, a few applications that could be seen in the future, and the holdups it is seeing currently.

The Charged-Up History of Electricity
As one might imagine, wires have been getting in people’s way since electricity was a widely adopted thing. This was one of the conundrums that Nikola Tesla, the underappreciated inventor and engineer, spent a considerable amount of his life trying to solve. Eventually, he devised a device that would leverage magnetic fields to transfer electricity, a device we know today as the Tesla coil.

Unfortunately, some guerilla marketing from his electric rival, Thomas Alva Edison, turned the public opinion away from Tesla’s approach and towards Edison’s. Basically, Edison took a murderous circus elephant named Topsy that was to be put down and volunteered to do it with Tesla’s electricity. However, not even the film Edison produced of Topsy being exposed to alternating current (a key facet to Tesla’s European-inspired approach) was quite enough to prevent AC from becoming the standard.

Eventually, Tesla’s coil was improved upon further. It ultimately found a place in contemporary radar systems. Yet, even as the technology became more powerful, it was difficult for a market to be found wherein to use it. This had the apparent effect of wasting the work done by the people of multiple private-sector businesses, as well as NASA and the U.S. Department of Energy.

Enter the Smartphone
One of the biggest obstacles to the progress of wireless charging was the fact that, while wireless charging is logically connected to mobile devices, there was a lack of truly mobile devices until recent years. Cellular phones changed that, as the device was now meant to be fully portable, or in other words, mobile. Other devices quickly followed suit with charging capabilities.

However, even this revitalization of wireless charging due to mobile phones couldn’t change one fact: there was always going to need to be a wire. Even the most recent wireless chargers need to be plugged in before they will work, and really, what’s the real difference between plugging in a device, and setting it down just so?

What it Means to Really Be Wireless
In order for any technology that we develop to be marketable, it’s pretty much required to meet two key criteria: it has to work, and it shouldn’t do too much damage to the user.

While this might seem like a relatively low bar, that bar has yet to be met, or even a product introduced that tries. This lack of trying doesn’t reach quite all the way up the chain, however. Companies like Energous in Silicon Valley, Ossia from Bellevue, Washington, and uBeam from Santa Monica, California, have all worked on technologies that do meet the criteria outlined at the beginning of this section. As they find more success in developing uncoupled power solutions, a new paradigm takes form.

Someday, it may not be uncommon to see wireless charging spreading to devices other than smartphones. More and more IoT devices, like wearables, as well as medical devices, like hearing aids, may someday not need a dedicated charge cycle during which it can’t be used. However, until then, we will all have to wait.

Until that day comes, wireless charging will either be ineffective or underutilized… but what devices would you like to be able to charge wirelessly in the future? Tell us which and why in the comments!

Tech Term: Chromebook
4 Strategies to Improving Your Backups


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, 22 May 2018

Captcha Image

Mobile? Grab this Article!


Tag Cloud

Solid State Drive Communication Chromebook Collaboration Keyboard How To intranet Password Phone System BYOD Project Management Office Tips Audit SaaS Evernote Internet exploMicrosoft Physical Security Data Management Value Spyware Google Drive Operating System Efficiency Spam Blocking Reputation Business Intelligence Money Colocation WIndows Server 2008 Scalability Entertainment Router FAQ Devices Audiobook Robot Productivity Email Data Protection iOS Comparison Remote Monitoring Recovery Software Internet Exlporer Wi-Fi Android Holiday Business Computing Battery Electronic Medical Records VoIP Public Computer Ciminal Marketing Chromecast Monitors Artificial Intelligence Wireless Security MSP Fraud User Error Save Money Smartphones hacker IT budget Management Content Filter Budget Identity Theft Edge Big Data Cloud Thank You Update Cloud Computing Automobile Cast Hacking Benefits Downtime Advertising Search Server Automation Identities Samsung Workplace Tips Administration Specifications Data Recovery Smart Tech IT Management Mobile Device Small Business Computer Managed IT Services Outsourced IT Microsoft Word Risk Management Private Cloud Black Market OneNote Backup IT Services Avoiding Downtime Cost Management Analysis Tech Term Scam Bandwidth Virtual Reality Wireless Technology Social Engineering Quick Tips Miscellaneous Charger Chrome Business Continuity Hosted Solutions Legal Training Credit Cards Maintenance Shortcut Emails Adobe Humor Meetings Techology Application Business Vendor Management Information Technology Streaming Media Encryption Retail Emergency Microsoft Legislation Communications Travel Wireless Charging Best Practice Telephone Systems Lifestyle Assessment Instant Messaging Spam Unsupported Software Mobile Devices Phishing Data Loss Content Filtering Computer Forensics NFL Law Enforcement Google Safety Tablets Television Cleaning IoT Proactive Video Games End of Support Word Office 365 Loyalty Best Practices Business Management Transportation Hard Disk Drive Work/Life Balance Bluetooth Disaster Recovery Managed IT Services Rootkit Alert Browser Two Factor Authentication IT Support Microsoft Office Monitoring Government Licensing Congratulations Managed Service Provider Monitor Root Cause Analysis Tip of the Week Laptop Hardware Smartphone Redundancy Hard Drives Shadow IT Employer Employee Relationship Innovation Gifts Mobile Security Windows 10s Touchscreen Cortana Storage Technology Applications Saving Money Windows 10 Social Media Workers eWaste WiFi IT Support Office Worker Commute Windows 10 Updates Hard Drive iPhone History Professional Services Save Time Managed IT Service Hackers Data Theft Apple Education How to Mobile Conferencing Computer Accessories Facebook Data Security Users HBO Remote Computing Vulnerability Sync Cache Financial Technology Twitter File Sharing HIPAA Sales IT Solutions Unified Threat Management Software as a Service Network Outlook Tech Support Mobile Device Management Compliance Managed IT Books Business Owner Gadgets Smart Technology IT solutions Relocation Bring Your Own Device Data storage Google Maps The Internet of Things Upgrade Dark Web VPN Productivity Device Security Language Employer-Employee Relationship Windows Ink Mobility Proactive IT Computer Fan Customer Regulation Ransomware Commerce Privacy Data Privacy Blockchain Two-factor Authentication Webinar Gmail Computing Infrastructure Upgrades Document Management Patch Management Settings Content Windows Worker Cybercrime Touchpad Google Docs Data Virus PDF Flexibility Personal Information Internet Troubleshooting Computer Care Printing Identity Websites Screen Mirroring Politics Network Security Antivirus Files App store Networking Experience User Tips Virtualization Going Green App Computers BDR WannaCry Computing Public Cloud Connectivity Nanotechnology Firewall Apps HaaS Hybrid Cloud Malware Internet of Things Passwords USB Data Storage Cybersecurity Hosted Solution Health Hiring/Firing Microsoft Excel Augmented Reality Excel Sports Consultant Data Breach Google Assistant CrashOverride Data Backup