Contact us today!

Network Solutions Unlimited Blog

Is True Wireless Charging Around the Corner?

Is True Wireless Charging Around the Corner?

Wireless charging is a challenging technology. While the benefits are clear as day (imagine, only having the one cord to supply power to the charger itself!), the concept has yet to see the mass implementation and adoption one would expect it to. Today, we’ll look at this underperforming technology’s history, a few applications that could be seen in the future, and the holdups it is seeing currently.

The Charged-Up History of Electricity
As one might imagine, wires have been getting in people’s way since electricity was a widely adopted thing. This was one of the conundrums that Nikola Tesla, the underappreciated inventor and engineer, spent a considerable amount of his life trying to solve. Eventually, he devised a device that would leverage magnetic fields to transfer electricity, a device we know today as the Tesla coil.

Unfortunately, some guerilla marketing from his electric rival, Thomas Alva Edison, turned the public opinion away from Tesla’s approach and towards Edison’s. Basically, Edison took a murderous circus elephant named Topsy that was to be put down and volunteered to do it with Tesla’s electricity. However, not even the film Edison produced of Topsy being exposed to alternating current (a key facet to Tesla’s European-inspired approach) was quite enough to prevent AC from becoming the standard.

Eventually, Tesla’s coil was improved upon further. It ultimately found a place in contemporary radar systems. Yet, even as the technology became more powerful, it was difficult for a market to be found wherein to use it. This had the apparent effect of wasting the work done by the people of multiple private-sector businesses, as well as NASA and the U.S. Department of Energy.

Enter the Smartphone
One of the biggest obstacles to the progress of wireless charging was the fact that, while wireless charging is logically connected to mobile devices, there was a lack of truly mobile devices until recent years. Cellular phones changed that, as the device was now meant to be fully portable, or in other words, mobile. Other devices quickly followed suit with charging capabilities.

However, even this revitalization of wireless charging due to mobile phones couldn’t change one fact: there was always going to need to be a wire. Even the most recent wireless chargers need to be plugged in before they will work, and really, what’s the real difference between plugging in a device, and setting it down just so?

What it Means to Really Be Wireless
In order for any technology that we develop to be marketable, it’s pretty much required to meet two key criteria: it has to work, and it shouldn’t do too much damage to the user.

While this might seem like a relatively low bar, that bar has yet to be met, or even a product introduced that tries. This lack of trying doesn’t reach quite all the way up the chain, however. Companies like Energous in Silicon Valley, Ossia from Bellevue, Washington, and uBeam from Santa Monica, California, have all worked on technologies that do meet the criteria outlined at the beginning of this section. As they find more success in developing uncoupled power solutions, a new paradigm takes form.

Someday, it may not be uncommon to see wireless charging spreading to devices other than smartphones. More and more IoT devices, like wearables, as well as medical devices, like hearing aids, may someday not need a dedicated charge cycle during which it can’t be used. However, until then, we will all have to wait.

Until that day comes, wireless charging will either be ineffective or underutilized… but what devices would you like to be able to charge wirelessly in the future? Tell us which and why in the comments!

Tech Term: Chromebook
4 Strategies to Improving Your Backups


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, September 22 2018

Captcha Image

Mobile? Grab this Article!


Tag Cloud

Computer Fan Files Financial Technology Virtual Assistant HIPAA Cloud Computing Bluetooth Wasting Money Adobe WiFi Password Computer Training Fraud Encryption Internet Exlporer Data Breach Google Data Security Security NFL Cortana Ransomware Patch Management Instant Messaging Risk Management Alert Webinar Thank You WPA3 Computers CrashOverride Lifestyle Comparison Cloud Public Computer Big Data Experience Government Computer Care Updates Benefits Google Maps Spam Blocking Privacy Recovery Device Security Advertising Unified Threat Management History Computer Forensics Monitors Vulnerability Samsung Streaming Media Sync Screen Mirroring Content Filter Robot Sports Best Practices Administration Charger Wireless Charging Productivity Employee-Employer Relationship Cost Management Upgrades Public Cloud Alexa for Business Proactive Microsoft Office Relocation Hiring/Firing Electronic Medical Records Credit Cards Television Websites USB Video Games Data Backup Hackers Identity Automation Vendor Management Root Cause Analysis Health Windows 10s Dark Web Budget Apps Unified Communications Gadgets Users Information Black Market Windows Ink Students End of Support intranet Mobile Device Management Disaster Recovery Google Assistant Travel Worker Commute Word Hybrid Cloud Google Drive IT Management Marketing Projects HBO How To Private Cloud Troubleshooting Printing Cleaning Backup Virtual Reality Content Humor Network Security Holiday Productivity Innovation Excel Chrome Tablets Unsupported Software Computing Infrastructure Emergency Physical Security Google Docs Content Filtering Mobile Security Redundancy Computer Accessories Identities Bring Your Own Device Two Factor Authentication VoIP Wi-Fi Augmented Reality Office Tips Hacking Managed IT Small Business Cast Chromebook FAQ Hardware Monitoring Managed IT Services Mobile Devices Blockchain Gamification Chromecast Upgrade Battery Flexibility Update Vendor Cache Commerce Save Money Server Books Wireless Internet Work/Life Balance Personal Information File Storage Storage Microsoft Social Engineering Data Protection IT Support User Error Best Practice Business Browser Twitter Efficiency Phishing Gifts Audit Software Sales Business Technology Business Owner IT Solutions Data Loss VPN Apple Employer Employee Relationship Settings Internet Devices Search Data Recovery App store Application WannaCry Workers Managed IT Service Compliance Congratulations Licensing Windows Touchscreen Malware Keyboard Router Data Theft Ciminal Information Technology Windows 10 Social Media Cybercrime Connectivity Business Management Identity Theft HaaS Hosted Solutions Management Facebook Professional Services Conferencing Artificial Intelligence Worker Amazon Customer Antivirus Solid State Drive PDF Telephone Systems Testing Save Time Internet of Things Communications Money Project Management Legislation Scalability Computing Office Business Continuity hacker Law Enforcement Network Bandwidth iOS Spam Mobility Value Touchpad Business Computing IT Support Shortcut Meetings Data Reputation Tech Support Saving Money Shadow IT Tech Term BYOD Transportation eWaste Employer-Employee Relationship Communication Language Consultant Managing Stress Mobile Device Outsourced IT Data Management Internet exploMicrosoft OneNote Smart Technology IT budget Going Green Mobile Scam Nanotechnology Microsoft Word Two-factor Authentication Safety Analysis Spyware Proactive IT The Internet of Things Cybersecurity Remote Monitoring Maintenance Printers Office 365 Regulation Techology Tip of the Week Phone System Hosted Solution BDR Workplace Tips App WIndows Server 2008 How to Managed Service Audiobook Entertainment Wireless Technology Rootkit IT Services Networking iPhone Data Storage Miscellaneous Gmail Document Management Quick Tips Retail User Tips Data storage Email Avoiding Downtime Downtime Wireless Managed Service Provider Passwords IoT Financial Smartphones Collaboration MSP Business Intelligence Edge Loyalty Smartphone Applications Hard Drives Legal Virus IT solutions Firewall Education Camera Automobile Politics Windows 10 Monitor Assessment SaaS Hard Disk Drive Hard Drive Memory Technology File Sharing Evernote Emails Android Remote Computing Software as a Service Operating System Data Privacy Virtualization Laptop Outlook Colocation PowerPoint Microsoft Excel Company Culture Specifications Smart Tech Managed IT Services