Contact us today!

Network Solutions Unlimited Blog

Is True Wireless Charging Around the Corner?

Is True Wireless Charging Around the Corner?

Wireless charging is a challenging technology. While the benefits are clear as day (imagine, only having the one cord to supply power to the charger itself!), the concept has yet to see the mass implementation and adoption one would expect it to. Today, we’ll look at this underperforming technology’s history, a few applications that could be seen in the future, and the holdups it is seeing currently.

The Charged-Up History of Electricity
As one might imagine, wires have been getting in people’s way since electricity was a widely adopted thing. This was one of the conundrums that Nikola Tesla, the underappreciated inventor and engineer, spent a considerable amount of his life trying to solve. Eventually, he devised a device that would leverage magnetic fields to transfer electricity, a device we know today as the Tesla coil.

Unfortunately, some guerilla marketing from his electric rival, Thomas Alva Edison, turned the public opinion away from Tesla’s approach and towards Edison’s. Basically, Edison took a murderous circus elephant named Topsy that was to be put down and volunteered to do it with Tesla’s electricity. However, not even the film Edison produced of Topsy being exposed to alternating current (a key facet to Tesla’s European-inspired approach) was quite enough to prevent AC from becoming the standard.

Eventually, Tesla’s coil was improved upon further. It ultimately found a place in contemporary radar systems. Yet, even as the technology became more powerful, it was difficult for a market to be found wherein to use it. This had the apparent effect of wasting the work done by the people of multiple private-sector businesses, as well as NASA and the U.S. Department of Energy.

Enter the Smartphone
One of the biggest obstacles to the progress of wireless charging was the fact that, while wireless charging is logically connected to mobile devices, there was a lack of truly mobile devices until recent years. Cellular phones changed that, as the device was now meant to be fully portable, or in other words, mobile. Other devices quickly followed suit with charging capabilities.

However, even this revitalization of wireless charging due to mobile phones couldn’t change one fact: there was always going to need to be a wire. Even the most recent wireless chargers need to be plugged in before they will work, and really, what’s the real difference between plugging in a device, and setting it down just so?

What it Means to Really Be Wireless
In order for any technology that we develop to be marketable, it’s pretty much required to meet two key criteria: it has to work, and it shouldn’t do too much damage to the user.

While this might seem like a relatively low bar, that bar has yet to be met, or even a product introduced that tries. This lack of trying doesn’t reach quite all the way up the chain, however. Companies like Energous in Silicon Valley, Ossia from Bellevue, Washington, and uBeam from Santa Monica, California, have all worked on technologies that do meet the criteria outlined at the beginning of this section. As they find more success in developing uncoupled power solutions, a new paradigm takes form.

Someday, it may not be uncommon to see wireless charging spreading to devices other than smartphones. More and more IoT devices, like wearables, as well as medical devices, like hearing aids, may someday not need a dedicated charge cycle during which it can’t be used. However, until then, we will all have to wait.

Until that day comes, wireless charging will either be ineffective or underutilized… but what devices would you like to be able to charge wirelessly in the future? Tell us which and why in the comments!

Tech Term: Chromebook
4 Strategies to Improving Your Backups


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, December 12 2018

Captcha Image

Mobile? Grab this Article!


Tag Cloud

Identities Telephone Ransomware Two-factor Authentication Adobe Software Risk Management Remote Monitoring How to Business Computing Business Management Security Technology Connectivity IT Support Big Data Tip of the Week Work/Life Balance Rootkit Hosted Solution IT Solutions Evernote Bluetooth Miscellaneous Information App Cortana Windows Ink Instant Messaging End of Support Hard Drive Data Mobile Device Automobile Edge Business Technology MSP Specifications Electronic Medical Records Data Privacy Excel Root Cause Analysis Robot Smartphone iPhone Downtime Windows Data Storage Webinar Workplace Tips Emails Cybersecurity Hacking Legislation Personal Information Automation Project Management HIPAA Identity NFL Internet Accessory Solid State Drive Remote Computing Bring Your Own Device Analysis Display Credit Cards Co-Managed Services Tablets Storage Data Security Efficiency Gifts IT Support Innovation Vendor Data Management Apps Battery Malware Private Cloud Marketing Video Games Cleaning CrashOverride Business Continuity Monitors Memory Microsoft Word Sync Scalability IT Service IT solutions History Microsoft Excel Value Worker Networking intranet Smart Technology Best Practice Politics Two Factor Authentication Managed IT File Sharing PDF Recovery Wasting Time Upgrade Proactive IT Office 365 Saving Money Content Filtering hacker Colocation Productivity Nanotechnology Experience FAQ Operating System Privacy Router Data Loss WPA3 Gmail Wireless Technology Keyboard Shortcuts WiFi Backup Redundancy Google Drive User Tips Managed IT Service Windows 7 Benefits Data Protection Saving Time Hard Drives Microsoft BDR Updates VPN Upgrades Encryption How To Office Tips Business Intelligence Computers Public Cloud Access Control Company Culture Hackers Students Public Computer Chromecast Worker Commute Customer Retail Alert Mobility Software as a Service Employee-Employer Relationship IT budget WannaCry Administration Hard Disk Drive Fraud Going Green Server Emergency Managed Service Business Bandwidth Google Reputation User Error Device Security Save Money Mobile Outlook Computer Firewall Websites Thank You Virtual Reality Application Managed IT Services Books Audit WIndows Server 2008 Twitter Audiobook Travel Touchpad SaaS Google Docs Spam Managed Service Provider Licensing IT Management Financial Technology Budget Loyalty IT Services Relocation Settings Microsoft Office Managed IT Services Physical Security Ciminal Smartphones Education Collaboration Content Consultant Keyboard Management IoT Password Vulnerability Productivity Computer Accessories Payroll Hardware Communication Printing Shadow IT Unified Communications Patch Management Compliance Social Engineering Remote Workers Information Technology Utility Computing Humor Virtualization Human Resources VoIP Outsourced IT Workers Chromebook Data Theft Document Management Internet of Things Safety Passwords Antivirus Laptop Telephone Systems Amazon Google Assistant iOS Peripheral Social Media Gamification Techology Spam Blocking Black Market Computing Infrastructure Hiring/Firing Avoiding Downtime Shortcut Wasting Money Windows 10 Browser Computer Care Wi-Fi Screen Mirroring Augmented Reality Entertainment Quick Tips Financial Managing Stress Touchscreen Printers Training Dark Web Hyperlink Employer Employee Relationship App store Data Recovery Unsupported Software Language Search Commerce Gadgets Streaming Media Charger Lifestyle Internet exploMicrosoft Data storage Hosted Solutions Money Mobile Devices Meetings Regulation Android Chrome Office Sales Windows 10s Samsung BYOD Data Backup Wireless SMB Computer Fan Flexibility Projects Identity Theft The Internet of Things Professional Services Cast Wireless Charging Communications Health Monitor Wireless Internet Congratulations Hybrid Cloud Tech Support Phone System Windows 10 Cybercrime Files Word Proactive Artificial Intelligence Computing Best Practices Testing Update Admin Assessment HBO HaaS Conferencing Unified Threat Management Network Security Mobile Device Management Google Maps Camera Computer Forensics Law Enforcement Apple Government Save Time Troubleshooting Scam Network Tech Term Small Business Users Disaster Recovery Comparison Advertising Sports Maintenance Internet Exlporer Mobile Security Employer-Employee Relationship eWaste File Storage Spyware Vendor Management Virtual Assistant Television Holiday Cache Devices PowerPoint Virus OneNote Data Breach USB Cloud Smart Tech Phishing Cost Management Blockchain Alexa for Business Content Filter Business Owner Transportation Legal Email Monitoring Facebook Cloud Computing Applications