Contact us today!
217-428-6449

Network Solutions Unlimited Blog

Wireless Charging Just Got an Upgrade… But is That Good?

Wireless Charging Just Got an Upgrade… But is That Good?

Wireless charging seems to be a perfect idea - imagine if someday, our devices would never run out of charge? This may be why such aggressive progress has been made toward building a better battery charger. However, not everyone is convinced that wireless charging will have the effects that are desired of it.

Where the Technology Stands Now
Wireless charging capabilities are fairly common at this point in time. Many mobile devices now have the built-in capability to be charged wirelessly, as long as they are positioned properly on a special charging pad. However, a company called Ossia has been formed to develop wireless charging that can take place at a distance via trickle charging capabilities.

This method of delivering power leverages radio frequencies to send both data and power to the connected device. Taking advantage of this newly developed potential, Ossia has worked to develop new conduits to deliver this power, leaving the charging pads typical of wireless charging in favor of a wider variety of devices under its Cota line. Instead of requiring the device to be physically touching the power source in order to charge, signals are bounced around objects in the environment to deliver both power and Wi-Fi connectivity.

Ossia’s new charging system includes components like AA batteries that can be charged wirelessly, as well as drop ceiling tiles that send the signals out to the devices.

Is This Necessarily a Good Thing?
Of course, there is no questioning the convenience that this kind of technology could provide (especially if it was standardized), but there is the question of the affect it could have on the device. Take smartphones, for instance: what does constantly keeping a device’s battery fully charged ultimately do to the device in question?

Unfortunately, nothing good. While “overcharging” is no longer a concern, the makeup of modern batteries means that they can still suffer some damage. The explanation lies in its chemistry.

Lithium-ion batteries have three essential components to their proper operation: a positive and negative electrode (made of a lithium-based compound and carbon graphite, respectively) and some kind of electrolyte. As the battery charges, lithium ions move from the positive electrode to the negative electrode via the electrolyte to be stored as energy. When this power is used, the ions move back to the positive electrode.

Over time, this process wears away the electrolyte that allows the ions to move back and forth, ultimately preventing them from doing so efficiently (or even successfully). Without the ions being able to move, the battery isn’t going to work as well. As a result of this phenomenon, every battery only has a certain number of charge cycles in it before it is rendered ineffective.

The argument is that, by constantly charging the battery, wireless charging eats away at the battery’s lifespan. Others argue that keeping the battery topped off actually allows the battery to remain effective for longer. Some take the argument one step further to say that the convenience of a fully-charged device is worth the cost of a replacement battery if need be.

What do you think? Will wireless charging take off, despite these concerns about battery life and longevity? Let us know in the comments section, and make sure you take a moment and subscribe to our blog!

Leave the Big Stuff Home: Productivity On the Go
Tip of the Week: Changing Your Network Profile
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, November 21 2018

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

Phishing Evernote Computer Fan Mobile Security Electronic Medical Records Content Filter Cybercrime Network Miscellaneous Benefits Utility Computing Computer Accessories Updates Proactive IT Update Windows 10s Windows 10 Business Intelligence SaaS Amazon Virtual Assistant Mobile Privacy PowerPoint Websites Monitor Efficiency Connectivity Software as a Service Humor Data Privacy Gadgets Saving Time Cloud Hosted Solution Fraud Cybersecurity Credit Cards Spam Personal Information Bluetooth Redundancy Mobile Device Management Experience Mobility BDR Financial Technology IT Services Excel Gifts Storage Data storage WIndows Server 2008 Vulnerability Windows Tip of the Week Physical Security Gmail Management Nanotechnology Charger Computing Settings Software Flexibility Managed IT Gamification Tech Term Twitter WannaCry Big Data Admin Audit Virtual Reality Mobile Device Customer Devices Internet Exlporer Professional Services Lifestyle Microsoft HIPAA Computer Forensics Downtime Hard Drive Malware Language Best Practices Recovery Business Computing Two Factor Authentication Employer-Employee Relationship Tablets Commerce Licensing Monitors Windows 10 Laptop Books Legislation Computing Infrastructure WiFi Solid State Drive Wireless Internet Windows Ink Vendor Management Congratulations Reputation Computers Word Thank You Smartphone Remote Monitoring Social Engineering Chromecast Passwords Access Control Battery HaaS Social Media Employer Employee Relationship hacker Data Storage Business Owner Spam Blocking Business Management Managed IT Services Innovation Wasting Time Ciminal Content Filtering Marketing Communication CrashOverride Outlook Apps Sales Mobile Devices Alexa for Business Collaboration Blockchain Search Google Docs Upgrade Rootkit Unified Communications Bring Your Own Device Browser Backup Wireless Charging Dark Web Computer Care Communications IT Management WPA3 Cortana Budget Identities Emergency Email Business Technology Maintenance Managed Service Provider Phone System Microsoft Excel Loyalty Scam Router Facebook Spyware Wireless Technology Document Management Hardware Colocation Remote Computing Legal Analysis Windows 7 Information Technology Server Automation Instant Messaging iOS User Error Security Outsourced IT Files Television Augmented Reality Law Enforcement Artificial Intelligence Data Identity Memory Internet of Things Telephone Systems Hackers Two-factor Authentication intranet App Peripheral Workers Encryption Video Games Testing Cast Android Training Content Webinar Applications NFL Antivirus iPhone Data Recovery Networking Data Protection Smart Technology Internet exploMicrosoft Bandwidth Quick Tips Sports Network Security Ransomware Office Tips Shadow IT Keyboard End of Support Data Backup Government Adobe eWaste Managed Service File Sharing Google Data Security Wasting Money Managed IT Services Productivity Worker Commute Compliance Cloud Computing Chromebook Hyperlink Transportation Google Maps Alert User Tips Office Camera VPN Printers VoIP Safety Employee-Employer Relationship Technology Conferencing Firewall Screen Mirroring Office 365 Relocation PDF Wireless Tech Support Politics Upgrades Virus Streaming Media Hacking IT budget Keyboard Shortcuts Regulation Work/Life Balance Patch Management How To Productivity Smart Tech Travel Data Management Display Meetings Cleaning Google Drive IT Support Black Market Worker Business Continuity BYOD Money Data Loss Best Practice Cost Management Scalability Monitoring Consultant Sync USB The Internet of Things Smartphones App store Workplace Tips Information Specifications Save Time Printing Application Hybrid Cloud File Storage Projects Touchscreen Wi-Fi Public Computer Private Cloud Hiring/Firing Hosted Solutions Business IT Support Unsupported Software Small Business Data Theft IoT MSP Troubleshooting Chrome Disaster Recovery Edge Google Assistant Going Green Samsung FAQ Financial Audiobook Apple Virtualization Entertainment Save Money Proactive Education Techology How to Touchpad Password Project Management Accessory Root Cause Analysis History Microsoft Word Automobile Shortcut OneNote Hard Disk Drive IT Solutions Managed IT Service Saving Money Retail Robot Operating System Public Cloud Device Security Co-Managed Services Advertising HBO Company Culture Health Students Internet Holiday Data Breach Computer Cache Assessment Users Microsoft Office Identity Theft Telephone IT solutions Comparison Value Unified Threat Management Emails Risk Management Vendor Administration Hard Drives Managing Stress Avoiding Downtime