Contact us today!

Network Solutions Unlimited Blog

Wireless Charging Just Got an Upgrade… But is That Good?

Wireless Charging Just Got an Upgrade… But is That Good?

Wireless charging seems to be a perfect idea - imagine if someday, our devices would never run out of charge? This may be why such aggressive progress has been made toward building a better battery charger. However, not everyone is convinced that wireless charging will have the effects that are desired of it.

Where the Technology Stands Now
Wireless charging capabilities are fairly common at this point in time. Many mobile devices now have the built-in capability to be charged wirelessly, as long as they are positioned properly on a special charging pad. However, a company called Ossia has been formed to develop wireless charging that can take place at a distance via trickle charging capabilities.

This method of delivering power leverages radio frequencies to send both data and power to the connected device. Taking advantage of this newly developed potential, Ossia has worked to develop new conduits to deliver this power, leaving the charging pads typical of wireless charging in favor of a wider variety of devices under its Cota line. Instead of requiring the device to be physically touching the power source in order to charge, signals are bounced around objects in the environment to deliver both power and Wi-Fi connectivity.

Ossia’s new charging system includes components like AA batteries that can be charged wirelessly, as well as drop ceiling tiles that send the signals out to the devices.

Is This Necessarily a Good Thing?
Of course, there is no questioning the convenience that this kind of technology could provide (especially if it was standardized), but there is the question of the affect it could have on the device. Take smartphones, for instance: what does constantly keeping a device’s battery fully charged ultimately do to the device in question?

Unfortunately, nothing good. While “overcharging” is no longer a concern, the makeup of modern batteries means that they can still suffer some damage. The explanation lies in its chemistry.

Lithium-ion batteries have three essential components to their proper operation: a positive and negative electrode (made of a lithium-based compound and carbon graphite, respectively) and some kind of electrolyte. As the battery charges, lithium ions move from the positive electrode to the negative electrode via the electrolyte to be stored as energy. When this power is used, the ions move back to the positive electrode.

Over time, this process wears away the electrolyte that allows the ions to move back and forth, ultimately preventing them from doing so efficiently (or even successfully). Without the ions being able to move, the battery isn’t going to work as well. As a result of this phenomenon, every battery only has a certain number of charge cycles in it before it is rendered ineffective.

The argument is that, by constantly charging the battery, wireless charging eats away at the battery’s lifespan. Others argue that keeping the battery topped off actually allows the battery to remain effective for longer. Some take the argument one step further to say that the convenience of a fully-charged device is worth the cost of a replacement battery if need be.

What do you think? Will wireless charging take off, despite these concerns about battery life and longevity? Let us know in the comments section, and make sure you take a moment and subscribe to our blog!

Leave the Big Stuff Home: Productivity On the Go
Tip of the Week: Changing Your Network Profile


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, September 25 2018

Captcha Image

Mobile? Grab this Article!


Tag Cloud

Tablets Google Managed Service Malware Google Docs Shortcut Education Financial Technology Streaming Media Computer Forensics Management Identities Mobile Devices Touchscreen Risk Management Experience Data Recovery Emails Smartphones Two Factor Authentication Wireless Technology Meetings Nanotechnology BYOD How To Information Technology Mobile Managed IT Services Content Filtering Benefits intranet Settings Excel Retail Cost Management Upgrade Google Assistant Sync Downtime Outsourced IT Passwords Safety Smart Technology Computing Infrastructure Augmented Reality iPhone Hard Drive IT Services Recovery IT Solutions Shadow IT Encryption Big Data Going Green Proactive IT Two-factor Authentication Wi-Fi Microsoft Office Television Colocation Privacy Ciminal Alexa for Business Workers Automobile Tip of the Week Bring Your Own Device Apps Content Filter Communication Assessment Smartphone Windows Ink Personal Information Tech Term Gifts Google Maps Managed Service Provider Students Security Data Security Hosted Solution Hiring/Firing Audit Software as a Service Office 365 Windows 10 Information Social Media Office Tips Spam Blocking Evernote Webinar HIPAA User Error Loyalty Business Management Operating System Unsupported Software FAQ PowerPoint Identity Theft OneNote Virtual Reality Books iOS Content Budget Monitoring Travel Network Security IT Support Microsoft Word Audiobook PDF Law Enforcement Employee-Employer Relationship Camera Updates Administration Touchpad Applications Small Business WPA3 WIndows Server 2008 Router Data storage Politics Solid State Drive Data Loss Amazon Chromecast Save Money Black Market Microsoft Excel Mobile Security Financial Document Management Gamification Wireless Charging Business Computing Wireless Internet Business Continuity Android Best Practice Saving Money Mobility Advertising Quick Tips Server Hacking Hard Drives Spam Vulnerability Workplace Tips Windows BDR Business Technology Disaster Recovery USB Entertainment Application Internet exploMicrosoft WiFi Data Privacy Files Printing Cybercrime Holiday Vendor Hybrid Cloud Video Games Efficiency Samsung Worker Commute Humor Physical Security Cache Root Cause Analysis Communications IT budget Windows 10 Compliance Twitter Telephone Systems Phishing Cybersecurity Instant Messaging User Tips Money Innovation Conferencing Wasting Money Transportation IT Support Hosted Solutions Tech Support Chrome Managed IT Service Software Computer Accessories Projects Worker Congratulations How to Unified Communications Backup SaaS Vendor Management Remote Monitoring Comparison Network Save Time Phone System Identity Licensing NFL Upgrades Regulation Data Internet Employer-Employee Relationship Cast Collaboration Scalability Training Project Management Company Culture Private Cloud Credit Cards Thank You Spyware File Sharing Data Breach Battery Blockchain Robot Apple Cloud Computing Troubleshooting Adobe Hardware Keyboard History End of Support Mobile Device Fraud Hackers Password Device Security HaaS Redundancy Analysis Language Maintenance Printers Remote Computing eWaste Computer Hard Disk Drive Data Backup WannaCry Commerce Antivirus Firewall Consultant Electronic Medical Records App Wireless Cortana Computer Fan Reputation Rootkit Devices Productivity Techology Unified Threat Management Emergency Customer Word Update Testing Connectivity Chromebook VPN Health Outlook Patch Management HBO Bandwidth Facebook Value IoT Screen Mirroring Gmail Artificial Intelligence Microsoft IT solutions Data Management Websites Productivity Technology Search Data Theft Flexibility Windows 10s Business Intelligence CrashOverride Cloud Monitor Computing Work/Life Balance Social Engineering Monitors Marketing VoIP Automation Managing Stress Memory Scam Email Legal Best Practices Lifestyle Specifications Computer Care Relocation Proactive Internet of Things Virtual Assistant Business Government Networking Edge Bluetooth Sports Laptop Computers Ransomware Mobile Device Management Charger Office Cleaning Browser Employer Employee Relationship IT Management Virtualization Alert Professional Services Gadgets Public Computer Users Public Cloud Legislation Google Drive Managed IT Services Data Protection File Storage Miscellaneous Business Owner Data Storage Internet Exlporer Smart Tech The Internet of Things MSP Avoiding Downtime App store Sales Dark Web Virus Managed IT hacker Storage