ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Do We REALLY Need to Explain Why You Shouldn’t Stab Batteries With a Knife? [VIDEO]

b2ap3_thumbnail_smartphone_battery_400.jpgFollowing in the iPhone’s footsteps, it’s been confirmed that Samsung mobile devices will no longer feature the removable battery and MicroSD card slots that differentiated them from its competition. While it’s not clear if this change will affect sales figures, it will probably be a while before Samsung users understand that their phones no longer feature removable batteries, which could lead to some potentially messy lawsuits.

You’d think that after the whole T-Mobile debacle that Samsung would have learned their lesson about non-removable batteries. The incident in question is the suspension of ZTE Zmax phablets last spring, and while there wasn’t really anything wrong with the product itself, many customers with subpar reasoning standards felt the need to remove the non-removable battery.

In fact, some “professionals,” like Tony from iFixit.com, suggest prying the battery cover off with a knife; because nothing makes more sense than puncturing a dangerous electronic device with a metal blade. Granted, not all users bought into this lunacy. Another iFixit.com user, Nokia Adeston, promptly responded that the entire reason T-Mobile discontinued the product is because people just couldn’t wrap their heads around the fact that the user wasn’t supposed to mess with the battery.

Tony: It has no glue, I opened my ZTE Zmax using a knife and small screwdriver prying little by little.

Nokia Adeston: You aren’t supposed to open the back of the ZTE ZMAX. They can be opened but it has a high risk of damaging the phone. T-Mobile and MetroPCS stopped selling these phones because people were either breaking their devices or hurting themselves trying to open and remove the battery. I wouldn’t recommend opening it unless it is professionally done.

What Tony doesn’t understand is that batteries can act like miniature volcanoes when punctured, essentially blowing anything nearby into smithereens.

To make matters worse, we’re fairly certain that the packaging and documentation that came with the ZTE ZMax was exceptionally clear that the phone didn’t feature a removable battery. Still, this doesn’t stop people who don’t bother to read the instructions, who think they know better and attempt to perform “maintenance” on a device that isn’t even broken. Whether they were looking to replace a subpar battery or perform a hard reset, they should have contacted a professional who knows what they’re doing before taking a blade to the device.

Will Samsung learn from this mistake? We hope so; otherwise, people around the world will be putting themselves at risk by toying with batteries that shouldn’t be messed with. If something were to go wrong and the user were to get severely injured, Samsung could face lawsuits, which they would lose (because being an idiot is, unfortunately, not a crime).

ClearView IT always suggests that technology users take the time to educate themselves about their machines and devices before taking drastic measures. As a rule, you should only remove the components of device that are meant to be removed. It should be obvious which components these are, but this isn’t always the case. Repairing or replacing a hard-to-get to component (like a non-removable battery) can be a task that’s difficult, and even dangerous.

We strongly suggest that you don’t perform complicated maintenance procedures that could compromise the integrity of your devices. Instead, give us a call at 866-326-7214 and we’ll be happy to help you out in a safe way that won’t end with a face-full of battery fire.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Microsoft Google Collaboration Android Phishing Cybersecurity Business Management IT Services Backup Ransomware Data Backup Smartphone communications Small Business Upgrade Smartphones Microsoft Office Mobile Devices Network Communication Data Recovery Managed IT Services Quick Tips Productivity VoIP Users Social Media Mobile Device Tech Term Automation Windows 10 Business Continuity Facebook Disaster Recovery Covid-19 Passwords Holiday Windows 10 Browser Apps IT Support Managed Service Miscellaneous Cloud Computing Outsourced IT Managed Service Provider Internet of Things Data Management Remote Work Saving Money Operating System Government Artificial Intelligence Workplace Strategy Managed IT services Gadgets Networking Windows Spam Business Technology Blockchain Bandwidth Encryption Mobile Device Management Server Information Remote App Virtualization WiFi Information Technology Office 365 History Budget Gmail Office Employee/Employer Relationship Apple Two-factor Authentication BDR Cybercrime Wi-Fi Conferencing Health Access Control Data Security Big Data Analytics Remote Monitoring Document Management Voice over Internet Protocol Hacker Save Money IT Management Training Employer-Employee Relationship Compliance Help Desk Patch Management Remote Computing Hacking Cost Management Vendor Project Management Vulnerabilities Legal Data storage Mobile Office Money Customer Service Unified Threat Management Managed Services Search... Firewall Best Practice Data loss Augmented Reality Word Retail BYOD Alert IBM Website Computing Vendor Management Hiring/Firing Hard Drive Outlook Password Applications Law Enforcement End of Support Laptop Printer Monitoring Healthcare Websites Mobile Computing Remote Workers Mobility Meetings Marketing Windows 7 Social Free Resource Sports Travel SaaS DDoS Virtual Reality Running Cable Google Maps Windows 11 Social Engineering Scam Cryptocurrency Black Market How To Storage iPhone Cleaning Education Cortana VPN Robot Content Filtering Update Router User Data Breach Paperless Office The Internet of Things YouTube Antivirus Twitter Maintenance Chrome Virtual Machines Wireless Technology Microchip eWaste Computer Repair Flexibility Multi-factor Authentication PowerPoint Start Menu Professional Services Downloads Administration Computer Care Downtime Hack Safety Identity Theft Presentation Notifications Vulnerability Saving Time Unified Communications Specifications Virtual Desktop IT Consultant Software as a Service Managed Services Provider Data Protection Computers Bitcoin Experience Google Docs Bluetooth Virtual Private Network Distributed Denial of Service Telephone Customer Relationship Management Co-Managed IT Office Tips Memory Entertainment Current Events Private Cloud Excel Solutions Disaster Tech Terms Images 101 Integration Politics Machine Learning Settings Lithium-ion battery Display Managed IT Digital Virtual Assistant Solid State Drive HIPAA Processors Employees Taxes Avoiding Downtime Holidays Chromebook Drones Processor Automobile Cooperation Video Conferencing Physical Security How To Legislation Be Proactive News Medical IT Keyboard User Tip Shopping Hard Drives Printing Evernote Paperless Inbound Marketing Network Management CCTV SQL Server In Internet of Things intranet Touchscreen PCI DSS Licensing Emails Humor Workplace Strategies Computer Malfunction Fake News Wireless Hacks Shortcut Network Congestion Emergency Proxy Server Gig Economy Heating/Cooling Writing Business Communications Environment Vendor Mangement Service Level Agreement Internet Service Provider Computing Infrastructure Azure Reliable Computing Windows XP Social Networking Electronic Payment Management Regulations Compliance Samsung Device security Managed IT Service Uninterrupted Power Supply Wireless Headphones Memes Webcam Microsoft Excel Tech Human Resources Business Mangement Going Green Net Neutrality Business Cards Scalability Administrator Text Messaging Proactive IT Error Financial Data Phone System Tablets IT Smart Technology Bring Your Own Device Bookmark Risk Management Google Calendar Term Google Apps Download Supercomputer Piracy Music Virus Telework HTML Nanotechnology Communitications Motion Sickness Microsoft 365 Staffing Browsers Smartwatch IP Address Comparison Google Play Google Drive Upload Procurement Computer Accessories Software License Botnet Social Network FinTech Knowledge Data Analysis CES Corporate Profile Screen Reader IT Assessment Supply Chain Rental Service Micrsooft Flash Television Security Cameras Telephony Trends Supply Chain Management Employer Employee Relationship Mobile Technology Value Cabling Devices Cyber security Telephone Systems Business Growth Customer Resource management Organization Fileless Malware Tablet Smart Devices Workplace G Suite Tip of the week Recovery Competition Mouse VoIP Gamification Remote Working Tracking Company Culture Regulations Trend Micro LiFi Banking Entrepreneur Google Wallet Telephone System AI Application Deep Learning Directions Digital Security Cameras Troubleshooting Backup and Disaster Recovery Electronic Health Records Scams Web Server Transportation Documents Messenger SharePoint Business Intelligence Content Digital Payment Desktop Wasting Time Worker Accountants eCommerce Modem Business Metrics Hosted Solution Electronic Medical Records Videos Access Database Surveillance Cables Securty Books Domains Language Society Time Management Public Cloud Managing Costs Equifax SSID Health IT Monitors Audit Media Visible Light Communication Business Owner Spyware Tactics Development Point of Sale Hard Drive Disposal Employer/Employee Relationships Reading Windows 8 Username File Sharing Virtual Machine Startup Optimization Shortcuts Freedom of Information Redundancy Reviews Public Speaking Displays Navigation 2FA Advertising Cache Addiction email scam Teamwork Relocation Streaming Media Work/Life Balance Tech Support Unified Threat Management Data Storage Workers Mobile Security Hypervisor

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?