Contact us today!
(518) 203-2110

Evolve IT

Evolve IT has been serving the Saratoga Springs area since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Do We REALLY Need to Explain Why You Shouldn’t Stab Batteries With a Knife? [VIDEO]

b2ap3_thumbnail_smartphone_battery_400.jpgFollowing in the iPhone’s footsteps, it’s been confirmed that Samsung mobile devices will no longer feature the removable battery and MicroSD card slots that differentiated them from its competition. While it’s not clear if this change will affect sales figures, it will probably be a while before Samsung users understand that their phones no longer feature removable batteries, which could lead to some potentially messy lawsuits.

You’d think that after the whole T-Mobile debacle that Samsung would have learned their lesson about non-removable batteries. The incident in question is the suspension of ZTE Zmax phablets last spring, and while there wasn’t really anything wrong with the product itself, many customers with subpar reasoning standards felt the need to remove the non-removable battery.

In fact, some “professionals,” like Tony from iFixit.com, suggest prying the battery cover off with a knife; because nothing makes more sense than puncturing a dangerous electronic device with a metal blade. Granted, not all users bought into this lunacy. Another iFixit.com user, Nokia Adeston, promptly responded that the entire reason T-Mobile discontinued the product is because people just couldn’t wrap their heads around the fact that the user wasn’t supposed to mess with the battery.

Tony: It has no glue, I opened my ZTE Zmax using a knife and small screwdriver prying little by little.

Nokia Adeston: You aren’t supposed to open the back of the ZTE ZMAX. They can be opened but it has a high risk of damaging the phone. T-Mobile and MetroPCS stopped selling these phones because people were either breaking their devices or hurting themselves trying to open and remove the battery. I wouldn’t recommend opening it unless it is professionally done.

What Tony doesn’t understand is that batteries can act like miniature volcanoes when punctured, essentially blowing anything nearby into smithereens.

To make matters worse, we’re fairly certain that the packaging and documentation that came with the ZTE ZMax was exceptionally clear that the phone didn’t feature a removable battery. Still, this doesn’t stop people who don’t bother to read the instructions, who think they know better and attempt to perform “maintenance” on a device that isn’t even broken. Whether they were looking to replace a subpar battery or perform a hard reset, they should have contacted a professional who knows what they’re doing before taking a blade to the device.

Will Samsung learn from this mistake? We hope so; otherwise, people around the world will be putting themselves at risk by toying with batteries that shouldn’t be messed with. If something were to go wrong and the user were to get severely injured, Samsung could face lawsuits, which they would lose (because being an idiot is, unfortunately, not a crime).

Evolve IT always suggests that technology users take the time to educate themselves about their machines and devices before taking drastic measures. As a rule, you should only remove the components of device that are meant to be removed. It should be obvious which components these are, but this isn’t always the case. Repairing or replacing a hard-to-get to component (like a non-removable battery) can be a task that’s difficult, and even dangerous.

We strongly suggest that you don’t perform complicated maintenance procedures that could compromise the integrity of your devices. Instead, give us a call at (518) 203-2110 and we’ll be happy to help you out in a safe way that won’t end with a face-full of battery fire.

Comments

 
No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 30 August 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up!

Free Consultation
 

Tag Cloud

Tip of the Week Security Best Practices Technology Internet Hackers Cloud Privacy Email Productivity Malware Business Software Business Computing User Tips Microsoft Upgrade Efficiency Workplace Tips Computer Google Hosted Solutions Windows 10 IT Support Mobile Devices Innovation Smartphone Hardware Network Security Ransomware Gmail Operating System Microsoft Office The Internet of Things Office Social Media Backup Apps Bandwidth Business Continuity Disaster Recovery Communication Hacking WiFi Facebook Outlook Smartphones Mobile Computing communications Big Data Safety Unified Threat Management Wireless Technology Android Quick Tips Apple Best Practice Firewall Alert Content Filtering Cybercrime Networking Data storage Website Data Windows Experience Employer-Employee Relationship Two-factor Authentication Mobile Device Management Money History Network Small Business Phishing App Managed Service Provider Running Cable Saving Money Analytics Information Technology Lithium-ion battery Windows 8 Internet of Things intranet Hosted Solution Windows XP IT Services Documents Retail Artificial Intelligence Tech Support Compliance Social Networking Drones Public Speaking Virtualization Managed IT services IP Address Social Printer Browser Virtual Desktop Government Wireless Keyboard Securty Bluetooth Augmented Reality Unified Communications Search Document Management User Encryption Law Enforcement Automation Hard Drives SaaS VoIP Shortcut Memory Remote Computing DDoS Proactive IT Cortana Network Congestion Deep Learning Heating/Cooling Word BDR Save Money Music Vendor Management Business Management Laptop Cryptocurrency Competition IBM Google Docs Monitors Presentation Education Entrepreneur Cleaning Holiday Domains Black Market YouTube Processors Staffing Office Tips Displays Hacker LiFi BYOD Downtime Passwords Application Streaming Media Help Desk Disaster Micrsooft End of Support Customer Service Visible Light Communication Business Growth Data Management Router Recovery Robot Writing Advertising Office 365 Society Sports Google Wallet Spam
QR-Code