Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How Samsung Going With Non-Removable Batteries May Cause Injury to Idiots [VIDEO]

b2ap3_thumbnail_battery_safety_400.jpgIt’s been confirmed that Samsung is getting rid of both its removable battery and MicroSD slot for its newest line of Galaxy Note devices. This is a sad day for Galaxy fans that have always preferred the Android device over Apple’s iPhone for its customizable options such as these. For Samsung, it’s too early to tell if this will affect sales or not, but one thing’s for sure: a lot of phones will be destroyed before users “get it.”

Samsung should’ve learned this hard lesson from T-Mobile after they suspended the sales of their ZTE Zmax phablet just last spring, but it wasn’t because there was anything wrong with it. In fact, it was working just fine. Instead, too many customers were trying to remove the phone’s non-removable battery. Tony from iFixit.com wholeheartedly recommends that all of his fellow ZTE ZMax users use a knife to pry off the cover, to which user Nokia Adeston gives a stern reply; essentially saying to Tony, “It’s because of idiots like you why T-Mobile discontinued the product.”

Tony: It has no glue, I opened my ZTE Zmax using a knife and small screwdriver prying little by little.

Nokia Adeston: You aren’t supposed to open the back of the ZTE ZMAX. They can be opened but it has a high risk of damaging the phone. T-Mobile and MetroPCS stopped selling these phones because people were either breaking their devices or hurting themselves trying to open and remove the battery. I wouldn’t recommend opening it unless it is professionally done.

Poking a cell phone battery with a knife; hey, what’s the worse that can happen?

That could have been you, Tony. Could. Have. Been. You.

Now, we’re pretty sure that the packaging and literature that came with the ZTE ZMax made it abundantly clear that the battery is non-removable, and that the back of the phone isn’t supposed to be opened under any circumstance. Despite this precaution, Tony and a significant amount of other ZMax users thought they knew better and literally “hacked” at their phone with a blunt object.

Perhaps they thought they could replace their dying battery. Maybe they were attempting a hard reset. Or better yet, maybe they were looking for the rumored prize inside, like with their favorite breakfast cereal.

Whatever the reason, Samsung needs to figure it out and take extreme precautions in order to prevent people from destroying their Galaxy Note 5 because they’re used to swapping out batteries with previous models. Otherwise, all the smartphone tinkerers of the world will get a face full of pure battery fire and Samsung will have some major lawsuits on their hands, which they would inevitably lose because, you know, that’s what our society has come to.

As Western Kentucky’s leading IT professionals, we’ve seen our share of technology blunders like this where users destroy perfectly good devices, simply because they didn’t know any better. Lucky for them, we’re here to fix it, no judgment attachments. To get your technology repaired and hear some whopping stories about our favorite IT service calls, give us a call today at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 10 December 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Productivity Passwords Quick Tips Saving Money Cybersecurity Communication Managed Service Data Backup Smartphone Android Upgrade VoIP Business Management Smartphones Data Recovery AI Mobile Devices communications Disaster Recovery Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Internet of Things Remote Facebook Miscellaneous Automation Artificial Intelligence Information Training Gadgets Cloud Computing Covid-19 Holiday Server Managed Service Provider Remote Work Outsourced IT Compliance Employee/Employer Relationship Encryption Spam IT Support Windows 10 Office Government Business Continuity Data Management Virtualization Business Technology Wi-Fi Blockchain Bandwidth Windows 10 Apps Two-factor Authentication Data Security Mobile Office Vendor App Tip of the week Employer-Employee Relationship Managed Services Voice over Internet Protocol Networking Chrome Mobile Device Management Budget BYOD Gmail Apple WiFi Access Control Computing Conferencing Information Technology Hacker Avoiding Downtime How To Office 365 BDR Marketing HIPAA Applications Big Data Health 2FA Help Desk Operating System Retail Healthcare Risk Management Computers Managed IT Services Website Office Tips Analytics Augmented Reality Storage Password Router Bring Your Own Device Virtual Private Network The Internet of Things Printer Paperless Office Windows 11 Infrastructure Going Green Monitoring Social Excel Document Management Cybercrime Remote Workers Customer Service Telephone Scam Data loss Cooperation Free Resource Project Management Windows 7 Patch Management Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability Firewall Vendor Management Solutions Physical Security Display Processor Computer Repair Mobile Security Holidays Data Storage Smart Technology Supply Chain Settings Video Conferencing Printing Wireless Machine Learning Managed Services Provider Content Filtering Virtual Machines Professional Services Saving Time Customer Relationship Management YouTube Managed IT Service Cryptocurrency Maintenance Downloads Hacking Antivirus iPhone Presentation Licensing Virtual Desktop Entertainment Vulnerabilities Data storage LiFi Wireless Technology Data Privacy Images 101 Outlook Multi-Factor Authentication Robot Mobility Money Telephone System Word Cost Management Humor Sports IT Management Meetings Mouse VPN Employees Integration Safety Modem Administration User Tip Best Practice Database Surveillance Virtual Assistant Outsource IT Media Buisness Network Management Tech Support IT Technicians Virtual Machine Environment Cookies Monitors Cyber Monday Medical IT Legal IT solutions Proxy Server Reviews Business Growth Tactics Development Hotspot Transportation Small Businesses Application Websites Mirgation Hypervisor Displays Cortana Nanotechnology Optimization PowerPoint Shopping Alt Codes IBM SharePoint Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing Navigation Downtime Management PCI DSS Chatbots Screen Reader Writing Distributed Denial of Service Workplace Hosted Solution Lenovo Gig Economy Typing Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Evernote Paperless Server Management Regulations Compliance Private Cloud Identity Knowledge Identity Theft Smart Tech Memes Co-managed IT Google Drive Competition Superfish Bookmark Download Net Neutrality Twitter Alerts SQL Server Technology Care Business Communications Financial Data 5G Error History Browsers Smartwatch Experience Connectivity IT Social Engineering Break Fix Scams Google Docs Unified Communications Bitcoin Running Cable User Upload Procurement Remote Computing Azure Hybrid Work Cyber security Multi-Factor Security Tech Human Resources Google Wallet Social Network Telework CES Tablet IoT Communitications Dark Web Cables Windows 8 IP Address Laptop Trends Supply Chain Management Alert File Sharing Regulations Dark Data Google Calendar Term Google Apps Drones Managed IT Customer Resource management FinTech Data Analysis Star Wars IT Assessment How To Microsoft Excel IT Maintenance Halloween Recovery Gamification Flexibility Notifications Staff Value Business Intelligence Travel Social Networking Legislation Shortcuts Hard Drives Organization Domains Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Ransmoware Hacks Scary Stories Content Remote Working Wearable Technology Memory Vendors Unified Threat Management Motherboard Data Breach Comparison Google Play Be Proactive Refrigeration Health IT Fun Public Speaking Unified Threat Management Directions Videos Assessment Electronic Health Records Permissions Workforce Deep Learning Lithium-ion battery Wasting Time Threats Entrepreneur Trend Micro Network Congestion Specifications Security Cameras Workplace Strategies Education User Error Microchip Internet Exlporer Software as a Service Fraud Meta Mobile Computing Username Managing Costs Amazon Search Point of Sale eCommerce Black Friday SSID Undo

Blog Archive