Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How Samsung Going With Non-Removable Batteries May Cause Injury to Idiots [VIDEO]

b2ap3_thumbnail_battery_safety_400.jpgIt’s been confirmed that Samsung is getting rid of both its removable battery and MicroSD slot for its newest line of Galaxy Note devices. This is a sad day for Galaxy fans that have always preferred the Android device over Apple’s iPhone for its customizable options such as these. For Samsung, it’s too early to tell if this will affect sales or not, but one thing’s for sure: a lot of phones will be destroyed before users “get it.”

Samsung should’ve learned this hard lesson from T-Mobile after they suspended the sales of their ZTE Zmax phablet just last spring, but it wasn’t because there was anything wrong with it. In fact, it was working just fine. Instead, too many customers were trying to remove the phone’s non-removable battery. Tony from iFixit.com wholeheartedly recommends that all of his fellow ZTE ZMax users use a knife to pry off the cover, to which user Nokia Adeston gives a stern reply; essentially saying to Tony, “It’s because of idiots like you why T-Mobile discontinued the product.”

Tony: It has no glue, I opened my ZTE Zmax using a knife and small screwdriver prying little by little.

Nokia Adeston: You aren’t supposed to open the back of the ZTE ZMAX. They can be opened but it has a high risk of damaging the phone. T-Mobile and MetroPCS stopped selling these phones because people were either breaking their devices or hurting themselves trying to open and remove the battery. I wouldn’t recommend opening it unless it is professionally done.

Poking a cell phone battery with a knife; hey, what’s the worse that can happen?

That could have been you, Tony. Could. Have. Been. You.

Now, we’re pretty sure that the packaging and literature that came with the ZTE ZMax made it abundantly clear that the battery is non-removable, and that the back of the phone isn’t supposed to be opened under any circumstance. Despite this precaution, Tony and a significant amount of other ZMax users thought they knew better and literally “hacked” at their phone with a blunt object.

Perhaps they thought they could replace their dying battery. Maybe they were attempting a hard reset. Or better yet, maybe they were looking for the rumored prize inside, like with their favorite breakfast cereal.

Whatever the reason, Samsung needs to figure it out and take extreme precautions in order to prevent people from destroying their Galaxy Note 5 because they’re used to swapping out batteries with previous models. Otherwise, all the smartphone tinkerers of the world will get a face full of pure battery fire and Samsung will have some major lawsuits on their hands, which they would inevitably lose because, you know, that’s what our society has come to.

As Western Kentucky’s leading IT professionals, we’ve seen our share of technology blunders like this where users destroy perfectly good devices, simply because they didn’t know any better. Lucky for them, we’re here to fix it, no judgment attachments. To get your technology repaired and hear some whopping stories about our favorite IT service calls, give us a call today at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 24 January 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Email Workplace Tips IT Services Computer Phishing Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Small Business Microsoft Backup Productivity Quick Tips Managed Service Passwords Saving Money Communication Cybersecurity Smartphone Data Backup Android Data Recovery Disaster Recovery AI Upgrade Business Management VoIP Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Facebook Miscellaneous Information Holiday Automation Artificial Intelligence Gadgets Cloud Computing Training Covid-19 Compliance Server Managed Service Provider Remote Work IT Support Outsourced IT Employee/Employer Relationship Encryption Spam Office Windows 10 Business Continuity Government Data Management Virtualization Blockchain Wi-Fi Business Technology Windows 10 Bandwidth Data Security Apps Vendor Two-factor Authentication Mobile Office Networking WiFi Apple App Employer-Employee Relationship Managed Services BYOD Voice over Internet Protocol Tip of the week Mobile Device Management Chrome Gmail Budget How To BDR HIPAA Applications Computing Hacker Information Technology Access Control Avoiding Downtime Marketing Office 365 Conferencing Storage Password Managed IT Services Bring Your Own Device 2FA Big Data Router Healthcare Operating System Virtual Private Network Computers Health Risk Management Help Desk Website Analytics Office Tips Retail Augmented Reality The Internet of Things Cooperation Windows 11 Social Patch Management Save Money Excel Remote Monitoring Vulnerability End of Support Going Green Vendor Management Remote Workers Physical Security Customer Service Cybercrime Display Printer Free Resource Paperless Office Project Management Infrastructure Monitoring Windows 7 Microsoft 365 Document Management Solutions Firewall Telephone Scam Data loss Safety Sports Entertainment Mouse Holidays Data Storage Administration Supply Chain Telephone System Video Conferencing Robot Managed Services Provider Cost Management Virtual Machines Professional Services IT Management Customer Relationship Management Settings VPN Meetings Printing Wireless iPhone Content Filtering User Tip Modem Hacking Presentation Computer Repair Mobile Security YouTube Processor Vulnerabilities Data Privacy Cryptocurrency Wireless Technology Images 101 Smart Technology Multi-Factor Authentication Virtual Desktop Mobility Data storage Machine Learning LiFi Saving Time Word Outlook Managed IT Service Maintenance Employees Money Integration Antivirus Humor Downloads Licensing Virtual Assistant Outsource IT Social Network Surveillance Deep Learning Multi-Factor Security Undo Dark Web Virtual Machine Environment Media Tablet IoT Trends Reviews Alert Education Medical IT Transportation Small Businesses Managed IT Customer Resource management File Sharing Regulations Development Dark Data Google Calendar Mobile Computing How To Microsoft Excel Hypervisor Displays Data Analysis Star Wars Gamification Shopping Notifications Staff Optimization PowerPoint Search Employer/Employee Relationships Outsourcing Travel Social Networking Application Best Practice Legislation PCI DSS Buisness Navigation Techology Fileless Malware Google Maps Content IBM Gig Economy Legal Wearable Technology IT solutions Workplace Teamwork Hiring/Firing Health IT Unified Threat Management Motherboard Internet Service Provider Business Growth Comparison Regulations Compliance Permissions Evernote Paperless Unified Threat Management Directions Assessment Memes Co-managed IT Cortana SQL Server Technology Care Net Neutrality Alt Codes Network Congestion Specifications Competition Financial Data Fraud History Downtime Business Communications User Error Microchip Internet Exlporer Username Smartwatch IT Hosted Solution Scams Azure Hybrid Work Point of Sale Procurement Typing Black Friday Telework Cyber security Tech Human Resources Database Network Management CES Google Drive Tech Support IT Technicians User Communitications Cables Knowledge Proxy Server Cookies Supply Chain Management Monitors Cyber Monday FinTech Hotspot Term Google Apps 5G Tactics IP Address Google Docs Websites Mirgation IT Assessment Unified Communications IT Maintenance Experience Value Business Intelligence Running Cable Nanotechnology Flexibility Bitcoin Organization Google Wallet Electronic Medical Records Language Shortcuts SharePoint Addiction Management Digital Security Cameras Chatbots Recovery Smart Devices Ransmoware Memory Vendors Laptop Lenovo Screen Reader Hard Drives Remote Working Windows 8 Writing Distributed Denial of Service Service Level Agreement Domains Drones Virtual Reality Computing Infrastructure Data Breach Google Play Be Proactive Server Management Videos Private Cloud Identity Electronic Health Records Workforce Wasting Time Threats Halloween Superfish Bookmark Identity Theft Smart Tech Refrigeration Download Public Speaking Twitter Alerts Trend Micro Security Cameras Workplace Strategies Meta Lithium-ion battery Error Software as a Service Hacks Social Engineering Break Fix Entrepreneur Managing Costs Amazon Scary Stories Browsers Connectivity Upload Remote Computing eCommerce SSID Fun

Blog Archive