Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How Samsung Going With Non-Removable Batteries May Cause Injury to Idiots [VIDEO]

b2ap3_thumbnail_battery_safety_400.jpgIt’s been confirmed that Samsung is getting rid of both its removable battery and MicroSD slot for its newest line of Galaxy Note devices. This is a sad day for Galaxy fans that have always preferred the Android device over Apple’s iPhone for its customizable options such as these. For Samsung, it’s too early to tell if this will affect sales or not, but one thing’s for sure: a lot of phones will be destroyed before users “get it.”

Samsung should’ve learned this hard lesson from T-Mobile after they suspended the sales of their ZTE Zmax phablet just last spring, but it wasn’t because there was anything wrong with it. In fact, it was working just fine. Instead, too many customers were trying to remove the phone’s non-removable battery. Tony from iFixit.com wholeheartedly recommends that all of his fellow ZTE ZMax users use a knife to pry off the cover, to which user Nokia Adeston gives a stern reply; essentially saying to Tony, “It’s because of idiots like you why T-Mobile discontinued the product.”

Tony: It has no glue, I opened my ZTE Zmax using a knife and small screwdriver prying little by little.

Nokia Adeston: You aren’t supposed to open the back of the ZTE ZMAX. They can be opened but it has a high risk of damaging the phone. T-Mobile and MetroPCS stopped selling these phones because people were either breaking their devices or hurting themselves trying to open and remove the battery. I wouldn’t recommend opening it unless it is professionally done.

Poking a cell phone battery with a knife; hey, what’s the worse that can happen?

That could have been you, Tony. Could. Have. Been. You.

Now, we’re pretty sure that the packaging and literature that came with the ZTE ZMax made it abundantly clear that the battery is non-removable, and that the back of the phone isn’t supposed to be opened under any circumstance. Despite this precaution, Tony and a significant amount of other ZMax users thought they knew better and literally “hacked” at their phone with a blunt object.

Perhaps they thought they could replace their dying battery. Maybe they were attempting a hard reset. Or better yet, maybe they were looking for the rumored prize inside, like with their favorite breakfast cereal.

Whatever the reason, Samsung needs to figure it out and take extreme precautions in order to prevent people from destroying their Galaxy Note 5 because they’re used to swapping out batteries with previous models. Otherwise, all the smartphone tinkerers of the world will get a face full of pure battery fire and Samsung will have some major lawsuits on their hands, which they would inevitably lose because, you know, that’s what our society has come to.

As Western Kentucky’s leading IT professionals, we’ve seen our share of technology blunders like this where users destroy perfectly good devices, simply because they didn’t know any better. Lucky for them, we’re here to fix it, no judgment attachments. To get your technology repaired and hear some whopping stories about our favorite IT service calls, give us a call today at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 06 December 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Productivity Passwords Quick Tips Cybersecurity Saving Money Communication Managed Service Data Backup Smartphone Android Upgrade Business Management Data Recovery Smartphones VoIP AI Disaster Recovery Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Tech Term Current Events Network Internet of Things Remote Facebook Information Automation Artificial Intelligence Miscellaneous Gadgets Cloud Computing Holiday Training Covid-19 Server Managed Service Provider Remote Work Outsourced IT Compliance Spam Encryption IT Support Employee/Employer Relationship Office Windows 10 Business Continuity Government Data Management Bandwidth Virtualization Blockchain Wi-Fi Windows 10 Business Technology Apps Data Security Vendor Mobile Office Two-factor Authentication Budget Apple Networking Employer-Employee Relationship Managed Services Voice over Internet Protocol App BYOD Mobile Device Management Gmail Tip of the week Chrome Conferencing WiFi How To BDR Hacker HIPAA Avoiding Downtime Computing Applications Marketing Information Technology Access Control Office 365 Retail Storage 2FA Big Data Password Bring Your Own Device Managed IT Services Healthcare Computers Operating System Router Website Virtual Private Network Risk Management Health Help Desk Analytics Office Tips Augmented Reality Windows 11 The Internet of Things Telephone Social Scam Data loss Excel Cooperation Remote Workers Customer Service Going Green Patch Management Save Money Remote Monitoring End of Support Vulnerability Vendor Management Free Resource Project Management Cybercrime Windows 7 Physical Security Display Microsoft 365 Printer Solutions Paperless Office Infrastructure Firewall Monitoring Document Management Holidays Managed IT Service Maintenance Data Storage Downloads Antivirus Supply Chain Sports Video Conferencing Mouse Managed Services Provider Licensing Virtual Machines Professional Services Administration Entertainment Customer Relationship Management Robot Telephone System iPhone Cost Management Hacking Settings Presentation Wireless Printing Vulnerabilities Content Filtering Data Privacy IT Management Wireless Technology Images 101 VPN YouTube Meetings Multi-Factor Authentication Cryptocurrency Mobility User Tip Modem Computer Repair Mobile Security Processor Word Virtual Desktop LiFi Data storage Employees Smart Technology Integration Outlook Machine Learning Safety Money Saving Time Humor Reviews Hacks Server Management Medical IT Scary Stories Private Cloud Identity Identity Theft Smart Tech Fun Development Superfish Bookmark Transportation Small Businesses Hypervisor Displays Deep Learning Download Twitter Alerts Shopping Optimization PowerPoint Error Education Connectivity Social Engineering Break Fix Application Browsers Employer/Employee Relationships Outsourcing Upload Navigation Remote Computing PCI DSS IBM Multi-Factor Security Gig Economy Mobile Computing Social Network Workplace Tablet IoT Search Dark Web Internet Service Provider Teamwork Hiring/Firing Best Practice Trends Evernote Paperless Alert Regulations Compliance Dark Data Google Calendar Memes Managed IT Customer Resource management Co-managed IT Buisness File Sharing Regulations IT solutions Star Wars How To Microsoft Excel Net Neutrality Legal Data Analysis SQL Server Technology Care History Business Growth Gamification Business Communications Notifications Staff Competition Financial Data Legislation Smartwatch IT Scams Travel Social Networking Google Maps Cortana Procurement Techology Fileless Malware Azure Hybrid Work Cyber security Alt Codes Content Tech Human Resources Wearable Technology Telework Comparison CES User Communitications Health IT Cables Downtime Unified Threat Management Motherboard Hosted Solution Assessment Permissions Supply Chain Management Unified Threat Management Directions FinTech Typing Term Google Apps IP Address Network Congestion Specifications IT Assessment IT Maintenance Value Business Intelligence Internet Exlporer Knowledge Fraud Flexibility Google Drive User Error Microchip Organization Username Shortcuts 5G Black Friday Digital Security Cameras Recovery Smart Devices Ransmoware Point of Sale Memory Vendors Unified Communications Database Experience Hard Drives Remote Working Google Docs Data Breach Bitcoin Network Management Google Play Be Proactive Running Cable Tech Support IT Technicians Domains Monitors Cyber Monday Videos Electronic Health Records Google Wallet Proxy Server Workforce Cookies Wasting Time Threats Tactics Hotspot Refrigeration Trend Micro Windows 8 Security Cameras Workplace Strategies Laptop Websites Mirgation Public Speaking Lithium-ion battery Software as a Service Drones Meta Nanotechnology SharePoint Managing Costs Amazon Addiction Electronic Medical Records Language Entrepreneur eCommerce Management SSID Halloween Chatbots Screen Reader Writing Distributed Denial of Service Surveillance Lenovo Virtual Assistant Outsource IT Virtual Machine Environment Service Level Agreement Media Virtual Reality Computing Infrastructure Undo

Blog Archive