Contact us today!

FRS Pros Blog

Is True Wireless Charging Around the Corner?

Is True Wireless Charging Around the Corner?

Wireless charging is a challenging technology. While the benefits are clear as day (imagine, only having the one cord to supply power to the charger itself!), the concept has yet to see the mass implementation and adoption one would expect it to. Today, we’ll look at this underperforming technology’s history, a few applications that could be seen in the future, and the holdups it is seeing currently.

The Charged-Up History of Electricity
As one might imagine, wires have been getting in people’s way since electricity was a widely adopted thing. This was one of the conundrums that Nikola Tesla, the underappreciated inventor and engineer, spent a considerable amount of his life trying to solve. Eventually, he devised a device that would leverage magnetic fields to transfer electricity, a device we know today as the Tesla coil.

Unfortunately, some guerilla marketing from his electric rival, Thomas Alva Edison, turned the public opinion away from Tesla’s approach and towards Edison’s. Basically, Edison took a murderous circus elephant named Topsy that was to be put down and volunteered to do it with Tesla’s electricity. However, not even the film Edison produced of Topsy being exposed to alternating current (a key facet to Tesla’s European-inspired approach) was quite enough to prevent AC from becoming the standard.

Eventually, Tesla’s coil was improved upon further. It ultimately found a place in contemporary radar systems. Yet, even as the technology became more powerful, it was difficult for a market to be found wherein to use it. This had the apparent effect of wasting the work done by the people of multiple private-sector businesses, as well as NASA and the U.S. Department of Energy.

Enter the Smartphone
One of the biggest obstacles to the progress of wireless charging was the fact that, while wireless charging is logically connected to mobile devices, there was a lack of truly mobile devices until recent years. Cellular phones changed that, as the device was now meant to be fully portable, or in other words, mobile. Other devices quickly followed suit with charging capabilities.

However, even this revitalization of wireless charging due to mobile phones couldn’t change one fact: there was always going to need to be a wire. Even the most recent wireless chargers need to be plugged in before they will work, and really, what’s the real difference between plugging in a device, and setting it down just so?

What it Means to Really Be Wireless
In order for any technology that we develop to be marketable, it’s pretty much required to meet two key criteria: it has to work, and it shouldn’t do too much damage to the user.

While this might seem like a relatively low bar, that bar has yet to be met, or even a product introduced that tries. This lack of trying doesn’t reach quite all the way up the chain, however. Companies like Energous in Silicon Valley, Ossia from Bellevue, Washington, and uBeam from Santa Monica, California, have all worked on technologies that do meet the criteria outlined at the beginning of this section. As they find more success in developing uncoupled power solutions, a new paradigm takes form.

Someday, it may not be uncommon to see wireless charging spreading to devices other than smartphones. More and more IoT devices, like wearables, as well as medical devices, like hearing aids, may someday not need a dedicated charge cycle during which it can’t be used. However, until then, we will all have to wait.

Until that day comes, wireless charging will either be ineffective or underutilized… but what devices would you like to be able to charge wirelessly in the future? Tell us which and why in the comments!

Tech Term: Chromebook
4 Strategies to Improving Your Backups


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, October 21 2018

Captcha Image

Mobile? Grab this Article!


Tag Cloud

Tip of the Week Security Technology Best Practices Internet Privacy Network Security Tech Term Business Management Google Business Computing Cloud Software User Tips Hackers Hardware Computer Browser Malware Efficiency Mobile Devices Windows Cybersecurity Microsoft Hosted Solutions Data Backup Smartphone Innovation Cybercrime Apps Productivity Internet of Things Android Outsourced IT IT Services Windows 10 Smartphones Data Recovery Data Security Operating System Phishing IT Support Backup Data Money Business Business Continuity Mobile Device Management Office 365 Alert Upgrade Vulnerability Law Enforcement VoIP Email Ransomware Best Practice IT Support Chrome Communications Managed IT Services Saving Money Microsoft Office Disaster Recovery Collaboration Network Server Telephone Systems Tech Support Employer-Employee Relationship Gadgets Router Applications Google Drive Managed Service Provider Managed IT Small Business Unsupported Software Blockchain Windows 10 App Information Two-factor Authentication Cloud Computing Spam Information Technology Computers Virtualization Passwords Mobile Device OneNote Productivity Wi-Fi Facebook Audit Update Sports Quick Tips Shortcut Data Protection Patch Management Wireless Charging Politics Google Docs Project Management Hosted Solution Workplace Tips Devices BDR Automation Avoiding Downtime Password Data Breach Cost Management Managed IT Services Users Augmented Reality Commerce Hacking WannaCry Travel Communication Application Managed Service Excel Artificial Intelligence Gmail Government Save Money Fraud Mobile Security Safety Bring Your Own Device Robot Proactive IT SaaS Budget Miscellaneous Holiday Google Assistant User Error Touchscreen Data Storage The Internet of Things Risk Management Social Media Wireless Technology Cortana VPN iPhone Networking Data Management WiFi Reputation Streaming Media Windows 10s HBO Charger Lithium-ion battery Value Data Loss Ciminal Screen Mirroring Conferencing Data Theft Data storage Data Privacy Identity Theft Windows 7 Computer Care Nanotechnology Word Device Security History Amazon Unified Threat Management Legislation Language Remote Computing Health Business Technology Access Adobe Workers Gamification Software as a Service Chromecast Solid State Drive Meetings Virtual Assistant Wireless Emails Cast Gifts Computing Hard Drive Settings Telephony Vendor Management Display Root Cause Analysis Windows Ink Upgrades Comparison Search Internet Exlporer Scam Testing Computer Fan Licensing Updates Memory Mobility IT budget Transportation Bandwidth Hard Disk Drive IT Management Outlook Laptop Computer Forensics Microsoft Excel Private Cloud Alexa for Business Marketing BYOD Credit Cards App store Chromebook Uninterrupted Power Supply Samsung Co-Managed Services Google Maps Spyware Specifications Virus Camera Microsoft Word Financial File Sharing Going Green Social IT Solutions Legal Touchpad Management Encryption Webinar Antivirus Printing Telephone Apple Consultant Sales Proactive DDoS Projects Tablets Maintenance Files Storage Social Engineering Recovery Vendor Sync Evernote Humor PowerPoint Disaster Remote Monitoring IT solutions FAQ Hyperlink Edge Retail Websites Identity NFL eWaste Emergency Hybrid Cloud Identities Point of Sale Employee-Employer Relationship Administrator iOS WIndows Server 2008 Wireless Internet Keyboard Regulation Entertainment PDF Wasting Time Thank You Black Market Cleaning Mobile Computing Automobile Office Big Data Managing Stress Twitter Text Messaging Accessory Worker Congratulations USB How To Books Education Hiring/Firing Video Games Experience Office tips Peripheral Virtual Reality Work/Life Balance Advertising Crowdsourcing Employer Employee Relationship Current Events Electronic Medical Records Benefits es Phone System Cache Save Time End of Support Computer Accessories Training Monitors HaaS Battery Relocation Smart Technology Flexibility Music Instant Messaging Hacker Compliance Television CrashOverride Printers Company Culture Personal Information Scalability Analytics