Contact us today!
(518) 203-2110

Evolve IT

Evolve IT has been serving the Saratoga Springs area since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Do We REALLY Need to Explain Why You Shouldn’t Stab Batteries With a Knife? [VIDEO]

b2ap3_thumbnail_smartphone_battery_400.jpgFollowing in the iPhone’s footsteps, it’s been confirmed that Samsung mobile devices will no longer feature the removable battery and MicroSD card slots that differentiated them from its competition. While it’s not clear if this change will affect sales figures, it will probably be a while before Samsung users understand that their phones no longer feature removable batteries, which could lead to some potentially messy lawsuits.

You’d think that after the whole T-Mobile debacle that Samsung would have learned their lesson about non-removable batteries. The incident in question is the suspension of ZTE Zmax phablets last spring, and while there wasn’t really anything wrong with the product itself, many customers with subpar reasoning standards felt the need to remove the non-removable battery.

In fact, some “professionals,” like Tony from iFixit.com, suggest prying the battery cover off with a knife; because nothing makes more sense than puncturing a dangerous electronic device with a metal blade. Granted, not all users bought into this lunacy. Another iFixit.com user, Nokia Adeston, promptly responded that the entire reason T-Mobile discontinued the product is because people just couldn’t wrap their heads around the fact that the user wasn’t supposed to mess with the battery.

Tony: It has no glue, I opened my ZTE Zmax using a knife and small screwdriver prying little by little.

Nokia Adeston: You aren’t supposed to open the back of the ZTE ZMAX. They can be opened but it has a high risk of damaging the phone. T-Mobile and MetroPCS stopped selling these phones because people were either breaking their devices or hurting themselves trying to open and remove the battery. I wouldn’t recommend opening it unless it is professionally done.

What Tony doesn’t understand is that batteries can act like miniature volcanoes when punctured, essentially blowing anything nearby into smithereens.

To make matters worse, we’re fairly certain that the packaging and documentation that came with the ZTE ZMax was exceptionally clear that the phone didn’t feature a removable battery. Still, this doesn’t stop people who don’t bother to read the instructions, who think they know better and attempt to perform “maintenance” on a device that isn’t even broken. Whether they were looking to replace a subpar battery or perform a hard reset, they should have contacted a professional who knows what they’re doing before taking a blade to the device.

Will Samsung learn from this mistake? We hope so; otherwise, people around the world will be putting themselves at risk by toying with batteries that shouldn’t be messed with. If something were to go wrong and the user were to get severely injured, Samsung could face lawsuits, which they would lose (because being an idiot is, unfortunately, not a crime).

Evolve IT always suggests that technology users take the time to educate themselves about their machines and devices before taking drastic measures. As a rule, you should only remove the components of device that are meant to be removed. It should be obvious which components these are, but this isn’t always the case. Repairing or replacing a hard-to-get to component (like a non-removable battery) can be a task that’s difficult, and even dangerous.

We strongly suggest that you don’t perform complicated maintenance procedures that could compromise the integrity of your devices. Instead, give us a call at (518) 203-2110 and we’ll be happy to help you out in a safe way that won’t end with a face-full of battery fire.

Comments

 
No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 28 January 2026
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up!

Free Consultation
 

Tag Cloud

Tip of the Week Security Technology Internet Best Practices Cloud Hackers Privacy Email Productivity Business Malware Business Computing Software User Tips Workplace Tips Google Hosted Solutions Microsoft Upgrade Efficiency Computer IT Support Mobile Devices Innovation Smartphone Windows 10 Gmail Hardware Network Security Ransomware Office Backup Apps Business Continuity Disaster Recovery Communication Hacking WiFi Facebook Operating System The Internet of Things Social Media Microsoft Office Bandwidth Data Windows Firewall Experience Content Filtering Cybercrime Website Mobile Device Management Money Network Employer-Employee Relationship Managed Service Provider Smartphones Outlook Two-factor Authentication History Small Business Phishing App Wireless Technology Android Apple Mobile Computing Big Data communications Safety Unified Threat Management Best Practice Quick Tips Alert Networking Data storage Cryptocurrency Remote Computing Laptop Shortcut DDoS IBM Heating/Cooling Word Monitors Google Docs Education Cleaning Holiday Black Market YouTube Processors Staffing Business Management Displays Office Tips LiFi BYOD Downtime Passwords Streaming Media Competition Help Desk Presentation Disaster Entrepreneur End of Support Micrsooft Visible Light Communication Domains Business Growth Data Management Hacker Recovery Writing Robot Advertising Society Sports Google Wallet Spam Application Customer Service Running Cable Information Technology Windows 8 Internet of Things Hosted Solution Windows XP IT Services Documents Router Retail Artificial Intelligence Tech Support Office 365 Compliance Drones Analytics Saving Money Managed IT services Social Printer Lithium-ion battery Browser intranet Virtual Desktop Wireless Securty Bluetooth Unified Communications Document Management Encryption Social Networking Automation Law Enforcement SaaS Public Speaking VoIP IP Address Virtualization Memory Proactive IT Cortana Government Deep Learning Network Congestion Save Money Augmented Reality Keyboard BDR Music Search User Hard Drives Vendor Management
QR-Code