Hardware & Infrastructure
Commentary
8/18/2006
06:40 PM
John Soat
John Soat
Commentary
Connect Directly
RSS
E-Mail
50%
50%

IT Confidential: Three Bright Ideas For Those Blazing Batteries

When life hands you lemons, make lemonade. Flaming laptops? Easy: Just add sticks and some marshmallows.

To: Dell, Round Rock, Texas
From: John Soat

Dear Dell Battery-Recall Dudes:

First, let me express how sorry I am about what happened with those notebook batteries. A little heat in the lap never hurt anybody, but who would have thought they'd actually burst into flames? And that manufacturing partner of yours? Whatever happened to "Sony: The One And Only"? How the mighty have melted down.

I'm writing to you with what I hope is a solution to your problem. The first order of business is this: DON'T THROW AWAY THOSE BATTERIES! I think I might have a good use for those babies. Let me explain.

There was a study released two weeks ago by researchers in the United Kingdom and Australia concerning used and discarded hard drives ("Second-Hand Drives Yield First-Class Data"). These researchers purchased used computers at auctions or computer fairs in Australia, Germany, North America, and the United Kingdom. When they examined the hard drives in those computers, they found a surprising amount of sensitive data still intact, including payroll information, IP addresses, cell phone numbers, and bank and credit card information.

In another study released last week, this one by the Ponemon Institute, a corporate privacy consulting firm, and Vontu, a data security vendor,

81% of the companies surveyed reported having lost one or more laptops containing sensitive information in the past 12 months. Laptops and PDAs ranked highest as corporate data security risks, followed by USB memory sticks, desktop systems, and shared file servers.

You might see where I'm going with this. What if there were a way to rig those combustible batteries to heat up and explode on cue? An internal clock could trigger combustion after a laptop reached the end of its corporate-viability cycle. And in terms of security, an internal sensor, like a fingerprint reader or iris scanner, could trigger combustion if the wrong person handled a corporate laptop. It would be like that smoking tape recorder in Mission: Impossible (the TV show, not the movies with Tom Cruise). You might look into licensing the Mission: Impossible theme music--"Dum, dum, da-da, dum, dum, da-da..."--as a promotion. Just a thought.

It may not be necessary to incinerate every corporate laptop. Heat alone, at the proper level, would force a would-be thief to drop a purloined computer. But you'd have to be careful not to apply that heat indiscriminately, which, come to think of it, is what got you in trouble in the first place.

Here's another idea. My son is starting college and, fortunately for us, we bought him an Apple iMac. (Sorry, I didn't mean to be insensitive.) The point is, college students can always use a good excuse for not completing assignments ("the dog ate my homework," etc.). What better excuse than, "My laptop battery overheated and incinerated my hard drive"? Think of the marketing potential!

Remember, when one door closes, another opens. And if you can't stand the heat, get out of the kitchen.

Got any more ideas for the blazing batteries? Or any industry tips? Send them to jsoat@cmp.com, or phone 516-562-5326.

Got film of a flaming laptop? "The News Show" wants it. Watch the show, at noon EDT every weekday, at TheNewsShow.tv or on InformationWeek.com, then send us an E-mail.


To discuss this column with other readers, please visit John Soat's forum.

To find out more about John Soat, please visit his page.

Comment  | 
Print  | 
More Insights
The Business of Going Digital
The Business of Going Digital
Digital business isn't about changing code; it's about changing what legacy sales, distribution, customer service, and product groups do in the new digital age. It's about bringing big data analytics, mobile, social, marketing automation, cloud computing, and the app economy together to launch new products and services. We're seeing new titles in this digital revolution, new responsibilities, new business models, and major shifts in technology spending.
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Tech Digest - July 22, 2014
Sophisticated attacks demand real-time risk management and continuous monitoring. Here's how federal agencies are meeting that challenge.
Flash Poll
Video
Slideshows
Twitter Feed
InformationWeek Radio
Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.