How does wireless charging work?

This is my two hundred and fiftieth (writing it out in full looks better than 250th) article on Technology Bloggers! It’s taken nearly four and a quarter years to get this far, but here I am, still blogging away. 🙂
That’s an average of 5 posts per month!

Not that anyone’s keeping score, but Jonny is hot on my heals now with 165 – just 85 behind me!

Finally, wireless charging on a mainstream mobile phone has arrived. Samsung’s Galaxy S6, S6 Edge and S6 Active all come wireless charging ready. Unfortunately we aren’t yet at the stage where your phone can wirelessly charge in your pocket, you do have to buy a wireless charging pad and have it sit on that, but it’s a step further than we have ever been before. This article gives an incite into the technology behind wireless charging, and then in my next article I’m going to review Samsung’s official wireless charging pad.

Wireless Charging Technology

Tesla coil wireless power

A Tesla Coil being used to wirelessly power a light bulb

The capability to power things wirelessly is not a new phenomenon. Way back in the late 1800s, Nikola Tesla was using his Tesla Coil to power things from across the room. You might have done a similar experiment in science lessons at school, using a Tesla Coil to light up a light bulb.

The reason it’s taken so long for wireless charging to become mass market is because compared to wired charging, it is hugely inefficient. Wireless charging wastes a lot of energy as heat, meaning less is used to actually power the device. Wireless charging also takes longer than wired power, and as such is much more expensive.

Plugging my phone (the Galaxy S6) into a standard micro USB port will charge it from flat in around 2 hours. Plugging it into a fast charger takes just over an hour for a full charge. Charging wirelessly from flat takes over 3 hours. That’s 3 hours of electricity being used, compared to 1 in a fast charger.

Wireless charging has also taken a while to become mainstream because of problems with proximity. Tesla could power a light bulb from across the room, but that wasn’t controllable. If he had 2 light bulbs and only wanted to power one, he had no way of stopping power reaching the other. With so many different devices and radio frequencies about today, it is essential that wireless charging works without interfering with any other signals – for example your mobiles 4G signal. As such wireless charging has a very low proximity range. My S6 quite literally has to be on or within an inch or two of the pad to charge. A range of 1 meter would be fantastic, however that could fry other bits of tech, or ruin the magnetic strip on my credit cards.

Despite over 100 years in the making, wireless charging is still in reasonable early stages of development. It is a great idea, and when it works, it is super convenient and very useful, but still has a long way to go.

If you want to find out more about how wireless charging works, I recommend this YouTube video as a good place to start.

The Third Industrial Revolution

Recently there has been a lot of talk about a third industrial revolution in the making. It is of course that involving 3D printing. Take a look at the other articles on the website for an overview.

The thing about these machines is that they can produce individual tailor made objects at low cost, something that was not really possible in the days of mass production, when multiples were cheap but individual one off projects very expensive.

It is a contentious technology though for several reason, the first being its versatility. A few months ago we had the first fully printed gun, the plans were put online for free before being removed but only after more than 100 000 people downloaded them.100 000 more unlicensed guns in the world possibly. Check out this article.

Another reason is that these machines will completely change manufacturing. The old days of heavy machinery in production lines might be numbered, and this means that the power and financial strength that the organizations that have control of these systems currently posess is about to be lost.

So where should somewhere like MIT here in Cambridge MA stand? They have to support new technology, it is their job, but in doing so they might be undermining their own foundations, rooted as they are in large scale US industry.

3D Printed Prosthetic Hand

3D Printed Prosthetic Hand

As well as the printable gun though there are obviously a million good uses for this technology. Two weeks ago I mentioned an engineering company that is testing an aeroplane engine that uses printed parts, and in case of dire need you can now print a prosthetic hand for about $150 through an open source website. Read the article here.

Last week the Bassetti Foundation sponsored a series of events in San Francisco based around these problems. One of the main speakers was Chris Anderson, ex editor of Wired magazine and author of the book Makers, he is a leader in thinking on these matters. There is plenty of information on the website for interested readers, including videos of the symposium about the political and social implications of a move towards 3D printed manufacture.

3D Printed Motorbike

3D Printed Motorbike

Check out the photos too, here is a printed motorbike. They can produce far more than you imagine.

Kill the Password

This week I would like to draw readers’ attention to an article that appeared in Wired at the end of last year. Written by Mat Honan and entitled Kill the Password: Why a String of Characters Can’t Protect Us Anymore, it makes for really interesting and alarming reading.

The author starts by explaining that he lost all of his digital life last year as his accounts were hacked, an event that lead him into investigating online security and how it is breached.

What he discovered is not for the faint hearted. The linking together of different accounts using an email as username means that any seriously interested party with a little time on their hands and very little money can relatively easily get into a single account, and from there into the others.

His conclusion is that the culture of using passwords for security is outdated, a thing of the past and that anyone who tells you otherwise is either deluded or trying to convince you of something that is not true.

The worst password choices

Worst passwords of 2012

The availability of information is a problem because of the personal question access to resetting your password. Mother’s maiden name, place born etc. are easy things to find out about anybody through ancestry sites or other documents. Once you have somebody’s email address, you try to reset the password using the personal questions through the provider’s website. The answers might be on Facebook, or on their blog, or maybe intuitive, but they are out there.

Then to the customer services rep that you speak to by phone. They are people and can be misled. The article contains a transcription of a conversation between a hacker and one of these people. As the user needs to be able to reset the password they are offered a series of questions that get easier and easier to guess. Names of best friends is possible using Facebook or other social network publications, but if not try favourite food or others, but the example given is name of one of the files in the account. Try Google, Amazon, Personal, one will be right.

So the problem is that the system needs to be flexible and easy enough to use, so we must be able to easily change our passwords, but this makes security impossible.

How can this problem be addressed? Here the trade off is privacy. If the company knows you, through your search histories, places you have been, where you work and what you like to do they might better be able to tell if the password reset-er is you, but you lose any privacy you think you might have.

Voice recognition can be tricked using recordings, biometrics and fingerprints too. Once a system uses these things that cannot be changed or reset the problem is magnified. If I have a fingerprint lifted from a screen I can use it to get anywhere and new fingers are hard to come by these days, so what do you use next?

The article poses these problems from the point of view of somebody who has been hacked, but the author also looks at who these hackers are and even meets a couple. It is big business in certain circles, particularly in the Russian speaking world where organized crime has a large stake and makes a lot of money through stealing identities and all that follows. In other circles they are just “kids” having some fun wreaking havoc.

There are a few simple strategies outlined in this (not short) article that are worth following but none are foolproof, and that is a lesson we could all learn from. Just a word of warning, it contains some harsh language.

On a lighter note happy new year to everyone, and my mum’s maiden name was Windsor (no relation to either Barbara or Elizabeth).