Browse Definitions :
Definition

battery life

Battery life is a measure of  battery performance and longevity, which can be quantified in several ways: as run time on a full charge, as estimated by a manufacturer in milliampere hours, or as the number of charge cycles until the end of useful life. 

Build factors that affect battery life include the type, the number and the quality of cells used.  Generally, battery health and longevity declines further into a battery's life and as a function of the number of charge cycles it has gone through. However, there are a number of things a user can do to extend battery life.

Both lithium polymer and lithium ion batteries tend to benefit from partial discharges to enable more charge cycles before performance is lost. Older rechargeables, like nickel cadmium or nickel metal-hydride lithium batteries, do not get a charge memory that reduces performance when the battery is only partially discharged before recharging.

Because charge cycles degrade battery life, removing a laptop’s battery and plugging the device in when staying in one place will preserve and extend battery functioning. Other measures include ensuring clean electricity and keeping the device cool.

Tips to increase the length of time a battery runs on a charge include not running more applications than necessary and reducing screen brightness.

This was last updated in August 2013

Continue Reading About battery life

SearchCompliance

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • spam trap

    A spam trap is an email address that is used to identify and monitor spam email.

  • honeypot (computing)

    A honeypot is a network-attached system set up as a decoy to lure cyber attackers and detect, deflect and study hacking attempts ...

  • cracker

    A cracker is someone who breaks into someone else's computer system, often on a network; bypasses passwords or licenses in ...

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

  • erasure coding

    Erasure coding (EC) is a method of data protection in which data is broken into fragments, expanded and encoded with redundant ...

  • continuous data protection

    Continuous data protection (CDP), also known as continuous backup, is a backup and recovery storage system in which all the data ...

Close