Get Started Today!  217-475-0226

Decatur Computers Inc. Blog

Decatur Computers Inc. has been serving the Decatur area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Making the Switch from Apple to Android? Be Prepared!

Making the Switch from Apple to Android? Be Prepared!

With so many options that don’t cost $800, the Android mobile OS gains more customers every day. If you were a dedicated iPhone user that is looking to switch to Android, you have to be cognizant of the things you will need to ensure that you are able to transfer the information you need, and be able to seamlessly pick up your new device without missing a beat. Here are some issues you should consider:

Apps are a big part of mobile computing; and, are surely important to you. Fortunately for the new Android user, they feature two of the largest app stores going. Both Google Play and the Amazon App Store feature thousands of useful Android applications, many of which are virtually the same as the app found on the Apple App Store. You will want to go through your phone and make a list of the apps you use the most and make certain that when you do switch, that the app is available for Android phones.

This may even give you the chance to consolidate the apps you use on your device. Since you will have to purchase all your paid apps that you want on a different platform, it becomes important that you have a strategy in mind when you switch as to not put too much financial pressure on yourself.

The Deactivation of iMessage
Once you’ve got your phone set up and your apps installed, you have to ensure that your messaging is on point. Since Apple’s iMessage utilizes a Wi-Fi connection (which isn’t the case with Android), you will not be able to receive texts from iPhones until iMessage is completely deactivated. Fortunately, Apple provides a tutorial on how to accomplish this. Once this is finished you should be fine to get SMS from people with iPhones.

Transfer Your Information
Transferring your data from one platform to another isn’t very easy, but users going from iOS to Android can make it simpler by using Google Drive. Here are the steps you have to take:

  1. Install and sign into Google Drive on your Apple device.
  2. Go to Menu > Settings > Backup and save all the data you need from the Apple device to Google Drive.
  3. You can then back up everything by clicking Start Backup. It will give you options on what you want to take and what you don’t mind leaving behind.

It seems simple, but this is an extraordinarily lengthy process, so keep the iPhone plugged in, and Wi-Fi on. Once you have your new Android device, all you have to do is sign in to Google Drive and you’ll have all the information you need. Simply download it and you are ready to roll.

What was the determining factor in your switch to Android? Would you continue to use Apple devices if their prices dropped? Leave your thoughts in the comments section below.

How to Identify If an Email is a Security Risk
Tech Term: Virtualization, Defined


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, July 19 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Privacy Technology Network Security Business Computing Tech Term Hackers Android IT Support Malware Google Software Cybersecurity Business Management User Tips Internet Data Recovery Data Smartphone Managed IT Services Ransomware Backup Data Backup Innovation Email Small Business Windows 10 Artificial Intelligence Efficiency Cloud Productivity Computer IT Management Business Phishing Communications Cost Management Business Technology Hardware BDR Mobile Device Management Cybercrime Network Access Control Outsourced IT Data Security Encryption Hard Drive Update Managed IT Services Saving Money Applications Antivirus App Collaboration IT Services Patch Management Blockchain Gadgets Gmail Vulnerabilities Smartphones SaaS Tech Terms Money Business Continuity Social Media Search Bandwidth Project Management Touchscreen Save Money Holiday Microsoft Passwords Windows Start Menu Law Enforcement Browser Data loss VPN Hacking Server Operating System Mobile Device Facebook Maintenance Data Management Data Breach Office 365 Remote Monitoring Disaster Recovery Microsoft Office Spam Data Protection Alert Word Digital Document Management Internet of Things Automation Bitcoin Apps Scam Social Engineering Websites Laptop Best Practice Nanotechnology Upload Knowledge Mobile Technology Employer-Employee Relationship Tactics Printing Device security Software as a Service Excel Tablet Analytics Startup Unsupported Software Trends Augmented Reality SharePoint Addiction Government Website Tip of the week How to Computing Infrastructure Comparison Screen Reader Gamification Virtual Reality Google Drive Distributed Denial of Service Machine Learning Legal Virus Networking Big Data Legislation Managed Service Provider Upgrades Communication Google Maps Company Culture Telephony Freedom of Information Downloads HTML Cortana YouTube Business Cards Virtualization Emergency Conferencing Content Identity Theft VoIP News Running Cable VoIp Virtual Assistant Settings Vulnerability Solid State Drive WiFi Apple Telephone Systems Chromebook BYOD Audit Desktop Fake News Administration Cabling Mobility IT Support Devices DDoS Downtime Wireless Emails Consultant Backup and Disaster Recovery Information Time Management Corporate Profile Compliance Managed IT Hard Drive Disposal Piracy Password Specifications Uninterrupted Power Supply Bluetooth Network Management Travel Computer Care Microsoft Excel Worker Google Calendar Regulations email scam Service Level Agreement Software License Television Wireless Headphones Printer Username Mobile Security Unified Threat Management Cryptocurrency Cloud Computing Samsung Accountants Outlook Mobile Devices Going Green Disaster Vendor Mangement Mouse History Unified Threat Management Cleaning Paperless Office Two-factor Authentication Access Google Docs Training eWaste Computers Download Information Technology Business Mangement IBM Hosted Solutions Database Unified Communications Automobile Multi-factor Authentication Robot Spyware Budget Equifax Redundancy Office Users Multi-Factor Security Office Tips Managing Stress Windows 10 Marketing CrashOverride Twitter

Latest Blog

Every online account will inevitably ask you to create two different credentials: a username and a password, both of which need to be kept as secure as possible. But what exactly is a username used for, and why is it such an important part of computing? For this week’s tip, ...

Latest News

Decatur Computers Inc. is proud to announce the launch of our new website at The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.