Get Started Today!  217-475-0226

Decatur Computers Inc. Blog

Decatur Computers Inc. has been serving the Decatur area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Using Less Data on Android

Tip of the Week: Using Less Data on Android

Mobile data is extremely important to the productivity and efficiency of modern businesses--especially when employees and administrators are out of the office. The major drawback of this is that it can be an expensive setup, as mobile data transfer can be pricey. We can help you get around this issue by minimizing the amount of data your Android device uses.

Checking Your Data Usage
If you want to use less data, the first step is to see how much you’re currently using. To do this, you want to see where most of your data is being used. You can do so by accessing System Settings and going to your Network and Internet options. Under this, select Mobile data usage. You’ll then be shown a list of all your applications, as well as how much data they are using. This setting can also show you whether the data was used in the background or during the user’s activity.

Placing Caps on Your Apps
Once you’ve figured out your problem apps, you can put measures in place to limit how much data they consume:

  • Limit your updates: Some apps will constantly refresh themselves, which can burn through your mobile data faster than you’d like. Some examples of these are social media applications that update news feeds. You can cut back on how often these applications update their information in two ways. The first includes going to each app’s settings and looking for the option to reduce the amount of data than an app uses in the background. If this doesn’t work, go back to your system settings and access that particular app’s settings to deactivate background data. This isn’t always the best option for apps like messaging that need to refresh in the background in order to work.
  • Deactivate certain features: Some apps have features included that go through more data than you’d like. Examples are auto-play and high-quality streaming. You can change these settings individually by going into the app’s specific settings. Doing this can greatly decrease the amount of data your device uses.
  • Prepare in advance: Downloading content through your mobile data plan can be expensive. Most of the time, you can plan ahead by downloading whatever you need via a Wi-Fi connection instead. You can do this with music apps like Spotify, as well as Google Maps for location-based tasks.

What are some of the ways you cut down on your mobile data usage? Let us know in the comments.

5 Cloud Apps Small Businesses Should Love
You Can’t Afford Not to Have a Proper Backup Solut...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, July 19 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Privacy Technology Network Security Tech Term Business Computing IT Support Android Hackers Malware Google Software Cybersecurity Smartphone Business Management User Tips Internet Data Data Recovery Small Business Managed IT Services Data Backup Ransomware Backup Innovation Email Productivity Artificial Intelligence Efficiency Windows 10 Cloud Cybercrime Business Technology Mobile Device Management Phishing Communications Cost Management Computer IT Management Business BDR Hardware Encryption IT Services Gadgets Antivirus Collaboration Patch Management Applications Network Hard Drive Update Managed IT Services Access Control Saving Money Outsourced IT Blockchain App Data Security Apps Server Bandwidth Operating System Facebook Holiday Maintenance Remote Monitoring SaaS Microsoft Office Money Social Media Spam Data loss Search Hacking Word Touchscreen Document Management Save Money Digital Mobile Device Data Breach Office 365 Microsoft Law Enforcement Scam Passwords Start Menu Websites Laptop Browser Smartphones Tech Terms Internet of Things Data Management Business Continuity Bitcoin Project Management Disaster Recovery Social Engineering Data Protection Alert Gmail Windows Vulnerabilities Automation VPN Addiction Website Content Tip of the week Vulnerability Audit IBM Computing Infrastructure Virtual Reality Hosted Solutions Mobility Distributed Denial of Service Automobile Administration Screen Reader Machine Learning BYOD DDoS Best Practice Time Management Corporate Profile Legislation Networking Company Culture Employer-Employee Relationship Freedom of Information Managed IT Communication Password HTML Information Cortana Unsupported Software Computer Care Virtualization Business Cards Conferencing Identity Theft Network Management Google Calendar News Travel Virtual Assistant Unified Threat Management Apple Chromebook Desktop Service Level Agreement Fake News Outlook Vendor Mangement Devices Username Disaster Downtime Upgrades Emails Backup and Disaster Recovery Going Green Google Docs Access Business Mangement Compliance Hard Drive Disposal Piracy Unified Communications Specifications Bluetooth Spyware Download Running Cable Budget Microsoft Excel Redundancy WiFi Knowledge Regulations Solid State Drive email scam Software License Telephone Systems Printing Television Software as a Service Tablet Wireless Headphones Analytics Printer Mobile Security Upload Cabling Cryptocurrency IT Support Wireless Accountants Mobile Devices Consultant Government Mouse How to Cleaning Paperless Office Two-factor Authentication Trends Comparison Google Drive Training Uninterrupted Power Supply eWaste Information Technology Legal Virus Computers Big Data Database Multi-factor Authentication Gamification Worker Managed Service Provider Google Maps Telephony Equifax Robot Mobile Technology Downloads YouTube Nanotechnology Tactics Device security Cloud Computing Excel Samsung Emergency Unified Threat Management VoIP Startup History Augmented Reality VoIp SharePoint Settings Office CrashOverride Users Office Tips Windows 10 Twitter Marketing Managing Stress Multi-Factor Security

Latest Blog

Every online account will inevitably ask you to create two different credentials: a username and a password, both of which need to be kept as secure as possible. But what exactly is a username used for, and why is it such an important part of computing? For this week’s tip, ...

Latest News

Decatur Computers Inc. is proud to announce the launch of our new website at http://www.decaturcomputers.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.