ct logo wslogan

i-medIT Blog

At i-medIT, we provide a comprehensive range of computer and technology solutions to small business owners and Ambulatory Health Care entities. We specialize in helping companies focus on their business by leveraging IT to serve their goals and objectives rather than being a distraction.
Customers come to us for managed services, healthcare IT, project management, IT consulting, HIPAA Compliance, PCI Compliance, server virtualization, and data backup. These core services help our customers run their own companies and take their business goals to the next level.

Tip of the Week: How to Transfer Apps to a New Phone

Tip of the Week: How to Transfer Apps to a New Phone

There is little that is more satisfying than obtaining a new phone. However, this sense of satisfaction is often undermined by the need to get your applications and data to ensure that your new device has everything you normally use installed. For this week’s tip, we’ll go over a method of making this process easier on an Android phone.

The first step to ensuring that your Android’s data can be retrieved is to ensure that it is properly backed up and able to be retrieved.

To check, you will need to access Settings, before opening Backup & reset. You will then have to toggle on Back up my data. You’ll then return to previous menu and select Backup & reset. Check that your Android account is the correct one in Backup account. You will then toggle automatic restore to On to be able to restore settings and data associated with the Android account in question.

Now that you’ve enabled Android’s backup service, your personal settings and application data will be saved to Google Drive. Now that the preliminary steps are handled, it’s time to restore your applications and settings to your new phone.

Restoration
Restoring your applications and data is pretty straightforward if you are utilizing the Lollipop-version of the Android OS or above. This setting is available to phones as they’re booting up for the first time, or just after they have been factory reset.

  1. Select the arrow at the welcome screen to start setting up your phone.
  2. Select System language and log into your Wi-Fi network.
  3. Select Accept and continue.
  4. You can then copy your Google accounts, apps, and data from another device. If you choose not to do that, you can then forge ahead by logging in to your Google account.
  5. There will be a privacy statement, press Accept.
  6. Now go to the Google services page. Here you can select to enable the backup service for your account.
  7. Choose all your preferences and select Next.
  8. If you want to add an email account, you can do so in the Add another email section. If you don’t need to do that, just select Not now, then click Next.
  9. You will then have to restore your apps from the “Which device?” menu. You will see all the Android devices that you’ve used. Select the device to see which apps will be available when you restore. If you don’t want everything restored, you can choose the arrow next to the Restore option and select what you’d like to restore and what you’d like to leave off your new device.
  10. Choose which device’s configuration you want to restore from, hit Restore.

After your apps are restored, be sure to enable security for your phone; and, if you so choose, get Google Now for your device.

The Android smartphone is one of today’s most important productivity tools. For more great information about mobile usability and security, give us a call today at 630-549-6199.

 

Comments

No comments made yet. Be the first to submit a comment

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Business Computing Google Hackers Cloud Backup Microsoft Innovation Android Small Business Network Security Email Internet Business Cybercrime Ransomware Efficiency Smartphones Malware Data Software Hardware Computers Data Backup VoIP Smartphone Windows Cybersecurity User Tips Mobile Devices Cloud Computing Browser How To Mobile Device Management Productivity Business Management Business Continuity Managed IT Services Social Engineering Chrome Phishing Safety Outsourced IT Alert Collaboration Bring Your Own Device Spam Data Breach Managed IT Services Data Security Gadgets Two-factor Authentication Vulnerability Upgrade Bandwidth Telephone Systems Operating System Data Protection Social Media Internet of Things Computer Data Recovery App Communication Windows 10 Money Tech Term Server Network Law Enforcement Automation Disaster Recovery Save Money Spam Blocking Passwords BYOD Gmail Word Identity Theft Miscellaneous The Internet of Things Artificial Intelligence Virtualization Physical Security Private Cloud Hosted Solutions Google Drive Wi-Fi Public Cloud Redundancy Apps Avoiding Downtime Comparison Office 365 Communications BDR Cleaning Downtime Data Storage Remote Monitoring Windows 10 Business Intelligence Recovery IT Management Update VPN Router Quick Tips OneNote Government IT Plan Saving Money CES Internet Exlporer Productivity IT Services Unsupported Software Data storage End of Support Electronic Medical Records Google Apps Tools Software Tips Outlook Website Customer Charger Blockchain Inventory Remote Work Tip of the week Flexibility iPhone Internet exploMicrosoft webinar Employer-Employee Relationship Humor Voice over Internet Protocol YouTube Marketing Windows 10s Hacking Computer Care HIPAA Networking Access Control Windows Server 2008 Meetings Managed Service Provider Advertising Conferencing Hiring/Firing Workers Managed IT Automobile Samsung Human Resources IBM Authentication Patch Management Credit Cards Windows 7 Legal HBO Emails Infrastructure Botnet Monitor Multi-Factor Security Work/Life Balance Solid State Drive Value Staff Health Supercomputer Scam Fraud Keyboard Going Green Flash Data loss Uninterrupted Power Supply Password Manager Black Market Travel Trending Microsoft Office NarrowBand Facebook Audit Data Management Budget Amazon Mobile Device Screen Mirroring Office Tips Hybrid Cloud Business Mangement Wireless Technology Computer Fan Digital Signature Files Amazon Web Services Sync Cast Sports PDF Netflix Recycling Encryption Specifications FENG Office History Current Events Online Shopping Tech Support IT Support eWaste Robot Accountants Password Relocation Knowledge Evernote Laptop Telephony Shadow IT Criminal Millennials Chromecast User Error Network Congestion Wireless Charging Touchpad Skype Settings Practices Workforce Frequently Asked Questions HaaS IT Consultant Cortana Start Menu Google Docs Reputation Content Management Hosted Computing Big Data Telecommuting Holiday Excel Root Cause Analysis DDoS Apple Thank You Virtual Reality Books Congratulations Save Time Worker Commute Emergency Risk Management Mobility Search Politics How to Employer Employee Relationship Nanotechnology Best Practice Webinar Computer Accessories Loyalty Smart Tech Transportation Experience IT solutions Bluetooth SaaS Connectivity Benefits Music Video Games Battery Devices Firewall Scalability Education Information Technology Worker Wearable Technology Content Assessment Thought Leadership Smart Technology Workplace Tips Computing Infrastructure Rootkit USB Audiobook Techology Television Two Factor Authentication Instant Messaging WiFi Applications Remote Computing Training Troubleshooting Entertainment CrashOverride Public Computer Users Wireless Vendor Management IT Support