ct logo wslogan

2 minutes reading time (475 words)

Tip of the Week: How to Transfer Apps to a New Phone

Tip of the Week: How to Transfer Apps to a New Phone

There is little that is more satisfying than obtaining a new phone. However, this sense of satisfaction is often undermined by the need to get your applications and data to ensure that your new device has everything you normally use installed. For this week’s tip, we’ll go over a method of making this process easier on an Android phone.

The first step to ensuring that your Android’s data can be retrieved is to ensure that it is properly backed up and able to be retrieved.

To check, you will need to access Settings, before opening Backup & reset. You will then have to toggle on Back up my data. You’ll then return to previous menu and select Backup & reset. Check that your Android account is the correct one in Backup account. You will then toggle automatic restore to On to be able to restore settings and data associated with the Android account in question.

Now that you’ve enabled Android’s backup service, your personal settings and application data will be saved to Google Drive. Now that the preliminary steps are handled, it’s time to restore your applications and settings to your new phone.

Restoring your applications and data is pretty straightforward if you are utilizing the Lollipop-version of the Android OS or above. This setting is available to phones as they’re booting up for the first time, or just after they have been factory reset.

  1. Select the arrow at the welcome screen to start setting up your phone.
  2. Select System language and log into your Wi-Fi network.
  3. Select Accept and continue.
  4. You can then copy your Google accounts, apps, and data from another device. If you choose not to do that, you can then forge ahead by logging in to your Google account.
  5. There will be a privacy statement, press Accept.
  6. Now go to the Google services page. Here you can select to enable the backup service for your account.
  7. Choose all your preferences and select Next.
  8. If you want to add an email account, you can do so in the Add another email section. If you don’t need to do that, just select Not now, then click Next.
  9. You will then have to restore your apps from the “Which device?” menu. You will see all the Android devices that you’ve used. Select the device to see which apps will be available when you restore. If you don’t want everything restored, you can choose the arrow next to the Restore option and select what you’d like to restore and what you’d like to leave off your new device.
  10. Choose which device’s configuration you want to restore from, hit Restore.

After your apps are restored, be sure to enable security for your phone; and, if you so choose, get Google Now for your device.

The Android smartphone is one of today’s most important productivity tools. For more great information about mobile usability and security, give us a call today at 630-549-6199.



Already Registered? Login Here
No comments made yet. Be the first to submit a comment

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Google Cloud Business Computing Hackers Backup Microsoft Malware Innovation Tech Term Internet Email Android Mobile Devices Data Network Security Cybercrime Small Business VoIP Windows Business Cloud Computing Software Efficiency Data Backup Ransomware Smartphones Hardware How To Smartphone Internet of Things Computers Cybersecurity User Tips Business Management Browser Computer Chrome Automation Artificial Intelligence Business Continuity Money Collaboration Router Data Recovery Productivity Mobile Device Management Communication Law Enforcement Social Engineering Hosted Solutions Managed IT Services Communications Network Upgrade Save Money Outsourced IT Bring Your Own Device Phishing Office 365 BDR Data Protection Data Breach Spam Safety Managed IT Services Gadgets Word Windows 10 Connectivity Vulnerability Operating System Data Security Bandwidth Two-factor Authentication Social Media Saving Money Server Telephone Systems Alert App Disaster Recovery Passwords Content Management Apps Cleaning Redundancy Avoiding Downtime Data storage Sports Spam Blocking Physical Security Comparison Gmail YouTube Website Blockchain Windows 10 Government BYOD Private Cloud Google Drive Recovery Data Storage Paperless Office Downtime Virtualization The Internet of Things Networking IT Support VPN Remote Monitoring Identity Theft Password Public Cloud Facebook Business Intelligence IT Management Managed IT Update OneNote Windows 7 Miscellaneous IT Plan Quick Tips Infrastructure Applications Productivity Internet Exlporer CES Wi-Fi IT Services Unsupported Software Microsoft Office Mobile Device Hacking Marketing Wireless Technology Trending Budget Screen Mirroring Smart Office Electronic Medical Records Black Market History Start Menu Cortana Google Docs Root Cause Analysis Managed Service Provider Amazon Holiday Cryptocurrency Business Mangement Computer Fan Nanotechnology Relocation Excel Telecommuting Software Tips Servers Advertising Charger Practices Cast Document Management Tools Google Apps Safe Mode Addiction Tech Support Sync Amazon Web Services Netflix Flexibility Recycling FENG Smart Tech Tip of the week Remote Work webinar HVAC Outlook Computer Care Windows 10s Hosted Computing Specifications Current Events Hiring/Firing User Error Employer-Employee Relationship Digital Signature Virtual Assistant Voice over Internet Protocol HIPAA Meetings Cache Health Shadow IT Online Shopping eWaste Patch Management Windows Server 2008 Conferencing Enterprise Content Management Humor Samsung Workplace Tips Inventory USB Chromecast Knowledge Automobile Machine Learning Robot Workers Legal Encryption Telephone System Reputation Human Resources IBM Wireless Internet Telephony Evernote Criminal Devices Scam Laptop Apple Uninterrupted Power Supply Going Green Credit Cards Emails Password Management Hybrid Cloud Value Solid State Drive Access Control HBO Millennials Network Congestion Work/Life Balance End of Support Botnet Accountants Keyboard Customer Data Management NarrowBand Multi-Factor Security Staff Supercomputer Data loss Wire Files Skype Wireless Charging Settings Thought Leadership Touchpad iPhone Office Tips Flash Fraud HaaS Entertainment NIST Monitor PDF Audit Authentication Big Data Office DDoS Frequently Asked Questions Workforce IT Consultant Internet exploMicrosoft Travel Password Manager Experience Users Thank You Vendor Management Information Technology Twitter Benefits Bluetooth IT solutions IT Support SaaS Books Video Games Music Virtual Reality Save Time Congratulations Battery Firewall Emergency Scalability Wearable Technology Worker Commute Mobility Risk Management Education Smart Technology Worker Assessment Search Content Employer Employee Relationship Politics Wireless Computing Infrastructure Two Factor Authentication Rootkit Remote Computing Television How to Techology Audiobook Instant Messaging Troubleshooting Company Culture Computer Accessories Best Practice Training WiFi Public Computer CrashOverride Transportation Webinar Loyalty Managing Stress