Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Notifications are What’s Draining Your Battery, Not Open Apps

b2ap3_thumbnail_dont_close_apps_400.jpgWe’ve all run into the trouble of keeping our smartphone’s battery preserved for as long as possible. Many people think that the apps themselves are what bogs down the battery and drains its charge, but we’re here to tell you that this is not the case. Instead, let’s determine what really drains your device’s battery.

The concept behind this idea seems to make sense. The app consumes power, and if it’s running in the background, it will continue to sap energy out of the device’s battery. Yet, the fact remains that this isn’t the case, and closing your apps does nothing to stem the flow of energy from your battery. Why is this? CNet explains:

When you leave an app, your phone actually pauses it in its current state. So, all of those apps that show up in your task manager aren’t actually draining your battery; they’re just frozen, sitting in your phone’s RAM, or memory. That way, the next time you launch it, you can pick up where you left off. When you kill an app, you’re actually taking it out of your phone’s memory, which means that the next time you launch it, your phone will have to do the work of putting it back in the RAM.

In other words, continuously killing all of your apps will only make more work for your device, and consume more energy in the long run. Leaving your apps running in the background is actually more energy-friendly than closing out of them, and reopening them, primarily because leaving them open has no effect on the battery’s power itself.

Granted, there are other ways that your apps consume battery life. In order to check where most of your Android smartphone’s energy is being allocated, you can go to Settings > Battery.

You’ll see what percentage your apps are using. Even if they’re not actively being used by you, they’ll still push notifications to your phone if they’re set to do so. This is the main culprit for a drained battery, as is data usage. You can limit which notifications show up by going to your general notifications setting.

The process will vary depending on which device you’re using, but on the Samsung Galaxy S5, you can block specific notifications by going to Settings > Sound and notifications > Application notifications. Select the notification that you want to block, and you’ll be given the option to block it. Otherwise, you can control specific application notifications from within the application itself.

By keeping your apps open rather than closed, you’ll be able to keep the productivity going without closing out of your apps in an attempt to save battery life. You might be surprised by how much more energy your battery will have!

Subscribe to our blog for more great tips from Voyage Technology.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 11 June 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Internet Efficiency IT Support Malware Privacy Google Computer Phishing Email Workplace Tips IT Services Users Collaboration Hosted Solutions Mobile Device Workplace Strategy Ransomware Quick Tips Microsoft Cybersecurity Small Business Passwords Communication Data Backup Saving Money Smartphone Backup Managed Service Smartphones VoIP Android Business Management Mobile Devices Upgrade communications Disaster Recovery Data Recovery Browser Social Media Windows Managed IT Services Microsoft Office Current Events Remote Network Tech Term Productivity Internet of Things Artificial Intelligence Facebook Automation Gadgets AI Covid-19 Cloud Computing Remote Work Server Managed Service Provider Miscellaneous Outsourced IT Holiday Information Spam Employee/Employer Relationship Encryption Compliance Training Office Windows 10 Business Continuity Government Data Management Bandwidth Wi-Fi Windows 10 Blockchain Business Technology Virtualization Apps Data Security Mobile Office Two-factor Authentication Vendor IT Support Chrome Employer-Employee Relationship Budget Networking Apple App BYOD Mobile Device Management Managed Services Gmail Voice over Internet Protocol Applications How To Hacker BDR Conferencing Avoiding Downtime Marketing Computing Information Technology Access Control WiFi Office 365 HIPAA Tip of the week Augmented Reality Retail Storage Password Bring Your Own Device Help Desk Managed IT Services Computers Website Operating System Virtual Private Network Risk Management Health Healthcare Big Data Analytics Office Tips Router Windows 7 Microsoft 365 Scam Data loss Monitoring Solutions Customer Service Patch Management Save Money Going Green Remote Monitoring Telephone End of Support Vulnerability Vendor Management Cybercrime Physical Security Cooperation Firewall Display Printer Windows 11 Remote Workers 2FA Paperless Office Infrastructure The Internet of Things Excel Social Document Management Free Resource Project Management Money Images 101 Humor User Tip Modem Mobility Mobile Security Maintenance Processor Multi-Factor Authentication Customer Relationship Management Antivirus Sports Data Privacy Mouse Hacking Smart Technology Presentation Employees Administration Integration Saving Time Wireless Technology Robot Managed IT Service Holidays Downloads Data Storage Settings Wireless Licensing Word Printing IT Management Video Conferencing Meetings Content Filtering VPN Entertainment Managed Services Provider Professional Services YouTube Virtual Machines Cryptocurrency Computer Repair Telephone System Safety Supply Chain Cost Management iPhone Virtual Desktop LiFi Data storage Machine Learning Vulnerabilities Outlook IT Assessment Private Cloud Username IBM Technology Care Server Management Superfish Business Communications Flexibility Identity Theft Value Black Friday Scams Hacks Organization Scary Stories Twitter Database Smart Devices Error Fun IT Technicians Hybrid Work Digital Security Cameras Human Resources Deep Learning Remote Working Proxy Server Memory Social Engineering Cookies Cyber Monday Google Play Competition Hotspot Cables Data Breach Remote Computing Tactics Education Electronic Health Records Mirgation Videos Google Apps Tablet Wasting Time Nanotechnology Addiction Security Cameras Language IT Maintenance Mobile Computing Trend Micro Alert Software as a Service File Sharing Management Search Dark Data Chatbots User Business Intelligence Managed IT Distributed Denial of Service Shortcuts Best Practice Managing Costs How To Screen Reader Service Level Agreement SSID Computing Infrastructure Ransmoware Buisness eCommerce Notifications IT solutions Surveillance Travel Virtual Assistant IP Address Identity Vendors Legal Techology Be Proactive Business Growth Google Maps Bookmark Virtual Machine Smart Tech Download Medical IT Alerts Workforce Reviews Development Unified Threat Management Cortana Transportation Recovery Threats Break Fix Unified Threat Management Workplace Strategies Alt Codes Browsers Hypervisor Connectivity Hard Drives Upload PowerPoint Domains Meta Shopping Downtime Optimization Hosted Solution Social Network Employer/Employee Relationships Network Congestion Multi-Factor Security Amazon Dark Web User Error Typing PCI DSS IoT Navigation Refrigeration Trends Public Speaking Outsource IT Gig Economy Media Internet Service Provider Point of Sale Customer Resource management Knowledge Teamwork Lithium-ion battery Regulations Google Calendar Environment Google Drive Microsoft Excel Entrepreneur Regulations Compliance Data Analysis Star Wars Evernote Tech Support Gamification 5G Staff Small Businesses Network Management Memes Unified Communications Net Neutrality Experience SQL Server Monitors Social Networking Legislation Displays Google Docs Bitcoin Financial Data Fileless Malware Running Cable History Undo Websites Content Wearable Technology Outsourcing Google Wallet Smartwatch IT Procurement Health IT Azure Motherboard Comparison Permissions SharePoint Workplace Windows 8 Telework Directions Laptop Cyber security Electronic Medical Records Assessment Tech Communitications Hiring/Firing Drones CES Lenovo Paperless Supply Chain Management Writing Application Specifications Term Fraud Co-managed IT FinTech Microchip Halloween Virtual Reality Internet Exlporer

Blog Archive