ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: We Bust the Myth of How Mobile Apps Drain Battery Power

b2ap3_thumbnail_stop_closing_apps_400.jpgEvery mobile device user wishes for more battery power. There are many tips floating around the Internet on how to extend your battery’s life; one of them just isn’t true--closing out your apps. When it comes down to it, your battery is better off if you just leave your apps opened.

Many users assume that closing an app is the way to go because they think that, if it’s no longer open, then it’s no longer running and draining power. While this may be the case for a PC, mobile apps work differently. CNet explains:

When you leave an app, your phone actually pauses it in its current state. So, all of those apps that show up in your task manager aren’t actually draining your battery; they’re just frozen, sitting in your phone’s RAM, or memory. That way, the next time you launch it, you can pick up where you left off. When you kill an app, you’re actually taking it out of your phone’s memory, which means that the next time you launch it, your phone will have to do the work of putting it back in the RAM.

Essentially, it takes significant battery power to open a new app, and an opened-yet-frozen app doesn’t consume any extra power (outside of what the app normally uses by running in the background). Therefore, closing and opening your apps all day long will actually cause your RAM to do more work than it needs to, and thus, drain your battery quicker.

To be clear, there are many mobile apps that operate behind the scenes and eat up significant power, whether they’re open or not. To find out which apps are the biggest energy hogs on your Android device, go to Settings > Battery. This informative screen will break down app power consumption and data usage by percentages. It’s worth a look.

While you’re thinking about which apps use the most energy, it’s important to keep in mind that notifications can eat up a significant chunk of power. Therefore, you can save power by disabling notifications for apps that you don’t need to be notified about. Do this on Android by going to Settings > Sound and notifications > Application notifications, and then block the apps that you don’t use.

We know that keeping your apps opened like this seems counterintuitive as far as normal computing practices go, but we assure you that it will work like a charm. The next time you're in a pinch and need to extend the battery life of your mobile device, fight the urge to close and keep those apps open!

For more great tips from ClearView IT, subscribe to our blog!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Microsoft Google Collaboration Android Cybersecurity Business Management Phishing IT Services Backup Data Backup Ransomware Smartphone communications Upgrade Small Business Smartphones Microsoft Office Mobile Devices Network Communication Data Recovery Managed IT Services Quick Tips Productivity VoIP Users Social Media Mobile Device Automation Tech Term Windows 10 Business Continuity Facebook Covid-19 Passwords Holiday Disaster Recovery Apps Managed Service Windows 10 IT Support Browser Cloud Computing Outsourced IT Miscellaneous Managed Service Provider Internet of Things Data Management Remote Work Operating System Government Saving Money Gadgets Networking Workplace Strategy Windows Artificial Intelligence Managed IT services Blockchain Bandwidth Encryption Server Mobile Device Management Information Remote App Virtualization Spam WiFi Business Technology Budget History Gmail Employee/Employer Relationship Office Apple Two-factor Authentication Information Technology Office 365 Cybercrime Wi-Fi Conferencing Access Control Data Security Health Big Data Analytics BDR IT Management Save Money Training Compliance Employer-Employee Relationship Patch Management Help Desk Vendor Hacking Cost Management Remote Monitoring Remote Computing Voice over Internet Protocol Document Management Hacker Managed Services Customer Service Unified Threat Management Firewall Data loss Augmented Reality Word Search... BYOD Best Practice IBM Website Computing Vendor Management Retail Hard Drive Applications Alert Project Management Hiring/Firing Vulnerabilities Outlook Password Legal Mobile Office Data storage Money Free Resource Google Maps Sports Travel Social Scam SaaS DDoS Virtual Reality Mobile Computing How To Social Engineering Cryptocurrency Black Market VPN Marketing iPhone Cleaning Running Cable Education Cortana Robot Update Content Filtering Storage Data Breach Router Paperless Office Antivirus The Internet of Things YouTube Maintenance Twitter User Windows 11 Monitoring Law Enforcement End of Support Laptop Printer Healthcare Websites Remote Workers Chrome Meetings Mobility Windows 7 Virtual Private Network Virtual Desktop Telephone PowerPoint Experience Google Docs Administration Bluetooth Current Events Distributed Denial of Service Office Tips Presentation Specifications Excel Solutions Private Cloud Memory IT Consultant Disaster Integration Tech Terms Images 101 Display Customer Relationship Management Co-Managed IT Managed IT Politics Entertainment Virtual Assistant Machine Learning Settings Lithium-ion battery Digital Employees Taxes Avoiding Downtime Solid State Drive Processors Holidays Processor Chromebook Drones Cooperation Physical Security Automobile Video Conferencing HIPAA Virtual Machines How To Computer Repair Multi-factor Authentication Wireless Technology Microchip eWaste Start Menu Professional Services Flexibility Computer Care Downloads Vulnerability Saving Time Downtime Hack Safety Identity Theft Software as a Service Managed Services Provider Notifications Unified Communications Data Protection Computers Bitcoin Download Supercomputer Piracy Administrator Text Messaging Proactive IT Google Calendar Term Google Apps Virus Telework HTML Bring Your Own Device Motion Sickness Microsoft 365 Cables Browsers Smartwatch Nanotechnology Communitications Google Drive Upload Procurement Electronic Payment Software License Music Comparison Google Play Social Network FinTech Staffing Point of Sale IP Address Knowledge Data Analysis CES Corporate Profile Screen Reader IT Assessment Telephony Trends Supply Chain Management Employer Employee Relationship Mobile Technology Value Botnet Phone System Television Security Cameras Micrsooft Customer Resource management Organization Cabling Devices Cyber security Shortcuts Rental Service G Suite Tip of the week Flash Fileless Malware Tablet Smart Devices VoIP Gamification Remote Working Tracking Company Culture Telephone Systems Business Growth Mouse Competition Telephone System AI Regulations Trend Micro Be Proactive Recovery Web Server Transportation Computer Accessories Directions Digital Security Cameras Backup and Disaster Recovery Electronic Health Records Content Digital Payment Desktop Wasting Time LiFi Banking Entrepreneur Google Wallet SharePoint Application Deep Learning Electronic Medical Records Worker Accountants eCommerce Modem Workplace Strategies Documents Messenger Business Intelligence Videos Access Database Surveillance Time Management Public Cloud Managing Costs Business Metrics Hosted Solution Health IT Equifax SSID Securty Books Hard Drive Disposal Employer/Employee Relationships Domains Language Society Audit Media Spyware Tactics Development Username File Sharing Virtual Machine Monitors Visible Light Communication Redundancy Reviews Startup Optimization Troubleshooting Freedom of Information Smart Technology Reading email scam Teamwork Windows 8 Navigation 2FA Cache Addiction Unified Threat Management Data Storage Workers Mobile Security Hypervisor Public Speaking Displays Advertising User Tip Shopping Legislation News Medical IT Relocation CCTV SQL Server Streaming Media Work/Life Balance Tech Support Printing Evernote Paperless Network Management Touchscreen PCI DSS Licensing Keyboard Hard Drives Emergency Proxy Server Gig Economy Emails Humor Business Owner Computer Malfunction Fake News Supply Chain Computing Infrastructure Azure In Internet of Things intranet Business Communications Vendor Mangement Service Level Agreement Internet Service Provider Management Regulations Compliance Samsung Device security Managed IT Service Wireless Hacks Shortcut Network Congestion Heating/Cooling Writing Environment Uninterrupted Power Supply Wireless Headphones Memes Webcam Microsoft Excel Workplace Reliable Computing Business Cards Windows XP Social Networking Tech Human Resources Business Mangement Going Green Net Neutrality Error Financial Data Tablets Bookmark Risk Management IT Inbound Marketing Scams Scalability

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?