Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Notifications are What’s Draining Your Battery, Not Open Apps

b2ap3_thumbnail_dont_close_apps_400.jpgWe’ve all run into the trouble of keeping our smartphone’s battery preserved for as long as possible. Many people think that the apps themselves are what bogs down the battery and drains its charge, but we’re here to tell you that this is not the case. Instead, let’s determine what really drains your device’s battery.

The concept behind this idea seems to make sense. The app consumes power, and if it’s running in the background, it will continue to sap energy out of the device’s battery. Yet, the fact remains that this isn’t the case, and closing your apps does nothing to stem the flow of energy from your battery. Why is this? CNet explains:

When you leave an app, your phone actually pauses it in its current state. So, all of those apps that show up in your task manager aren’t actually draining your battery; they’re just frozen, sitting in your phone’s RAM, or memory. That way, the next time you launch it, you can pick up where you left off. When you kill an app, you’re actually taking it out of your phone’s memory, which means that the next time you launch it, your phone will have to do the work of putting it back in the RAM.

In other words, continuously killing all of your apps will only make more work for your device, and consume more energy in the long run. Leaving your apps running in the background is actually more energy-friendly than closing out of them, and reopening them, primarily because leaving them open has no effect on the battery’s power itself.

Granted, there are other ways that your apps consume battery life. In order to check where most of your Android smartphone’s energy is being allocated, you can go to Settings > Battery.

You’ll see what percentage your apps are using. Even if they’re not actively being used by you, they’ll still push notifications to your phone if they’re set to do so. This is the main culprit for a drained battery, as is data usage. You can limit which notifications show up by going to your general notifications setting.

The process will vary depending on which device you’re using, but on the Samsung Galaxy S5, you can block specific notifications by going to Settings > Sound and notifications > Application notifications. Select the notification that you want to block, and you’ll be given the option to block it. Otherwise, you can control specific application notifications from within the application itself.

By keeping your apps open rather than closed, you’ll be able to keep the productivity going without closing out of your apps in an attempt to save battery life. You might be surprised by how much more energy your battery will have!

Subscribe to our blog for more great tips from Voyage Technology.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 30 March 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Phishing Google Email Computer Workplace Strategy Collaboration Hosted Solutions Small Business Users Backup Ransomware Managed Service Mobile Device Productivity Microsoft Quick Tips Passwords Saving Money AI Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Information Holiday Automation Artificial Intelligence Facebook Miscellaneous Cloud Computing Training Compliance Covid-19 Gadgets Server Managed Service Provider Outsourced IT Remote Work IT Support Encryption Spam Employee/Employer Relationship Office Windows 10 Government Data Management Business Continuity Wi-Fi Business Technology Blockchain Windows 10 Bandwidth Virtualization Apps Managed Services Two-factor Authentication Mobile Office Vendor Data Security Employer-Employee Relationship Voice over Internet Protocol BYOD Mobile Device Management Tip of the week Chrome Gmail Budget WiFi Apple Networking App Conferencing Computing Hacker Physical Security Information Technology Avoiding Downtime Access Control Marketing Office 365 HIPAA Applications Managed IT Services How To BDR Operating System Computers Healthcare Risk Management Virtual Private Network Website Health Analytics Office Tips Augmented Reality Retail Storage Router Password Bring Your Own Device Big Data 2FA Help Desk Going Green Patch Management Excel Save Money Remote Monitoring End of Support Vulnerability Customer Service Vendor Management Managed IT Service Cybercrime Remote Workers Telephone Display Printer Paperless Office Cooperation Free Resource Infrastructure Project Management Windows 7 Microsoft 365 Firewall Document Management Solutions The Internet of Things Scam Data loss Windows 11 Social Monitoring Robot Video Conferencing Customer Relationship Management Managed Services Provider Virtual Machines Professional Services Settings Saving Time Wireless Printing Content Filtering Hacking IT Management YouTube Meetings Presentation VPN Downloads iPhone Cryptocurrency Licensing Wireless Technology Computer Repair Vulnerabilities Entertainment Virtual Desktop Data Privacy Data storage LiFi Images 101 Word Mobility Outlook Telephone System Multi-Factor Authentication Cost Management Machine Learning Money Humor Safety Maintenance Employees Integration Antivirus Sports Mouse User Tip Modem Processor Mobile Security Administration Holidays Data Storage Smart Technology Supply Chain Travel Addiction Language Employer/Employee Relationships Outsourcing Navigation Techology Google Maps Cortana Management PCI DSS Chatbots Screen Reader Distributed Denial of Service Workplace Alt Codes Gig Economy Downtime Unified Threat Management Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Competition Evernote Paperless Unified Threat Management Hosted Solution Regulations Compliance Identity Smart Tech Memes Co-managed IT Typing Bookmark Network Congestion Download Net Neutrality Alerts SQL Server Technology Care Business Communications Google Drive User Error User Knowledge Financial Data History Connectivity IT Break Fix Scams Browsers Smartwatch Point of Sale 5G Upload Procurement Azure Hybrid Work IP Address Multi-Factor Security Tech Human Resources Google Docs Unified Communications Experience Social Network Telework Cyber security IoT Communitications Dark Web Cables Bitcoin Network Management Running Cable Tech Support CES Monitors Trends Supply Chain Management Google Wallet Google Calendar Term Google Apps Recovery Customer Resource management FinTech Regulations Star Wars IT Assessment Microsoft Excel IT Maintenance Hard Drives Windows 8 Laptop Websites Data Analysis Gamification Flexibility Staff Value Business Intelligence Domains Drones Legislation Shortcuts SharePoint Electronic Medical Records Organization Social Networking Smart Devices Ransmoware Refrigeration Halloween Fileless Malware Digital Security Cameras Writing Content Remote Working Wearable Technology Memory Vendors Public Speaking Lenovo Lithium-ion battery Comparison Google Play Be Proactive Virtual Reality Health IT Motherboard Data Breach Assessment Electronic Health Records Permissions Workforce Hacks Server Management Entrepreneur Scary Stories Private Cloud Directions Videos Identity Theft Fun Wasting Time Threats Superfish Specifications Security Cameras Workplace Strategies Deep Learning Twitter Trend Micro Internet Exlporer Software as a Service Fraud Meta Undo Error Microchip Education Social Engineering Username Managing Costs Amazon Black Friday SSID Remote Computing eCommerce Database Surveillance Virtual Assistant Outsource IT Mobile Computing Tablet Search IT Technicians Virtual Machine Environment Media Cookies Cyber Monday Medical IT Application Best Practice Alert Proxy Server Reviews Buisness File Sharing Dark Data Tactics Development Hotspot Transportation Small Businesses Managed IT IBM Legal IT solutions How To Mirgation Hypervisor Displays Nanotechnology Optimization PowerPoint Business Growth Notifications Shopping

Blog Archive