(703) 288-9767    NTC Store
NTConnections Blog

NTConnections has been serving the Reston area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Drag and Drop Between Android and Windows

Smartphones have proven to be excellent devices for enhancing an employee’s ability to be productive while mobile. However, this approach often means that company work is now on an employee’s mobile device, instead of on your network. This issue can be easily resolved if the mobile device in question runs the Android OS. We’ll go over how for this week’s tip.

Android-to-PC File Transfers
Due to the fact that an Android device allows you direct access to its file system, it can essentially serve the same purpose as your standard external hard drive. Just as you would plug an external hard drive into a computer to move data, you can most likely use the charging cable for your device to connect it to your workstation.

Once your smartphone is connected and unlocked, you should be able to find a notification informing you that the device is charging. Tapping the notification will bring up a menu of the USB connection capabilities, for which one option is “Transfer files.” With that enabled, open File Explorer on your workstation. Your Android device should be accessible through the File Explorer menu.

Accessing your device this way will allow you to browse through your files and copy them over to your PC.

Safely Leveraging BYOD
Of course, security should always be your first concern when implementing a new process. Even a process as small and simple as transferring files from a mobile device needs to be approached mindfully for the business’ safety. A Bring Your Own Device, or BYOD, strategy may be tempting to implement to help cut the costs of equipping your entire staff with company mobile devices. However, if you elect to enact BYOD practices, you need to be sure that you are properly prepared to deal with any risks associated with them. That’s where we come in.

NTConnections can help you to establish a BYOD strategy that meets the needs of your business--without exposing it to undue risk. Call (703) 288-9767 to get started.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, 21 September 2017

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Privacy Hackers Productivity Business Computing Microsoft Backup Hosted Solutions Malware Internet Efficiency Mobile Devices IT Support Google Business Managed Service Provider Miscellaneous IT Services Server Workplace Tips VoIP Data Disaster Recovery Business Continuity Network Innovation Upgrade Hardware Email Windows Save Money Saving Money Business Management Computer Mobile Device Management Software Communication Virtualization User Tips Microsoft Office Network Security Windows 10 Browser Smartphone Smartphones Holiday Hacking Android BYOD Social Media WiFi Mobile Computing Computers communications IT Solutions Cybercrime Chrome Application Apple Managed IT Services Operating System Marketing Budget Outsourced IT The Internet of Things Big Data Quick Tips Small Business Automation Information Technology Proactive IT Office Going Green Remote Computing Collaboration Health VPN Alert spam Managed IT Services Employer-Employee Relationship Remote Monitoring Avoiding Downtime Passwords Wireless Technology Mobility User Error Bring Your Own Device Vendor Management Ransomware Recovery iPhone Managed IT Save Time Gadgets Social Engineering Firewall App Office 365 PowerPoint Excel Antivirus Phone System Downtime Telephone Systems History IT Support Tablet Gmail Lithium-ion battery Analytics Retail Memory Search Private Cloud Bandwidth Compliance Data Backup Networking Mouse Network Congestion Redundancy Meetings Cybersecurity HaaS Fax Server IT Consultant Black Market Data Management Humor Internet of Things Saving Time Statistics Unsupported Software Document Management Risk Management Public Cloud Internet Exlporer Data storage Online Currency Biometrics Website Outlook How To Printer Flexibility Office Tips Content Filtering Hard Drives Current Events Facebook Administration Maintenance Cloud Computing Law Enforcement Entertainment Running Cable Router Solid State Drive Physical Security DDoS Value Skype BDR Unified Threat Management Robot Data Storage Google Drive Mobile Office Environment Customer Relationship Management Intranet Windows 10 Business Owner Best Available Safety People Programming Cameras Customer Service Travel Video Surveillance End of Support Cleaning Consultant Trending IT Management Education Servers Entrepreneur Printer Server Apps Internet exploMicrosoft Tech Support Hacker Root Cause Analysis IT Plan Piracy Flash Worker Commute Cost Management Two-factor Authentication Patch Management Advertising Shadow IT User Wireless Science Data loss Company Culture Licensing Sync Streaming Media Instant Messaging Shortcut Windows 8.1 Update Samsung SharePoint Twitter Windows 8 Software Tips Phishing Telephony Encryption Bluetooth Crowdfunding Vulnerability Hybrid Cloud Sports Monitor eWaste Tablets Data Security Start Menu HIPAA Notifications USB Spam Blocking Money Audit YouTube Print Server Reputation Wearable Technology HBO Mobile Windows Media Player Social Screen Mirroring NarrowBand Customers Frequently Asked Questions Net Neutrality Hiring/Firing Professional Services Computer Repair Best Practice Social Networking WIndows 7 Computer Fan Cast Chromecast Tip of the week Applications Analyitcs Tools Files Managing Stress Settings FENG Laptop Windows Server 2008 Distributed Denial of Service Touchscreen Workers Word LinkedIn Colocation Virus Virtual Desktop Touchpad IT service Human Resources Business Intelligence Windows 7 Relocation SaaS Virtual Reality Debate Computer Accessories Training Artificial Intelligence Botnet Hosted Solution Computing Infrastructure Uninterrupted Power Supply Domains OneNote Data Warehousing Regulations Government IaaS Bloatware Emails Books Mobile Device CrashOverride IBM Work/Life Balance Webinar Data Recovery Emergency Worker Supercomputer Content IT solutions Video Games Rootkit Knowledge Audiobook Netflix Scam Scalability Charger Politics Transportation How to Computer Care webinar Benefits PDF Loyalty Conferencing Keyboard Windows 10s Smart Technology Battery Experience Users Two Factor Authentication Assessment Music Productivity Password Television Wi-Fi Troubleshooting Techology Electronic Medical Records Public Computer Legal Employer Employee Relationship Data Breach Automobile