Contact us today!

Professional Computer Associates Blog

Professional Computer Associates has been serving the Red Hook area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Drag and Drop Between Android and Windows

Tip of the Week: Drag and Drop Between Android and Windows

Smartphones have proven to be excellent devices for enhancing an employee’s ability to be productive while mobile. However, this approach often means that company work is now on an employee’s mobile device, instead of on your network. This issue can be easily resolved if the mobile device in question runs the Android OS. We’ll go over how for this week’s tip.

Android-to-PC File Transfers
Due to the fact that an Android device allows you direct access to its file system, it can essentially serve the same purpose as your standard external hard drive. Just as you would plug an external hard drive into a computer to move data, you can most likely use the charging cable for your device to connect it to your workstation.

Once your smartphone is connected and unlocked, you should be able to find a notification informing you that the device is charging. Tapping the notification will bring up a menu of the USB connection capabilities, for which one option is “Transfer files.” With that enabled, open File Explorer on your workstation. Your Android device should be accessible through the File Explorer menu.

Accessing your device this way will allow you to browse through your files and copy them over to your PC.

Safely Leveraging BYOD
Of course, security should always be your first concern when implementing a new process. Even a process as small and simple as transferring files from a mobile device needs to be approached mindfully for the business’ safety. A Bring Your Own Device, or BYOD, strategy may be tempting to implement to help cut the costs of equipping your entire staff with company mobile devices. However, if you elect to enact BYOD practices, you need to be sure that you are properly prepared to deal with any risks associated with them. That’s where we come in.

Professional Computer Associates can help you to establish a BYOD strategy that meets the needs of your business--without exposing it to undue risk. Call 845-876-6561 to get started.

What Should You Know About Regulatory Compliance?
3 Reasons VoIP Is An Improvement Over Traditional ...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, 22 October 2017

Captcha Image


Tag Cloud

Security Tip of the Week Best Practices Cloud Privacy Hackers Technology Backup Business Computing Network Security Malware Hosted Solutions Managed IT Services Disaster Recovery Microsoft Business Continuity Software Google Business VoIP Mobile Devices Productivity Windows 10 Data Internet Efficiency Outsourced IT IT Support Computer Hardware Innovation Smartphones Cybercrime Office IT Services Email Browser Ransomware Server Alert Saving Money communications Android Telephone Systems Business Management Mobile Device Management Quick Tips Upgrade Computers User Tips Windows Microsoft Office Small Business Save Money Virtualization Law Enforcement Social Media Miscellaneous Network Chrome Recovery Managed IT Passwords Workplace Tips Cybersecurity App Firewall Mobility Data Backup BYOD Hacking Avoiding Downtime Social Engineering Office Tips Productivity Managed Service Provider Facebook Operating System Proactive IT Collaboration Office 365 Budget Smartphone HaaS Health Information Technology Flexibility Private Cloud Black Market Bring Your Own Device Data Breach Google Drive Communication Remote Monitoring Phishing How To SaaS Gmail Spam Money Holiday Marketing User Error Password Automation Safety Managed IT Services BDR Cloud Computing Redundancy Wi-Fi Work/Life Balance Bandwidth Data Management DDoS Employer-Employee Relationship Physical Security Word Internet of Things Applications Meetings Downtime Cleaning Wireless Unsupported Software Apple History Solid State Drive Hiring/Firing Best Practice Computer Care Data storage Shadow IT Data Security Spam Blocking Government Settings Artificial Intelligence Samsung End of Support Patch Management Internet Exlporer Business Owner Value Entertainment The Internet of Things Save Time Wearable Technology Data Storage Public Cloud Remote Computing Worker Automobile Wireless Technology Router VPN Gadgets Risk Management Compliance Battery Windows 10 Computing Infrastructure Mobile Device Uninterrupted Power Supply IT Management Public Computer Two-factor Authentication Hosted Solution Two Factor Authentication Education Mobile Computing Regulations OneNote Vendor Management hacker Audiobook Distributed Denial of Service WiFi IT Plan IT Consultant Content Filtering Botnet Charger Politics Hard Drives Video Games Networking Leadership Big Data Netflix Electronic Medical Records Users Servers Travel Root Cause Analysis Unified Threat Management Going Green Robot Scalability Mouse Tech Support Software Tips IBM Books Relocation Virtual Reality eWaste Flash Data Recovery HIPAA Laptop Emergency Instant Messaging Supercomputer webinar Employer Employee Relationship Worker Commute Lithium-ion battery Environment IaaS Sync Running Cable Software as a Service Data loss Touchpad Outlook Search Streaming Media HBO Current Events Conferencing Windows 10s Computer Accessories YouTube Telephony Update Screen Mirroring Internet exploMicrosoft Keyboard Scam Humor How to SharePoint Frequently Asked Questions IT Support Vulnerability Bluetooth iPhone Document Management Encryption Skype Techology Cast Loyalty Advertising Experience Transportation Monitor Sports Excel Start Menu People Audit Notifications NarrowBand Fax Server Music Workers Benefits Reputation Tip of the week Mobile Mobile Office Computer Fan Files IT solutions Business Intelligence Assessment Knowledge Hybrid Cloud USB Smart Technology Customer Apps Windows Server 2008 Professional Services FENG Rootkit Colocation Chromecast Legal Data Warehousing Television Network Congestion PDF Troubleshooting Emails Windows 7 Tools Training Content Antivirus Webinar IT solutions CrashOverride Administration Thank You Congratulations Google Docs Website

Free Consultation

Free ConsultationSign up today for a
FREE Network Consultation
How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!