Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Frustrated by Your Android Device Lately? A Bad Update Might be Why

Frustrated by Your Android Device Lately? A Bad Update Might be Why

With a global market share of 71.9 percent, the Android operating system that Google provides is well and away the most utilized there is today. Despite the fact that different phone manufacturers will fiddle with the OS to fit into the devices they create, Android tends to be pretty stable—which is part of the reason why many users were surprised around March 22nd, 2021. This is when these users discovered that their applications were crashing incessantly.

This issue wasn’t constrained to a given application, either—numerous, otherwise unrelated applications began to persistently crash whenever the user attempted to start them up.

Gmail reportedly created issues amongst users, while others found themselves unable to do a Google search through their browser. Lastpass also became notorious for crashing during this time. Other applications remained unscathed with no apparent rhyme or reason. It wasn’t as though Google’s applications were specifically creating issues—applications of all kinds were crashing, and giving users no small amount of stress as a result.

The Cause of These Android App Crashes

The underlying cause of these issues was soon identified, and the news quickly spread on Twitter: a system application known as Android WebView had received a buggy update.

Powered by the Chrome browser, WebView is meant to give other applications the capability to reference web-related content. For a short time, the only recourse against these application crashes was to uninstall the updated version—but Google soon released a new update fixing the bug. In fact, some users missed the issue entirely, based simply on the timing of their device’s update checks.

This proves an important point, regardless: while updates are important and should always be seriously considered, they aren’t always perfect and can present some unforeseen flaws. This is something that should always be kept in mind when installing an update on either a work device or a personal device.

This is precisely why we follow a policy to always evaluate updates in a controlled environment—particularly when they pertain to mission critical apps. While it only took Google 12 hours or so to identify and mitigate the issue, it needs to be remembered that it was a particularly pressing one. There is no guarantee that all update-borne issues will be resolved so quickly, especially if one doesn’t affect as many people. The time you have to wait could extend from hours to full days, weeks, or even months.

Hence, why we always recommend that you test updates and patches before applying them to your business’ devices… just to be safe.

Don’t get us wrong: keeping your IT up-to-date is important. However, it is also important that you are still able to use it afterwards. Total Tech Care is here to help businesses like yours with their critical IT management and maintenance. Reach out to us at 866-348-2602 to find out more about how we can help.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 24 January 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Network Security Google Business Internet Microsoft Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices Hardware IT Services Android VoIP Disaster Recovery communications IT Support Smartphones Business Continuity Communication Miscellaneous Smartphone Mobile Device Browser Small Business Network Productivity Collaboration Cybersecurity Quick Tips Users Business Management Windows Managed IT Services Upgrade Phishing Data Backup Outsourced IT Ransomware Windows 10 Office Data Recovery Server Save Money Cloud Computing Passwords Windows 10 Chrome Tech Term Virtualization Saving Money Holiday Social Media Gadgets Microsoft Office Managed Service Automation Managed IT Services Computers Facebook Cybercrime Artificial Intelligence Operating System Hacking BYOD Mobile Device Management Internet of Things Networking IT Support Health Wi-Fi Spam Office 365 Telephone Systems Remote Information Technology Alert Managed Service Provider Covid-19 Information Mobility Router BDR Bandwidth Employer-Employee Relationship Recovery Social Engineering Password Money Remote Monitoring Encryption Data Breach Applications Mobile Computing App Application History Law Enforcement Human Resources Big Data Data Storage Remote Computing Patch Management Apps Mobile Office Office Tips Government Training How To Private Cloud VPN Blockchain Paperless Office Managed IT Work/Life Balance Vulnerability Mouse Infrastructure Windows 7 HaaS Voice over Internet Protocol Word Flexibility Marketing WiFi Servers Google Drive IT solutions Entertainment Website Budget Wireless Avoiding Downtime Data Security Gmail Settings Two-factor Authentication Bring Your Own Device Data Management Cleaning Apple Conferencing Employee/Employer Relationship Social RMM Scam End of Support User Error Physical Security Meetings Education Safety Vendor Management HIPAA Sports Data Protection Redundancy Risk Management Keyboard Hacker USB The Internet of Things Lithium-ion battery Vendor Managed Services Save Time Display Telephone System Staff Firewall Software as a Service Machine Learning Remote Work Virtual Reality Connectivity Computing Infrastructure Hard Drive Going Green Google Docs Identity Theft Network Congestion eWaste Business Intelligence Virus Computing Audit Battery Unified Threat Management Worker Computer Accessories Shadow IT IT Management Legal Augmented Reality Fraud Botnet Internet Exlporer Wearable Technology IT Plan Retail Hard Drives Digital Signage Remote Worker Instant Messaging Printer Excel PDF Cryptocurrency Unsupported Software Robot Bluetooth Biometrics Charger Proactive IT Virtual Desktop Procurement Workplace Strategy Comparison Net Neutrality Compliance Best Practice OneNote Computer Care Current Events Help Desk YouTube CES DDoS IT Consultant Telephony Printing Black Market SharePoint Samsung Business Technology Content Management Humor Access Control Value Managed Services Provider Document Management Customer Service Solid State Drive Virtual Assistant Wireless Technology Spam Blocking Environment Database How to Electronic Medical Records Downtime Authentication Fax Server Remote Workers Hiring/Firing Data storage Processor Automobile SaaS Update Assessment HVAC Google Apps Peripheral Windows Server 2008 Maintenance Using Data Analysis IaaS Digital Security Cameras Streaming Media Tools Copiers Bloatware 5G Administrator Reputation Devices Television Enterprise Content Management Tech Support Quick Tip Content User PowerPoint Tablets Smartwatch Techology MSP Windows Media Player Laptop Accountants Ergonomics Credit Cards Development Entrepreneur OLED Microchip Customers Thought Leadership Audiobook Public Computer Password Management Password Manager PCI DSS Virtual Machine Managing Stress Regulations Shortcut Fiber Optics Employee Transportation Touchpad 2FA Multi-Factor Security Twitter Messaging Computer Fan Cost Management Cabling Search Engine Rootkit Politics Cameras Advertising NIST Business Mangement Policy Social Networking Hypervisor Trending Trend Micro Workers Benefits Smart Tech Dark mode Addiction Notifications Amazon SMS FENG Default App IBM Recycling Running Cable Procedure Saving Time Flash Shopping Memory Google Search Wiring Smart Technology Practices dark theme Relocation Cache Amazon Web Services AI IT Infrastructure Printer Server Supercomputer Bing Safe Mode Criminal FinTech Software Tips Sync Social Network Emails Video Games GDPR Hosted Computing Wireless Internet Online Shopping Investment Worker Commute Employee/Employer Relationships Experience Science File Sharing Employees Windows 365 Specifications Netflix ISP Scalability Camera Two Factor Authentication Inventory Wire Evernote Video Conferencing Root Cause Analysis ROI Business Owner HBO Customer Relationship Management Bitcoin Knowledge Shortcuts Music NarrowBand Distributed Denial of Service Sales Travel Point of Sale Millennials Skype Personal Analyitcs Cryptomining Search Printers iPhone Smart Office Wireless Charging Supply Chain Management Data loss Programming Outlook Batteries Leadership Troubleshooting Monitoring Windows 8.1 Workforce Start Menu Digitize Virtual Private Network Loyalty Files Cables Antivirus Consultant Screen Mirroring Windows Server 2008 R2 Frequently Asked Questions Analytics Windows 8 Books Chromecast Customer relationships Email Best Practices Telecommuting Mobile IT service IT Assessment Windows 10s Manufacturing Project Management Nanotechnology Colocation Uninterrupted Power Supply Cortana Best Available Cast Tip of the week Managed IT Service webinar Tablet Security Cameras Emergency Digital Signature Computer Tips WIndows 7 Virtual CIO Professional Services Domains OneDrive Public Cloud Biometric Security Warranty Employer Employee Relationship Monitor

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code