Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Prevent Lollipop’s Bug From Breaking Your Alarm Clock

b2ap3_thumbnail_android_clock_400.jpgIf you own an Android device, you’re no-doubt aware that Google issued an upgrade to Android’s OS not too long ago. This update, dubbed Android 5.0 Lollipop, presents several aesthetic upgrades to devices which were running a previous Android OS. However, there were also some functionality changes, a few of which were less than desired; like the unexpected changes to Android’s alarm clock.

Don’t Put This Tip “On Snooze”
Before the Lollipop upgrade, Android’s alarm clock application worked in silent mode. This was exceptionally useful, especially if you wanted to turn your phone’s sound off overnight to get a good night’s rest. However, in Lollipop, Silent mode is called Mute mode, where all sounds from calls, texts, and other notifications are silenced… including alarms.

alarm 1

You don’t need us to tell you that this new functionality change can affect your ability to get to work on time in the morning. Thankfully, there’s a pretty simple fix to this problem, even if it’s not the most obvious solution.

Since Lollipop doesn’t allow alarms to go off in Mute mode, there’s an extra hoop you have to jump through in order to get them to work properly. You can set your phone to only go off for what are called Priority Interruptions. Because alarms are always considered priority interruptions, you shouldn’t have to worry about the alarm being silenced.

To activate Priority Interruptions, turn up your volume to Sound or Vibrate. Next, select Only allow priority interruptions.

alarm 2

Doing this opens a menu beneath your selection. Then, click Settings.

alarm 3

This lets you view the Priority Interruptions settings. Don’t be fooled by the Silent choice here; Priority Interruptions only work in Sound or Vibrate mode. If you really want a Silent mode similar to the previous version of Android, you can uncheck messages, phone calls, and reminders in Sound mode. This lets it basically act the same as it used to, more or less.

alarm 4

If you’re successful in setting your Priority Interruptions, a star will appear next to your alarm clock symbol at the top of your screen. Afterwards, it’s best to make a test alarm to make sure that it goes off as planned. It’d be a shame to go through all of this trouble just to miss your alarm. Of course, if all else fails, you could always get a dedicated alarm clock from your local department store; or, get a pet. Whichever works for you.

Be sure to subscribe to Total Tech Care’s tech blog for great tips every week.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 02 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Network Security Business Google Microsoft Internet Email Malware Workplace Tips Backup Innovation Data User Tips Computer Mobile Devices IT Services Hardware Disaster Recovery Android VoIP communications IT Support Communication Business Continuity Smartphones Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Cybersecurity Quick Tips Business Management Users Upgrade Managed IT Services Windows Phishing Data Backup Outsourced IT Ransomware Windows 10 Server Save Money Data Recovery Cloud Computing Office Windows 10 Passwords Tech Term Gadgets Social Media Chrome Virtualization Saving Money Holiday Managed IT Services Automation Microsoft Office Managed Service Facebook Operating System Artificial Intelligence Cybercrime Computers Networking Internet of Things IT Support Hacking Wi-Fi Health BYOD Mobile Device Management Telephone Systems Managed Service Provider Alert Information Technology Remote Spam Information Covid-19 Office 365 BDR Social Engineering Mobility Recovery Employer-Employee Relationship Router Bandwidth Law Enforcement App History Data Breach Big Data Password Money Human Resources Encryption Mobile Computing Applications Remote Monitoring Application Office Tips Private Cloud Training Managed IT VPN Apps Remote Computing How To Blockchain Mobile Office Paperless Office Government Data Storage Patch Management Vulnerability Infrastructure Windows 7 Voice over Internet Protocol Wireless Word Servers Gmail Bring Your Own Device Settings Data Management Work/Life Balance Data Security Flexibility Two-factor Authentication Marketing WiFi Mouse HaaS IT solutions Entertainment Google Drive Website Budget Avoiding Downtime Risk Management Employee/Employer Relationship Hacker Scam RMM The Internet of Things Lithium-ion battery Save Time Vendor Management Data Protection Cleaning Firewall Virtual Reality End of Support Apple Education Physical Security Social Safety User Error Sports Vendor HIPAA Telephone System Staff Redundancy Software as a Service Managed Services Meetings USB Keyboard Machine Learning Display Remote Work Connectivity Conferencing Identity Theft Humor Hard Drive Biometrics Business Intelligence Virtual Desktop Worker Audit Document Management IT Management Solid State Drive DDoS Wireless Technology Computing Augmented Reality How to Downtime Fraud SharePoint Botnet IT Plan Remote Worker Data storage Automobile Unsupported Software Cryptocurrency Customer Service Digital Signage Environment Charger Computing Infrastructure Going Green Fax Server Virus Compliance Comparison Computer Care Procurement Unified Threat Management OneNote Current Events Workplace Strategy CES SaaS Computer Accessories Net Neutrality Telephony Battery Samsung Shadow IT Help Desk Business Technology Legal Content Management Printing Network Congestion Access Control Value eWaste Internet Exlporer Virtual Assistant Printer Managed Services Provider Spam Blocking Authentication Bluetooth Electronic Medical Records PDF Database Hiring/Firing Wearable Technology Proactive IT Remote Workers Hard Drives Update Retail Best Practice Processor Instant Messaging IT Consultant YouTube Robot Excel Black Market Google Docs Peripheral Tools Administrator Business Owner Devices Enterprise Content Management Television Digital Security Cameras NarrowBand Using Data 5G MSP Search Accountants Copiers iPhone Quick Tip Credit Cards Microchip Thought Leadership Password Management Public Computer Ergonomics Password Manager Consultant Smartwatch Science Analytics OLED Regulations Transportation Development Multi-Factor Security Rootkit Files PCI DSS Virtual Machine Search Engine Computer Fan Twitter NIST 2FA Business Mangement Distributed Denial of Service Best Available Chromecast Fiber Optics Customer Relationship Management Employee Cabling Analyitcs Workers Smart Tech WIndows 7 Benefits Messaging Trending Colocation Policy Amazon Uninterrupted Power Supply Hypervisor Programming FENG Addiction IBM Dark mode Recycling Trend Micro Default App Flash Wiring Practices Smart Technology Monitor SMS Procedure Amazon Web Services Antivirus Saving Time Cache Windows 8 Software Tips Safe Mode Supercomputer dark theme Criminal Shopping Google Search IT service PowerPoint Streaming Media IT Infrastructure Windows Media Player Sync GDPR Emails Hosted Computing User Reputation AI Wireless Internet FinTech Online Shopping Tech Support Bing Content Tablet File Sharing Techology Laptop Social Network Specifications Domains Investment Camera Netflix Inventory Managing Stress Two Factor Authentication Customers Wire Employees Evernote Employee/Employer Relationships Root Cause Analysis Audiobook HBO Knowledge Windows 365 IaaS Music Touchpad Travel Maintenance Cameras ISP Millennials ROI Bloatware Skype Printers Video Conferencing Smart Office Advertising Sales Wireless Charging Bitcoin Shortcuts Data loss Politics Tablets Outlook Leadership Point of Sale Troubleshooting Personal Cryptomining Workforce Notifications Entrepreneur Start Menu Virtual Private Network Supply Chain Management Loyalty Monitoring Cables Batteries Screen Mirroring Frequently Asked Questions Windows 8.1 Books Digitize Shortcut Printer Server Telecommuting Windows Server 2008 R2 Cost Management Mobile Project Management Windows 10s Nanotechnology Relocation Cast Customer relationships Cortana Social Networking Manufacturing Tip of the week webinar Video Games Email Best Practices Digital Signature Emergency IT Assessment Employer Employee Relationship Professional Services Warranty Public Cloud Worker Commute Experience HVAC Assessment Computer Tips Google Apps Running Cable Managed IT Service Security Cameras Biometric Security Memory Windows Server 2008 Scalability Virtual CIO Analysis OneDrive

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code