Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: See What’s Taking Up All of Your Google Drive Storage

b2ap3_thumbnail_drive_for_business_400.jpgHeavy users of Google Drive may experience the issue of running low on storage space. The easiest way to resolve this problem is to give Google money and upgrade your account. Before taking this step, there are a few tricks you can do to free up Google Drive space by locating and getting rid of unneeded files.

One reason why it’s possible to miscalculate how much storage space is being used by your Google Drive account is due to the fact that the 15GB every Google user gets isn’t a full 15GB of storage space. Of this 15GB of Drive space, Google allots this space for its various services, like Gmail and Google+.

To find out exactly what’s taking up space in your Drive account, go to your Drive’s storage page. This will provide you with a handy-dandy pie chart that lays everything out for you.

drive_in_blog_1.jpg

This chart displays how much storage space is being used and what the space is being used for. From here, you can spot the unneeded files that are taking up space. For example, the email attachments in Gmail end up in your Drive account, as well as all of your photos from Google+. You might want to sift through your Drive and delete these files if you don’t need them.

On your Drive storage page, you will find below the graph a section displaying specific information about space usage. Be sure to reference this if you’re on the hunt to free up space.

drive_in_blog_2.jpg

As is the nature of computer data, you will notice that the bulk of your space is likely to be taken up by media-rich files, like photos, music, and videos. Users of Google Apps that take advantage of Docs, Sheets, Slides, etc., will notice that these files don’t take up nearly the amount of space as does the large media files.

Therefore, if you’re looking to purge your Drive account and free up the most space possible, it’s best practice to start deleting the largest files first. To figure this out, go to the lower left-hand side of the screen in Drive, right above the link that says “Buy more storage.” From here, you’ll see your current storage use. Hover over it and a box will appear with more specific numbers. Click Drive.

drive_in_blog_3.jpg

This sorts your files by Quota used. From here, you can most efficiently manage your files.

Keep in mind that if you delete email files all willy-nilly, you may end up deleting something important that you’ll regret. Therefore, it’s best practice to archive your emails with a secure email solution. Total Tech Care can provide this for you.

Got an Android device? If your device is linked to your Google Drive, then it may be adding some rather large files to your storage, especially if you use your Drive account to back up your Android device’s photos and videos. One way that you take control of this is to adjust the size of pictures stored from your device to Drive. To do this, go to Settings > Auto Backup > Photo Size, then select Standard size. Keep in mind that there may be instances when you don’t want Google to change the size of your images, so keep this file path in mind.

By following these steps, you will free up space on your Google Drive account and not have to upgrade. To learn more data storage tips and best practices, call Total Tech Care at 866-348-2602.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 18 April 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Network Security Business Google Microsoft Internet Email Malware Workplace Tips Backup Innovation User Tips Data Computer Mobile Devices Hardware IT Services Android VoIP Disaster Recovery communications Business Continuity IT Support Smartphones Communication Miscellaneous Smartphone Mobile Device Network Browser Small Business Productivity Collaboration Quick Tips Cybersecurity Users Business Management Windows Upgrade Managed IT Services Phishing Ransomware Data Backup Outsourced IT Windows 10 Office Data Recovery Server Save Money Cloud Computing Windows 10 Passwords Saving Money Holiday Gadgets Chrome Tech Term Social Media Virtualization Managed IT Services Managed Service Microsoft Office Automation Operating System Artificial Intelligence Facebook Computers Cybercrime BYOD Mobile Device Management Networking Internet of Things IT Support Hacking Wi-Fi Health Remote Spam Information Office 365 Managed Service Provider Alert Telephone Systems Covid-19 Information Technology Router Bandwidth BDR Social Engineering Mobility Recovery Employer-Employee Relationship Application Law Enforcement Remote Monitoring Data Breach Big Data App History Password Money Encryption Mobile Computing Human Resources Applications Remote Computing Data Storage Government Patch Management Blockchain Mobile Office Paperless Office Private Cloud Managed IT Office Tips Training Apps VPN How To Mouse HaaS Avoiding Downtime Vulnerability Windows 7 Word Servers Infrastructure Voice over Internet Protocol Bring Your Own Device Data Management Wireless Work/Life Balance Data Security Flexibility Gmail Marketing Settings WiFi IT solutions Google Drive Entertainment Website Two-factor Authentication Budget USB Apple Keyboard Social Conferencing Scam User Error Telephone System Staff Software as a Service Meetings Machine Learning Vendor Connectivity Remote Work Managed Services Save Time Display Vendor Management Risk Management Hacker Cleaning The Internet of Things Employee/Employer Relationship Lithium-ion battery RMM End of Support Data Protection Physical Security Education Firewall Safety HIPAA Sports Redundancy Virtual Reality Business Technology Content Management Procurement Proactive IT Workplace Strategy Access Control Network Congestion Net Neutrality Best Practice IT Consultant eWaste Virtual Assistant YouTube Help Desk Authentication Printing Business Intelligence Black Market Humor Audit Worker IT Management Wearable Technology Managed Services Provider Document Management Botnet Solid State Drive Retail Update Wireless Technology Hard Drives Instant Messaging Database How to IT Plan Downtime Robot Excel Remote Workers Google Docs Biometrics Unsupported Software Identity Theft Data storage Automobile Virtual Desktop Processor Charger DDoS Computing Infrastructure Hard Drive Compliance Augmented Reality OneNote Virus Going Green Computer Care Current Events SharePoint Fraud Telephony Unified Threat Management Remote Worker Computing Computer Accessories Samsung Battery Cryptocurrency Customer Service Shadow IT Legal Environment Value Fax Server Spam Blocking Internet Exlporer Electronic Medical Records Printer Comparison Digital Signage Bluetooth SaaS CES PDF Hiring/Firing Tip of the week Evernote Relocation IT Infrastructure webinar Emergency Wire AI IaaS FinTech Professional Services Maintenance Public Cloud Travel Bing Employer Employee Relationship Assessment Printers Video Games Social Network Millennials Bloatware Windows Server 2008 Wireless Charging Investment Smart Office Worker Commute Experience Employees Tools Employee/Employer Relationships Tablets Television Virtual Private Network Windows 365 Scalability Workforce Entrepreneur ISP Video Conferencing Cables ROI Business Owner Sales Shortcut Bitcoin NarrowBand Shortcuts Cryptomining Public Computer Project Management Point of Sale Nanotechnology Search Personal Telecommuting Cost Management Supply Chain Management Regulations Cortana iPhone Social Networking Transportation Monitoring Consultant Digital Signature Batteries Computer Fan Rootkit Warranty Windows 8.1 Digitize Analytics Running Cable Google Apps Files Windows Server 2008 R2 Workers Benefits HVAC Customer relationships Best Available Analysis FENG Chromecast Memory Manufacturing IBM Administrator Email Best Practices WIndows 7 Devices IT Assessment Flash Colocation Uninterrupted Power Supply Smart Technology Enterprise Content Management MSP Computer Tips Accountants Managed IT Service Security Cameras Monitor Biometric Security Supercomputer Microchip Virtual CIO Thought Leadership OneDrive Software Tips Credit Cards Peripheral Sync Password Manager Emails Science Password Management Digital Security Cameras Using Data Multi-Factor Security Reputation 5G Windows Media Player Streaming Media Search Engine User Twitter Copiers PowerPoint Content Distributed Denial of Service Quick Tip Business Mangement Customer Relationship Management Netflix Tech Support Two Factor Authentication NIST Ergonomics Smart Tech Techology Root Cause Analysis Trending Laptop Analyitcs Smartwatch Customers Programming OLED Knowledge Music Managing Stress Addiction Development HBO Amazon Audiobook PCI DSS Skype Recycling Virtual Machine Wiring 2FA Practices Fiber Optics Data loss Cameras Touchpad Employee Amazon Web Services Cabling Leadership Troubleshooting Cache Antivirus Messaging Outlook Safe Mode Politics Policy Start Menu Criminal Advertising Hypervisor Windows 8 GDPR Dark mode Hosted Computing IT service Trend Micro Screen Mirroring Loyalty Frequently Asked Questions Online Shopping Default App Notifications Books Wireless Internet SMS File Sharing Procedure Mobile Saving Time Windows 10s Tablet Camera dark theme Inventory Domains Shopping Cast Printer Server Specifications Google Search

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code