When your iPhone starts running out of battery, it can be super easy to panic. However, there are some settings you can adjust to save yourself some time.
There’s so much that can contribute to a draining battery, from the apps you use to how long you leave your phone plugged in, and more. When you realize your phone has been draining rather quickly, itm ight feel like things are out of your hands. However, there are a few settings you can adjust to help save your battery percentage when it feels like things are getting out of hand. Read more about two of them below.

1. Turn Off 'Always-On' Display & 'Raise To Wake'
A lot of people tend to forget just how much of an impact their iPhone's display and brightness can have on their battery life, and if your 'Always On' feature is turned on, those brief moments of screen activity can drain it even further.
"That makes this a smart battery fix because the screen is one of the easiest ways to lose power without noticing it," explains tech pro Kajol Shah. "A shorter lock time helps right away, especially for people who check their phone often and leave the screen awake longer than they realize. Turning off 'Raise to Wake' helps because the screen is one of the biggest battery users, and these features make the phone wake or stay visible more often than many people realize.">

2. Dating Apps (Grindr, Tinder, More)
In today's modern age, dating looks a whole lot different from how it did in previous decades. One of the most common forms of dating is using a dating app, but as it turns out, they can access and use more of your personal information than you may think.
"Dating apps update your GPS location every single time you open the app," says tech safety pro Adam Pilton. "Tinder and Bumble display distance metrics like '2.3 miles away' to show how close matches are, which means the app is actively tracking and broadcasting your position. Grindr was one that came to my attention. Some years ago, researchers discovered a triangulation vulnerability in Grindr's location system that allowed attackers to pinpoint users' exact coordinates."

