(707) 268-8850    Get SUPPORT

Network Management Services Blog

Tip of the Week: Working from Google Home

Tip of the Week: Working from Google Home

It is no secret that Google can serve a great utility in the office through its many services and applications. However, have you ever considered how the Google Assistant can, well, assist you through devices like your smartphone and the assorted smart speakers that Google has produced? For today’s tip, we’ll review how some of the features of the Google Assistant can lend you a hand in the professional environment.

Basic Automation
Since productivity is one of the top goals in almost any office, it only makes sense to first focus on how using Google Home can boost your productivity through automation. While the device can serve many purposes on its own, it truly blossoms as a productivity tool through integrations with other devices and services.

For example, if you have equipped your office with smart lights or smart thermostats, you can adjust your office’s environment simply by telling Google to make the change you want. As a result, you can take greater control over your business environment without interrupting your productivity. After all, doesn’t it take much less time and effort to simply say, “Hey Google, turn off the lights in the conference room,” or “Hey Google, set temperature to 73 degrees,” than it would to interrupt what you were doing and go manually make the same changes?

More Advanced Automation (Kind Of)
If you’re at all familiar with the web service IFTTT, you can integrate it with your Google Home device to automate a variety of outcomes, based on predetermined triggers. It’s right in IFTTT’s name: If This, Then That.

Using IFTTT, you can connect your Google Home (or whichever Google device you’re using) to design your own commands that require the use of the Google Home. All you have to do is set “this” to be the Google Assistant, and choose the trigger you want your command to use. These triggers will all be of the spoken word variety, and each command can feature a few different variations. Once you’ve assigned the words to the command, click Create Trigger. To add the desired action you want automated, click through “that.”

You can then search through the available channels that you can trigger through your Google Assistant, select the one you want, and fill in the required configuration fields. Once you hit finish, your automated action will be active and ready to go when you are.

Activating More Commands
The Google Home devices have other utilities baked in that can be of some use to you in an office setting, especially if multiple devices are in use.

For instance, if your office is large and you can’t get ahold of someone through message or phone call, your Google Home device can function as an intercom. By accessing the Assistant on your smartphone, you can command the Google Home to “broadcast” and it will replay whatever message you speak into it afterwards to any Home devices connected to your account.

Of course, the Google Home devices are receptive to commands from multiple users, with up to six accounts being able to use the devices in their own way. The Google Home will even customize their answers based on the user making the request through its Voice Match training.

Finally, if a visitor to the office has something to share over the Google Home, the Guest mode allows them to connect directly to the device, without needing to connect to Wi-Fi. This means that you can keep your Wi-Fi password to yourself, and not give it out to every visitor to your office.

How else can you think of to use the Google Home to augment your day-to-day activities in the office? Share your ideas in the comments!

What Star Wars can Teach About Mentorship
Is Streaming Cutting Into Your Business’ Productiv...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, February 16 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Cloud Best Practices Network Security Business Computing Privacy Managed IT Services Hackers Malware Data Backup Hosted Solutions Innovation Backup Mobile Devices VoIP Email Google Outsourced IT Data Tech Term Data Recovery IT Support Microsoft Software Internet of Things Cloud Computing IT Services Saving Money Internet Communications BDR Business Continuity Hardware Efficiency Cybersecurity Communication Ransomware Small Business Smartphones Business Cybercrime Server Android Disaster Recovery Artificial Intelligence User Tips Network Alert Computers Managed IT Services Gadgets Browser Smartphone Windows Avoiding Downtime Save Money How To Managed IT Two-factor Authentication Workplace Tips Computer Business Intelligence Mobility Passwords Windows 10 Business Management Data Security Data Protection Productivity Collaboration Money Vulnerability Router Chrome BYOD Phishing Firewall Miscellaneous Applications Law Enforcement Social Engineering Social Media Mobile Device Management Operating System Virtualization Telephone Systems Connectivity Proactive IT IT Support VPN Redundancy Budget Document Management Compliance Managed Service Provider Office 365 Facebook Identity Theft Private Cloud Upgrade Blockchain Word Spam Productivity Remote Monitoring Bandwidth Flexibility Wi-Fi App Solid State Drive Infrastructure Mobile Computing Managed Service Value Networking Holiday Spam Blocking Password Sports Bring Your Own Device Business Owner Apps Hacking Virtual Assistant Unified Threat Management Information Technology Microsoft Office Data loss Work/Life Balance CES OneNote Automation Comparison Physical Security Big Data Government IT Management Encryption Website Content Management Paperless Office Training Workers Windows 7 Access Control Smart Tech Google Drive IT Plan Settings Data Breach Update Quick Tips Public Cloud Office Tips Employer-Employee Relationship Credit Cards Content Filtering Windows 10 Unsupported Software Mobile Device Information Analysis Data Storage File Sharing Data storage Servers Hybrid Cloud Root Cause Analysis Botnet Enterprise Content Management eWaste Wire Conferencing Excel Workforce USB Remote Worker Fraud Practices Start Menu Storage Electronic Medical Records Network Congestion Hard Drives iPhone Software Tips Accountants Customer End of Support FENG Fiber-Optic Augmented Reality Google Docs Business Technology Staff Electronic Health Records Monitor History Flash PDF Black Market Wireless Technology Meetings Travel Data Management Password Management Criminal Tip of the week Telecommuting Wiring Amazon Hosted Computing Mobile Password Manager IT Consultant IBM Keyboard Safety Internet exploMicrosoft Cables Devices Supercomputer The Internet of Things Data Warehousing Voice over Internet Protocol Digital Signature Machine Learning Marketing Hacker Windows 10s Office NIST Smart Office Cortana Windows Server 2008 Remote Work Hosted Solution Camera Amazon Web Services Inventory Emergency Professional Services Business Mangement Addiction Leadership HBO IoT SaaS Advertising Unified Communications Thought Leadership Multi-Factor Security Legal Risk Management Telephone System YouTube Cleaning Netflix User Error Sync Education Patch Management Relocation Screen Mirroring Software as a Service Cryptocurrency Colocation Recovery Online Shopping CrashOverride Tools Save Time Gmail Cache Hiring/Firing Health Outlook Specifications Theft Streaming Media Current Events Trending Strategy Computer Care Audit Telephony Authentication Scam Humor Cast HaaS Safe Mode Students Computing Infrastructure Regulations Evernote Downtime HVAC Recycling Wireless Internet webinar Files Frequently Asked Questions Millennials MSP Insurance Google Apps Content Filter Knowledge Apple Lifestyle HIPAA Samsung Reputation Internet Exlporer Computer Fan Skype Wireless Charging Nanotechnology Entertainment Human Resources Healthcare Charger Emails Automobile Books Television Presentation Worker Commute Lithium-ion battery Benefits Search Webinar 5G Worker Tech Support Instant Messaging Troubleshooting Public Computer Twitter Video Games Proactive Loyalty Smart Technology IT solutions Battery Techology Rootkit How to Employer Employee Relationship Customer Relationship Management Remote Computing Experience Remote Monitoring and Maintenance Competition IP Address Content Users Printers Computer Accessories Customer Service Scalability Music Line of Business Two Factor Authentication Best Practice Politics Regulation Company Culture Mobile Office Domains Fun Audiobook Vendor Management Shadow IT Bluetooth Wearable Technology Assessment Wireless Virtual Reality Managing Stress Transportation Public Speaking WiFi Administration