(707) 268-8850    Get SUPPORT

Network Management Services Blog

Tip of the Week: Working from Google Home

Tip of the Week: Working from Google Home

It is no secret that Google can serve a great utility in the office through its many services and applications. However, have you ever considered how the Google Assistant can, well, assist you through devices like your smartphone and the assorted smart speakers that Google has produced? For today’s tip, we’ll review how some of the features of the Google Assistant can lend you a hand in the professional environment.

Basic Automation
Since productivity is one of the top goals in almost any office, it only makes sense to first focus on how using Google Home can boost your productivity through automation. While the device can serve many purposes on its own, it truly blossoms as a productivity tool through integrations with other devices and services.

For example, if you have equipped your office with smart lights or smart thermostats, you can adjust your office’s environment simply by telling Google to make the change you want. As a result, you can take greater control over your business environment without interrupting your productivity. After all, doesn’t it take much less time and effort to simply say, “Hey Google, turn off the lights in the conference room,” or “Hey Google, set temperature to 73 degrees,” than it would to interrupt what you were doing and go manually make the same changes?

More Advanced Automation (Kind Of)
If you’re at all familiar with the web service IFTTT, you can integrate it with your Google Home device to automate a variety of outcomes, based on predetermined triggers. It’s right in IFTTT’s name: If This, Then That.

Using IFTTT, you can connect your Google Home (or whichever Google device you’re using) to design your own commands that require the use of the Google Home. All you have to do is set “this” to be the Google Assistant, and choose the trigger you want your command to use. These triggers will all be of the spoken word variety, and each command can feature a few different variations. Once you’ve assigned the words to the command, click Create Trigger. To add the desired action you want automated, click through “that.”

You can then search through the available channels that you can trigger through your Google Assistant, select the one you want, and fill in the required configuration fields. Once you hit finish, your automated action will be active and ready to go when you are.

Activating More Commands
The Google Home devices have other utilities baked in that can be of some use to you in an office setting, especially if multiple devices are in use.

For instance, if your office is large and you can’t get ahold of someone through message or phone call, your Google Home device can function as an intercom. By accessing the Assistant on your smartphone, you can command the Google Home to “broadcast” and it will replay whatever message you speak into it afterwards to any Home devices connected to your account.

Of course, the Google Home devices are receptive to commands from multiple users, with up to six accounts being able to use the devices in their own way. The Google Home will even customize their answers based on the user making the request through its Voice Match training.

Finally, if a visitor to the office has something to share over the Google Home, the Guest mode allows them to connect directly to the device, without needing to connect to Wi-Fi. This means that you can keep your Wi-Fi password to yourself, and not give it out to every visitor to your office.

How else can you think of to use the Google Home to augment your day-to-day activities in the office? Share your ideas in the comments!

What Star Wars can Teach About Mentorship
Is Streaming Cutting Into Your Business’ Productiv...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, November 15 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Cloud Best Practices Network Security Business Computing Privacy Managed IT Services Hackers Malware Data Backup Innovation Backup Mobile Devices VoIP Hosted Solutions Google Email Outsourced IT Data Data Recovery Tech Term IT Support Saving Money Cloud Computing Internet Microsoft Software IT Services Internet of Things Business Continuity BDR Efficiency Hardware Communications Cybercrime Smartphones Business Ransomware Communication Cybersecurity Small Business User Tips Server Android Disaster Recovery Artificial Intelligence Save Money Managed IT Network Alert Computers How To Smartphone Windows Gadgets Avoiding Downtime Browser Managed IT Services Miscellaneous Chrome Firewall Workplace Tips Social Media Phishing Mobility Mobile Device Management Two-factor Authentication Collaboration Computer Money Business Intelligence Passwords Data Security Data Protection Router Windows 10 Productivity BYOD Business Management Social Engineering Applications Law Enforcement Vulnerability Office 365 Compliance Remote Monitoring Flexibility Upgrade Virtualization Identity Theft Operating System Telephone Systems Spam Word Blockchain Productivity Bandwidth VPN Document Management Connectivity Managed Service Provider Proactive IT Redundancy IT Support Budget Private Cloud Facebook Website Employer-Employee Relationship Windows 7 Public Cloud Office Tips Encryption Mobile Device Paperless Office Data storage IT Plan Access Control Training Workers Content Management Update Smart Tech App Solid State Drive Settings Holiday Information Windows 10 Unsupported Software Data Breach File Sharing Content Filtering Data Storage Credit Cards Servers Password Analysis Hacking Business Owner Wi-Fi Managed Service Mobile Computing Information Technology Spam Blocking Work/Life Balance Physical Security Infrastructure Value Automation Networking Apps Government Virtual Assistant Bring Your Own Device Sports Microsoft Office Data loss Google Drive Comparison OneNote Unified Threat Management Big Data Quick Tips IT Management CES Screen Mirroring SaaS Files Software as a Service IoT Leadership Business Mangement Addiction Cryptocurrency YouTube HIPAA Reputation Outlook Internet Exlporer Specifications Unified Communications Thought Leadership CrashOverride Cleaning Apple Tools Netflix Entertainment Patch Management Trending Online Shopping Audit Telephony Safe Mode Cast USB Regulations Hybrid Cloud Gmail Cache Strategy MSP Customer Frequently Asked Questions Current Events End of Support Millennials Theft Streaming Media HVAC Hard Drives Downtime Computer Care iPhone Students Scam Monitor History Lifestyle Evernote Authentication PDF Black Market Computer Fan Skype Insurance webinar Recycling Wireless Internet Data Management Keyboard Remote Worker Excel Knowledge Internet exploMicrosoft Workforce Google Apps Content Filter Enterprise Content Management Root Cause Analysis Samsung Botnet Human Resources Healthcare Software Tips Wireless Charging Nanotechnology FENG Charger Start Menu Emails Business Technology Augmented Reality Cortana Google Docs Fraud Practices Hosted Solution Office Flash Conferencing eWaste Wire Travel Accountants Wiring Electronic Medical Records Tip of the week Network Congestion Advertising Telecommuting Storage Password Management Wireless Technology Meetings Staff Electronic Health Records Legal Risk Management IBM User Error Fiber-Optic Education Safety Mobile The Internet of Things Data Warehousing Colocation Voice over Internet Protocol Amazon Hosted Computing Recovery Marketing Hacker Windows 10s Relocation Criminal Hiring/Firing Health Camera Windows Server 2008 IT Consultant Remote Work Password Manager Save Time NIST Digital Signature Machine Learning HBO Supercomputer Cables Devices Professional Services Telephone System Emergency Computing Infrastructure Multi-Factor Security Amazon Web Services Inventory Humor Sync Smart Office HaaS Wearable Technology Printers Users Employer Employee Relationship Line of Business Customer Service Virtual Reality Regulation Administration Mobile Office Domains Computer Accessories Automobile Company Culture Two Factor Authentication Worker Commute Wireless Search Vendor Management Public Speaking Assessment WiFi Instant Messaging Troubleshooting Bluetooth Managing Stress Video Games Presentation Transportation Battery Lithium-ion battery Books Television How to Techology Remote Computing Experience Tech Support 5G Proactive Benefits Webinar Public Computer Worker Content Loyalty Scalability Music Twitter Best Practice Politics Remote Monitoring and Maintenance Customer Relationship Management Smart Technology Competition IT solutions Audiobook Shadow IT IP Address Fun Rootkit