(707) 268-8850    Get SUPPORT

Network Management Services Blog

Tip of the Week: Working from Google Home

Tip of the Week: Working from Google Home

It is no secret that Google can serve a great utility in the office through its many services and applications. However, have you ever considered how the Google Assistant can, well, assist you through devices like your smartphone and the assorted smart speakers that Google has produced? For today’s tip, we’ll review how some of the features of the Google Assistant can lend you a hand in the professional environment.

Basic Automation
Since productivity is one of the top goals in almost any office, it only makes sense to first focus on how using Google Home can boost your productivity through automation. While the device can serve many purposes on its own, it truly blossoms as a productivity tool through integrations with other devices and services.

For example, if you have equipped your office with smart lights or smart thermostats, you can adjust your office’s environment simply by telling Google to make the change you want. As a result, you can take greater control over your business environment without interrupting your productivity. After all, doesn’t it take much less time and effort to simply say, “Hey Google, turn off the lights in the conference room,” or “Hey Google, set temperature to 73 degrees,” than it would to interrupt what you were doing and go manually make the same changes?

More Advanced Automation (Kind Of)
If you’re at all familiar with the web service IFTTT, you can integrate it with your Google Home device to automate a variety of outcomes, based on predetermined triggers. It’s right in IFTTT’s name: If This, Then That.

Using IFTTT, you can connect your Google Home (or whichever Google device you’re using) to design your own commands that require the use of the Google Home. All you have to do is set “this” to be the Google Assistant, and choose the trigger you want your command to use. These triggers will all be of the spoken word variety, and each command can feature a few different variations. Once you’ve assigned the words to the command, click Create Trigger. To add the desired action you want automated, click through “that.”

You can then search through the available channels that you can trigger through your Google Assistant, select the one you want, and fill in the required configuration fields. Once you hit finish, your automated action will be active and ready to go when you are.

Activating More Commands
The Google Home devices have other utilities baked in that can be of some use to you in an office setting, especially if multiple devices are in use.

For instance, if your office is large and you can’t get ahold of someone through message or phone call, your Google Home device can function as an intercom. By accessing the Assistant on your smartphone, you can command the Google Home to “broadcast” and it will replay whatever message you speak into it afterwards to any Home devices connected to your account.

Of course, the Google Home devices are receptive to commands from multiple users, with up to six accounts being able to use the devices in their own way. The Google Home will even customize their answers based on the user making the request through its Voice Match training.

Finally, if a visitor to the office has something to share over the Google Home, the Guest mode allows them to connect directly to the device, without needing to connect to Wi-Fi. This means that you can keep your Wi-Fi password to yourself, and not give it out to every visitor to your office.

How else can you think of to use the Google Home to augment your day-to-day activities in the office? Share your ideas in the comments!

What Star Wars can Teach About Mentorship
Is Streaming Cutting Into Your Business’ Productiv...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, September 19 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Cloud Best Practices Network Security Business Computing Privacy Managed IT Services Hackers Malware Data Backup Innovation Hosted Solutions Backup VoIP Google Mobile Devices Email Outsourced IT Data Recovery IT Support Tech Term Data Software Internet of Things Cloud Computing Saving Money Microsoft Efficiency BDR Communications Hardware Internet IT Services Business Continuity Ransomware Cybercrime Business Cybersecurity Small Business Disaster Recovery User Tips Smartphones Android Communication Artificial Intelligence Managed IT Services Gadgets Network Browser Avoiding Downtime Server Save Money Computers Managed IT How To Smartphone Windows Alert Router Productivity BYOD Chrome Applications Firewall Phishing Money Miscellaneous Business Intelligence Social Media Data Security Data Protection Windows 10 Mobility Mobile Device Management Social Engineering Two-factor Authentication Law Enforcement Collaboration Vulnerability Passwords Business Management Virtualization Operating System Facebook Word Budget Compliance Connectivity Office 365 VPN Upgrade Flexibility Productivity Workplace Tips Spam Bandwidth Telephone Systems Managed Service Provider Identity Theft Redundancy Private Cloud Blockchain Proactive IT Computer IT Support Document Management Remote Monitoring Data storage IT Plan Apps Update Infrastructure Microsoft Office Information Unsupported Software Training Sports File Sharing Workers Big Data Data Storage Servers Website Office Tips Managed Service Settings Hacking Data Breach Mobile Device Mobile Computing CES Content Filtering Spam Blocking Encryption App Physical Security Automation Access Control Government Content Management Solid State Drive Paperless Office Virtual Assistant Windows 10 Smart Tech Holiday Data loss Value Password Google Drive Business Owner Networking Comparison Wi-Fi OneNote Quick Tips Credit Cards Bring Your Own Device IT Management Information Technology Employer-Employee Relationship Analysis Work/Life Balance Public Cloud Windows 7 Unified Threat Management IBM Fraud Emergency Practices Legal Trending Risk Management Safety eWaste Audit Wire Safe Mode Telephony Education The Internet of Things Accountants Cast SaaS MSP Hybrid Cloud Marketing Hacker Storage HVAC Regulations Leadership Recovery Staff Downtime Cleaning Electronic Health Records Netflix Save Time Customer End of Support Fiber-Optic Frequently Asked Questions Millennials Hard Drives iPhone Monitor History Amazon Patch Management Hosted Computing Lifestyle Criminal Computer Fan Skype HaaS Remote Worker Password Manager Enterprise Content Management Digital Signature Root Cause Analysis Computer Care Machine Learning Botnet Internet exploMicrosoft Cables Devices Excel Current Events Workforce Amazon Web Services Scam Inventory Software Tips HIPAA FENG Smart Office Business Technology Start Menu Cortana IoT Wiring Google Docs Entertainment Office Business Mangement Addiction Password Management Flash webinar Meetings Samsung YouTube Travel Advertising Unified Communications Thought Leadership Tip of the week Knowledge Telecommuting USB User Error Online Shopping Charger Mobile Emails Colocation Data Warehousing Voice over Internet Protocol Relocation Gmail Windows 10s PDF Cache NIST Conferencing Black Market Strategy Data Management Theft Electronic Medical Records Streaming Media Windows Server 2008 Network Congestion Remote Work Hiring/Firing Health Evernote Authentication HBO Keyboard Students Telephone System Professional Services Computing Infrastructure Insurance Multi-Factor Security Humor Recycling Wireless Internet Cryptocurrency Sync Files Augmented Reality Screen Mirroring Software as a Service Google Apps Content Filter IT Consultant Hosted Solution CrashOverride Healthcare Tools Reputation Internet Exlporer Wireless Charging Nanotechnology Outlook Supercomputer Specifications Apple Wireless Technology Human Resources Administration Rootkit Content Employer Employee Relationship Scalability Music Customer Relationship Management Best Practice Politics Search Competition WiFi Audiobook IP Address Computer Accessories Twitter Shadow IT Users Two Factor Authentication Wearable Technology Customer Service Vendor Management Virtual Reality Assessment Mobile Office Bluetooth Domains Proactive Automobile Transportation Wireless Worker Commute Books Television Camera Public Speaking Company Culture Remote Monitoring and Maintenance Instant Messaging Troubleshooting Benefits Video Games Presentation Webinar Public Computer Printers Fun Lithium-ion battery Worker Battery Loyalty Techology Managing Stress Line of Business How to Regulation IT solutions Tech Support Smart Technology Remote Computing Experience 5G