Contact us today!

Professional Computer Associates Blog

Professional Computer Associates has been serving the Red Hook area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Working from Google Home

Tip of the Week: Working from Google Home

It is no secret that Google can serve a great utility in the office through its many services and applications. However, have you ever considered how the Google Assistant can, well, assist you through devices like your smartphone and the assorted smart speakers that Google has produced? For today’s tip, we’ll review how some of the features of the Google Assistant can lend you a hand in the professional environment.

Basic Automation
Since productivity is one of the top goals in almost any office, it only makes sense to first focus on how using Google Home can boost your productivity through automation. While the device can serve many purposes on its own, it truly blossoms as a productivity tool through integrations with other devices and services.

For example, if you have equipped your office with smart lights or smart thermostats, you can adjust your office’s environment simply by telling Google to make the change you want. As a result, you can take greater control over your business environment without interrupting your productivity. After all, doesn’t it take much less time and effort to simply say, “Hey Google, turn off the lights in the conference room,” or “Hey Google, set temperature to 73 degrees,” than it would to interrupt what you were doing and go manually make the same changes?

More Advanced Automation (Kind Of)
If you’re at all familiar with the web service IFTTT, you can integrate it with your Google Home device to automate a variety of outcomes, based on predetermined triggers. It’s right in IFTTT’s name: If This, Then That.

Using IFTTT, you can connect your Google Home (or whichever Google device you’re using) to design your own commands that require the use of the Google Home. All you have to do is set “this” to be the Google Assistant, and choose the trigger you want your command to use. These triggers will all be of the spoken word variety, and each command can feature a few different variations. Once you’ve assigned the words to the command, click Create Trigger. To add the desired action you want automated, click through “that.”

You can then search through the available channels that you can trigger through your Google Assistant, select the one you want, and fill in the required configuration fields. Once you hit finish, your automated action will be active and ready to go when you are.

Activating More Commands
The Google Home devices have other utilities baked in that can be of some use to you in an office setting, especially if multiple devices are in use.

For instance, if your office is large and you can’t get ahold of someone through message or phone call, your Google Home device can function as an intercom. By accessing the Assistant on your smartphone, you can command the Google Home to “broadcast” and it will replay whatever message you speak into it afterwards to any Home devices connected to your account.

Of course, the Google Home devices are receptive to commands from multiple users, with up to six accounts being able to use the devices in their own way. The Google Home will even customize their answers based on the user making the request through its Voice Match training.

Finally, if a visitor to the office has something to share over the Google Home, the Guest mode allows them to connect directly to the device, without needing to connect to Wi-Fi. This means that you can keep your Wi-Fi password to yourself, and not give it out to every visitor to your office.

How else can you think of to use the Google Home to augment your day-to-day activities in the office? Share your ideas in the comments!

What Star Wars can Teach About Mentorship
Is Streaming Cutting Into Your Business’ Productiv...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, June 21 2018

Captcha Image


Tag Cloud

Security Tip of the Week Best Practices Cloud Technology Privacy Network Security Hackers Business Computing Backup Managed IT Services Hosted Solutions Malware Google Microsoft VoIP Disaster Recovery Software Business Internet Business Continuity Mobile Devices Email Outsourced IT Productivity Data Innovation Cybercrime communications IT Support Computer Smartphones Efficiency Data Backup Ransomware Windows 10 IT Services Browser Hardware Android Cloud Computing Internet of Things Office Saving Money Business Management Data Recovery Telephone Systems Alert Computers Server Small Business Smartphone Virtualization Upgrade BDR User Tips Mobile Device Management Windows Cybersecurity Collaboration Social Engineering Chrome Workplace Tips Law Enforcement Tech Term Network Quick Tips BYOD Managed IT Holiday Office 365 Office Tips Managed Service Provider Communication Mobility Social Media Work/Life Balance Miscellaneous Avoiding Downtime Passwords How To Money App Firewall Save Money Productivity Bandwidth Recovery Facebook Artificial Intelligence Private Cloud Microsoft Office Hacking Two-factor Authentication Flexibility Wi-Fi Bring Your Own Device Data Protection Router Phishing Proactive IT Data Security VPN HaaS Automation Remote Monitoring Health Information Technology Redundancy Budget Business Intelligence Operating System Password Gmail Data Management Black Market Word Google Drive User Error Marketing Apps Cleaning Entertainment Compliance SaaS Mobile Device Spam Data Breach Applications Connectivity Big Data Risk Management Vulnerability Employer-Employee Relationship Safety Managed IT Services Value Identity Theft Document Management Gadgets Windows 10 Save Time IT Management Mobile Computing Settings Physical Security OneNote Worker Automobile IT Plan Streaming Media USB Unsupported Software Downtime Encryption Servers Infrastructure Legal Battery History Training Comparison Wearable Technology Analysis Education Best Practice Shadow IT Data storage Spam Blocking Government Content Filtering Data loss End of Support Internet Exlporer Charger YouTube Electronic Medical Records Update Solid State Drive The Internet of Things Hiring/Firing DDoS Sports Computer Care HIPAA CES Website Smart Tech Data Storage Public Cloud Remote Computing Samsung Workers Content Management Wireless Technology Meetings Patch Management Wireless Business Owner Apple Keyboard Scam PDF eWaste Credit Cards Windows 7 Computing Infrastructure Trending Hosted Computing Uninterrupted Power Supply Lithium-ion battery Environment Fraud Addiction Music Regulations Cortana Staff hacker Running Cable Benefits Lifestyle Inventory IT Consultant Assessment Amazon Cache Google Apps Digital Signature HVAC Smart Technology Botnet SharePoint Rootkit Access Control Leadership Television Amazon Web Services Wireless Internet Troubleshooting Netflix Travel Strategy Root Cause Analysis Going Green Tech Support Authentication Content Software Tips Robot Relocation Notifications Public Computer Online Shopping People Wire Hosted Solution Flash Password Manager Two Factor Authentication Laptop Fax Server Vendor Management Specifications Nanotechnology Audiobook webinar IaaS Evernote Mobile Office Smart Office Sync Business Mangement Software as a Service Accountants Touchpad IT solutions Millennials Politics HBO Hard Drives Conferencing Outlook Video Games Windows 10s Networking Paperless Office Telephony Recycling Users Screen Mirroring Internet exploMicrosoft Unified Threat Management Workforce Devices Frequently Asked Questions Wireless Charging IT Support Humor Criminal Scalability iPhone Antivirus IBM Students Books Skype Google Docs IoT Virtual Reality Cast Advertising Telecommuting Thought Leadership Excel Fiber-Optic Monitor Instant Messaging Audit NarrowBand Supercomputer Healthcare Emergency Start Menu WiFi Employer Employee Relationship Worker Commute Distributed Denial of Service Remote Work Content Filter Tip of the week Cables Reputation Search Computer Fan Files Current Events Electronic Health Records Mobile Computer Accessories Voice over Internet Protocol Insurance Hybrid Cloud Knowledge Storage Windows Server 2008 Unified Communications Customer Blockchain How to FENG Colocation Chromecast Machine Learning Professional Services Bluetooth Multi-Factor Security Practices Data Warehousing Network Congestion Mouse Loyalty Experience Theft Techology Emails Human Resources Transportation Tools Webinar Managing Stress IT solutions CrashOverride Administration Thank You Congratulations Twitter Company Culture

Free Consultation

Free ConsultationSign up today for a
FREE Network Consultation
How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!