Contact us today!
845-876-6561

Professional Computer Associates Blog

Tip of the Week: Working from Google Home

Tip of the Week: Working from Google Home

It is no secret that Google can serve a great utility in the office through its many services and applications. However, have you ever considered how the Google Assistant can, well, assist you through devices like your smartphone and the assorted smart speakers that Google has produced? For today’s tip, we’ll review how some of the features of the Google Assistant can lend you a hand in the professional environment.

Basic Automation
Since productivity is one of the top goals in almost any office, it only makes sense to first focus on how using Google Home can boost your productivity through automation. While the device can serve many purposes on its own, it truly blossoms as a productivity tool through integrations with other devices and services.

For example, if you have equipped your office with smart lights or smart thermostats, you can adjust your office’s environment simply by telling Google to make the change you want. As a result, you can take greater control over your business environment without interrupting your productivity. After all, doesn’t it take much less time and effort to simply say, “Hey Google, turn off the lights in the conference room,” or “Hey Google, set temperature to 73 degrees,” than it would to interrupt what you were doing and go manually make the same changes?

More Advanced Automation (Kind Of)
If you’re at all familiar with the web service IFTTT, you can integrate it with your Google Home device to automate a variety of outcomes, based on predetermined triggers. It’s right in IFTTT’s name: If This, Then That.

Using IFTTT, you can connect your Google Home (or whichever Google device you’re using) to design your own commands that require the use of the Google Home. All you have to do is set “this” to be the Google Assistant, and choose the trigger you want your command to use. These triggers will all be of the spoken word variety, and each command can feature a few different variations. Once you’ve assigned the words to the command, click Create Trigger. To add the desired action you want automated, click through “that.”

You can then search through the available channels that you can trigger through your Google Assistant, select the one you want, and fill in the required configuration fields. Once you hit finish, your automated action will be active and ready to go when you are.

Activating More Commands
The Google Home devices have other utilities baked in that can be of some use to you in an office setting, especially if multiple devices are in use.

For instance, if your office is large and you can’t get ahold of someone through message or phone call, your Google Home device can function as an intercom. By accessing the Assistant on your smartphone, you can command the Google Home to “broadcast” and it will replay whatever message you speak into it afterwards to any Home devices connected to your account.

Of course, the Google Home devices are receptive to commands from multiple users, with up to six accounts being able to use the devices in their own way. The Google Home will even customize their answers based on the user making the request through its Voice Match training.

Finally, if a visitor to the office has something to share over the Google Home, the Guest mode allows them to connect directly to the device, without needing to connect to Wi-Fi. This means that you can keep your Wi-Fi password to yourself, and not give it out to every visitor to your office.

How else can you think of to use the Google Home to augment your day-to-day activities in the office? Share your ideas in the comments!

What Star Wars can Teach About Mentorship
Is Streaming Cutting Into Your Business’ Productiv...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, August 19 2018

Captcha Image

QR-Code

Tag Cloud

Security Tip of the Week Best Practices Cloud Technology Privacy Network Security Hackers Business Computing Backup Hosted Solutions Malware Managed IT Services Google VoIP Microsoft Mobile Devices Disaster Recovery Productivity Email Software Innovation Data Outsourced IT Business Continuity Business Internet Data Backup communications Efficiency Cybercrime Hardware Smartphones IT Services Windows 10 IT Support Computer Ransomware Data Recovery Tech Term Browser Cloud Computing Android Office Internet of Things BDR Business Management Saving Money Telephone Systems Computers Server Alert User Tips Network Windows Upgrade Small Business Cybersecurity Miscellaneous Virtualization Smartphone Mobile Device Management Artificial Intelligence Applications Managed IT Collaboration Social Media BYOD Save Money Quick Tips Facebook Chrome Workplace Tips Social Engineering Microsoft Office Law Enforcement Passwords Holiday Avoiding Downtime Communication Firewall Password Productivity Office 365 Private Cloud Bandwidth Gadgets How To Money Work/Life Balance Hacking Mobility App Office Tips Router Recovery Automation Managed Service Provider Bring Your Own Device Operating System Information Technology VPN Managed IT Services Health Proactive IT Redundancy Data Protection Wi-Fi Phishing Remote Monitoring Business Intelligence Flexibility Data Management Data Security HaaS Budget Two-factor Authentication Gmail Word IT Support Value Cleaning Vulnerability Data Breach Google Drive Mobile Device Document Management Safety Risk Management SaaS Big Data Marketing User Error Employer-Employee Relationship Spam Analysis Apps Entertainment Blockchain Identity Theft Compliance Windows 10 IT Management Connectivity Black Market OneNote Paperless Office Education Sports Keyboard Scam IT Plan Content Filtering Settings Update Remote Computing Wireless Technology Unsupported Software Charger Downtime Networking Data Storage Access Control Save Time Servers Public Cloud CES Smart Tech Best Practice Electronic Medical Records Workers History Information Infrastructure File Sharing Shadow IT Streaming Media Automobile Worker Website Content Management DDoS Hiring/Firing USB Solid State Drive Comparison Meetings Internet Exlporer HIPAA Computer Care Data storage YouTube Government Wearable Technology Spam Blocking PDF Wireless Data loss Machine Learning Apple Windows 7 End of Support Encryption Mobile Computing Battery Computing Infrastructure Samsung The Internet of Things Patch Management Instant Messaging Training Physical Security Legal Credit Cards eWaste Business Owner Humor Millennials Two Factor Authentication Frequently Asked Questions hacker Telephone System Cortana Addiction NarrowBand IT Consultant iPhone Search Cryptocurrency Wireless Charging Devices Audiobook Vendor Management Skype Trending Staff Supercomputer Cast Fraud Inventory Environment Mouse Bluetooth Advertising Line of Business Criminal Monitor Botnet Students Workforce IoT Excel Google Apps Running Cable Experience Loyalty Lifestyle Digital Signature Transportation Leadership How to Safe Mode Fiber-Optic Thought Leadership Antivirus Tech Support Politics Audit Start Menu Cache Current Events HVAC Amazon Netflix Google Docs MSP Root Cause Analysis Reputation Travel Techology Healthcare Telecommuting Users Going Green Tip of the week Lithium-ion battery Music Wireless Internet Strategy SharePoint Chromecast Benefits Software Tips Files Cables Content Filter Unified Threat Management Computer Fan Robot Mobile Hard Drives IaaS Books IBM Knowledge Relocation Video Games Enterprise Content Management Amazon Web Services Authentication Flash Hybrid Cloud Augmented Reality WiFi Assessment Customer Electronic Health Records Remote Work Insurance Virtual Reality Laptop Windows Server 2008 Managed Service Password Manager Wire Smart Technology webinar Colocation Business Technology Unified Communications Storage FENG Professional Services Emergency Network Congestion Data Warehousing Scalability Password Management Online Shopping People Nanotechnology Uninterrupted Power Supply Rootkit Sync Voice over Internet Protocol Troubleshooting Television Practices Distributed Denial of Service Worker Commute Employer Employee Relationship Emails Touchpad Proactive Business Mangement Fax Server Outlook Tools Smart Office Specifications Accountants Conferencing HBO Virtual Assistant Theft NIST Evernote Mobile Office Content Windows 10s Telephony Multi-Factor Security Human Resources Hosted Solution Public Computer Screen Mirroring Hosted Computing Computer Accessories Regulations Internet exploMicrosoft Software as a Service Remote Monitoring and Maintenance Recycling IT solutions Notifications Managing Stress IT solutions CrashOverride Administration Regulation Thank You Remote Worker Twitter Congratulations Wiring Company Culture Webinar

Free Consultation

Free ConsultationSign up today for a
FREE Network Consultation
How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!