XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Working from Google Home

Tip of the Week: Working from Google Home

It is no secret that Google can serve a great utility in the office through its many services and applications. However, have you ever considered how the Google Assistant can, well, assist you through devices like your smartphone and the assorted smart speakers that Google has produced? For today’s tip, we’ll review how some of the features of the Google Assistant can lend you a hand in the professional environment.

Basic Automation
Since productivity is one of the top goals in almost any office, it only makes sense to first focus on how using Google Home can boost your productivity through automation. While the device can serve many purposes on its own, it truly blossoms as a productivity tool through integrations with other devices and services.

For example, if you have equipped your office with smart lights or smart thermostats, you can adjust your office’s environment simply by telling Google to make the change you want. As a result, you can take greater control over your business environment without interrupting your productivity. After all, doesn’t it take much less time and effort to simply say, “Hey Google, turn off the lights in the conference room,” or “Hey Google, set temperature to 73 degrees,” than it would to interrupt what you were doing and go manually make the same changes?

More Advanced Automation (Kind Of)
If you’re at all familiar with the web service IFTTT, you can integrate it with your Google Home device to automate a variety of outcomes, based on predetermined triggers. It’s right in IFTTT’s name: If This, Then That.

Using IFTTT, you can connect your Google Home (or whichever Google device you’re using) to design your own commands that require the use of the Google Home. All you have to do is set “this” to be the Google Assistant, and choose the trigger you want your command to use. These triggers will all be of the spoken word variety, and each command can feature a few different variations. Once you’ve assigned the words to the command, click Create Trigger. To add the desired action you want automated, click through “that.”

You can then search through the available channels that you can trigger through your Google Assistant, select the one you want, and fill in the required configuration fields. Once you hit finish, your automated action will be active and ready to go when you are.

Activating More Commands
The Google Home devices have other utilities baked in that can be of some use to you in an office setting, especially if multiple devices are in use.

For instance, if your office is large and you can’t get ahold of someone through message or phone call, your Google Home device can function as an intercom. By accessing the Assistant on your smartphone, you can command the Google Home to “broadcast” and it will replay whatever message you speak into it afterwards to any Home devices connected to your account.

Of course, the Google Home devices are receptive to commands from multiple users, with up to six accounts being able to use the devices in their own way. The Google Home will even customize their answers based on the user making the request through its Voice Match training.

Finally, if a visitor to the office has something to share over the Google Home, the Guest mode allows them to connect directly to the device, without needing to connect to Wi-Fi. This means that you can keep your Wi-Fi password to yourself, and not give it out to every visitor to your office.

How else can you think of to use the Google Home to augment your day-to-day activities in the office? Share your ideas in the comments!

What Star Wars can Teach About Mentorship
Is Streaming Cutting Into Your Business’ Productiv...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, September 20 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Saving Money Best Practices Backup Software Workplace Tips Managed Service Provider Business Computing Hackers Small Business Data Hosted Solutions Productivity Google Hardware Mobile Office Mobile Devices VoIP Email Gadgets Quick Tips Malware Efficiency Network Security IT Support Network Social Media Innovation Business Management IT Services Smartphones Miscellaneous Server Business Continuity Upgrade Business Virtualization Windows Communication Disaster Recovery Microsoft Office Managed IT Services Computer Communications Users Passwords Mobile Device Management User Tips Data Backup Android Smartphone Browser Marketing Save Money Alert WiFi Holiday Data Recovery Vendor Management Ransomware Tech Term Mobile Computing Windows 10 Operating System Internet of Things Remote Monitoring Cybercrime Outsourced IT BYOD Information Technology Avoiding Downtime Cloud Computing Computers BDR Bring Your Own Device Apple Current Events Going Green History Best Practice Big Data VPN Remote Computing IT Solutions Firewall The Internet of Things Artificial Intelligence Chrome Telephone Systems Automation Router Social Engineering Health Employer-Employee Relationship Spam Cybersecurity Facebook Trending Phone System Application Collaboration Wireless Technology Hacking IT Consultant Money Managed IT Services Proactive IT Office Excel App Budget Printer Lithium-ion Battery Bandwidth Fax Server Networking Maintenance Windows 8 Applications Unified Threat Management Business Intelligence Two-factor Authentication How To Mobility iPhone Recovery Content Filtering Business Managament Redundancy Law Enforcement Apps Gmail Office 365 PowerPoint Data Security Antivirus Analytics User Error Customer Relationship Management Training Hard Drives Managed IT Humor Mouse Phishing Windows 10 Outlook Tutorials Virus Private Cloud Value Website Data Protection Sports Mobile Device Data Management Twitter Vulnerability Blockchain Document Management Compliance Social Networking Word Digital Payment Computer Repair Streaming Media Risk Management Flexibility Encryption Entertainment Identity Theft Tech Support Retail Settings Saving Time Analysis Google Drive IT Management Network Congestion Productivity Downtime File Sharing Memory Connectivity Inbound Marketing Conferencing Save Time Search IT Support Tablet Office Tips Administration Online Currency Update DDoS Recycling Point of Sale Data Storage Education Solid State Drive Video Surveillance Comparison Access Control Work/Life Balance Data Breach Windows 7 Smart Tech Black Market Statistics Instant Messaging Physical Security Programming Workers Environment IBM Cleaning Machine Learning Password Skype Piracy Wireless Human Resources Leadership Scam Public Cloud Administrator Information Credit Cards SaaS Augmented Reality Intranet Biometrics Running Cable Wearable Technology Data loss IT service Computer Accessories Hacker Servers Paperless Office Data storage Managed Service Spam Blocking CES eWaste Social Internet Exlporer Best Available IT Plan PDF Bluetooth USB HaaS End of Support Robot Content Management Safety Virtual Assistant Wi-Fi People Unsupported Software Government Infrastructure YouTube Samsung Touchscreen Webinar OneNote Meetings Hiring/Firing Windows Server 2008 Amazon Web Services Wireless Internet Internet exploMicrosoft Windows Media Player Virtual Desktop IoT Telephone System Software Tips Remote Work Help Desk Thought Leadership E-Commerce Hosted Solution Cost Management Password Manager NarrowBand NIST Computer Care Line of Business IT Security Keyboard Upgrades Analyitcs Telephony Unified Communications Uninterrupted Power Supply Electronic Health Records Customers Online Shopping Wire Advertising Audit Customer Service Google Docs Staff Print Server Distributed Denial of Service Content Filter Files Remote Support Netflix Webcam Botnet Business Mangement Chromecast Cryptocurrency nternet Crowdfunding Consultant Authentication MSP Start Menu Theft Root Cause Analysis Data Warehousing Specifications Supercomputer Regulations Evernote Notifications Smart Office Company Culture Computer Fan Cameras Voice over Internet Protocol Digital Signature Insurance Law Firm IT PC Care HBO Storage Colocation Travel Criminal Macro Laptop Safe Mode Licensing SharePoint Nanotechnology Remote Worker Virtual Reality Scheduling Mobile Cortana Co-managed IT Shadow IT HVAC LinkedIn WIndows 7 3D Millennials Knowledge Wireless Charging Hybrid Cloud Net Neutrality FENG Printer Server Shortcut eBay Multi-Factor Security Strategy Practices User Alerts Frequently Asked Questions Fraud IaaS Addiction Computing Infrastructure Windows 8.1 Update Patch Management Worker Commute Accountants Touchpad Business Technology Relocation Wiring Display 360 Emails Bloatware Professional Services Google Apps Enterprise Content Management Legal Screen Mirroring Managing Stress Domains Workforce Science Flash Fiber-Optic Students Electronic Medical Records Text Messaging Lifestyle Hosted Computing Monitor Proactive Debate Work Station Tip of the week Amazon Cache Windows 10s Gaming Console Software as a Service Business Owner Telecommuting Devices GDPR Entrepreneur Tools Password Management Charger Cast HIPAA Tablets Sync Cables Healthcare Hiring/Firing Inventory Reputation Remote Monitoring and Maintenance Benefits Battery Automobile Public Computer IT solutions Video Games Employer Employee Relationship CrashOverride Thank You Smart Technology Regulation Camera Books Scalability Loyalty Experience Congratulations Content Two Factor Authentication Printers Emergency How to Music Techology Worker Audiobook Assessment Rootkit Politics Transportation Television Troubleshooting Webinar

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *