(703) 288-9767    NTC Store
NTConnections Blog

NTConnections has been serving the Reston area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Working from Google Home

Tip of the Week: Working from Google Home

It is no secret that Google can serve a great utility in the office through its many services and applications. However, have you ever considered how the Google Assistant can, well, assist you through devices like your smartphone and the assorted smart speakers that Google has produced? For today’s tip, we’ll review how some of the features of the Google Assistant can lend you a hand in the professional environment.

Basic Automation
Since productivity is one of the top goals in almost any office, it only makes sense to first focus on how using Google Home can boost your productivity through automation. While the device can serve many purposes on its own, it truly blossoms as a productivity tool through integrations with other devices and services.

For example, if you have equipped your office with smart lights or smart thermostats, you can adjust your office’s environment simply by telling Google to make the change you want. As a result, you can take greater control over your business environment without interrupting your productivity. After all, doesn’t it take much less time and effort to simply say, “Hey Google, turn off the lights in the conference room,” or “Hey Google, set temperature to 73 degrees,” than it would to interrupt what you were doing and go manually make the same changes?

More Advanced Automation (Kind Of)
If you’re at all familiar with the web service IFTTT, you can integrate it with your Google Home device to automate a variety of outcomes, based on predetermined triggers. It’s right in IFTTT’s name: If This, Then That.

Using IFTTT, you can connect your Google Home (or whichever Google device you’re using) to design your own commands that require the use of the Google Home. All you have to do is set “this” to be the Google Assistant, and choose the trigger you want your command to use. These triggers will all be of the spoken word variety, and each command can feature a few different variations. Once you’ve assigned the words to the command, click Create Trigger. To add the desired action you want automated, click through “that.”

You can then search through the available channels that you can trigger through your Google Assistant, select the one you want, and fill in the required configuration fields. Once you hit finish, your automated action will be active and ready to go when you are.

Activating More Commands
The Google Home devices have other utilities baked in that can be of some use to you in an office setting, especially if multiple devices are in use.

For instance, if your office is large and you can’t get ahold of someone through message or phone call, your Google Home device can function as an intercom. By accessing the Assistant on your smartphone, you can command the Google Home to “broadcast” and it will replay whatever message you speak into it afterwards to any Home devices connected to your account.

Of course, the Google Home devices are receptive to commands from multiple users, with up to six accounts being able to use the devices in their own way. The Google Home will even customize their answers based on the user making the request through its Voice Match training.

Finally, if a visitor to the office has something to share over the Google Home, the Guest mode allows them to connect directly to the device, without needing to connect to Wi-Fi. This means that you can keep your Wi-Fi password to yourself, and not give it out to every visitor to your office.

How else can you think of to use the Google Home to augment your day-to-day activities in the office? Share your ideas in the comments!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, June 21 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Cloud Best Practices Privacy Hackers Business Computing Microsoft Hosted Solutions Productivity Internet Malware Backup Google Mobile Devices Efficiency VoIP Business IT Support IT Services Email Network Security Managed Service Provider Miscellaneous Server Innovation Data Workplace Tips Upgrade Disaster Recovery Business Continuity Network Software Windows Business Management Managed IT Services Saving Money Hardware Communication Computer Smartphone Browser Save Money Android Mobile Device Management Virtualization Smartphones communications User Tips Data Backup Holiday Cybercrime Microsoft Office Outsourced IT Computers Internet of Things BYOD Windows 10 WiFi Operating System Mobile Computing Cloud Computing Hacking Chrome Big Data Ransomware Small Business Data Recovery Social Media Remote Monitoring Collaboration IT Solutions VPN Managed IT Services Alert Application Apple Automation Proactive IT Avoiding Downtime Passwords Office Marketing Budget The Internet of Things Quick Tips Tech Term Social Engineering Information Technology BDR Employer-Employee Relationship Bandwidth Artificial Intelligence Managed IT Going Green Remote Computing Health Mobility Bring Your Own Device Recovery spam Gadgets Cybersecurity Telephone Systems Private Cloud Compliance How To Vulnerability Data Security Redundancy Wireless Technology User Error IT Support Office 365 Two-factor Authentication Data Protection Document Management Vendor Management Business Intelligence Website iPhone Money Save Time Firewall App Router Gmail Phishing Identity Theft Networking Mouse Apps Law Enforcement Data Management Productivity Risk Management Word PowerPoint Windows 10 Connectivity Excel Phone System Antivirus Office Tips Content Filtering Downtime Facebook History Entertainment Tablet Analytics Lithium-ion battery Value Memory Retail Search Customer Relationship Management Intranet Human Resources SaaS Training Best Available People Safety HIPAA Programming Government Cleaning Network Congestion Credit Cards Trending Meetings HaaS Education IT Consultant Fax Server Black Market Solid State Drive Applications Humor Infrastructure Saving Time Statistics Streaming Media Analysis Data Storage Internet Exlporer Online Currency Workers Data storage Encryption Biometrics Comparison Windows 7 Sports Business Owner Outlook Printer eWaste OneNote YouTube Flexibility USB Hard Drives Mobile Device Current Events IT Management Servers Work/Life Balance Administration Maintenance Smart Tech IT Plan Running Cable CES Physical Security DDoS Unified Threat Management Robot Data loss Skype Unsupported Software Mobile Office Environment Content Management Update Google Drive Public Cloud Charger Software Tips Virus Virtual Desktop Practices Touchscreen Remote Work Storage LinkedIn Unified Communications HVAC Telephony Touchpad IT service Hybrid Cloud Virtual Reality Blockchain Debate Google Docs Relocation Computer Care Uninterrupted Power Supply Computer Accessories Hosted Computing Addiction Theft Start Menu Domains IaaS PDF Bloatware Staff Spam Blocking Voice over Internet Protocol Audit HBO Cameras Customer Service Inventory Cache Video Surveillance Cortana Mobile Keyboard Consultant Entrepreneur Digital Signature Multi-Factor Security Screen Mirroring Frequently Asked Questions Tech Support Printer Server Access Control Fraud Wireless Internet Hacker Google Apps Professional Services Worker Commute Cost Management Strategy Piracy Computer Fan Lifestyle Cast Tip of the week Shadow IT Authentication Amazon Wire Science Tools User Wireless Files Password Instant Messaging Company Culture Licensing FENG Windows 8.1 Update Samsung Windows Server 2008 Wi-Fi Shortcut Nanotechnology Amazon Web Services Smart Office Twitter Windows 8 Password Manager SharePoint Colocation Accountants Electronic Medical Records Crowdfunding Bluetooth Online Shopping Paperless Office Tablets Business Mangement Botnet Monitor Hosted Solution Computing Infrastructure Notifications Legal Specifications Data Warehousing Regulations Devices Evernote Students Recycling Travel Print Server Reputation Wearable Technology End of Support Windows Media Player Social IoT Millennials NarrowBand Wireless Charging Healthcare Criminal Customers Internet exploMicrosoft Best Practice Social Networking Net Neutrality Hiring/Firing Root Cause Analysis Workforce Thought Leadership Computer Repair Electronic Health Records Flash Chromecast WIndows 7 Fiber-Optic Analyitcs Software as a Service Patch Management Advertising Insurance Telecommuting Content Filter Cables Machine Learning Sync Laptop Managing Stress Settings Scam Distributed Denial of Service Scalability Politics Transportation How to webinar Benefits Loyalty Conferencing Windows 10s Smart Technology Battery Experience Two Factor Authentication Assessment Music Television Troubleshooting Techology Public Computer Employer Employee Relationship Data Breach Automobile Emails Books CrashOverride IBM Webinar Emergency Users Worker Supercomputer Content IT solutions Video Games Rootkit Knowledge Audiobook Netflix