Female Rep1

 

 "99% Positive Customer Satisfaction Rate"

Have IT Questions?
Call us now (888) 894-6411

Blog

TWINTEL Solutions has been serving the Orange County, Los Angeles County, Riverside County, and San Diego County, areas. Since 2005, TWINTEL has provided IT Support such as technical help desk support, computer support, and overall IT consulting to small and medium-sized businesses.

Tip of the Week: Working from Google Home

Tip of the Week: Working from Google Home

It is no secret that Google can serve a great utility in the office through its many services and applications. However, have you ever considered how the Google Assistant can, well, assist you through devices like your smartphone and the assorted smart speakers that Google has produced? For today’s tip, we’ll review how some of the features of the Google Assistant can lend you a hand in the professional environment.

Basic Automation
Since productivity is one of the top goals in almost any office, it only makes sense to first focus on how using Google Home can boost your productivity through automation. While the device can serve many purposes on its own, it truly blossoms as a productivity tool through integrations with other devices and services.

For example, if you have equipped your office with smart lights or smart thermostats, you can adjust your office’s environment simply by telling Google to make the change you want. As a result, you can take greater control over your business environment without interrupting your productivity. After all, doesn’t it take much less time and effort to simply say, “Hey Google, turn off the lights in the conference room,” or “Hey Google, set temperature to 73 degrees,” than it would to interrupt what you were doing and go manually make the same changes?

More Advanced Automation (Kind Of)
If you’re at all familiar with the web service IFTTT, you can integrate it with your Google Home device to automate a variety of outcomes, based on predetermined triggers. It’s right in IFTTT’s name: If This, Then That.

Using IFTTT, you can connect your Google Home (or whichever Google device you’re using) to design your own commands that require the use of the Google Home. All you have to do is set “this” to be the Google Assistant, and choose the trigger you want your command to use. These triggers will all be of the spoken word variety, and each command can feature a few different variations. Once you’ve assigned the words to the command, click Create Trigger. To add the desired action you want automated, click through “that.”

You can then search through the available channels that you can trigger through your Google Assistant, select the one you want, and fill in the required configuration fields. Once you hit finish, your automated action will be active and ready to go when you are.

Activating More Commands
The Google Home devices have other utilities baked in that can be of some use to you in an office setting, especially if multiple devices are in use.

For instance, if your office is large and you can’t get ahold of someone through message or phone call, your Google Home device can function as an intercom. By accessing the Assistant on your smartphone, you can command the Google Home to “broadcast” and it will replay whatever message you speak into it afterwards to any Home devices connected to your account.

Of course, the Google Home devices are receptive to commands from multiple users, with up to six accounts being able to use the devices in their own way. The Google Home will even customize their answers based on the user making the request through its Voice Match training.

Finally, if a visitor to the office has something to share over the Google Home, the Guest mode allows them to connect directly to the device, without needing to connect to Wi-Fi. This means that you can keep your Wi-Fi password to yourself, and not give it out to every visitor to your office.

How else can you think of to use the Google Home to augment your day-to-day activities in the office? Share your ideas in the comments!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, June 23 2018
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

QR-Code

Our 10 Benefits

Our 10 Benefits Whitepaper

This whitepaper will evaluate the differences between traditional technical support practices and modern managed IT practices and the pros and cons of both in regards to small and medium-sized businesses.

Download Now!   Need A Consultation?

Tag Cloud

Security Tip of the Week Best Practices Cloud Privacy Technology Business Computing Backup Network Security Hackers Malware Hosted Solutions Microsoft Google VoIP Software bgc roundup nonprofit Disaster Recovery Managed IT Services Email Alert Business Business Continuity Mobile Devices Internet Outsourced IT Data Windows 10 Smartphones communications Ransomware Saving Money Hardware Android Browser IT Services Cybercrime Innovation Managed IT Services Computer Computers Small Business Efficiency IT Support Server Productivity Internet of Things Cloud Computing Office Data Backup Smartphone Business Management Data Recovery BYOD Windows Passwords User Tips Tech Term Mobile Device Management Cybersecurity Quick Tips Money Telephone Systems Social Engineering BDR Recovery Managed IT Mobility Communication Work/Life Balance Collaboration Productivity Hacking Phishing Network Virtualization Vulnerability Law Enforcement Artificial Intelligence Upgrade Save Money Avoiding Downtime Holiday Health Two-factor Authentication Office 365 Social Media Private Cloud Facebook Bandwidth How To Firewall Office Tips Chrome Automation App Managed Service Provider Wi-Fi Remote Monitoring VPN Proactive IT Miscellaneous Bring Your Own Device Budget Data Protection Flexibility IT Support Operating System Black Market Apps Data Security Windows 10 Workplace Tips Applications Information Technology Gadgets History Router Compliance Mobile Device Connectivity Data Breach Safety Identity Theft Password Redundancy Business Intelligence Word Microsoft Office Google Drive Remote Computing HaaS Value Entertainment Data Management SaaS End of Support Comparison YouTube Battery Servers Workers Big Data Update OneNote PDF Solid State Drive The Internet of Things Risk Management Legal Charger Spam Electronic Medical Records Data Storage Sports Website Employer-Employee Relationship Mobile Computing Keyboard Spam Blocking Physical Security IT Management Content Filtering Hiring/Firing Wireless Technology Cleaning IT Plan Emergency CES Business Owner Data storage Computer Care Patch Management Content Management Document Management Credit Cards Government Samsung HIPAA Computing Infrastructure Marketing Scam Save Time Windows 7 Unsupported Software Automobile Worker USB Infrastructure Software Tips Knowledge Benefits Staff Amazon Web Services Cache iPhone Rootkit Going Green Troubleshooting Password Manager Software as a Service FENG Network Congestion Smart Technology Digital Signature Online Shopping Wireless Internet Training Business Mangement Scalability Advertising Specifications Hard Drives HBO Downtime Two Factor Authentication Encryption Education Evernote Flash Wire Reputation Vendor Management Screen Mirroring Assessment Books Gmail WiFi Millennials Outlook IT Consultant Relocation Robot Accountants Wireless Charging Sync Smart Office Settings Files Customers Cast Television Laptop Hosted Solution Recycling Instant Messaging Google Docs CrashOverride Workforce Nanotechnology Leadership Humor Users Politics Content Fiber-Optic Best Practice Telephony Paperless Office Public Computer Touchpad eWaste Search Meetings Telecommuting Frequently Asked Questions Smart Tech NarrowBand Practices Virtual Reality Cables Skype Machine Learning Unified Threat Management Criminal How to Voice over Internet Protocol Data loss Worker Commute Remote Work Excel Hosted Computing Experience Unified Communications Video Games Start Menu HVAC Windows 10s User Error Wireless Multi-Factor Security Tip of the week Devices webinar Employer Employee Relationship Inventory Theft Tools Public Cloud Colocation IBM Trending Techology Windows Server 2008 Thought Leadership Conferencing Monitor Computer Accessories Access Control Cortana Data Warehousing Supercomputer Blockchain Shadow IT Lifestyle Fraud Twitter Netflix Bluetooth Chromecast Authentication Google Apps Mobile Audit Hacker Current Events Transportation Human Resources Audiobook Amazon Regulations Addiction Apple Loyalty Professional Services Computer Fan Internet Exlporer Thank You Congratulations Networking nonprofits Enterprise Content Management Password Management NIST