ct logo wslogan

3 minutes reading time (608 words)

Tip of the Week: Working from Google Home

Tip of the Week: Working from Google Home

It is no secret that Google can serve a great utility in the office through its many services and applications. However, have you ever considered how the Google Assistant can, well, assist you through devices like your smartphone and the assorted smart speakers that Google has produced? For today’s tip, we’ll review how some of the features of the Google Assistant can lend you a hand in the professional environment.

Basic Automation
Since productivity is one of the top goals in almost any office, it only makes sense to first focus on how using Google Home can boost your productivity through automation. While the device can serve many purposes on its own, it truly blossoms as a productivity tool through integrations with other devices and services.

For example, if you have equipped your office with smart lights or smart thermostats, you can adjust your office’s environment simply by telling Google to make the change you want. As a result, you can take greater control over your business environment without interrupting your productivity. After all, doesn’t it take much less time and effort to simply say, “Hey Google, turn off the lights in the conference room,” or “Hey Google, set temperature to 73 degrees,” than it would to interrupt what you were doing and go manually make the same changes?

More Advanced Automation (Kind Of)
If you’re at all familiar with the web service IFTTT, you can integrate it with your Google Home device to automate a variety of outcomes, based on predetermined triggers. It’s right in IFTTT’s name: If This, Then That.

Using IFTTT, you can connect your Google Home (or whichever Google device you’re using) to design your own commands that require the use of the Google Home. All you have to do is set “this” to be the Google Assistant, and choose the trigger you want your command to use. These triggers will all be of the spoken word variety, and each command can feature a few different variations. Once you’ve assigned the words to the command, click Create Trigger. To add the desired action you want automated, click through “that.”

You can then search through the available channels that you can trigger through your Google Assistant, select the one you want, and fill in the required configuration fields. Once you hit finish, your automated action will be active and ready to go when you are.

Activating More Commands
The Google Home devices have other utilities baked in that can be of some use to you in an office setting, especially if multiple devices are in use.

For instance, if your office is large and you can’t get ahold of someone through message or phone call, your Google Home device can function as an intercom. By accessing the Assistant on your smartphone, you can command the Google Home to “broadcast” and it will replay whatever message you speak into it afterwards to any Home devices connected to your account.

Of course, the Google Home devices are receptive to commands from multiple users, with up to six accounts being able to use the devices in their own way. The Google Home will even customize their answers based on the user making the request through its Voice Match training.

Finally, if a visitor to the office has something to share over the Google Home, the Guest mode allows them to connect directly to the device, without needing to connect to Wi-Fi. This means that you can keep your Wi-Fi password to yourself, and not give it out to every visitor to your office.

How else can you think of to use the Google Home to augment your day-to-day activities in the office? Share your ideas in the comments!



Already Registered? Login Here
No comments made yet. Be the first to submit a comment

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Google Cloud Business Computing Hackers Innovation Microsoft Tech Term Backup Malware Internet Hardware Email Data Network Security Data Backup Cybercrime Small Business VoIP Smartphones Android Mobile Devices Efficiency Software Ransomware User Tips Windows Business Cloud Computing Computers Gadgets Business Management Managed IT Services Network How To Browser Cybersecurity Smartphone Data Recovery Internet of Things Router Outsourced IT Hosted Solutions Law Enforcement Collaboration Social Engineering Social Media Miscellaneous Communications Upgrade Chrome Computer Automation Business Continuity Productivity Mobile Device Management Money Communication Artificial Intelligence Safety IT Services Windows 10 Data Security Vulnerability Two-factor Authentication Office 365 Bandwidth Saving Money Operating System Facebook Managed IT Services Telephone Systems Server Data Protection Alert Disaster Recovery Phishing BDR Passwords Save Money App Bring Your Own Device Data Breach Spam Connectivity Applications Word IT Support Identity Theft Microsoft Office Recovery Remote Monitoring IT Management Business Intelligence Private Cloud Virtualization The Internet of Things Managed IT Government Downtime Apps VPN Google Drive Windows 7 OneNote Update IT Plan Public Cloud Infrastructure CES Unsupported Software Internet Exlporer Quick Tips Information Content Management Redundancy Password Avoiding Downtime Cleaning Comparison Spam Blocking Paperless Office Website Blockchain Sports BYOD Gmail Data Storage Data storage Productivity YouTube Wi-Fi Windows 10 Physical Security Networking Password Management Conferencing Big Data Windows Server 2008 Devices eWaste Knowledge Mobile Device Shadow IT Outlook Access Control File Sharing Samsung Electronic Medical Records Workers Holiday Human Resources User Error Accountants Telephony Evernote Wire IBM Criminal Health NIST Emails Credit Cards Thought Leadership Chromecast Network Congestion HBO Millennials Humor Authentication Augmented Reality Value Solid State Drive Botnet Flexibility Uninterrupted Power Supply Going Green Multi-Factor Security Staff Robot Settings Skype Wireless Charging Smart Office Supercomputer Data loss Cryptocurrency Flash Fraud Reputation Servers IT Consultant Frequently Asked Questions Workforce Hybrid Cloud Nanotechnology Audit Data Management Hiring/Firing NarrowBand Travel Password Manager Laptop Apple Screen Mirroring Office Tips Trending End of Support Practices Start Menu Cortana Document Management Budget Google Docs Files Safe Mode Patch Management Amazon Customer Addiction Root Cause Analysis DDoS HVAC Software Tips Workplace Tips USB Excel Telecommuting Monitor PDF Smart Tech Computer Fan Automobile Wireless Technology Business Mangement Touchpad iPhone Cast Legal Internet exploMicrosoft Hosted Computing Managed Service Charger Tools Google Apps Office Black Market History Digital Signature Virtual Assistant Netflix Scam Sync Amazon Web Services Hacking Marketing Cache Managed Service Provider Enterprise Content Management webinar Tip of the week Remote Work FENG Work/Life Balance Recycling Current Events Keyboard Tech Support Specifications Advertising Inventory MSP Computer Care Windows 10s Employer-Employee Relationship Relocation Machine Learning HaaS Entertainment Voice over Internet Protocol HIPAA Encryption Telephone System Online Shopping Wireless Internet Meetings Assessment Company Culture Experience Users IT Support Compliance Rootkit Benefits Books Television Managing Stress Video Games Music Virtual Reality Save Time Regulation Training Battery Firewall Remote Computing WiFi Webinar Emergency Wireless Twitter Public Computer CrashOverride Scalability Wearable Technology Remote Worker Loyalty Worker Commute Mobility Risk Management Vendor Management Education Smart Technology Bluetooth IT solutions Search Content Thank You Wiring SaaS Employer Employee Relationship Politics Computing Infrastructure Two Factor Authentication Audiobook How to Techology Instant Messaging Congratulations Troubleshooting Information Technology Computer Accessories Best Practice Worker Transportation