Contact us today!

Network Solutions Unlimited Blog

Google Duplex Can Make Calls for You, and More

Google Duplex Can Make Calls for You, and More

At Google I/O 2018, the latest occurrence of Google’s convention for developers, a stunning new technology was demonstrated to those in attendance. Called Google Duplex, it adds a new level of utility and capability to the Google Assistant, in that it enables the Google Assistant to make phone calls on the user’s behalf that are almost indistinguishable from human conversation.

If this sounds incredible, the general consensus agrees with you. During its unveiling at I/O, the demonstration of Google Duplex brought various reactions from the crowd as the Google Assistant called to schedule a hair appointment and to make a reservation at a restaurant. More than just that, too - the Assistant’s requested time for the haircut was unavailable, so it needed to independently agree upon a different time, and there was a language barrier affecting the conversation as it tried to make a reservation, but it still navigated the conversation successfully… arguably, more successfully than many people would.

This, in and of itself, is enough to make Google Duplex a huge leap forward for its kind of technology, but that wasn’t all Google had to demonstrate. Not only could Google Duplex intelligently carry on conversations that didn’t always go as planned, it could navigate these conversations while using a natural, human voice, using filler words like “um” and “uh” naturally, casually confirming things with “mhmm” rather than “yes” or even “okay.” Google Duplex could even deal with interruptions while reciting information like phone numbers, picking up where it left off and repeating itself, just as a human would over the phone.

Clearly, this makes the Google Assistant much more useful to its users, but what about those that don’t use it, and only refer to the web version of Google?

Well, Google Duplex takes the information it gathers from its calls and will update a business’ page based on the information it gathers. So, if Google Duplex calls a business looking for its hours on Thursdays, the answer it receives will be used to update the results online. This even includes holidays.

Some outlets have voiced concerns, however, that there is no indication given that the recipient of the phone call is speaking to an automated assistant. What do you think? Have you seen any of the videos demonstrating these capabilities? Let us know in the comments!

How to Compose a Successful Business Continuity Pl...
Getting to Know Technology: RAM


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, January 22 2019

Captcha Image

Mobile? Grab this Article!


Tag Cloud

Video Games Students Accessory Automation Hacking Data storage Meetings Data Theft App Camera Worker Phone System Avoiding Downtime Payroll Saving Money VoIP Credit Cards Communication Computer Care Touchscreen Office Tips Office Data Security Customer FAQ Encryption Marketing Professional Services Best Practice Bluetooth Advertising Wi-Fi Content Filtering Hard Drive Worker Commute Security Cast Tech Term Facebook Privacy Virtualization Budget Windows 10s User Error Disaster Recovery Charger Keyboard Application Public Cloud Server Holiday Computing Infrastructure Managed IT Services NFL Identity Webinar Company Culture Upgrades Transportation Samsung Dark Web Android Alexa for Business Assessment Safety OneNote Malware HBO Benefits Mobile Devices Networking Office 365 Business Continuity Value Gamification Internet exploMicrosoft HaaS Chrome Data Storage WiFi Evernote Emails Loyalty Spyware Search Business Management Software Employer Employee Relationship Microsoft Maintenance Managed Service Gadgets Spam Blocking Computer Forensics Language The Internet of Things Sports Mobility Health Telephone IT Support Vendor Management Gmail Small Business Business Intelligence Apple IT Support Wireless Word Sales Spam Ransomware Display USB Virus Commerce Miscellaneous Screen Mirroring Human Resources Mobile Device Firewall Managing Stress Hardware Cortana Innovation HIPAA Law Enforcement Hiring/Firing Cloud Vendor Edge Cybersecurity Cost Management Thank You File Sharing Passwords Employee-Employer Relationship Data Protection Downtime Twitter Legal Nanotechnology Public Computer Software as a Service Browser How To Analysis Machine Learning Troubleshooting Users Redundancy Black Market App store Financial Wireless Technology Management Hosted Solutions Internet Retail Wireless Charging Flexibility Computer Wasting Time Files IT Services Cybercrime Co-Managed Services Password WIndows Server 2008 Windows 10 Chromecast Chromebook Outlook Reputation Adobe Managed IT Two Factor Authentication Shortcut Business Owner Government Rootkit BYOD PowerPoint intranet Regulation Router Proactive IT IoT Bring Your Own Device Communications Access Control Data User Tips Proactive Remote Computing Identity Theft IT Management Artificial Intelligence Congratulations Going Green Television Laptop Google Drive Updates Best Practices Internet of Things Computer Accessories Data Loss Education Printing Unified Communications Humor Physical Security Content Specifications Information Root Cause Analysis Utility Computing Mobile Streaming Media Productivity Google Assistant Employer-Employee Relationship VPN Collaboration Monitors iOS Financial Technology Bandwidth Social Engineering Colocation Scam Google Docs Network Memory Managed IT Services Battery Smartphones Outsourced IT Business Identities Audiobook Admin Windows 7 Recovery Legislation Risk Management Big Data Saving Time Upgrade Device Security Settings Administration Relocation Data Privacy Projects Security Cameras Lifestyle Windows Ink Content Filter Hyperlink Update Remote Workers Scalability Automobile Travel Operating System Instant Messaging How to Email Hard Disk Drive Amazon Touchpad Comparison Monitor Testing hacker Paperless Office Compliance Managed IT Service Information Technology Private Cloud Cleaning Cloud Computing Hybrid Cloud Two-factor Authentication Phishing CrashOverride Excel Data Recovery Hackers Storage Conferencing Printers Tablets Project Management IT budget Windows Smartphone Business Computing iPhone Workplace Tips MSP Save Time Audit Augmented Reality Google Maps File Storage SMB Document Management Efficiency Techology Money Peripheral Applications Unsupported Software Antivirus Smart Technology Electronic Medical Records Shadow IT Fraud Wasting Money Network Security Monitoring Alert Wireless Internet Mobile Security Microsoft Excel Computer Fan Cache Quick Tips Keyboard Shortcuts Ciminal Windows 10 Politics Experience Tip of the Week Tech Support Save Money Training Entertainment Robot BDR Books Virtual Assistant Microsoft Office Data Backup Blockchain End of Support Managed Service Provider Solid State Drive Work/Life Balance Personal Information Productivity Technology Licensing Google Unified Threat Management Telephone Systems Apps Vulnerability WannaCry Social Media Gifts Hosted Solution IT solutions eWaste Backup IT Solutions IT Service Consultant PDF Workers Mobile Device Management Emergency Websites Business Technology Smart Tech Computing History Sync SaaS Virtual Private Network WPA3 Remote Monitoring Microsoft Word Patch Management Connectivity Computers Internet Exlporer Virtual Reality Data Management Hard Drives Devices Data Breach