Contact us today!
217-428-6449

Network Solutions Unlimited Blog

Tip of the Week: Work Commands for Google Home

Tip of the Week: Work Commands for Google Home

Does your organization leverage any of Google’s plethora of services or applications to achieve success? Google Assistant can also be a great asset for your organization as it can connect to your smart devices and speakers to create an extremely valuable tool. This week’s tip will discuss some of the best features of Google Assistant and how it can affect your professional environment.

Simple Automation
Productivity is the primary goal of just about any office, and Google Home can help reach this goal through some basic automation. The device itself actually serves several purposes in your office, but only through integrations with other devices and services does it reach its true potential.

A big example of this is your office thermostat or light switch. These devices can adjust your office’s environment when they receive a command from your Google devices. This provides a lot of control over your office’s environment that you might not have otherwise because you lost the remote control to your air conditioning unit, or you have to get up and turn the light off manually. Instead, you just say, “Hey Google, turn off the lights in the conference room,” or “Hey Google, set temperature to 73 degrees.” This allows you to continue being productive seamlessly without interrupting your workday.

More Advanced Automation
One example of a web service that integrates very well with Google Home devices is If This Then That, commonly referred to as IFTTT. This can automate your organization’s functions to a certain degree. Through IFTTT, you can connect your Google Home device (or whichever device you’re using) and customize the trigger for which command you want to use. These triggers will be activated by your voice, but there are some variations that you can try. Once you have assigned your commands, click Create Trigger, then click through “that.”

You can also search through any available channels that you can trigger with your Google Assistant, select the desired one, and fill in the necessary configurations. Once you’ve finished this process, your device will be all set for automation.

Activating More Commands
Your Google Home devices can also do a lot of other commands that you might find useful in the business setting--particularly those that require multiple devices to be effective. One example is if your office is large and you can’t get ahold of someone through messaging or a phone call. You can use your Google Home device to work like an intercom to page the employee. This function uses the “broadcast” feature of Google Home to replay whatever message you want to any Home devices connected to the account.

A Google Home device can follow commands from more than just yourself, though. In fact, multiple users can be connected to it, totaling up to six accounts with potential connectivity. The device can even customize potential answers based on who’s accessing the device.

If you allow visitors in your office, they can also take advantage of Google Home via Guest mode. They can connect to the device without connecting to the Wi-Fi. You can thus keep your wireless credentials to yourself without handing them out to any stranger visiting your office.

Do you have an interesting way that you take advantage of Google Home? If so, let us know in the comments.

How to Balance Your IT’s Value Against the Cost
How to Calculate if That Print Job Was Really Wort...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, June 24 2018

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

Flexibility Word Vendor Management Compliance Going Green SaaS Excel Specifications Cloud Computing Hacking Solid State Drive Malware Apps Samsung User Tips Updates Robot Instant Messaging Efficiency Microsoft Retail Microsoft Office Touchscreen Public Computer Edge Keyboard Cast iPhone Search Politics Tablets Virus Benefits Apple Disaster Recovery Facebook Bandwidth Mobility Social Engineering Licensing Internet exploMicrosoft Business Backup Worker Cybercrime Office Tips Innovation Computing Unsupported Software Google Drive IT budget How to Evernote Monitor Video Games Identity Theft Public Cloud Business Owner Cortana Colocation Cleaning Blockchain Connectivity Remote Computing Content Filter Employer-Employee Relationship Gmail Smartphones Humor Audit USB Smart Technology Lifestyle App Training Unified Threat Management Legal Data Breach Virtual Reality Comparison Best Practice Office Computing Infrastructure Hybrid Cloud Computer Forensics Shadow IT Email Websites Data Theft Employer Employee Relationship Identities Small Business WiFi Reputation Scalability Travel Electronic Medical Records Audiobook Streaming Media Sales Privacy Phishing Nanotechnology Administration Education Webinar Work/Life Balance Language Network Security Consultant Transportation Managed IT Services Marketing Content Device Security Wireless Internet Laptop Files Customer Android BYOD Congratulations Proactive IT Commerce Computer Students Ransomware Technology Money BDR Adobe End of Support Printing Internet Exlporer Miscellaneous Downtime IT Support Artificial Intelligence How To Chromebook Mobile Device Management Communications Monitors Proactive Data Backup Operating System Save Money Shortcut IT Support Saving Money Books Twitter Document Management Settings CrashOverride Spam Blocking Managed IT Service Devices Ciminal Managed Service Provider FAQ Computers Social Media Hard Disk Drive Data Storage Internet Automobile Information Technology Tech Support Windows 10s Professional Services Google Maps Cloud eWaste Conferencing Thank You PDF IT solutions Productivity Hackers WannaCry Data Privacy Data Recovery Safety Business Intelligence Dark Web Wi-Fi Windows Content Filtering Business Computing Microsoft Excel Smart Tech Wireless Identity Best Practices OneNote Applications Charger Mobile Security PowerPoint Experience Save Time IT Services Data Loss Regulation HaaS Big Data Spyware Business Management Collaboration Communication Browser Computer Care Patch Management Financial Augmented Reality Two Factor Authentication Managed IT Services Assessment Outsourced IT Software Antivirus Mobile Holiday Black Market Relocation App store Screen Mirroring Advertising Update Analysis Chrome Monitoring User Error Recovery Upgrades Management Emails Mobile Device Bluetooth Gifts Google Assistant Alert Credit Cards Router Government Computer Accessories Hard Drive Google Docs Cost Management Application Hiring/Firing Emergency Battery Managing Stress Users Data Hard Drives Company Culture MSP Rootkit Managed IT File Sharing Financial Technology VPN Memory Windows Ink Hardware Smartphone Root Cause Analysis Risk Management Data Management Maintenance Mobile Devices Bring Your Own Device Legislation Techology Productivity Software as a Service Value Passwords Sync Quick Tips Personal Information intranet Sports Storage Physical Security HBO Business Continuity Encryption Budget Worker Commute Office 365 Remote Monitoring Workplace Tips Gamification Google Microsoft Word Windows 10 History Telephone Systems Tech Term Entertainment Cybersecurity Workers HIPAA Upgrade Phone System IT Solutions Outlook Private Cloud Windows 10 Two-factor Authentication Server Cache Internet of Things Meetings NFL Scam Spam hacker Avoiding Downtime Chromecast WIndows Server 2008 Data Protection Project Management Unified Communications Automation Wireless Charging Vulnerability Television Hosted Solution Redundancy Computer Fan Networking Password IoT The Internet of Things IT Management Data storage Virtualization Health Touchpad Data Security Gadgets Hosted Solutions Loyalty Firewall VoIP Tip of the Week iOS Security Troubleshooting Law Enforcement Fraud Wireless Technology Network