Contact us today!
561-795-2000 
844-795-2001

FRS Pros Blog

FRS Pros has been serving the United States area since over a Decade, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Work Commands for Google Home

Tip of the Week: Work Commands for Google Home

Does your organization leverage any of Google’s plethora of services or applications to achieve success? Google Assistant can also be a great asset for your organization as it can connect to your smart devices and speakers to create an extremely valuable tool. This week’s tip will discuss some of the best features of Google Assistant and how it can affect your professional environment.

Simple Automation
Productivity is the primary goal of just about any office, and Google Home can help reach this goal through some basic automation. The device itself actually serves several purposes in your office, but only through integrations with other devices and services does it reach its true potential.

A big example of this is your office thermostat or light switch. These devices can adjust your office’s environment when they receive a command from your Google devices. This provides a lot of control over your office’s environment that you might not have otherwise because you lost the remote control to your air conditioning unit, or you have to get up and turn the light off manually. Instead, you just say, “Hey Google, turn off the lights in the conference room,” or “Hey Google, set temperature to 73 degrees.” This allows you to continue being productive seamlessly without interrupting your workday.

More Advanced Automation
One example of a web service that integrates very well with Google Home devices is If This Then That, commonly referred to as IFTTT. This can automate your organization’s functions to a certain degree. Through IFTTT, you can connect your Google Home device (or whichever device you’re using) and customize the trigger for which command you want to use. These triggers will be activated by your voice, but there are some variations that you can try. Once you have assigned your commands, click Create Trigger, then click through “that.”

You can also search through any available channels that you can trigger with your Google Assistant, select the desired one, and fill in the necessary configurations. Once you’ve finished this process, your device will be all set for automation.

Activating More Commands
Your Google Home devices can also do a lot of other commands that you might find useful in the business setting--particularly those that require multiple devices to be effective. One example is if your office is large and you can’t get ahold of someone through messaging or a phone call. You can use your Google Home device to work like an intercom to page the employee. This function uses the “broadcast” feature of Google Home to replay whatever message you want to any Home devices connected to the account.

A Google Home device can follow commands from more than just yourself, though. In fact, multiple users can be connected to it, totaling up to six accounts with potential connectivity. The device can even customize potential answers based on who’s accessing the device.

If you allow visitors in your office, they can also take advantage of Google Home via Guest mode. They can connect to the device without connecting to the Wi-Fi. You can thus keep your wireless credentials to yourself without handing them out to any stranger visiting your office.

Do you have an interesting way that you take advantage of Google Home? If so, let us know in the comments.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, June 18 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Internet Business Management Network Security Business Computing Cloud Google Software Cybersecurity Malware Hosted Solutions Hackers User Tips Tech Term Windows Microsoft Hardware Computer Cybercrime Data Backup Android Mobile Devices Data Recovery Apps Smartphone Innovation Browser Data Security Operating System Productivity Law Enforcement Vulnerability Alert Phishing Outsourced IT Ransomware Backup Business Continuity Office 365 Email Internet of Things IT Support Business Efficiency Smartphones Server Disaster Recovery Best Practice Chrome Mobile Device Management Saving Money Money IT Support Tech Support Managed Service Provider Managed IT Employer-Employee Relationship Unsupported Software Google Drive Communications Windows 10 Spam Microsoft Office Cloud Computing Data Two-factor Authentication Virtualization VoIP Telephone Systems Gadgets Small Business App Windows 10 Computers IT Services Information Technology Collaboration Network Politics Productivity Social Media Data Protection BDR Google Docs Automation Facebook Router Commerce Quick Tips Hacking Gmail Avoiding Downtime Blockchain Mobile Security Save Money Proactive IT Risk Management Data Storage Robot OneNote Cortana Wi-Fi Miscellaneous Data Management Update VPN Patch Management Audit Sports iPhone Wireless Charging Shortcut Devices Managed IT Services Cost Management Applications Password Data Breach Application WannaCry Hosted Solution Safety Excel Fraud Holiday Upgrade Google Assistant Artificial Intelligence User Error WiFi Managed IT Services Wireless Technology Government The Internet of Things Conferencing Unified Threat Management Data Theft Access Workers Solid State Drive Adobe Data storage Project Management Root Cause Analysis Computing Gifts Upgrades Reputation Computer Forensics Internet Exlporer IT Management Updates Hard Disk Drive Licensing Microsoft Excel IT budget Augmented Reality App store Credit Cards Legal Transportation Settings Management IT Solutions Microsoft Word Travel Encryption File Sharing Mobility Consultant Going Green PowerPoint DDoS Maintenance Tablets Storage Disaster Social Engineering Budget Social Identity FAQ Touchscreen Wireless Internet WIndows Server 2008 eWaste iOS NFL Identities Streaming Media Data Privacy Screen Mirroring Charger Identity Theft Gamification Device Security Word Meetings Legislation Language Chromecast Hard Drive Cast Emails Vendor Management Remote Computing Memory Telephony Outlook Computer Fan Windows Ink Comparison History Health Chromebook BYOD Marketing Samsung Financial Uninterrupted Power Supply Spyware Google Maps Specifications Antivirus Laptop Wireless Virus Search Printing Webinar Apple Remote Monitoring Sales SaaS Touchpad Files Private Cloud Proactive Recovery Evernote Emergency IT solutions Sync Point of Sale Edge Retail Humor Websites Administrator Value HBO Networking Windows 10s Computer Care Passwords Ciminal Lithium-ion battery Nanotechnology Data Loss Cleaning Twitter USB Office Experience Video Games Worker Virtual Reality Scam Crowdsourcing Phone System Users Employer Employee Relationship Music Flexibility Save Time Instant Messaging Computer Accessories Advertising CrashOverride Television Communication Analytics Scalability Hacker Mobile Device HaaS Relocation Big Data Keyboard Managing Stress Thank You Workplace Tips Personal Information Books How To Education PDF Congratulations Work/Life Balance Mobile Computing Electronic Medical Records Current Events Hiring/Firing Text Messaging Cache es Benefits Battery Training Office tips Monitors Smart Technology Company Culture Entertainment End of Support Black Market Automobile