facebook linkedin twitter

Computerware Blog

Tip of the Week: Google Lens Makes a Handy Productivity Tool

Tip of the Week: Google Lens Makes a Handy Productivity Tool

While Google Lens has flown under the radar for most Android users, it can be leveraged as a major productivity booster. Let’s go over a few of the capabilities that can be embraced after installing the application on your mobile device for this week’s tip.

What is Google Lens, Anyways?

Google Lens is essentially a tool that allows you to digitally interact with real-life elements by combining your device’s live camera and stored images with artificially intelligent capabilities. By analyzing the contents of an image, Lens can identify an object or location and provide information about it.

In other words, you can take a picture of something, and Google will try to give you relevant information about it.

However, this is just the start of its utility. Its abilities can also make many work-related tasks much more efficient for a user. Here are some of Lens’ useful functions that can make work processes that much simpler to complete.

First, you’ll need to download Google Lens from the Google Play Store.

Copy and Share Real-World Text

Most everyone who uses the computer is familiar with the copy-paste functionality when it comes to digital content. Google Lens can do the same with text that your camera is pointed towards. Whether it is a physical document, a billboard, a whiteboard, or anything else with printed words, Google Lens can capture the text. With the ability to grab exactly what you need just as though you were selecting text from a website, you can copy it by selecting Copy from the panel at the bottom of the screen.

From there, you can even share the copied text to any computer that the Google account is currently logged in on. By selecting from the list of available devices, the text will then be added to your device’s clipboard, ready for your use.

Collect Contact Information from a Business Card

It probably says a lot about us that we find typing contact information into our mobile devices to be a pain, but that doesn’t make it any less of one. Fortunately, Lens can do this automatically. From the Lens app, just point your camera at the business card and tap your display where the person’s name pops up. Alternatively, you can also take a photo of the card and then access it from the Lens app at your convenience.

From there, Google Lens will again make its contextual suggestions, including sending an email or SMS, navigating to a website, or placing a good old-fashioned phone call.

Easy Calendar Event

Adding Calendar events can be just as much of a hassle as adding a new contact, so it only makes sense for Google Lens to address that issue as well. Whether an event’s information is on a flyer, appointment card, or what have you, you can use Lens to quickly add it to your calendar application of choice. Using its AI, Lens should give you its Create calendar event option first in its list of suggestions, making the entire process much simpler.

We’ve only started to touch on Google Lens’ capabilities, so once you download the app from the Play Store, make sure you explore it fully. If you’ve already started using Google Lens, tell us what you think in the comments!

Improving Organizational Cybersecurity
Gadgets Every Remote Worker Can Use


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, October 31, 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.cwit.com/

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Business Computing Privacy Internet Software Cloud Data Hackers Business Management Hardware Workplace Tips Microsoft Network Security Productivity Backup Business Managed Service Provider Hosted Solutions Email Productivity IT Services Malware Saving Money Efficiency Google Innovation Small Business User Tips Collaboration Computer IT Support VoIP Data Backup Quick Tips Network IT Support Smartphones Mobile Devices communications Data Recovery Business Continuity Gadgets Microsoft Office Disaster Recovery Android Social Media Cybersecurity Upgrade Smartphone Phishing Mobile Office Communication Server Virtualization Miscellaneous Mobile Device Management Mobile Device Passwords Ransomware Users Windows Vendor Management Operating System Holiday Windows 10 Tech Term BDR Outsourced IT Internet of Things Managed IT Services Apps Facebook Unified Threat Management Remote Monitoring Automation BYOD Apple Mobile Computing Data Management Analytics WiFi Remote Computing Managed IT services Windows 10 Training The Internet of Things History Cloud Computing Browser Artificial Intelligence Marketing Save Money Covid-19 Help Desk Business Technology Firewall Encryption Big data Spam Health Alert App Information Technology Managed Service Office 365 Budget IT Consultant Two-factor Authentication Bandwidth Office Content Filtering Maintenance Printer Going Green Access Control Bring Your Own Device Hard Drives Antivirus Gmail Windows 7 VPN Information Managed IT Blockchain Government Cybercrime Retail Wi-Fi Best Practice Lithium-ion Battery Remote Work Networking Cost Management Tech Support Virus Document Management Hiring/Firing Wireless Technology Saving Time Search Computers Recovery Windows 8 Outlook Employer-Employee Relationship Healthcare iPhone Update Humor Project Management Hacking IBM Augmented Reality Money Conferencing Computing Phone System Customer Service Data Security It Management Storage Travel Data Loss Education Risk Management Laptop Data Breach Password Value Legal Applications Hacker Save Time Customer Relationship Management Downtime Regulations Vendor PowerPoint File Sharing Hard Drive SaaS Proactive IT Computer Repair Running Cable Administration Current Events Mobility Law Enforcement Wireless Solid State Drive Patch Management Website Twitter Compliance Intranet Avoiding Downtime Data storage Voice over Internet Protocol Flexibility Cryptocurrency Word Telephony Net Neutrality Machine Learning Business Growth Cortana Business Intelligence Telephone Systems Digital Excel Employee/Employer Relationship Chrome Websites Digital Payment Cooperation Router Paperless Office Software as a Service Comparison Tablet Sports User Disaster Company Culture Google Maps Hosted Solution Monitoring End of Support Virtual Desktop Social Networking Robot Social Securty Social Engineering DDoS Management Vulnerabilities Meetings Private Cloud Black Market Scam Fax Server Redundancy Managed Services Provider Memory Pain Points Google Docs eWaste Experience How To Microchip Taxes Evernote Cleaning Virtual Assistant Managed Services Distributed Denial of Service Monitors Managed IT Service Distribution Office Tips Public Cloud Licensing Start Menu Tech Terms Processors YouTube Mobile Technology USB Computer Accessories Unified Communications Settings Presentation Gaming Console Processor Cost Identity Theft Trending Uninterrupted Power Supply Notifications Vulnerability Specifications Safety Text Messaging Webcam Mouse Bitcoin Virtual Reality Solutions Politics Smart Devices Employees Statistics Automobile Co-managed IT Data Protection Documents Professional Services Programming User Error Emails IT service Multi-factor Authentication Entertainment Network Congestion Chromebook Teamwork Heating/Cooling Video Conferencing Telephone Computing Infrastructure Hack Downloads Integration How To Inbound Marketing Bluetooth Streaming Media Download Lifestyle Books Workers Work/Life Balance Tip of the week Internet Service Provider Domains Term Product Reviews Nanotechnology Social Network Administrator Deep Learning Google Calendar AI Electronic Medical Records Transportation Desktop Finance Touchscreen News IT Assessment Public Speaking Directions Display Startup Asset Tracking VoIP Regulations Compliance Recording Optimization Business Cards Read Service Level Agreement Best Practives Supercomputer Visible Light Communication Dark Web Free Resource Username Worker Knowledge Remote Working SSID Unified Threat Management Backup and Disaster Recovery IT consulting Consultation Shortcut Reading Samsung Troubleshooting Processing Screen Reader Customer Resource management Microserver Technology Tips Supply Chains Entrepreneur Health IT Device Management Gamification Advertising Flash Fake News Electronic Health Records HIPAA Upselling Wasting Time Business Managemenet Smart Tech G Suite CIO Audit Financial Data Environment Logistics Virtual Machines Content Management Piracy Upload Employer Employee Relationship Bookmark HTML Staffing Google Wallet Electronic Payment Video Surveillance Cyber security Fiber-Optic Database Hacks Get More Done Physical Security Windows XP Data Warehousing Memes Competition Relocation Printer Server Tablets Society Emergency Hard Drive Disposal Managing IT Services Business Owner Google Play Telephone Service Telephone System Banking Botnet Turn Key Access Displays 2FA Saving ZTime Employer/Employee Relationships online Currency Mobile Security Microsoft Excel Surveillance IP Address Managing Costs Multi-Factor Security Sync Micrsooft Computer Care Telework Microsoft 365 Software License Trends Trojan Application Harddrive Browsers LinkedIn Devices Organize Drones Remote Workers Human Resources Debate Medical IT Trend Micro Fraud Tactics CCTV Google Drive Windows Server 2008 IT UTM Content Reliable Computing Virtual Private Network GPS Security Cameras Threats Business Metrics Computer Malfunction Spyware Mobile Payment Remote User Tip Proactive Maintenance Permissions Language Development Navigation Virtual Machine Skype Legislation Error In Internet of Things Electricity Printing FinTech External Harddrive Archive IT Plan Enterprise Resource Planning Digital Signature Data Analysis Accountants A.I. Data Storage eCommerce email scam Addiction Scalability Webinar Music Procurement 3D Ebay GDPR Managing Risk Point of Contact Motion Sickness switches cache Writing Television Thin CLient Printers SQL Server Tech Hypervisor Wireless Headphones WannaCry Upgrades Organization Smart Phones Migration Connected Devices Messenger Tracking Freedom of Information Communitications Fileless Malware Hybrid Cloud Equifax Fleet Tracking Corporate Profile PCI DSS PDF Holidays Network Management Rental Service LiFi Time Management Recycling Device security MSP Cabling Supply Chain Management Adminstration Pirating Information Modem Strategy Analytic Web Server Assessment SharePoint Best Available Keyboard Leadership Proxy Server Azure CrashOverride 3D Printing Capital Personal Information Managing Stress Productuvuty Financial Regulation Reviews