facebook linkedin twitter

Computerware Blog

Tip of the Week: Leveraging Gmail’s Smart Compose Feature on Android

Tip of the Week: Leveraging Gmail’s Smart Compose Feature on Android

With technologies like machine learning and artificial intelligence entering further into our daily lives, what was once science fiction is becoming fact - assisting our lives (which most would agree is better than threatening our lives). For this week’s tip, we’ll show you how to leverage machine learning in a very basic way: in the Android version of Gmail’s Smart Compose feature.

For users of Gmail’s online platform, this is nothing new. These users have already been using the predictive capabilities of Smart Compose to cobble together their sentences based off Google’s calculation of what will be typed next. However, this feature has now been included in the Gmail app.

How to Use Smart Compose on an Android Device

In order to use Smart Compose, you’ll obviously need an active Google account. You will also need the updated version of the Gmail app installed on your device. Once Smart Compose has been activated, the emails you write will begin to display predictive text suggestions that you can swipe across to accept - or just keep typing to ignore. Again, this is a relatively minor example of what machine learning can do, but one that can have an impact on you each and every day.

How to Toggle Smart Compose On and Off

In the Gmail application on your Android device, access the menu via the hamburger icon in the top left. From there, access your Settings. Once you have selected the account you want to activate (or deactivate) your Smart Compose suggestions on, find Smart Compose under General settings. From there, you can toggle your Smart Controls as you see fit.

While it may not be quite as impressive as the artificial intelligence that can be seen in the movies, Smart Compose is one example of how machine learning can be leveraged to your business’ advantage. Reach out to us to learn other ways that your business can be improved through time-saving technology tips, or to find out more about the solutions we offer. Call (703) 821-8200 today.

Phishing Attacks and How to Avoid Them
Protect Your Reputation with Solid Network Securit...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, May 22, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Computing Software Business Management Hackers Data Microsoft Backup Workplace Tips Managed Service Provider Hardware Productivity Network Security Email Business Hosted Solutions Saving Money Malware IT Services Efficiency IT Support Google User Tips Small Business Computer Innovation Smartphones Mobile Devices Quick Tips Business Continuity Gadgets Social Media Network Microsoft Office Productivity Android Disaster Recovery VoIP Data Backup Mobile Office Server Virtualization Collaboration Communication Data Recovery Smartphone Upgrade IT Support Mobile Device Management communications Miscellaneous Phishing Tech Term Ransomware Cybersecurity Windows 10 Facebook Unified Threat Management Windows Holiday Passwords Apps Remote Monitoring Operating System Vendor Management Analytics Automation Mobile Computing BYOD Remote Computing Managed IT services Mobile Device BDR Users WiFi Marketing Outsourced IT Internet of Things The Internet of Things Apple Data Management Artificial Intelligence Firewall History Alert Browser Save Money App Managed IT Services Big data Encryption Cloud Computing IT Consultant Office Bring Your Own Device Help Desk Two-factor Authentication Gmail Antivirus Maintenance Spam Bandwidth Printer Windows 10 Health Content Filtering Going Green Office 365 Budget Business Technology Windows 8 Outlook Wireless Technology Training Search Cybercrime Virus Hiring/Firing Tech Support Managed IT Hard Drives Cost Management Lithium-ion Battery Saving Time Best Practice Information Technology Education It Management Update Blockchain Customer Service Recovery Employer-Employee Relationship Money Document Management Hacking Computers Healthcare VPN Access Control Phone System Networking IBM Travel Applications Regulations Augmented Reality PowerPoint Managed Service Risk Management SaaS Administration Save Time Government Website Law Enforcement Humor File Sharing Compliance Hard Drive Information Data storage Password iPhone Mobility Proactive IT Running Cable Legal Intranet Twitter Private Cloud Customer Relationship Management Data Security User Paperless Office Telephony Patch Management Social Sports Machine Learning Wireless Disaster Data Loss Computing Fax Server Telephone Systems DDoS Hosted Solution Scam End of Support Business Intelligence Robot Digital Payment Router Downtime Securty Data Breach Project Management Word Avoiding Downtime Comparison Tablet Digital Retail Solid State Drive Company Culture Websites Google Maps Management Cortana Black Market Value Flexibility Computer Repair Social Engineering Social Networking Vulnerabilities Cryptocurrency Laptop Hacker Business Growth Excel Current Events Bitcoin Office Tips Co-managed IT Presentation User Error Download Data Protection Streaming Media Windows 7 Virtual Desktop YouTube Distribution Gaming Console Specifications Safety Microchip Taxes Unified Communications Settings Documents Webcam Net Neutrality Voice over Internet Protocol Conferencing Lifestyle Distributed Denial of Service Text Messaging Chrome Heating/Cooling Entertainment Redundancy Public Cloud Storage Monitoring IT service Computer Accessories Identity Theft Evernote Inbound Marketing Virtual Assistant eWaste Trending Bluetooth Politics Mouse Start Menu Tech Terms Cooperation Virtual Reality Emails Pain Points Automobile Vendor Mobile Technology Programming Software as a Service Google Docs Statistics Chromebook Processors Experience Uninterrupted Power Supply Computing Infrastructure Hack Network Congestion Cleaning Vulnerability USB Monitors How To Web Server Video Surveillance Navigation CIO Username Cabling Electricity Printing Solutions IP Address Unified Threat Management Backup and Disaster Recovery Advertising Flash Human Resources Staffing Gamification Google Wallet Webinar Books Saving ZTime Workers Recycling Professional Services Application Screen Reader Windows XP Customer Resource management Wi-Fi Administrator Analytic Data Analysis Piracy Upload Society Supercomputer GDPR Smart Tech Displays Product Reviews cache Television Debate Read Tech HTML Micrsooft Harddrive Worker WannaCry Downloads Integration Fiber-Optic Database Fileless Malware Freedom of Information Mobile Security Drones Reading Samsung Corporate Profile Digital Signature Telephone System GPS Time Management Software License Trends External Harddrive Employer Employee Relationship Device Management Modem Teamwork Multi-Factor Security Cost G Suite Assessment Proxy Server SharePoint Hacks Physical Security Content Management Term Tip of the week Devices Licensing Business Managemenet Electronic Medical Records Google Calendar Transportation Fraud Tactics Permissions Language Best Practives Touchscreen Directions News PDF UTM Content Relocation Thin CLient Tablets VoIP Recording Banking 3D Botnet Ebay IT Plan Enterprise Resource Planning Music Smart Phones online Currency Knowledge SSID Best Available Keyboard Legislation switches Error Writing Microserver Sync Consultation Dark Web Notifications CCTV Processing Accountants A.I. Upgrades Health IT Technology Tips Employee/Employer Relationship Domains email scam Addiction Managed IT Service Fake News Multi-factor Authentication Reliable Computing Leadership LinkedIn Audit Logistics Public Speaking LiFi Get More Done Business Metrics Adminstration Computer Malfunction Pirating Information Migration Connected Devices Printer Server Shortcut Wireless Headphones Telephone Turn Key In Internet of Things Bookmark Data Warehousing Work/Life Balance Trojan Archive Emergency Google Play Hard Drive Disposal Entrepreneur Equifax Fleet Tracking Deep Learning Skype Access Troubleshooting Network Management Processor Microsoft Excel Environment Device security MSP Organize Scalability Computer Care Microsoft 365 HIPAA Visible Light Communication Memory Motion Sickness Electronic Payment Desktop Finance Messenger Tracking Medical IT Competition Nanotechnology IT consulting Social Network Point of Contact Google Drive Browsers Windows Server 2008 Service Level Agreement Rental Service Meetings Security Cameras Startup Asset Tracking Upselling Spyware User Tip Mobile Payment Business Owner Business Cards Printers Managing Stress Regulation CrashOverride Capital Productuvuty 3D Printing