facebook linkedin twitter

Computerware Blog

Tip of the Week: Leveraging Gmail’s Smart Compose Feature on Android

Tip of the Week: Leveraging Gmail’s Smart Compose Feature on Android

With technologies like machine learning and artificial intelligence entering further into our daily lives, what was once science fiction is becoming fact - assisting our lives (which most would agree is better than threatening our lives). For this week’s tip, we’ll show you how to leverage machine learning in a very basic way: in the Android version of Gmail’s Smart Compose feature.

For users of Gmail’s online platform, this is nothing new. These users have already been using the predictive capabilities of Smart Compose to cobble together their sentences based off Google’s calculation of what will be typed next. However, this feature has now been included in the Gmail app.

How to Use Smart Compose on an Android Device

In order to use Smart Compose, you’ll obviously need an active Google account. You will also need the updated version of the Gmail app installed on your device. Once Smart Compose has been activated, the emails you write will begin to display predictive text suggestions that you can swipe across to accept - or just keep typing to ignore. Again, this is a relatively minor example of what machine learning can do, but one that can have an impact on you each and every day.

How to Toggle Smart Compose On and Off

In the Gmail application on your Android device, access the menu via the hamburger icon in the top left. From there, access your Settings. Once you have selected the account you want to activate (or deactivate) your Smart Compose suggestions on, find Smart Compose under General settings. From there, you can toggle your Smart Controls as you see fit.

While it may not be quite as impressive as the artificial intelligence that can be seen in the movies, Smart Compose is one example of how machine learning can be leveraged to your business’ advantage. Reach out to us to learn other ways that your business can be improved through time-saving technology tips, or to find out more about the solutions we offer. Call (703) 821-8200 today.

Phishing Attacks and How to Avoid Them
Protect Your Reputation with Solid Network Securit...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, May 27, 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.cwit.com/

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Business Computing Internet Cloud Software Business Management Data Hackers Hardware Microsoft Network Security Workplace Tips Backup Managed Service Provider Hosted Solutions Business Productivity Email Productivity Malware IT Services Saving Money Efficiency Google Computer User Tips Small Business Innovation IT Support Collaboration IT Support Smartphones Data Backup VoIP Quick Tips Network Mobile Devices communications Business Continuity Microsoft Office Gadgets Social Media Data Recovery Android Cybersecurity Disaster Recovery Upgrade Mobile Office Server Communication Smartphone Virtualization Miscellaneous Phishing Mobile Device Management Vendor Management Holiday Ransomware Windows 10 Passwords Operating System Tech Term Outsourced IT Windows Mobile Device Remote Monitoring Apps Managed IT Services Internet of Things Facebook Unified Threat Management Users BDR Automation Managed IT services Mobile Computing Analytics Data Management BYOD Remote Computing Apple WiFi Windows 10 The Internet of Things History Cloud Computing Marketing Artificial Intelligence Save Money Training Firewall Browser Encryption Big data Help Desk App Alert Business Technology Health Spam IT Consultant Office 365 Two-factor Authentication Bandwidth Office Information Technology Cybercrime Bring Your Own Device Antivirus Hard Drives Budget Access Control Content Filtering Gmail Maintenance Government Managed IT Printer Going Green Windows 7 Employer-Employee Relationship Retail Information Cost Management Wireless Technology Healthcare Search Hiring/Firing Windows 8 Outlook Saving Time Computers VPN Managed Service Best Practice Lithium-ion Battery Tech Support Recovery Virus Augmented Reality Blockchain Data Loss Networking Phone System Hacking Money Document Management Project Management Computing Customer Service iPhone Travel Humor Education IBM It Management Update Customer Relationship Management Risk Management Flexibility Patch Management PowerPoint Value Save Time Password File Sharing Downtime Legal Data Breach Current Events Administration Hacker Hard Drive Regulations Mobility Computer Repair Running Cable Proactive IT Avoiding Downtime SaaS Covid-19 Applications Twitter Intranet Wireless Law Enforcement Conferencing Compliance Storage Website Solid State Drive Data Security Data storage Monitoring Black Market Telephone Systems Net Neutrality Word Cryptocurrency Business Intelligence Laptop Management Digital Payment Cortana Business Growth Scam Router Vulnerabilities Voice over Internet Protocol Comparison Tablet Google Maps Digital Remote Work Company Culture Paperless Office Sports Social Engineering Websites Social Networking User Disaster Virtual Desktop End of Support Fax Server Hosted Solution Social Robot Meetings Software as a Service Private Cloud Cooperation Securty Vendor DDoS Wi-Fi Telephony Excel Machine Learning Distributed Denial of Service Downloads Google Docs Gaming Console Memory Public Cloud Licensing Professional Services Chrome eWaste Multi-factor Authentication Experience Monitors Text Messaging Cleaning Redundancy Identity Theft Webcam Telephone Integration Office Tips Computer Accessories Co-managed IT Evernote User Error Processors Trending USB YouTube Politics Managed Services Provider Virtual Assistant Virtual Reality Emails Presentation Unified Communications Settings Automobile Mouse Chromebook Inbound Marketing Start Menu Tech Terms Statistics Mobile Technology Lifestyle Managed Services Programming Specifications Safety Computing Infrastructure Hack Employee/Employer Relationship Managed IT Service Network Congestion How To Distribution Uninterrupted Power Supply Download Pain Points IT service Documents Teamwork Heating/Cooling Entertainment Vulnerability Processor Streaming Media Bitcoin Data Protection Smart Devices Microchip Taxes Bluetooth User Tip Proactive Maintenance Best Available Keyboard cache Television Get More Done Procurement Reading Samsung Video Surveillance UTM Content Security Cameras Threats Read Deep Learning WannaCry Video Conferencing Turn Key Employer Employee Relationship IT Plan Enterprise Resource Planning Navigation Virtual Machine Domains Work/Life Balance Printer Server G Suite Saving ZTime Legislation Error Solutions Corporate Profile Communitications Hacks Physical Security email scam Addiction Data Analysis Employees Public Speaking Visible Light Communication Time Management Freedom of Information Trojan Accountants A.I. eCommerce Device Management Harddrive Botnet SQL Server Business Managemenet Shortcut IT consulting Assessment SharePoint Supply Chain Management Relocation Tablets Debate GDPR Managing Risk Content Management Organize Banking Entrepreneur Google Calendar Internet Service Provider GPS Migration Connected Devices Tech Hypervisor Troubleshooting Tip of the week Sync Wireless Headphones CIO VoIP IT Assessment Notifications CCTV Network Management Fileless Malware Hybrid Cloud HIPAA Advertising Flash Touchscreen News External Harddrive Equifax Fleet Tracking Holidays online Currency Environment Business Metrics Computer Malfunction Proxy Server Azure Competition Windows XP Consultation Remote Working Reliable Computing Device security MSP Modem Strategy Electronic Payment Staffing Google Wallet Knowledge LinkedIn Displays Technology Tips 3D Ebay Desktop Finance Term Business Owner Society Webinar In Internet of Things Thin CLient Nanotechnology Electronic Medical Records Social Network Transportation Micrsooft Audit Electronic Health Records Business Cards Service Level Agreement Directions Display IP Address Fake News Smart Phones Startup Asset Tracking Recording Optimization Memes Motion Sickness Unified Threat Management Backup and Disaster Recovery Dark Web Free Resource Skype Application Data Warehousing Scalability Username SSID How To Archive Human Resources Drones Access Managing IT Services Messenger Adminstration Tracking Pirating Information Gamification Processing Emergency Hard Drive Disposal Leadership Screen Reader Health IT Customer Resource management Computer Care Surveillance Rental Service Piracy Upload Wasting Time Point of Contact Permissions Language Microsoft Excel Smart Tech Logistics Virtual Machines IT Web Server Fiber-Optic Database Bookmark Digital Signature Google Drive Windows Server 2008 Best Practives Remote Workers Cabling HTML Cyber security Telephone System Employer/Employee Relationships switches Writing Spyware Mobile Payment Virtual Private Network Books Workers Mobile Security Google Play Telephone Service Music Administrator Recycling Upgrades Electricity Printing Development Microserver Supercomputer Software License Trends Managing Costs Analytic Multi-Factor Security Cost Microsoft 365 Upselling Fraud Tactics Browsers Product Reviews LiFi Worker Devices Medical IT Trend Micro PDF Printers 3D Printing CrashOverride Capital Productuvuty Personal Information Managing Stress Financial Regulation