k_Street Consulting, LLC Blog

Tip of the Week: Enabling Smart Compose on Gmail for Android

Tip of the Week: Enabling Smart Compose on Gmail for Android

As we have opened our lives to technologies like machine learning and artificial intelligence, it would seem that the beneficial predictions made in science fiction are more likely to become fact. Many of these technologies have actually manifested in some of the smallest, but most useful, ways. For this week’s tip, we’ll learn how to leverage Gmail’s predictive Smart Compose feature on Android.

Those familiar with the online version of Gmail will find all of this quite familiar, as Smart Compose has been predicting their next words for some time now. It will seem newer to those more familiar with the Gmail application in macOS and Windows, as it hasn’t been available there until now.

Using Smart Compose on Android Devices

The first thing you’ll have to have in order to use Smart Compose is an active Google account, with the latest version of the Gmail application installed on your chosen device. As you type, Smart Compose will present its predictive text suggestions that a user can either accept, or just keep typing to ignore. While this form of machine learning is pretty basic, it does demonstrate how a device can “learn” how a user is most likely to use it - in this case, what word is likely to come next in the user’s sentence.

Turning Smart Compose Off (and On Again)

Of course, some users may find these suggestions inconvenient or distracting. That’s totally fair, and means that these users should deactivate the Smart Compose feature. Access the Gmail app’s menu by pressing the hamburger icon at the top left. You should see your Settings from there. You will be asked to choose from the accounts that have access to your device. Once you’ve selected the appropriate account, look under General settings to find Smart Compose. Use the toggle switch to activate it or deactivate it as you please.

While Smart Compose may not be quite as impressive as the artificial intelligence that appears in feature films, it has one major advantage over them: it can actually be used to benefit your business. For other ways that you can give your business operations a boost through technology solutions and tips, subscribe to our blog! You can also reach out to us directly by calling (202) 640-2737.

Shrug Off Downtime with Managed IT Services
Use These Best Practices to Create Secure Password...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, July 21 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Router HIPAA Specifications Cables HaaS Bandwidth Search Microsoft Comparison OLED Holiday Millennials Public Cloud Backup and Disaster Recovery Scalability Business Technology Gaming Console Website Point of Sale Remote Maintenance Technology Audit Hard Drive Save Time Password Management Employer-Employee Relationship Value Windows 8 Safety PowerPoint Meetings Cortana Big data Analyitcs Administrator Proactive Maintenance Alert Artificial Intelligence Customer Relationship Management Productivity Computer Bluetooth Law Enforcement Data Warehousing Server IT solutions Environment Electronic Health Records Communication Wearable Technology Search Engine Monitor Advertising Voice over Internet Protocol Google Search Mobile Devices Telephone System Mobile Device Students Worker Commute Hard Drives Settings Efficiency Tablet ROI Utility Computing Social Engineering Access Control Cleaning Windows Server 2008 R2 Television Bloatware Touchpad Data Security Outlook Identity Theft Computer Care Enterprise Content Management Upgrade Chrome IaaS Wireless Charging Storage Flash Hiring/Firing BDR Security Cameras Professional Services analytics Data Protection Small Business Telephony Start Menu Hybrid Cloud Statistics Flexibility Streaming Media Credit Cards Disaster Recovery Cybersecurity Fraud Workplace Tips Netflix Memory Compliance Consultant Browser Best Practice Politics Books Employer Employee Relationship Charger Outsourced IT Business Humor IT Solutions Data loss Printer Server Telephone Systems Restore Data Amazon Mobile Tech Support Administration Data Backup Update Save Money IT Plan malware Amazon Web Services Security Intranet iphone Business Intelligence Excel Two-factor Authentication Marketing Help Desk Hosted Computing Staff Customer Service Virtual Reality Computer Repair Hosted Solution Backup SharePoint Logistics Lithium-ion battery travel Servers IBM Microchip Nanotechnology Windows 10 Audiobook Criminal Google Telecommuting Digital Payment Collaboration Office Transportation Wireless Technology Digital Signature Wi-Fi Fiber-Optic Cache Notifications Read Worker Managed IT Services MSP Employee/Employer Relationship Recycling Data Storage Automation Budget Recovery Human Resources Sync Windows Software Tips Shadow IT Database Machine Learning Two Factor Authentication Managed Service Provider Spam Social Networking Healthcare Infrastructure How To USB Word Processor Benefits Quick Tips Electronic Medical Records CrashOverride Rootkit Going Green Wireless Internet User Data storage Robot People Shortcuts webinar Software as a Service Biometric Security Science User Error NIST Smartphones Connectivity HBO Privacy Remote Computing Users Network Congestion Insurance Line of Business Antivirus Cabling Analysis Training Smart Technology Internet exploMicrosoft Office 365 Entrepreneur Unified Communications Video Games Password Remote Work Workforce Microsoft Office Strategy Tip of the week Google Apps Private Cloud Tools Bing Assessment Computer Fan Root Cause Analysis Miscellaneous Content Management Manufacturing Emails Programming Smart Tech Supercomputer Firewall Application Instant Messaging Default App Digital Signage avoiding downtime Unified Threat Management Blockchain Addiction Experience Virtual Assistant PDF Regulation Customers Hacker Evernote Physical Security eWaste Work/Life Balance Phone System Smartphone Cast Regulations Troubleshooting Virus User Tips VoIP Gmail Loyalty Safe Mode Cameras Government Unsupported Software Reputation Screen Mirroring Domains HVAC Cryptomining Ransomware Theft Hardware Tablets Windows 10 Hosted Solutions Internet of Things Apple Display Operating Systems Operating System Smart Office Saving Money Entertainment Chromecast Inventory Emergency Paperless Office Net Neutrality YouTube VPN Business Mangement eCommerce File Sharing Warranty IT Management Keyboard Botnet Employee Business Management Uninterrupted Power Supply Money Mobile Office Business Owner Running Cable Productivity Phishing Scam Risk Management Project Management Wire Congratulations Tech Term Legal Remote Worker Lifestyle SaaS Network Pain Points Current Events LinkedIn Cryptocurrency End of Support Fax Server Printer Analytic Managed IT Proactive E-Commerce History Knowledge Battery How to Internet Exlporer Music GDPR Virtualization Software Hackers Shortcut Spam Blocking Computers Applications Accountants Content Filter Maintenance Webinar Leadership Mobile Computing Managed Services Provider Wireless Managed Service Information Technology Data Management OneNote Mobility Google Drive Hacking Touchscreen Password Manager Redundancy Google Docs Computer Accessories Cloud Files Virtual Desktop Skype WIndows 7 Online Shopping Devices Saving Time Workers Samsung Twitter File Versioning IT Infrastructure Apps Vulnerability Social Media Passwords App Sports Authentication Company Culture Network Security Email Smartwatch IT Support Trending Wiring Online Currency Bring Your Own Device Data IT service Thought Leadership Managed IT Services Public Computer Windows 7 IoT Conferencing Gadgets Augmented Reality Networking Hring/Firing BYOD Investment Remote Monitoring Distribution Windows Server 2008 The Internet of Things NarrowBand Solid State Drive Windows Media Player Information Business Computing Practices Biometrics Data Recovery Android Cost Management Mouse Patch Management CES Content Black Market Internet DDoS Multiple Versions Cybercrime WiFi IT Consultant Archive Windows 10s Office Tips Business Continuity Printers IT Support Best Practices Downtime Frequently Asked Questions Social 5G Cloud Computing ISP Tip of the Week communications Colocation Health Relocation Best Available Content Filtering Data Breach Vendor Management Product Reviews Innovation Retail Multi-Factor Security Techology Proactive IT Automobile Education Laptop Document Management Virtual Private Network Camera Vendor Facebook Distributed Denial of Service Thank You FENG Remote Monitoring and Maintenance IT Services Computing Infrastructure Encryption Managing Stress Mobile Device Management

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *