Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Sick of Google’s AI Overviews? Here’s How to Say Goodbye

Tip of the Week: Sick of Google’s AI Overviews? Here’s How to Say Goodbye

Artificial intelligence—AI—is rapidly appearing in more and more contexts, but one most people have almost certainly seen by now is at the top of Google’s search engine results. For those who would rather not see these generated results—which have been found to be occasionally contradictory or outright wrong, depending on the source the AI has drawn from—there are actually a few ways to accomplish this.

Humorously, one of these ways is to precede your search with a particular four-letter curse word, but in case you’re worried about what kind of results that could generate, we’ll go over the other, more safe-for-work options.

How to Remove Google’s AI Overview from Your Results Page

  1. First, you can specify that you want to search in the Web category. This option requires an extra click, but it is the simplest.
  2. You can also add -ai to your search, which will remove the AI-generated options.
  3. Browser extensions are available for Chromium-based browsers (such as Chrome, Edge, Brave, and others) and Firefox. Before installing anything on a work device, make sure your IT professional approves it.

It just goes to show that AI can be extremely helpful, but only when applied mindfully and with purpose.

Really, the same can be said for any technology… which is why we work to ensure the businesses of Western Kentucky have the right tools for their respective jobs. Give us a call at 800.618.9844 to learn more about what we have to offer.

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Internet Efficiency IT Support Malware Privacy Google Email Phishing Workplace Tips Computer IT Services Hosted Solutions Users Collaboration Mobile Device Ransomware Quick Tips Cybersecurity Small Business Workplace Strategy Microsoft Communication Data Backup Passwords Smartphone Backup Saving Money VoIP Business Management Smartphones Android Upgrade communications Mobile Devices Disaster Recovery Browser Managed Service Data Recovery Managed IT Services Social Media Microsoft Office Windows Network Tech Term Remote Internet of Things Current Events Facebook Automation Productivity Artificial Intelligence Cloud Computing Covid-19 Managed Service Provider Miscellaneous Gadgets Remote Work Server Information Holiday Outsourced IT Encryption AI Spam Employee/Employer Relationship Windows 10 Government Business Continuity Data Management Training Office Compliance Bandwidth Blockchain Windows 10 Virtualization Business Technology Wi-Fi Apps Two-factor Authentication Data Security Mobile Office Budget Mobile Device Management Managed Services Voice over Internet Protocol Vendor Gmail Apple App Employer-Employee Relationship Networking Chrome BYOD Applications WiFi Access Control Tip of the week Computing Conferencing Information Technology Hacker Office 365 How To Avoiding Downtime BDR Marketing Storage Password HIPAA Healthcare Bring Your Own Device Router Virtual Private Network Big Data Health Help Desk Operating System Risk Management Retail Computers Managed IT Services Office Tips Analytics IT Support Website Augmented Reality Patch Management Save Money Remote Monitoring Vulnerability End of Support Remote Workers Firewall Vendor Management Display Printer The Internet of Things Free Resource Project Management Going Green Paperless Office Windows 7 Infrastructure Social Monitoring Microsoft 365 Cybercrime Document Management Solutions Customer Service Telephone Scam Data loss Windows 11 2FA Cooperation Excel Telephone System Virtual Machines Professional Services Robot Cost Management Word Sports Mouse IT Management VPN Meetings iPhone Administration Physical Security Safety User Tip Modem Vulnerabilities Processor Data Privacy Computer Repair Mobile Security Images 101 Multi-Factor Authentication Settings Mobility Printing Smart Technology Wireless Content Filtering Machine Learning Saving Time YouTube Customer Relationship Management Employees Cryptocurrency Integration Managed IT Service Maintenance Hacking Downloads Antivirus Presentation Virtual Desktop Data storage LiFi Licensing Holidays Entertainment Wireless Technology Outlook Data Storage Supply Chain Money Video Conferencing Humor Managed Services Provider Hacks Hard Drives Travel Social Networking Scary Stories Workplace Legislation Gig Economy Techology Fileless Malware Internet Service Provider Domains Google Maps Teamwork Hiring/Firing Fun Wearable Technology Evernote Paperless Regulations Compliance Content Deep Learning Health IT Memes Refrigeration Unified Threat Management Motherboard Co-managed IT Comparison Unified Threat Management Directions Net Neutrality Public Speaking Assessment Education SQL Server Technology Care Permissions Business Communications Financial Data Lithium-ion battery History Smartwatch Mobile Computing IT Scams Entrepreneur Network Congestion Specifications User Error Microchip Procurement Internet Exlporer Azure Hybrid Work Fraud Search Cyber security Tech Human Resources Telework Username Best Practice CES Communitications Undo Point of Sale Buisness Cables Black Friday Legal Supply Chain Management Database IT solutions Tech Support IT Technicians Term Google Apps FinTech Network Management Business Growth Proxy Server IT Assessment Cookies IT Maintenance Monitors Cyber Monday Flexibility Tactics Value Business Intelligence Hotspot Cortana Application Websites Mirgation Shortcuts Organization Alt Codes Digital Security Cameras Smart Devices Nanotechnology Downtime Ransmoware SharePoint Remote Working IBM Addiction Hosted Solution Memory Vendors Electronic Medical Records Language Data Breach Chatbots Google Play Be Proactive Management Typing Videos Lenovo Electronic Health Records Screen Reader Workforce Writing Distributed Denial of Service Google Drive Service Level Agreement Wasting Time Threats Virtual Reality Computing Infrastructure Knowledge Trend Micro Private Cloud Identity Security Cameras Workplace Strategies Server Management Superfish Bookmark Software as a Service Competition Identity Theft Smart Tech Meta 5G Google Docs Download Unified Communications Managing Costs Amazon Twitter Alerts Experience eCommerce Error Running Cable SSID Bitcoin Browsers Google Wallet Surveillance Connectivity Virtual Assistant Outsource IT Social Engineering Break Fix Media Upload Virtual Machine Environment User Remote Computing Windows 8 Laptop Medical IT Multi-Factor Security Reviews Social Network Drones Development Tablet IoT Transportation Small Businesses Dark Web IP Address Trends Hypervisor Displays Alert Managed IT Customer Resource management Optimization File Sharing Regulations Halloween PowerPoint Dark Data Google Calendar Shopping Data Analysis Star Wars Employer/Employee Relationships Outsourcing How To Microsoft Excel Notifications Staff Navigation PCI DSS Gamification Recovery

Blog Archive