Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Sick of Google’s AI Overviews? Here’s How to Say Goodbye

Tip of the Week: Sick of Google’s AI Overviews? Here’s How to Say Goodbye

Artificial intelligence—AI—is rapidly appearing in more and more contexts, but one most people have almost certainly seen by now is at the top of Google’s search engine results. For those who would rather not see these generated results—which have been found to be occasionally contradictory or outright wrong, depending on the source the AI has drawn from—there are actually a few ways to accomplish this.

Humorously, one of these ways is to precede your search with a particular four-letter curse word, but in case you’re worried about what kind of results that could generate, we’ll go over the other, more safe-for-work options.

How to Remove Google’s AI Overview from Your Results Page

  1. First, you can specify that you want to search in the Web category. This option requires an extra click, but it is the simplest.
  2. You can also add -ai to your search, which will remove the AI-generated options.
  3. Browser extensions are available for Chromium-based browsers (such as Chrome, Edge, Brave, and others) and Firefox. Before installing anything on a work device, make sure your IT professional approves it.

It just goes to show that AI can be extremely helpful, but only when applied mindfully and with purpose.

Really, the same can be said for any technology… which is why we work to ensure the businesses of Western Kentucky have the right tools for their respective jobs. Give us a call at 800.618.9844 to learn more about what we have to offer.

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Productivity Passwords Quick Tips Saving Money Communication Cybersecurity Managed Service Data Backup Smartphone Android Upgrade AI Business Management Smartphones Data Recovery VoIP Disaster Recovery Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Tech Term Current Events Network Remote Internet of Things Automation Facebook Artificial Intelligence Information Training Covid-19 Miscellaneous Gadgets Cloud Computing Holiday Remote Work Server Managed Service Provider Outsourced IT Compliance IT Support Employee/Employer Relationship Spam Encryption Windows 10 Office Data Management Business Continuity Government Windows 10 Business Technology Virtualization Bandwidth Blockchain Wi-Fi Two-factor Authentication Apps Data Security Vendor Mobile Office Mobile Device Management Gmail Tip of the week Chrome Budget Employer-Employee Relationship Apple Networking App Managed Services Voice over Internet Protocol BYOD Access Control Office 365 WiFi Conferencing How To BDR Hacker Avoiding Downtime HIPAA Computing Marketing Applications Information Technology Health Help Desk Analytics Office Tips Augmented Reality Big Data Retail Storage Password Bring Your Own Device 2FA Managed IT Services Computers Healthcare Operating System Website Router Virtual Private Network Risk Management Printer Windows 7 Paperless Office Firewall Microsoft 365 Infrastructure Monitoring Solutions The Internet of Things Document Management Social Telephone Scam Windows 11 Data loss Cooperation Excel Customer Service Going Green Patch Management Save Money Remote Workers Remote Monitoring End of Support Vulnerability Vendor Management Cybercrime Physical Security Free Resource Display Project Management Processor Computer Repair Mobile Security Images 101 Mobility Virtual Desktop Multi-Factor Authentication Data storage LiFi Smart Technology Outlook Safety Machine Learning Money Saving Time Employees Humor Integration Managed IT Service Maintenance Sports Downloads Antivirus Holidays Mouse Licensing Data Storage Entertainment Customer Relationship Management Supply Chain Administration Video Conferencing Managed Services Provider Virtual Machines Professional Services Hacking Robot Telephone System Presentation Cost Management Settings Wireless Technology Wireless Printing iPhone Content Filtering IT Management YouTube Meetings VPN Vulnerabilities Data Privacy Cryptocurrency User Tip Modem Word IT Assessment Google Docs IT Maintenance Unified Communications Database Experience Running Cable Tech Support IT Technicians Flexibility Value Business Intelligence Bitcoin Network Management Refrigeration Google Wallet Proxy Server Public Speaking Shortcuts Cookies Monitors Cyber Monday Organization Digital Security Cameras Smart Devices Lithium-ion battery Ransmoware Tactics Hotspot Laptop Websites Mirgation Entrepreneur Remote Working Memory Vendors Windows 8 Data Breach Drones Google Play Be Proactive Nanotechnology Videos Electronic Health Records SharePoint Workforce Addiction Electronic Medical Records Language Halloween Chatbots Wasting Time Threats Management Undo Trend Micro Lenovo Security Cameras Workplace Strategies Screen Reader Writing Distributed Denial of Service Software as a Service Meta Service Level Agreement Virtual Reality Computing Infrastructure Scary Stories Private Cloud Identity Managing Costs Amazon Hacks Server Management eCommerce Superfish Bookmark SSID Identity Theft Smart Tech Fun Surveillance Virtual Assistant Outsource IT Deep Learning Download Application Twitter Alerts Media Error Virtual Machine Environment Browsers IBM Medical IT Education Connectivity Social Engineering Break Fix Reviews Development Transportation Small Businesses Upload Remote Computing Multi-Factor Security Hypervisor Displays Mobile Computing Social Network Optimization PowerPoint Tablet IoT Search Dark Web Shopping Employer/Employee Relationships Outsourcing Best Practice Trends Alert Navigation Buisness File Sharing Regulations Dark Data Google Calendar PCI DSS Managed IT Customer Resource management Competition Legal Data Analysis Workplace IT solutions Star Wars How To Microsoft Excel Gig Economy Internet Service Provider Teamwork Hiring/Firing Business Growth Gamification Notifications Staff Evernote Paperless Travel Social Networking Legislation Regulations Compliance Memes Techology Fileless Malware Co-managed IT Google Maps User Cortana Net Neutrality SQL Server Technology Care Alt Codes Content Wearable Technology Business Communications Downtime Unified Threat Management Motherboard Comparison Financial Data History Health IT IT Unified Threat Management Directions IP Address Scams Hosted Solution Assessment Permissions Smartwatch Procurement Azure Hybrid Work Typing Tech Human Resources Network Congestion Specifications Telework Cyber security Communitications Google Drive User Error Microchip Cables Internet Exlporer Recovery Knowledge Fraud CES Supply Chain Management Username Hard Drives Domains Term Google Apps Point of Sale 5G Black Friday FinTech

Blog Archive