Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Sick of Google’s AI Overviews? Here’s How to Say Goodbye

Tip of the Week: Sick of Google’s AI Overviews? Here’s How to Say Goodbye

Artificial intelligence—AI—is rapidly appearing in more and more contexts, but one most people have almost certainly seen by now is at the top of Google’s search engine results. For those who would rather not see these generated results—which have been found to be occasionally contradictory or outright wrong, depending on the source the AI has drawn from—there are actually a few ways to accomplish this.

Humorously, one of these ways is to precede your search with a particular four-letter curse word, but in case you’re worried about what kind of results that could generate, we’ll go over the other, more safe-for-work options.

How to Remove Google’s AI Overview from Your Results Page

  1. First, you can specify that you want to search in the Web category. This option requires an extra click, but it is the simplest.
  2. You can also add -ai to your search, which will remove the AI-generated options.
  3. Browser extensions are available for Chromium-based browsers (such as Chrome, Edge, Brave, and others) and Firefox. Before installing anything on a work device, make sure your IT professional approves it.

It just goes to show that AI can be extremely helpful, but only when applied mindfully and with purpose.

Really, the same can be said for any technology… which is why we work to ensure the businesses of Western Kentucky have the right tools for their respective jobs. Give us a call at 800.618.9844 to learn more about what we have to offer.

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Network Security Hardware User Tips Efficiency Internet Malware IT Support Privacy Google Workplace Tips Computer Phishing Email IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Small Business Microsoft Quick Tips Passwords Backup Communication Cybersecurity Saving Money Data Backup Smartphone Managed Service Productivity Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Data Recovery Disaster Recovery Browser Social Media Windows Managed IT Services Microsoft Office AI Current Events Network Tech Term Remote Internet of Things Information Facebook Automation Artificial Intelligence Cloud Computing Holiday Miscellaneous Gadgets Covid-19 Training Server Managed Service Provider Remote Work Outsourced IT Employee/Employer Relationship Encryption Spam Compliance Windows 10 Office IT Support Business Continuity Government Data Management Virtualization Business Technology Wi-Fi Bandwidth Blockchain Windows 10 Vendor Apps Two-factor Authentication Mobile Office Data Security BYOD Apple App Managed Services Employer-Employee Relationship Voice over Internet Protocol Tip of the week Networking Chrome Mobile Device Management Budget Gmail HIPAA WiFi Applications Access Control Computing Information Technology Conferencing Hacker Avoiding Downtime Office 365 Marketing How To BDR Router 2FA Big Data Virtual Private Network Health Operating System Help Desk Healthcare Risk Management Computers Retail Analytics Website Office Tips Managed IT Services Augmented Reality Storage Password Bring Your Own Device Vendor Management The Internet of Things Windows 11 Physical Security Display Printer Social Going Green Excel Paperless Office Infrastructure Monitoring Remote Workers Cybercrime Document Management Customer Service Free Resource Project Management Telephone Scam Windows 7 Data loss Microsoft 365 Cooperation Solutions Firewall Patch Management Save Money Remote Monitoring End of Support Vulnerability Safety IT Management Administration Holidays VPN Meetings Data Storage User Tip Supply Chain Modem Processor Computer Repair Mobile Security Video Conferencing Managed Services Provider Settings Virtual Machines Professional Services Wireless Printing Content Filtering Smart Technology Customer Relationship Management YouTube Machine Learning Cryptocurrency Saving Time iPhone Hacking Presentation Managed IT Service Vulnerabilities Data Privacy Maintenance Virtual Desktop Downloads LiFi Wireless Technology Antivirus Data storage Images 101 Licensing Multi-Factor Authentication Mobility Outlook Entertainment Money Word Humor Robot Employees Telephone System Cost Management Sports Integration Mouse Virtual Assistant Outsource IT Assessment Permissions Mobile Computing Surveillance Unified Threat Management Directions Undo Search Virtual Machine Environment Media Network Congestion Specifications Best Practice Reviews Medical IT Transportation Small Businesses Internet Exlporer Fraud Buisness Development User Error Microchip IT solutions Hypervisor Displays Username Legal Black Friday Business Growth Shopping Optimization PowerPoint Point of Sale Employer/Employee Relationships Outsourcing Database Application PCI DSS Cortana Network Management Navigation Tech Support IT Technicians Cookies Monitors Cyber Monday Alt Codes Gig Economy IBM Proxy Server Workplace Teamwork Hiring/Firing Tactics Hotspot Downtime Internet Service Provider Hosted Solution Regulations Compliance Evernote Paperless Websites Mirgation Nanotechnology Typing Memes Co-managed IT SharePoint SQL Server Technology Care Addiction Electronic Medical Records Language Net Neutrality Financial Data Competition Knowledge History Management Business Communications Chatbots Google Drive Screen Reader Writing Distributed Denial of Service Smartwatch IT Lenovo Scams 5G Azure Hybrid Work Service Level Agreement Virtual Reality Computing Infrastructure Procurement Unified Communications Telework Experience Cyber security Server Management Tech Human Resources Private Cloud Identity Google Docs Identity Theft Smart Tech Bitcoin CES Running Cable Communitications User Superfish Bookmark Cables Download Twitter Alerts Google Wallet Supply Chain Management FinTech Term Google Apps Error Connectivity Social Engineering Break Fix Windows 8 IP Address Laptop IT Assessment Browsers IT Maintenance Value Business Intelligence Upload Remote Computing Drones Flexibility Multi-Factor Security Organization Social Network Shortcuts Tablet IoT Dark Web Digital Security Cameras Halloween Smart Devices Recovery Ransmoware Memory Vendors Trends Alert Remote Working Hard Drives Dark Data Google Calendar Domains Data Breach Managed IT Customer Resource management Google Play Be Proactive File Sharing Regulations Star Wars How To Microsoft Excel Hacks Videos Scary Stories Electronic Health Records Data Analysis Workforce Refrigeration Fun Wasting Time Threats Gamification Notifications Staff Legislation Deep Learning Public Speaking Trend Micro Security Cameras Workplace Strategies Travel Social Networking Google Maps Lithium-ion battery Software as a Service Techology Fileless Malware Meta Managing Costs Amazon Entrepreneur Content Wearable Technology Education Comparison eCommerce Health IT SSID Unified Threat Management Motherboard

Blog Archive