Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Sick of Google’s AI Overviews? Here’s How to Say Goodbye

Tip of the Week: Sick of Google’s AI Overviews? Here’s How to Say Goodbye

Artificial intelligence—AI—is rapidly appearing in more and more contexts, but one most people have almost certainly seen by now is at the top of Google’s search engine results. For those who would rather not see these generated results—which have been found to be occasionally contradictory or outright wrong, depending on the source the AI has drawn from—there are actually a few ways to accomplish this.

Humorously, one of these ways is to precede your search with a particular four-letter curse word, but in case you’re worried about what kind of results that could generate, we’ll go over the other, more safe-for-work options.

How to Remove Google’s AI Overview from Your Results Page

  1. First, you can specify that you want to search in the Web category. This option requires an extra click, but it is the simplest.
  2. You can also add -ai to your search, which will remove the AI-generated options.
  3. Browser extensions are available for Chromium-based browsers (such as Chrome, Edge, Brave, and others) and Firefox. Before installing anything on a work device, make sure your IT professional approves it.

It just goes to show that AI can be extremely helpful, but only when applied mindfully and with purpose.

Really, the same can be said for any technology… which is why we work to ensure the businesses of Western Kentucky have the right tools for their respective jobs. Give us a call at 800.618.9844 to learn more about what we have to offer.

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Business Productivity Software Innovation Hackers Cloud Network Security User Tips Hardware Efficiency Internet Malware IT Support Privacy Google Computer Phishing Email Workplace Tips IT Services Collaboration Hosted Solutions Users Ransomware Workplace Strategy Mobile Device Microsoft Quick Tips Small Business Cybersecurity Passwords Backup Saving Money Communication Data Backup Smartphone Managed Service Android Productivity Upgrade Business Management VoIP Smartphones Mobile Devices communications Disaster Recovery Data Recovery Social Media Windows Browser Microsoft Office Managed IT Services AI Network Current Events Tech Term Remote Internet of Things Automation Artificial Intelligence Facebook Cloud Computing Information Holiday Covid-19 Miscellaneous Gadgets Training Server Managed Service Provider Remote Work Outsourced IT Encryption Spam Compliance Employee/Employer Relationship Office Windows 10 Government IT Support Data Management Business Continuity Blockchain Wi-Fi Business Technology Windows 10 Bandwidth Virtualization Apps Vendor Two-factor Authentication Mobile Office Data Security Employer-Employee Relationship BYOD Managed Services Voice over Internet Protocol Mobile Device Management Tip of the week Chrome Gmail Budget Apple Networking App HIPAA Computing Hacker Applications Information Technology Avoiding Downtime Access Control Marketing Office 365 Conferencing WiFi How To BDR 2FA Operating System Computers Router Risk Management Healthcare Virtual Private Network Website Health Help Desk Analytics Office Tips Augmented Reality Retail Storage Password Bring Your Own Device Big Data Managed IT Services Going Green Patch Management Save Money Remote Monitoring End of Support Excel Vulnerability Customer Service Vendor Management Cybercrime Remote Workers Physical Security Display Printer Paperless Office Infrastructure Free Resource Monitoring Project Management Windows 7 Firewall Document Management Microsoft 365 Solutions Telephone The Internet of Things Scam Data loss Social Cooperation Windows 11 Data Storage Robot Telephone System Supply Chain Customer Relationship Management Cost Management Video Conferencing Settings Wireless Managed Services Provider Printing Professional Services Content Filtering Virtual Machines Hacking IT Management YouTube Meetings Presentation VPN Cryptocurrency Modem Wireless Technology User Tip iPhone Processor Computer Repair Mobile Security Virtual Desktop Vulnerabilities Data storage LiFi Data Privacy Word Smart Technology Outlook Images 101 Machine Learning Money Saving Time Multi-Factor Authentication Mobility Humor Managed IT Service Safety Maintenance Sports Downloads Antivirus Mouse Employees Integration Licensing Entertainment Administration Holidays Travel Social Networking Legislation Hypervisor Displays PowerPoint Techology Fileless Malware Google Maps Shopping Cortana Optimization Employer/Employee Relationships Outsourcing Alt Codes Content Wearable Technology Downtime Unified Threat Management Motherboard PCI DSS Comparison Navigation Competition Health IT Workplace Unified Threat Management Directions Hosted Solution Assessment Gig Economy Permissions Internet Service Provider Teamwork Hiring/Firing Typing Regulations Compliance Network Congestion Specifications Evernote Paperless Co-managed IT Google Drive User Error Microchip User Internet Exlporer Knowledge Fraud Memes Net Neutrality SQL Server Technology Care Username Point of Sale Financial Data 5G Black Friday History Business Communications Scams IP Address Google Docs Unified Communications Database Smartwatch Experience IT Procurement Azure Hybrid Work Bitcoin Network Management Running Cable Tech Support IT Technicians Cookies Telework Monitors Cyber Monday Cyber security Tech Human Resources Google Wallet Proxy Server Cables Recovery Tactics CES Hotspot Communitications Supply Chain Management Hard Drives Windows 8 Laptop Websites Mirgation Drones Nanotechnology FinTech Term Google Apps Domains IT Maintenance SharePoint Addiction Electronic Medical Records Language IT Assessment Halloween Chatbots Flexibility Value Business Intelligence Refrigeration Management Public Speaking Lenovo Screen Reader Organization Writing Distributed Denial of Service Shortcuts Ransmoware Lithium-ion battery Service Level Agreement Digital Security Cameras Virtual Reality Computing Infrastructure Smart Devices Entrepreneur Scary Stories Private Cloud Identity Remote Working Memory Vendors Hacks Server Management Superfish Bookmark Identity Theft Smart Tech Fun Data Breach Google Play Be Proactive Workforce Deep Learning Download Videos Twitter Alerts Electronic Health Records Error Wasting Time Threats Undo Browsers Education Connectivity Social Engineering Break Fix Trend Micro Security Cameras Workplace Strategies Software as a Service Meta Upload Remote Computing Multi-Factor Security Managing Costs Amazon Mobile Computing Social Network SSID Tablet IoT Search Dark Web eCommerce Surveillance Virtual Assistant Outsource IT Application Best Practice Trends Alert Buisness File Sharing Regulations Dark Data Google Calendar Virtual Machine Environment Media Managed IT Customer Resource management Medical IT IBM Legal Data Analysis IT solutions Star Wars Reviews How To Microsoft Excel Development Transportation Small Businesses Business Growth Gamification Notifications Staff

Blog Archive