Blog

Tip of the Week: Introducing Google Chrome’s New Actions Feature

Tip of the Week: Introducing Google Chrome’s New Actions Feature

If it is going to remain the most common Internet browser, Google Chrome always needs to have new features added to it to make it the preferable choice for most users. Recently, Chrome Actions was implemented, likely contributing greatly to that goal. Let’s look at what Chrome Actions are, and how they could prove useful.

What Are Chrome Actions?

With Chrome Actions, the Chrome browser has a bit more utility crammed into its address bar (also known as the “omnibar”). In addition to helping users navigate to a webpage or network location, or facilitating a Google search, the omnibar can now accept and carry out a select few basic commands.

For example, if a user types “incognito” into the omnibar, pressing Enter will open a new window in Incognito mode.

Right now, Google has implemented just a few Chrome Actions into their browser:

  • Clear Browsing Data - type ‘delete history’, ‘clear cache ‘ or ‘wipe cookies’
  • Manage Payment Methods - type ‘edit credit card’ or ‘update card info’
  • Open Incognito Window - type ‘launch incognito mode‘ or ‘incognito’
  • Manage Passwords - type ‘edit passwords’ or ‘update credentials’
  • Update Chrome - type ‘update browser’ or ‘update google chrome’
  • Translate Page - type ‘ translate this’ or ‘ translate this page’

With this starting list came the promise of more Chrome Actions coming with future updates to the browser.

Will You Use Chrome Actions?

Tell us why—or why not—in the comments, and don’t forget to subscribe. For more assistance with anything relating to your business’ IT, make sure your first call is to White Mountain IT Services at 603-889-0800.

By accepting you will be accessing a service provided by a third-party external to https://www.whitemtn.com/

Related Posts

Smartphones may have been some of the first Internet-connected mobile devices, but they are still as vulnerable to attack as ever. This is especially true for those who forsake any sort of mobile device security policy. With modern businesses utilizi...
Today’s headlines are dominated by stories of major companies getting hacked, making the average computer user feel uneasy about their security. If you’re solely dependent on a measly password to protect you from hackers, then you’ve got good reason ...
Smartphone technology is currently experiencing cool innovations. Plus, there are some crazy reasons behind what these devices can and can’t do that you may not have known about. Check out these four cool smartphone factoids from List25....
The Internet is a fantastic tool that has ushered in an era of productivity and connectivity that we could only previously have dreamed of. Unfortunately, like every great tool, it can be used for darker, malicious purposes. In the Internet’s case, i...
For all of you who have Windows 10, you probably have realized that it is, without a doubt, one of the most refined versions of the Windows operating system released by Microsoft in recent years. In a way, it takes the best aspects of Windows 7, comb...
When one thinks about The Internet of Things, new and fantastic devices come to mind, like smart homes, smart cars, mobile devices, and more. While innovations like these are fueling the excitement behind the IoT, it’s actually the smaller, behind-th...
When you think of the Internet of Things, does your mind immediately wander into the realm of connected devices that change the way we interact with each other? Or, does it consider the security issues that can potentially become a threat to your ent...
Network security entails a ton of different procedures, and it can be easy to lose track of what you’ve already implemented, and what still needs to be done. Instead of worrying about keeping your business’s confidential data safe, know with certaint...
After a long, hard day at the office, you might be tempted to just log off of your workstation so you can get right back into it the next day. However, you also have the option to shut down the PC, which can be beneficial at times. So, what should yo...
Your business’s operations rely on wireless Internet in order to maintain optimal efficiency, and it’s normal to not want to share this private connection with just any stranger that wanders into your office. However, guests or potential clients that...
The best way to get the most life out of your smartphone is to take care of it. Or, you can ignore proven best practices and witness your smartphone meet its untimely demise. By not taking care of your smartphone in these five ways, you’ll be sure to...
We’ve all been in a situation where a sudden loss of power or a hardware failure would mean the imminent destruction of a file you’ve been working on. When this happens, you might find yourself panicking. When was the last time you saved your work? W...

Onsite Service Coverage Area

Although we provide remote services and support to businesses in over 20 states, onsite services are limited to within reasonable driving distance from our office in NH.  We will manage a local vendor for locations outside of our service area to provide onsite assistance when needed.

 

Onsite Computer Support Services are available to businesses within 100 miles of Nashua New Hampshire. We have excellent onsite coverage from Concord NH, south through Manchester NH, and then down into Boston. From Northern and Central Mass, we cover from Worcester, east to the North Shore, including the Salem and Portsmouth NH area.

 

White Mountain IT Services
33 Main Street, Suite 302
Nashua, New Hampshire 03064

 

603-889-0800

map nashua4 1

 

Open Positions