Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Take Advantage of Notepad’s Text-to-Audio Feature

computer_that_talks_400.jpgSome people talk to their computers, but not like they would speak to another human being. We coax it into doing it what we want, or we curse it out when it doesn’t. A day may come when artificial intelligence has progressed so far that we won’t be able to distinguish a computerized conversation from a normal one; but it is not this day. Until that glorious day comes, we’ll have to settle for these two methods to interact verbally with your PC.

My Notepad Sure Has a Big Mouth
We bet you didn’t know that the Windows Operating System has a tool installed on its Notepad that allows it to convert text to audio. However, this feature isn’t available without a little tinkering on your part. It requires a bit of programming, but infusing life into your Notepad is as easy as copying some text and slapping it on the page.

It’s Alive!
First, you want to open Notepad. Copy and paste this text into Notepad:

Dim msg, sapi
msg=InputBox("Enter your text for Conversation | Tool by Irshad (http://pctricksonline.blogspot.com)","PC Hacks Text-To-Audio Converter")
Set sapi=CreateObject("sapi.spvoice")
sapi.Speak msg

Go to File > Save As, and make sure that the file type reads text_audio.vbs. Afterward, close the note and open the text_audio.vbs file. A magic little box will appear on your screen. Type your text into the box and pat yourself on the back; you’ve just breathed life into an inanimate object (sort of). Fun things to type into this include, but are not limited to, “Help! I’ve been turned into a computer,” “Look at me. I’m a computer programmer,” and “Kneel before me, humans!”

That’s Not What I Said
If you don’t want to try your hand at programming Notepad to breathe life into your PC, you could always try using Google Voice Search. This is a standard Google Chrome feature, and is very easy to use. You simply go to Google’s homepage and click on the microphone icon to the right of the Google search bar. Then, you speak into your microphone and Google will search for it. The more the app is used, the more accurate it becomes. You might want to consider turning Safe Search on if you are afraid of what you might accidentally search for. You never know what you might find on the Internet.

“Smart” Phones
For those who want a simpler experience, there are always the apps offered for smartphones. Apple offers Siri for iOS, and Android has Google Now. It’s better than the magic 8-ball, we suppose, and you shouldn’t get too bored talking to them. Just remember, nothing is better than actual human interaction.

These technologies are just a taste of what’s to come over the next few years. Technology advancement is growing at an alarming rate, so keep your eyes peeled for other great interactive programs. What are your favorite interactive apps, and why? Share it with us in the comments!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 23 November 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Business Google Network Security Microsoft Internet Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices Hardware IT Services Android VoIP Disaster Recovery communications Business Continuity Smartphones Communication IT Support Smartphone Miscellaneous Mobile Device Small Business Network Browser Productivity Collaboration Quick Tips Cybersecurity Business Management Users Windows Upgrade Phishing Managed IT Services Outsourced IT Ransomware Data Backup Windows 10 Office Cloud Computing Server Save Money Data Recovery Windows 10 Passwords Saving Money Holiday Tech Term Chrome Gadgets Social Media Virtualization Managed Service Managed IT Services Microsoft Office Automation Operating System Facebook Artificial Intelligence Computers Cybercrime BYOD Mobile Device Management Networking IT Support Hacking Internet of Things Wi-Fi Health Covid-19 Information Spam Office 365 Managed Service Provider Telephone Systems Remote Information Technology Alert Bandwidth Router BDR Social Engineering Mobility Employer-Employee Relationship Recovery Money Application Encryption Remote Monitoring Applications Big Data App Law Enforcement History Data Breach Human Resources Password Mobile Computing Apps Remote Computing Mobile Office How To Government Data Storage Office Tips Patch Management Training Private Cloud VPN Managed IT Blockchain Paperless Office IT solutions Two-factor Authentication Entertainment Website Budget Data Security Mouse HaaS Infrastructure Voice over Internet Protocol Google Drive Avoiding Downtime Wireless Vulnerability Windows 7 Word Gmail Flexibility Settings Bring Your Own Device Servers Marketing Data Management WiFi Work/Life Balance Machine Learning Virtual Reality Apple Remote Work Connectivity End of Support USB Social Employee/Employer Relationship Education Physical Security RMM Safety User Error Sports Meetings HIPAA Redundancy Keyboard Risk Management Data Protection Hacker Conferencing The Internet of Things Scam Lithium-ion battery Save Time Vendor Vendor Management Firewall Managed Services Cleaning Telephone System Staff Software as a Service Display Printer Charger SaaS Bluetooth Processor Compliance Update OneNote Computer Care Battery Shadow IT Hard Drive Network Congestion Current Events Legal Telephony eWaste Google Docs Identity Theft Samsung IT Consultant Internet Exlporer Computing Value PDF Humor Spam Blocking Electronic Medical Records Augmented Reality Wearable Technology Fraud Retail Hard Drives Proactive IT Instant Messaging Digital Signage Robot Hiring/Firing Excel Remote Worker Best Practice Cryptocurrency YouTube Biometrics Virtual Desktop Black Market Procurement Comparison Net Neutrality Workplace Strategy DDoS Business Intelligence Document Management Solid State Drive Wireless Technology CES SharePoint Help Desk Audit Virus Worker How to Downtime Printing IT Management Business Technology Content Management Unified Threat Management Customer Service Computer Accessories Data storage Access Control Botnet Managed Services Provider IT Plan Environment Automobile Virtual Assistant Database Fax Server Authentication Computing Infrastructure Unsupported Software Going Green Remote Workers Streaming Media Telecommuting Manufacturing Tablet Project Management Email Best Practices Reputation Nanotechnology IT Assessment Tech Support Cortana Software Tips Domains Supercomputer Content Techology Computer Tips Laptop Digital Signature Managed IT Service Sync Security Cameras Emails IaaS Biometric Security Maintenance Printer Server Warranty Virtual CIO Customers OneDrive HVAC Peripheral Google Apps Bloatware Audiobook Two Factor Authentication Digital Security Cameras Touchpad Analysis Using Data Netflix Devices Copiers 5G Root Cause Analysis Tablets Administrator Advertising Enterprise Content Management Quick Tip HBO Knowledge Entrepreneur Politics Music Smartwatch MSP Ergonomics Accountants Skype Thought Leadership Development Notifications Credit Cards OLED Data loss Shortcut Microchip Troubleshooting Password Management PCI DSS Password Manager Virtual Machine Outlook Leadership Cost Management Multi-Factor Security Employee Social Networking 2FA Fiber Optics Start Menu Twitter Messaging Cabling Screen Mirroring Loyalty Search Engine Relocation Books NIST Policy Business Mangement Hypervisor Frequently Asked Questions Trending Windows 10s Video Games Dark mode Smart Tech Trend Micro Mobile Running Cable Consultant Addiction SMS Amazon Default App Cast Analytics Memory Worker Commute Emergency Procedure Recycling Saving Time Tip of the week webinar Experience Google Search Public Cloud Employer Employee Relationship Scalability Wiring dark theme Practices Shopping Professional Services Best Available Cache AI WIndows 7 Amazon Web Services IT Infrastructure Assessment Business Owner Safe Mode FinTech NarrowBand Criminal Windows Server 2008 Bing Science Search GDPR Hosted Computing Social Network Tools Wireless Internet Online Shopping Investment Television iPhone File Sharing Employees Employee/Employer Relationships Specifications ISP Customer Relationship Management Camera Windows 365 Inventory Distributed Denial of Service Wire Video Conferencing User Evernote ROI PowerPoint Public Computer Analyitcs Windows Media Player Files Transportation Sales Chromecast Bitcoin Regulations Travel Shortcuts Programming Millennials Cryptomining Computer Fan Rootkit Printers Point of Sale Personal Smart Office Supply Chain Management Managing Stress Uninterrupted Power Supply Wireless Charging Colocation Benefits Monitoring Batteries Antivirus Workers Workforce FENG Cameras Windows 8 Virtual Private Network Windows 8.1 Monitor Digitize Cables Windows Server 2008 R2 IT service IBM Smart Technology Customer relationships Flash

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code