Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Take Advantage of Notepad’s Text-to-Audio Feature

computer_that_talks_400.jpgSome people talk to their computers, but not like they would speak to another human being. We coax it into doing it what we want, or we curse it out when it doesn’t. A day may come when artificial intelligence has progressed so far that we won’t be able to distinguish a computerized conversation from a normal one; but it is not this day. Until that glorious day comes, we’ll have to settle for these two methods to interact verbally with your PC.

My Notepad Sure Has a Big Mouth
We bet you didn’t know that the Windows Operating System has a tool installed on its Notepad that allows it to convert text to audio. However, this feature isn’t available without a little tinkering on your part. It requires a bit of programming, but infusing life into your Notepad is as easy as copying some text and slapping it on the page.

It’s Alive!
First, you want to open Notepad. Copy and paste this text into Notepad:

Dim msg, sapi
msg=InputBox("Enter your text for Conversation | Tool by Irshad (http://pctricksonline.blogspot.com)","PC Hacks Text-To-Audio Converter")
Set sapi=CreateObject("sapi.spvoice")
sapi.Speak msg

Go to File > Save As, and make sure that the file type reads text_audio.vbs. Afterward, close the note and open the text_audio.vbs file. A magic little box will appear on your screen. Type your text into the box and pat yourself on the back; you’ve just breathed life into an inanimate object (sort of). Fun things to type into this include, but are not limited to, “Help! I’ve been turned into a computer,” “Look at me. I’m a computer programmer,” and “Kneel before me, humans!”

That’s Not What I Said
If you don’t want to try your hand at programming Notepad to breathe life into your PC, you could always try using Google Voice Search. This is a standard Google Chrome feature, and is very easy to use. You simply go to Google’s homepage and click on the microphone icon to the right of the Google search bar. Then, you speak into your microphone and Google will search for it. The more the app is used, the more accurate it becomes. You might want to consider turning Safe Search on if you are afraid of what you might accidentally search for. You never know what you might find on the Internet.

“Smart” Phones
For those who want a simpler experience, there are always the apps offered for smartphones. Apple offers Siri for iOS, and Android has Google Now. It’s better than the magic 8-ball, we suppose, and you shouldn’t get too bored talking to them. Just remember, nothing is better than actual human interaction.

These technologies are just a taste of what’s to come over the next few years. Technology advancement is growing at an alarming rate, so keep your eyes peeled for other great interactive programs. What are your favorite interactive apps, and why? Share it with us in the comments!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 29 March 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Network Security Google Business Internet Microsoft Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices IT Services Hardware Android VoIP Disaster Recovery communications Smartphones Business Continuity Communication IT Support Miscellaneous Smartphone Mobile Device Browser Small Business Network Productivity Collaboration Quick Tips Cybersecurity Users Business Management Windows Phishing Upgrade Managed IT Services Data Backup Outsourced IT Ransomware Windows 10 Server Save Money Data Recovery Cloud Computing Office Windows 10 Passwords Gadgets Chrome Virtualization Saving Money Tech Term Holiday Social Media Microsoft Office Managed Service Automation Managed IT Services Cybercrime Operating System Artificial Intelligence Computers Facebook Health Wi-Fi Hacking BYOD Mobile Device Management Internet of Things Networking IT Support Alert Managed Service Provider Remote Spam Information Office 365 Telephone Systems Covid-19 Information Technology Recovery Employer-Employee Relationship Social Engineering Mobility Router Bandwidth BDR Data Breach Human Resources Big Data Password Money Remote Monitoring Encryption Applications Mobile Computing App Application History Law Enforcement Managed IT Remote Computing Apps Blockchain Mobile Office Paperless Office How To Office Tips Government Data Storage Training Patch Management VPN Private Cloud Servers Bring Your Own Device Two-factor Authentication Data Management Work/Life Balance Mouse Data Security HaaS Flexibility Marketing WiFi Google Drive IT solutions Entertainment Website Budget Infrastructure Voice over Internet Protocol Wireless Avoiding Downtime Vulnerability Gmail Windows 7 Word Settings Save Time Firewall Vendor Management Virtual Reality Apple Cleaning Social User Error End of Support Software as a Service Telephone System Staff Education Meetings Physical Security Machine Learning Safety Connectivity Remote Work HIPAA Vendor Sports Redundancy Risk Management Managed Services Hacker Keyboard Display USB The Internet of Things Conferencing Lithium-ion battery Employee/Employer Relationship Scam RMM Data Protection Botnet IT Plan Fax Server Data storage Comparison Automobile Unsupported Software SaaS Digital Signage CES Charger Computing Infrastructure Going Green Business Technology Content Management Compliance Access Control Network Congestion OneNote Procurement Computer Care eWaste Virus Workplace Strategy Current Events Virtual Assistant Net Neutrality Battery Authentication Unified Threat Management Telephony Samsung Help Desk Shadow IT Computer Accessories Printing Legal Value Wearable Technology Internet Exlporer Retail Update Hard Drives Managed Services Provider Electronic Medical Records Instant Messaging Spam Blocking Excel PDF Robot Printer Google Docs Database Bluetooth Hiring/Firing Identity Theft Biometrics Remote Workers Virtual Desktop Proactive IT Processor Best Practice DDoS YouTube IT Consultant Black Market Augmented Reality Hard Drive SharePoint Fraud Business Intelligence Humor Remote Worker Audit Document Management Worker IT Management Computing Cryptocurrency Solid State Drive Customer Service Wireless Technology How to Downtime Environment Computer Fan Virtual Machine Rootkit Cache Antivirus Files Consultant Amazon Web Services PCI DSS Chromecast Analytics Windows 8 2FA Fiber Optics Safe Mode Employee Criminal Benefits Hosted Computing IT service Messaging Workers GDPR Cabling FENG Hypervisor Wireless Internet Colocation Best Available Online Shopping Uninterrupted Power Supply Policy Tablet Dark mode Trend Micro IBM File Sharing WIndows 7 Smart Technology Inventory Domains Monitor Specifications Flash SMS Camera Default App Procedure Saving Time Wire Evernote Travel dark theme Software Tips Shopping Supercomputer IaaS Google Search Maintenance IT Infrastructure Reputation Millennials Bloatware Streaming Media Sync AI Emails Printers FinTech Content Smart Office Bing Wireless Charging Tech Support Laptop PowerPoint Tablets Windows Media Player Social Network Techology User Investment Two Factor Authentication Customers Workforce Entrepreneur Netflix Virtual Private Network Employees Root Cause Analysis Employee/Employer Relationships Audiobook Cables Touchpad Windows 365 HBO Knowledge ISP Music Managing Stress Shortcut ROI Nanotechnology Telecommuting Cost Management Skype Video Conferencing Project Management Sales Data loss Bitcoin Politics Shortcuts Advertising Cortana Social Networking Cameras Point of Sale Outlook Personal Leadership Cryptomining Troubleshooting Digital Signature Notifications Start Menu Supply Chain Management Warranty Monitoring Screen Mirroring Batteries Loyalty HVAC Running Cable Google Apps Memory Windows 8.1 Frequently Asked Questions Digitize Books Analysis Administrator Windows Server 2008 R2 Devices Relocation Mobile Windows 10s Customer relationships Cast Enterprise Content Management Printer Server Accountants Email Best Practices Tip of the week IT Assessment webinar MSP Manufacturing Video Games Emergency Microchip Worker Commute Employer Employee Relationship Thought Leadership Credit Cards Professional Services Public Cloud Science Computer Tips Managed IT Service Experience Assessment Password Management Security Cameras Password Manager Multi-Factor Security Virtual CIO Windows Server 2008 OneDrive Biometric Security Scalability Search Engine Business Owner Twitter Tools Peripheral Digital Security Cameras Using Data Television NIST Distributed Denial of Service Business Mangement Customer Relationship Management NarrowBand Smart Tech Trending Analyitcs Copiers 5G Search Addiction iPhone Amazon Programming Quick Tip Ergonomics Public Computer Smartwatch Recycling Transportation Practices Regulations Development Wiring OLED

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code