A new model for inclusive computer science education

The lack of diversity in the computing education pipeline has been a remarkably persistent problem. Something that’s stalled progress in addressing disparities is that there’s largely been a focus on individuals, such as teachers and students, rather than on how equity plays out across multiple levels of the computer science (CS) education ecosystem. This is why our work at the University of Texas since 2014 focuses on understanding the root causes of inequities in the CS education pipeline and how every level of the system influences equity.


With the support of a CS-ER (computer science education research) grant from Google, my colleague Jayce Warner and I developed a framework for thinking about equity across the CS education ecosystem. We began this work after digging into data in Texas in 2014 and finding that only about a quarter of Texas high schools offered any kind of CS course and fewer than 3% of Texas students were taking a CS course each year.  The students enrolled in CS courses were also not reflective of the student population in our diverse state. We launched what became the WeTeach_CS professional development program, with the ultimate objective of seeing equitable enrollment in CS courses in Texas. To achieve this goal, we first had to improve access to CS courses and increase the number of CS-certified teachers in the state. 


At the time, we thought equity had to wait until we had solved the capacity, access and participation challenges. But as we began thinking more deeply about this model and asking our colleagues in the Expanding Computing Education Pathways (ECEP) Alliance for feedback, we realized several things:


True Equity is about more than just diversity in the classroom, and just because something is available to everyone doesn’t mean that everyone can or will benefit. Also, education is very complex and the things we can easily measure (such as AP class participation) may not be the best indicators of change or success.


We developed a new framework that reflects how things connect at different levels of CS education.  Most importantly, this model helps us better understand how equity plays out at each level. We’ve called it the CAPE framework and it consists of four interdependent components: capacity for CS education, access to CS education, participation in CS education and experience of CS education. 


Each level affects the next. For example, if we want students to have equitable experiences in CS, we first need to make sure they’re participating equitably. Equitable participation relies on equitable access and equitable access relies on equitable capacity. 




CAPE is represented as a triangle with four levels. Capacity for CS Education is the foundational level of the triangle, with access to CS education above that, participation in CS education above that, and experiences of CS education at the top. Example questions that can be asked at the Capacity level address teachers, funding and policies such as Do districts in all areas have the resources to offer CS and to train and certify teachers? Access questions deal with course offerings such as Are CS courses offered in low-income schools at similar rates to other schools? Questions at the participation level address student enrollment such as Which subgroups are underrepresented in CS courses and to what extent? Experience level questions can address student outcomes such as How does instruction and learning differ across student subgroups and do all students feel a sense of belonging in CS?

The CAPE Framework helps the entire CS education community think about the systems they work in and the types of questions they should ask to ensure equity and inclusion in computing. One example is Jackie Corricelli, a PreK-12 CS Curriculum Specialist in West Hartford Public Schools (CT), who’s used the CAPE framework to evaluate her district’s K-12 CS program. In another example, Bryan Cox, Computer Science Specialist at the Georgia Department of Education, is building a public dashboard to track access and participation in K-12 CS education in Georgia. In Texas, we’ve used CAPE to frame our state and regional CSEd Profiles and recently released a new interactive visualization to explore capacity, access and participation across the state’s 1,200 school districts and more than 2,000 high schools. 


Google supported these efforts with a CS-ER grant awarded to UT Austin, which was instrumental in the development and evolution of the CAPE framework. In 2021, Google awarded seven new CS-ER grants. This year’s grant awardees are: Amy J. Ko, University of Washington; Derek Aguiar, University of Connecticut; Jean Ryoo, University of California, Los Angeles; Jennifer Parham-Mocello, Oregon State University; Joshua Childs and Tia Madkins, The University of Texas at Austin; Melanie Williamson and Audrey Brock, Bluegrass Community & Technical College; and Mounia Ziat, Bentley University.


For more information about each of the recipient’s projects, or to submit an application to be considered for future cohorts, you can visit Google Research’s Outreach page.

Watch With Me on Google TV: Hasan Minhaj’s watchlist

Movies and TV can make us laugh, cry and even shape who we are. Our watchlists can be surprisingly revealing. We’re teaming up with entertainers, artists and cultural icons on a new ongoing Watch With Me series on Google TV to share their top picks and give you a behind-the-scenes look at the TV and movies that inspired them.


Writer, comedian, producer and TV host Hasan Minhaj is best known for his sharp, earnest political commentary. When he isn’t on screen tackling any number of current issues, he’s happy to sit back and rewatch one of his favorite films. 


“Movies and TV shows are an opportunity to watch something with loved ones,” Hasan says. “Whether they make you laugh or feel something deep. Or they can be a source of respite, or help you realize how big the world is.”


We sat down with Hasan to learn more about his own Google TV watchlist and discover any hidden gems he has on repeat. “To me, rewatchability is everything. So my watchlist is everything that I can watch over and over, whether it's with my wife, dad or kids. That's what's on my watchlist: Comfort food in the form of movies.”

Google TV showing Watch With Me page with Hasan Minhaj’s watchlist.

Do you prefer watching movies alone or with others?

Hasan Minhaj: I love watching movies with people, but now that I’m a dad with two kids, I’ll watch movies any way I can when I get the chance. 


Who is the first person you call to talk about a new movie or show?

Hasan Minhaj: My best friend, Prashanth. We can get really argumentative and petty and just go head-to-head about why we love or hate something. But we’re still friends when it’s all said and done. 


What’s your must-have movie snack?

Hasan Minhaj: I like to have the best of both worlds. I go one salty, one sweet, which to me is why the Peanut M&Ms are probably one of the greatest movie snacks ever.


Do you read reviews before seeing a movie or show? 

Hasan Minhaj: No, I listen to my friends. If a friend texts me, "Hey, you have to check out ‘Ted Lasso,’" I'll check it out. 


How would you describe your watchlist?

Hasan Minhaj: I’d say it’s a guaranteed good time. I think if someone were to look at my watchlist, they would be like, "Hey, he loves movies that are really funny. He's definitely a dad. And he definitely has a soft spot for 80s, 90s and early 2000s nostalgia."


To check out Hasan’s watchlist and learn more about how Chris Rock inspired his start in comedy, catch his full interview and watchlist on Google TV's For You tab, coming in the next few days. Be sure to join in on the fun and share your favorites using #WatchWithMe.

From startup founder to product manager in Nairobi

Welcome to the latest edition of “My Path to Google,” where we talk to Googlers, interns and alumni about how they got to Google, what their roles are like and even some tips on how to prepare for interviews.

This week we spoke with Andrew Kamau, a Noogler — new Googler — who recently joined as a Product Manager in Nairobi. Learn how Andrew’s career took him from startups in Kenya to creating products at Google.

What do you do at Google?

I’m a product manager working on the Privacy team for Chrome Browser. Product management typically involves wearing multiple hats, but I can summarize it as supporting my team in ensuring that we are delivering product features that help our users stay and feel safe while using Chrome to access the web.

I work closely with a team of engineers, designers, product managers and other cross-functional roles to anticipate our users’ needs such as easy-to-use privacy controls and protection from online threats. We then design product strategy that meets those needs. This usually involves weaving together inputs from our users and colleagues across different teams and then making product decisions that align with the company’s mission.

How would you describe your path to Google?

I’ve had a somewhat unusual path compared to most folks in my position. My career background is largely in tech startups. I live in Nairobi, which has a thriving community of creative talent from which I’ve benefited from and to which I’ve contributed. My time as an entrepreneur working on financial technology exposed me to opportunities that helped diversify my experiences and build up the empathy and skill set that is extremely invaluable as a product manager.

Coming from a startup background, I was — on one hand — nervous about moving to a global corporation. I worried that I might not fit into the culture, having not worked at any organization with more than 40 people in the entirety of my career before this. On the other hand, the interesting thing about working at Google is that I’m still able to channel my scrappy, entrepreneurial approach to experimenting and building products. The difference is that I now have access to world-class technology and talent to support me every step of the way and the impact of my work has increased exponentially.

What’s the one thing that surprised you about the interview process?

Considering that I went through the entire process in the midst of the pandemic and working from home, I was pleased to find that everyone involved was gracious enough to accommodate my preferences, so I didn’t have to worry about awkward situations like my son barging in on our video calls.

I did have some preconceived notions about what the recruiting process would look like. One that took me by surprise was how helpful and supportive my recruiter was. She helped make the process less jarring and more rewarding; even going so far as to set up calls with product managers and engineers who work at roles similar to the one I was interviewing for. They voluntarily provided guidance and advice, which helped me be better prepared for the technical interviews.

Andrew and his son smile at the camera holding a Noogler hat.

Andrew and his son

What gets you most excited in your role?

Chrome is used on over three billion devices across the world to access the web. Building and maintaining safe and reliable product experiences for our users at this scale is a huge responsibility and source of motivation for me. I enjoy working on technical solutions to advance our mission and deliver value to our users. I’m particularly fortunate to work with incredibly smart engineers and designers on our teams.

In my role, every day is different. Some days are spent largely on meetings, chat and email with my colleagues brainstorming and planning, while others are heads-down working on synthesizing feedback from users and developing product requirements. 

I regularly carve out time on my weekly calendar for virtual coffees and lunches where I get to meet folks in the company based in Munich, London, Dublin, and other locations globally. Due to the diversity of backgrounds and experiences in the company, there’s always something fun and interesting to learn from others.

Any tips for aspiring Googlers in Africa?

First and foremost, focus on being great at your craft while maintaining a low ego. I strongly believe that confidence, ambition and humility can co-exist.

Having mostly worked in the African tech industry, I’m constantly blown away by the talent and creativity that I encounter. I’d encourage anyone who aspires to make the jump not to doubt themselves and apply. You don’t need to know anybody (I didn’t!) or pull any strings.

It’s also important to take time to find a role and team that is an ideal match. For example, I had to delay my process for a few months until I found the role and team that best matched my interests. Eventually, I ended up interviewing for a different role from the one I was invited to apply for — and it worked out great.

More support for women founders in Asia

Ketty Lie remembers her college graduation like it was yesterday. Her mother held her hand tightly as they walked across the lawn to the ceremony and told her how proud she was that Ketty had achieved the dream she never got to fulfill herself.


That investment in education led Ketty to become an entrepreneur. Today, her company ErudiFi is focused on expanding access to education for young people across Southeast Asia. And Ketty is getting ready to start the twelve-week Women Founders Academy with Google for Startups.
Ketty Lie, the founder of ErudiFi, in a black t-shirt looking directly at the camera

Ketty Lie is excited to join the program and meet her fellow women entrepreneurs.

Following a successful first year in 2020, the Women Founders Academy 2021 will offer a new group of founders training to sharpen their leadership skills, build strong teams and address their unique growth needs, including funding. They will take part in workshops, connect with a community of Google advisors, venture capitalists and business executives and receive mentoring from dedicated subject matter experts. The 10 participants, from five countries in Asia Pacific, are:

  • Dorothy Yio, (Singapore). Engage Rocket is a cloud-based software company that helps organizations improve their employee experience.
  • Sophie Jokelson, (Singapore). Cove is a co-living company that makes it easier, faster and more flexible to rent comfortable homes at honest prices.
  • Vanessa Geraldine, (Indonesia). Prieds Technology offers an all-in-one business and technology solution to improve business efficiency.
  • Utari Octavianty, (Indonesia). Aruna is a fisheries platform that connects small-scale fishermen to the global market through technology.
  • Ketty Lie, (Indonesia). ErudiFi is a technology company focused on expanding access to education in Southeast Asia.
  • Angela Jihee Park, (Korea). Kokozi offers an audio content platform and device that provides children with unique audio experiences. 
  • Ji Eun Chung, (Korea). CODIT runs an AI data intelligence platform that helps companies manage legal, regulatory and policy risks and opportunities.
  • Monika Mehta, (India). Zealth-AI is a platform that helps manage cancer through digital remote monitoring and patient engagement.
  • Laina Emmanuel, (India). BrainSightAI is building a neuroinformatics platform that uses technology to help answer questions about neuro-oncological and neuro-psychiatric disorders.
  • Yugari Nagata, (Japan)DATA VIZ LAB is a data analytics and visualization consulting company that builds on cloud technology.

Ketty is ready to meet her fellow founders and excited about the opportunity to share lessons and experiences. “Sometimes it’s lonely being a woman founder in the tech startup world,” she says. “Finding a community of like-minded women who are building tech-based businesses in Asia hasn’t been easy and this program provides a unique platform that I wouldn’t otherwise have.”


The Women Founders Academy class of 2021 will celebrate its graduation in November. We’re looking forward to helping these founders take their next steps as entrepreneurs and business leaders.

More support for women founders in Asia

Ketty Lie remembers her college graduation like it was yesterday. Her mother held her hand tightly as they walked across the lawn to the ceremony and told her how proud she was that Ketty had achieved the dream she never got to fulfill herself.


That investment in education led Ketty to become an entrepreneur. Today, her company ErudiFi is focused on expanding access to education for young people across Southeast Asia. And Ketty is getting ready to start the twelve-week Women Founders Academy with Google for Startups.
Ketty Lie, the founder of ErudiFi, in a black t-shirt looking directly at the camera

Ketty Lie is excited to join the program and meet her fellow women entrepreneurs.

Following a successful first year in 2020, the Women Founders Academy 2021 will offer a new group of founders training to sharpen their leadership skills, build strong teams and address their unique growth needs, including funding. They will take part in workshops, connect with a community of Google advisors, venture capitalists and business executives and receive mentoring from dedicated subject matter experts. The 10 participants, from five countries in Asia Pacific, are:

  • Dorothy Yio, (Singapore). Engage Rocket is a cloud-based software company that helps organizations improve their employee experience.
  • Sophie Jokelson, (Singapore). Cove is a co-living company that makes it easier, faster and more flexible to rent comfortable homes at honest prices.
  • Vanessa Geraldine, (Indonesia). Prieds Technology offers an all-in-one business and technology solution to improve business efficiency.
  • Utari Octavianty, (Indonesia). Aruna is a fisheries platform that connects small-scale fishermen to the global market through technology.
  • Ketty Lie, (Indonesia). ErudiFi is a technology company focused on expanding access to education in Southeast Asia.
  • Angela Jihee Park, (Korea). Kokozi offers an audio content platform and device that provides children with unique audio experiences. 
  • Ji Eun Chung, (Korea). CODIT runs an AI data intelligence platform that helps companies manage legal, regulatory and policy risks and opportunities.
  • Monika Mehta, (India). Zealth-AI is a platform that helps manage cancer through digital remote monitoring and patient engagement.
  • Laina Emmanuel, (India). BrainSightAI is building a neuroinformatics platform that uses technology to help answer questions about neuro-oncological and neuro-psychiatric disorders.
  • Yugari Nagata, (Japan)DATA VIZ LAB is a data analytics and visualization consulting company that builds on cloud technology.

Ketty is ready to meet her fellow founders and excited about the opportunity to share lessons and experiences. “Sometimes it’s lonely being a woman founder in the tech startup world,” she says. “Finding a community of like-minded women who are building tech-based businesses in Asia hasn’t been easy and this program provides a unique platform that I wouldn’t otherwise have.”


The Women Founders Academy class of 2021 will celebrate its graduation in November. We’re looking forward to helping these founders take their next steps as entrepreneurs and business leaders.

Why we’re committing $10 billion to advance cybersecurity

We welcomed the opportunity to participate in President Biden’s White House Cyber Security Meeting today, and appreciated the chance to share our recommendations to advance this important agenda. The meeting comes at a timely moment, as widespread cyberattacks continue to exploit vulnerabilities targeting people, organizations, and governments around the world.


That’s why today, we are announcing that we will invest $10 billion over the next five years to strengthen cybersecurity, including expanding zero-trust programs, helping secure the software supply chain, and enhancing open-source security. We are also pledging, through the Google Career Certificate program, to train 100,000 Americans in fields like IT Support and Data Analytics, learning in-demand skills including data privacy and security. 


Governments and businesses are at a watershed moment in addressing cybersecurity. Cyber attacks are increasingly endangering valuable data and critical infrastructure. While we welcome increased measures to reinforce cybersecurity, governments and companies are both facing key challenges: 


First, organizations continue to depend on vulnerable legacy infrastructure and software, rather than adopting modern IT and security practices. Too many governments still rely on legacy vendor contracts that limit competition and choice, inflate costs, and create privacy and security risks. 


Second, nation-state actors, cybercriminals and other malicious actors continue to target weaknesses in software supply chains and many vendors don’t have the tools or expertise to stop them. 


Third, countries simply don’t have enough people trained to anticipate and deal with these threats. 


For the past two decades, Google has made security the cornerstone of our product strategy. We don’t just plug security holes, we work to eliminate entire classes of threats for consumers and businesses whose work depends on our services. We keep more users safe than anyone else in the world — blocking malware, phishing attempts, spam messages, and potential cyber attacks. We’ve published over 160 academic research papers on computer security, privacy, and abuse prevention, and we warn other software companies of weaknesses in their systems. And dedicated teams like our Threat Analysis Group work to counter government-backed hacking and attacks against Google and our users, making the internet safer for everyone.


Extending the zero-trust security model 

We’re one of the pioneers inzero-trust computing, in which no person, device, or network enjoys inherent trust.  Trust that allows access to information must be earned.  We’ve learned a lot about both the power and the challenges of running this model at scale. 


Implemented properly, zero-trust computing provides the highest level of security for organizations.  We support the White House effort to deploy this model across the federal government. 


As government and industry work together to develop and implement zero-trust solutions for employee access to corporate assets, we also need to apply the approach to production environments. This is necessary to address events like Solarwinds, where attackers used access to the production environment to compromise dozens of outside entities. The U.S. government can encourage adoption by expanding zero-trust guidelines and reference architecture language in the Executive Order implementation process to include production environments, which in addition to application segmentation substantially improves an organization’s defense in depth strategy. 


Securing the software supply chain 

Following the Solarwinds attack, the software world gained a deeper understanding of the real risks and ramifications of supply chain attacks. Today, the vast majority of modern software development makes use of open source software, including software incorporated in many aspects of critical infrastructure and national security systems. Despite this, there is no formal requirement or standard for maintaining the security of that software. Most of the work that is done to enhance the security of open source software, including fixing known vulnerabilities, is done on an ad hoc basis. 


That’s why we worked with the Open Source Security Foundation (OpenSSF) to develop and release Supply Chain Levels for Software Artifacts (SLSA or “salsa”), a proven framework for securing the software supply chain. In our view, wide support for and adoption of the SLSA framework will raise the security bar for the entire software ecosystem. 


To further advance our work and the broader community’s work in this space, we committed to invest in the expansion of the application of our SLSA framework to protect the key components of open-source software widely used by many organizations. We also pledged to provide $100 million to support third-party foundations, like OpenSSF, that manage open source security priorities and help fix vulnerabilities.


Strengthening the digital security skills of the American workforce

Robust cybersecurity ultimately depends on having the people to implement it. That includes people with digital skills capable of designing and executing cybersecurity solutions, as well as promoting awareness of cybersecurity risks and protocols among the broader population. In short, we need more and better computer security education and training.  


Over the next three years, we're pledging to help 100,000 Americans earn Google Career Certificates in fields like IT Support and Data Analytics to learn in-demand skills including data privacy and security. The certificates are industry-recognized and supported credentials that equip Americans with the skills they need to get high-paying, high-growth jobs. To date, more than half of our graduates have come from backgrounds underserved in tech (Black, Latinx, veteran, or female). 46% of our graduates come from the lowest income tertile in the country. And the results are strong: 82% of our graduates report a positive career impact within six months of graduation. Additionally, we will train over 10 million Americans in digital skills from basic to advanced by 2023.


Leading the world in cybersecurity is critical to our national security. Today’s meeting at the White House was both an acknowledgment of the threats we face and a call to action to address them. It emphasized cybersecurity as a global imperative and encouraged new ways of thinking and partnering across government, industry and academia. We look forward to working with the Administration and others to define and drive a new era in cybersecurity. Our collective safety, economic growth, and future innovation depend on it.


Why we’re committing $10 billion to advance cybersecurity

We welcomed the opportunity to participate in President Biden’s White House Cyber Security Meeting today, and appreciated the chance to share our recommendations to advance this important agenda. The meeting comes at a timely moment, as widespread cyberattacks continue to exploit vulnerabilities targeting people, organizations, and governments around the world.


That’s why today, we are announcing that we will invest $10 billion over the next five years to strengthen cybersecurity, including expanding zero-trust programs, helping secure the software supply chain, and enhancing open-source security. We are also pledging, through the Google Career Certificate program, to train 100,000 Americans in fields like IT Support and Data Analytics, learning in-demand skills including data privacy and security. 


Governments and businesses are at a watershed moment in addressing cybersecurity. Cyber attacks are increasingly endangering valuable data and critical infrastructure. While we welcome increased measures to reinforce cybersecurity, governments and companies are both facing key challenges: 


First, organizations continue to depend on vulnerable legacy infrastructure and software, rather than adopting modern IT and security practices. Too many governments still rely on legacy vendor contracts that limit competition and choice, inflate costs, and create privacy and security risks. 


Second, nation-state actors, cybercriminals and other malicious actors continue to target weaknesses in software supply chains and many vendors don’t have the tools or expertise to stop them. 


Third, countries simply don’t have enough people trained to anticipate and deal with these threats. 


For the past two decades, Google has made security the cornerstone of our product strategy. We don’t just plug security holes, we work to eliminate entire classes of threats for consumers and businesses whose work depends on our services. We keep more users safe than anyone else in the world — blocking malware, phishing attempts, spam messages, and potential cyber attacks. We’ve published over 160 academic research papers on computer security, privacy, and abuse prevention, and we warn other software companies of weaknesses in their systems. And dedicated teams like our Threat Analysis Group work to counter government-backed hacking and attacks against Google and our users, making the internet safer for everyone.


Extending the zero-trust security model 

We’re one of the pioneers inzero-trust computing, in which no person, device, or network enjoys inherent trust.  Trust that allows access to information must be earned.  We’ve learned a lot about both the power and the challenges of running this model at scale. 


Implemented properly, zero-trust computing provides the highest level of security for organizations.  We support the White House effort to deploy this model across the federal government. 


As government and industry work together to develop and implement zero-trust solutions for employee access to corporate assets, we also need to apply the approach to production environments. This is necessary to address events like Solarwinds, where attackers used access to the production environment to compromise dozens of outside entities. The U.S. government can encourage adoption by expanding zero-trust guidelines and reference architecture language in the Executive Order implementation process to include production environments, which in addition to application segmentation substantially improves an organization’s defense in depth strategy. 


Securing the software supply chain 

Following the Solarwinds attack, the software world gained a deeper understanding of the real risks and ramifications of supply chain attacks. Today, the vast majority of modern software development makes use of open source software, including software incorporated in many aspects of critical infrastructure and national security systems. Despite this, there is no formal requirement or standard for maintaining the security of that software. Most of the work that is done to enhance the security of open source software, including fixing known vulnerabilities, is done on an ad hoc basis. 


That’s why we worked with the Open Source Security Foundation (OpenSSF) to develop and release Supply Chain Levels for Software Artifacts (SLSA or “salsa”), a proven framework for securing the software supply chain. In our view, wide support for and adoption of the SLSA framework will raise the security bar for the entire software ecosystem. 


To further advance our work and the broader community’s work in this space, we committed to invest in the expansion of the application of our SLSA framework to protect the key components of open-source software widely used by many organizations. We also pledged to provide $100 million to support third-party foundations, like OpenSSF, that manage open source security priorities and help fix vulnerabilities.


Strengthening the digital security skills of the American workforce

Robust cybersecurity ultimately depends on having the people to implement it. That includes people with digital skills capable of designing and executing cybersecurity solutions, as well as promoting awareness of cybersecurity risks and protocols among the broader population. In short, we need more and better computer security education and training.  


Over the next three years, we're pledging to help 100,000 Americans earn Google Career Certificates in fields like IT Support and Data Analytics to learn in-demand skills including data privacy and security. The certificates are industry-recognized and supported credentials that equip Americans with the skills they need to get high-paying, high-growth jobs. To date, more than half of our graduates have come from backgrounds underserved in tech (Black, Latinx, veteran, or female). 46% of our graduates come from the lowest income tertile in the country. And the results are strong: 82% of our graduates report a positive career impact within six months of graduation. Additionally, we will train over 10 million Americans in digital skills from basic to advanced by 2023.


Leading the world in cybersecurity is critical to our national security. Today’s meeting at the White House was both an acknowledgment of the threats we face and a call to action to address them. It emphasized cybersecurity as a global imperative and encouraged new ways of thinking and partnering across government, industry and academia. We look forward to working with the Administration and others to define and drive a new era in cybersecurity. Our collective safety, economic growth, and future innovation depend on it.


New intelligent suggestions for formulas and functions in Google Sheets

Quick summary 

You’ll now see in-line, sequential, context-aware suggestions for formulas and functions when working with data in Google Sheets. 

Formula suggestions will make it easier to write new formulas accurately and help make data analysis quicker and easier.

Simply begin inserting a formula in Sheets—suggestions will be automatically displayed and as you continue to type. You can view additional incremental suggestions in the drop-down menu.

Google Sheets will intelligently suggest formulas and functions as you work with data in Sheets.


We hope these formula suggestions make it easier and faster for you to work with and analyze your data.

Getting started

  • Admins: There is no admin control for this feature.
  • End users: This feature will be available  by default and can be disabled by going to Tools > Enable formula suggestions or from the three-dot menu of the suggestion dialog box. Visit the Help Center to learn more about using formulas and functions in Google Sheets

Rollout pace


Availability

  • Available to all Google Workspace customers, as well as G Suite Basic and Business customers
  • Available to users with personal Google accounts

Resources


New intelligent suggestions for formulas and functions in Google Sheets

Quick summary 

You’ll now see in-line, sequential, context-aware suggestions for formulas and functions when working with data in Google Sheets. 

Formula suggestions will make it easier to write new formulas accurately and help make data analysis quicker and easier.

Simply begin inserting a formula in Sheets—suggestions will be automatically displayed and as you continue to type. You can view additional incremental suggestions in the drop-down menu.

Google Sheets will intelligently suggest formulas and functions as you work with data in Sheets.


We hope these formula suggestions make it easier and faster for you to work with and analyze your data.

Getting started

  • Admins: There is no admin control for this feature.
  • End users: This feature will be available  by default and can be disabled by going to Tools > Enable formula suggestions or from the three-dot menu of the suggestion dialog box. Visit the Help Center to learn more about using formulas and functions in Google Sheets

Rollout pace


Availability

  • Available to all Google Workspace customers, as well as G Suite Basic and Business customers
  • Available to users with personal Google accounts

Resources


New intelligent suggestions for formulas and functions in Google Sheets

Quick summary 

You’ll now see in-line, sequential, context-aware suggestions for formulas and functions when working with data in Google Sheets. 

Formula suggestions will make it easier to write new formulas accurately and help make data analysis quicker and easier.

Simply begin inserting a formula in Sheets—suggestions will be automatically displayed and as you continue to type. You can view additional incremental suggestions in the drop-down menu.

Google Sheets will intelligently suggest formulas and functions as you work with data in Sheets.


We hope these formula suggestions make it easier and faster for you to work with and analyze your data.

Getting started

  • Admins: There is no admin control for this feature.
  • End users: This feature will be available  by default and can be disabled by going to Tools > Enable formula suggestions or from the three-dot menu of the suggestion dialog box. Visit the Help Center to learn more about using formulas and functions in Google Sheets

Rollout pace


Availability

  • Available to all Google Workspace customers, as well as G Suite Basic and Business customers
  • Available to users with personal Google accounts

Resources