Male Rep 1

 

 "The customer is the hero of the Story"

Have IT Questions?
Call us now (888) 894-6411

TWINTEL Solutions Blog

Tip of the Week: Using Templates in Evernote

Tip of the Week: Using Templates in Evernote

The note-taking application Evernote is a favorite of many users, as it allows them to keep extensive notes in an organized fashion. Its true utility goes beyond that of a digital scratch pad, however, as it has additional features that offer much more. For this week’s tip, we’ll review one particularly useful feature: templates.

What Are Templates?
Evernote’s templates are handy, pre-built structures for notes that provide users with a simpler means of organizing specific types of information. Instead of taking time struggling with your formatting each time you start a new note, you can apply one of the templates that Evernote offers on their website. Those with a subscription to Evernote Plus, Premium, or Business can even use formatting they’ve created in past notes to generate their own templates for repeated use.

Applying Templates in Evernote
Once you’ve acquired a few templates, either from the Evernote website’s collection or from a past note, applying one of your choosing is relatively simple.

  • In Evernote, start a new note.
  • In the body of the note, click Templates to view the ones you have saved.
  • From there, you can search for any templates you have, delete ones you no longer want or need, edit their names, and of course, apply them to notes.
  • If you want to edit a template, follow the same process, and once you’ve made the changes that you want, save it as a new template. Note: only those with Plus, Premium, or Business accounts are able to do this.
  • Plus, Premium, and Business users are also able to create their own templates this way.

So, what do you think? Is this a welcome change to Evernote? What other improvements would you like to see them make down the line? Let us know in the comments!

8 Data Backup Terms You Should Know
What Do You Know About the Microchips That Power Y...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, January 22 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code

Our 10 Benefits

Our 10 Benefits Whitepaper

This whitepaper will evaluate the differences between traditional technical support practices and modern managed IT practices and the pros and cons of both in regards to small and medium-sized businesses.

Download Now!   Need A Consultation?

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Privacy Business Computing Network Security Hackers Backup Hosted Solutions Malware Mobile Devices Google Data VoIP Microsoft Disaster Recovery Business nonprofit Software Email Business Continuity bgc roundup communications Internet Outsourced IT Managed IT Services Alert Innovation Hardware IT Services Smartphones User Tips Tech Term Data Backup Windows 10 Browser Managed IT Services Saving Money Data Recovery Computer Ransomware Server Smartphone Efficiency Internet of Things Cybercrime Android Cloud Computing Network IT Support Communication IT Support BDR Computers Workplace Tips Business Management Small Business Productivity Cybersecurity Windows Passwords Office Miscellaneous Save Money Artificial Intelligence Productivity Quick Tips Router Managed IT Money Telephone Systems BYOD Social Engineering Mobility Chrome Recovery Holiday Windows 10 Mobile Device Management Applications Automation Mobile Device Firewall Wi-Fi Work/Life Balance Phishing Social Media Virtualization Office 365 Gadgets Collaboration Hacking Upgrade Law Enforcement Facebook Vulnerability Data Protection Budget Office Tips Flexibility Managed Service Provider Avoiding Downtime How To App Compliance VPN Health Proactive IT Password Microsoft Office Information Private Cloud Remote Monitoring Bring Your Own Device Bandwidth Google Drive Word Two-factor Authentication Settings Scam Black Market Value Operating System Apps Safety Voice over Internet Protocol Keyboard Software as a Service Data Security Redundancy Servers Identity Theft Remote Computing Connectivity Data Breach Business Intelligence Managed Service Information Technology Sports HaaS Spam Mobile Computing History Charger Physical Security Telephony Blockchain Virtual Assistant Unsupported Software Data Storage Website Automobile Wireless Technology YouTube Electronic Medical Records Human Resources Telephone System Worker End of Support USB IT Management Data Management Data storage Infrastructure Paperless Office Employer-Employee Relationship Comparison Entertainment Unified Threat Management Spam Blocking Battery Content Filtering IT Plan Machine Learning SaaS Update Business Owner The Internet of Things Hiring/Firing Cleaning Emergency Training Workers PDF Big Data CES Government Computing Infrastructure Credit Cards Solid State Drive WiFi Document Management Computer Care Marketing Encryption Content Management Patch Management Legal Access Control Hacker Windows 7 Fraud HIPAA OneNote Google Docs Save Time Risk Management Samsung Best Practice Content Thought Leadership Mouse Help Desk Fiber-Optic Hosted Solution Supercomputer Apple Authentication Bluetooth Netflix Internet Exlporer Regulations Amazon Search Going Green Recycling Enterprise Content Management Television CrashOverride Frequently Asked Questions Telecommuting Politics Google Apps Smart Office Audit Botnet Professional Services Virtual Reality File Sharing Leadership Audiobook Twitter Administrator Shortcuts Skype Cables Transportation Current Events iPhone Software Tips Nanotechnology Camera Amazon Web Services How to eWaste Password Management Public Computer User Error Excel Remote Work Loyalty Computer Fan Smartwatch Meetings Worker Commute Practices Augmented Reality Video Games Addiction Wireless Social Start Menu Unified Communications Staff Regulation Benefits Knowledge Downtime Smart Tech Printers Rootkit Reputation Advertising Microchip Online Shopping Troubleshooting Criminal NIST Multi-Factor Security Monitor Colocation Tip of the week Scalability Experience Password Manager FENG Hard Drives Data loss Hosted Computing Remote Worker HBO Specifications Cache Windows 10s Vendor Tools Theft Education Digital Signature Smart Technology Network Congestion Robot Chromecast Warranty Customers Search Engine Flash Evernote Laptop Cryptocurrency Trending Employer Employee Relationship webinar Windows Server 2008 Business Mangement HVAC Relocation Screen Mirroring Techology Inventory Wiring Outlook Millennials Wireless Internet Public Cloud Display Two Factor Authentication Files Devices Printer Vendor Management Bing Sync Wireless Charging Shadow IT Books Touchpad Safe Mode IBM Data Warehousing Lifestyle Computer Accessories Conferencing Instant Messaging Gmail Networking Assessment Humor Cast NarrowBand Workforce Cortana Wire Security Cameras Mobile Users Accountants MSP IT Consultant E-Commerce Thank You Congratulations nonprofits GDPR