Female Rep2


 "Real People, Real Solutions"

Have IT Questions?
Call us now (888) 894-6411

TWINTEL Solutions Blog

Using Cortana Gets Better with Customization

Using Cortana Gets Better with Customization

As Cortana has more and more added to its functionality, it gradually becomes more of a utility to all. Those who prefer to use Google’s applications are now able to use Cortana to augment their use of Gmail, Google Contacts, and Google Calendar. Today, we’ll go through how you can set these programs up to play nice with Cortana.

For Cortana to work with Google apps, these apps must first be identified as a service. Access Cortana and click Notebook, and once the panel appears, access Connected Services and from there, Add service.

At this point, you will only be given an option for Gmail, but that includes Contacts and Calendar as well, in addition to Google Drive. After you next sign on to your Google account, your Connected Services menu will include Gmail as an option.

Privacy and Usage Disclaimers
Be warned, when you give Cortana access to your email and other services, you are opening your personal data to the assistant, and therefore, to Microsoft as well. You should definitely review the disclaimer that appears before connecting these accounts, as it will explain how your data is going to be used. If you have second thoughts after reading this disclaimer, you can be directed to where these integrations can be deactivated.

Since there isn’t any indication, as of yet, as to which of Cortana’s commands will work with these Google services, we are given the opportunity to speculate freely. What functions do you think Cortana will have in regard to Google’s apps? Give us your ideal list in the comments!

Tip of the Week: 5 Handy Android Shortcuts
Can Chargers Be Interchanged Between Devices?


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, November 20 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!


Our 10 Benefits

Our 10 Benefits Whitepaper

This whitepaper will evaluate the differences between traditional technical support practices and modern managed IT practices and the pros and cons of both in regards to small and medium-sized businesses.

Download Now!   Need A Consultation?

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Privacy Hackers Network Security Business Computing Backup Malware Hosted Solutions Mobile Devices Google Data VoIP Business Microsoft bgc Disaster Recovery Software Email roundup nonprofit Innovation Internet Managed IT Services Business Continuity Alert communications Hardware Outsourced IT IT Services Smartphones Windows 10 Browser User Tips Data Backup Tech Term Managed IT Services Saving Money Ransomware Computer Server Android Cloud Computing Efficiency Cybercrime Data Recovery Small Business Smartphone Business Management Workplace Tips Internet of Things Network IT Support BDR Computers Quick Tips Productivity Productivity Windows Passwords Office IT Support Communication Miscellaneous Save Money Artificial Intelligence Applications Money Telephone Systems BYOD Social Engineering Managed IT Recovery Cybersecurity Mobile Device Management Chrome Facebook Virtualization Windows 10 Collaboration Vulnerability Firewall Social Media Mobility Gadgets Work/Life Balance Phishing Hacking Upgrade Law Enforcement Holiday Office 365 Router Remote Monitoring Automation Two-factor Authentication Office Tips Managed Service Provider Avoiding Downtime Data Protection Health Flexibility Budget VPN Proactive IT How To Microsoft Office App Compliance Private Cloud Bandwidth Bring Your Own Device Information Wi-Fi Password History Business Intelligence Mobile Computing Data Breach Black Market Word Operating System HaaS Safety Spam Scam Redundancy Value Mobile Device Apps Remote Computing Keyboard Data Security Google Drive Servers Information Technology Identity Theft Connectivity Sports Cleaning Emergency Encryption Managed Service Training Workers Big Data WiFi Document Management Content Management Physical Security Credit Cards Wireless Technology Computer Care Patch Management Legal YouTube Save Time Blockchain Virtual Assistant Windows 7 Fraud HIPAA OneNote End of Support Risk Management Samsung Data storage Unsupported Software Charger Settings Data Storage Website Automobile Telephone System Electronic Medical Records Paperless Office The Internet of Things Infrastructure IT Management Voice over Internet Protocol Data Management Worker USB Employer-Employee Relationship PDF Government Software as a Service Computing Infrastructure Comparison Entertainment Unified Threat Management Spam Blocking Solid State Drive Battery Content Filtering IT Plan Marketing Update Business Owner CES Hiring/Firing SaaS Business Mangement HVAC NarrowBand Smart Technology Network Congestion Hacker HBO Specifications Inventory Wiring Windows 10s Humor Tools Theft Education Trending Flash Evernote Wireless Internet Apple Screen Mirroring Techology Safe Mode Employer Employee Relationship webinar Windows Server 2008 Devices Printer Bing Gmail Networking Two Factor Authentication Internet Exlporer Outlook Millennials Access Control Going Green Public Cloud IBM Data Warehousing Lifestyle Accountants MSP Vendor Management Sync Wireless Charging Shadow IT Books Cortana Wire iPhone Cast Google Docs Computer Accessories Conferencing Instant Messaging Thought Leadership Mouse Assessment Help Desk Recycling Enterprise Content Management IT Consultant Workforce Authentication Mobile Users Supercomputer User Error Best Practice Content File Sharing Telephony Fiber-Optic Hosted Solution Google Apps Smart Office Downtime Human Resources Bluetooth Netflix Wireless Regulations Amazon Search Twitter Administrator Television CrashOverride Virtual Reality eWaste Password Management Leadership Reputation Advertising Frequently Asked Questions Telecommuting Politics Nanotechnology Camera Audit Professional Services Transportation Current Events Monitor Colocation Software Tips Audiobook Practices Augmented Reality Hard Drives Skype Cables Robot Staff Regulation Amazon Web Services How to Addiction Public Computer Worker Commute Criminal NIST Chromecast Customers Excel Remote Work Smart Tech Printers Laptop Loyalty Computer Fan Microchip Meetings Password Manager Machine Learning Benefits Knowledge Video Games Hosted Computing Remote Worker Relocation Start Menu Unified Communications Files Multi-Factor Security Digital Signature Rootkit Online Shopping Troubleshooting Cache Cryptocurrency Tip of the week Scalability Experience Warranty Touchpad FENG Search Engine Data loss nonprofits GDPR E-Commerce Thank You Congratulations