Male Rep3

 

 "IT Solutions to Advance your Company"

Have IT Questions?
Call us now (888) 894-6411

Blog

Using Cortana Gets Better with Customization

Using Cortana Gets Better with Customization

As Cortana has more and more added to its functionality, it gradually becomes more of a utility to all. Those who prefer to use Google’s applications are now able to use Cortana to augment their use of Gmail, Google Contacts, and Google Calendar. Today, we’ll go through how you can set these programs up to play nice with Cortana.

For Cortana to work with Google apps, these apps must first be identified as a service. Access Cortana and click Notebook, and once the panel appears, access Connected Services and from there, Add service.

At this point, you will only be given an option for Gmail, but that includes Contacts and Calendar as well, in addition to Google Drive. After you next sign on to your Google account, your Connected Services menu will include Gmail as an option.

Privacy and Usage Disclaimers
Be warned, when you give Cortana access to your email and other services, you are opening your personal data to the assistant, and therefore, to Microsoft as well. You should definitely review the disclaimer that appears before connecting these accounts, as it will explain how your data is going to be used. If you have second thoughts after reading this disclaimer, you can be directed to where these integrations can be deactivated.

Since there isn’t any indication, as of yet, as to which of Cortana’s commands will work with these Google services, we are given the opportunity to speculate freely. What functions do you think Cortana will have in regard to Google’s apps? Give us your ideal list in the comments!

Tip of the Week: 5 Handy Android Shortcuts
Can Chargers Be Interchanged Between Devices?

Related Posts

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, August 21 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code

Our 10 Benefits

Our 10 Benefits Whitepaper

This whitepaper will evaluate the differences between traditional technical support practices and modern managed IT practices and the pros and cons of both in regards to small and medium-sized businesses.

Download Now!   Need A Consultation?

Tag Cloud

Security Tip of the Week Best Practices Cloud Privacy Technology Business Computing Backup Hackers Network Security Malware Hosted Solutions Google VoIP Microsoft roundup nonprofit Software Email Mobile Devices bgc Data Alert Disaster Recovery Managed IT Services Business Continuity Outsourced IT Business Internet communications Windows 10 Innovation Hardware Smartphones Ransomware Tech Term IT Services Android Managed IT Services Saving Money Browser Data Backup Cybercrime Computers Server Small Business Efficiency Cloud Computing Computer IT Support Office User Tips Save Money Business Management Data Recovery Smartphone Productivity Network Windows Internet of Things BDR Passwords Recovery Cybersecurity IT Support Mobile Device Management Miscellaneous Managed IT Quick Tips Telephone Systems BYOD Money Social Engineering Virtualization Collaboration Applications Social Media Gadgets Hacking Upgrade Law Enforcement Communication Phishing Facebook Artificial Intelligence Mobility Work/Life Balance Productivity Vulnerability Office 365 Health Remote Monitoring Proactive IT Private Cloud Microsoft Office How To Bring Your Own Device Bandwidth Data Protection Compliance Chrome Budget Flexibility Automation Firewall Router Office Tips App Managed Service Provider Two-factor Authentication Avoiding Downtime Wi-Fi Password Holiday VPN Word Redundancy Workplace Tips Remote Computing Value Connectivity HaaS Google Drive Information Technology Mobile Device Apps History Data Breach Data Security Black Market Windows 10 Safety Operating System Identity Theft Business Intelligence Scam Charger Big Data The Internet of Things Document Management Electronic Medical Records Windows 7 Legal Spam Information PDF Worker HIPAA Unsupported Software Government CES Save Time Computing Infrastructure Risk Management Employer-Employee Relationship Data Storage Website Solid State Drive Sports Marketing Spam Blocking Encryption Automobile Content Management Hiring/Firing IT Management SaaS Mobile Computing Cleaning Data Management Physical Security Training USB Workers Wireless Technology Comparison Blockchain Servers Keyboard YouTube IT Plan Entertainment Update Battery Computer Care Content Filtering Patch Management End of Support Business Owner OneNote Infrastructure Paperless Office Samsung Emergency Data storage Credit Cards Supercomputer Wireless Addiction Settings Outlook Downtime Millennials Staff Regulation Sync Reputation Wireless Charging Advertising Smart Tech Bluetooth Netflix Data Warehousing Lifestyle Criminal NIST Techology Television CrashOverride Hosted Computing Remote Worker Leadership Cast Google Docs Hard Drives Password Manager Machine Learning Audit Monitor Fraud Colocation Transportation Current Events Laptop Mobile Cache Shadow IT Books Chromecast Robot Workforce Digital Signature Telephony Customers Fiber-Optic Instant Messaging Cryptocurrency Public Computer Amazon Inventory Wiring Relocation Business Mangement HVAC Users Loyalty Computer Fan Regulations Best Practice Benefits Content Knowledge Touchpad Professional Services Wireless Internet Unified Threat Management Hosted Solution Frequently Asked Questions Telecommuting Files Managed Service Skype Cables Devices Search Rootkit NarrowBand Software Tips Safe Mode Amazon Web Services Hacker Access Control Politics Voice over Internet Protocol Humor Gmail Networking Virtual Reality FENG Smart Technology Audiobook Network Congestion Meetings Software as a Service Cortana Wire Windows 10s Excel Remote Work Accountants MSP Going Green Start Menu Unified Communications Thought Leadership How to Apple Virtual Assistant Online Shopping Internet Exlporer Authentication Employer Employee Relationship webinar Multi-Factor Security Recycling Enterprise Content Management Worker Commute File Sharing Video Games Two Factor Authentication Data loss Google Apps Smart Office Public Cloud Tip of the week IBM Tools Theft Twitter Vendor Management Troubleshooting HBO Specifications iPhone Human Resources Telephone System Flash Evernote Nanotechnology Scalability Computer Accessories Experience Conferencing Trending eWaste Password Management Assessment Practices Augmented Reality IT Consultant Screen Mirroring WiFi Education Windows Server 2008 User Error Congratulations nonprofits Thank You