shutterstock 9311 TEST SIZE V3 051016


 "Fast Response Times and Resolutions."

Have IT Questions?
Call us now (888) 894-6411

TWINTEL Solutions Blog

Using Cortana Gets Better with Customization

Using Cortana Gets Better with Customization

As Cortana has more and more added to its functionality, it gradually becomes more of a utility to all. Those who prefer to use Google’s applications are now able to use Cortana to augment their use of Gmail, Google Contacts, and Google Calendar. Today, we’ll go through how you can set these programs up to play nice with Cortana.

For Cortana to work with Google apps, these apps must first be identified as a service. Access Cortana and click Notebook, and once the panel appears, access Connected Services and from there, Add service.

At this point, you will only be given an option for Gmail, but that includes Contacts and Calendar as well, in addition to Google Drive. After you next sign on to your Google account, your Connected Services menu will include Gmail as an option.

Privacy and Usage Disclaimers
Be warned, when you give Cortana access to your email and other services, you are opening your personal data to the assistant, and therefore, to Microsoft as well. You should definitely review the disclaimer that appears before connecting these accounts, as it will explain how your data is going to be used. If you have second thoughts after reading this disclaimer, you can be directed to where these integrations can be deactivated.

Since there isn’t any indication, as of yet, as to which of Cortana’s commands will work with these Google services, we are given the opportunity to speculate freely. What functions do you think Cortana will have in regard to Google’s apps? Give us your ideal list in the comments!

Tip of the Week: 5 Handy Android Shortcuts
Can Chargers Be Interchanged Between Devices?


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, February 20 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!


Our 10 Benefits

Our 10 Benefits Whitepaper

This whitepaper will evaluate the differences between traditional technical support practices and modern managed IT practices and the pros and cons of both in regards to small and medium-sized businesses.

Download Now!   Need A Consultation?

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Privacy Business Computing Hackers Network Security Hosted Solutions Backup Malware Mobile Devices Google Data VoIP Microsoft Business Disaster Recovery Internet roundup Email Software nonprofit Business Continuity bgc communications User Tips IT Services Managed IT Services Outsourced IT Alert Innovation Hardware Smartphones Data Backup Productivity Tech Term Browser Managed IT Services Windows 10 Efficiency Data Recovery Ransomware Computer Server Smartphone Saving Money Cloud Computing Internet of Things Cybercrime IT Support Android Workplace Tips Network BDR IT Support Communication Computers Small Business Business Management Windows Passwords Cybersecurity Office Save Money Miscellaneous Productivity Quick Tips Artificial Intelligence Router Telephone Systems BYOD Money Social Engineering Managed IT Mobile Device Recovery Mobility Gadgets Mobile Device Management Chrome Holiday Windows 10 Applications Vulnerability Health Firewall Proactive IT Private Cloud Social Media Work/Life Balance Wi-Fi Phishing Upgrade Law Enforcement Office 365 Hacking Virtualization Facebook Automation Collaboration Managed Service Provider Office Tips Avoiding Downtime Data Protection Information Budget Flexibility VPN How To Compliance App Bandwidth Microsoft Office Bring Your Own Device Password Google Drive Remote Monitoring Word Two-factor Authentication Black Market HaaS Save Time Safety Spam Operating System Settings Scam Value Connectivity Redundancy Apps Remote Computing Encryption Managed Service Voice over Internet Protocol Keyboard Software as a Service Data Security Servers Identity Theft Sports Information Technology Mobile Computing Data Breach Business Intelligence History Infrastructure Legal Paperless Office YouTube Physical Security Patch Management Windows 7 Fraud HIPAA OneNote Google Docs Risk Management Samsung Unsupported Software Machine Learning Charger Telephony End of Support Data Storage Website Automobile Electronic Medical Records CES Data storage The Internet of Things Worker USB IT Management Data Management Employer-Employee Relationship Content Management Comparison Entertainment Unified Threat Management Spam Blocking Access Control Battery Content Filtering Government PDF IT Plan Hiring/Firing Blockchain Virtual Assistant Computing Infrastructure SaaS Update Business Owner Solid State Drive Cleaning Marketing Emergency Training Workers Big Data Credit Cards Human Resources Telephone System Hacker WiFi Document Management Wireless Technology Computer Care Data Warehousing Lifestyle Apple Smartwatch Vendor Management Sync Wireless Charging Practices Shadow IT Augmented Reality Books IBM Social Computer Accessories Conferencing Staff Instant Messaging Regulation Internet Exlporer Assessment Cast Addiction Workforce Criminal NIST Mobile Smart Tech Users Printers Microchip IT Consultant Password Manager Best Practice iPhone Content Employee Fiber-Optic Hosted Computing Remote Worker Hosted Solution Supercomputer Vendor Bluetooth Netflix Regulations Amazon Digital Signature Search Television CrashOverride Cache Leadership Frequently Asked Questions Telecommuting Cryptocurrency User Error Politics Audit Professional Services Virtual Reality Warranty Search Engine Software Tips Business Mangement Downtime HVAC Audiobook Digital Signage Skype Cables Inventory Wiring Wireless Transportation Current Events Display Amazon Web Services Reputation How to Advertising Public Computer Wireless Internet Bing Excel Remote Work Monitor Safe Mode Colocation Chromecast Loyalty Computer Fan Meetings Devices Worker Commute Printer Hard Drives Laptop Gmail Robot Video Games Networking Google Search Start Menu Unified Communications Benefits Knowledge Wire Security Cameras Rootkit Online Shopping Accountants Customers MSP Troubleshooting Multi-Factor Security Cortana Help Desk Tip of the week Scalability Experience FENG Data loss Thought Leadership Relocation Mouse Touchpad HBO Specifications Recycling Enterprise Content Management Files NarrowBand Net Neutrality Windows 10s Tools Theft Authentication Education Smart Technology Network Congestion Google Apps Smart Office Botnet Flash Evernote File Sharing Trending Shortcuts Employer Employee Relationship webinar Windows Server 2008 Screen Mirroring Techology Twitter Humor Administrator Outlook Millennials eWaste Password Management ISP Public Cloud Nanotechnology Camera Going Green Two Factor Authentication Thank You Congratulations GDPR E-Commerce nonprofits