Male Rep 3V1

 

 "Exceeding Customer Expectations"

Have IT Questions?
Call us now (888) 894-6411

Blog

TWINTEL Solutions has been serving the Orange County, Los Angeles County, Riverside County, and San Diego County, areas. Since 2005, TWINTEL has provided IT Support such as technical help desk support, computer support, and overall IT consulting to small and medium-sized businesses.

Using Cortana Gets Better with Customization

Using Cortana Gets Better with Customization

As Cortana has more and more added to its functionality, it gradually becomes more of a utility to all. Those who prefer to use Google’s applications are now able to use Cortana to augment their use of Gmail, Google Contacts, and Google Calendar. Today, we’ll go through how you can set these programs up to play nice with Cortana.

For Cortana to work with Google apps, these apps must first be identified as a service. Access Cortana and click Notebook, and once the panel appears, access Connected Services and from there, Add service.

At this point, you will only be given an option for Gmail, but that includes Contacts and Calendar as well, in addition to Google Drive. After you next sign on to your Google account, your Connected Services menu will include Gmail as an option.

Privacy and Usage Disclaimers
Be warned, when you give Cortana access to your email and other services, you are opening your personal data to the assistant, and therefore, to Microsoft as well. You should definitely review the disclaimer that appears before connecting these accounts, as it will explain how your data is going to be used. If you have second thoughts after reading this disclaimer, you can be directed to where these integrations can be deactivated.

Since there isn’t any indication, as of yet, as to which of Cortana’s commands will work with these Google services, we are given the opportunity to speculate freely. What functions do you think Cortana will have in regard to Google’s apps? Give us your ideal list in the comments!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 22 May 2018
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

QR-Code

Our 10 Benefits

Our 10 Benefits Whitepaper

This whitepaper will evaluate the differences between traditional technical support practices and modern managed IT practices and the pros and cons of both in regards to small and medium-sized businesses.

Download Now!   Need A Consultation?

Tag Cloud

Security Tip of the Week Privacy Cloud Best Practices Technology Business Computing Hackers Network Security Backup Malware Hosted Solutions roundup nonprofit Microsoft Software bgc Google Disaster Recovery Managed IT Services VoIP Email Alert Business Mobile Devices Business Continuity Internet Outsourced IT Data Windows 10 Ransomware Smartphones Innovation Saving Money Hardware Android communications Browser IT Services Cybercrime Server Computers Efficiency Small Business IT Support Managed IT Services Data Backup Smartphone Business Management Productivity Computer Office Cloud Computing Managed IT Cybersecurity Internet of Things BYOD Windows Passwords User Tips Mobile Device Management Quick Tips Social Engineering Telephone Systems BDR Recovery Collaboration Law Enforcement Productivity Save Money Mobility Data Recovery Communication Work/Life Balance Phishing Hacking Vulnerability Money Network Virtualization Two-factor Authentication Miscellaneous Bring Your Own Device Upgrade Artificial Intelligence Flexibility Data Protection Avoiding Downtime How To Firewall Health Chrome Social Media Remote Monitoring Private Cloud Bandwidth Tech Term Office Tips Budget Automation IT Support App Managed Service Provider Wi-Fi VPN Holiday Proactive IT Google Drive Remote Computing HaaS Operating System Apps Black Market Compliance Data Security Office 365 Data Breach Applications Information Technology Gadgets Facebook History Mobile Device Value Safety Password Redundancy Identity Theft Business Intelligence Microsoft Office Windows 10 Credit Cards Marketing Word Save Time OneNote Risk Management Automobile Charger Unsupported Software Electronic Medical Records Infrastructure Data Management End of Support Employer-Employee Relationship Battery Keyboard Spam Blocking Content Filtering Comparison Hiring/Firing Update Cleaning Workplace Tips Emergency PDF The Internet of Things Solid State Drive Legal Computer Care Patch Management HIPAA Samsung Spam Scam Router Physical Security Mobile Computing Data Storage Wireless Technology Worker IT Management Business Owner Data storage IT Plan CES SaaS Government Workers Big Data Computing Infrastructure Windows Server 2008 Shadow IT Two Factor Authentication Access Control Chromecast Cortana Vendor Management Assessment Data Warehousing Books Hacker Blockchain Lifestyle Fraud IT Consultant Windows 7 Authentication Apple Google Apps Settings Mobile Television Hosted Solution Internet Exlporer Human Resources CrashOverride Amazon Leadership Regulations Politics iPhone Professional Services Public Computer Software Tips Going Green Staff Meetings Nanotechnology YouTube Amazon Web Services Password Manager Software as a Service Unified Threat Management Scalability Advertising Digital Signature Data loss Smart Tech Online Shopping Servers Education Downtime Hard Drives Reputation Experience Business Mangement Windows 10s HBO Encryption Specifications Connectivity Relocation Evernote webinar Flash Employer Employee Relationship Robot Customers Files Gmail Public Cloud WiFi Screen Mirroring IBM Outlook Instant Messaging Laptop Accountants Millennials Devices Humor Wireless Charging Conferencing Sync Users Computer Accessories Best Practice Recycling Google Docs Content Cast Supercomputer Search Touchpad Sports Workforce Thought Leadership NarrowBand Fiber-Optic Netflix Telephony Virtual Reality Bluetooth eWaste Audit Website Twitter Current Events Frequently Asked Questions How to Transportation Practices Telecommuting Cables Skype Worker Commute Audiobook Video Games USB User Error Criminal Computer Fan Voice over Internet Protocol Loyalty Remote Work Addiction Knowledge Excel Benefits Wireless Hosted Computing Unified Communications Start Menu Rootkit Entertainment Troubleshooting Colocation FENG Multi-Factor Security Network Congestion Tip of the week Smart Technology Inventory Theft Tools Document Management Training Monitor Techology Content Management Trending Wireless Internet Thank You Congratulations Cache nonprofits