(707) 268-8850    Get SUPPORT

Network Management Services Blog

Using Cortana Gets Better with Customization

Using Cortana Gets Better with Customization

As Cortana has more and more added to its functionality, it gradually becomes more of a utility to all. Those who prefer to use Google’s applications are now able to use Cortana to augment their use of Gmail, Google Contacts, and Google Calendar. Today, we’ll go through how you can set these programs up to play nice with Cortana.

For Cortana to work with Google apps, these apps must first be identified as a service. Access Cortana and click Notebook, and once the panel appears, access Connected Services and from there, Add service.

At this point, you will only be given an option for Gmail, but that includes Contacts and Calendar as well, in addition to Google Drive. After you next sign on to your Google account, your Connected Services menu will include Gmail as an option.

Privacy and Usage Disclaimers
Be warned, when you give Cortana access to your email and other services, you are opening your personal data to the assistant, and therefore, to Microsoft as well. You should definitely review the disclaimer that appears before connecting these accounts, as it will explain how your data is going to be used. If you have second thoughts after reading this disclaimer, you can be directed to where these integrations can be deactivated.

Since there isn’t any indication, as of yet, as to which of Cortana’s commands will work with these Google services, we are given the opportunity to speculate freely. What functions do you think Cortana will have in regard to Google’s apps? Give us your ideal list in the comments!

Tip of the Week: 5 Handy Android Shortcuts
Can Chargers Be Interchanged Between Devices?


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, August 19 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Cloud Best Practices Network Security Business Computing Privacy Managed IT Services Malware Data Backup Hackers Backup VoIP Google Hosted Solutions Innovation Mobile Devices Data Recovery Email Outsourced IT Tech Term IT Support Microsoft Data Cloud Computing Software Efficiency Saving Money Communications Hardware Internet of Things Internet BDR Business Continuity Cybersecurity Business Ransomware Cybercrime Small Business IT Services User Tips Smartphones Disaster Recovery Android Artificial Intelligence Network Server Avoiding Downtime Managed IT Services Computers Managed IT Communication Smartphone Windows Gadgets Alert How To Browser Miscellaneous Router Business Intelligence Social Media BYOD Business Management Data Security Data Protection Mobile Device Management Money Two-factor Authentication Save Money Vulnerability Chrome Passwords Phishing Productivity Mobility Social Engineering Law Enforcement Collaboration Office 365 Remote Monitoring Document Management Upgrade Operating System Proactive IT Virtualization IT Support Windows 10 Facebook Spam Applications Redundancy Identity Theft VPN Blockchain Compliance Computer Flexibility Managed Service Provider Firewall Telephone Systems Private Cloud Word Budget Productivity Connectivity Bandwidth Website Work/Life Balance File Sharing Data storage Value CES Networking Spam Blocking Bring Your Own Device Content Management Paperless Office Windows 10 Access Control Data loss Hacking Smart Tech Wi-Fi OneNote Office Tips Comparison IT Management Mobile Device Physical Security Credit Cards Workers Windows 7 Automation Analysis App Government Solid State Drive IT Plan Apps Data Breach Update Google Drive Holiday Microsoft Office Password Infrastructure Content Filtering Quick Tips Business Owner Unsupported Software Information Technology Big Data Data Storage Public Cloud Information Servers Employer-Employee Relationship Hosted Solution Root Cause Analysis Botnet Reputation Internet Exlporer Conferencing Excel Workforce Apple Password Manager FENG Start Menu Digital Signature Machine Learning Electronic Medical Records Network Congestion Enterprise Content Management Software Tips Mobile Computing Cables Devices Smart Office Education Google Docs Hybrid Cloud Amazon Web Services Inventory Legal Risk Management Managed Service Flash Recovery Meetings Travel Customer End of Support IoT Business Technology Tip of the week Telecommuting Hard Drives iPhone Business Mangement Addiction Mobile Monitor History Encryption YouTube IT Consultant Save Time Password Management Unified Communications Thought Leadership Supercomputer Data Warehousing Voice over Internet Protocol Online Shopping Unified Threat Management Windows 10s Cache Emergency Internet exploMicrosoft HaaS Virtual Assistant Windows Server 2008 Remote Work Gmail Professional Services Strategy Leadership NIST HBO Theft Streaming Media SaaS Sync Cortana Students Multi-Factor Security Office Evernote Authentication Cleaning Netflix HIPAA Recycling Wireless Internet Patch Management Augmented Reality Screen Mirroring Software as a Service Advertising Insurance Training Entertainment Telephone System Wireless Technology Workplace Tips USB CrashOverride Tools User Error Cryptocurrency Outlook Specifications Google Apps Content Filter Audit Telephony Colocation Human Resources Healthcare Current Events IBM Trending Relocation Wireless Charging Nanotechnology Computer Care Settings Safety eWaste Wire Scam PDF The Internet of Things Black Market Cast Fraud Practices Marketing Hacker Regulations Hiring/Firing Health Downtime Accountants webinar Data Management Safe Mode Frequently Asked Questions Millennials Storage Computer Fan Skype Computing Infrastructure Staff Electronic Health Records Knowledge HVAC Lifestyle Humor Fiber-Optic Samsung Keyboard MSP Criminal Sports Amazon Hosted Computing Charger Emails Files Books Television How to Users Techology Twitter Administration Customer Service Remote Computing Experience Remote Worker Benefits Webinar Mobile Office Public Computer Domains Worker Content Music Wiring Search Loyalty Scalability Wireless Smart Technology IT solutions Best Practice Politics Proactive Public Speaking Shadow IT Rootkit Audiobook Presentation Wearable Technology Company Culture Employer Employee Relationship Virtual Reality Lithium-ion battery Remote Monitoring and Maintenance 5G Managing Stress Computer Accessories Tech Support Automobile Two Factor Authentication Worker Commute Line of Business Vendor Management Regulation Assessment Instant Messaging Troubleshooting Bluetooth Customer Relationship Management Fun Competition Video Games Transportation Battery WiFi IP Address