(707) 268-8850    Get SUPPORT

Network Management Services Blog

Using Cortana Gets Better with Customization

Using Cortana Gets Better with Customization

As Cortana has more and more added to its functionality, it gradually becomes more of a utility to all. Those who prefer to use Google’s applications are now able to use Cortana to augment their use of Gmail, Google Contacts, and Google Calendar. Today, we’ll go through how you can set these programs up to play nice with Cortana.

For Cortana to work with Google apps, these apps must first be identified as a service. Access Cortana and click Notebook, and once the panel appears, access Connected Services and from there, Add service.

At this point, you will only be given an option for Gmail, but that includes Contacts and Calendar as well, in addition to Google Drive. After you next sign on to your Google account, your Connected Services menu will include Gmail as an option.

Privacy and Usage Disclaimers
Be warned, when you give Cortana access to your email and other services, you are opening your personal data to the assistant, and therefore, to Microsoft as well. You should definitely review the disclaimer that appears before connecting these accounts, as it will explain how your data is going to be used. If you have second thoughts after reading this disclaimer, you can be directed to where these integrations can be deactivated.

Since there isn’t any indication, as of yet, as to which of Cortana’s commands will work with these Google services, we are given the opportunity to speculate freely. What functions do you think Cortana will have in regard to Google’s apps? Give us your ideal list in the comments!

Tip of the Week: 5 Handy Android Shortcuts
Can Chargers Be Interchanged Between Devices?
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, November 17 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Cloud Best Practices Network Security Business Computing Privacy Managed IT Services Hackers Malware Data Backup Hosted Solutions Innovation Backup Mobile Devices VoIP Email Google Data Data Recovery Outsourced IT Tech Term IT Support Microsoft Software Internet of Things Saving Money Cloud Computing Internet IT Services Business Continuity Efficiency Communications BDR Hardware Communication Cybercrime Small Business Cybersecurity Ransomware Smartphones Business Server Disaster Recovery Android User Tips Artificial Intelligence Avoiding Downtime How To Save Money Managed IT Gadgets Network Browser Computers Managed IT Services Alert Smartphone Windows Windows 10 Applications Two-factor Authentication Data Security Data Protection Computer Passwords Vulnerability Productivity Workplace Tips Mobility Business Management Money Collaboration Miscellaneous Chrome Social Media Router Firewall Phishing Business Intelligence BYOD Mobile Device Management Social Engineering Law Enforcement Identity Theft Productivity Redundancy Blockchain Bandwidth Remote Monitoring Operating System Flexibility Virtualization Proactive IT IT Support Budget Telephone Systems Connectivity Office 365 Word VPN Upgrade Compliance Document Management Managed Service Provider Spam Private Cloud Facebook Wi-Fi Quick Tips Content Filtering Smart Tech Public Cloud Employer-Employee Relationship Data loss Office Tips Data storage OneNote Mobile Device Comparison Credit Cards Information Value IT Management Analysis Apps App Networking Windows 7 File Sharing Microsoft Office Solid State Drive Bring Your Own Device Infrastructure Managed Service IT Plan Holiday Unified Threat Management Big Data Hacking Password Update Website Business Owner Sports Information Technology Unsupported Software Virtual Assistant Physical Security Data Storage Work/Life Balance Automation Servers Training Workers CES Government Mobile Computing Settings Windows 10 Google Drive Encryption Spam Blocking Content Management Paperless Office Data Breach Access Control Computing Infrastructure Mobile Gmail Cache Humor webinar Theft Streaming Media Samsung Data Warehousing HaaS Voice over Internet Protocol Strategy Knowledge Windows 10s Files Charger Emails Augmented Reality Reputation Internet Exlporer Students Apple Windows Server 2008 Remote Work Evernote Safe Mode Authentication Wireless Technology Professional Services Recycling MSP Wireless Internet HBO HIPAA HVAC Insurance Conferencing Sync Google Apps Content Filter IBM Hybrid Cloud Multi-Factor Security Entertainment Electronic Medical Records Network Congestion Safety The Internet of Things Customer Screen Mirroring End of Support Software as a Service Human Resources Healthcare Marketing Hacker Hard Drives iPhone USB Wireless Charging Nanotechnology Monitor CrashOverride History Tools eWaste Remote Worker Wire Outlook Specifications Fraud Enterprise Content Management Practices Audit PDF Telephony Black Market Storage Trending Accountants IT Consultant Cast Internet exploMicrosoft Data Management Staff Electronic Health Records Supercomputer Regulations Fiber-Optic Business Technology Downtime Criminal Wiring Emergency Frequently Asked Questions Millennials Keyboard Amazon Password Management Hosted Computing Cortana Computer Fan Skype Password Manager SaaS Office Lifestyle Leadership Cables Devices Cleaning Netflix Advertising Digital Signature Machine Learning Hosted Solution Root Cause Analysis User Error Botnet Camera Smart Office Patch Management Excel Workforce Amazon Web Services NIST Inventory FENG Colocation Start Menu Education Business Mangement Addiction Relocation Software Tips Legal Risk Management IoT Unified Communications Telephone System Thought Leadership Computer Care Google Docs YouTube Current Events Hiring/Firing Health Flash Recovery Meetings Travel Save Time Scam Tip of the week Telecommuting Online Shopping Cryptocurrency Presentation Line of Business Assessment Fun Best Practice Politics Bluetooth Regulation Audiobook Company Culture Lithium-ion battery Shadow IT Transportation Wearable Technology 5G Administration Virtual Reality Books Television Tech Support Managing Stress Webinar Automobile Benefits Worker Commute Public Computer Search Worker Loyalty Customer Relationship Management Competition IT solutions Smart Technology IP Address Instant Messaging Troubleshooting Rootkit Users Video Games Battery Proactive Twitter Customer Service Employer Employee Relationship Techology WiFi Mobile Office How to Domains Remote Computing Experience Wireless Remote Monitoring and Maintenance Computer Accessories Content Two Factor Authentication Vendor Management Public Speaking Printers Scalability Music