(707) 268-8850    Get SUPPORT

Network Management Services Blog

Using Cortana Gets Better with Customization

Using Cortana Gets Better with Customization

As Cortana has more and more added to its functionality, it gradually becomes more of a utility to all. Those who prefer to use Google’s applications are now able to use Cortana to augment their use of Gmail, Google Contacts, and Google Calendar. Today, we’ll go through how you can set these programs up to play nice with Cortana.

For Cortana to work with Google apps, these apps must first be identified as a service. Access Cortana and click Notebook, and once the panel appears, access Connected Services and from there, Add service.

At this point, you will only be given an option for Gmail, but that includes Contacts and Calendar as well, in addition to Google Drive. After you next sign on to your Google account, your Connected Services menu will include Gmail as an option.

Privacy and Usage Disclaimers
Be warned, when you give Cortana access to your email and other services, you are opening your personal data to the assistant, and therefore, to Microsoft as well. You should definitely review the disclaimer that appears before connecting these accounts, as it will explain how your data is going to be used. If you have second thoughts after reading this disclaimer, you can be directed to where these integrations can be deactivated.

Since there isn’t any indication, as of yet, as to which of Cortana’s commands will work with these Google services, we are given the opportunity to speculate freely. What functions do you think Cortana will have in regard to Google’s apps? Give us your ideal list in the comments!

Tip of the Week: 5 Handy Android Shortcuts
Can Chargers Be Interchanged Between Devices?


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, February 16 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Cloud Best Practices Network Security Business Computing Privacy Managed IT Services Hackers Malware Data Backup Innovation Backup VoIP Mobile Devices Hosted Solutions Google Email Outsourced IT Tech Term Data Recovery Data IT Support Saving Money Internet of Things Internet Microsoft Cloud Computing Software IT Services Business Continuity Efficiency Hardware Communications BDR Business Smartphones Ransomware Communication Small Business Cybercrime Cybersecurity User Tips Android Artificial Intelligence Server Disaster Recovery Alert Managed IT Services Network Computers Avoiding Downtime Smartphone Save Money How To Gadgets Windows Managed IT Browser Miscellaneous Business Intelligence Mobility Data Security Data Protection Social Media Windows 10 Business Management Collaboration Mobile Device Management Two-factor Authentication Vulnerability Router Computer Chrome BYOD Firewall Passwords Money Phishing Applications Productivity Workplace Tips Law Enforcement Social Engineering Telephone Systems Office 365 Proactive IT Connectivity IT Support Upgrade Remote Monitoring Spam Redundancy Virtualization Operating System Document Management Compliance VPN Identity Theft Facebook Blockchain Managed Service Provider Word Budget Productivity Bandwidth Flexibility Private Cloud Mobile Computing Value Solid State Drive Quick Tips Infrastructure Website Spam Blocking Employer-Employee Relationship Networking Holiday Public Cloud Bring Your Own Device Password Sports Data storage Business Owner Unified Threat Management Information Information Technology Windows 10 File Sharing Data loss Work/Life Balance CES Comparison OneNote Encryption Managed Service Wi-Fi IT Management Content Management Paperless Office Training Workers Windows 7 Access Control Hacking Smart Tech Settings IT Plan Virtual Assistant Automation Data Breach Apps Update Physical Security Government Credit Cards Content Filtering Office Tips Unsupported Software Mobile Device Analysis Microsoft Office Servers Data Storage Google Drive Big Data App Software Tips Humor Accountants FENG Start Menu Computing Infrastructure Storage Electronic Medical Records Network Congestion Staff Electronic Health Records Flash PDF Black Market Files Fiber-Optic Google Docs Safe Mode Tip of the week Telecommuting Apple Amazon Hosted Computing Meetings Travel Reputation Data Management Internet Exlporer Criminal Keyboard MSP Mobile Password Manager IT Consultant HVAC Hybrid Cloud Digital Signature Machine Learning Windows 10s Cables Devices Supercomputer Data Warehousing Voice over Internet Protocol Windows Server 2008 Remote Work Hard Drives iPhone Hosted Solution Amazon Web Services Inventory Emergency Customer End of Support Smart Office HBO IoT SaaS Remote Worker Professional Services Monitor History Business Mangement Addiction Leadership Enterprise Content Management Legal Risk Management YouTube Cleaning Netflix Sync Education Unified Communications Thought Leadership Multi-Factor Security Business Technology Recovery Online Shopping Patch Management Screen Mirroring Software as a Service Internet exploMicrosoft Augmented Reality Password Management Outlook Specifications Wiring CrashOverride Tools Save Time Gmail Cache Office Strategy Computer Care Audit Telephony Cortana Theft Streaming Media Current Events Wireless Technology Trending Students IBM Regulations Evernote Authentication Scam Safety Cast HaaS Advertising The Internet of Things NIST Frequently Asked Questions Millennials Insurance Marketing Hacker Camera Downtime User Error Recycling Wireless Internet webinar Lifestyle Relocation HIPAA Samsung Computer Fan Skype Colocation Google Apps Content Filter Knowledge Human Resources Healthcare Charger Emails Telephone System Hiring/Firing Health Wireless Charging Nanotechnology Entertainment Cryptocurrency Excel Workforce USB Fraud Practices Root Cause Analysis Botnet eWaste Wire Conferencing Fun Users Line of Business Worker Commute Webinar Customer Service Regulation Benefits Worker Instant Messaging Troubleshooting Public Computer Mobile Office Video Games Loyalty Administration Twitter Domains IT solutions Battery Smart Technology Wireless Rootkit How to Techology Search Remote Computing Experience Employer Employee Relationship Public Speaking Presentation Lithium-ion battery Content Scalability Music Computer Accessories Best Practice Politics Company Culture Tech Support Proactive Two Factor Authentication 5G Vendor Management Shadow IT Audiobook Wearable Technology Assessment Bluetooth Managing Stress Remote Monitoring and Maintenance Virtual Reality Customer Relationship Management Transportation Competition WiFi Books Television IP Address Printers Automobile