253.777.0763    Get SUPPORT

Using Cortana Gets Better with Customization

Using Cortana Gets Better with Customization

As Cortana has more and more added to its functionality, it gradually becomes more of a utility to all. Those who prefer to use Google’s applications are now able to use Cortana to augment their use of Gmail, Google Contacts, and Google Calendar. Today, we’ll go through how you can set these programs up to play nice with Cortana.

For Cortana to work with Google apps, these apps must first be identified as a service. Access Cortana and click Notebook, and once the panel appears, access Connected Services and from there, Add service.

At this point, you will only be given an option for Gmail, but that includes Contacts and Calendar as well, in addition to Google Drive. After you next sign on to your Google account, your Connected Services menu will include Gmail as an option.

Privacy and Usage Disclaimers
Be warned, when you give Cortana access to your email and other services, you are opening your personal data to the assistant, and therefore, to Microsoft as well. You should definitely review the disclaimer that appears before connecting these accounts, as it will explain how your data is going to be used. If you have second thoughts after reading this disclaimer, you can be directed to where these integrations can be deactivated.

Since there isn’t any indication, as of yet, as to which of Cortana’s commands will work with these Google services, we are given the opportunity to speculate freely. What functions do you think Cortana will have in regard to Google’s apps? Give us your ideal list in the comments!

Tip of the Week: 5 Handy Android Shortcuts
Can Chargers Be Interchanged Between Devices?
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, August 17 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Internet BDR Upgrade Telephone Systems Productivity VoIP Facebook Efficiency Connectivity Data Storage Servers Google Drive Smart Office Data loss HBO Data Recovery Data Security Online Shopping Botnet Supercomputer NIST Microsoft Office Document Management Word Employer-Employee Relationship Passwords Network Security Hybrid Cloud Business Mobile Devices Hardware Two-factor Authentication Smartphone Audit Privacy IT Support Samsung Bring Your Own Device Communications Holiday FCC Computer Care Credit Cards Computers Budget Server IT Plan Social Media Travel Flash Software Infrastructure Android Public Cloud Automation Networking Vulnerability Title II Password Manager Windows 10 Internet Exlporer Update Addiction Smartphones Google Windows Business Computing Quick Tips The Internet of Things Hiring/Firing Windows 10 Work/Life Balance Business Management Best Practices Applications OneNote Screen Mirroring Mobile Device Management Hosted Solutions Downtime Leadership User Tips Files Smart Tech Email USB Government CES How To Managed IT Services History Gadgets Save Money Law Enforcement Collaboration Inventory Workers Flexibility Hackers Productivity Alert Spam Blocking Office 365 Unsupported Software Computer Identity Theft Malware Business Intelligence Internet of Things Managed IT Services Big Data Operating System Microsoft Apple Security Miscellaneous Communication Cybercrime Saving Money Bandwidth Evernote Network Private Cloud Solid State Drive Legal Cloud Tech Term Managing Stress Data Management Business Continuity Cache Router Health Office Redundancy Safety Social Engineering BYOD Phishing VPN Data Browser Paperless Office End of Support Website Start Menu Skype Blockchain Windows 7 Ransomware IBM IT Management Google Docs Specifications Content Management Small Business Net Neutrality Relocation Digital Signature Patch Management Software Tips Artificial Intelligence Comparison Outlook IT Services Humor HaaS Managed IT Remote Monitoring Cloud Computing Innovation App Data Breach Settings Information Cybersecurity Disaster Recovery Marketing Wi-Fi eWaste Password Encryption Cryptocurrency Spam Backup Chrome Money Hosted Computing Technology Virtualization Data Protection Outsourced IT HIPAA Avoiding Downtime Tip of the Week Practices Apps Data Backup IT Consultant Criminal

Newsletter Sign Up