253.777.0763    Get SUPPORT

Graemouse Technologies Blog

Graemouse Technologies has been serving the Lakewood & Tacoma area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Using Cortana Gets Better with Customization

Using Cortana Gets Better with Customization

As Cortana has more and more added to its functionality, it gradually becomes more of a utility to all. Those who prefer to use Google’s applications are now able to use Cortana to augment their use of Gmail, Google Contacts, and Google Calendar. Today, we’ll go through how you can set these programs up to play nice with Cortana.

For Cortana to work with Google apps, these apps must first be identified as a service. Access Cortana and click Notebook, and once the panel appears, access Connected Services and from there, Add service.

At this point, you will only be given an option for Gmail, but that includes Contacts and Calendar as well, in addition to Google Drive. After you next sign on to your Google account, your Connected Services menu will include Gmail as an option.

Privacy and Usage Disclaimers
Be warned, when you give Cortana access to your email and other services, you are opening your personal data to the assistant, and therefore, to Microsoft as well. You should definitely review the disclaimer that appears before connecting these accounts, as it will explain how your data is going to be used. If you have second thoughts after reading this disclaimer, you can be directed to where these integrations can be deactivated.

Since there isn’t any indication, as of yet, as to which of Cortana’s commands will work with these Google services, we are given the opportunity to speculate freely. What functions do you think Cortana will have in regard to Google’s apps? Give us your ideal list in the comments!

Tip of the Week: 5 Handy Android Shortcuts
Can Chargers Be Interchanged Between Devices?
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 23 February 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

eWaste Windows 10 Network Collaboration Saving Money Gadgets Business Continuity Microsoft Server Communication Hiring/Firing OneNote Word CES Privacy Legal Phishing Multi-Factor Security Managed IT Services Emails Tip of the Week Two-factor Authentication Cloud Computing Netflix FCC Hybrid Cloud Chrome IT Support Voice over Internet Protocol Internet of Things Operating System Data Breach Scam Hardware Mobile Device Management Avoiding Downtime Microsoft Office Android Disaster Recovery Outsourced IT Spam Bring Your Own Device iPhone Technology Work/Life Balance Business Public Cloud Audit Router Computer Fan Facebook Redundancy Google Docs Google Communications Relocation Skype Bandwidth Remote Work Net Neutrality Cybersecurity Telephone Systems HIPAA Google Apps Money Private Cloud Blockchain Productivity Title II Website Humor Alert FENG Data Storage Managed IT Network Congestion Solid State Drive Travel PDF Wi-Fi Password Manager Value Business Management HBO Tools Law Enforcement Office VoIP Social Engineering Backup Budget Unsupported Software Networking Vulnerability Smartphones Internet Remote Monitoring Health Email Best Practices Cortana Office 365 Flexibility Cloud Spam Blocking Mobile Devices Content Management Frequently Asked Questions Settings Digital Signature Efficiency Apps Data Keyboard Small Business Government The Internet of Things Botnet Samsung Browser Business Computing Windows Computer Care Tip of the week Employer-Employee Relationship Hosted Solutions Excel Windows 7 IT Services Smartphone Google Drive Passwords Specifications Online Shopping Flash Physical Security How To Outlook Start Menu Innovation BDR Social Media Wireless Charging Online Upgrade Artificial Intelligence Supercomputer Advertising Telecommuting Managed IT Services Infrastructure Network Security Virtualization Identity Theft Patch Management Software Windows Server 2008 Trending Hackers Data Management IBM Marketing Safety Current Events Windows 10s Managed Service Provider Files Cybercrime History IT Management Evernote App Data loss Security Data Backup Productivity Automation Criminal Ransomware IT Plan Computer Internet exploMicrosoft Comparison Charger Conferencing Malware Credit Cards Workers Knowledge Data Recovery Computers Cast User Tips Screen Mirroring User Error Meetings IT Consultant Windows 10 Business Intelligence Data Security

Newsletter Sign Up