Using Cortana Gets Better with Customization

Using Cortana Gets Better with Customization

As Cortana has more and more added to its functionality, it gradually becomes more of a utility to all. Those who prefer to use Google’s applications are now able to use Cortana to augment their use of Gmail, Google Contacts, and Google Calendar. Today, we’ll go through how you can set these programs up to play nice with Cortana.

For Cortana to work with Google apps, these apps must first be identified as a service. Access Cortana and click Notebook, and once the panel appears, access Connected Services and from there, Add service.

At this point, you will only be given an option for Gmail, but that includes Contacts and Calendar as well, in addition to Google Drive. After you next sign on to your Google account, your Connected Services menu will include Gmail as an option.

Privacy and Usage Disclaimers
Be warned, when you give Cortana access to your email and other services, you are opening your personal data to the assistant, and therefore, to Microsoft as well. You should definitely review the disclaimer that appears before connecting these accounts, as it will explain how your data is going to be used. If you have second thoughts after reading this disclaimer, you can be directed to where these integrations can be deactivated.

Since there isn’t any indication, as of yet, as to which of Cortana’s commands will work with these Google services, we are given the opportunity to speculate freely. What functions do you think Cortana will have in regard to Google’s apps? Give us your ideal list in the comments!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 24 February 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Privacy Technology Best Practices Cloud Software Microsoft Google Business computing Windows 10 Backup Network Security Hackers Malware Business Smartphones Alert Small Business Business Continuity Innovation Android Managed IT Services Hardware Data Browser Email Office Hosted Solutions Disaster Recovery Internet Computer VoIP Ransomware Outsourced IT Computers Business Management Efficiency Data Backup Law Enforcement Cybercrime Virtualization Cloud Computing Productivity Mobile Devices How To Telephone Systems Chrome User Tips Smartphone Productivity Password Social Media Collaboration Cybersecurity Quick Tips Windows Managed IT Services Work/Life Balance Money IT Services Social Engineering Communications Miscellaneous App Passwords Health Private Cloud Hacking Holiday Wi-Fi Google Drive Data Recovery HaaS Communication Artificial Intelligence IT Support Two-factor Authentication Windows 10 Bring Your Own Device Facebook Office 365 Office Tips Data Breach Router Upgrade Spam Value Remote Computing Government Mobile Device Management Redundancy Gadgets Avoiding Downtime Public Cloud Marketing Internet of Things Automobile Data Security CES Data Management History Workplace Tips Remote Monitoring Worker Big Data Apps Flexibility PDF Battery Electronic Medical Records Server Data Storage Mobility Managed Service Provider OneNote Microsoft Office Employer-Employee Relationship IT Management Spam Blocking Legal Charger Phishing Keyboard IT Plan Operating System Network Patch Management Automation Comparison Saving Money Word End of Support Unsupported Software Scam Computer Care Vulnerability Samsung Business Intelligence Emails Advertising Wearable Technology Online Shopping How to BYOD Flash Solid State Drive Wireless Benefits eWaste Worker Commute Entertainment Millennials Travel Meetings Computer Accessories Networking USB Evernote Black Market Audit Firewall Criminal Loyalty Workforce Scalability Techology Bluetooth Current Events IT solutions Troubleshooting Wireless Charging Physical Security Sync Computer Fan Smart Technology SaaS Google Docs Files BDR Data loss Knowledge IT Support Hybrid Cloud Cortana The Internet of Things Two Factor Authentication Website Risk Management Telecommuting Screen Mirroring Network Congestion HBO Google Apps Apple Telephony FENG Content Management Assessment Voice over Internet Protocol IT Consultant Politics Remote Work Instant Messaging Recovery Cast Rootkit Outlook Settings Books Workers iPhone Skype Blockchain Television Leadership User Error Identity Theft Relocation Update Training Frequently Asked Questions Infrastructure Education Multi-Factor Security Start Menu Save Money HIPAA Public Computer Monitor Vendor Management Credit Cards Excel Information Technology Emergency Password Manager Computing Infrastructure Trending Tools Save Time Human Resources Internet Exlporer Fraud Humor Tip of the week Business Mangement Applications Best Practice Downtime Staff Data storage Cleaning webinar Experience Amazon Windows Server 2008 Windows 10s Gmail Users Content Specifications Mobile Device Managed IT Root Cause Analysis Hiring/Firing Data Protection Safety Conferencing Internet exploMicrosoft Music Amazon Web Services Search Software Tips Windows 7 Transportation Recycling Virtual Reality Audiobook Video Games Botnet Employer Employee Relationship Digital Signature Bandwidth Congratulations Encryption Webinar WiFi CrashOverride Thank You

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Digital Hold The Case for Hosting Your Phone Solution In-House
24 February 2018
Informative Blog. Thanks a lot for the useful info.
Maria Albert Download the Wrong App and Have More Than Pokémon Fever Infect Your Device
26 September 2017
Occasionally I strive to not concentrate such these kinds of articles and neglect reading like these...
nathan dwyer Your Guide To Mobile Device Management as an SMB
07 September 2017
I come here after quite a while since 2016 and entire this term i have miss the chance to get inform...