Infracore LLC Blog

Using Cortana Gets Better with Customization

Using Cortana Gets Better with Customization

As Cortana has more and more added to its functionality, it gradually becomes more of a utility to all. Those who prefer to use Google’s applications are now able to use Cortana to augment their use of Gmail, Google Contacts, and Google Calendar. Today, we’ll go through how you can set these programs up to play nice with Cortana.

For Cortana to work with Google apps, these apps must first be identified as a service. Access Cortana and click Notebook, and once the panel appears, access Connected Services and from there, Add service.

At this point, you will only be given an option for Gmail, but that includes Contacts and Calendar as well, in addition to Google Drive. After you next sign on to your Google account, your Connected Services menu will include Gmail as an option.

Privacy and Usage Disclaimers
Be warned, when you give Cortana access to your email and other services, you are opening your personal data to the assistant, and therefore, to Microsoft as well. You should definitely review the disclaimer that appears before connecting these accounts, as it will explain how your data is going to be used. If you have second thoughts after reading this disclaimer, you can be directed to where these integrations can be deactivated.

Since there isn’t any indication, as of yet, as to which of Cortana’s commands will work with these Google services, we are given the opportunity to speculate freely. What functions do you think Cortana will have in regard to Google’s apps? Give us your ideal list in the comments!

Tip of the Week: 5 Handy Android Shortcuts
Can Chargers Be Interchanged Between Devices?
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, October 20 2018

Captcha Image

Tag Cloud

Tip of the Week Security Technology Privacy Best Practices Cloud Business computing Network Security Google Malware Hackers Microsoft Software Innovation Internet Data Hardware Backup Smartphones Tech Term Email Windows 10 Browser Hosted Solutions Business Continuity Computer Business VoIP Android Mobile Devices Data Backup Workplace Tips IT Services Managed IT Services Small Business User Tips Alert Miscellaneous Communications Smartphone Office Ransomware Outsourced IT Computers Business Management Disaster Recovery Cloud Computing Productivity Data Recovery Artificial Intelligence Communication Efficiency Law Enforcement Cybercrime Productivity Network Money Passwords Router Telephone Systems Managed IT Services Social Media Internet of Things Chrome Collaboration Cybersecurity Windows 10 How To Password Applications Facebook Virtualization Windows Upgrade Work/Life Balance Health Server App Gadgets Social Engineering Office 365 Saving Money Quick Tips Apps Two-factor Authentication Phishing HaaS Bring Your Own Device IT Support Data Security Office Tips Word Save Money Connectivity IT Support Holiday Microsoft Office Vulnerability Hacking Keyboard Private Cloud Spam Wi-Fi Information Google Drive Scam Data Breach Automation Mobile Device Management Data Protection Spam Blocking End of Support Avoiding Downtime Business Intelligence History Mobile Device Samsung IT Plan Sports Marketing Blockchain Electronic Medical Records Telephone System Update Operating System Bandwidth Identity Theft Training Battery Encryption Entertainment Infrastructure USB PDF Value Unsupported Software Firewall Networking Remote Monitoring VPN Managed IT Remote Computing Managed Service Provider Employer-Employee Relationship Windows 7 Flexibility Fraud Government Charger Patch Management Settings BDR BYOD Paperless Office Comparison Legal Website CES Mobility Automobile Public Cloud Cleaning Data Storage Worker Big Data OneNote Managed Service Content Management Redundancy Virtual Assistant Data Management Computer Care IT Management Recycling Transportation Safety Excel Enterprise Content Management Techology Users Remote Work Practices Politics Rootkit Unified Threat Management Information Technology Recovery Books IT solutions Assessment Physical Security YouTube Digital Signature Employer Employee Relationship Tools MSP Content Workers Addiction Mouse Search Computer Fan IT Consultant Sync Online Shopping Smart Tech Apple Wearable Technology Instant Messaging eWaste Benefits Tip of the week Password Management Virtual Reality Hosted Computing Internet exploMicrosoft Data loss Mobile Computing Television Millennials Computer Accessories Downtime File Sharing Video Games Audiobook Cache webinar Smart Office How to Multi-Factor Security HIPAA The Internet of Things Leadership Evernote iPhone Criminal Windows 10s Windows Server 2008 NIST Worker Commute Credit Cards Inventory Advertising Vendor Management Screen Mirroring Camera Emergency Public Computer HBO Education Workforce Relocation User Error Bluetooth Root Cause Analysis Augmented Reality Password Manager Troubleshooting Conferencing Loyalty Software Tips Document Management Black Market Trending Human Resources Save Time FENG Telephony Wireless Charging Devices Google Docs Monitor Smart Technology Current Events Cryptocurrency Access Control Cast Outlook Servers Computing Infrastructure Accountants Botnet Remote Worker Scalability Business Mangement Emails SaaS Staff Skype Cortana Thought Leadership Warranty Wireless Two Factor Authentication Solid State Drive Knowledge Flash Safe Mode Amazon Authentication Experience Wireless Internet Frequently Asked Questions HVAC Telecommuting Humor Risk Management Internet Exlporer Meetings Travel Wiring Gmail Machine Learning Specifications Files Hiring/Firing Start Menu Best Practice Google Apps Wire Printer Voice over Internet Protocol Data storage Audit Network Congestion Amazon Web Services Nanotechnology Music Hybrid Cloud CrashOverride Thank You Company Culture Administrator Compliance WiFi Congratulations Managing Stress Regulation Printers Webinar Twitter

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Sybil Stephens Is a Data Backup Really That Necessary? In a Word: Yes
20 October 2018
Backup data for the word Microsoft is really needed that only some written material will be come to ...
JeffreyKGuertin Tech Term: Modems and Routers Defined
18 October 2018
Thank you so much for defining here the modems and routers to give us better information about this....
Shay Stuart How the Convenience of The Internet of Things Can Come Back to Bite Us
17 October 2018
This is a very important share that delivers facts about the utilization of internet tools in differ...
Isla Tait It Pays to Outsource Your IT
15 October 2018
New IT project that show us a new outcome that has been to prepare this setup that was god to know o...
ClarenceEHaynes 11 Ways to Enhance Android Security
15 October 2018
I really impressed from your working, after reading this 11 ways to enhance android security and dis...