094 90 48200     Get SUPPORT

Aniar IT Services Blog

Using Cortana Gets Better with Customization

Using Cortana Gets Better with Customization

As Cortana has more and more added to its functionality, it gradually becomes more of a utility to all. Those who prefer to use Google’s applications are now able to use Cortana to augment their use of Gmail, Google Contacts, and Google Calendar. Today, we’ll go through how you can set these programs up to play nice with Cortana.

For Cortana to work with Google apps, these apps must first be identified as a service. Access Cortana and click Notebook, and once the panel appears, access Connected Services and from there, Add service.

At this point, you will only be given an option for Gmail, but that includes Contacts and Calendar as well, in addition to Google Drive. After you next sign on to your Google account, your Connected Services menu will include Gmail as an option.

Privacy and Usage Disclaimers
Be warned, when you give Cortana access to your email and other services, you are opening your personal data to the assistant, and therefore, to Microsoft as well. You should definitely review the disclaimer that appears before connecting these accounts, as it will explain how your data is going to be used. If you have second thoughts after reading this disclaimer, you can be directed to where these integrations can be deactivated.

Since there isn’t any indication, as of yet, as to which of Cortana’s commands will work with these Google services, we are given the opportunity to speculate freely. What functions do you think Cortana will have in regard to Google’s apps? Give us your ideal list in the comments!

Tip of the Week: 5 Handy Android Shortcuts
Can Chargers Be Interchanged Between Devices?
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, December 12 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Tech Term Google Data Backup User Tips Cloud Business Computing Microsoft Email Data Recovery Hardware Data Hackers Innovation Network Security Internet VoIP Cloud Computing Malware Hosted Solutions Business Mobile Devices Android Workplace Tips Communication Managed IT Services Browser Smartphones Network IT Support IT Services Small Business Windows 10 Internet of Things Artificial Intelligence Chrome Backup Smartphone How To Communications Efficiency Windows Spam Collaboration Business Management Computer Word Cybercrime Software Information Applications BDR Computers Office 365 Cybersecurity Outsourced IT Business Continuity Saving Money Mobile Device Management Vulnerability Two-factor Authentication Data Protection Passwords Ransomware Router Productivity Facebook Money Connectivity Gadgets Data Security Managed Service Miscellaneous Server Windows 7 Social Media VPN Password Managed IT services Telephone System Spam Blocking Redundancy Voice over Internet Protocol Blockchain Telephone Systems Bring Your Own Device Social Engineering Operating System IT Management App Avoiding Downtime Phishing Software as a Service BYOD Holiday Comparison Google Drive Identity Theft Mobile Device Apps Google Docs Microsoft Office Remote Monitoring Law Enforcement IT Plan OneNote Telephony Virtual Assistant Settings Sports Scam Virtualization CES Managed IT Website Update Business Intelligence Unsupported Software Fraud Encryption Paperless Office Infrastructure Save Money Data Storage Human Resources Keyboard Upgrade Content Management Computer Care Servers Bing eWaste Thought Leadership Disaster Recovery MSP Software Tips Amazon Outlook Government Entertainment Warranty Bandwidth Skype Staff FENG Charger Hosted Computing NIST Cortana Alert Wireless Internet Travel Remote Work Unified Threat Management Patch Management HVAC Help Desk Legal Automation Tools Work/Life Balance File Sharing Amazon Web Services Accountants Wi-Fi Frequently Asked Questions Recovery Machine Learning Printer Password Manager Nanotechnology Start Menu Wireless Charging Inventory Sync Multi-Factor Security Cryptocurrency HIPAA USB Mobile Computing Augmented Reality WiFi Meetings Criminal Millennials Training Solid State Drive Excel YouTube Mouse Downtime Business Mangement Smart Tech Windows 10s Digital Signature Google Apps Safe Mode Screen Mirroring Electronic Medical Records Wire Smart Office The Internet of Things Flash Networking Shortcuts Employer-Employee Relationship Addiction Value Workforce Remote Worker Audit Physical Security Online Shopping Tip of the week Microchip Root Cause Analysis Gmail Specifications Private Cloud Credit Cards PDF Document Management Camera Workers Access Control Trending Cast Data Management Evernote Cleaning Big Data HaaS Enterprise Content Management Wiring Windows Server 2008 Search Engine Recycling Devices Public Cloud HBO Authentication Computer Fan Practices Password Management Data loss Cache Botnet Telecommuting Firewall Domains Emergency Wireless CrashOverride Windows 10 Public Speaking Presentation Managed Service Provider Compliance Lithium-ion battery Hiring/Firing Twitter Wireless Technology 5G Tech Support Regulation Quick Tips Fun IBM Safety Productivity Marketing Hacker Company Culture Budget Customer Relationship Management Competition Mobility IP Address Managing Stress Hard Drives Users Printers Search Customer Service Mobile Office