Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Using Cortana Gets Better with Customization

Using Cortana Gets Better with Customization

As Cortana has more and more added to its functionality, it gradually becomes more of a utility to all. Those who prefer to use Google’s applications are now able to use Cortana to augment their use of Gmail, Google Contacts, and Google Calendar. Today, we’ll go through how you can set these programs up to play nice with Cortana.

For Cortana to work with Google apps, these apps must first be identified as a service. Access Cortana and click Notebook, and once the panel appears, access Connected Services and from there, Add service.

At this point, you will only be given an option for Gmail, but that includes Contacts and Calendar as well, in addition to Google Drive. After you next sign on to your Google account, your Connected Services menu will include Gmail as an option.

Privacy and Usage Disclaimers
Be warned, when you give Cortana access to your email and other services, you are opening your personal data to the assistant, and therefore, to Microsoft as well. You should definitely review the disclaimer that appears before connecting these accounts, as it will explain how your data is going to be used. If you have second thoughts after reading this disclaimer, you can be directed to where these integrations can be deactivated.

Since there isn’t any indication, as of yet, as to which of Cortana’s commands will work with these Google services, we are given the opportunity to speculate freely. What functions do you think Cortana will have in regard to Google’s apps? Give us your ideal list in the comments!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 25 December 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Network Security Business Google Microsoft Internet Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices Hardware IT Services Android VoIP Disaster Recovery communications IT Support Business Continuity Smartphones Communication Smartphone Miscellaneous Mobile Device Small Business Network Browser Productivity Collaboration Cybersecurity Quick Tips Users Business Management Windows Managed IT Services Upgrade Phishing Ransomware Data Backup Outsourced IT Windows 10 Data Recovery Office Server Save Money Cloud Computing Windows 10 Passwords Saving Money Holiday Gadgets Tech Term Chrome Social Media Virtualization Managed IT Services Managed Service Microsoft Office Automation Cybercrime Artificial Intelligence Operating System Facebook Computers Health BYOD Mobile Device Management Internet of Things Networking IT Support Wi-Fi Hacking Information Spam Alert Office 365 Remote Managed Service Provider Telephone Systems Information Technology Covid-19 Router BDR Bandwidth Social Engineering Mobility Recovery Employer-Employee Relationship Human Resources Application Law Enforcement Data Breach Remote Monitoring Big Data Password App Money History Encryption Applications Mobile Computing Blockchain Data Storage Patch Management Paperless Office Government Remote Computing Mobile Office Private Cloud Managed IT Apps Office Tips Training How To VPN IT solutions Entertainment Website Two-factor Authentication Vulnerability Budget Windows 7 Avoiding Downtime Word Mouse HaaS Servers Infrastructure Voice over Internet Protocol Bring Your Own Device Data Management Work/Life Balance Data Security Wireless Flexibility Gmail Marketing Google Drive Settings WiFi Keyboard Conferencing RMM Telephone System Virtual Reality Staff Software as a Service Apple USB Scam Machine Learning Social Connectivity Remote Work User Error Vendor Management Save Time Meetings Risk Management Cleaning Hacker Data Protection Vendor The Internet of Things End of Support Managed Services Lithium-ion battery Display Physical Security Education Safety HIPAA Sports Employee/Employer Relationship Firewall Redundancy Virtual Assistant Printer Authentication Proactive IT Bluetooth SaaS Computing Best Practice Business Intelligence YouTube Audit Black Market Worker IT Management Update Network Congestion eWaste IT Consultant Digital Signage Botnet Document Management IT Plan Google Docs Solid State Drive Wireless Technology Identity Theft Humor Downtime How to Unsupported Software Wearable Technology Procurement Data storage Hard Drives Charger Net Neutrality Retail Workplace Strategy Automobile Augmented Reality Instant Messaging Help Desk Robot Excel Compliance Fraud Computer Care Printing OneNote Remote Worker Computing Infrastructure Biometrics Current Events Telephony Virtual Desktop Going Green Cryptocurrency Samsung Managed Services Provider DDoS Value Database Virus Battery SharePoint Shadow IT Comparison Unified Threat Management Legal Spam Blocking Electronic Medical Records Remote Workers CES Computer Accessories Internet Exlporer Processor Customer Service Hiring/Firing Business Technology Environment Content Management PDF Access Control Hard Drive Fax Server Relocation Assessment Copiers 5G IT service Windows Server 2008 Virtual Private Network Quick Tip Workforce Cables Smartwatch Tools Video Games Ergonomics Tablet Television Development OLED Printer Server Worker Commute Domains Experience Project Management PCI DSS Nanotechnology Virtual Machine Telecommuting Fiber Optics Cortana Employee IaaS Scalability Maintenance 2FA Bloatware Public Computer Messaging Digital Signature Cabling Business Owner Regulations Warranty Policy NarrowBand Transportation Hypervisor Rootkit Trend Micro Google Apps Search Computer Fan Dark mode HVAC Tablets iPhone Entrepreneur SMS Analysis Default App Administrator Workers Procedure Devices Benefits Saving Time Shopping Google Search Shortcut FENG dark theme Enterprise Content Management MSP Files Cost Management IBM AI Accountants IT Infrastructure Bing Flash Microchip Social Networking FinTech Thought Leadership Chromecast Smart Technology Credit Cards Social Network Password Manager Consultant Password Management Software Tips Colocation Supercomputer Uninterrupted Power Supply Investment Multi-Factor Security Analytics Running Cable Sync Search Engine Emails Employees Twitter Employee/Employer Relationships Monitor Memory Business Mangement Best Available ISP Windows 365 NIST Video Conferencing Smart Tech WIndows 7 ROI Trending Shortcuts Netflix Sales Addiction Two Factor Authentication Bitcoin Amazon Reputation Personal Recycling Streaming Media Cryptomining Root Cause Analysis Point of Sale Content HBO Wiring Knowledge Supply Chain Management Practices Tech Support Music Amazon Web Services Skype Techology Monitoring Cache Laptop Science Batteries Safe Mode Customers Digitize Criminal Data loss Windows 8.1 Windows Media Player Audiobook Outlook GDPR Leadership Hosted Computing User Troubleshooting Windows Server 2008 R2 PowerPoint Online Shopping Distributed Denial of Service Start Menu Customer Relationship Management Customer relationships Wireless Internet Touchpad File Sharing Analyitcs Loyalty IT Assessment Manufacturing Screen Mirroring Email Best Practices Politics Frequently Asked Questions Camera Advertising Programming Inventory Managing Stress Books Specifications Evernote Security Cameras Mobile Windows 10s Computer Tips Wire Managed IT Service OneDrive Notifications Biometric Security Travel Cameras Cast Virtual CIO Antivirus Tip of the week Printers webinar Peripheral Emergency Millennials Wireless Charging Professional Services Public Cloud Digital Security Cameras Smart Office Windows 8 Employer Employee Relationship Using Data

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code