Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Using Cortana Gets Better with Customization

Using Cortana Gets Better with Customization

As Cortana has more and more added to its functionality, it gradually becomes more of a utility to all. Those who prefer to use Google’s applications are now able to use Cortana to augment their use of Gmail, Google Contacts, and Google Calendar. Today, we’ll go through how you can set these programs up to play nice with Cortana.

For Cortana to work with Google apps, these apps must first be identified as a service. Access Cortana and click Notebook, and once the panel appears, access Connected Services and from there, Add service.

At this point, you will only be given an option for Gmail, but that includes Contacts and Calendar as well, in addition to Google Drive. After you next sign on to your Google account, your Connected Services menu will include Gmail as an option.

Privacy and Usage Disclaimers
Be warned, when you give Cortana access to your email and other services, you are opening your personal data to the assistant, and therefore, to Microsoft as well. You should definitely review the disclaimer that appears before connecting these accounts, as it will explain how your data is going to be used. If you have second thoughts after reading this disclaimer, you can be directed to where these integrations can be deactivated.

Since there isn’t any indication, as of yet, as to which of Cortana’s commands will work with these Google services, we are given the opportunity to speculate freely. What functions do you think Cortana will have in regard to Google’s apps? Give us your ideal list in the comments!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 24 January 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Network Security Google Business Microsoft Internet Email Malware Workplace Tips Backup Innovation Data User Tips Computer Mobile Devices IT Services Hardware Disaster Recovery Android VoIP communications Communication IT Support Smartphones Business Continuity Miscellaneous Smartphone Mobile Device Network Browser Small Business Productivity Collaboration Cybersecurity Quick Tips Users Business Management Phishing Upgrade Managed IT Services Windows Ransomware Data Backup Outsourced IT Windows 10 Office Cloud Computing Server Save Money Data Recovery Windows 10 Passwords Saving Money Holiday Social Media Gadgets Chrome Virtualization Tech Term Automation Managed IT Services Microsoft Office Managed Service Facebook Operating System Cybercrime Artificial Intelligence Computers Mobile Device Management Networking IT Support Internet of Things Health Hacking Wi-Fi BYOD Information Technology Managed Service Provider Alert Remote Information Spam Office 365 Covid-19 Telephone Systems Router Bandwidth BDR Recovery Employer-Employee Relationship Social Engineering Mobility App History Law Enforcement Big Data Human Resources Data Breach Password Money Remote Monitoring Mobile Computing Encryption Applications Application Office Tips Training Government VPN Data Storage Patch Management Private Cloud Blockchain Paperless Office Managed IT Remote Computing Apps Mobile Office How To Wireless Avoiding Downtime Gmail Settings Vulnerability Windows 7 Word Two-factor Authentication Bring Your Own Device Data Management Work/Life Balance Servers Mouse HaaS Flexibility Marketing Infrastructure Voice over Internet Protocol WiFi Data Security IT solutions Entertainment Website Google Drive Budget Data Protection Keyboard Employee/Employer Relationship RMM The Internet of Things Lithium-ion battery Conferencing Firewall Save Time Scam Software as a Service Telephone System Staff Virtual Reality Apple Machine Learning Cleaning Connectivity Social Remote Work Vendor Management User Error End of Support Vendor Meetings Managed Services Physical Security Education Display Safety USB HIPAA Sports Risk Management Hacker Redundancy Hard Drive Cryptocurrency IT Consultant Spam Blocking Electronic Medical Records Proactive IT DDoS Best Practice Comparison Humor Hiring/Firing Computing YouTube SharePoint Black Market CES Customer Service Document Management Business Technology Content Management Environment Access Control Solid State Drive Wireless Technology Digital Signage Downtime Fax Server Business Intelligence How to Virtual Assistant Authentication Audit Worker Data storage SaaS IT Management Automobile Procurement Botnet Workplace Strategy Net Neutrality IT Plan Virus Update Computing Infrastructure Help Desk Network Congestion eWaste Unified Threat Management Printing Going Green Unsupported Software Computer Accessories Google Docs Identity Theft Charger Managed Services Provider Battery Compliance Shadow IT Database Wearable Technology OneNote Computer Care Legal Retail Hard Drives Current Events Printer Bluetooth Instant Messaging Remote Workers Augmented Reality Internet Exlporer Telephony Robot Fraud Excel Samsung Processor Biometrics PDF Remote Worker Virtual Desktop Value Leadership Peripheral Troubleshooting Relocation Recycling Outlook Start Menu Digital Security Cameras Using Data Wiring Practices 5G Cache Amazon Web Services Screen Mirroring Science Loyalty Video Games Copiers Worker Commute Quick Tip Books Safe Mode Criminal Frequently Asked Questions Mobile Windows 10s Experience Ergonomics GDPR Smartwatch Hosted Computing OLED Distributed Denial of Service Wireless Internet Customer Relationship Management Online Shopping Cast Scalability Development webinar Business Owner PCI DSS Emergency Virtual Machine File Sharing Tip of the week Analyitcs Inventory Professional Services Programming Specifications Public Cloud 2FA Employer Employee Relationship Fiber Optics Camera NarrowBand Employee Cabling Wire Evernote Consultant Assessment Search Messaging Travel Analytics Policy iPhone Hypervisor Windows Server 2008 Tools Millennials Dark mode Trend Micro Printers Antivirus Default App Smart Office Wireless Charging Best Available Windows 8 Television SMS Procedure Files Saving Time IT service WIndows 7 Workforce dark theme Shopping Virtual Private Network Chromecast Google Search IT Infrastructure Cables Tablet Public Computer AI FinTech Transportation Colocation Uninterrupted Power Supply Bing Domains Regulations Nanotechnology Telecommuting Computer Fan Rootkit Social Network Project Management Monitor Investment IaaS Maintenance Cortana Bloatware Workers PowerPoint Employees Benefits Windows Media Player Employee/Employer Relationships Digital Signature User FENG Windows 365 Warranty ISP Video Conferencing Reputation ROI HVAC Streaming Media Google Apps Tablets IBM Entrepreneur Content Sales Smart Technology Bitcoin Tech Support Shortcuts Analysis Flash Managing Stress Cryptomining Devices Point of Sale Techology Personal Administrator Laptop Supply Chain Management Customers Enterprise Content Management Shortcut Software Tips Supercomputer Cameras Cost Management Emails Audiobook Monitoring Batteries MSP Accountants Sync Thought Leadership Social Networking Credit Cards Windows 8.1 Digitize Microchip Touchpad Windows Server 2008 R2 Password Management Password Manager Multi-Factor Security Netflix Politics Customer relationships Two Factor Authentication Advertising Manufacturing Running Cable Twitter Root Cause Analysis Email Best Practices IT Assessment Search Engine Printer Server Music NIST Notifications Business Mangement HBO Memory Knowledge Trending Computer Tips Managed IT Service Security Cameras Smart Tech Skype Biometric Security Addiction Amazon Data loss Virtual CIO OneDrive

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code