Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Using Cortana Gets Better with Customization

Using Cortana Gets Better with Customization

As Cortana has more and more added to its functionality, it gradually becomes more of a utility to all. Those who prefer to use Google’s applications are now able to use Cortana to augment their use of Gmail, Google Contacts, and Google Calendar. Today, we’ll go through how you can set these programs up to play nice with Cortana.

For Cortana to work with Google apps, these apps must first be identified as a service. Access Cortana and click Notebook, and once the panel appears, access Connected Services and from there, Add service.

At this point, you will only be given an option for Gmail, but that includes Contacts and Calendar as well, in addition to Google Drive. After you next sign on to your Google account, your Connected Services menu will include Gmail as an option.

Privacy and Usage Disclaimers
Be warned, when you give Cortana access to your email and other services, you are opening your personal data to the assistant, and therefore, to Microsoft as well. You should definitely review the disclaimer that appears before connecting these accounts, as it will explain how your data is going to be used. If you have second thoughts after reading this disclaimer, you can be directed to where these integrations can be deactivated.

Since there isn’t any indication, as of yet, as to which of Cortana’s commands will work with these Google services, we are given the opportunity to speculate freely. What functions do you think Cortana will have in regard to Google’s apps? Give us your ideal list in the comments!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 02 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Business Google Network Security Microsoft Internet Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices Hardware IT Services Android VoIP Disaster Recovery communications Business Continuity IT Support Smartphones Communication Smartphone Miscellaneous Mobile Device Small Business Network Browser Productivity Collaboration Cybersecurity Quick Tips Business Management Users Windows Managed IT Services Upgrade Phishing Data Backup Outsourced IT Ransomware Windows 10 Data Recovery Office Server Save Money Cloud Computing Passwords Windows 10 Gadgets Saving Money Holiday Tech Term Chrome Social Media Virtualization Managed Service Automation Microsoft Office Managed IT Services Artificial Intelligence Operating System Facebook Cybercrime Computers BYOD Mobile Device Management Wi-Fi Networking IT Support Hacking Health Internet of Things Alert Spam Covid-19 Information Office 365 Telephone Systems Managed Service Provider Information Technology Remote Bandwidth Social Engineering Mobility Router Recovery Employer-Employee Relationship BDR Application Remote Monitoring Data Breach Password Money Encryption App History Big Data Applications Law Enforcement Human Resources Mobile Computing Remote Computing Data Storage Patch Management Blockchain Managed IT Mobile Office Paperless Office Apps Office Tips Training How To VPN Government Private Cloud IT solutions Entertainment Website Vulnerability Mouse Budget Windows 7 HaaS Word Bring Your Own Device Data Management Work/Life Balance Servers Infrastructure Voice over Internet Protocol Wireless Data Security Google Drive Gmail Settings Avoiding Downtime Flexibility Marketing Two-factor Authentication WiFi Apple Conferencing Save Time Social Vendor Scam USB User Error Managed Services Telephone System Staff Software as a Service Display Cleaning Meetings Machine Learning Connectivity Remote Work Vendor Management Employee/Employer Relationship End of Support Risk Management RMM Hacker Education Physical Security Safety The Internet of Things Sports Lithium-ion battery HIPAA Redundancy Keyboard Data Protection Firewall Virtual Reality Solid State Drive Wireless Technology Printer Content Management How to Downtime Bluetooth Business Technology Access Control Network Congestion eWaste Business Intelligence Managed Services Provider Virtual Assistant Data storage Authentication Audit Database Automobile Worker IT Management Remote Workers IT Consultant Computing Infrastructure Botnet Processor Wearable Technology Going Green IT Plan Humor Update Retail Hard Drives Instant Messaging Hard Drive Robot Excel Unsupported Software Google Docs Battery Biometrics Shadow IT Identity Theft Charger Legal Virtual Desktop Computing Compliance Internet Exlporer OneNote Computer Care DDoS Current Events Augmented Reality Telephony Samsung PDF Fraud SharePoint Remote Worker Digital Signage Value Proactive IT Virus Customer Service Cryptocurrency Best Practice Unified Threat Management Spam Blocking Electronic Medical Records Environment YouTube Computer Accessories Procurement Fax Server Black Market Workplace Strategy Comparison Net Neutrality Hiring/Firing CES SaaS Help Desk Printing Document Management Assessment Wire Video Conferencing Evernote ROI Windows Server 2008 Bitcoin IaaS Travel Shortcuts Maintenance Sales Bloatware Printers Point of Sale Tools Personal Millennials Cryptomining Files Television Chromecast Smart Office Supply Chain Management Printer Server Wireless Charging Monitoring Batteries Tablets Colocation Entrepreneur Uninterrupted Power Supply Virtual Private Network Windows 8.1 Digitize Workforce Cables Windows Server 2008 R2 Public Computer Customer relationships Regulations Shortcut Transportation Monitor Cost Management Project Management Email Best Practices Nanotechnology IT Assessment Computer Fan Telecommuting Manufacturing Rootkit Cortana Social Networking Streaming Media Computer Tips Digital Signature Managed IT Service Workers Security Cameras Benefits Reputation Tech Support Warranty Virtual CIO OneDrive FENG Biometric Security Content Google Apps Running Cable IBM Techology Laptop HVAC Peripheral Digital Security Cameras Flash Analysis Using Data Smart Technology Customers Memory Administrator Consultant Devices Copiers 5G Audiobook Supercomputer Touchpad Enterprise Content Management Quick Tip Analytics Software Tips MSP Ergonomics Sync Accountants Emails Smartwatch Advertising Microchip Best Available Thought Leadership Development Credit Cards OLED Politics Password Manager Virtual Machine Science WIndows 7 Password Management PCI DSS Notifications 2FA Fiber Optics Netflix Multi-Factor Security Employee Two Factor Authentication Search Engine Twitter Messaging Root Cause Analysis Cabling HBO Business Mangement Hypervisor Distributed Denial of Service Knowledge Customer Relationship Management Music NIST Policy Dark mode Skype Smart Tech Trend Micro Trending Relocation Analyitcs Programming Addiction SMS Data loss Amazon Default App Outlook Recycling Saving Time Windows Media Player Leadership Video Games Troubleshooting User Procedure PowerPoint Wiring dark theme Start Menu Practices Shopping Google Search Worker Commute Loyalty Cache AI Screen Mirroring Amazon Web Services IT Infrastructure Experience Antivirus Frequently Asked Questions Criminal Bing Scalability Books Windows 8 Managing Stress Safe Mode FinTech GDPR Mobile Hosted Computing Social Network Windows 10s Business Owner IT service NarrowBand Wireless Internet Cameras Cast Online Shopping Investment Tip of the week Employee/Employer Relationships webinar Search Emergency Tablet File Sharing Employees Camera Windows 365 Professional Services Inventory Public Cloud Specifications ISP Domains Employer Employee Relationship iPhone

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code