ct logo wslogan

1 minute reading time (257 words)

Using Cortana Gets Better with Customization

Using Cortana Gets Better with Customization

As Cortana has more and more added to its functionality, it gradually becomes more of a utility to all. Those who prefer to use Google’s applications are now able to use Cortana to augment their use of Gmail, Google Contacts, and Google Calendar. Today, we’ll go through how you can set these programs up to play nice with Cortana.

For Cortana to work with Google apps, these apps must first be identified as a service. Access Cortana and click Notebook, and once the panel appears, access Connected Services and from there, Add service.

At this point, you will only be given an option for Gmail, but that includes Contacts and Calendar as well, in addition to Google Drive. After you next sign on to your Google account, your Connected Services menu will include Gmail as an option.

Privacy and Usage Disclaimers
Be warned, when you give Cortana access to your email and other services, you are opening your personal data to the assistant, and therefore, to Microsoft as well. You should definitely review the disclaimer that appears before connecting these accounts, as it will explain how your data is going to be used. If you have second thoughts after reading this disclaimer, you can be directed to where these integrations can be deactivated.

Since there isn’t any indication, as of yet, as to which of Cortana’s commands will work with these Google services, we are given the opportunity to speculate freely. What functions do you think Cortana will have in regard to Google’s apps? Give us your ideal list in the comments!

 

Comments

Already Registered? Login Here
No comments made yet. Be the first to submit a comment

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Google Cloud Business Computing Hackers Backup Microsoft Malware Innovation Internet Email Tech Term Network Security Cybercrime Android Mobile Devices Data Small Business VoIP Hardware Software Windows Data Backup Business Ransomware Smartphones Efficiency Cloud Computing Computers User Tips How To Browser Business Management Smartphone Cybersecurity Internet of Things Router Data Recovery Communication Computer Collaboration Managed IT Services Law Enforcement Social Engineering Business Continuity Productivity Mobile Device Management Communications Upgrade Chrome Hosted Solutions Automation Money Network Artificial Intelligence Safety Office 365 Word Outsourced IT Disaster Recovery Windows 10 Vulnerability Save Money Managed IT Services Bring Your Own Device Operating System Data Security Social Media Two-factor Authentication Alert Gadgets Data Protection App Phishing Bandwidth BDR Saving Money Data Breach Spam Connectivity Telephone Systems Server Website Blockchain Internet Exlporer Data Storage IT Support Private Cloud Apps Networking Government Downtime Google Drive IT Management Identity Theft Passwords Public Cloud Remote Monitoring Cleaning Sports Managed IT OneNote Facebook Business Intelligence IT Plan Gmail Windows 7 YouTube Miscellaneous Update Password Windows 10 Quick Tips Infrastructure Unsupported Software Recovery Virtualization The Internet of Things CES VPN Paperless Office Redundancy Spam Blocking Content Management Applications Productivity Data storage Avoiding Downtime Wi-Fi BYOD IT Services Physical Security Comparison Microsoft Office Sync Amazon Web Services Mobile Device Data Management NarrowBand Computer Care Windows 10s Encryption Telephone System Electronic Medical Records Current Events Wireless Internet Tip of the week Remote Work Holiday Password Management Outlook Recycling Office Tips Meetings Devices Conferencing User Error Employer-Employee Relationship DDoS Access Control Specifications Health Online Shopping Wireless Technology Samsung Accountants Voice over Internet Protocol HIPAA Knowledge Wire Windows Server 2008 Flexibility NIST Humor eWaste IBM Thought Leadership Emails Robot Workers Authentication Smart Office Telephony Evernote Value Solid State Drive Reputation Human Resources Hiring/Firing Network Congestion Credit Cards Settings Cryptocurrency Hybrid Cloud Criminal Tech Support Supercomputer Data loss Laptop Apple Servers End of Support Botnet Patch Management Nanotechnology HBO Millennials IT Consultant Document Management Files Skype Wireless Charging Workplace Tips USB Audit Practices Customer Multi-Factor Security Staff Automobile Flash Fraud Legal Safe Mode Monitor PDF Shadow IT Budget Screen Mirroring Addiction Touchpad iPhone Workforce HVAC Internet exploMicrosoft Travel Password Manager Scam Root Cause Analysis Smart Tech Office Frequently Asked Questions Software Tips Black Market History Start Menu Cortana Chromecast Computer Fan Hosted Computing Hacking Marketing Trending Work/Life Balance Amazon Keyboard Charger Digital Signature Virtual Assistant Google Docs Cast Cache Managed Service Provider Excel Telecommuting HaaS Entertainment Netflix Enterprise Content Management Advertising Business Mangement Uninterrupted Power Supply Going Green Relocation webinar Machine Learning Tools Google Apps Big Data FENG Inventory Experience Users IT Support Worker Benefits Company Culture Books Assessment Video Games Music Virtual Reality Save Time Thank You Rootkit Battery Firewall Managing Stress Emergency Television Scalability Wearable Technology Wireless Worker Commute Congratulations Mobility Risk Management Training Education Smart Technology Twitter Content Webinar Search Public Computer CrashOverride Loyalty Employer Employee Relationship Politics Vendor Management WiFi Computing Infrastructure Two Factor Authentication Techology Audiobook Bluetooth IT solutions How to Instant Messaging Troubleshooting SaaS Computer Accessories Best Practice Information Technology Remote Computing Transportation