window._mfq = window._mfq || []; (function() { var mf = document.createElement("script"); mf.type = "text/javascript"; mf.async = true; mf.src = "//"; document.getElementsByTagName("head")[0].appendChild(mf); })();
407-478-6600    Get SUPPORT

TaylorWorks Blog

Using Cortana Gets Better with Customization

Using Cortana Gets Better with Customization

As Cortana has more and more added to its functionality, it gradually becomes more of a utility to all. Those who prefer to use Google’s applications are now able to use Cortana to augment their use of Gmail, Google Contacts, and Google Calendar. Today, we’ll go through how you can set these programs up to play nice with Cortana.

For Cortana to work with Google apps, these apps must first be identified as a service. Access Cortana and click Notebook, and once the panel appears, access Connected Services and from there, Add service.

At this point, you will only be given an option for Gmail, but that includes Contacts and Calendar as well, in addition to Google Drive. After you next sign on to your Google account, your Connected Services menu will include Gmail as an option.

Privacy and Usage Disclaimers
Be warned, when you give Cortana access to your email and other services, you are opening your personal data to the assistant, and therefore, to Microsoft as well. You should definitely review the disclaimer that appears before connecting these accounts, as it will explain how your data is going to be used. If you have second thoughts after reading this disclaimer, you can be directed to where these integrations can be deactivated.

Since there isn’t any indication, as of yet, as to which of Cortana’s commands will work with these Google services, we are given the opportunity to speculate freely. What functions do you think Cortana will have in regard to Google’s apps? Give us your ideal list in the comments!

Tip of the Week: 5 Handy Android Shortcuts
Can Chargers Be Interchanged Between Devices?


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, November 13 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Network Security Cloud Best Practices Privacy Managed IT Services Business Computing Hackers Data Backup Malware Email Data Recovery Hosted Solutions VoIP Data Outsourced IT Mobile Devices Tech Term Innovation Google Backup Hardware Internet Microsoft Software Business Continuity Internet of Things Saving Money Cloud Computing User Tips Ransomware Communications IT Services BDR IT Support Android Efficiency Smartphones Business Communication Cybersecurity Small Business Applications Managed IT Services Cybercrime Browser Network Workplace Tips Disaster Recovery Chrome Artificial Intelligence Productivity Business Management Gadgets Law Enforcement Managed IT Windows 10 Router How To Computer Collaboration Data Security Smartphone Windows Server Data Protection Money Phishing Save Money BYOD Computers Information Mobile Device Management Business Intelligence Two-factor Authentication Avoiding Downtime IT Support Virtualization Bandwidth Apps Proactive IT Redundancy Productivity IT Management Compliance Firewall Office 365 Vulnerability Alert Blockchain Miscellaneous Training Upgrade Identity Theft Analysis Social Media Social Engineering Word Spam Servers Telephone Systems App Remote Monitoring Facebook Mobility Passwords Document Management Connectivity CES Sports Password File Sharing Information Technology Mobile Device Mobile Computing Private Cloud Work/Life Balance Encryption Machine Learning Microsoft Office Budget Telephone System Content Management Networking Unified Threat Management Workers Big Data IT Plan Voice over Internet Protocol Windows 7 Website Comparison Paperless Office Scam Access Control Settings OneNote Smart Tech Unsupported Software Data Storage Data Breach Managed Service Credit Cards VPN Update Infrastructure Wi-Fi Business Owner Spam Blocking Employer-Employee Relationship Automation Education Bring Your Own Device Holiday Fraud Keyboard Flexibility Data loss Value Operating System Solid State Drive Virtual Assistant GDPR Mobile Hosted Computing Hard Drives Marketing Hacker Remote Monitoring and Maintenance Amazon Enterprise Content Management The Internet of Things Google Docs Business Mangement FENG Windows Server 2008 Telecommuting Leadership Computing Infrastructure Warranty Save Time Screen Mirroring Unified Communications Devices Windows 10s Smart Office E-Commerce Patch Management Professional Services Inventory Netflix Risk Management HBO Line of Business Sync Amazon Web Services IoT Password Management Public Cloud Search Engine Gmail Addiction Remote Work Strategy YouTube Printer Cast Software as a Service Theft Thought Leadership SaaS Users Cortana Outlook Current Events Camera Virtual Reality Tools Cleaning MSP Black Market Content Filtering Telephony Online Shopping NIST Managed Service Provider Bing Multi-Factor Security Recycling Cache Instant Messaging Regulations webinar End of Support Mouse Hacking Government Google Apps Streaming Media Audit HIPAA Frequently Asked Questions Specifications Human Resources Students Knowledge Wireless Worker Commute Root Cause Analysis Authentication Computer Care Health Office Tips Remote Worker Battery Skype Evernote Insurance Cryptocurrency Emails Windows 10 PDF Legal Entertainment Software Tips Trending eWaste Wireless Internet USB Conferencing Administrator Content Filter Technology Tips Remote Computing Excel Millennials Staff Healthcare Network Congestion HaaS Virtual Private Network Meetings Botnet Fiber-Optic Nanotechnology Samsung Business Technology Criminal Wire Downtime Wiring Start Menu Wireless Charging Practices Safe Mode Charger Google Drive Physical Security Lifestyle Proactive Recovery Flash Accountants HVAC Augmented Reality Microchip Data Management Data Warehousing WiFi Password Manager Storage Computer Fan Tip of the week Workforce Digital Signature Electronic Health Records Electronic Medical Records IT Consultant Wireless Technology Project Management Travel Cables History Safety Emergency IT solutions IBM Relocation Shadow IT Hosted Solution Worker Search Utility Computing Twitter Public Computer Experience Loyalty Competition Techology Customer Relationship Management Humor IP Address Rootkit Content Music Employer Employee Relationship Internet Exlporer Regulation User Error Customer Service Politics Mobile Office Hybrid Cloud Audiobook Wearable Technology Company Culture Computer Accessories Domains Two Factor Authentication Printers Transportation Hiring/Firing Video Games CrashOverride Books Vendor Management Help Desk How to Managing Stress Bluetooth Fun Public Speaking Internet exploMicrosoft Automobile Assessment Quick Tips Presentation Benefits Files Lithium-ion battery Webinar Best Practice Troubleshooting Advertising Television Office Scalability Colocation 5G Smart Technology Tech Support

Mobile? Grab this Article!

QR-Code dieser Seite