window._mfq = window._mfq || []; (function() { var mf = document.createElement("script"); mf.type = "text/javascript"; mf.async = true; mf.src = "//cdn.mouseflow.com/projects/0148bb62-7ff8-46ae-a466-bf3fd13c7d09.js"; document.getElementsByTagName("head")[0].appendChild(mf); })();
407-478-6600    Get SUPPORT

TaylorWorks Blog

Using Cortana Gets Better with Customization

Using Cortana Gets Better with Customization

As Cortana has more and more added to its functionality, it gradually becomes more of a utility to all. Those who prefer to use Google’s applications are now able to use Cortana to augment their use of Gmail, Google Contacts, and Google Calendar. Today, we’ll go through how you can set these programs up to play nice with Cortana.

For Cortana to work with Google apps, these apps must first be identified as a service. Access Cortana and click Notebook, and once the panel appears, access Connected Services and from there, Add service.

At this point, you will only be given an option for Gmail, but that includes Contacts and Calendar as well, in addition to Google Drive. After you next sign on to your Google account, your Connected Services menu will include Gmail as an option.

Privacy and Usage Disclaimers
Be warned, when you give Cortana access to your email and other services, you are opening your personal data to the assistant, and therefore, to Microsoft as well. You should definitely review the disclaimer that appears before connecting these accounts, as it will explain how your data is going to be used. If you have second thoughts after reading this disclaimer, you can be directed to where these integrations can be deactivated.

Since there isn’t any indication, as of yet, as to which of Cortana’s commands will work with these Google services, we are given the opportunity to speculate freely. What functions do you think Cortana will have in regard to Google’s apps? Give us your ideal list in the comments!

Tip of the Week: 5 Handy Android Shortcuts
Can Chargers Be Interchanged Between Devices?
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, August 21 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Newsletter Sign Up

  • Company Name *
  • First Name *
  • Last Name *

      Tag Cloud

      Tip of the Week Security Technology Cloud Best Practices Network Security Privacy Managed IT Services Business Computing Data Backup Hackers Email VoIP Malware Data Recovery Hosted Solutions Outsourced IT Google Backup Tech Term Mobile Devices Microsoft Software Cloud Computing Data Internet of Things Innovation Saving Money Business Continuity Cybersecurity Small Business IT Support Android Hardware Efficiency Internet BDR User Tips Cybercrime Smartphones Disaster Recovery Ransomware Communications IT Services Managed IT Services Gadgets Applications Network Law Enforcement Managed IT Business Router How To Artificial Intelligence Communication Avoiding Downtime IT Support Virtualization Browser Data Security Business Management Smartphone Collaboration Windows Data Protection Phishing Money Chrome BYOD Mobile Device Management Computers Two-factor Authentication Productivity Business Intelligence Remote Monitoring Apps App Analysis Telephone Systems Bandwidth Facebook Productivity Proactive IT Mobility Document Management IT Management Redundancy Windows 10 Office 365 Vulnerability Compliance Connectivity Alert Social Media Save Money Spam Identity Theft Word Social Engineering Computer Passwords Blockchain Employer-Employee Relationship Smart Tech Value Operating System Business Owner Education Bring Your Own Device Holiday Data loss Solid State Drive Microsoft Office Budget Flexibility Information Technology Infrastructure Password VPN Private Cloud Networking Big Data Mobile Device Server Website Work/Life Balance Workers Miscellaneous IT Plan Upgrade File Sharing Firewall Information OneNote CES Windows 7 Training Comparison Unsupported Software Encryption Machine Learning Data Storage Data Breach Content Management Wi-Fi Spam Blocking Access Control Update Automation Paperless Office Servers Credit Cards NIST USB Virtual Assistant Meetings Botnet Computer Fan Wireless Technology Recycling Cache Excel Millennials HaaS Start Menu Wireless Charging Google Drive Google Apps Streaming Media Physical Security Lifestyle Electronic Medical Records IT Consultant Remote Computing Marketing Hacker Authentication Remote Monitoring and Maintenance Data Warehousing The Internet of Things Human Resources Students Flash Fraud Insurance Cryptocurrency Recovery Telephone System Travel FENG eWaste Wireless Internet Data Management Tip of the week Workforce Mobile Windows 10s Hard Drives Content Filter Mobile Computing Leadership Keyboard Amazon Unified Threat Management Netflix Fiber-Optic Nanotechnology Line of Business Google Docs Staff Healthcare Practices Safe Mode Screen Mirroring Criminal Wire Windows Server 2008 Telecommuting Users Computing Infrastructure Professional Services SaaS Password Manager Storage Save Time HBO Accountants HVAC Sync Amazon Web Services Cleaning Settings Public Cloud Cables Patch Management MSP Voice over Internet Protocol Current Events Digital Signature Electronic Health Records Risk Management Hosted Computing Cast Software as a Service Cortana Sports Remote Work Workplace Tips Tools Audit Wireless Business Mangement Outlook webinar Enterprise Content Management Telephony Online Shopping Computer Care Managed Service Provider Unified Communications Devices Virtual Reality Scam Multi-Factor Security Knowledge Windows 10 End of Support Inventory Black Market Content Filtering Managed Service Government Smart Office Regulations Emails Instant Messaging Business Technology Root Cause Analysis Gmail Addiction Hacking Frequently Asked Questions Specifications Conferencing IoT Password Management Skype Evernote Samsung PDF Theft Thought Leadership Worker Commute Software Tips Trending Network Congestion Health Office Tips Strategy YouTube HIPAA Battery Proactive Downtime Technology Tips Augmented Reality Legal Entertainment Charger How to Television 5G Automobile Tech Support Safety Benefits Files IBM Company Culture IT solutions Advertising WiFi Office Best Practice Troubleshooting Public Computer Worker Colocation Loyalty Competition Smart Technology History Customer Relationship Management Managing Stress Scalability Search IP Address Emergency Relocation Shadow IT Hosted Solution Regulation Rootkit Experience Employer Employee Relationship Customer Service Techology Mobile Office Humor Domains Content Internet Exlporer Music Twitter Computer Accessories User Error Hybrid Cloud Remote Worker Two Factor Authentication Politics CrashOverride Public Speaking Audiobook Vendor Management Wearable Technology Assessment Hiring/Firing Presentation Bluetooth Lithium-ion battery Transportation Wiring Video Games Fun Internet exploMicrosoft Books Quick Tips Webinar

      Mobile? Grab this Article!

      QR-Code dieser Seite