XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Using Templates in Evernote

Tip of the Week: Using Templates in Evernote

The note-taking application Evernote is a favorite of many users, as it allows them to keep extensive notes in an organized fashion. Its true utility goes beyond that of a digital scratch pad, however, as it has additional features that offer much more. For this week’s tip, we’ll review one particularly useful feature: templates.

What Are Templates?
Evernote’s templates are handy, pre-built structures for notes that provide users with a simpler means of organizing specific types of information. Instead of taking time struggling with your formatting each time you start a new note, you can apply one of the templates that Evernote offers on their website. Those with a subscription to Evernote Plus, Premium, or Business can even use formatting they’ve created in past notes to generate their own templates for repeated use.

Applying Templates in Evernote
Once you’ve acquired a few templates, either from the Evernote website’s collection or from a past note, applying one of your choosing is relatively simple.

  • In Evernote, start a new note.
  • In the body of the note, click Templates to view the ones you have saved.
  • From there, you can search for any templates you have, delete ones you no longer want or need, edit their names, and of course, apply them to notes.
  • If you want to edit a template, follow the same process, and once you’ve made the changes that you want, save it as a new template. Note: only those with Plus, Premium, or Business accounts are able to do this.
  • Plus, Premium, and Business users are also able to create their own templates this way.

So, what do you think? Is this a welcome change to Evernote? What other improvements would you like to see them make down the line? Let us know in the comments!

8 Data Backup Terms You Should Know
What Do You Know About the Microchips That Power Y...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, January 17 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Best Practices Saving Money Backup Workplace Tips Software Business Computing Managed Service Provider Hosted Solutions Hackers Data Small Business Google Mobile Devices Hardware Productivity VoIP Mobile Office Malware Gadgets Email Quick Tips Network Security Efficiency Network IT Support Innovation IT Services Social Media Business Business Management Business Continuity Smartphones Server Miscellaneous Upgrade Communication Virtualization User Tips Windows Disaster Recovery Data Backup Communications Computer Managed IT Services Microsoft Office Users Smartphone Browser Mobile Device Management Data Recovery Passwords Android Holiday Marketing Save Money WiFi Alert Outsourced IT Tech Term Ransomware BDR Vendor Management Mobile Computing Internet of Things Cybercrime Cloud Computing Operating System Windows 10 Remote Monitoring Chrome Router Information Technology Avoiding Downtime Artificial Intelligence Computers Bring Your Own Device Apple BYOD Automation Going Green Big Data Telephone Systems Remote Computing IT Solutions Firewall VPN The Internet of Things Current Events Managed IT Services Best Practice History Cybersecurity Spam Social Engineering Employer-Employee Relationship Printer Facebook Trending Phone System Application Wireless Technology Health Collaboration Hacking IT Consultant Excel App Productivity Office Windows 10 Mobility Budget Lithium-ion Battery Money Bandwidth Proactive IT How To Networking Business Intelligence Unified Threat Management Phishing Office 365 Two-factor Authentication Applications Business Managament IT Support iPhone Mouse Recovery Fax Server Content Filtering Maintenance Windows 8 Mobile Device Access Control Apps Antivirus Gmail Private Cloud PowerPoint Analytics User Error Redundancy Information Law Enforcement Settings Humor Outlook Encryption Tutorials Customer Relationship Management Hard Drives Virus Training Data Protection Value Blockchain Sports Word Google Drive Managed IT Data Security Website Digital Payment Social Networking Voice over Internet Protocol Scam Compliance Wi-Fi Computer Repair Flexibility Saving Time Machine Learning IT Management Entertainment Servers Data Management Administrator Retail Analysis Downtime Human Resources File Sharing Memory Managed Service Conferencing Software as a Service Connectivity Network Congestion Hacker Vulnerability Inbound Marketing Social Tablet Search Twitter Save Time Document Management Streaming Media Risk Management Administration Office Tips Identity Theft Tech Support PDF HaaS End of Support Skype Video Surveillance Safety Smart Tech Programming Data loss Government YouTube Credit Cards Running Cable Spam Blocking Meetings Augmented Reality Intranet Piracy Instant Messaging Wearable Technology IBM DDoS CES Environment Leadership Fraud Solid State Drive IT Plan Best Available Paperless Office Computer Accessories Black Market Biometrics Display IT service Content Management Bluetooth OneNote Infrastructure Cleaning Password People Unsupported Software Wireless Physical Security Public Cloud Samsung Webinar Data Storage SaaS Keyboard Update Virtual Assistant Online Currency Work/Life Balance Data Breach Help Desk Telephony USB Point of Sale Touchscreen Comparison Data storage Robot Recycling Windows 7 Workers Google Docs Education Telephone System Botnet Internet Exlporer Statistics eWaste Start Menu Theft Hiring/Firing nternet Crowdfunding Electronic Health Records eCommerce Data Warehousing Specifications Monitor Windows Media Player Virtual Desktop Remote Support Line of Business Regulations Evernote Wire Microchip Digital Signature Cost Management Company Culture Content Filter Camera Knowledge Travel Criminal Upgrades Analyitcs Law Firm IT Cryptocurrency FENG HBO Macro Mobile Cortana Vendor Patch Management Millennials Co-managed IT Reputation Customer Service Authentication Webcam MSP Wireless Charging Internet exploMicrosoft Consultant LinkedIn Smart Office 360 Emails Multi-Factor Security Strategy Insurance Screen Mirroring Net Neutrality Storage NarrowBand Safe Mode Electronic Medical Records Frequently Asked Questions Business Owner Professional Services Google Apps Uninterrupted Power Supply HVAC PC Care Security Cameras Windows 10s Workforce Customers Cameras Windows 8.1 Update Nanotechnology Remote Worker Flash Fiber-Optic Licensing Advertising 3D Search Engine Lifestyle Practices Scheduling Charger Cast Distributed Denial of Service Files WIndows 7 Addiction Virtual Private Network eBay HIPAA Chromecast Virtual Reality Accountants Debate Business Technology Hiring/Firing Tip of the week Amazon Wiring Tools Enterprise Content Management Alerts Telecommuting Printer Server Shortcut Sync Cables Notifications User Students Bing Hosted Solution Worker Commute Hosted Computing Proactive Computer Care Amazon Web Services Colocation Managing Stress Domains Cache Project Management Text Messaging Laptop Bloatware Windows Server 2008 Devices Gaming Console GDPR Password Manager Shadow IT Science Password Management Work Station Audit Software Tips Remote Work SharePoint Unified Communications Hybrid Cloud Healthcare Shortcuts Netflix Inventory Remote Monitoring and Maintenance Online Shopping IaaS Computing Infrastructure Wireless Internet Warranty Staff Touchpad Entrepreneur IT Security IoT Root Cause Analysis Thought Leadership E-Commerce Supercomputer Business Mangement Legal Tablets Print Server NIST Computer Fan Relocation Congratulations Emergency Music Regulation Worker Audiobook Assessment Utility Computing Battery Rootkit Printers Politics Smartwatch Video Games Television Transportation Troubleshooting Webinar Scalability Automobile Public Computer Employee/Employer Relationship Benefits IT solutions How to Employer Employee Relationship CrashOverride Techology Smart Technology Thank You Books Loyalty Experience Content Two Factor Authentication

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *