XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Using Templates in Evernote

Tip of the Week: Using Templates in Evernote

The note-taking application Evernote is a favorite of many users, as it allows them to keep extensive notes in an organized fashion. Its true utility goes beyond that of a digital scratch pad, however, as it has additional features that offer much more. For this week’s tip, we’ll review one particularly useful feature: templates.

What Are Templates?
Evernote’s templates are handy, pre-built structures for notes that provide users with a simpler means of organizing specific types of information. Instead of taking time struggling with your formatting each time you start a new note, you can apply one of the templates that Evernote offers on their website. Those with a subscription to Evernote Plus, Premium, or Business can even use formatting they’ve created in past notes to generate their own templates for repeated use.

Applying Templates in Evernote
Once you’ve acquired a few templates, either from the Evernote website’s collection or from a past note, applying one of your choosing is relatively simple.

  • In Evernote, start a new note.
  • In the body of the note, click Templates to view the ones you have saved.
  • From there, you can search for any templates you have, delete ones you no longer want or need, edit their names, and of course, apply them to notes.
  • If you want to edit a template, follow the same process, and once you’ve made the changes that you want, save it as a new template. Note: only those with Plus, Premium, or Business accounts are able to do this.
  • Plus, Premium, and Business users are also able to create their own templates this way.

So, what do you think? Is this a welcome change to Evernote? What other improvements would you like to see them make down the line? Let us know in the comments!

8 Data Backup Terms You Should Know
What Do You Know About the Microchips That Power Y...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, March 20 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Best Practices Saving Money Backup Workplace Tips Software Business Computing Hosted Solutions Managed Service Provider Hackers Data Google Small Business Mobile Devices Hardware VoIP Productivity Mobile Office Malware Email Network Security Gadgets Quick Tips Efficiency Innovation Business Management Network IT Support IT Services Social Media Business Business Continuity Server Smartphones Miscellaneous Upgrade Communications Virtualization Communication Windows User Tips Disaster Recovery Data Backup Computer Managed IT Services Microsoft Office Smartphone Data Recovery Users Passwords Mobile Device Management Browser Holiday Android Internet of Things Marketing Save Money WiFi Vendor Management Ransomware Tech Term Outsourced IT Alert Productivity Artificial Intelligence Mobile Computing BDR Cybercrime Cloud Computing Router Chrome Operating System Remote Monitoring Windows 10 Bring Your Own Device Apple Computers BYOD Automation Information Technology Cybersecurity Remote Computing Avoiding Downtime The Internet of Things Firewall Managed IT Services Collaboration Going Green Telephone Systems Health Current Events Spam History Best Practice Big Data VPN IT Solutions Printer Facebook Wireless Technology Application IT Consultant Hacking Proactive IT Social Engineering Employer-Employee Relationship Windows 10 Phone System Trending Mobility Budget Lithium-ion Battery IT Support Mobile Device Money Bandwidth Excel Encryption Office App Mouse Content Filtering Recovery Business Managament Fax Server Private Cloud Unified Threat Management Maintenance Networking Business Intelligence Windows 8 How To Office 365 Applications iPhone Phishing Training Two-factor Authentication User Error Google Drive Humor Data Protection Outlook Blockchain Managed IT Value Sports Word Tutorials Virus Save Time Apps Data Security Website PowerPoint Redundancy Law Enforcement Antivirus Access Control Gmail Analytics Customer Relationship Management Settings Information File Sharing Hard Drives Inbound Marketing Social Software as a Service Analysis Conferencing Managed Service Network Congestion Hacker Paperless Office Business Technology Vulnerability Administration Tablet Connectivity Search Twitter Digital Payment Social Networking Document Management Wi-Fi Streaming Media Risk Management Identity Theft Computer Repair Meetings Office Tips Data Management Voice over Internet Protocol Compliance Saving Time IT Management Tech Support Administrator Flexibility Servers Entertainment Augmented Reality Scam Retail Downtime Machine Learning Human Resources Memory Best Available SaaS Biometrics Display Content Management Unsupported Software Bluetooth Infrastructure IT service Data storage People OneNote Touchscreen Samsung Virtual Private Network Update eWaste Internet Exlporer Data Storage Keyboard Telephony PDF Online Currency Comparison Virtual Assistant Work/Life Balance Data Breach USB Point of Sale Windows 7 HaaS End of Support Webinar Robot Recycling Google Docs Safety Video Surveillance Government Botnet Education YouTube Help Desk Workers Statistics Healthcare Telephone System Piracy Skype Credit Cards DDoS IBM Programming Leadership Solid State Drive Data loss Smart Tech Running Cable Intranet Black Market Computer Accessories Fraud Spam Blocking Instant Messaging Wearable Technology CES Cryptocurrency IT Plan Net Neutrality Wireless Physical Security Environment Cleaning Password Manufacturing Public Cloud Business Owner Licensing Backup and Disaster Recovery Tip of the week Amazon Colocation Storage Windows 10s Laptop Safe Mode Google Search Telecommuting SharePoint Nanotechnology Remote Worker Virtual Reality Tools Debate Shadow IT HVAC Security Cameras Charger Cast WIndows 7 Text Messaging Practices HIPAA Work Station Sync Cables Hybrid Cloud Search Engine Hiring/Firing Gaming Console Printer Server Shortcut Accountants User Cryptomining Windows Server 2008 Amazon Web Services IaaS Computing Infrastructure Addiction Worker Commute Touchpad Domains ISP Software Tips Remote Work Relocation Wiring Hosted Solution Bloatware Password Manager Legal Enterprise Content Management Employee/Employer Relationship Computer Care Managing Stress Monitor Hosted Computing Proactive Science Unified Communications Students Bing Database Online Shopping Cache Project Management Audit Staff File Versioning Devices GDPR Netflix Entrepreneur IT Security Business Mangement Password Management Data Warehousing Specifications Reputation Inventory Remote Monitoring and Maintenance Tablets Print Server Start Menu Theft Shortcuts Root Cause Analysis Smartwatch IoT Supercomputer Hiring/Firing Distribution nternet Regulations Crowdfunding Evernote Internet exploMicrosoft Wireless Internet Warranty Computer Fan Webcam Windows Media Player Virtual Desktop Remote Support Digital Signature Multiple Versions HBO Thought Leadership E-Commerce Cost Management Travel Criminal NarrowBand NIST Company Culture Millennials Customers Line of Business Upgrades Analyitcs Law Firm IT Mobile Cortana Uninterrupted Power Supply Electronic Health Records eCommerce Employee Knowledge PC Care Logistics Wireless Charging Advertising Wire Microchip FENG Customer Service Multi-Factor Security Strategy 3D Consultant Restore Data Frequently Asked Questions LinkedIn Distributed Denial of Service Files Content Filter Camera Patch Management Scheduling Chromecast Workforce Authentication MSP 360 Emails Professional Services Google Apps Macro Vendor Screen Mirroring eBay Digital Signage Insurance Alerts Flash Fiber-Optic Notifications Smart Office Co-managed IT Electronic Medical Records Cameras Windows 8.1 Update Lifestyle Television Printers Transportation How to Troubleshooting Webinar Techology Biometric Security Automobile Public Computer Benefits IT solutions Employer Employee Relationship CrashOverride Smart Technology Books Loyalty Experience Thank You Content Two Factor Authentication Battery Emergency Video Games Music Worker Congratulations Regulation Audiobook Assessment Scalability Rootkit Politics Utility Computing

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *