XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Using Cortana Gets Better with Customization

Using Cortana Gets Better with Customization

As Cortana has more and more added to its functionality, it gradually becomes more of a utility to all. Those who prefer to use Google’s applications are now able to use Cortana to augment their use of Gmail, Google Contacts, and Google Calendar. Today, we’ll go through how you can set these programs up to play nice with Cortana.

For Cortana to work with Google apps, these apps must first be identified as a service. Access Cortana and click Notebook, and once the panel appears, access Connected Services and from there, Add service.

At this point, you will only be given an option for Gmail, but that includes Contacts and Calendar as well, in addition to Google Drive. After you next sign on to your Google account, your Connected Services menu will include Gmail as an option.

Privacy and Usage Disclaimers
Be warned, when you give Cortana access to your email and other services, you are opening your personal data to the assistant, and therefore, to Microsoft as well. You should definitely review the disclaimer that appears before connecting these accounts, as it will explain how your data is going to be used. If you have second thoughts after reading this disclaimer, you can be directed to where these integrations can be deactivated.

Since there isn’t any indication, as of yet, as to which of Cortana’s commands will work with these Google services, we are given the opportunity to speculate freely. What functions do you think Cortana will have in regard to Google’s apps? Give us your ideal list in the comments!



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, 27 May 2018
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Saving Money Backup Best Practices Software Managed Service Provider Workplace Tips Business Computing Small Business Hackers Google Mobile Office Hosted Solutions Productivity Data Hardware Mobile Devices VoIP Quick Tips Gadgets Email Malware IT Support Efficiency Network Social Media Business Management Business Continuity IT Services Business Network Security Server Smartphones Virtualization Miscellaneous Innovation Upgrade Disaster Recovery Windows Communication Microsoft Office Users Managed IT Services Communications Mobile Device Management Computer User Tips Android Passwords Browser Marketing Smartphone Alert WiFi Holiday Data Backup Vendor Management Save Money Remote Monitoring Windows 10 Ransomware Mobile Computing Operating System Cybercrime Bring Your Own Device Apple BYOD Information Technology Computers Avoiding Downtime Best Practice History Data Recovery Big Data Remote Computing IT Solutions Going Green The Internet of Things Chrome Telephone Systems Outsourced IT VPN Current Events Cloud Computing Spam Phone System Employer-Employee Relationship Wireless Technology Internet of Things IT Consultant Router Trending Firewall Application BDR Collaboration Hacking Automation Health Social Engineering Proactive IT Lithium-ion Battery Excel Office App Budget Printer Cybersecurity Bandwidth iPhone Maintenance Windows 8 Business Intelligence Content Filtering Two-factor Authentication Mobility Facebook Recovery Artificial Intelligence Managed IT Services Business Managament Tech Term Fax Server Money How To Customer Relationship Management Networking Hard Drives Gmail Mouse Antivirus Phishing Analytics User Error Apps Managed IT Humor Data Protection Outlook Tutorials PowerPoint Unified Threat Management Virus Value Private Cloud Website Data Security Redundancy Law Enforcement Office 365 Streaming Media Risk Management Compliance Productivity Flexibility Tech Support Inbound Marketing Saving Time Retail Windows 10 Google Drive Administration Mobile Device Downtime Network Congestion Social Networking Memory Vulnerability Digital Payment Computer Repair Conferencing Save Time Tablet Search Twitter Data Management Office Tips Identity Theft Solid State Drive Data loss Black Market Training Encryption Statistics Credit Cards Social Spam Blocking Entertainment IT Management Wireless Physical Security Skype Cleaning Smart Tech Programming Environment CES Public Cloud Scam Settings Intranet Human Resources SaaS Running Cable IT Plan Touchscreen Biometrics Wearable Technology Data storage OneNote IT service Hacker Infrastructure Unsupported Software Data Storage eWaste Best Available Internet Exlporer Video Surveillance Update PDF Bluetooth Work/Life Balance Data Breach Word HaaS End of Support People Safety Wi-Fi Government IBM Samsung Robot Comparison Piracy Meetings Leadership Workers Administrator Sports Webinar Online Currency Recycling Document Management DDoS Point of Sale Computer Accessories Regulations Evernote Customers Wireless Internet Cost Management Voice over Internet Protocol Digital Signature Uninterrupted Power Supply eBay IoT IT Security Education Applications Alerts Thought Leadership Knowledge Upgrades Analyitcs Travel Criminal Advertising Print Server FENG HBO Remote Support Mobile Cortana Distributed Denial of Service Files nternet Patch Management Crowdfunding Customer Service Millennials Chromecast Access Control Consultant Servers Wireless Charging 360 Emails Instant Messaging Multi-Factor Security Strategy Password Text Messaging Screen Mirroring Work Station Content Filter Company Culture Notifications Gaming Console Law Firm IT Electronic Medical Records Frequently Asked Questions Fraud Augmented Reality Business Owner Macro Professional Services Google Apps Colocation Windows 10s Cameras Workforce Laptop Authentication Licensing Flash Fiber-Optic SharePoint LinkedIn Lifestyle Shadow IT Insurance Charger Cast Co-managed IT Storage HIPAA Net Neutrality IT Support Virtual Reality Software as a Service Content Management Hybrid Cloud Analysis Hiring/Firing WIndows 7 Tip of the week Amazon Windows 8.1 Update Tools IaaS Computing Infrastructure File Sharing Printer Server Shortcut Telecommuting Touchpad Nanotechnology User Sync Cables Relocation Hosted Solution Worker Commute Legal Practices Display Computer Care Monitor Addiction Keyboard Bloatware Blockchain Accountants Debate Managing Stress Domains Windows Server 2008 Amazon Web Services Connectivity Science Password Manager Webcam Audit Software Tips Remote Work USB Telephony Unified Communications Netflix YouTube Hosted Computing Reputation Cache Entrepreneur Google Docs Staff Root Cause Analysis Windows 7 Online Shopping PC Care Devices Supercomputer Tablets Botnet Business Mangement Internet exploMicrosoft Computer Fan Hiring/Firing Start Menu Theft Scheduling Help Desk Windows Media Player Virtual Desktop Data Warehousing Specifications NarrowBand 3D Inventory Music Thank You Worker Audiobook Assessment Scalability Wire Congratulations Rootkit Politics Television Transportation How to Troubleshooting Webinar Techology Automobile Public Computer Benefits IT solutions Employer Employee Relationship CrashOverride Smart Technology Loyalty Books Experience Battery Content Two Factor Authentication Emergency Video Games

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *