XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Using Cortana Gets Better with Customization

Using Cortana Gets Better with Customization

As Cortana has more and more added to its functionality, it gradually becomes more of a utility to all. Those who prefer to use Google’s applications are now able to use Cortana to augment their use of Gmail, Google Contacts, and Google Calendar. Today, we’ll go through how you can set these programs up to play nice with Cortana.

For Cortana to work with Google apps, these apps must first be identified as a service. Access Cortana and click Notebook, and once the panel appears, access Connected Services and from there, Add service.

At this point, you will only be given an option for Gmail, but that includes Contacts and Calendar as well, in addition to Google Drive. After you next sign on to your Google account, your Connected Services menu will include Gmail as an option.

Privacy and Usage Disclaimers
Be warned, when you give Cortana access to your email and other services, you are opening your personal data to the assistant, and therefore, to Microsoft as well. You should definitely review the disclaimer that appears before connecting these accounts, as it will explain how your data is going to be used. If you have second thoughts after reading this disclaimer, you can be directed to where these integrations can be deactivated.

Since there isn’t any indication, as of yet, as to which of Cortana’s commands will work with these Google services, we are given the opportunity to speculate freely. What functions do you think Cortana will have in regard to Google’s apps? Give us your ideal list in the comments!

Tip of the Week: 5 Handy Android Shortcuts
Can Chargers Be Interchanged Between Devices?


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, August 18 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Saving Money Best Practices Backup Software Managed Service Provider Workplace Tips Business Computing Small Business Data Hosted Solutions Hackers Google Productivity Hardware Mobile Office Mobile Devices VoIP Gadgets Email Quick Tips Malware Network Efficiency IT Support Social Media Business Management Innovation Smartphones Network Security IT Services Miscellaneous Business Continuity Virtualization Business Upgrade Server Windows Disaster Recovery Communication Microsoft Office Managed IT Services Computer Communications Users Mobile Device Management Passwords User Tips Data Backup Android Smartphone Browser Marketing Holiday Save Money WiFi Alert Data Recovery Vendor Management Windows 10 Operating System Tech Term Mobile Computing Remote Monitoring Ransomware Outsourced IT Cybercrime Internet of Things Information Technology Cloud Computing Avoiding Downtime Computers BDR Bring Your Own Device Apple BYOD The Internet of Things Current Events VPN Best Practice History Chrome Telephone Systems Automation Big Data Remote Computing Router IT Solutions Going Green Trending Artificial Intelligence Health Cybersecurity Application Collaboration Phone System Spam Hacking Wireless Technology Social Engineering Firewall Facebook IT Consultant Employer-Employee Relationship Office Managed IT Services Budget Excel Money Proactive IT App Lithium-ion Battery Bandwidth Printer Fax Server Two-factor Authentication Mobility Maintenance Windows 8 How To Recovery iPhone Business Intelligence Content Filtering Networking Business Managament Virus PowerPoint Unified Threat Management Data Security Managed IT Value Customer Relationship Management Hard Drives Mouse Phishing Private Cloud User Error Redundancy Antivirus Website Law Enforcement Data Protection Office 365 Humor Applications Outlook Analytics Gmail Tutorials Apps Computer Repair File Sharing Memory Retail Connectivity Identity Theft Conferencing Google Drive Sports Network Congestion Search Tablet IT Management Tech Support Twitter Document Management Productivity Streaming Media Risk Management Inbound Marketing Save Time Windows 10 Data Management Office Tips Saving Time Compliance IT Support Administration Blockchain Mobile Device Analysis Flexibility Vulnerability Downtime Digital Payment Entertainment Social Networking Word Comparison Paperless Office Wireless Physical Security Instant Messaging Cleaning Password Video Surveillance Webinar Environment Work/Life Balance Data Breach Windows 7 Public Cloud Best Available Settings Bluetooth Human Resources SaaS Piracy Biometrics IBM Workers People Data storage Leadership Samsung IT service Administrator Hacker Credit Cards Computer Accessories Data loss eWaste Online Currency Internet Exlporer Recycling Servers Point of Sale PDF CES Scam Safety Wi-Fi Education Training HaaS End of Support Spam Blocking IT Plan Government Robot Social Access Control YouTube Statistics USB Meetings Smart Tech Content Management Programming Skype Touchscreen Unsupported Software Machine Learning DDoS Infrastructure OneNote Augmented Reality Intranet Information Solid State Drive Running Cable Update Black Market Wearable Technology Encryption Data Storage Windows 8.1 Update Keyboard Telephony Unified Communications Practices Managed Service Consultant Google Docs Staff Addiction Display Online Shopping Accountants Business Technology Notifications Audit Laptop Debate Enterprise Content Management Colocation Cameras Webcam Netflix Botnet Business Mangement Root Cause Analysis Data Warehousing Specifications Students SharePoint Start Menu Theft Help Desk Hosted Computing Proactive Shadow IT Licensing Voice over Internet Protocol Digital Signature Cache Virtual Reality Supercomputer Regulations Evernote Virtual Assistant Hybrid Cloud WIndows 7 Computer Fan Criminal Devices Touchpad PC Care HBO Password Management IaaS Computing Infrastructure Printer Server Shortcut Travel 3D Millennials Healthcare Relocation Worker Commute Scheduling Mobile Cortana Inventory Remote Monitoring and Maintenance Legal User Multi-Factor Security Strategy Wireless Internet Monitor Bloatware Knowledge Wireless Charging IoT Telephone System Managing Stress Domains eBay FENG Thought Leadership IT Security Science Alerts Frequently Asked Questions Fraud NIST Patch Management Screen Mirroring Workforce Macro Electronic Health Records 360 Emails Professional Services Google Apps Line of Business Print Server Lifestyle Co-managed IT Wire Remote Support Reputation Entrepreneur Flash Fiber-Optic nternet Crowdfunding Text Messaging Electronic Medical Records Software as a Service Content Filter Tablets Work Station Business Owner Tip of the week Amazon Cryptocurrency Internet exploMicrosoft Gaming Console Windows 10s Hiring/Firing Charger Cast Telecommuting Company Culture Windows Media Player Virtual Desktop Tools Authentication MSP NarrowBand Law Firm IT Hiring/Firing Smart Office Customers Cost Management HIPAA Sync Cables Insurance Uninterrupted Power Supply Storage Upgrades Analyitcs Windows Server 2008 Amazon Web Services Safe Mode Advertising LinkedIn Chromecast Computer Care Software Tips Remote Work HVAC Distributed Denial of Service Files Net Neutrality Customer Service Hosted Solution Password Manager Nanotechnology Employer Employee Relationship CrashOverride Smart Technology Wiring How to Loyalty Books Experience Techology Content Thank You Two Factor Authentication Emergency Worker Music Audiobook Congratulations Assessment Rootkit Politics Regulation Battery Television Transportation Video Games Troubleshooting Webinar Automobile Public Computer Benefits Remote Worker Scalability IT solutions

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *