(703) 288-9767    NTC Store
NTConnections Blog

NTConnections has been serving the Reston area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Using Cortana Gets Better with Customization

Using Cortana Gets Better with Customization

As Cortana has more and more added to its functionality, it gradually becomes more of a utility to all. Those who prefer to use Google’s applications are now able to use Cortana to augment their use of Gmail, Google Contacts, and Google Calendar. Today, we’ll go through how you can set these programs up to play nice with Cortana.

For Cortana to work with Google apps, these apps must first be identified as a service. Access Cortana and click Notebook, and once the panel appears, access Connected Services and from there, Add service.

At this point, you will only be given an option for Gmail, but that includes Contacts and Calendar as well, in addition to Google Drive. After you next sign on to your Google account, your Connected Services menu will include Gmail as an option.

Privacy and Usage Disclaimers
Be warned, when you give Cortana access to your email and other services, you are opening your personal data to the assistant, and therefore, to Microsoft as well. You should definitely review the disclaimer that appears before connecting these accounts, as it will explain how your data is going to be used. If you have second thoughts after reading this disclaimer, you can be directed to where these integrations can be deactivated.

Since there isn’t any indication, as of yet, as to which of Cortana’s commands will work with these Google services, we are given the opportunity to speculate freely. What functions do you think Cortana will have in regard to Google’s apps? Give us your ideal list in the comments!



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, 24 April 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Privacy Best Practices Cloud Hackers Business Computing Productivity Microsoft Backup Hosted Solutions Malware Internet Mobile Devices Google Efficiency VoIP Business IT Support IT Services Email Miscellaneous Network Security Managed Service Provider Innovation Server Workplace Tips Disaster Recovery Business Continuity Network Data Software Windows Upgrade Hardware Business Management Mobile Device Management Communication Smartphone Browser Virtualization Computer Android Save Money Saving Money Managed IT Services Smartphones User Tips Microsoft Office communications Holiday Data Backup Windows 10 Outsourced IT BYOD WiFi Computers Cybercrime Small Business Social Media Remote Monitoring Operating System Cloud Computing Hacking Mobile Computing Ransomware Chrome Big Data Data Recovery Alert Apple Proactive IT Avoiding Downtime VPN Managed IT Services Application IT Solutions Employer-Employee Relationship Automation Quick Tips Information Technology Office Budget Internet of Things Collaboration Passwords Marketing The Internet of Things Social Engineering spam Cybersecurity BDR Gadgets Health Mobility Bring Your Own Device Going Green Remote Computing Recovery Telephone Systems Gmail Save Time Firewall Vendor Management Private Cloud iPhone Vulnerability Bandwidth Data Security Compliance Redundancy How To Managed IT Two-factor Authentication Wireless Technology User Error IT Support Data Protection Business Intelligence App Downtime Document Management Risk Management Lithium-ion battery History Tablet Antivirus Value Retail Memory Search Mouse Identity Theft Phishing Analytics Router Networking Office 365 Data Management Artificial Intelligence Apps Office Tips PowerPoint Tech Term Website Excel Windows 10 Phone System Content Filtering Money OneNote Physical Security DDoS Administration IT Plan Online Currency Robot Mobile Device CES Entertainment Work/Life Balance Printer Google Drive Unsupported Software Environment Running Cable Unified Threat Management Update Human Resources Skype SaaS Mobile Office Current Events Training Data loss Safety Customer Relationship Management Maintenance Government Public Cloud Cleaning Meetings Best Available People Credit Cards HaaS Fax Server Programming Black Market HIPAA Network Congestion Trending Intranet Internet Exlporer Data storage Humor Law Enforcement Data Storage Statistics Encryption Solid State Drive Biometrics Word Comparison eWaste Productivity IT Consultant Workers Outlook Hard Drives Business Owner Facebook Flexibility IT Management Saving Time Wireless Charging Best Practice Legal Servers Company Culture Social Networking Criminal Chromecast Windows Media Player Windows 8.1 Update Smart Tech Workforce End of Support Analyitcs Flash Fiber-Optic Laptop Software as a Service Settings Hiring/Firing Insurance WIndows 7 Telecommuting Distributed Denial of Service Internet exploMicrosoft Sync Virtual Desktop Root Cause Analysis Cables Content Management Touchpad IT service Print Server Practices Relocation Managing Stress Patch Management Remote Work Advertising Software Tips Virtual Reality Telephony Unified Communications Uninterrupted Power Supply Blockchain Virus Google Docs Domains LinkedIn Hosted Computing Scam IaaS Bloatware Start Menu Net Neutrality Customer Service Debate Computer Repair Charger Theft Staff Computer Accessories Voice over Internet Protocol Audit Inventory Hybrid Cloud HBO Entrepreneur Mobile Computer Care Cortana Tech Support Digital Signature Cameras Multi-Factor Security Screen Mirroring Hacker Video Surveillance Spam Blocking Access Control Consultant Fraud PDF Frequently Asked Questions Cost Management Professional Services Touchscreen Education Google Apps Shadow IT Strategy Printer Server Keyboard Lifestyle Wireless Cast Science Authentication Amazon Streaming Media Tip of the week Instant Messaging Worker Commute Tools Shortcut Piracy Infrastructure Analysis SharePoint Windows 8 Computer Fan User Amazon Web Services Windows Server 2008 Applications Licensing Bluetooth Password Manager Sports Accountants Monitor Files Tablets Samsung FENG Online Shopping Notifications Twitter Password Windows 7 Wi-Fi Botnet USB Business Mangement YouTube Reputation Specifications Wearable Technology Colocation Data Warehousing Crowdfunding Electronic Medical Records Evernote Regulations Social Travel Recycling NarrowBand IoT Customers Hosted Solution Millennials Computing Infrastructure Employer Employee Relationship Automobile Data Breach Emails Books CrashOverride IBM Webinar Emergency Worker Supercomputer Content IT solutions Video Games Rootkit Knowledge Audiobook Netflix Scalability Users Politics Transportation How to webinar Benefits Loyalty Conferencing Windows 10s Smart Technology Battery Experience Nanotechnology Two Factor Authentication Assessment Music Television Troubleshooting Techology Public Computer