(703) 288-9767    NTC Store
NTConnections Blog

NTConnections has been serving the Reston area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Using Cortana Gets Better with Customization

Using Cortana Gets Better with Customization

As Cortana has more and more added to its functionality, it gradually becomes more of a utility to all. Those who prefer to use Google’s applications are now able to use Cortana to augment their use of Gmail, Google Contacts, and Google Calendar. Today, we’ll go through how you can set these programs up to play nice with Cortana.

For Cortana to work with Google apps, these apps must first be identified as a service. Access Cortana and click Notebook, and once the panel appears, access Connected Services and from there, Add service.

At this point, you will only be given an option for Gmail, but that includes Contacts and Calendar as well, in addition to Google Drive. After you next sign on to your Google account, your Connected Services menu will include Gmail as an option.

Privacy and Usage Disclaimers
Be warned, when you give Cortana access to your email and other services, you are opening your personal data to the assistant, and therefore, to Microsoft as well. You should definitely review the disclaimer that appears before connecting these accounts, as it will explain how your data is going to be used. If you have second thoughts after reading this disclaimer, you can be directed to where these integrations can be deactivated.

Since there isn’t any indication, as of yet, as to which of Cortana’s commands will work with these Google services, we are given the opportunity to speculate freely. What functions do you think Cortana will have in regard to Google’s apps? Give us your ideal list in the comments!



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, 21 January 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Privacy Hackers Business Computing Productivity Microsoft Backup Malware Hosted Solutions Internet Google Mobile Devices Efficiency VoIP Business IT Support Email Miscellaneous IT Services Managed Service Provider Server Workplace Tips Disaster Recovery Business Continuity Network Data Windows Upgrade Innovation Hardware Business Management Software Communication Computer Network Security Save Money Saving Money Mobile Device Management Android Smartphones communications Microsoft Office User Tips Virtualization Managed IT Services Browser Smartphone Holiday Outsourced IT WiFi Windows 10 Computers BYOD Small Business Hacking Chrome Social Media Operating System Mobile Computing Data Backup Alert Cybercrime Apple Application Proactive IT Remote Monitoring Avoiding Downtime IT Solutions Budget Collaboration Quick Tips Big Data Ransomware Information Technology Social Engineering Passwords Automation Managed IT Services Marketing Employer-Employee Relationship The Internet of Things Office Data Recovery Mobility Health Bring Your Own Device VPN Gadgets Recovery spam Telephone Systems Going Green Remote Computing Cybersecurity Vendor Management Wireless Technology User Error Two-factor Authentication iPhone How To Managed IT Save Time Firewall App Cloud Computing BDR Bandwidth Compliance Risk Management Redundancy Office 365 Antivirus Internet of Things PowerPoint Website Vulnerability Router Excel Analytics Phone System Office Tips Content Filtering Money Downtime History IT Support Tablet Gmail Lithium-ion battery Artificial Intelligence Value Retail Memory Search Private Cloud Windows 10 Networking Mouse Network Congestion Document Management Meetings Trending IT Management Online Currency Work/Life Balance HaaS Fax Server Black Market Printer Data Management Humor Statistics Unsupported Software Current Events Public Cloud Internet Exlporer Data storage Phishing Maintenance Biometrics Outlook Data Security Identity Theft Flexibility Hard Drives Credit Cards Facebook Administration Intranet Law Enforcement Entertainment Running Cable Solid State Drive Physical Security DDoS Skype Unified Threat Management Robot Data Storage Google Drive Mobile Office Environment Customer Relationship Management Workers Word Apps IT Consultant Business Intelligence Business Owner SaaS Best Available OneNote People Safety Saving Time Government Programming Company Culture Video Surveillance Travel End of Support Cleaning Cameras Customer Service Consultant Millennials Windows 8.1 Update Mobile Device Servers Entrepreneur Education Wireless Charging Internet exploMicrosoft Tech Support Printer Server Hacker Root Cause Analysis Workforce IT Plan Flash Worker Commute Cost Management Piracy Fiber-Optic Software as a Service Patch Management Advertising Shadow IT User Wireless Science Data loss Telecommuting Cables Sync Print Server Streaming Media Instant Messaging Licensing Shortcut Samsung Update Scam Software Tips SharePoint Twitter Windows 8 Remote Work Charger Unified Communications Telephony Encryption Bluetooth Net Neutrality Crowdfunding Google Docs Computer Repair Hybrid Cloud Sports Monitor eWaste Tablets Computer Care Theft Start Menu HIPAA Notifications USB Spam Blocking Voice over Internet Protocol Audit YouTube HBO Reputation Wearable Technology Cortana Mobile Keyboard Windows Media Player Social Touchscreen Multi-Factor Security Screen Mirroring NarrowBand Frequently Asked Questions Customers Fraud Hiring/Firing Google Apps Professional Services Best Practice Social Networking WIndows 7 Computer Fan Lifestyle Cast Chromecast Tip of the week Applications Analyitcs Amazon Infrastructure Tools Files Managing Stress Settings FENG Data Protection Productivity Password Laptop Windows Server 2008 Wi-Fi Distributed Denial of Service Amazon Web Services Password Manager LinkedIn Colocation Virus Virtual Desktop IT service Human Resources Comparison Touchpad Windows 7 Relocation Virtual Reality Debate Online Shopping Botnet Hosted Solution Computing Infrastructure Uninterrupted Power Supply Computer Accessories Training Domains Specifications Data Warehousing Regulations IaaS Bloatware Evernote Recycling Emails Books CrashOverride IBM Webinar Emergency Worker Supercomputer Content IT solutions Video Games Rootkit Knowledge Audiobook Netflix Scalability Politics Transportation Users How to webinar Benefits PDF Loyalty Conferencing Windows 10s Smart Technology Battery Experience Two Factor Authentication Assessment Music Television Troubleshooting Electronic Medical Records Techology Public Computer Business Mangement Employer Employee Relationship Legal Automobile Data Breach