Contact Us Today! 800-626-8277

One World Technology Inc. Blog

One World Technology Inc. has been serving the Medina area since 2012, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Using Cortana Gets Better with Customization

Using Cortana Gets Better with Customization

As Cortana has more and more added to its functionality, it gradually becomes more of a utility to all. Those who prefer to use Google’s applications are now able to use Cortana to augment their use of Gmail, Google Contacts, and Google Calendar. Today, we’ll go through how you can set these programs up to play nice with Cortana.

For Cortana to work with Google apps, these apps must first be identified as a service. Access Cortana and click Notebook, and once the panel appears, access Connected Services and from there, Add service.

At this point, you will only be given an option for Gmail, but that includes Contacts and Calendar as well, in addition to Google Drive. After you next sign on to your Google account, your Connected Services menu will include Gmail as an option.

Privacy and Usage Disclaimers
Be warned, when you give Cortana access to your email and other services, you are opening your personal data to the assistant, and therefore, to Microsoft as well. You should definitely review the disclaimer that appears before connecting these accounts, as it will explain how your data is going to be used. If you have second thoughts after reading this disclaimer, you can be directed to where these integrations can be deactivated.

Since there isn’t any indication, as of yet, as to which of Cortana’s commands will work with these Google services, we are given the opportunity to speculate freely. What functions do you think Cortana will have in regard to Google’s apps? Give us your ideal list in the comments!

Tip of the Week: 5 Handy Android Shortcuts
Can Chargers Be Interchanged Between Devices?


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, 23 May 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Privacy Cloud Best Practices Technology Network Security Business Computing Managed IT Services Hackers Backup Hosted Solutions Software Malware Outsourced IT VoIP Google Business Continuity Business Microsoft Email Disaster Recovery Data Data Backup IT Support Windows 10 Cybercrime Mobile Devices Ransomware Cloud Computing Efficiency Smartphones Android Saving Money Small Business Alert Communications Internet Innovation Browser Productivity Hardware IT Services Data Recovery Office Computers Computer Business Management Cybersecurity Managed IT Smartphone Server Virtualization BDR Internet of Things Law Enforcement User Tips Telephone Systems How To Mobility Productivity Collaboration Passwords Communication Tech Term Work/Life Balance Chrome Data Protection Phishing Business Intelligence Private Cloud Artificial Intelligence Wi-Fi Social Media Save Money Flexibility Holiday Health Hacking Managed IT Services Office Tips Avoiding Downtime Windows App Remote Monitoring Data Security Password Mobile Device Management Quick Tips Firewall Budget Social Engineering Recovery Big Data Facebook Bandwidth Gadgets Value Bring Your Own Device HaaS Compliance Automation Miscellaneous Apps Spam Vulnerability Proactive IT Identity Theft Information Technology Money Applications Two-factor Authentication Network Office 365 Data Breach Router Redundancy BYOD Mobile Device Employer-Employee Relationship Data Storage Business Owner Managed Service Provider Comparison Keyboard Document Management Update Windows 10 Worker Upgrade Save Time Public Cloud OneNote IT Management Spam Blocking SaaS Two Factor Authentication Remote Computing IT Plan Training Patch Management Operating System Website Unsupported Software VPN Computing Infrastructure Scam Black Market Automobile PDF Electronic Medical Records Risk Management Workplace Tips Marketing Battery Workers Charger Data Management Google Drive CES Government Word Hiring/Firing Data loss Solid State Drive History Credit Cards End of Support Microsoft Office Legal HIPAA Smart Tech Cleaning Content Filtering Computer Care Infrastructure Wireless Staff Bluetooth iPhone Outlook Sync Netflix Practices Samsung Amazon Web Services Thought Leadership Advertising Password Manager Software as a Service Content FENG Wireless Technology Shadow IT Digital Signature Frequently Asked Questions Streaming Media Books Telephony Settings Hosted Computing Online Shopping Business Mangement Relocation Audiobook Networking Data Warehousing webinar Encryption Specifications Experience Users Excel Content Filter Skype Inventory Loyalty Evernote IBM Gmail Entertainment Video Games Conferencing Strategy Rootkit Millennials Music Tip of the week Storage Emergency Start Menu Access Control Wireless Charging Supercomputer Hybrid Cloud Recycling Humor Google Docs IT Support Analysis Workforce Wearable Technology Windows Server 2008 Fiber-Optic Mobile Authentication Colocation eWaste Root Cause Analysis Scalability Windows 7 Vendor Management Telecommuting USB Cables Addiction Professional Services Windows 10s Nanotechnology Assessment Current Events Criminal Voice over Internet Protocol Regulations Software Tips Accountants Remote Work Troubleshooting hacker Unified Communications Cache Transportation Tools Connectivity Television Knowledge Multi-Factor Security Politics Meetings Instant Messaging Physical Security Education Hard Drives Files Internet Exlporer Theft Benefits Audit Public Computer Network Congestion Content Management Trending Servers Emails IoT Unified Threat Management Hosted Solution Cortana Smart Technology Downtime Botnet Blockchain Employer Employee Relationship Lifestyle Screen Mirroring Search Flash HBO Virtual Reality Techology User Error Fraud Internet exploMicrosoft Google Apps Travel Computer Fan Best Practice Leadership Human Resources Computer Accessories Apple Mobile Computing Cast How to Worker Commute Insurance Amazon Devices The Internet of Things Safety WiFi CrashOverride Twitter Wireless Internet Webinar Robot IT solutions

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *