Contact Us Today! 800-626-8277

One World Technology Inc. Blog

One World Technology Inc. has been serving the Medina area since 2012, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Using Cortana Gets Better with Customization

Using Cortana Gets Better with Customization

As Cortana has more and more added to its functionality, it gradually becomes more of a utility to all. Those who prefer to use Google’s applications are now able to use Cortana to augment their use of Gmail, Google Contacts, and Google Calendar. Today, we’ll go through how you can set these programs up to play nice with Cortana.

For Cortana to work with Google apps, these apps must first be identified as a service. Access Cortana and click Notebook, and once the panel appears, access Connected Services and from there, Add service.

At this point, you will only be given an option for Gmail, but that includes Contacts and Calendar as well, in addition to Google Drive. After you next sign on to your Google account, your Connected Services menu will include Gmail as an option.

Privacy and Usage Disclaimers
Be warned, when you give Cortana access to your email and other services, you are opening your personal data to the assistant, and therefore, to Microsoft as well. You should definitely review the disclaimer that appears before connecting these accounts, as it will explain how your data is going to be used. If you have second thoughts after reading this disclaimer, you can be directed to where these integrations can be deactivated.

Since there isn’t any indication, as of yet, as to which of Cortana’s commands will work with these Google services, we are given the opportunity to speculate freely. What functions do you think Cortana will have in regard to Google’s apps? Give us your ideal list in the comments!

Tip of the Week: 5 Handy Android Shortcuts
Can Chargers Be Interchanged Between Devices?


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, 23 February 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Privacy Best Practices Cloud Technology Network Security Managed IT Services Business Computing Backup Hackers Outsourced IT Software Malware Microsoft Business Business Continuity Hosted Solutions VoIP Disaster Recovery Google Email Windows 10 Data IT Support Smartphones Data Backup Mobile Devices Innovation Efficiency Saving Money Hardware Android Small Business Alert Communications Productivity Cloud Computing Computer Browser Cybercrime Office Ransomware Data Recovery IT Services Business Management Computers Server Cybersecurity Passwords Managed IT How To Virtualization Mobility Law Enforcement BDR Work/Life Balance Chrome User Tips Telephone Systems Health Internet Avoiding Downtime Smartphone Internet of Things Wi-Fi Flexibility Save Money Holiday Hacking Collaboration Productivity Managed IT Services Office Tips Windows Quick Tips App Social Engineering Remote Monitoring Password Firewall Private Cloud Budget Communication Social Media Business Intelligence Phishing Miscellaneous Value HaaS Bring Your Own Device Compliance Information Technology Spam Router Proactive IT Facebook Money Data Security Gadgets Mobile Device Management Two-factor Authentication Office 365 Data Breach Artificial Intelligence Recovery Bandwidth Keyboard Document Management Windows 10 Worker Computing Infrastructure Redundancy Black Market Save Time Data Protection Marketing OneNote IT Management Google Drive Government Spam Blocking SaaS Remote Computing Two Factor Authentication Comparison IT Plan Training Patch Management Operating System Solid State Drive History Unsupported Software Apps End of Support Network Scam Automobile Risk Management Workplace Tips Electronic Medical Records Workers Battery Charger Data Management Vulnerability Hiring/Firing Applications Microsoft Office Legal Managed Service Provider HIPAA CES Identity Theft Upgrade BYOD Word Content Filtering Computer Care Public Cloud Mobile Device Automation Data Storage Employer-Employee Relationship Credit Cards Big Data Business Owner Content Blockchain Wireless Technology Lifestyle FENG Shadow IT Fraud Colocation Flash Travel Books Settings Google Apps Audiobook Networking Human Resources Mobile Computing Data Warehousing Experience webinar Amazon PDF Loyalty Infrastructure Entertainment IBM Staff Video Games Outlook Music Conferencing Rootkit Amazon Web Services hacker Sync Password Manager Software as a Service Emergency Supercomputer Hard Drives Files Frequently Asked Questions Telephony Wearable Technology IT Support Online Shopping Internet Exlporer Business Mangement Update Root Cause Analysis Scalability Specifications Excel Skype Downtime USB Vendor Management Evernote Assessment Gmail Windows 10s Current Events Millennials User Error Tip of the week Start Menu Software Tips Troubleshooting Wireless Charging Internet exploMicrosoft Television Recycling Google Docs Apple Transportation Meetings Politics Knowledge Instant Messaging Workforce Windows Server 2008 Mobile Physical Security Education Fiber-Optic Public Computer eWaste Wireless Website iPhone Benefits Audit Data loss Network Congestion Telecommuting Windows 7 Professional Services Hosted Solution Emails Unified Threat Management Cables Advertising Criminal Voice over Internet Protocol Smart Technology Screen Mirroring Search Employer Employee Relationship Remote Work Regulations Techology Tools Relocation HBO Virtual Reality Cleaning Unified Communications Best Practice Multi-Factor Security Users Computer Fan Cast Leadership How to Computer Accessories Worker Commute Theft Safety Content Management Trending The Internet of Things Bluetooth Servers Botnet Humor Netflix Samsung Cortana Hybrid Cloud CrashOverride Digital Signature WiFi Robot Webinar IT solutions

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *