Contact us today!
845-876-6561

Professional Computer Associates Blog

Professional Computer Associates has been serving the Red Hook area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Using Cortana Gets Better with Customization

Using Cortana Gets Better with Customization

As Cortana has more and more added to its functionality, it gradually becomes more of a utility to all. Those who prefer to use Google’s applications are now able to use Cortana to augment their use of Gmail, Google Contacts, and Google Calendar. Today, we’ll go through how you can set these programs up to play nice with Cortana.

For Cortana to work with Google apps, these apps must first be identified as a service. Access Cortana and click Notebook, and once the panel appears, access Connected Services and from there, Add service.

At this point, you will only be given an option for Gmail, but that includes Contacts and Calendar as well, in addition to Google Drive. After you next sign on to your Google account, your Connected Services menu will include Gmail as an option.

Privacy and Usage Disclaimers
Be warned, when you give Cortana access to your email and other services, you are opening your personal data to the assistant, and therefore, to Microsoft as well. You should definitely review the disclaimer that appears before connecting these accounts, as it will explain how your data is going to be used. If you have second thoughts after reading this disclaimer, you can be directed to where these integrations can be deactivated.

Since there isn’t any indication, as of yet, as to which of Cortana’s commands will work with these Google services, we are given the opportunity to speculate freely. What functions do you think Cortana will have in regard to Google’s apps? Give us your ideal list in the comments!

Tip of the Week: 5 Handy Android Shortcuts
Can Chargers Be Interchanged Between Devices?
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 21 January 2018

Captcha Image

QR-Code

Tag Cloud

Security Tip of the Week Best Practices Cloud Privacy Hackers Technology Backup Business Computing Network Security Hosted Solutions Malware Managed IT Services Disaster Recovery Microsoft VoIP Google Business Software Business Continuity Mobile Devices Productivity Outsourced IT Email Data Internet Smartphones Windows 10 communications Computer Hardware Innovation IT Support Efficiency Ransomware Cybercrime Android Office Server Alert IT Services Browser Telephone Systems Data Backup Small Business Saving Money Computers Business Management Windows Quick Tips Chrome Social Engineering Upgrade User Tips Mobile Device Management Collaboration How To Holiday Data Recovery BYOD Smartphone Social Media Hacking Miscellaneous Workplace Tips Passwords App Office Tips Firewall Managed IT Cybersecurity Cloud Computing Save Money Virtualization Mobility Work/Life Balance Law Enforcement Network Avoiding Downtime Recovery Microsoft Office BDR Productivity Private Cloud Office 365 Bring Your Own Device Budget Managed Service Provider Password Bandwidth Proactive IT Flexibility Money Wi-Fi Two-factor Authentication HaaS Facebook Communication Operating System Information Technology Health Spam User Error Remote Monitoring Marketing Gadgets Data Management Black Market Artificial Intelligence Internet of Things Managed IT Services Google Drive Value Risk Management SaaS Employer-Employee Relationship Windows 10 Router Automation Compliance Safety Gmail Redundancy Data Breach Phishing Applications Remote Computing Wireless Technology Charger Settings Data Security Spam Blocking Solid State Drive Entertainment Hiring/Firing Computer Care Computing Infrastructure Physical Security Mobile Computing Vulnerability Samsung Wearable Technology Patch Management Business Owner Data Storage Keyboard Downtime Cleaning Scam Workers Business Intelligence VPN History Identity Theft Save Time Best Practice Credit Cards Data storage DDoS Shadow IT Automobile Government Worker IT Management End of Support Internet Exlporer Apps Word OneNote Meetings Wireless Battery Apple The Internet of Things Unsupported Software Mobile Device Content Filtering Public Cloud Online Shopping Reputation Flash Cortana Environment Politics Hard Drives Files Lithium-ion battery Hybrid Cloud Specifications Networking Running Cable Big Data webinar Video Games Users Evernote Customer Sync Streaming Media Electronic Medical Records Chromecast Unified Threat Management Data loss Google Apps Colocation Software as a Service PDF Millennials IBM HBO Books Conferencing Scalability SharePoint Virtual Reality Telephony Windows 10s Encryption Screen Mirroring Infrastructure HIPAA Update Workforce Supercomputer Frequently Asked Questions Uninterrupted Power Supply Emergency IT Support Instant Messaging Worker Commute Skype Employer Employee Relationship Notifications Cast Password Manager People hacker Google Docs Telecommuting Current Events Excel Fax Server Search Start Menu Computer Accessories Audit Mobile Office Website Remote Work Tip of the week IT solutions How to Document Management Mobile Bluetooth Computer Fan Going Green Loyalty Experience Knowledge Techology Voice over Internet Protocol Robot Windows Server 2008 Tech Support Transportation Relocation Professional Services FENG Wireless Charging Laptop Data Warehousing Antivirus Music Network Congestion Multi-Factor Security Windows 7 Benefits Emails IaaS Tools Fiber-Optic Touchpad Assessment USB Trending Fraud Outlook Regulations Distributed Denial of Service Smart Technology WiFi YouTube Rootkit Cables Television IT Plan Troubleshooting IT Consultant Legal Internet exploMicrosoft Lifestyle Amazon Humor Unified Communications Content iPhone Botnet Training Data Protection Public Computer Hosted Solution Leadership Advertising Amazon Web Services Monitor Servers Mouse Sports Two Factor Authentication Netflix Education Root Cause Analysis Theft eWaste Audiobook Travel NarrowBand Vendor Management Comparison Software Tips Business Mangement Administration Recycling Webinar Thank You IT solutions CrashOverride Congratulations

Free Consultation

Free ConsultationSign up today for a
FREE Network Consultation
How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!