Contact us today!
845-876-6561

Professional Computer Associates Blog

Professional Computer Associates has been serving the Red Hook area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Using Cortana Gets Better with Customization

Using Cortana Gets Better with Customization

As Cortana has more and more added to its functionality, it gradually becomes more of a utility to all. Those who prefer to use Google’s applications are now able to use Cortana to augment their use of Gmail, Google Contacts, and Google Calendar. Today, we’ll go through how you can set these programs up to play nice with Cortana.

For Cortana to work with Google apps, these apps must first be identified as a service. Access Cortana and click Notebook, and once the panel appears, access Connected Services and from there, Add service.

At this point, you will only be given an option for Gmail, but that includes Contacts and Calendar as well, in addition to Google Drive. After you next sign on to your Google account, your Connected Services menu will include Gmail as an option.

Privacy and Usage Disclaimers
Be warned, when you give Cortana access to your email and other services, you are opening your personal data to the assistant, and therefore, to Microsoft as well. You should definitely review the disclaimer that appears before connecting these accounts, as it will explain how your data is going to be used. If you have second thoughts after reading this disclaimer, you can be directed to where these integrations can be deactivated.

Since there isn’t any indication, as of yet, as to which of Cortana’s commands will work with these Google services, we are given the opportunity to speculate freely. What functions do you think Cortana will have in regard to Google’s apps? Give us your ideal list in the comments!

Tip of the Week: 5 Handy Android Shortcuts
Can Chargers Be Interchanged Between Devices?
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, July 21 2018

Captcha Image

QR-Code

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Privacy Network Security Hackers Business Computing Backup Hosted Solutions Malware Managed IT Services Google VoIP Microsoft Disaster Recovery Mobile Devices Software Productivity Business Internet Business Continuity Email Data Outsourced IT Innovation Data Backup communications Cybercrime Efficiency Ransomware Computer IT Support Smartphones Windows 10 Cloud Computing Hardware IT Services Browser Android Data Recovery Internet of Things BDR Office Saving Money Tech Term Computers Server Business Management Telephone Systems Alert Windows Small Business Cybersecurity Smartphone Upgrade Virtualization User Tips Mobile Device Management Network Collaboration Quick Tips BYOD Chrome Workplace Tips Social Engineering Save Money Law Enforcement Microsoft Office Managed IT Holiday Private Cloud Office 365 Mobility Social Media Hacking Work/Life Balance Router Miscellaneous Avoiding Downtime Passwords App Office Tips Managed Service Provider Firewall Productivity Bandwidth Money Communication Artificial Intelligence Facebook Password How To Recovery Flexibility Wi-Fi Data Management Bring Your Own Device Business Intelligence Applications VPN Proactive IT Remote Monitoring Two-factor Authentication HaaS Data Protection Budget Automation Operating System Phishing Information Technology Gmail Health Data Security Redundancy Connectivity User Error Marketing Vulnerability Gadgets Apps Entertainment Managed IT Services Black Market Compliance Mobile Device Google Drive Identity Theft Data Breach Blockchain Cleaning Big Data Windows 10 Risk Management SaaS Word Employer-Employee Relationship Value Safety Spam Document Management Data loss Remote Computing Save Time Settings Wireless Technology Paperless Office Update Worker Streaming Media Automobile IT Support USB PDF Legal Computing Infrastructure Encryption CES Battery Website Smart Tech Physical Security Training Data Storage Mobile Computing Workers Wearable Technology Content Management Education Content Filtering Downtime Charger Credit Cards History Networking Windows 7 Electronic Medical Records Solid State Drive IT Management Best Practice Data storage Hiring/Firing OneNote DDoS Shadow IT Government Computer Care IT Plan HIPAA End of Support Internet Exlporer Access Control Samsung Unsupported Software YouTube Patch Management Meetings Servers Infrastructure Business Owner Wireless Comparison The Internet of Things Keyboard Apple Scam Analysis Sports eWaste Spam Blocking Public Cloud NIST Software as a Service Accountants Reputation Conferencing Environment Millennials Files HBO Lithium-ion battery Music Telephony Recycling Benefits Windows 10s Running Cable Hybrid Cloud Cryptocurrency Customer Screen Mirroring Workforce Devices Colocation Assessment Frequently Asked Questions Wireless Charging Chromecast Skype Criminal Smart Technology Students Safe Mode Google Docs IoT Rootkit Cast SharePoint Troubleshooting Telecommuting Thought Leadership Television Excel Fiber-Optic Start Menu Audit Uninterrupted Power Supply Healthcare File Sharing Content Hosted Solution People Remote Work Content Filter hacker Public Computer Tip of the week Notifications Cables Mobile Two Factor Authentication Computer Fan Fax Server Electronic Health Records Business Technology Voice over Internet Protocol Insurance Vendor Management Audiobook Knowledge Mobile Office Storage Windows Server 2008 Unified Communications Professional Services FENG IT solutions Machine Learning Hard Drives Virtual Assistant Multi-Factor Security Practices Data Warehousing Politics Network Congestion Emails Video Games Theft Going Green Tools Human Resources Robot Tech Support Users Telephone System Trending Hosted Computing Relocation Unified Threat Management Books Antivirus Scalability Fraud Addiction IBM Regulations Cortana Laptop Staff Virtual Reality Lifestyle Inventory IT Consultant IaaS Touchpad Emergency Instant Messaging Amazon Cache Supercomputer Google Apps Botnet Digital Signature Outlook Employer Employee Relationship Distributed Denial of Service Worker Commute WiFi HVAC Leadership Netflix Search Amazon Web Services Wireless Internet Internet exploMicrosoft Current Events Enterprise Content Management Travel Strategy Humor Computer Accessories Root Cause Analysis Authentication iPhone Software Tips Password Manager How to Online Shopping Wire Advertising Flash Password Management Monitor Bluetooth Mouse Techology Specifications Nanotechnology Loyalty NarrowBand Experience webinar Sync Business Mangement Transportation Evernote Smart Office Administration Twitter Company Culture Webinar Managing Stress IT solutions CrashOverride Thank You Congratulations

Free Consultation

Free ConsultationSign up today for a
FREE Network Consultation
How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!