Contact us today!

Total Tech Care Blog

Total Tech Care has been serving the Oakland Park area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Using Templates in Evernote

Tip of the Week: Using Templates in Evernote

The note-taking application Evernote is a favorite of many users, as it allows them to keep extensive notes in an organized fashion. Its true utility goes beyond that of a digital scratch pad, however, as it has additional features that offer much more. For this week’s tip, we’ll review one particularly useful feature: templates.

What Are Templates?
Evernote’s templates are handy, pre-built structures for notes that provide users with a simpler means of organizing specific types of information. Instead of taking time struggling with your formatting each time you start a new note, you can apply one of the templates that Evernote offers on their website. Those with a subscription to Evernote Plus, Premium, or Business can even use formatting they’ve created in past notes to generate their own templates for repeated use.

Applying Templates in Evernote
Once you’ve acquired a few templates, either from the Evernote website’s collection or from a past note, applying one of your choosing is relatively simple.

  • In Evernote, start a new note.
  • In the body of the note, click Templates to view the ones you have saved.
  • From there, you can search for any templates you have, delete ones you no longer want or need, edit their names, and of course, apply them to notes.
  • If you want to edit a template, follow the same process, and once you’ve made the changes that you want, save it as a new template. Note: only those with Plus, Premium, or Business accounts are able to do this.
  • Plus, Premium, and Business users are also able to create their own templates this way.

So, what do you think? Is this a welcome change to Evernote? What other improvements would you like to see them make down the line? Let us know in the comments!



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, 17 November 2018
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation

      Tag Cloud

      Security Tip of the Week Technology Best Practices Cloud Privacy Hackers Backup Hosted Solutions Business Computing Business Malware Google Microsoft Network Security Software Productivity Mobile Devices Internet Innovation Data Business Continuity Email Workplace Tips Efficiency Disaster Recovery Hardware VoIP Browser Windows 10 IT Services Computer Miscellaneous communications Smartphones User Tips Network Android Smartphone Office Business Management Upgrade Server Chrome Tech Term Virtualization Computers Outsourced IT Managed IT Services Save Money Cybercrime Windows IT Support Data Backup Hacking Ransomware Communication Telephone Systems Alert Managed Service Provider Social Media Microsoft Office Productivity Cloud Computing Small Business Holiday Mobile Device Management Data Recovery Managed IT Services Automation Social Engineering Recovery Employer-Employee Relationship Quick Tips Mobile Computing Applications BYOD Application Saving Money Law Enforcement App Internet of Things Facebook Operating System Artificial Intelligence Mobility Collaboration Money Passwords Marketing Remote Monitoring Router Cybersecurity Bandwidth Office 365 BDR Office Tips Networking Information Technology Windows 10 VPN Password Health How To Mouse Spam IT solutions Entertainment Website Budget Avoiding Downtime IT Support Information Private Cloud Gadgets Gmail HaaS Managed IT Big Data Bring Your Own Device Data Management Wi-Fi Work/Life Balance Two-factor Authentication Remote Computing Flexibility Encryption WiFi Safety Phishing Word Google Drive Sports Redundancy User Error Keyboard USB Data Protection Vulnerability History Scam Training The Internet of Things Data Breach Lithium-ion battery Connectivity Settings Cleaning Data Security Apps Firewall SaaS End of Support Shadow IT Value Voice over Internet Protocol Network Congestion Legal Physical Security Spam Blocking Electronic Medical Records Apple Internet Exlporer Mobile Device Printer Fraud Hiring/Firing eWaste HIPAA Bluetooth PDF Retail Virtual Assistant Data Storage Hard Drives Meetings Instant Messaging Robot Government Excel Best Practice Wearable Technology IT Consultant Telephone System Business Intelligence CES YouTube Black Market Comparison Patch Management Windows 7 Biometrics Paperless Office Hacker Worker IT Management Humor Content Management Risk Management Servers Document Management Update Managed Service Solid State Drive IT Plan Blockchain Wireless Technology Downtime Wireless DDoS Save Time Unsupported Software Data storage Automobile Charger Environment Fax Server Computing Infrastructure OneNote Computer Care Human Resources Virus Infrastructure Samsung Unified Threat Management Virtual Reality Battery Computer Accessories Identity Theft Audiobook Maintenance Managing Stress Cryptocurrency Data loss Password Manager Touchpad Leadership Music Camera Outlook Bloatware Smart Tech Education Tools Social Cache Cameras Credit Cards IaaS Politics Safe Mode Advertising Screen Mirroring Tablets Business Mangement Loyalty Multi-Factor Security Troubleshooting People Warranty Frequently Asked Questions Entrepreneur Practices Wireless Internet Windows 10s Notifications Shortcut File Sharing Cast Recycling webinar Trending Books Mobile Office Administrator Tip of the week Cost Management Hosted Computing Users Botnet Social Networking Wire Relocation Public Cloud Printer Server Amazon Employer Employee Relationship Criminal Proactive IT Assessment Inventory Conferencing Emergency Microchip Video Games Windows Server 2008 Worker Commute Travel Smart Office Amazon Web Services Memory Television Access Control Search Engine Scalability Running Cable Business Owner Virtual Desktop Audit Online Shopping NarrowBand Public Computer Authentication Specifications Bing Search Machine Learning iPhone Computer Fan Science Evernote Rootkit Flash Consultant Nanotechnology Workers Millennials Transportation Help Desk How to Customer Relationship Management HVAC Files FENG Analytics Wireless Charging Vendor Management IBM MSP Analyitcs Staff Chromecast Sync Programming Best Available Workforce Benefits SharePoint Distributed Denial of Service Customer Service WIndows 7 Enterprise Content Management Colocation Cortana Uninterrupted Power Supply Supercomputer Augmented Reality Software Tips Digital Signature Telephony Devices Monitor Emails Telecommuting Smart Technology Password Management Windows 8 Google Apps Current Events IT service Remote Worker Accountants Going Green Skype Thought Leadership Reputation Netflix Remote Work Streaming Media Two Factor Authentication Antivirus Content User NIST Root Cause Analysis Tablet PowerPoint Tech Support Windows Media Player Laptop Knowledge Google Docs Experience Domains Wiring Techology HBO Start Menu Addiction Customers

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...