Contact us today!

Total Tech Care Blog

Total Tech Care has been serving the Oakland Park area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Using Templates in Evernote

Tip of the Week: Using Templates in Evernote

The note-taking application Evernote is a favorite of many users, as it allows them to keep extensive notes in an organized fashion. Its true utility goes beyond that of a digital scratch pad, however, as it has additional features that offer much more. For this week’s tip, we’ll review one particularly useful feature: templates.

What Are Templates?
Evernote’s templates are handy, pre-built structures for notes that provide users with a simpler means of organizing specific types of information. Instead of taking time struggling with your formatting each time you start a new note, you can apply one of the templates that Evernote offers on their website. Those with a subscription to Evernote Plus, Premium, or Business can even use formatting they’ve created in past notes to generate their own templates for repeated use.

Applying Templates in Evernote
Once you’ve acquired a few templates, either from the Evernote website’s collection or from a past note, applying one of your choosing is relatively simple.

  • In Evernote, start a new note.
  • In the body of the note, click Templates to view the ones you have saved.
  • From there, you can search for any templates you have, delete ones you no longer want or need, edit their names, and of course, apply them to notes.
  • If you want to edit a template, follow the same process, and once you’ve made the changes that you want, save it as a new template. Note: only those with Plus, Premium, or Business accounts are able to do this.
  • Plus, Premium, and Business users are also able to create their own templates this way.

So, what do you think? Is this a welcome change to Evernote? What other improvements would you like to see them make down the line? Let us know in the comments!



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, 23 April 2019
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation

      Tag Cloud

      Security Tip of the Week Technology Best Practices Cloud Privacy Hosted Solutions Business Computing Hackers Backup Google Microsoft Malware Business Network Security Internet Mobile Devices Efficiency Software Innovation Data Workplace Tips Email Productivity User Tips Business Continuity Disaster Recovery Productivity IT Services VoIP Hardware communications Browser Smartphones Smartphone Windows 10 Computer Network Android Miscellaneous Business Management Server Tech Term Office Upgrade Chrome Outsourced IT Communication Managed IT Services Save Money Cybercrime Windows Virtualization Data Backup Computers Social Media Holiday IT Support Cloud Computing Hacking Ransomware Telephone Systems Small Business Automation Alert Managed Service Provider Microsoft Office Data Recovery Router Internet of Things Mobile Device Management Employer-Employee Relationship Recovery Collaboration Artificial Intelligence Operating System Social Engineering Quick Tips Mobility Managed IT Services Windows 10 Mobile Computing App Facebook BYOD Application Law Enforcement Saving Money Gadgets Health Cybersecurity IT Support Money Passwords Mobile Device Applications Office 365 Office Tips Information Technology BDR How To Bandwidth Private Cloud VPN Networking Wi-Fi Password Remote Monitoring Spam Marketing IT solutions Entertainment Training Website Budget Avoiding Downtime Gmail Settings Phishing Word Information Managed IT HaaS Two-factor Authentication Bring Your Own Device Data Management Remote Computing Work/Life Balance Big Data Mouse Encryption Flexibility Google Drive Hacker Keyboard History Data Security The Internet of Things Lithium-ion battery Data Protection Wireless USB Paperless Office Save Time Human Resources Firewall Managed Service Connectivity Cleaning Vulnerability Apps Scam Data Breach User Error Voice over Internet Protocol Safety Meetings Sports Redundancy WiFi Users Fraud Proactive IT Telephony Printer Risk Management OneNote Computer Care Bluetooth Government Best Practice YouTube Black Market Samsung DDoS Virtual Assistant CES Comparison Value IT Consultant Access Control Document Management Wireless Technology Spam Blocking Telephone System Environment Electronic Medical Records Content Management Solid State Drive Humor Downtime Fax Server Machine Learning Hiring/Firing Blockchain Data storage Automobile Botnet Virtual Reality Staff Data Storage Computing Infrastructure SaaS Network Congestion Apple Business Intelligence Social Windows 7 Patch Management Update Augmented Reality Worker Battery eWaste IT Management Shadow IT Servers Infrastructure End of Support Virus Legal Google Docs Software as a Service Education Identity Theft Physical Security Unified Threat Management IT Plan Display Internet Exlporer Retail Cryptocurrency Hard Drives Computer Accessories Instant Messaging Excel Wearable Technology Unsupported Software Robot HIPAA PDF Biometrics Charger Virtual Desktop Supercomputer Wireless Internet Cryptomining Relocation Running Cable Software Tips Smartwatch Emails File Sharing Smart Technology Recycling Video Games Trending Warranty Hosted Computing Current Events Wire Science Database Worker Commute Amazon Employee Skype Netflix Business Technology Two Factor Authentication Criminal Printer Server Scalability Root Cause Analysis Administrator Inventory Customer Relationship Management Knowledge Smart Office Biometric Security Experience Business Owner Amazon Web Services HBO Digital Signage NarrowBand Start Menu Analyitcs Search SharePoint Data loss Microchip Programming Google Search Customer Service Leadership 5G Music Online Shopping iPhone Distributed Denial of Service Outlook Tools Authentication How to Specifications Screen Mirroring Search Engine Loyalty Windows 8 OLED Troubleshooting Evernote Files Frequently Asked Questions Chromecast IT service Windows 10s Nanotechnology Millennials Antivirus Cast Bing webinar HVAC Tablet Books Consultant Wireless Charging Colocation Uninterrupted Power Supply Tip of the week Domains Public Cloud Employer Employee Relationship Analytics Workforce Monitor Help Desk Assessment Windows Server 2008 Maintenance Conferencing Enterprise Content Management Emergency Best Available Cortana Going Green Travel MSP Bloatware WIndows 7 Digital Signature Television Devices Telecommuting Reputation Streaming Media Shortcuts Password Management Tablets Content Google Apps IaaS Tech Support Techology Laptop People Audit Entrepreneur Accountants Public Computer Thought Leadership Remote Work Customers Vendor Shortcut NIST Audiobook PowerPoint Touchpad Windows Media Player Mobile Office Computer Fan Remote Worker Cost Management Rootkit User Addiction Net Neutrality Social Networking Flash Workers Transportation Politics Password Manager Advertising FENG Wiring Vendor Management Managing Stress Smart Tech IBM Cache ISP Credit Cards Notifications Security Cameras Sync Safe Mode Memory Benefits Business Mangement Cameras Multi-Factor Security Camera Practices

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...