Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Using Cortana Gets Better with Customization

Using Cortana Gets Better with Customization

As Cortana has more and more added to its functionality, it gradually becomes more of a utility to all. Those who prefer to use Google’s applications are now able to use Cortana to augment their use of Gmail, Google Contacts, and Google Calendar. Today, we’ll go through how you can set these programs up to play nice with Cortana.

For Cortana to work with Google apps, these apps must first be identified as a service. Access Cortana and click Notebook, and once the panel appears, access Connected Services and from there, Add service.

At this point, you will only be given an option for Gmail, but that includes Contacts and Calendar as well, in addition to Google Drive. After you next sign on to your Google account, your Connected Services menu will include Gmail as an option.

Privacy and Usage Disclaimers
Be warned, when you give Cortana access to your email and other services, you are opening your personal data to the assistant, and therefore, to Microsoft as well. You should definitely review the disclaimer that appears before connecting these accounts, as it will explain how your data is going to be used. If you have second thoughts after reading this disclaimer, you can be directed to where these integrations can be deactivated.

Since there isn’t any indication, as of yet, as to which of Cortana’s commands will work with these Google services, we are given the opportunity to speculate freely. What functions do you think Cortana will have in regard to Google’s apps? Give us your ideal list in the comments!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 30 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Business Google Network Security Microsoft Internet Email Malware Backup Workplace Tips Innovation Data User Tips Computer Mobile Devices Hardware IT Services Android Disaster Recovery VoIP communications Business Continuity Smartphones Communication IT Support Smartphone Miscellaneous Mobile Device Small Business Network Browser Productivity Collaboration Quick Tips Cybersecurity Business Management Users Upgrade Phishing Managed IT Services Windows Data Backup Outsourced IT Ransomware Windows 10 Office Server Save Money Data Recovery Cloud Computing Windows 10 Passwords Tech Term Saving Money Holiday Social Media Chrome Virtualization Gadgets Automation Microsoft Office Managed IT Services Managed Service Artificial Intelligence Facebook Operating System Cybercrime Computers Wi-Fi BYOD Mobile Device Management Networking IT Support Hacking Internet of Things Health Spam Covid-19 Office 365 Telephone Systems Managed Service Provider Information Technology Information Remote Alert Bandwidth Router Social Engineering Mobility BDR Recovery Employer-Employee Relationship Remote Monitoring Password Application Money Encryption App History Applications Big Data Law Enforcement Human Resources Mobile Computing Data Breach Managed IT Mobile Office Apps How To Office Tips Training Blockchain Paperless Office VPN Government Data Storage Patch Management Private Cloud Remote Computing IT solutions Servers Mouse Entertainment Bring Your Own Device HaaS Website Data Management Budget Work/Life Balance Data Security Wireless Google Drive Gmail Avoiding Downtime Settings Vulnerability Flexibility Windows 7 Word Marketing Two-factor Authentication Infrastructure WiFi Voice over Internet Protocol Vendor Vendor Management Social Managed Services Display Cleaning USB User Error Meetings Data Protection Employee/Employer Relationship End of Support RMM Risk Management Education Physical Security Hacker Safety Sports HIPAA The Internet of Things Redundancy Lithium-ion battery Keyboard Staff Software as a Service Telephone System Machine Learning Conferencing Connectivity Remote Work Firewall Scam Virtual Reality Apple Save Time Network Congestion Printer Data storage Database Bluetooth eWaste Automobile Augmented Reality Unsupported Software Fraud Remote Workers Computing Infrastructure Charger Remote Worker Processor Going Green Compliance Cryptocurrency OneNote Computer Care IT Consultant Wearable Technology Retail Hard Drives Hard Drive Current Events Instant Messaging Telephony Battery Excel Samsung Shadow IT Comparison Humor Robot Legal CES Biometrics Computing Value Internet Exlporer Virtual Desktop Content Management Electronic Medical Records Business Technology Spam Blocking PDF Access Control DDoS Digital Signage Hiring/Firing SharePoint Virtual Assistant Authentication Proactive IT Best Practice YouTube Customer Service Virus Environment Procurement Black Market Net Neutrality Update Workplace Strategy Unified Threat Management Business Intelligence Fax Server Computer Accessories Help Desk Worker Google Docs Document Management Printing Audit IT Management Solid State Drive Wireless Technology Identity Theft SaaS How to Downtime Botnet IT Plan Managed Services Provider Benefits Monitoring Bloatware Password Management Batteries Workers Password Manager FENG Colocation Uninterrupted Power Supply Multi-Factor Security Windows 8.1 Digitize Search Engine Tablets Twitter Windows Server 2008 R2 IBM Smart Technology Printer Server Customer relationships Entrepreneur Flash NIST Monitor Business Mangement Smart Tech Manufacturing Trending Email Best Practices IT Assessment Shortcut Software Tips Addiction Supercomputer Amazon Streaming Media Computer Tips Cost Management Sync Managed IT Service Emails Reputation Recycling Security Cameras Wiring OneDrive Practices Biometric Security Tech Support Virtual CIO Social Networking Content Peripheral Techology Cache Laptop Amazon Web Services Criminal Two Factor Authentication Digital Security Cameras Safe Mode Using Data Netflix Customers GDPR Copiers Root Cause Analysis Hosted Computing 5G Running Cable Audiobook Quick Tip Memory HBO Wireless Internet Knowledge Touchpad Online Shopping Music Smartwatch Ergonomics Skype File Sharing Camera Development Data loss Advertising Inventory OLED Specifications Politics Consultant PCI DSS Outlook Wire Virtual Machine Leadership Evernote Troubleshooting Employee Notifications Travel Analytics 2FA Start Menu Fiber Optics Printers Messaging Science Screen Mirroring Cabling Loyalty Millennials Best Available Policy Frequently Asked Questions Smart Office Hypervisor Wireless Charging Books WIndows 7 Dark mode Mobile Trend Micro Windows 10s Relocation Virtual Private Network SMS Cast Default App Workforce Distributed Denial of Service Customer Relationship Management Procedure Analyitcs Tip of the week Video Games Saving Time webinar Cables Emergency Google Search Employer Employee Relationship dark theme Programming Professional Services Worker Commute Shopping Public Cloud Project Management AI Nanotechnology IT Infrastructure Assessment Telecommuting Experience FinTech Windows Server 2008 Scalability Cortana Bing Digital Signature User Antivirus PowerPoint Tools Business Owner Windows Media Player Social Network Warranty Windows 8 Investment Television NarrowBand IT service Employees Search HVAC Employee/Employer Relationships Google Apps iPhone Analysis ISP Managing Stress Windows 365 Administrator Video Conferencing Tablet Devices ROI Public Computer Domains Cameras Sales Regulations Enterprise Content Management Bitcoin Shortcuts Transportation Computer Fan Files Accountants Cryptomining Rootkit Point of Sale MSP Personal Maintenance Microchip Supply Chain Management Thought Leadership Chromecast Credit Cards IaaS

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code