Out of the Box Solutions Blog

You Can Use Cortana with Your Most-Used Applications

You Can Use Cortana with Your Most-Used Applications

Cortana is becoming more of a utility with every feature that is added to its capabilities. Fans of Google’s applications will be happy to hear that Cortana can now play nice with the likes of Gmail, Google Contact, and Google Calendar. We’ll take you through the steps to set up an integration between these programs and Cortana.

In order for Cortana to play nice with these Google apps, you first have to identify them as a service. To do so, access Cortana and click Notebook. Once that panel opens, access Connected Services, and click Add service.

You will only see the option for Gmail, but that umbrella covers both Contacts as well as Calendar. This does mean that these services are not able to be connected individually, in fact, Google Drive will also be added to Cortana. Once you sign into your Google account, Gmail will be an option in your Connected Services menu.

Privacy Concerns
Naturally, by granting Cortana access to your email, you are providing the assistant (and by extension, Microsoft) with considerable access to your personal data. Before you connect your Google accounts to Cortana, make sure to review the data usage disclaimer that explains what your data is to be used for--and, if it does change your mind, you are directed to where this integration can be deactivated.

Since it is not yet clear what Cortana commands will work with these Google services, there is plenty of room to speculate. What do you think Cortana will be able to assist you with as you use these Google apps? Share your thoughts in the comments!

North Korea Suspected as Responsible for WannaCry ...
Tip of the Week: Two Apps to Help You Manage Incom...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, January 22 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Network Security User Tips Tech Term Privacy Productivity Internet Efficiency Smartphones Cybersecurity Malware Mobile Device Browser Hardware Android Microsoft Communication IT Support Cloud Data Ransomware Network Email Small Business Wireless IT Services Holiday Communications Business Management Applications Users Backup Saving Money Managed IT services Collaboration Innovation Data Backup Google Wi-Fi Passwords Mobile Devices Data recovery Internet of Things Windows 10 Software Networking VoIp Business Marketing Hackers Outsourced IT Workplace Tips Cloud Computing Social Media Managed IT Services Business Intelligence Blockchain Hosted Solutions Employer-Employee Relationship Information Save Money Tech Terms Access Control Microsoft Office Connectivity Automation Medical IT Smartphone Facebook Apps Managed IT Service Artificial Intelligence Cost Management Analytics Bandwidth Virtual Assistant Password Remote Computing Managed Service Mobility Wireless Charging Patch Management Computer Compliance Virtualization VPN BDR Cortana Data Management Remote Monitoring and Management Computers Gmail Specifications Miscellaneous Antivirus Printing Workers Reporting Word Mobile Security Microsoft Teams Document Management Telecommute Upgrade IT budget SSD A.I. Voice over IP Value Hybrid Cloud Gadgets Amazon Eliminating Downtime Physical Security Sales Dark Web Hard Drive Company Culture Staff Dongle Paper Millennials Wearables Lead Generation Network Attached Storage Operating System Authentication Paperless Office Maintenance Analysis Certification Battery Movies Cables BYOD eCommerce Laptop Technology Tips Tablet Error Processors Managing Stress Conferencing Troubleshooting Ink Business Technology SaaS Healthcare Authorization Digital Data loss Router Twitter Vulnerability Machine Learning Database Voice over Internet Protocol Plug-In Wireless Internet Online Shopping Streaming Media Excel Environment Office Update Government PowerPoint GDPR Data Security Spam Websites Internet Explorer Telecommuting Training IT Management Inventory Unified Communications Spyware Cybercrime Tip of the week Proactive IT Help Desk Backup and Disaster Recovery Downloads Knowledge Office 365 Touchscreen e-waste G Suite Content Filtering Outlook Big Data Sports Phishing WannaCry Server Management Comparison Edge Virus Safety Threat Security Cameras Server Data Protection RAM HP Tactics User Tip Business Continuity Settings Hard Drives Trends Telephony Microsoft Office 365 disposal Bring Your Own Device Profitability Data Breach Storage HIPAA Alert Printers Quick Tips Personal Information Disaster Recovery Regulation