Out of the Box Solutions Blog

You Can Use Cortana with Your Most-Used Applications

You Can Use Cortana with Your Most-Used Applications

Cortana is becoming more of a utility with every feature that is added to its capabilities. Fans of Google’s applications will be happy to hear that Cortana can now play nice with the likes of Gmail, Google Contact, and Google Calendar. We’ll take you through the steps to set up an integration between these programs and Cortana.

In order for Cortana to play nice with these Google apps, you first have to identify them as a service. To do so, access Cortana and click Notebook. Once that panel opens, access Connected Services, and click Add service.

You will only see the option for Gmail, but that umbrella covers both Contacts as well as Calendar. This does mean that these services are not able to be connected individually, in fact, Google Drive will also be added to Cortana. Once you sign into your Google account, Gmail will be an option in your Connected Services menu.

Privacy Concerns
Naturally, by granting Cortana access to your email, you are providing the assistant (and by extension, Microsoft) with considerable access to your personal data. Before you connect your Google accounts to Cortana, make sure to review the data usage disclaimer that explains what your data is to be used for--and, if it does change your mind, you are directed to where this integration can be deactivated.

Since it is not yet clear what Cortana commands will work with these Google services, there is plenty of room to speculate. What do you think Cortana will be able to assist you with as you use these Google apps? Share your thoughts in the comments!

North Korea Suspected as Responsible for WannaCry ...
Tip of the Week: Two Apps to Help You Manage Incom...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, October 18 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Network Security Tech Term Cybersecurity Privacy Smartphones Internet Browser Microsoft Android User Tips Communication Cloud Malware Productivity Hardware Efficiency Email Passwords Small Business Communications Data Saving Money Managed IT services Ransomware Employer-Employee Relationship Network Blockchain Windows 10 VoIp Wi-Fi Workplace Tips IT Support Mobile Devices Applications Mobile Device Users Backup Business Management Hosted Solutions Social Media Collaboration Innovation Google Business Intelligence Virtualization VPN BDR Gmail Software Data Management Information Computers Marketing Data recovery Internet of Things IT Services Save Money Networking Business Tech Terms Wireless Managed IT Service Hackers Outsourced IT Automation Compliance Patch Management Remote Computing Computer Managed IT Services Artificial Intelligence Cost Management Analytics Cloud Computing Bandwidth Virtual Assistant Wireless Charging Data Backup Cortana Microsoft Office Spam Websites Internet Explorer Comparison Access Control IT Management Inventory Unified Communications Spyware Cybercrime Telephony Dark Web Backup and Disaster Recovery Downloads User Tip Amazon e-waste G Suite Data Breach Medical IT Big Data Sports WannaCry Server Management Workers Analysis Edge Virus Safety Threat Specifications Authentication Server Data Protection RAM HP Tactics Voice over IP Error Settings Hard Drives Trends disposal Bring Your Own Device Sales SaaS Gadgets Troubleshooting HIPAA Millennials Managed Service Antivirus Printing Authorization Mobile Security Microsoft Teams Document Management Telecommute IT budget SSD A.I. Plug-In Value Hybrid Cloud Tablet GDPR Holiday Physical Security Connectivity Update Hard Drive Business Technology Staff Dongle Paper Conferencing Lead Generation Network Attached Storage Operating System Company Culture Paperless Office Smartphone Maintenance Touchscreen Battery Facebook Movies Proactive IT Cables Excel eCommerce Laptop Technology Tips Apps Outlook Processors Managing Stress Ink Office Password Digital Data loss Router Microsoft Office 365 Twitter Telecommuting Remote Monitoring and Management Machine Learning Database Voice over Internet Protocol Knowledge Office 365 Storage Online Shopping Streaming Media Tip of the week Vulnerability Environment Phishing Reporting Government PowerPoint Content Filtering Miscellaneous Printers Alert Quick Tips Regulation Disaster Recovery