Out of the Box Solutions Blog

Out of the Box Solutions has been serving the Michigan area since 2002, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses

You Can Use Cortana with Your Most-Used Applications

You Can Use Cortana with Your Most-Used Applications

Cortana is becoming more of a utility with every feature that is added to its capabilities. Fans of Google’s applications will be happy to hear that Cortana can now play nice with the likes of Gmail, Google Contact, and Google Calendar. We’ll take you through the steps to set up an integration between these programs and Cortana.

In order for Cortana to play nice with these Google apps, you first have to identify them as a service. To do so, access Cortana and click Notebook. Once that panel opens, access Connected Services, and click Add service.

You will only see the option for Gmail, but that umbrella covers both Contacts as well as Calendar. This does mean that these services are not able to be connected individually, in fact, Google Drive will also be added to Cortana. Once you sign into your Google account, Gmail will be an option in your Connected Services menu.

Privacy Concerns
Naturally, by granting Cortana access to your email, you are providing the assistant (and by extension, Microsoft) with considerable access to your personal data. Before you connect your Google accounts to Cortana, make sure to review the data usage disclaimer that explains what your data is to be used for--and, if it does change your mind, you are directed to where this integration can be deactivated.

Since it is not yet clear what Cortana commands will work with these Google services, there is plenty of room to speculate. What do you think Cortana will be able to assist you with as you use these Google apps? Share your thoughts in the comments!

North Korea Suspected as Responsible for WannaCry ...
Tip of the Week: Two Apps to Help You Manage Incom...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, July 18 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Network Security Business Computing Privacy Technology Cybersecurity Hardware Tech Term Communications Smartphones Internet Ransomware Android Backup Data Business Management Managed IT services Employer-Employee Relationship Email Small Business Wi-Fi Mobile Devices Applications Malware Microsoft IT Support Wireless Communication Cloud Save Money Managed IT Service Saving Money Remote Computing Computer Cost Management Wireless Charging Artificial Intelligence Business Intelligence VPN Gmail VoIp Data Management Business IT Services Networking Tech Terms Outsourced IT Patch Management Social Media Virtual Assistant Productivity Innovation Cortana Collaboration Passwords Blockchain Windows 10 Network Computers Internet of Things Mobile Security Information Hard Drive Antivirus IT budget Tablet Connectivity Hackers Microsoft Teams Operating System Amazon Battery Automation Conferencing Maintenance Processors Staff Technology Tips Company Culture Excel Apps Workplace Tips Office Telecommuting Analytics Router Vulnerability Cloud Computing Data Backup Managing Stress Office 365 Knowledge Environment Virtualization Machine Learning Content Filtering Internet Explorer Spyware Websites Streaming Media Backup and Disaster Recovery Google Telephony IT Management e-waste Server Workers Big Data Threat HP Safety Downloads Hard Drives G Suite Voice over IP User Tips disposal Millennials Printing Trends SSD Bring Your Own Device Holiday Users Value Lead Generation Telecommute Document Management Physical Security Business Technology Paper Dongle A.I. Facebook Hybrid Cloud eCommerce Network Attached Storage Smartphone Managed IT Services Paperless Office Laptop Ink Bandwidth Movies Twitter Cables Online Shopping Password Database Data loss Tip of the week Digital Phishing PowerPoint Government Inventory Voice over Internet Protocol Efficiency Comparison Cybercrime WannaCry Spam User Tip Browser Data Breach Sports BDR Unified Communications Data Protection Settings Server Management Specifications Software Marketing Tactics HIPAA Virus Edge Sales Data recovery RAM Alert Plug-In Proactive IT Gadgets Remote Monitoring and Management