888.678.7282    Get SUPPORT

Strata Information Technology Blog

Strata Information Technology has been serving the Encino area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

You Can Use Cortana with Your Most-Used Applications

You Can Use Cortana with Your Most-Used Applications

Cortana is becoming more of a utility with every feature that is added to its capabilities. Fans of Google’s applications will be happy to hear that Cortana can now play nice with the likes of Gmail, Google Contact, and Google Calendar. We’ll take you through the steps to set up an integration between these programs and Cortana.

In order for Cortana to play nice with these Google apps, you first have to identify them as a service. To do so, access Cortana and click Notebook. Once that panel opens, access Connected Services, and click Add service.

You will only see the option for Gmail, but that umbrella covers both Contacts as well as Calendar. This does mean that these services are not able to be connected individually, in fact, Google Drive will also be added to Cortana. Once you sign into your Google account, Gmail will be an option in your Connected Services menu.

Privacy Concerns
Naturally, by granting Cortana access to your email, you are providing the assistant (and by extension, Microsoft) with considerable access to your personal data. Before you connect your Google accounts to Cortana, make sure to review the data usage disclaimer that explains what your data is to be used for--and, if it does change your mind, you are directed to where this integration can be deactivated.

Since it is not yet clear what Cortana commands will work with these Google services, there is plenty of room to speculate. What do you think Cortana will be able to assist you with as you use these Google apps? Share your thoughts in the comments!

North Korea Suspected as Responsible for WannaCry ...
Tip of the Week: Two Apps to Help You Manage Incom...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, 28 May 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Business Computing Privacy Managed IT Services Cloud Technology Best Practices Hackers Malware Ransomware Communications Backup Outsourced IT Alert Cybersecurity Productivity Internet Software VoIP Microsoft Passwords Business Management Smartphones Network Security Hardware IT Support Phishing Business Save Money Vulnerability IT Services Twitter App Email Smartphone Data Breach Android Social Media Windows 10 Cloud Computing Workers Microsoft Office Office 365 Excel Remote Monitoring Cybercrime Saving Money Mobile Device Management Data Small Business Law Enforcement Settings Scam Politics Miscellaneous Bandwidth User Tips Google Data Backup Government Business Continuity Recovery Applications Computer Communication Antivirus Maintenance Patch Management Password Holiday Mobile Device Office Personal Information Retail Blockchain Website Vendor Management Chrome Computers Internet of Things Access Control Windows Spam Hosted Solutions Facebook Data Recovery Apps Productivity BDR Browser Education Employer-Employee Relationship Virus Efficiency Word How To Wi-Fi Entertainment Inventory WannaCry Telephone System Threat Edge Sales Cortana Access Physical Security Leadership Managed IT HIPAA Managed Service Provider Employer Employee Relationship Marketing Tablet BYOD Files Encryption Data loss Hard Drive Remote Support Network Collaboration Automobile Synergy Knowledge Battery Company Culture Analytics SaaS Staff Managed IT Service Processors Scalability Comparison Emergency IaaS Phone System Websites Telephony e-waste Spyware Apple Hard Drives Credit Cards Dark Data PowerPoint IT budget Specifications DDoS Smart Technology Multi-Factor Security Printer Server Licensing Mobile Devices HaaS Networking Voice over IP disposal HP iPhone Two-factor Authentication Unified Threat Management Sports IT Management Printers Travel Cleaning Gadget Cost Management Dongle Value WiFi Current Events Tech Support Safety VPN Botnet Connectivity Tech Terms Content Filtering Router Live Streaming Computer Care Shortcut The Internet of Things Gadgets Tech Term Data Protection Hiring/Firing Net Neutrality Telephone Systems Budget Data Management Disaster Recovery Gmail Technology Tips Wireless Charging Automation WhatsApp Gaming Console CrashOverride Yahoo Users Database Document Management Remote Control Innovation Dark Web Backup and Disaster Recovery Lead Generation Video Games Tactics Paperless Office Worker Information Technology Wireless Television Google Maps SSD Virtual Assistant News Avoiding Downtime Internet Explorer Digital Printer Email Management Biometrics Staffing 5G Managed IT Services Wireless Technology Telecommute Telecommuting Mobile Security IBM Hacker Printing Laptop Millennials Operating System Customer Relationship Management IP Address Paper Google Drive IT Support Environment Hosted Solution Customer Service Mobile Office Ink Domains Scheduling Copy Emoji VoIP Public Speaking Instagram Paste Samsung Lithium-ion battery Conferencing Augmented Reality eCommerce Business Intelligence Online Shopping Competition Streaming Media Network Attached Storage Fun Big Data File Sharing Autocorrect Downloads Server Management User Tip Upgrade User Security Virtualization Spam Blocking Trends Artificial Intelligence Tip of the week Search Windows 10 Business Technology Server Presentation Money Machine Learning Remote Computing

Newsletter Sign Up