croom new

NuTech Services Blog

NuTech Services has been serving the Grand Blanc area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Using Cortana Gets Better with Customization

Using Cortana Gets Better with Customization

As Cortana has more and more added to its functionality, it gradually becomes more of a utility to all. Those who prefer to use Google’s applications are now able to use Cortana to augment their use of Gmail, Google Contacts, and Google Calendar. Today, we’ll go through how you can set these programs up to play nice with Cortana.

For Cortana to work with Google apps, these apps must first be identified as a service. Access Cortana and click Notebook, and once the panel appears, access Connected Services and from there, Add service.

At this point, you will only be given an option for Gmail, but that includes Contacts and Calendar as well, in addition to Google Drive. After you next sign on to your Google account, your Connected Services menu will include Gmail as an option.

Privacy and Usage Disclaimers
Be warned, when you give Cortana access to your email and other services, you are opening your personal data to the assistant, and therefore, to Microsoft as well. You should definitely review the disclaimer that appears before connecting these accounts, as it will explain how your data is going to be used. If you have second thoughts after reading this disclaimer, you can be directed to where these integrations can be deactivated.

Since there isn’t any indication, as of yet, as to which of Cortana’s commands will work with these Google services, we are given the opportunity to speculate freely. What functions do you think Cortana will have in regard to Google’s apps? Give us your ideal list in the comments!



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, 24 January 2018

Captcha Image

Newsletter Sign Up

  • First Name *
  • Last Name *
  • Company Name *

      Tag Cloud

      Tip of the Week Security Best Practices Privacy Technology Cloud Microsoft Google Hackers Business Backup Windows 10 Productivity Malware Business Computing Software Hosted Solutions Android Miscellaneous Efficiency Email Browser Mobile Devices Smartphones Business Continuity Office Internet Innovation Data Hardware Workplace Tips Disaster Recovery Computer Smartphone Network Security User Tips Small Business Ransomware VoIP Chrome Windows Upgrade Business Management Alert Managed IT Services Holiday Social Media Computers Cybercrime Employer-Employee Relationship Telephone Systems Server App communications Network IT Services Quick Tips Hacking Microsoft Office Virtualization Save Money Social Engineering Outsourced IT Automation Data Backup Collaboration Operating System Office Tips Passwords Health Marketing Communication Productivity Law Enforcement How To Money Mobility Work/Life Balance Password Bring Your Own Device Cybersecurity Two-factor Authentication Facebook Managed Service Provider Remote Computing Application Big Data Spam Mobile Device Management Bandwidth Managed IT Services Cloud Computing Wi-Fi Office 365 Artificial Intelligence The Internet of Things Recovery Data Breach Mobile Computing IT Support HaaS Private Cloud Gmail Flexibility Google Drive Entertainment Safety Lithium-ion battery Windows 10 Government Data Recovery Networking Router History Mouse Website Gadgets Automobile Remote Monitoring Internet Exlporer Phishing Patch Management Wireless Fax Server End of Support Scam Word Vulnerability Humor Excel Apple Charger Environment Computer Care Apps Physical Security Business Intelligence Data Storage User Error Samsung Battery IT Management Best Practice BDR Keyboard Public Cloud Settings Virtual Reality Wearable Technology Value Avoiding Downtime WiFi Data Management BYOD Redundancy Saving Money Bluetooth Unsupported Software Retail Black Market USB OneNote Cleaning Meetings Biometrics DDoS Robot Data Security IT solutions Computer Accessories Worker Downtime Budget Hiring/Firing Risk Management Data storage Spam Blocking Television Customer Service Multi-Factor Security Chromecast Telecommuting Outlook Employer Employee Relationship Printer Training Users Programming Monitor Google Apps Tools Windows 10s Data loss Streaming Media Public Computer Trending Remote Work Frequently Asked Questions WIndows 7 webinar Unified Threat Management Printer Server SharePoint Vendor Management Search Reputation Workers Comparison Screen Mirroring Encryption Content Windows Media Player Internet exploMicrosoft Techology Analyitcs Going Green Identity Theft Tip of the week Managing Stress Conferencing Transportation Solid State Drive How to Customer Infrastructure Managed IT Specifications Cast Notifications IBM Audiobook Advertising Hacker Laptop Credit Cards Windows Server 2008 Emails Benefits Audit eWaste Password Manager Botnet Supercomputer Politics Maintenance Science Touchpad Fraud Windows 7 Firewall Computer Fan Business Mangement Travel User Windows 8 Millennials Legal Amazon Flash Smart Technology FENG Analytics Education Social Relocation Tablet Sports Workforce IT Plan Current Events Experience Shortcut Hybrid Cloud People Mobile Device Bloatware Amazon Web Services Netflix Two Factor Authentication Running Cable Loyalty Computing Infrastructure VPN Net Neutrality Uninterrupted Power Supply Knowledge Music PDF Mobile Office Video Games Entrepreneur Online Shopping Sync IT Support SaaS Applications Social Networking Human Resources Update Tablets YouTube FCC Software Tips Network Congestion Troubleshooting Information Technology Virus Scalability Internet of Things Evernote Telephony Electronic Medical Records PowerPoint iPhone Google Docs Hard Drives NarrowBand Title II Tech Support IT Consultant Books Instant Messaging Wireless Charging Skype Consultant Save Time Root Cause Analysis Distributed Denial of Service Assessment Worker Commute Customer Relationship Management Files Voice over Internet Protocol Memory Wireless Technology Online HBO Shadow IT Leadership Emergency Cameras Rootkit Cortana Start Menu Best Available Phone System Webinar IT solutions Recycling CrashOverride

      Mobile? Grab this Article!

      Qr Code

      Upcoming Events

      No events

      Recent Comments

      No comments yet.

      Latest Blog Entry

      Utilizing the data that you have acquired is a process that is referred to as business intelligence. Regardless of your business’ size, business intelligence solutions can deliver definite benefits. We’ll review a few of these benefits here.

      Latest News

      NuTech Services launches new website!

      NuTech Services is proud to announce the launch of our new website at The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

      Read more ...

      Account Login