facebook linkedin twitter

Tip of the Week: Cortana Can Do Even More than You Might Realize

Tip of the Week: Cortana Can Do Even More than You Might Realize

One of the most recognizable names in technology isn’t a person, it’s a virtual assistant: Cortana. While Cortana has been of great use to many users, sometimes that user isn’t actually the person who owns the device and is just someone else in the same room. This can be annoying, but there’s a way to acquaint Cortana with a single user’s voice and listen to them exclusively.

To set this up, you’ll need to access Cortana’s Settings. First, click on the Cortana Icon that appears on the taskbar.

cortana ib 1

Next, access the settings menu for Cortana by clicking on the gear icon in the Cortana window that appears.

cortana ib 2

Activate Let Cortana respond to “Hey Cortana” and select Learn how I say “Hey Cortana.”

cortana ib 3

Once you do so, you will be prompted to recite six phrases so that Cortana can establish how you will say “Hey Cortana.”

cortana ib 4

After this exercise is completed, go back to Cortana’s settings and confirm that try to respond only to me is selected.

cortana ib 5

Cortana is now primed to listen to only you and you can now use it for many purposes, including to navigate Windows 10.

cortana ib 6

Are there any other assistants you use, like Alexa, the Google Assistant, Siri, or Bixby? Which one is your favorite? Tell us why in the comments section!

Investing in Innovative Network Security a Must
As Technology Has Evolved. So Have Our Holiday Tra...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, October 23, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Software Business Computing Hackers Microsoft Backup Managed Service Provider Productivity Workplace Tips Data Hardware Business Saving Money Email Malware Network Security IT Services IT Support Efficiency Hosted Solutions Google Small Business Computer User Tips Smartphones Gadgets Quick Tips Mobile Devices Business Continuity Disaster Recovery Innovation Virtualization Network Android Microsoft Office Mobile Office Social Media VoIP Mobile Device Management Server Miscellaneous Smartphone Collaboration Communication Upgrade Ransomware Windows 10 Data Backup Data Recovery Unified Threat Management Windows IT Support Tech Term Remote Monitoring Operating System Passwords Holiday Managed IT services Mobile Computing BYOD Vendor Management Productivity Remote Computing Cybersecurity Facebook WiFi communications Apps Analytics BDR The Internet of Things Marketing Automation Users History Apple Firewall Internet of Things Mobile Device Alert Managed IT Services Data Management Phishing Outsourced IT Artificial Intelligence Browser Save Money Big data IT Consultant App Bandwidth Gmail Maintenance Office Bring Your Own Device Antivirus Encryption Health Spam Content Filtering Going Green Two-factor Authentication Printer Managed IT Virus Tech Support Help Desk Cybercrime Wireless Technology Search Cost Management Office 365 Hiring/Firing Hard Drives Outlook Best Practice Information Technology Budget Windows 8 Lithium-ion Battery IBM Computers Saving Time VPN Travel Recovery Cloud Computing Employer-Employee Relationship Update Business Technology Hacking Phone System Money Document Management Training Customer Service Hard Drive Law Enforcement Intranet Humor Website Education Government Compliance Access Control Data storage Administration Risk Management It Management Legal Save Time Networking Regulations Windows 10 SaaS Running Cable Proactive IT Information Robot File Sharing Wireless Securty Customer Relationship Management Twitter Augmented Reality DDoS Mobility Solid State Drive PowerPoint Social Engineering Black Market Flexibility Word Data Security Applications Laptop Business Intelligence Password Cortana Business Growth Patch Management Blockchain Digital Payment Hacker Data Loss Downtime Current Events Avoiding Downtime Machine Learning Tablet Paperless Office Telephone Systems iPhone Comparison Data Breach Company Culture Sports Computing Computer Repair Disaster User Social Networking Hosted Solution Excel Project Management End of Support Fax Server Programming Identity Theft Social Websites Statistics Management Start Menu Tech Terms IT service Network Congestion Documents Vulnerabilities Google Maps Entertainment Mobile Technology Heating/Cooling Healthcare Politics Gaming Console Storage Virtual Reality Software as a Service Uninterrupted Power Supply Bluetooth Streaming Media Automobile Emails Text Messaging Chromebook Webcam Vendor Retail Cryptocurrency Computing Infrastructure Hack Bitcoin Data Protection How To eWaste Google Docs Net Neutrality Private Cloud Experience Chrome Download Value Cleaning Managed Service Monitors Router Inbound Marketing Office Tips Conferencing Telephony Scam User Error Processors Co-managed IT Computer Accessories Taxes Distributed Denial of Service USB Redundancy YouTube Presentation Unified Communications Settings Trending Monitoring Pain Points Public Cloud Mouse Specifications Safety Digital Virtual Desktop Lifestyle Audit Permissions Language Multi-factor Authentication Sync Fake News Upselling Best Practives Point of Contact Migration Connected Devices Video Surveillance Data Warehousing Wireless Headphones Notifications Telephone CCTV Digital Signature Dark Web Network Management Reliable Computing Access Music Equifax Business Metrics Fleet Tracking Computer Malfunction Saving ZTime Teamwork Health IT Emergency switches Hard Drive Disposal Writing Computer Care Device security MSP In Internet of Things Microsoft Excel Upgrades Microserver Bookmark LiFi Analytic Desktop Finance Debate PDF Google Drive Windows Server 2008 Recycling Nanotechnology Harddrive Social Network Product Reviews Business Cards Service Level Agreement Scalability GPS Spyware Mobile Payment Startup Asset Tracking Motion Sickness Best Available Keyboard Vulnerability Get More Done Unified Threat Management Backup and Disaster Recovery Messenger Tracking Domains Electricity Printing Printer Server Work/Life Balance Read External Harddrive Username Deep Learning Turn Key Public Speaking Browsers Visible Light Communication Trojan Memory Gamification Windows 7 Screen Reader Rental Service Customer Resource management Meetings IT consulting Piracy Upload 3D Cabling Ebay cache Television Organize Device Management Smart Tech Distribution Web Server Thin CLient Shortcut User Tip Fiber-Optic Database Books Workers Troubleshooting WannaCry Downloads Content Management HTML Wi-Fi Smart Phones Administrator Entrepreneur Business Managemenet HIPAA Data Analysis Corporate Profile Advertising Flash Mobile Security Environment Time Management CIO Freedom of Information Telephone System Supercomputer Windows XP Software License Trends Adminstration Worker Pirating Information Electronic Payment Assessment Staffing SharePoint Google Wallet online Currency Multi-Factor Security Microchip Cost Leadership Competition Fraud Tactics Reading Samsung Business Owner Google Calendar Society Webinar Devices Tip of the week Displays IP Address VoIP UTM Content G Suite Touchscreen News Micrsooft LinkedIn Employer Employee Relationship Knowledge IT Plan Enterprise Resource Planning Licensing Human Resources Consultation Evernote Drones Legislation Hacks Error Physical Security Application Proxy Server Skype email scam Addiction Relocation Tablets Technology Tips Archive Accountants Banking A.I. Botnet Electronic Medical Records Virtual Assistant Capital Productuvuty 3D Printing Managing Stress Printers CrashOverride Regulation Fileless Malware

toner1