Computerware

Tip of the Week: Cortana Can Do Even More than You Might Realize

Tip of the Week: Cortana Can Do Even More than You Might Realize

One of the most recognizable names in technology isn’t a person, it’s a virtual assistant: Cortana. While Cortana has been of great use to many users, sometimes that user isn’t actually the person who owns the device and is just someone else in the same room. This can be annoying, but there’s a way to acquaint Cortana with a single user’s voice and listen to them exclusively.

To set this up, you’ll need to access Cortana’s Settings. First, click on the Cortana Icon that appears on the taskbar.

cortana ib 1

Next, access the settings menu for Cortana by clicking on the gear icon in the Cortana window that appears.

cortana ib 2

Activate Let Cortana respond to “Hey Cortana” and select Learn how I say “Hey Cortana.”

cortana ib 3

Once you do so, you will be prompted to recite six phrases so that Cortana can establish how you will say “Hey Cortana.”

cortana ib 4

After this exercise is completed, go back to Cortana’s settings and confirm that try to respond only to me is selected.

cortana ib 5

Cortana is now primed to listen to only you and you can now use it for many purposes, including to navigate Windows 10.

cortana ib 6

Are there any other assistants you use, like Alexa, the Google Assistant, Siri, or Bixby? Which one is your favorite? Tell us why in the comments section!

Investing in Innovative Network Security a Must
As Technology Has Evolved. So Have Our Holiday Tra...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, July 17, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Software Microsoft Business Computing Hackers Managed Service Provider Backup Productivity Workplace Tips Data Hardware Business Saving Money Malware Email IT Support IT Services Hosted Solutions Network Security Google Small Business Efficiency Smartphones Quick Tips Gadgets Business Continuity Mobile Devices User Tips Computer Disaster Recovery Mobile Office Virtualization Network Microsoft Office Android Innovation Server VoIP Social Media Mobile Device Management Smartphone Miscellaneous Upgrade Windows 10 Windows Ransomware Unified Threat Management Remote Monitoring Operating System Collaboration Communication Passwords Holiday BYOD Mobile Computing Remote Computing Apps Cybersecurity WiFi Managed IT services Vendor Management The Internet of Things Marketing Facebook Data Backup IT Support Data Recovery Firewall Analytics Users History Apple Data Management communications Productivity Automation Alert Internet of Things Tech Term BDR Phishing Outsourced IT Artificial Intelligence Save Money Managed IT Services App IT Consultant Content Filtering Going Green Mobile Device Gmail Bring Your Own Device Office Bandwidth Big data Health Spam Best Practice Information Technology Hiring/Firing Lithium-ion Battery Hard Drives Budget Windows 8 Outlook Maintenance Wireless Technology Antivirus Browser Printer Cybercrime Search Tech Support Virus Managed IT Cost Management Encryption Money Document Management Office 365 IBM Computers Help Desk Travel Recovery Update Employer-Employee Relationship Hacking Phone System Legal Networking Proactive IT Running Cable Windows 10 Regulations Saving Time Customer Service Two-factor Authentication VPN Training Intranet SaaS Education Government Humor Website Administration Hard Drive Law Enforcement Risk Management Compliance It Management Data storage Cloud Computing Save Time Business Technology Current Events Laptop Data Loss Business Growth Comparison Tablet Company Culture Excel Data Breach User Computer Repair Customer Relationship Management Social Networking Paperless Office Telephone Systems Fax Server Project Management Augmented Reality Wireless PowerPoint Disaster Twitter DDoS Hosted Solution End of Support Robot Securty Access Control Word Solid State Drive Mobility Password Cortana Applications Social Engineering Avoiding Downtime Business Intelligence Data Security Black Market Digital Payment Flexibility Downtime iPhone Patch Management Blockchain Hacker Processors How To Computer Accessories Google Docs Pain Points Private Cloud Co-managed IT Experience USB Download User Error Scam Cleaning Trending Redundancy Monitors Presentation Mouse Office Tips Telephony Machine Learning Virtual Desktop Taxes Specifications Safety Programming Digital Social Distributed Denial of Service Statistics Lifestyle YouTube Unified Communications Settings Documents Websites Sports Gaming Console Network Congestion Public Cloud Heating/Cooling Start Menu Tech Terms Computing Text Messaging Mobile Technology Webcam Storage Vulnerabilities Identity Theft Software as a Service Healthcare Streaming Media Uninterrupted Power Supply IT service Google Maps Retail eWaste Virtual Reality Net Neutrality Bitcoin Politics Automobile Inbound Marketing Chrome Value Emails Data Protection Bluetooth Chromebook Cryptocurrency Computing Infrastructure Hack Router Visible Light Communication Memory Electronic Payment Mobile Security online Currency Time Management Freedom of Information Competition Conferencing Rental Service Meetings Corporate Profile Software License Trends Cabling Assessment SharePoint Multi-Factor Security Web Server IT consulting Business Owner Webinar Google Calendar Devices Wi-Fi Administrator LinkedIn Tip of the week IP Address Fraud Tactics Books Workers Advertising Flash Human Resources UTM Content Touchscreen CIO News Application Monitoring Supercomputer Upselling VoIP IT Plan Enterprise Resource Planning Worker Video Surveillance Archive Consultation Staffing Evernote Google Wallet Legislation Microchip Skype Knowledge Windows XP Technology Tips Society Accountants Saving ZTime Virtual Assistant Displays email scam Addiction Reading Samsung Audit Multi-factor Authentication Information G Suite Fake News Micrsooft Digital Signature Management Employer Employee Relationship Point of Contact Migration Connected Devices Licensing Debate Data Warehousing Drones Teamwork Wireless Headphones Hacks Physical Security Harddrive Best Practives Entertainment GPS Access Equifax Banking Botnet Emergency Hard Drive Disposal Network Management Relocation Tablets Computer Care Permissions Language PDF Device security Sync External Harddrive Recycling Microserver Microsoft Excel File Sharing Analytic Desktop Finance Google Drive Windows Server 2008 Best Available Keyboard Nanotechnology Notifications CCTV Product Reviews Reliable Computing 3D Ebay Read Spyware Mobile Payment Music Startup Business Metrics Computer Malfunction Thin CLient Get More Done Vulnerability switches Writing Domains Business Cards Service Level Agreement Electricity Printing In Internet of Things Smart Phones Turn Key Upgrades Public Speaking Unified Threat Management Backup and Disaster Recovery Printer Server Gamification Device Management Windows 7 Shortcut Screen Reader Trojan LiFi Upload Scalability Adminstration Pirating Information Content Management Organize cache Television Entrepreneur Smart Tech Motion Sickness Leadership Business Managemenet Troubleshooting Piracy WannaCry Downloads Work/Life Balance Environment HTML Deep Learning HIPAA Fiber-Optic Database Messenger Tracking Managing Stress 3D Printing CrashOverride Capital Productuvuty MSP Username

toner1.7