Computerware

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Cortana Can Do Even More than You Might Realize

Tip of the Week: Cortana Can Do Even More than You Might Realize

One of the most recognizable names in technology isn’t a person, it’s a virtual assistant: Cortana. While Cortana has been of great use to many users, sometimes that user isn’t actually the person who owns the device and is just someone else in the same room. This can be annoying, but there’s a way to acquaint Cortana with a single user’s voice and listen to them exclusively.

To set this up, you’ll need to access Cortana’s Settings. First, click on the Cortana Icon that appears on the taskbar.

cortana ib 1

Next, access the settings menu for Cortana by clicking on the gear icon in the Cortana window that appears.

cortana ib 2

Activate Let Cortana respond to “Hey Cortana” and select Learn how I say “Hey Cortana.”

cortana ib 3

Once you do so, you will be prompted to recite six phrases so that Cortana can establish how you will say “Hey Cortana.”

cortana ib 4

After this exercise is completed, go back to Cortana’s settings and confirm that try to respond only to me is selected.

cortana ib 5

Cortana is now primed to listen to only you and you can now use it for many purposes, including to navigate Windows 10.

cortana ib 6

Are there any other assistants you use, like Alexa, the Google Assistant, Siri, or Bixby? Which one is your favorite? Tell us why in the comments section!

Investing in Innovative Network Security a Must
As Technology Has Evolved. So Have Our Holiday Tra...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 20 January 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Microsoft Managed Service Provider Hackers Software Business Computing Workplace Tips Productivity Backup Data Hardware Saving Money Business Malware Email IT Support IT Services Hosted Solutions Google Efficiency Small Business Gadgets Quick Tips Smartphones Network Security Mobile Devices Business Continuity User Tips Mobile Office Disaster Recovery Computer Microsoft Office Network Virtualization Server VoIP Social Media Miscellaneous Upgrade Windows 10 Mobile Device Management Windows Android Unified Threat Management Ransomware Smartphone Innovation Passwords Holiday Operating System Remote Computing Communication Remote Monitoring WiFi Vendor Management BYOD Mobile Computing Apps Facebook The Internet of Things Marketing Collaboration Users Firewall Analytics Managed IT services History Alert Data Management IT Support Apple IT Consultant Outsourced IT Phishing Cybersecurity Managed IT Services Save Money Health Content Filtering Automation Gmail Bring Your Own Device Office Big data Productivity App Budget Hard Drives Windows 8 Artificial Intelligence Tech Support Best Practice BDR Spam Hiring/Firing Going Green Managed IT Outlook Wireless Technology Browser Search Virus communications Lithium-ion Battery Internet of Things Phone System Bandwidth Help Desk Encryption Antivirus Printer Data Backup Information Technology Money Office 365 IBM Mobile Device Recovery Employer-Employee Relationship Maintenance Update Cost Management Customer Service Proactive IT Travel Computers Education Networking Humor Save Time It Management Law Enforcement Running Cable Hard Drive Document Management Data storage Saving Time Government Legal Administration Risk Management SaaS Data Recovery Robot Tablet Comparison Two-factor Authentication PowerPoint Wireless Social Networking Black Market Fax Server Website VPN Twitter Business Growth Project Management Telephone Systems Hacking Training Avoiding Downtime iPhone Disaster Business Intelligence End of Support Current Events Securty User Excel Solid State Drive Mobility Computer Repair Flexibility DDoS Windows 10 Intranet Word Cortana Password Hacker Digital Payment Hosted Solution Router Presentation Computer Accessories Company Culture Data Security IT service Virtual Desktop Customer Relationship Management Co-managed IT Patch Management Google Maps Compliance Social Engineering Augmented Reality Documents Mouse Programming Heating/Cooling Computing Infrastructure Cloud Computing Lifestyle Text Messaging Hack Monitors Retail Telephony eWaste Experience YouTube Net Neutrality Settings Unified Communications Distributed Denial of Service Public Cloud Pain Points User Error Safety Specifications Politics Social Trending Network Congestion Scam Automobile Statistics Gaming Console Cryptocurrency Google Docs Laptop Bitcoin Webcam Cybercrime How To Digital Office Tips Streaming Media Inbound Marketing Start Menu Paperless Office Taxes Software as a Service Sports Downtime Access Control Computing Uninterrupted Power Supply Processors Chrome USB Tablets IP Address Notifications Evernote Reliable Computing Virtual Assistant Data Protection Human Resources Sync online Currency CCTV Virtual Reality cache Music Upgrades Data Warehousing Skype Hard Drive Disposal Data Loss Bluetooth Corporate Profile LiFi In Internet of Things Emails Teamwork Assessment Redundancy Deep Learning GPS Scalability Storage Rental Service Windows Server 2008 PDF Unified Threat Management Data Breach Memory Harddrive VoIP Visible Light Communication Meetings Keyboard Best Available Wi-Fi Consultation Product Reviews External Harddrive 3D Cabling Domains Private Cloud Windows 7 Ebay Fiber-Optic Recycling Read Audit Flash Advertising Administrator Supercomputer Shortcut Value Google Wallet Pirating Information Emergency Displays Smart Phones Adminstration Worker Get More Done Machine Learning Troubleshooting Freedom of Information Environment Fraud Computer Care Printer Server Staffing Employer Employee Relationship Competition Banking Google Drive Drones News Vulnerability Licensing Content Management Business Owner File Sharing email scam Printing Language Electricity Permissions Botnet Application Business Metrics Fake News Video Surveillance Business Technology Writing switches LinkedIn Vulnerabilities Downloads Upselling Saving ZTime WannaCry Webinar Computer Malfunction Digital Signature Chromebook Mobile Technology Time Management Messenger Microsoft Excel Debate Archive Entertainment Business Cards Google Calendar Work/Life Balance Motion Sickness Tracking Point of Contact Download Mobile Payment Touchscreen Books Analytic Knowledge IT consulting Best Practives Technology Tips Thin CLient Cleaning Web Server Microserver Workers CIO Public Speaking Microchip Television Websites Reading Blockchain Tech Terms Regulations Windows XP Entrepreneur Leadership Access Society Micrsooft Turn Key Samsung HIPAA Hacks SharePoint Business Managemenet Relocation Tip of the week Device Management Trojan G Suite Electronic Payment Physical Security Identity Theft Spyware Organize Capital Productuvuty CrashOverride 3D Printing Piracy Software License

hp supplies medallionLarge2017