KT Connections Blog

KT Connections has been serving the Rapid City area since 1997, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Cortana Can Do Even More than You Might Realize

Tip of the Week: Cortana Can Do Even More than You Might Realize

One of the most recognizable names in technology isn’t a person, it’s a virtual assistant: Cortana. While Cortana has been of great use to many users, sometimes that user isn’t actually the person who owns the device and is just someone else in the same room. This can be annoying, but there’s a way to acquaint Cortana with a single user’s voice and listen to them exclusively.

To set this up, you’ll need to access Cortana’s Settings. First, click on the Cortana Icon that appears on the taskbar.

cortana ib 1

Next, access the settings menu for Cortana by clicking on the gear icon in the Cortana window that appears.

cortana ib 2

Activate Let Cortana respond to “Hey Cortana” and select Learn how I say “Hey Cortana.”

cortana ib 3

Once you do so, you will be prompted to recite six phrases so that Cortana can establish how you will say “Hey Cortana.”

cortana ib 4

After this exercise is completed, go back to Cortana’s settings and confirm that try to respond only to me is selected.

cortana ib 5

Cortana is now primed to listen to only you and you can now use it for many purposes, including to navigate Windows 10.

cortana ib 6

Are there any other assistants you use, like Alexa, the Google Assistant, Siri, or Bixby? Which one is your favorite? Tell us why in the comments section!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 23 January 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Privacy hackers Technology Email malware Business Computing Network Security Cloud Internet Google software User Tips Backup Business Ransomware Efficiency Data Computer Android IT Support Small Business Mobile Device Management IT Support Microsoft cybersecurity Money VoIP Facebook Hardware Productivity Network Phishing Smartphone Windows Hosted Solutions Gmail Mobile Devices Managed IT Services Cloud Computing Alert Microsoft Office Artificial Intelligence Data Security IT Management communications Windows 10 Data Management Business Continuity Internet of Things Operating System data breach End of Support vulnerability Apple Nextiva Encryption Managed IT Services Robot Business Management Smartphones Antivirus Outlook Networking Update Bandwidth Cost Management Office 365 Data storage Outsourced IT Unified Communications Social Media Upgrade security cameras Disaster Recovery IT Services Passwords Hard Drive Communication BDR Windows 10 Social Engineering Browser Firewall Information Security Innovation Scam Lunch and Learn Start Menu Productivity Save Money Document Management SaaS Bitcoin Saving Money Data Recovery Law Enforcement Information Technology Cryptocurrency News Events Data Protection Digital Hacking Data Backup Word Access Control Automation Big Data Event Marketing Politics vulnerabilities The Internet of Things Local Buzz Apps Patch Management App Gadgets BYOD South Dakota Google Wallet Analytics WiFi Project Management Google Docs Legal botnet YouTube Collaboration IoT Best Practice Remote Monitoring Server Drones Customer Service Spam History Search IBM Holiday security solutions Google Maps Business Cards Downloads Unified Threat Management Music How To Printer Virtual Desktop Microsoft Excel Community Involvement Safety Managed Services Kaseya Connect Sarbanes-Oxley Act Hardware as a Service Computer Care face Government Google Calendar Writing Email Security LastPass Download Conference Knowledge End User Testing HaaS Running Cable Chamber of Commerce surveillance cameras communication device Virtual Reality Cybercrime Business Communications Cortana Business Comunications Black Market Uninterrupted Power Supply Content Filtering Press Release Blockchain healthcare VPN Tech Terms Vendor Mangement Cabling Trend Micro business owner AtomBombing Comparison Retail Touchscreen Managed IT Cleaning Distributed Denial of Service Excel tool Memory Business Mangement Google Play Store communication solutions Specifications appointment Websites Business Growth Corporate Profile Penetration Testing Access Virtualization Tip of the week identity theft Network Congestion Programming Deep Learning Worker Social Rebrand Dell ’s Sonicwall Global Management System Television Microsoft Office 365 Software as a Service Cloud Backup Phishing Scams Spyware Webcam File Sharing Education Virtual Assistant media experience Redundancy Rapid City Audit Office Google Drive Web Servers botnet attack Applications camera Experience Password Mouse Microsoft Bookings Microsoft Office 365 features Virus Virtual Machines IT Consultation Local Technology IoT Devices Workers Budget Physical Security Mobile Device Remote Computing information Maintenance Vendor Management Telephony Internet 101 Tips and Tricks macbook Sports Sales Tax SharePoint booking process Law IT Risk Creep IT Assessment Hack Wireless Technology Cache Samsung LiFi Hard Drive Disposal Flash Managed Service Provider enterprise productivity software Fortinet Monitors VoIP DDoS attacks Internet Connected Devices Streaming Media IT Security Event Lawyers Hosted Solution IT for Oil Companies IT Strategy Society Laptop Tablets Solid State Drive Visible Light Communication email scam Settings Emergency Business Security Displays DDoS Mobility security precautions Windows XP password manager LastPass Freedom of Information Mixer IT Solutions Risk Management Administration Windows 8 Workplace Tips Tablet Communications Website eWaste Business Technology Fast food Printing Time Management Proactive IT Compliance user confidence Fake News Vendors Bluetooth Attorneys Quick Tips Kaseya Tech Support Office Tips SOX Phone System Unified Threat Management Advertising Computing Infrastructure Disaster Business Metrics Supercomputer end-of-support date holiday season Miscellaneous Rental Service Protection Chromebook IT Consultant UTM Flexibility network security professionals holidays Training Threat management Reliable Computing Playbook Telephone Systems scammers Health Downtime Twitter Employer Employee Relationship Digital Payment Scalability breach methods Banking scams Piracy 3D Printing G Suite Computer Malfunction Public Cloud Travel Taxes Processors Employer-Employee Relationship Messenger Software License Sync Private Cloud Paperless Office Microchip Work/Life Balance Books Users In Internet of Things Motion Sickness Reading Wi-Fi collaboration capabilities Machine Learning CCTV Hiring/Firing Bring Your Own Device IT service Relocation Web Server Documents Administrator Phone Systen Hacker Text Messaging Meetings Ordinary Computers PDF base infrastructure Emails Hacks Computing Automobile Tracking quantum computers Marketing CrashOverride security solution Notifications Language