Get Started Today!  217-475-0226

Tip of the Week: Cortana Can Do Even More than You Might Realize

Tip of the Week: Cortana Can Do Even More than You Might Realize

One of the most recognizable names in technology isn’t a person, it’s a virtual assistant: Cortana. While Cortana has been of great use to many users, sometimes that user isn’t actually the person who owns the device and is just someone else in the same room. This can be annoying, but there’s a way to acquaint Cortana with a single user’s voice and listen to them exclusively.

To set this up, you’ll need to access Cortana’s Settings. First, click on the Cortana Icon that appears on the taskbar.

cortana ib 1

Next, access the settings menu for Cortana by clicking on the gear icon in the Cortana window that appears.

cortana ib 2

Activate Let Cortana respond to “Hey Cortana” and select Learn how I say “Hey Cortana.”

cortana ib 3

Once you do so, you will be prompted to recite six phrases so that Cortana can establish how you will say “Hey Cortana.”

cortana ib 4

After this exercise is completed, go back to Cortana’s settings and confirm that try to respond only to me is selected.

cortana ib 5

Cortana is now primed to listen to only you and you can now use it for many purposes, including to navigate Windows 10.

cortana ib 6

Are there any other assistants you use, like Alexa, the Google Assistant, Siri, or Bixby? Which one is your favorite? Tell us why in the comments section!

These Gifts Can Come with Security Issues
As Technology Has Evolved. So Have Our Holiday Tra...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, October 19 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Privacy Tech Term Network Security Business Computing IT Support Hackers Android Software Data Data Recovery Business Management Efficiency Malware User Tips Innovation Email Google Data Backup Productivity Cybersecurity Computer Internet Small Business Smartphone Collaboration Backup Ransomware Cloud Communications Managed IT Services Artificial Intelligence Windows 10 Business Technology IT Services Communication Hardware BDR Mobile Device Phishing Cybercrime Mobile Device Management Browser Cost Management IT Management Business Maintenance Blockchain Access Control Office 365 Passwords Encryption Network Applications Gadgets Facebook Data Security Patch Management Hard Drive Information Managed IT Services Saving Money Microsoft Office Antivirus Update Two-factor Authentication Social Media Outsourced IT App Word Data loss Save Money Smartphones Data Protection Alert Remote Monitoring Touchscreen Digital Hacking Tech Terms Gmail Microsoft Project Management Cloud Computing Windows Automation Law Enforcement Data Breach Vulnerabilities Managed Service Apps Start Menu Laptop Websites Managed Service Provider Server Document Management Bandwidth Holiday Analytics Data Management VPN SaaS Scam Vendor Business Continuity Disaster Recovery Bitcoin Internet of Things Operating System Money Conferencing Social Engineering Search Spam Customer Resource management Unified Threat Management Virtual Assistant Gamification Worker Big Data Information Technology Computers Fake News Telephony Multi-factor Authentication Database Service Level Agreement Vendor Management Managed IT Apple Management Desktop Chromebook Upgrades Government YouTube Robot Equifax Username Samsung Vendor Mangement Telephone System Unified Threat Management Computer Care Excel Devices Comparison Mobile Technology Nanotechnology History VoIP Device security Tactics Going Green Saving Time Google Calendar Access Downtime Emails Computing Business Mangement Backup and Disaster Recovery User Tip Legal Settings Startup SharePoint Electronic Medical Records Tip of the week Hard Drive Disposal Compliance Content Specifications Augmented Reality Google Maps Microsoft Excel IBM Website Download Automobile Bookmark Hosted Solutions Outlook Running Cable Spyware Piracy Bluetooth Error WiFi Solid State Drive Addiction Telephone Systems Downloads Administration Computing Infrastructure Miscellaneous Disaster Distributed Denial of Service Health IT Best Practice Tablet Software as a Service email scam Regulations BYOD IT Support Emergency Television Virtual Reality Screen Reader Telephone Wireless Cryptocurrency Corporate Profile Time Management Upload Browsers Google Docs Cabling Software License Wireless Headphones Mobile Security Printer Machine Learning Proxy Server Consultant VoIp Employer-Employee Relationship Networking Legislation Freedom of Information Unsupported Software Unified Communications Cortana How to Mobile Devices Accountants Vulnerability Mouse Password Company Culture Social Network Audit HTML Trends Workplace Tips Redundancy Budget Cleaning Uninterrupted Power Supply Google Drive Paperless Office Network Management Help Desk Mobility Business Cards Virtualization Monitoring Knowledge News Identity Theft Sports Printing Virus eWaste Training Travel DDoS Entertainment Quick Tips Managing Stress Data Analysis Windows 10 Multi-Factor Security Marketing Twitter Printers Office CrashOverride Users Regulation Office Tips

Latest Blog

The business world is inherently somewhat Darwinian: instead of organisms with desirable traits surviving and carrying on, better businesses tend to outlast those that are inferior. In order to keep on, you need to ensure that your business has the tools it needs to be bette...

Latest News

Decatur Computers Inc. is proud to announce the launch of our new website at The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.