Get Started Today!  217-475-0226

Decatur Computers Inc. Blog

Decatur Computers Inc. has been serving the Decatur area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Cortana Can Do Even More than You Might Realize

Tip of the Week: Cortana Can Do Even More than You Might Realize

One of the most recognizable names in technology isn’t a person, it’s a virtual assistant: Cortana. While Cortana has been of great use to many users, sometimes that user isn’t actually the person who owns the device and is just someone else in the same room. This can be annoying, but there’s a way to acquaint Cortana with a single user’s voice and listen to them exclusively.

To set this up, you’ll need to access Cortana’s Settings. First, click on the Cortana Icon that appears on the taskbar.

cortana ib 1

Next, access the settings menu for Cortana by clicking on the gear icon in the Cortana window that appears.

cortana ib 2

Activate Let Cortana respond to “Hey Cortana” and select Learn how I say “Hey Cortana.”

cortana ib 3

Once you do so, you will be prompted to recite six phrases so that Cortana can establish how you will say “Hey Cortana.”

cortana ib 4

After this exercise is completed, go back to Cortana’s settings and confirm that try to respond only to me is selected.

cortana ib 5

Cortana is now primed to listen to only you and you can now use it for many purposes, including to navigate Windows 10.

cortana ib 6

Are there any other assistants you use, like Alexa, the Google Assistant, Siri, or Bixby? Which one is your favorite? Tell us why in the comments section!

These Gifts Can Come with Security Issues
As Technology Has Evolved. So Have Our Holiday Tra...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, June 24 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Privacy Technology Network Security Hackers IT Support Business Computing Android Tech Term Cybersecurity Google Smartphone Business Management Malware User Tips Internet Software Backup Email Small Business Managed IT Services Ransomware Data Innovation Data Recovery Productivity Artificial Intelligence Windows 10 Phishing Communications Cost Management IT Management Business Cloud Cybercrime Data Backup Efficiency Business Technology Collaboration Patch Management Network Hard Drive Computer Update Managed IT Services Saving Money App Outsourced IT Hardware Data Security IT Services Encryption Gadgets Blockchain Antivirus Mobile Device Management Microsoft Start Menu Law Enforcement Passwords Bandwidth Browser Scam Holiday Websites Laptop Data Management Smartphones Data loss Tech Terms Hacking Business Continuity Disaster Recovery Project Management Access Control Mobile Device Data Protection BDR Data Breach Office 365 Alert Windows Automation Applications Apps VPN Server Internet of Things Operating System Facebook Bitcoin Maintenance SaaS Remote Monitoring Social Engineering Money Search Microsoft Office Social Media Gmail Touchscreen Spam Save Money Vulnerabilities Word Document Management Digital Vendor Mangement Addiction Website Content Disaster Tip of the week Computing Infrastructure Screen Reader Google Docs Virtual Reality Distributed Denial of Service Access Running Cable Business Mangement Machine Learning Unified Communications Networking Solid State Drive WiFi Legislation Communication Budget Company Culture Redundancy Freedom of Information Telephone Systems Spyware Cabling IT Support HTML Knowledge Cortana Printing Business Cards Software as a Service Wireless Tablet Virtualization Conferencing Identity Theft Network Management News Consultant Analytics Virtual Assistant Government Uninterrupted Power Supply How to Apple Chromebook Comparison Desktop Service Level Agreement Fake News Worker Google Drive Devices Emails Legal Downtime Virus Backup and Disaster Recovery Going Green Managed Service Provider Big Data Google Maps Hard Drive Disposal Cloud Computing Telephony Samsung Compliance Bluetooth Downloads Piracy History Specifications Unified Threat Management YouTube Download Emergency Microsoft Excel email scam VoIP Regulations Wireless Headphones VoIp Software License IBM Television Settings Hosted Solutions Automobile Printer Mobile Security Upload Vulnerability Cryptocurrency Audit Mobile Devices Accountants Cleaning Mobility Mouse Best Practice Administration Employer-Employee Relationship Paperless Office Two-factor Authentication Trends DDoS eWaste Time Management Corporate Profile Training Computers Information Technology Managed IT Unsupported Software Password Database Multi-factor Authentication Gamification Computer Care Robot Equifax Nanotechnology Google Calendar Mobile Technology Tactics Device security Excel Unified Threat Management Startup Augmented Reality Outlook SharePoint Upgrades Windows 10 BYOD Marketing Twitter Office Users Office Tips CrashOverride Managing Stress Multi-Factor Security

Latest Blog

IT support is one of the most important parts of any modern business simply because it’s just not feasible to run a business without any form of technology at its core. For example, most businesses rely on email and other forms of communication, whereas stores might require ...

Latest News

Decatur Computers Inc. is proud to announce the launch of our new website at http://www.decaturcomputers.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.