Velocity Technology Partners Blog

Velocity Technology Partners has been serving the Bogart area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Hey Cortana! Don’t Listen to Them, You’re my Virtual Assistant

Tip of the Week: Hey Cortana! Don’t Listen to Them, You’re my Virtual Assistant

Cortana, Windows 10’s built-in personal assistant, has proven to be useful for those users who have taken advantage of her services. Sometimes, however, the Cortana interface will answer when another person in the room beckons her. For Cortana to work for one person, and to obey only one voice, the software needs to get to know that voice.

To begin to set this up you have to open Cortana’s Settings. To do this, click on the Cortana Icon on the taskbar.

cortana ib 1

Then select the gear-shaped icon in the Cortana window to access Cortana’s settings.

cortana ib 2

Make sure that the Let Cortana respond to “Hey Cortana” setting is toggled on.

cortana ib 3

Then select Learn how I say “Hey Cortana”.

cortana ib 4

You will then be asked to answer six phrases to help Cortana determine the way you say “Hey Cortana”.

cortana ib 5

Once you’ve completed that step, return to Cortana’s settings and make sure that the try to respond only to me option is selected.

cortana ib 6

Now you have Cortana’s full attention. You can have her help you with any number of issues, while helping you navigate Windows 10.

Do you use Cortana? Siri? Google Assistant? Alexa? Bixby? If so, which are your favorites? Leave your thoughts with us in the comments below.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, 18 January 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

IT support Chrome Commerce Hosted Solution Microsoft Office Cloud iPhone Congratulations Government Licensing Google Drive Wi-Fi Browser Personal Information Maintenance Saving Money VPN eWaste Data Breach Computers Windows Ink Mobile Devices Travel Wireless Technology Small Business BYOD FAQ Storage Microsoft Word Mobile Device Management Spam Patch Management File Sharing History Best Practices Hardware WIndows Server 2008 Internet Best Practice Two-factor Authentication Data Loss Data Protection Outsourced IT Google Maps Microsoft Server Artificial Intelligence Content Filtering Redundancy Cast Cybersecurity Gadgets Apple Data Management Managed IT Services Microsoft Excel Comparison Retail Sales Money Law Enforcement Audit Mobility Encryption Communications Marketing Hosted Solutions Thank You OneNote Collaboration User Tips Cybercrime Adobe Windows 10 Software Unsupported Software Windows Cloud Computing App User Error Data Backup HBO IT Management Risk Management Politics NFL Social Media Word Tip of the Week Emergency Cortana Sync Phishing Excel The Internet of Things Apps Gifts Network Security Charger Work/Life Balance Credit Cards WannaCry Vulnerability Specifications Smartphones Virtualization Applications Technology Sports Google Docs Outlook Passwords IT Support Alert Android Tablets Smartphone Backup Proactive IT WiFi IT Services Networking Wireless Charging Lifestyle Business Management Screen Mirroring IT Solutions Shortcut Email Data Recovery Software as a Service Updates Computer Telephone Systems Conferencing Identity Theft Workers Legislation Office 365 Malware Privacy Holiday Security SaaS Managed IT Productivity Evernote Google Disaster Recovery Managed Service Provider VoIp Data Security Data Storage Hackers Business Continuity

Blog Archive