Velocity Technology Partners Blogs

Tip of the Week: Hey Cortana! Don’t Listen to Them, You’re my Virtual Assistant

Tip of the Week: Hey Cortana! Don’t Listen to Them, You’re my Virtual Assistant

Cortana, Windows 10’s built-in personal assistant, has proven to be useful for those users who have taken advantage of her services. Sometimes, however, the Cortana interface will answer when another person in the room beckons her. For Cortana to work for one person, and to obey only one voice, the software needs to get to know that voice.

To begin to set this up you have to open Cortana’s Settings. To do this, click on the Cortana Icon on the taskbar.

cortana ib 1

Then select the gear-shaped icon in the Cortana window to access Cortana’s settings.

cortana ib 2

Make sure that the Let Cortana respond to “Hey Cortana” setting is toggled on.

cortana ib 3

Then select Learn how I say “Hey Cortana”.

cortana ib 4

You will then be asked to answer six phrases to help Cortana determine the way you say “Hey Cortana”.

cortana ib 5

Once you’ve completed that step, return to Cortana’s settings and make sure that the try to respond only to me option is selected.

cortana ib 6

Now you have Cortana’s full attention. You can have her help you with any number of issues, while helping you navigate Windows 10.

Do you use Cortana? Siri? Google Assistant? Alexa? Bixby? If so, which are your favorites? Leave your thoughts with us in the comments below.

It’s Decided: You’re More Likely to be Phished tha...
Is Your Backup and Recovery Strategy Solid?
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, September 21 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Antivirus iPhone Data Protection Softphones Connectivity Gamification Value Gifts Backup Blockchain Spam Social Media Cybercrime Hybrid Cloud IT Management Workers Ciminal Tip of the Week Microsoft Identities Apps Microsoft Excel Politics Education Big Data Bring Your Own Device Maintenance Wireless Internet Streaming Media IT support Virus Cloud Computer Forensics Redundancy Sync Office 365 Browser Comparison Telephone Proactive IT Licensing Computers BYOD Data Storage Security Charger PowerPoint Congratulations Language IT Support Legal Encryption Hosted Solutions FAQ Hackers Google Assistant Data Breach Mobile Security Company Culture Personal Information WiFi Sports Financial Safety Update eWaste Edge The Internet of Things Unsupported Software File Sharing History Tablets Screen Mirroring Two-factor Authentication IoT Shortcut Vendor Management Windows Content Filter Cost Management Spyware Tech Term Excel Ransomware Retail Applications App store Disaster Recovery Collaboration WannaCry Identity Saving Money Work/Life Balance Google Windows Ink Communication Google Docs Gadgets Flexibility Managed IT services Social Engineering Analysis Innovation intranet Managed IT Services Malware Managed IT Law Enforcement Communications Credit Cards Commerce Google Drive Efficiency Legislation Printing Windows 10 MSP Operating System BDR Specifications Computer Patch Management HBO Updates Devices Telephone Systems IT Solutions App Websites Holiday Remote Computing Internet of Things Apple Remote Monitoring Networking Google Maps Business Computing Monitoring Business Continuity Cleaning Data Privacy Data Security Device Security Privacy Artificial Intelligence IT budget Regulation Cloud Computing Wireless Technology Storage Compliance Best Practice Adobe Automation Mobility Business Productivity OneNote Microsoft Word Students Managing Stress Sales Memory Managed Service Provider Vulnerability Data Recovery Smartphone Data Management Travel Thank You Passwords Application Evernote Server Best Practices Business Management Internet Hard Drive Chromebook Software as a Service Conferencing Chrome Data Wi-Fi Virtualization Router Employer-Employee Relationship Content Filtering Smart Tech Email Data Loss Network Tech Support Microsoft Office Mobile Devices Lifestyle Twitter Money Wireless Charging Small Business Audit Technology Emergency Data Theft Risk Management User Tips WIndows Server 2008 Alert IT Services NFL Cortana Hosted Solution Phishing Word SaaS Government Cybersecurity Outlook Data Backup Smartphones Financial Technology Software Management Android Hardware VPN Marketing Outsourced IT Unified Communications Cast Fraud Identity Theft Computing Gmail Mobile Device Management Network Security VoIp User Error Proactive Project Management