Contact us today!
217-428-6449

Network Solutions Unlimited Blog

Tip of the Week: Hey Cortana! Don’t Listen to Them, You’re my Virtual Assistant

Tip of the Week: Hey Cortana! Don’t Listen to Them, You’re my Virtual Assistant

Cortana, Windows 10’s built-in personal assistant, has proven to be useful for those users who have taken advantage of her services. Sometimes, however, the Cortana interface will answer when another person in the room beckons her. For Cortana to work for one person, and to obey only one voice, the software needs to get to know that voice.

To begin to set this up you have to open Cortana’s Settings. To do this, click on the Cortana Icon on the taskbar.

cortana ib 1

Then select the gear-shaped icon in the Cortana window to access Cortana’s settings.

cortana ib 2

Make sure that the Let Cortana respond to “Hey Cortana” setting is toggled on.

cortana ib 3

Then select Learn how I say “Hey Cortana”.

cortana ib 4

You will then be asked to answer six phrases to help Cortana determine the way you say “Hey Cortana”.

cortana ib 5

Once you’ve completed that step, return to Cortana’s settings and make sure that the try to respond only to me option is selected.

cortana ib 6

Now you have Cortana’s full attention. You can have her help you with any number of issues, while helping you navigate Windows 10.

Do you use Cortana? Siri? Google Assistant? Alexa? Bixby? If so, which are your favorites? Leave your thoughts with us in the comments below.

It’s Decided: You’re More Likely to be Phished tha...
Wireless Charging Is Catching On
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 22 May 2018

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

Gadgets Communications PDF Google Virtualization Users Content Data Loss User Error Files Innovation Updates Smartphone Two-factor Authentication Miscellaneous Video Games Analysis Security Unified Threat Management Transportation Windows Ink CrashOverride Wireless Charging Safety Training Dark Web Internet exploMicrosoft Best Practice Productivity Physical Security Identity Theft Spam Blocking Microsoft Worker Commute Travel Thank You Wi-Fi Encryption Quick Tips Scalability Management HBO Worker Android hacker Windows 10 Collaboration Content Filtering Going Green Law Enforcement Social Engineering Data storage Downtime Save Money Firewall Gmail Browser Hybrid Cloud Google Assistant Work/Life Balance Mobile Device Management Public Cloud Data Privacy iPhone Samsung Techology Audit File Sharing Hosted Solution BYOD Network Comparison Apple Proactive Shadow IT Root Cause Analysis Maintenance Hard Drive Experience App store Hosted Solutions Microsoft Excel Loyalty Touchpad Phishing Education Monitoring Websites Social Media Cloud Streaming Media Language HIPAA Spam Books BDR Google Drive Managed IT Service Apps Search Monitor eWaste Internet of Things Chromecast Storage Smartphones End of Support Redundancy Network Security How to Mobile Workplace Tips Update Software as a Service Alert Tech Support IT Support Applications Upgrades Screen Mirroring Excel VoIP Hackers Spyware Scam VPN Customer Bluetooth Relocation Server Vulnerability Data Management USB Mobile Device Assessment Office 365 FAQ Chrome History Sports Remote Computing Privacy Cybercrime Wireless Business Management Chromebook Black Market IT Services Professional Services Tablets Avoiding Downtime Lifestyle Virus Data Security OneNote Password Content Filter Audiobook Small Business Twitter Smart Technology Sync Managed IT Services Computing Office Workers Information Technology Wireless Technology App Marketing Risk Management Cache Computer Fan Automobile Phone System WiFi Microsoft Office Recovery Emergency Bring Your Own Device Managed IT Services Public Computer Big Data Congratulations Value Reputation Electronic Medical Records Hard Drives Financial Technology Charger Data Backup Data Protection Cortana Retail Best Practices Evernote Shortcut Television Computer Data Recovery Meetings Credit Cards Employer Employee Relationship User Tips Solid State Drive Efficiency Remote Monitoring Document Management Sales Vendor Management Cast Facebook Regulation Troubleshooting Consultant Emails Project Management Ciminal Legal Computer Care iOS Device Security Augmented Reality Colocation Private Cloud Edge Windows 10s Hacking Antivirus Cleaning Word Benefits Outsourced IT Computers Proactive IT Blockchain Windows 10 Conferencing Money Battery Fraud Business Email Data Storage Budget Flexibility Hardware Health Productivity IT budget Settings Identities How To Router Rootkit Robot Business Owner Internet Microsoft Word Administration Touchscreen Communication Software Compliance Windows Connectivity NFL Licensing Patch Management Smart Tech IT Support Computer Accessories Automation Telephone Systems Two Factor Authentication Backup Printing Entertainment Business Intelligence Government Cloud Computing Upgrade Google Maps Cybersecurity Google Docs Webinar Computing Infrastructure Passwords Holiday IT Solutions Cost Management Networking Tech Term IT solutions Internet Exlporer Data Technology Hard Disk Drive Bandwidth Data Theft Business Continuity Gifts WIndows Server 2008 Data Breach Hiring/Firing Operating System WannaCry Managed IT Mobility MSP Legislation Devices Monitors Humor Politics Tip of the Week Advertising Unsupported Software Instant Messaging Save Time Artificial Intelligence Computer Forensics Virtual Reality IoT Nanotechnology Managed Service Provider Mobile Security The Internet of Things SaaS HaaS Keyboard Office Tips Personal Information Identity Application Adobe IT Management Commerce Specifications Outlook Employer-Employee Relationship Malware Mobile Devices intranet Saving Money Business Computing Disaster Recovery Ransomware Laptop