Contact us today!
217-428-6449

Network Solutions Unlimited Blog

Network Solutions Unlimited has been serving the Decatur area since 2013, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Hey Cortana! Don’t Listen to Them, You’re my Virtual Assistant

Tip of the Week: Hey Cortana! Don’t Listen to Them, You’re my Virtual Assistant

Cortana, Windows 10’s built-in personal assistant, has proven to be useful for those users who have taken advantage of her services. Sometimes, however, the Cortana interface will answer when another person in the room beckons her. For Cortana to work for one person, and to obey only one voice, the software needs to get to know that voice.

To begin to set this up you have to open Cortana’s Settings. To do this, click on the Cortana Icon on the taskbar.

cortana ib 1

Then select the gear-shaped icon in the Cortana window to access Cortana’s settings.

cortana ib 2

Make sure that the Let Cortana respond to “Hey Cortana” setting is toggled on.

cortana ib 3

Then select Learn how I say “Hey Cortana”.

cortana ib 4

You will then be asked to answer six phrases to help Cortana determine the way you say “Hey Cortana”.

cortana ib 5

Once you’ve completed that step, return to Cortana’s settings and make sure that the try to respond only to me option is selected.

cortana ib 6

Now you have Cortana’s full attention. You can have her help you with any number of issues, while helping you navigate Windows 10.

Do you use Cortana? Siri? Google Assistant? Alexa? Bixby? If so, which are your favorites? Leave your thoughts with us in the comments below.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 21 February 2018

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

Customer Computing Infrastructure Consultant Regulation Windows 10s Shortcut Project Management Google Maps Upgrade Big Data Retail Specifications Rootkit Google Docs Innovation Data Security Spyware Device Security Holiday Sync Books Facebook Audiobook Applications Operating System Data Management Spam Blocking Passwords Maintenance Transportation Virtualization Value Scalability Phishing Microsoft Word Data Bring Your Own Device Save Time eWaste Saving Money Mobile Devices Cybercrime Browser Employer-Employee Relationship Social Media Business Computing Professional Services Password Software as a Service intranet Best Practice Business Mobile Device Management Congratulations Hard Disk Drive Black Market Experience Firewall User Tips Education Business Owner Android Benefits Chromecast Wireless Technology Downtime iPhone Mobility Managed IT Services IT Management Collaboration Personal Information Bluetooth Blockchain Recovery Sports Legislation Conferencing Phone System IT Support Windows 10 Internet Exlporer Augmented Reality Save Money Content Risk Management Hacking Relocation Managed IT Service Marketing Chrome Business Intelligence Monitors Compliance MSP Thank You Video Games Humor WiFi Windows Electronic Medical Records Loyalty Commerce Users End of Support Productivity Microsoft Cybersecurity Keyboard Politics VoIP Data Breach Security Cloud Computing Outsourced IT Evernote Samsung Backup Edge Robot App Hosted Solution HBO Tablets Excel Legal Tech Support Audit Hiring/Firing Remote Monitoring Automation History Worker Internet exploMicrosoft Techology Entertainment Communications Office Tips Cloud VPN Bandwidth Content Filtering Data storage Emergency Troubleshooting Scam Apple Meetings Money BDR Technology Cleaning Computer Care Screen Mirroring Shadow IT Colocation Quick Tips Updates Office 365 Cortana Hosted Solutions Telephone Systems Tip of the Week Automobile Spam Training Worker Commute User Error WannaCry Data Backup Data Recovery CrashOverride Gifts Artificial Intelligence Emails Dark Web Miscellaneous Two-factor Authentication Apps Proactive IT Outlook Networking IT budget Employer Employee Relationship Computer Comparison Data Storage Advertising Reputation Encryption Data Loss Webinar Patch Management HaaS Root Cause Analysis Going Green Touchscreen hacker Microsoft Office Touchpad Mobile Nanotechnology IT Services Small Business Laptop OneNote Safety Server SaaS Remote Computing Government Computer Fan Budget Ciminal How To How to Cache Charger Internet BYOD Devices Network Ransomware Travel Virtual Reality Productivity Business Management Smartphone Private Cloud IT Support Microsoft Excel Mobile Device Avoiding Downtime Television Malware WIndows Server 2008 Fraud Windows 10 Hard Drives Wireless USB Files Lifestyle Identities Data Protection Internet of Things Physical Security Vendor Management Health Solid State Drive Unsupported Software Managed IT Services Google Drive Managed Service Provider HIPAA Email Workers Router Upgrades Work/Life Balance IT solutions Two Factor Authentication Computer Accessories Public Cloud Word Office Software Hackers Business Continuity Hybrid Cloud Administration Law Enforcement Instant Messaging Information Technology Settings Licensing Alert Efficiency Battery Unified Threat Management Document Management PDF Redundancy Hardware FAQ Adobe NFL Cast Wi-Fi Storage Best Practices Sales Vulnerability Privacy File Sharing Windows Ink Application IT Solutions Search Workplace Tips Credit Cards Monitor Public Computer Smartphones The Internet of Things Social Engineering Cost Management Wireless Charging Flexibility Gmail Smart Technology Managed IT Computers Assessment Identity Theft Disaster Recovery Network Security Google iOS Gadgets

Sign Up for Our Newsletter

  • Company Name *
  • First Name *
  • Last Name *