Contact us today!

Network Solutions Unlimited Blog

Tip of the Week: Hey Cortana! Don’t Listen to Them, You’re my Virtual Assistant

Tip of the Week: Hey Cortana! Don’t Listen to Them, You’re my Virtual Assistant

Cortana, Windows 10’s built-in personal assistant, has proven to be useful for those users who have taken advantage of her services. Sometimes, however, the Cortana interface will answer when another person in the room beckons her. For Cortana to work for one person, and to obey only one voice, the software needs to get to know that voice.

To begin to set this up you have to open Cortana’s Settings. To do this, click on the Cortana Icon on the taskbar.

cortana ib 1

Then select the gear-shaped icon in the Cortana window to access Cortana’s settings.

cortana ib 2

Make sure that the Let Cortana respond to “Hey Cortana” setting is toggled on.

cortana ib 3

Then select Learn how I say “Hey Cortana”.

cortana ib 4

You will then be asked to answer six phrases to help Cortana determine the way you say “Hey Cortana”.

cortana ib 5

Once you’ve completed that step, return to Cortana’s settings and make sure that the try to respond only to me option is selected.

cortana ib 6

Now you have Cortana’s full attention. You can have her help you with any number of issues, while helping you navigate Windows 10.

Do you use Cortana? Siri? Google Assistant? Alexa? Bixby? If so, which are your favorites? Leave your thoughts with us in the comments below.

It’s Decided: You’re More Likely to be Phished tha...
Wireless Charging Is Catching On


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, November 18 2018

Captcha Image

Mobile? Grab this Article!


Tag Cloud

WPA3 Projects Wireless Internet Data Tech Term Virtual Reality Ransomware Upgrade End of Support Computer Accessories Spam Proactive IT Server IT Support Identity Analysis Quick Tips Worker Apps HIPAA Money Telephone Systems Adobe Books Cache Google Docs Avoiding Downtime Hard Drive Spam Blocking Cloud Communications Computer Care Hosted Solutions Hybrid Cloud Management Telephone Word Employer Employee Relationship User Tips Administration Computer Forensics Risk Management Managing Stress Best Practices Lifestyle Holiday Two Factor Authentication eWaste IT Solutions Peripheral Google Assistant Licensing USB Office Tips Upgrades Nanotechnology Collaboration Android Sales Productivity Mobility Amazon Financial Technology Business Gadgets BYOD Passwords Managed IT Services Chromecast Outlook Private Cloud Proactive Congratulations Google Maps Remote Monitoring Education Computer WIndows Server 2008 Spyware Relocation Windows 10 Vendor Management Applications Settings Data Recovery Backup Miscellaneous Data Breach Battery Gmail Comparison iPhone Data Theft Mobile Operating System Bring Your Own Device Conferencing Printers Wasting Money Root Cause Analysis PowerPoint App Smartphones Software as a Service Vendor Professional Services Project Management HBO Apple IT Support Update Router Application Smart Tech Encryption Safety Touchpad Students PDF Law Enforcement Benefits Windows 7 File Sharing Device Security Black Market Monitors Screen Mirroring Troubleshooting Small Business Access Control Google Laptop Going Green Emergency Search Regulation Tablets WiFi Managed IT Services Saving Time Files Hackers Scam Chrome Mobile Security Cloud Computing Wireless Office Cast Facebook FAQ Microsoft Office 365 CrashOverride Computing Outsourced IT Smart Technology Audiobook Network Security Entertainment Flexibility Tech Support HaaS IT budget Co-Managed Services Credit Cards Document Management Charger VPN Smartphone Malware Wasting Time Identity Theft Technology Government Touchscreen Identities Retail Testing Alert Fraud Monitor Mobile Devices Business Computing Firewall Social Media Hardware hacker Experience Dark Web Business Continuity Hard Drives Data Storage Video Games Hard Disk Drive Tip of the Week Hyperlink Public Cloud Software Microsoft Excel Connectivity Internet Devices Information Keyboard Shortcuts Rootkit Downtime Social Engineering Data Backup Windows Managed Service Politics Two-factor Authentication Reputation Unified Threat Management Antivirus Innovation Data Loss Windows 10 Content Language Cleaning App store Artificial Intelligence Chromebook Commerce History Gamification Marketing Efficiency Workers Colocation Cybercrime Physical Security Alexa for Business Patch Management Productivity Best Practice Storage Company Culture Twitter Loyalty Health Wireless Charging Monitoring Maintenance Samsung Redundancy Instant Messaging Public Computer Networking Business Technology Microsoft Word IT Services Save Time Legislation Blockchain Updates Password Emails Legal Phishing Sports Transportation Managed IT Big Data Bluetooth Advertising Bandwidth Privacy Data Privacy Excel Google Drive Financial MSP Printing Virtual Assistant Internet of Things Users Virtualization Value Data storage Personal Information Shadow IT Computer Fan Content Filtering Accessory WannaCry Save Money Worker Commute Gifts Augmented Reality intranet Hacking Edge Email Display Camera Data Protection Cybersecurity Business Intelligence Webinar Cortana Internet Exlporer Data Security Websites Network Microsoft Office Ciminal Business Management Unsupported Software Memory Cost Management Travel Television Vulnerability Streaming Media Hosted Solution Information Technology Sync Compliance Budget Wi-Fi Data Management Utility Computing SaaS NFL Windows Ink Humor Computers Assessment Security Employee-Employer Relationship How To Phone System Keyboard Audit VoIP Work/Life Balance Consultant Solid State Drive IT solutions Remote Computing Mobile Device Electronic Medical Records Robot Evernote Workplace Tips File Storage Computing Infrastructure Wireless Technology Internet exploMicrosoft Thank You How to Managed Service Provider Admin iOS Automation User Error Managed IT Service Windows 10s Disaster Recovery Virus Hiring/Firing Shortcut Recovery Browser Business Owner Meetings IoT Mobile Device Management BDR IT Management Saving Money Training Content Filter Techology Automobile Employer-Employee Relationship Unified Communications Specifications OneNote The Internet of Things Communication Customer Scalability