Contact us today!
217-428-6449

Network Solutions Unlimited Blog

Tip of the Week: Hey Cortana! Don’t Listen to Them, You’re my Virtual Assistant

Tip of the Week: Hey Cortana! Don’t Listen to Them, You’re my Virtual Assistant

Cortana, Windows 10’s built-in personal assistant, has proven to be useful for those users who have taken advantage of her services. Sometimes, however, the Cortana interface will answer when another person in the room beckons her. For Cortana to work for one person, and to obey only one voice, the software needs to get to know that voice.

To begin to set this up you have to open Cortana’s Settings. To do this, click on the Cortana Icon on the taskbar.

cortana ib 1

Then select the gear-shaped icon in the Cortana window to access Cortana’s settings.

cortana ib 2

Make sure that the Let Cortana respond to “Hey Cortana” setting is toggled on.

cortana ib 3

Then select Learn how I say “Hey Cortana”.

cortana ib 4

You will then be asked to answer six phrases to help Cortana determine the way you say “Hey Cortana”.

cortana ib 5

Once you’ve completed that step, return to Cortana’s settings and make sure that the try to respond only to me option is selected.

cortana ib 6

Now you have Cortana’s full attention. You can have her help you with any number of issues, while helping you navigate Windows 10.

Do you use Cortana? Siri? Google Assistant? Alexa? Bixby? If so, which are your favorites? Leave your thoughts with us in the comments below.

It’s Decided: You’re More Likely to be Phished tha...
Wireless Charging Is Catching On
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, August 22 2018

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

Information Health The Internet of Things Hard Drives Business Computing Worker Commute Automation Remote Monitoring Shortcut Internet BDR Entertainment Touchscreen Data Security Two Factor Authentication Websites Wireless Technology Mobile Security Mobile Devices Emergency FAQ Data Privacy Students Social Engineering Quick Tips Flexibility Chrome Remote Computing Social Media Data Loss Vendor Management Employer Employee Relationship Sales Identities Emails Evernote Dark Web Spam Blocking Miscellaneous iOS Audiobook Value Video Games Chromecast Productivity Wi-Fi iPhone Network Security Telephone Systems Microsoft Excel Productivity Virus Relocation Email Wasting Money Company Culture Communication Audit Computer Fan Computer Care CrashOverride Proactive Wireless Hybrid Cloud Computers Streaming Media Cybersecurity Small Business IT solutions Privacy Books Computer Forensics Users WPA3 Administration Twitter Data Management IT Services Managing Stress Edge Root Cause Analysis User Tips Tablets Microsoft Downtime Language Managed IT Services Spam Private Cloud How to Training Cybercrime Virtualization Antivirus Data Theft Tech Term SaaS Office Microsoft Office Virtual Reality PowerPoint Google Drive IoT Gifts Legal Malware IT Support Blockchain Cloud Upgrade Tech Support Disaster Recovery Business Technology Automobile End of Support Microsoft Word Software Credit Cards Bluetooth Employer-Employee Relationship Personal Information Windows 10s Financial Technology Security VPN Work/Life Balance IT Support Data Breach HIPAA Charger Benefits Retail Redundancy Computing Unified Communications Analysis Fraud IT Management Mobility BYOD Collaboration eWaste Budget Bandwidth Holiday Troubleshooting Settings Windows Ink Smartphones Reputation History Business Continuity Nanotechnology Business Intelligence Safety Laptop Colocation Lifestyle Hard Drive Congratulations Smartphone Patch Management Loyalty Devices hacker Sports Workers App store Chromebook Advertising Transportation Hosted Solution App WannaCry Hiring/Firing Two-factor Authentication Apps Bring Your Own Device Update Backup Sync Files WIndows Server 2008 USB Office Tips Google Maps Professional Services Public Cloud Battery MSP Computer Upgrades Legislation VoIP Managed IT Services Samsung Specifications Connectivity Password Internet Exlporer OneNote Compliance Managed IT Experience Facebook Webinar Wireless Internet Ransomware Networking IT Solutions Encryption Smart Technology Windows 10 Gadgets Information Technology Cache Cloud Computing Techology Touchpad Outsourced IT Black Market Scalability Software as a Service Marketing Data NFL Technology Commerce Best Practice Adobe User Error Printing Router Wireless Charging Content Filter Saving Money Communications Storage Google Data Recovery Innovation Public Computer Meetings Spyware Financial Efficiency Risk Management Electronic Medical Records Save Money PDF Managed Service Provider Cast Maintenance Internet exploMicrosoft File Storage Alexa for Business Rootkit Business Owner Business WiFi Best Practices Television Document Management Monitoring Google Docs Android Instant Messaging Identity Theft Mobile HaaS Windows 10 Augmented Reality Big Data Memory Proactive IT Assessment Law Enforcement Passwords Applications Vulnerability Thank You Windows Unified Threat Management Phishing How To Government Firewall Conferencing Virtual Assistant Unsupported Software Worker Content Filtering Data storage Cortana Office 365 Google Assistant Data Storage Word File Sharing Travel Internet of Things Gmail Mobile Device Hard Disk Drive Updates Monitors Hosted Solutions Phone System Data Backup Mobile Device Management Going Green Business Management Content Cost Management Ciminal Save Time Management Recovery Keyboard Robot IT budget Consultant Solid State Drive Hardware Amazon Money HBO Server Smart Tech Network Politics Hacking Cleaning Scam Monitor Humor Managed IT Service Computer Accessories Artificial Intelligence Hackers Customer Avoiding Downtime Project Management Regulation Gamification Browser Data Protection intranet Computing Infrastructure Licensing Application Workplace Tips Tip of the Week Excel Screen Mirroring Outlook Device Security Physical Security Comparison Apple Operating System Identity Search Alert Education Shadow IT