773-635-5100    Let's Meet    Get SUPPORT

Shartega Systems Blog

Shartega Systems has been serving the Chicago area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Hey Cortana! Don’t Listen to Them, You’re my Virtual Assistant

Tip of the Week: Hey Cortana! Don’t Listen to Them, You’re my Virtual Assistant

Cortana, Windows 10’s built-in personal assistant, has proven to be useful for those users who have taken advantage of her services. Sometimes, however, the Cortana interface will answer when another person in the room beckons her. For Cortana to work for one person, and to obey only one voice, the software needs to get to know that voice.

To begin to set this up you have to open Cortana’s Settings. To do this, click on the Cortana Icon on the taskbar.

cortana ib 1

Then select the gear-shaped icon in the Cortana window to access Cortana’s settings.

cortana ib 2

Make sure that the Let Cortana respond to “Hey Cortana” setting is toggled on.

cortana ib 3

Then select Learn how I say “Hey Cortana”.

cortana ib 4

You will then be asked to answer six phrases to help Cortana determine the way you say “Hey Cortana”.

cortana ib 5

Once you’ve completed that step, return to Cortana’s settings and make sure that the try to respond only to me option is selected.

cortana ib 6

Now you have Cortana’s full attention. You can have her help you with any number of issues, while helping you navigate Windows 10.

Do you use Cortana? Siri? Google Assistant? Alexa? Bixby? If so, which are your favorites? Leave your thoughts with us in the comments below.

It’s Decided: You’re More Likely to be Phished tha...
Is Your Backup and Recovery Strategy Solid?


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, 22 January 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Privacy Network Security Best Practices Software Technology Hackers Malware Productivity Managed IT Services Business Computing Cloud IT Support Outsourced IT Disaster Recovery Backup Google Internet Business Continuity Mobile Devices Windows 10 Microsoft Data Backup IT Services Managed IT Business Management User Tips Ransomware Mobility Data Recovery Communications Hosted Solutions Email Small Business WIndows Alert Cybersecurity Saving Money Vulnerability Business Server VoIP Law Enforcement Office 365 Save Money Smartphone Mobile Device Management Hardware Efficiency Cybercrime Innovation Social Media Money Phishing Unsupported Software Microsoft Office Cloud Computing Hosted Solution Android Health Browser Miscellaneous Data Security Office tips Virtualization Wireless Computer App Shortcut Collaboration Facebook Managed Service Provider Government BYOD BDR Holiday Smartphones Quick Tips Chrome Firewall Avoiding Downtime Two-factor Authentication Best Practice Audit Data Information Technology Apps Politics Google Drive Budget Gadgets Data Management Work/Life Balance Operating System Cleaning HaaS Application Telephone Systems Search Personal Information Battery Saving Time End of Support Data Protection Cortana Passwords Computer Care Wireless Technology Commerce Automobile Marketing Data Breach SaaS USB User Error WiFi Proactive IT Spam Encryption Computers Save Time Social Google Docs Data Storage Risk Management iPhone Applications Cost Management Content Filtering Compliance Identity Theft Samsung OneNote The Internet of Things Redundancy Training Maintenance Word Meetings Storage Experience Emergency Text Messaging Employer-Employee Relationship Credit Cards Users Regulation Education Company Culture Password eWaste Windows Ink Settings Sports Phone System FAQ Touchscreen Sync Productivity Value iOS Google Maps Network Lifestyle HBO Black Market Keyboard Artificial Intelligence Charger Adobe Office VPN Wi-Fi Computer Fan IT Support Legislation Shadow IT History Communication Wireless Charging Managed IT Services Point of Sale Dark Web Software as a Service Comparison Automation IT Management Disaster Router Hacker WannaCry Licensing Apple Antivirus Flexibility Internet Exlporer Specifications IT Solutions Hacking Avoid Downtime Evernote Emails Mobile Nanotechnology Advertising Business Intelligence Sales Virtual Reality Document Management Reputation Networking Webinar Professional Services Root Cause Analysis Data Loss Television Update Managed IT Service Retail Unified Threat Management WIndows Server 2008 Hard Drives Mobile Computing Workers IT solutions Travel HIPAA Mobile Device Humor Conferencing Patch Management Updates Tablets CrashOverride Microsoft Excel Augmented Reality PDF Screen Mirroring Gifts Upgrades Outlook Microsoft Word NFL File Sharing Internet of Things Current Events Electronic Medical Records Solid State Drive Cast Consultant Excel Smart Technology Worker Commute Remote Computing Competition Windows 10 Taxes Fun Big Data Upgrade Supercomputer Recovery Legal Device Security Music IT Budget Telephony Devices Presentation Scam Workplace Tips Private Cloud 5G Spyware IBM Benefits Employer Employee Relationship Analytics Customer Relationship Management Computer Accessories IP Address Scalability Books Website Customer Service Transportation Remote Monitoring Mobile Office Entertainment Domains Vendor Management Public Speaking Instant Messaging Lithium-ion battery Windows 10s How To Tech Support Video Games Safety Hard Disk Drive Managing Stress Hiring/Firing

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *