One of the most recognizable names in technology isn’t a person, it’s a virtual assistant: Cortana. While Cortana has been of great use to many users, sometimes that user isn’t actually the person who owns the device and is just someone else in the same room. This can be annoying, but there’s a way to acquaint Cortana with a single user’s voice and listen to them exclusively.
TREES PLANTED: 60
Last Updated: 2/1/2020
Mobile? Grab this Article!
Tip of the Week Security Technology Business Computing Best Practices Software Network Security Productivity IT Support Data Privacy User Tips Hackers Innovation Computer Hardware Data Backup Tech Term Efficiency Google Communications Cybersecurity Data Recovery Email Android Collaboration Hosted Solutions Internet Business Management Malware Managed IT Services Windows 10 Cloud IT Services Outsourced IT Phishing Backup Business Small Business VoIp Microsoft Communication Smartphone Mobile Device Workplace Tips Network Social Media Server Mobile Devices Smartphones Ransomware Cloud Computing Artificial Intelligence Microsoft Office Business Technology Managed Service Information Facebook Upgrade Access Control IT Management Two-factor Authentication Data Management Alert Holiday Automation Passwords Browser Internet of Things Managed Service Provider Mobile Device Management Quick Tips Cost Management Patch Management Data loss BDR Conferencing Cybercrime Apple Blockchain Applications Apps Government Office 365 Hard Drive Big Data Windows 7 Update Windows Business Continuity Computing Spam Data Security VPN Remote Monitoring Scam Encryption Vulnerability Analytics Miscellaneous Operating System App Gadgets Augmented Reality Data Breach Disaster Recovery Websites Maintenance Vendor Antivirus Users Project Management Saving Money Healthcare Vulnerabilities Bandwidth Information Technology Search Vendor Management Software as a Service Word Professional Services Meetings Google Maps Processor Mobility Saving Time Multi-factor Authentication Printer Voice over Internet Protocol Networking Save Money Data Protection Start Menu Social Engineering iPhone Virtualization Bitcoin Cooperation Mobile Office Virtual Assistant Integration Gmail Computers Laptop Telephone Retail Managed IT Document Management Managed Services Provider Tech Terms Downloads Managed IT services Digital Help Desk Hacking Monitoring Managed Services History How to Customer Resource management Router Hard Drive Disposal Hacker Regulations Service Level Agreement VoIP Entertainment Customer Service Money Employer/Employee Relationship Memes Company Culture Display Office Addiction Access Television Downtime Customer Relationship Management Bluetooth Username Management Tech Legal Tip of the week Twitter Outlook Administration Computing Infrastructure Touchscreen IBM Microsoft Excel Value Electronic Health Records Telephone System Modem email scam Licensing Accountants Going Green Disaster Uninterrupted Power Supply Data Analysis Private Cloud Distributed Denial of Service Mobile Technology SQL Server IT Identity Theft Screen Reader Law Enforcement Wasting Time Health HTML Emergency Spyware Microsoft 365 Mouse Piracy Holidays Wireless Headphones Term Surveillance User Tip Budget How To Legislation Content Corporate Profile Navigation Cryptocurrency Memory Electronic Medical Records SSID Wi-Fi Training Download Fileless Malware Avoiding Downtime Freedom of Information Azure Communitications Desktop WiFi Cortana Managing Costs Internet Service Provider Machine Learning Google Drive Bookmark Solutions Software License Optimization Cleaning Error Google Play Development Device security Paperless Office Vendor Mangement Redundancy CrashOverride Business Cards Cyber security BYOD Audit Evernote Unified Communications Worker Health IT Google Calendar eWaste Managed IT Service Equifax Upload Time Management Knowledge Directions Employer/Employee Relationships News Virtual Desktop Security Cameras Virtual Machine Devices Network Management DDoS Browsers Virtual Machines Running Cable Video Conferencing Database Business Mangement Proxy Server Comparison Trend Micro Printing YouTube Medical IT Robot Startup Trends Fake News Free Resource IT Assessment Chromebook Tablet Social Network Social Hypervisor Compliance Telephony Solid State Drive Transportation SharePoint Teamwork Humor Virtual Reality Nanotechnology Virus Cabling Storage Computer Repair Website Tactics Specifications eCommerce Emails Travel SaaS Computer Care Excel Backup and Disaster Recovery Password Settings Sports PowerPoint Google Docs Gamification Unified Threat Management Microchip Current Events Smart Devices Mobile Security Multi-Factor Security Managing Stress Thank You Congratulations Personal Information Printers Net Neutrality Financial Regulation