One of the most recognizable names in technology isn’t a person, it’s a virtual assistant: Cortana. While Cortana has been of great use to many users, sometimes that user isn’t actually the person who owns the device and is just someone else in the same room. This can be annoying, but there’s a way to acquaint Cortana with a single user’s voice and listen to them exclusively.
Mobile? Grab this Article!
Tip of the Week Security Best Practices Technology Network Security Tech Term Hackers Business Computing Privacy Data Data Backup IT Support Productivity Efficiency Android Software Data Recovery Malware User Tips Google Innovation Computer Collaboration Email Communications IT Services Cybersecurity Internet Business Management Windows 10 Smartphone Phishing Cloud Communication Backup Ransomware Mobile Device Small Business Managed IT Services Hardware Facebook Artificial Intelligence Business Technology VoIp Microsoft Office Hosted Solutions Alert Outsourced IT Browser Blockchain Business Access Control Mobile Device Management IT Management Information Managed Service Office 365 Cloud Computing Applications Cost Management BDR Mobile Devices Social Media Workplace Tips Update Automation Passwords Smartphones Maintenance Websites Antivirus Cybercrime Network App Data Management Microsoft Server Saving Money Patch Management Data Security Hard Drive Holiday Encryption Scam Vulnerability Two-factor Authentication Operating System Social Engineering Bitcoin Healthcare Printer Augmented Reality Data Protection Gmail Internet of Things Tech Terms Analytics Data loss Start Menu Quick Tips Document Management Project Management Apps Data Breach Conferencing Big Data Saving Time Laptop Hacking Disaster Recovery Vulnerabilities Managed Service Provider Apple Google Maps Windows Managed IT services Business Continuity Digital Cooperation Mobility Spam Bandwidth VPN Word Search Vendor Remote Monitoring Users Social Uninterrupted Power Supply WiFi Cortana Accountants Going Green Software License Time Management Knowledge Identity Theft Screen Reader Social Network Unified Communications HTML Help Desk Business Cards DDoS Wireless Headphones Monitoring Spyware Multi-factor Authentication Sports PowerPoint Corporate Profile Google Calendar eWaste Business Mangement Legislation Content Microchip News Customer Resource management Router Virtual Assistant Managed IT Training Download Entertainment Save Money Desktop Printing Virus Machine Learning Vendor Management Comparison Telephony Cleaning Management Tech SaaS Computer Care Device security Paperless Office Professional Services Robot Virtualization BYOD Processor CrashOverride Fake News Telephone System Modem Gadgets Downloads Password Equifax Upload Data Analysis Worker SharePoint Unified Threat Management Government Excel Devices Network Management Running Cable Specifications VoIP Computers Computing Term Software as a Service Database User Tip Voice over Internet Protocol Google Docs Navigation Electronic Medical Records SSID Hard Drive Disposal Outlook Startup Trends Fileless Malware YouTube Money Information Technology Touchscreen Chromebook Solid State Drive Legal Tip of the week Compliance Bookmark Cabling Tablet Television Downtime Disaster Virtual Reality Nanotechnology Error Google Play Website Tactics iPhone Computing Infrastructure Emergency Emails Travel Miscellaneous Evernote Microsoft Excel Mobile Security Backup and Disaster Recovery Health IT History email scam Gamification Directions Settings Distributed Denial of Service Mobile Technology Law Enforcement Regulations Service Level Agreement Browsers How to Mouse Piracy Company Culture Telephone Security Cameras Cryptocurrency Addiction Proxy Server Retail Budget Networking Google Drive Bluetooth Username Access Twitter Medical IT IBM Vendor Mangement Redundancy Administration Freedom of Information Audit Thank You Congratulations Printers Multi-Factor Security Regulation Managing Stress