Skip to main content

Need to turn on your lights? Cortana can help with that

Windows Phone 8.1 Cortana Screens
Image used with permission by copyright holder
When it was first unveiled, there was little that stood out about Microsoft’s Cortana apart from the Halo references, but over the past several years, Microsoft has made plenty of improvements to the software. One of the most recent is increased integration with various smart devices. Recently added to the Cortana Notebook, the “Connected Home” will allow users to sign into various smart home accounts and control them through Cortana.

Currently, the feature only works with five services: Wink, Insteon, Nest, SmartThings, and Hue. Once you’ve activated the feature, you’ll be able to sign into your various accounts and allow Cortana to manage them. The selection of services is fairly limited at the moment, but it is likely that Microsoft will add new services as time goes on as, for the most part, it has been fairly good about attempting to make Cortana useful.

Engadget noted that testers were able to connect Cortana to their Hue account, but trying to turn on the lights resulted in Wikipedia searches. That being said, the author noted that they’ve had that problem before so other accounts might work better.

In addition to Windows PC, the Connect Home feature is also available for Windows Mobile though there aren’t too many Windows Mobile users out there. Still, it’s nice that Microsoft is continuing to support those customers.

The launch of this feature also likely means that we are drawing ever closer to the launch of Microsoft’s Invoke. Produced by Harman Kardon, the Invoke serves as Microsoft’s answer to Alexa and Google Home. The release date of the Invoke has not been announced, but Microsoft announced a launch window of Fall 2017 so we should be hearing news of it fairly soon. With the launch of Connected Home and the impending holiday season, we wouldn’t be surprised to see an Invoke launch within the coming weeks.

Microsoft may have gotten a headstart in the smart home wars, but the addition of Connected Home and the upcoming Invoke prove that the company is serious about competing with Amazon and Google. Whether they can pull it off, however, remains to be seen.

Editors' Recommendations

Eric Brackett
Former Digital Trends Contributor
This Microsoft Teams exploit could leave your account vulnerable
A video call in Microsoft Teams is displayed on a laptop.

According to analysts from cybersecurity company Vectra, there's a massive vulnerability within Microsoft Teams, and countless users could potentially be affected if hackers gets their hands on it.

The program has a flaw that makes it possible for attackers to steal the login credentials of users and log into their accounts. Unfortunately, Microsoft is not planning to patch this right now, so read on to make sure you're staying safe from this unexpected Microsoft Teams issue.

Read more
Hackers can now sneak malware into the GIFs you share
A video call in progress on Microsoft Teams.

How low will malware go to get onto your device? We thought using Minecraft to gain access to your computer was the most nefarious method hackers have produced, but there's a new, even lower type of attack that uses Microsoft Teams and GIFs to mount phishing attacks on your computer.

The new attack is called GIFShell and it installs malware on your computer to steal data. It does so by sneaking itself into innocent-looking GIFs and then waiting for you to share the GIF with your colleagues via Microsoft Teams.

Read more
This game lets hackers attack your PC, and you don’t even need to play it
Genshin Impact characters.

Hackers have been abusing the anti-cheat system in a massively popular game, and you don't even need to have it installed on your computer to be affected.

The game in question is called Genshin Impact, and according to a new report, hackers are able to utilize the game's anti-cheat measures in order to disable antivirus programs on the target machine. From there, they're free to conduct ransomware attacks and take control of the device.

Read more