DatCom Blog

Tip of the Week: Using Templates in Evernote

Tip of the Week: Using Templates in Evernote

The note-taking application Evernote is a favorite of many users, as it allows them to keep extensive notes in an organized fashion. Its true utility goes beyond that of a digital scratch pad, however, as it has additional features that offer much more. For this week’s tip, we’ll review one particularly useful feature: templates.

What Are Templates?
Evernote’s templates are handy, pre-built structures for notes that provide users with a simpler means of organizing specific types of information. Instead of taking time struggling with your formatting each time you start a new note, you can apply one of the templates that Evernote offers on their website. Those with a subscription to Evernote Plus, Premium, or Business can even use formatting they’ve created in past notes to generate their own templates for repeated use.

Applying Templates in Evernote
Once you’ve acquired a few templates, either from the Evernote website’s collection or from a past note, applying one of your choosing is relatively simple.

  • In Evernote, start a new note.
  • In the body of the note, click Templates to view the ones you have saved.
  • From there, you can search for any templates you have, delete ones you no longer want or need, edit their names, and of course, apply them to notes.
  • If you want to edit a template, follow the same process, and once you’ve made the changes that you want, save it as a new template. Note: only those with Plus, Premium, or Business accounts are able to do this.
  • Plus, Premium, and Business users are also able to create their own templates this way.

So, what do you think? Is this a welcome change to Evernote? What other improvements would you like to see them make down the line? Let us know in the comments!

8 Data Backup Terms You Should Know
What Do You Know About the Microchips That Power Y...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, March 19 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Business Computing Network Security Hosted Solutions User Tips Google Microsoft Hackers Internet Software Malware Tech Term Productivity Mobile Devices Business Email Innovation Workplace Tips Backup Smartphones Communications Data Data Backup Hardware VoIP Data Recovery Small Business Android Smartphone Efficiency Cloud Computing Business Continuity IT Services Ransomware Managed IT Services Cybersecurity Windows 10 Router Communication Computer Disaster Recovery IT Support Alert Network Outsourced IT Browser Artificial Intelligence Business Management Cybercrime Windows Server Chrome Internet of Things Law Enforcement Windows 10 Money Collaboration Gadgets Miscellaneous How To Applications Computers Password Mobile Device Office 365 Quick Tips Productivity Facebook Spam Passwords Information Wi-Fi Managed IT Services BDR Virtualization Saving Money Telephone Systems Word Social Media Holiday Health Vulnerability Mobility Office Private Cloud Paperless Office Encryption Settings Connectivity Avoiding Downtime Voice over Internet Protocol Managed Service Mobile Device Management Operating System Two-factor Authentication Work/Life Balance Government App Social Engineering Phishing Data Protection Microsoft Office BYOD Save Money Data Security Flexibility Apps Keyboard Augmented Reality Managed IT Google Docs Botnet Remote Monitoring Telephony Net Neutrality Unsupported Software Windows 7 Comparison Blockchain Cryptocurrency Identity Theft Website Servers Infrastructure End of Support Human Resources Data Storage Bring Your Own Device Meetings Data Management Office Tips Upgrade OneNote Public Cloud Machine Learning Legal VPN Redundancy Business Intelligence Employer-Employee Relationship IT Management Virtual Assistant Fraud Access Control Data Breach HaaS Update Entertainment Google Drive Telephone System Spam Blocking Bandwidth CES Software as a Service Sports IT Plan Automation Scam Networking Content Management Remote Computing Practices HBO Big Data Recycling Root Cause Analysis Managing Stress Shortcuts Hacking Remote Work ISP Value Workers FENG Advertising Smart Office Microchip Electronic Medical Records Worker Commute Conferencing PDF Scalability Online Shopping Smart Tech Internet Exlporer Addiction IBM Battery IT Consultant Cast Experience Smartwatch Charger Hosted Computing Outlook Apple Remote Worker Black Market eWaste HIPAA Social Automobile Cryptomining Search Skype Search Engine FCC Emails Software Tips Content Evernote Solid State Drive Flash Cache Warranty Supercomputer Education Specifications Leadership Safe Mode Employee Cleaning Credit Cards Inventory Frequently Asked Questions iPhone Techology Wiring Criminal Marketing HVAC Budget Vendor Database How to Password Manager Start Menu Bing Hiring/Firing Document Management Title II Audiobook Wireless Charging Audit Internet exploMicrosoft Wireless Internet Printer Computing Infrastructure Staff Music Digital Signage Computer Care Excel Devices Unified Threat Management Wireless Enterprise Content Management Display Video Games MSP Firewall Business Technology Recovery Business Mangement Tools Users Hybrid Cloud YouTube Risk Management Help Desk Best Practice Save Time Online Accountants Physical Security Google Search Instant Messaging Cortana Computer Fan Sync Wire Mouse History Millennials Wearable Technology Amazon Authentication Tip of the week Thought Leadership Mobile Computing Patch Management IT Support Multi-Factor Security Knowledge Data loss Password Management Security Cameras Training File Sharing WiFi Gmail Downtime Information Technology Company Culture Politics Telecommuting Netflix USB Proactive IT Samsung Travel Google Apps The Internet of Things Administrator Current Events Virtual Reality Workforce webinar Digital Signature Amazon Web Services Windows 10s Nanotechnology Windows Server 2008 Camera Trending Network Congestion Screen Mirroring NIST Hacker Television Bluetooth Wireless Technology Regulation Troubleshooting Printers Transportation Books Public Computer Loyalty Business Owner Benefits Biometric Security Worker Safety Hosted Solution SaaS Webinar Smart Technology Managed Service Provider Emergency Rootkit CrashOverride Employer Employee Relationship IT solutions Two Factor Authentication Content Filtering Assessment Shadow IT Computer Accessories Compliance Twitter Vendor Management