DatCom Blog

Tip of the Week: Using Templates in Evernote

Tip of the Week: Using Templates in Evernote

The note-taking application Evernote is a favorite of many users, as it allows them to keep extensive notes in an organized fashion. Its true utility goes beyond that of a digital scratch pad, however, as it has additional features that offer much more. For this week’s tip, we’ll review one particularly useful feature: templates.

What Are Templates?
Evernote’s templates are handy, pre-built structures for notes that provide users with a simpler means of organizing specific types of information. Instead of taking time struggling with your formatting each time you start a new note, you can apply one of the templates that Evernote offers on their website. Those with a subscription to Evernote Plus, Premium, or Business can even use formatting they’ve created in past notes to generate their own templates for repeated use.

Applying Templates in Evernote
Once you’ve acquired a few templates, either from the Evernote website’s collection or from a past note, applying one of your choosing is relatively simple.

  • In Evernote, start a new note.
  • In the body of the note, click Templates to view the ones you have saved.
  • From there, you can search for any templates you have, delete ones you no longer want or need, edit their names, and of course, apply them to notes.
  • If you want to edit a template, follow the same process, and once you’ve made the changes that you want, save it as a new template. Note: only those with Plus, Premium, or Business accounts are able to do this.
  • Plus, Premium, and Business users are also able to create their own templates this way.

So, what do you think? Is this a welcome change to Evernote? What other improvements would you like to see them make down the line? Let us know in the comments!

8 Data Backup Terms You Should Know
What Do You Know About the Microchips That Power Y...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, January 17 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Business Computing Network Security Hackers Microsoft Google User Tips Hosted Solutions Tech Term Internet Business Software Backup Malware Hardware Data Innovation Mobile Devices Data Backup Email Smartphones Android Workplace Tips VoIP Small Business Smartphone Data Recovery Communications Business Continuity Disaster Recovery Communication Ransomware Cloud Computing Managed IT Services Router IT Services Computer Law Enforcement Cybersecurity Cybercrime Windows 10 Browser Chrome Network Windows 10 Productivity Artificial Intelligence Alert Outsourced IT Password Business Management Windows Internet of Things Efficiency Miscellaneous IT Support Applications Server Office 365 Money Collaboration How To Computers Social Media Managed IT Services Wi-Fi Word Productivity Information Facebook BDR Passwords Spam Virtualization Mobile Device Telephone Systems Holiday Gadgets Saving Money Phishing Two-factor Authentication Data Security Avoiding Downtime Data Protection Quick Tips Work/Life Balance Connectivity Managed Service Office Vulnerability Social Engineering Microsoft Office Save Money BYOD Settings Flexibility Apps Operating System Mobile Device Management Keyboard Government App Mobility Voice over Internet Protocol Business Intelligence Google Drive Spam Blocking Fraud Access Control Servers Data Management Automation Update IT Plan Bring Your Own Device Paperless Office Legal Health CES HaaS Botnet Unsupported Software Telephony Data Breach Machine Learning Virtual Assistant Windows 7 Entertainment Private Cloud Content Management End of Support Google Docs Bandwidth Blockchain Office Tips Telephone System Public Cloud Data Storage Comparison Remote Computing Identity Theft Website Encryption OneNote Managed IT Infrastructure Scam Networking Software as a Service Human Resources Remote Monitoring Redundancy Sports Employer-Employee Relationship IT Management VPN Upgrade Staff HIPAA Computer Fan Search Sync Wireless Charging Information Technology Smart Office Microchip Cryptocurrency Tip of the week Content Addiction Knowledge Data loss Education Social Netflix Online Accountants Cleaning Remote Worker Downtime Business Mangement Supercomputer Document Management Millennials Budget The Internet of Things How to Cortana Search Engine webinar Hiring/Firing Safe Mode Windows 10s Windows Server 2008 Audiobook Amazon Authentication Advertising Cache Warranty Network Congestion Screen Mirroring Computing Infrastructure Multi-Factor Security HVAC Vendor Video Games HBO Telecommuting Internet Exlporer Music Computer Care Wiring Root Cause Analysis WiFi Gmail Conferencing Best Practice Workforce Digital Signature Apple FENG Recovery Travel Google Apps Bing Risk Management Instant Messaging Amazon Web Services Nanotechnology Firewall Wireless Internet Printer IT Consultant History Cast Trending Enterprise Content Management Display Outlook Remote Work Practices Wearable Technology Devices Unified Threat Management IT Support Recycling Emails Software Tips Net Neutrality PDF iPhone Techology Training MSP Skype Workers Marketing Patch Management YouTube Help Desk Politics Solid State Drive Flash Online Shopping Smart Tech Wire Mouse Leadership Virtual Reality Current Events Password Management Security Cameras Frequently Asked Questions Hosted Computing Internet exploMicrosoft USB Samsung Thought Leadership Mobile Computing Meetings eWaste Hacking FCC File Sharing Start Menu Wireless Company Culture Specifications Audit Evernote Users Hybrid Cloud Big Data Administrator Worker Commute Electronic Medical Records NIST Hacker Scalability Excel Credit Cards Inventory Value Camera Battery Criminal Shortcuts Physical Security Automobile Title II Experience Charger Augmented Reality Black Market Tools Password Manager IBM Managing Stress Regulation Books Public Computer Business Owner Smartwatch Loyalty Printers Benefits Worker Hosted Solution SaaS Smart Technology Save Time Rootkit Emergency Employer Employee Relationship Two Factor Authentication Shadow IT Safety Computer Accessories Content Filtering Assessment Webinar Wireless Technology Managed Service Provider Vendor Management Bluetooth Compliance Television Troubleshooting Twitter IT solutions CrashOverride Transportation