I happened upon a blog post by the Office team yesterday which surprised me, because it talked about a feature in PowerPoint that I’ve wanted ever since I first got my Surface 2.
Here’s a link to documentation on how to use this feature in PowerPoint.
It seems like the obvious feature a tablet should have.
Here’s a video of me using it to draw a few random shapes:
But not just in PowerPoint – this should be in Word, in OneNote, in Paint, and pretty much any app that accepts ink.
So here’s the blog post from Office noting that this feature will finally be available for OneNote in November.
On iPad, iPhone and Windows 10. Which I presume means it’ll only be on the Windows Store / Metro / Modern / Immersive version of OneNote.
That’s disappointing, because it should really be in every Office app. Hell, I’d update from Office 2013 tomorrow if this was a feature in Office 2016!
Please, Microsoft, don’t stop at the Windows Store version of OneNote.
Shape recognition, along with handwriting recognition (which is apparently also hard), should be a natural part of my use of the Surface Pen. It should work the same across multiple apps.
That’s only going to happen if it’s present in multiple apps, and is a documented API which developers – of desktop apps as well as Store apps – can call into.
Well, desktop apps can definitely get that.
I’ll admit that I haven’t had the time yet to build my own sample, but I’m hoping that this still works – there’s an API called “Ink Analysis”, which is exactly how you would achieve this in your app:
It allows you to analyse ink you’ve captured, and decide if it’s text or a drawing, and if it’s a drawing, what kind of drawing it might be.
[I’ve marked this with the tag “Alun’s Code” because I want to write a sample eventually that demonstrates this function.]
TL;DR – hardware problems, resuming NCSAM posts when / if I can get time.
Well, that went about as well as can be expected.
I start a month of daily posts, and the first one is all that I achieved.
Perhaps I’ve run out of readers, because nobody asked if I was unwell or had died.
No, I haven’t died, the simple truth is that a combination of hardware failures and beta testing got the better of me.
I’d signed up to the Fast Ring of Windows Insider testing, and had found that Edge and Internet Explorer both seemed to get tired of running Twitter and Facebook, and repeatedly got slower and slower to refresh, until eventually I had to quit and restart them.
Also the SP3 refused to recognise my Microsoft Band as plugged in [actually a hardware failure on the Band, but I’ll come to that another day].
Naturally, I assumed this was all because of the beta build I was using.
So, I did what any good beta tester would do. I filed feedback, and pressed the “Roll back” button.
It didn’t seem to take as long as I expected.
That’s your first sign that something is seriously wrong, and you should take a backup of whatever data is left.
So I did, which is nice, because the next thing that happened is that I tried to open a Windows Store app.
It opened a window and closed immediately.
So did every other Windows Store / Metro / Modern / Immersive app I tried.
Including Windows Store itself.
After a couple of days of dinking around with various ‘solutions’, I decided I’d reached beta death stage, and should FFR (FDISK, FORMAT and Reinstall).
First, make another backup, just because you can’t have too many copies of the data you rely on.
That should have been close to the end of the story, with me simply reinstalling all my apps and moving along.
In fact, I started that.
Then my keyboard stopped working. It didn’t even light up.
Plugging the keyboard (it’s a Surface Pro Type Cover) into another Surface (the Surface Pro Type Covers work on, but don’t properly cover, a Surface 2, which we have in my house) demonstrated that the keyboard was just fine on a different system, just not on my main system.
So, I kept a few things running by using my Bluetooth keyboard and mouse, and once I convinced myself it was worth the trip, I took my Surface Pro 3 out to the Microsoft Store in Bellevue for an appointment.
Jeannie was the tech assigned to help me with my keyboard issue. Helpful and friendly, she didn’t waste time with unnecessary questions or dinking around with stuff that could already be ruled out.
She unplugged the keyboard and tried it on another system. It worked. No need to replace the keyboard.
Can she do a factory reset?
Be my guest – I made another backup before I came out to the store.
So, another quick round of FFR, and the Surface still doesn’t recognise the keyboard.
Definitely a hardware problem, and that’s the advantage of going to the Microsoft Store.
Let me get you a replacement SP3, says Jeannie, and heads out back to the stock room.
Bad news, she says on coming back, We don’t have the exact model you have (an i7 Surface Pro 3 with 256 GB of storage).
Is it OK if we get you the next model up, with twice the storage?
Only if you can’t find any way to upgrade me for free to the shiny Surface Book you have on display up front.
Many thanks to Jeannie for negotiating that upgrade!
But now I have to reinstall all my apps, restore all my data, and get back to functioning before I can engage in fun things like blogging.
I’ll get back into the NCSAM posts, but they’ll be more overview than I was originally planning.
Every year, in October, we celebrate National Cyber Security Awareness Month.
Normally, I’m dismissive of anything with the word “Cyber” in it. This is no exception – the adjective “cyber” is a manufactured word, without root, without meaning, and with only a tenuous association to the world it endeavours to describe.
But that’s not the point.
And I do it from a very basic level.
This is not the place for me to assume you’ve all been reading and understanding security for years – this is where I appeal to readers with only a vague understanding that there’s a “security” thing out there that needs addressing.
This first week is all about Information Security – Cyber Security, as the government and military put it – as our shared responsibility.
I’m a security professional, in a security team, and my first responsibility is to remind the thousands of other employees that I can’t secure the company, our customers, our managers, and our continued joint success, without everyone pitching in just a little bit.
I’m also a customer, with private data of my own, and I have a responsibility to take reasonable measures to protect that data, and by extension, my identity and its association with me. But I also need others to take up their responsibility in protecting me.
This year, I’ve had my various identifying factors – name, address, phone number, Social Security Number (if you’re not from the US, that’s a government identity number that’s rather inappropriately used as proof of identity in too many parts of life) – misappropriated by others, and used in an attempt to buy a car, and to file taxes in my name. So, I’ve filed reports of identity theft with a number of agencies and organisations.
Just today, another breach report arrives, from a company I do business with, letting me know that more data has been lost – this time from one of the organisations charged with actually protecting my identity and protecting my credit.
While companies can – and should – do much more to protect customers (and putative customers), and their data, it’s also incumbent on the customers to protect themselves.
Every day, thousands of new credit and debit cards get issued to eager recipients, many of them teenagers and young adults.
Excited as they are, many of these youths share pictures of their new cards on Twitter or Facebook. Occasionally with both sides. There’s really not much your bank can do if you’re going to react in such a thoughtless way, with a casual disregard for the safety of your data.
Sure, you’re only liable for the first $50 of any use of your credit card, and perhaps of your debit card, but it’s actually much better to not have to trace down unwanted charges and dispute them in the first place.
So, I’m going to buy into the first message of National Cyber Security Awareness Month – and I’m going to suggest you do the same:
This is really the base part of all security – before doing a thing, stop a moment. Think about whether it’s a good thing to do, or has negative consequences you hadn’t considered. Connect with other people to find out what they think.
I’ll finish tonight with some examples where stopping a moment to think, and connecting with others to pool knowledge, will improve your safety and security online. More tomorrow.
The most common password is “12345678”, or “password”. This means that many people are using that simple a password. Many more people are using more secure passwords, but they still make mistakes that could be prevented with a little thought.
Passwords leak – either from their owners, or from the systems that use those passwords to recognise the owners.
When they do, those passwords – and data associated with them – can then be used to log on to other sites those same owners have visited. Either because their passwords are the same, or because they are easily predicted. If my password at Adobe is “This is my Adobe password”, well, that’s strong(ish), but it also gives a hint as to what my Amazon password is – and when you crack the Adobe password leak (that’s already available), you might be able to log on to my Amazon account.
Creating unique passwords – and yes, writing them down (or better still, storing them in a password manager), and keeping them safe – allows you to ensure that leaks of your passwords don’t spread to your other accounts.
There are exciting events which happen to us every day, and which we want to share with others.
That’s great, and it’s what Twitter and Facebook are there FOR. All kinds of social media available for you to share information with your friends.
Unfortunately, it’s also where a whole lot of bad people hang out – and some of those bad people are, unfortunately, your friends and family.
Be careful what you share, and if you’re sharing about others, get their permission too.
If you’re sharing about children, contemplate that there are predators out there looking for the information you may be giving out. There’s one living just up the road, I can assure you. They’re almost certainly safely withdrawn, and you’re protected from them by natural barriers and instincts. But you have none of those instincts on Facebook unless you stop, think and connect.
So don’t post addresses, locations, your child’s phone number, and really limit things like names of children, friends, pets, teachers, etc – imagine that someone will use that as ‘proof’ to your child of their safety. “It’s OK, I was sent by Aunt Josie, who’s waiting for you to come and see Dobbie the cat”
Bob’s going off on vacation for a month.
Just in case, while he’s gone, he’s left you his password, so that you can log on and access various files.
Two months later, and the office gets raided by the police. They’ve traced a child porn network to your company. To Bob.
Well, actually, to Bob and to you, because the system can’t tell the difference between Bob and you.
Don’t share accounts. Make Bob learn (with the IT department’s help) how to share portions of his networked files appropriately. It’s really not all that hard.
I develop software. The first thing I write is always a basic proof of concept.
The second thing I write – well, who’s got time for a second thing?
Make notes in comments every time you skip a security decision, and make those notes in such a way that you can revisit them and address them – or at least, count them – prior to release, so that you know how badly you’re in the mess.