Microsoft sneaks out a free desktop-based version of Word, Excel and PowerPoint - then backtracks and says it was just a "test" - Related to just, replace, fax, sms, will
Google will replace unsafe Gmail SMS codes with QR scan verification

Table of Contents Table of Contents Why is SMS unsafe? How QR codes can help?
Ever since Google enabled two-step verification for Gmail and other tied authentication protocols in its ecosystem, SMS codes have been a mainstay. But , SMS codes are notoriously unsafe, especially when the communication channel is not encrypted. That is finally about to change, as SMS codes will soon be replaced with QR codes for Gmail authentication.
When it comes to account security, SMS is not the most reliable choice for receiving sensitive verification codes, or one-time passwords (OTP) on phones. That is why, over the past few years, Google has steadily developed password alternatives such as on-device Google prompts, authenticator apps, hardware security keys, and the Passkey system to minimize the risks such as SMS phishing.
Now, Google is planning to phase out SMS-based verification completely for Gmail (and with it, Google account) authentication. “Just like we want to move past passwords with the use of things like passkeys. We want to move away from sending SMS messages for authentication,” Gmail spokesperson Ross Richendrfer, was quoted as saying by Forbes.
Getting codes via a text message is convenient, but it’s not just the pathway and elaborate phishing techniques that make SMS an unsafe route. SIM swapping, social engineering, and impersonation attacks are also a fairly well-known techniques, and when those plans are executed, the legitimate owner never receives their SMS verification codes.
That leaves them locked out of their own Gmail account, and all the core services tied to it, which also include third-party services that require a Google account log-in. Moreover, in scenarios where individuals don’t have access to cellular networks, getting log-in codes via SMS becomes another challenge.
Over the next few months, Google plans to replace the six-digit SMS codes and will show a QR code that clients simply have to scan with the camera app on their phone. The firm hasn’t shared many technical details about those plans, but it seems Google would likely create a protocol that would require a secure QR code handshake with a verified phone running the registered phone number.
It is worth nothing here that QR codes are not inherently fool-proof. QR scams are also fairly common. But a QR scanning system that requires a local decode key, or a secure public key between only two trusted parties, is a lot safer and quicker.
We not long ago covered one such innovation called self-authenticating dual-modulated QR (SDMQR) code that has already received a government grant and might soon replace bar codes in various business and industrial applications.
Developed by experts at the University of Rochester, an SDMQR code relies on a cryptographic signature system that can only be unlocked with a digital private key. These specialized QR codes won’t require any special scanning app, and can be implemented on mobile devices across the world at an OS-level.
54 hours of playback time via the charging case.
Bluetooth [website] (SBC and AAC) connectivity.
US pricing isn't confirmed but the previous model is $35.
For a budget-friendly device that will still be able to get you through your daily tasks, you should consider the HP [website] Laptop, especially now ......
The next big Netflix murder thriller that everyone's going to be talking about is Adolescence – a four-part show coming on March 13th, and the big sel......
Microsoft sneaks out a free desktop-based version of Word, Excel and PowerPoint - then backtracks and says it was just a "test"

Microsoft appears to be experimenting with ad-supported Office desktop apps.
They are limited in their functionality, and will require OneDrive syncing.
Word, Excel and PowerPoint could be going free.
Microsoft appears to have released free versions of its core Office apps – Word, Excel and PowerPoint – although they are supported by ads and limited in their functionality.
The change was first spotted by Beebom, which revealed the free desktop apps show a persistent banner ad, as well as a 15-second video ad which plays “every few hours.”.
However the enterprise has already scrambled to clarify the launch is only a test, with a Microsoft spokesperson saying there were "no plans" for a wider launch.
Microsoft quietly launches ad-supported Office apps.
“Microsoft has been conducting some limited testing,” a business spokesperson told PCWorld. “Currently, there are no plans to launch a free, ad-supported version of Microsoft Office desktop apps.”.
clients looking to get access to the free office software will also notice that local file editing is not supported and that they’ll be guided to save files on OneDrive.
To access the free apps, customers will need to skip the sign-in prompt and then agree to save their files in Microsoft’s cloud storage system OneDrive.
Being no-cost, these three free apps will be more limited in their functionality, lacking certain tools like Add-ins, Dictate, SmartArt, advanced formatting and Pivot Tables. The apps seem to plug a gap between the fully fledged desktop apps and the even more limited online web apps.
Beebom noted that for now at least, the free desktop apps are only available for Windows individuals, but they can still be used offline despite the requirement to save files in OneDrive.
Downloading the free apps is exactly the same as downloading the full apps, just that customers will skip the sign-in stage that would otherwise get them access to all elements.
In terms of availability, some customers have reported not being able to access the free versions of Word, Excel and PowerPoint, suggesting it could be in a testing phase, which adds up given that Microsoft has not formally introduced anything on the matter. Moreover, there’s no Mac equivalent (yet).
For context, Microsoft not long ago raised the prices of consumer 365 subscriptions, so this could be one of the ways it’s justifying the change. TechRadar Pro has asked Microsoft to confirm some details, but we did not get an immediate response.
You can usually spot scam emails through the sender information—not who’s listed in the From field, but what the message actually says. A legitimate e......
Nach dem Start in den USA bringt LG den transparenten OLED-Fernseher im April auch nach Deutschland. Hierzulande belaufen sich die Kosten auf [website] E......
If you’re hunting for a powerful gaming laptop at a great price, this Asus TUF may be just what you need, especially since it’s $300 off right now. Th......
How to fax from your phone: Secure, reliable, and effortless

You could be forgiven for thinking that fax machines are obsolete, relegated to the history books alongside floppy disks and dial-up modems. However, the reality is that the humble fax machine remains widely used in certain sectors.
Healthcare, legal, government, finance, real estate, and manufacturing are just a few industries that still rely on faxing, partly because faxes are legally binding in many cases and harder to hack than emails.
But what if you need to send a fax without a fax machine? Like so many modern dilemmas, there's an app for that – several, in fact. One standout is the the Fax app, which is consistently ranked among the best.
To prepare images for faxing, a good fax app will process them to enhance readability. When necessary, the app will convert images to black and white for compatibility.
The apps then connect to a VoIP gateway or a fax-over-IP (FoIP) system, which dials the recipient's fax number, establishes a connection, and transmits the fax as an audio signal – similar to how a modem sends data over telephone lines. Finally, the receiving fax machine decodes the transmitted bitmap image, converts it into a printable format, and prints it out.
Fax apps eliminate the limitations of traditional faxing, allowing consumers to send and receive faxes from anywhere – whether you're in the office, at home, or on the go.
Sending a fax from your device couldn't be easier. First, enter the fax number you want to send to, including the country code, then attach the image or document you want to fax.
The document can be scanned using your phone's camera, selected from your photo library, or, in the case of the Fax app, taken directly from your favorite cloud storage such as iCloud, Google Drive, or Dropbox.
Most file formats are supported, including PDFs, images, and HTML files. You can also add a cover page, combine multiple documents of different file types, and send them all together in a single fax.
Once you hit Send, you'll see a summary with the recipient's number, the number of pages, a preview option, and the estimated delivery time.
consumers receive real-time notifications at every stage of the faxing process, allowing them to track the fax and confirm when it has been successfully delivered.
Even if you're not running a business, there may be times when you need to receive a fax. One particularly common use case is sending and receiving medical records.
The Fax app is certified as a HIPAA-compliant service, as all faxes are encrypted. These apps are also widely used for sending and receiving tax documents, mortgage paperwork, and payroll records.
The Fax app provides people with a dedicated local fax number from any [website] state of their choosing, and it works anywhere in the world. Faxes sent to this number appear directly in your inbox, allowing you to view them while on the go. Just like with sending, you'll receive notifications for incoming faxes.
One of the best things about fax apps is how easy they are to use – arguably even easier than some fax machines. The Fax app, for example, functions New Fax, Sent, and Inbox sections, each with a simple, user-friendly interface. There's even a dark mode for added convenience.
If you frequently send faxes, you'll appreciate how the app saves and manages contacts in a messaging app-like format. This allows you to track multiple deliveries and store previously used numbers, so you don't have to re-enter them manually.
It's worth noting that most copy centers and office stores charge around $2 per page for faxing services. Since the Fax app's subscriptions include unlimited faxes, you'll break even after sending just three or four pages in a week.
Available for iPhone, iPad, Android, and web, the Fax app offers a modern, paper-free alternative to an old-school necessity. If your industry still relies on faxing, why be tied to outdated machines? A digital fax app puts the same functionality in your pocket – without the hassle, extra costs, or wasted time.
How many Steam Decks has Valve sold so far? The firm isn’t saying, except that it’s “multiple millions.” We know the Steam Deck is a smash hit, but......
Sometimes you just want to relax and hear your music or movie’s audio without being encumbered by wearing headphones. That’s especially the case if yo......
Fans of PhysX on 32-bit CUDA are not ready to let go of the capability for the RTX 5090 GPU. Gamers have become inventive by rigging the already expen......
Market Impact Analysis
Market Growth Trend
2018 | 2019 | 2020 | 2021 | 2022 | 2023 | 2024 |
---|---|---|---|---|---|---|
4.9% | 5.9% | 6.2% | 6.9% | 7.3% | 7.5% | 7.6% |
Quarterly Growth Rate
Q1 2024 | Q2 2024 | Q3 2024 | Q4 2024 |
---|---|---|---|
6.9% | 7.2% | 7.4% | 7.6% |
Market Segments and Growth Drivers
Segment | Market Share | Growth Rate |
---|---|---|
Semiconductors | 35% | 9.3% |
Consumer Electronics | 29% | 6.2% |
Enterprise Hardware | 22% | 5.8% |
Networking Equipment | 9% | 7.9% |
Other Hardware | 5% | 5.3% |
Technology Maturity Curve
Different technologies within the ecosystem are at varying stages of maturity:
Competitive Landscape Analysis
Company | Market Share |
---|---|
Apple | 18.7% |
Samsung | 16.4% |
Intel | 12.9% |
NVIDIA | 9.8% |
AMD | 7.3% |
Future Outlook and Predictions
The Google Will Replace landscape is evolving rapidly, driven by technological advancements, changing threat vectors, and shifting business requirements. Based on current trends and expert analyses, we can anticipate several significant developments across different time horizons:
Year-by-Year Technology Evolution
Based on current trajectory and expert analyses, we can project the following development timeline:
Technology Maturity Curve
Different technologies within the ecosystem are at varying stages of maturity, influencing adoption timelines and investment priorities:
Innovation Trigger
- Generative AI for specialized domains
- Blockchain for supply chain verification
Peak of Inflated Expectations
- Digital twins for business processes
- Quantum-resistant cryptography
Trough of Disillusionment
- Consumer AR/VR applications
- General-purpose blockchain
Slope of Enlightenment
- AI-driven analytics
- Edge computing
Plateau of Productivity
- Cloud infrastructure
- Mobile applications
Technology Evolution Timeline
- Technology adoption accelerating across industries
- digital transformation initiatives becoming mainstream
- Significant transformation of business processes through advanced technologies
- new digital business models emerging
- Fundamental shifts in how technology integrates with business and society
- emergence of new technology paradigms
Expert Perspectives
Leading experts in the hardware tech sector provide diverse perspectives on how the landscape will evolve over the coming years:
"Technology transformation will continue to accelerate, creating both challenges and opportunities."
— Industry Expert
"Organizations must balance innovation with practical implementation to achieve meaningful results."
— Technology Analyst
"The most successful adopters will focus on business outcomes rather than technology for its own sake."
— Research Director
Areas of Expert Consensus
- Acceleration of Innovation: The pace of technological evolution will continue to increase
- Practical Integration: Focus will shift from proof-of-concept to operational deployment
- Human-Technology Partnership: Most effective implementations will optimize human-machine collaboration
- Regulatory Influence: Regulatory frameworks will increasingly shape technology development
Short-Term Outlook (1-2 Years)
In the immediate future, organizations will focus on implementing and optimizing currently available technologies to address pressing hardware tech challenges:
- Technology adoption accelerating across industries
- digital transformation initiatives becoming mainstream
These developments will be characterized by incremental improvements to existing frameworks rather than revolutionary changes, with emphasis on practical deployment and measurable outcomes.
Mid-Term Outlook (3-5 Years)
As technologies mature and organizations adapt, more substantial transformations will emerge in how security is approached and implemented:
- Significant transformation of business processes through advanced technologies
- new digital business models emerging
This period will see significant changes in security architecture and operational models, with increasing automation and integration between previously siloed security functions. Organizations will shift from reactive to proactive security postures.
Long-Term Outlook (5+ Years)
Looking further ahead, more fundamental shifts will reshape how cybersecurity is conceptualized and implemented across digital ecosystems:
- Fundamental shifts in how technology integrates with business and society
- emergence of new technology paradigms
These long-term developments will likely require significant technical breakthroughs, new regulatory frameworks, and evolution in how organizations approach security as a fundamental business function rather than a technical discipline.
Key Risk Factors and Uncertainties
Several critical factors could significantly impact the trajectory of hardware tech evolution:
Organizations should monitor these factors closely and develop contingency strategies to mitigate potential negative impacts on technology implementation timelines.
Alternative Future Scenarios
The evolution of technology can follow different paths depending on various factors including regulatory developments, investment trends, technological breakthroughs, and market adoption. We analyze three potential scenarios:
Optimistic Scenario
Rapid adoption of advanced technologies with significant business impact
Key Drivers: Supportive regulatory environment, significant research breakthroughs, strong market incentives, and rapid user adoption.
Probability: 25-30%
Base Case Scenario
Measured implementation with incremental improvements
Key Drivers: Balanced regulatory approach, steady technological progress, and selective implementation based on clear ROI.
Probability: 50-60%
Conservative Scenario
Technical and organizational barriers limiting effective adoption
Key Drivers: Restrictive regulations, technical limitations, implementation challenges, and risk-averse organizational cultures.
Probability: 15-20%
Scenario Comparison Matrix
Factor | Optimistic | Base Case | Conservative |
---|---|---|---|
Implementation Timeline | Accelerated | Steady | Delayed |
Market Adoption | Widespread | Selective | Limited |
Technology Evolution | Rapid | Progressive | Incremental |
Regulatory Environment | Supportive | Balanced | Restrictive |
Business Impact | Transformative | Significant | Modest |
Transformational Impact
Technology becoming increasingly embedded in all aspects of business operations. This evolution will necessitate significant changes in organizational structures, talent development, and strategic planning processes.
The convergence of multiple technological trends—including artificial intelligence, quantum computing, and ubiquitous connectivity—will create both unprecedented security challenges and innovative defensive capabilities.
Implementation Challenges
Technical complexity and organizational readiness remain key challenges. Organizations will need to develop comprehensive change management strategies to successfully navigate these transitions.
Regulatory uncertainty, particularly around emerging technologies like AI in security applications, will require flexible security architectures that can adapt to evolving compliance requirements.
Key Innovations to Watch
Artificial intelligence, distributed systems, and automation technologies leading innovation. Organizations should monitor these developments closely to maintain competitive advantages and effective security postures.
Strategic investments in research partnerships, technology pilots, and talent development will position forward-thinking organizations to leverage these innovations early in their development cycle.
Technical Glossary
Key technical terms and definitions to help understand the technologies discussed in this article.
Understanding the following technical concepts is essential for grasping the full implications of the security threats and defensive measures discussed in this article. These definitions provide context for both technical and non-technical readers.