Snynet Solution Logo
MON - SUN: 10 AM - 6 PM
+60 11 5624 8319

Blog

Microsoft is changing one of the most-loved things about Office

Image Description

Microsoft is changing its default font – the one used off the bat in Microsoft 365 apps, including the Office apps many folks use every day like Word – and the company wants users to pick their favorite option from a choice of five.

As detailed in a Microsoft 365 blog post, the five options are: Tenorite, Bierstadt, Skeena, Seaford, and Grandview. While this isn’t a formal vote as such, the software giant encourages people to head on over to social media (linking the Microsoft 365 Twitter account) and make their voices heard.

So, if you have any opinion on the font options and feel a compulsion to chip in, provide your feedback…

As you’re likely aware, Calibri is the current default font of Microsoft’s choosing, and its reign has lasted since 2007 (before that, it was that old chestnut Times New Roman).

Regardless of which font is finally chosen as the successor to Calibri as the new default, all of the five new efforts will be available in Office apps, and indeed they are present now. Pop into Office 365 and you can see and use the fonts to check them out in their full glory.

Microsoft Office new fonts 2021

(Image credit: Microsoft)

Font of all knowledge

The blog post goes into a lot of detail about the design philosophy behind each of the five different fonts, which “span the various sans-serif styles – humanist, geometric, swiss-style, and industrial”.

In short, Tenorite is a very rounded, wide and crisp font, Bierstadt is clear-cut and ‘mechanical’, Skeena looks clean and has distinctive thicker and thinner strokes for the different bits of the letters, Seaford offers “gently organic and asymmetric forms”, with Grandview looking rather, well, grand, and built around being highly legible and generally standing out.

We’re finding ourselves gravitating towards Skeena’s clear and distinctive appearance, at least on initial impressions. So, there’s our vote, Microsoft, if you’re reading…

Date

28 Apr 2021

Sources


Share


Other Blog

  • This measurement tool could help settle the quantum supremacy debate once and for all

    Atos has developed the first set of universal metrics to assess quantum performance and supremacy.

    Read More
  • Apple patches nasty macOS exploit that bypasses security protections

    Apple has patched a nasty macOS bug that could have allowed malicious applications to circumvent the operating system's in-built security protections.

    As reported by Bleeping Computer, the flaw was first discovered by Gordon Long, Offensive Security Engineer at Box. According to Long, the vulnerability could allow a specially crafted, script-based application to be launched on a Mac device without Gatekeeper (an antivirus service that verifies the authenticity of all downloaded apps) ever triggering an alarm.

    In order for the app to work, it would need to use a script starting with a shebang (!#) character, but with the rest of the line empty. That way, Unix shell would run the script without specifying a shell command interpreter.

    Apple released a patch for the vulnerability in its September 2021 update, bringing the OS to version 11.6. Users of macOS 12 beta 6 are also protected, researchers confirmed.

    macOS security bug

    Objective-See security researcher Patrick Wardle has provided further insight into the exploit mechanism.

    "The syspolicyd daemon will perform various policy checks and ultimately prevent the execution of untrusted applications, such as those that are unsigned or unnotarized," he explained in a blog post.

    "But, what if the AppleSystemPolicy kext decides that the syspolicyd daemon does not need to be invoked? Well then, the process is allowed! And if this decision is made incorrectly, well then, you have a lovely File Quarantine, Gatekeeper, and notarization bypass."

    Wardle also said that the attackers can mask the malicious app as a harmless PDF file which, as well all know, can be delivered in numerous ways, be it through email, poisoned search results, fake updates, or malware downloaded from shady websites.

    After the victim runs the script, the attacker can also use it to download and run more potent malware, it was said.

    Via Bleeping Computer

    Read More
  • You might have trouble getting an Nvidia RTX 3080 or 3090 until 2021

    Report claims that stock of Nvidia's first Ampere GPUs will be 'extremely low' in the coming months

    Read More
  • The latest Intel 11th Gen Tiger Lake leak might disappoint you

    Another batch of leaked information has appeared for Intel's upcoming 11th gen mobile processors.

    Read More

Find Out More About Us

Want to hire best people for your project? Look no further you came to the right place!

Contact Us