BOOK AN APPOINTMENT WITH AN IT SPECIALIST TODAY

Microsoft Office Lens Lets You Scan Virtually Anything

How Microsoft Office Lens Lets You Scan Virtually Anything

As businesses move online, more of their documents become virtual. Even with the mass migration to the digital world, however, there’s still plenty of work done on paper and other real-world canvases. From sticky notes to whiteboards, important information can be crafted and presented in a physical format only to be erased or thrown out moments later. To prevent the loss of data, one would normally have to manually input it into a digital format. That is, unless they make use of Microsoft Office Lens. Learn how Microsoft Office Lens lets you scan virtually anything.



How It Works

Think of Microsoft Office Lens as a portable scanner. It’s an app for your mobile device that lets you scan a variety of different documents. Once these documents are scanned, they are saved in a digital format as an image. While its basic functionality makes it sound no different from a camera function, its extra features take the app to the next level.

With this app, any document you scan will automatically be enhanced, cleaned up, and cropped as needed to make its information easily readable and accessible. Shadows will be eliminated and images will be rotated as needed to get rid of any potential warping of the information due to odd angles. The app can even go so far as to transform images that were drawn by hand into isolated and movable objects. Every object that the app makes from any scanned information can be edited completely as well.

The Four Operational Modes

Microsoft Office Lens features four distinct modes that apply to different scenarios. Each has its own unique function, but they all work to digitize documents and images. The four modes are:

  • Photo: The standard photo mode accomplishes what you might expect from any kind of camera app. You can take pictures of people or any kind of scenery, and the app will automatically remove glares and shadows as well as crop the image to be easy to see.
  • Business card: With this mode, the app will automatically extract important information from any business card and then populate your phone’s contact information with the relevant text. This works with a variety of languages as well, which is useful if you’re dealing with non-English-speaking businesses or clients.
  • Document: The document mode is best used to clear up any text that’s difficult to read. One primary example of this would be scanning a restaurant menu. Each of the options would then be digitized and able to be edited individually.
  • Whiteboard: One of the most popular settings is the whiteboard mode. When you’re in a brainstorming session with your team and you have a whiteboard full of ideas, this mode can put all that information into a convenient digital format. Any glares from the whiteboard are also automatically removed. Keep in mind that this works for blackboards as well.

Where Do the Scans End Up?

Once you scan any kind of image using Microsoft Office Lens, where it ends up is largely up to you, as there are several options available. As you might expect, you can save the images as JPEG files, which can then be exported to OneDrive or OneNote. You can also save an image as a PDF document, as part of a PowerPoint, or as a Word document. Once the file type is established, the images can then be treated as any file would be.

With Microsoft Office Lens, you can enjoy all the benefits of having a portable scanner in your pocket. Save your notes with confidence!

More Like This

AA21-209A: Top Routinely Exploited Vulnerabilities

Original release date: July 28, 2021 Summary This Joint Cybersecurity Advisory was coauthored by the U.S. Cybersecurity and Infrastructure Security Agency (CISA), the Australian Cyber Security Centre (ACSC), the United Kingdom’s National Cyber Security Centre (NCSC), and the U.S. Federal Bureau of Investigation (FBI).  This advisory provides details on the top 30 vulnerabilities—primarily Common Vulnerabilities …

AA21-209A: Top Routinely Exploited Vulnerabilities Read More »

Read More

How New Windows Server 2022 Features Improve Hybrid Integration and Security

How New Windows Server 2022 Features Improve Hybrid Integration and Security Microsoft recently announced the preview of the latest Windows Server. The new release comes with several key features, such as Azure automanage (hotpatching) and virtualization-based security (VBS). Windows Server 2022 allows users to leverage the cloud to maximize uptime and keep virtual machines (VMs) …

How New Windows Server 2022 Features Improve Hybrid Integration and Security Read More »

Read More

AA21-201A: Chinese Gas Pipeline Intrusion Campaign, 2011 to 2013

Original release date: July 20, 2021 Summary This Advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework, Version 9. See the ATT&CK for Enterprise for all referenced threat actor tactics and techniques. Note: CISA released technical information, including indicators of compromise (IOCs), provided in this advisory in 2012 to affected organizations and …

AA21-201A: Chinese Gas Pipeline Intrusion Campaign, 2011 to 2013 Read More »

Read More

Uncovering the Complexity and Potential Future Trends of Cyber Threats Faced by the U.S.

Uncovering the Complexity and Potential Future Trends of Cyber Threats Faced by the U.S. America’s critical infrastructure, the Federal government, and commercial institutions are undoubtedly under attack. The sophisticated cyber threats facing the country emanate from various parts of the world. A wide selection of state actors and hacker groups are working tirelessly to paralyze …

Uncovering the Complexity and Potential Future Trends of Cyber Threats Faced by the U.S. Read More »

Read More

AA21-200B: Chinese State-Sponsored Cyber Operations: Observed TTPs

Original release date: July 19, 2021 Summary This advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework, Version 9, and MITRE D3FEND™ framework, version 0.9.2-BETA-3. See the ATT&CK for Enterprise for all referenced threat actor tactics and techniques and the D3FEND framework for referenced defensive tactics and techniques. The National Security Agency, Cybersecurity …

AA21-200B: Chinese State-Sponsored Cyber Operations: Observed TTPs Read More »

Read More

AA21-200A: Tactics, Techniques, and Procedures of Indicted APT40 Actors Associated with China’s MSS Hainan State Security Department

Original release date: July 19, 2021 Summary This Joint Cybersecurity Advisory was written by the Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) to provide information on a Chinese Advanced Persistent Threat (APT) group known in open-source reporting as APT40. This advisory provides APT40’s tactics, techniques, and procedures (TTPs) and …

AA21-200A: Tactics, Techniques, and Procedures of Indicted APT40 Actors Associated with China’s MSS Hainan State Security Department Read More »

Read More