Posted on Leave a comment

Watch the Xbox E3 Briefing live this Sunday at 1 p.m. PT

With E3 less than two weeks away, we’ve got some new details on what Xbox has got going on for the biggest gaming event of the year!

We’ll be kicking things off with our annual Xbox E3 2018 Briefing, which you can watch live beginning on Sunday, June 10 at 1:00 p.m. PDT. During the briefing, you’ll have a chance to check out everything from in-depth looks at previously-announced games to trailers for our unannounced titles coming in 2018 and beyond. You can watch the Xbox E3 2018 Briefing live beginning at 1 p.m. PDT on June 10 on the official Xbox Channel on Mixer, or on the Mixer app for Xbox One and mobile. Viewers logged into Mixer will be eligible for a special MixPot full of digital content – stay tuned for more details.

As was the case last year, the Xbox E3 2018 Briefing on Mixer will be offered in six languages: English, German, French, Italian, Spanish (LATAM), Portuguese (LATAM), and includes support for English Closed Captions. To select an alternate language, click the “cog” button within Mixer to view the available list. We’re excited for fans all around the world to join in on the Xbox E3 2018 Briefing festivities.

You’ll also be able to catch a live stream of the briefing on the Xbox Twitch ChannelYouTube, Twitter, Facebook Live or on the big screen at your local Microsoft Store.

We’re also very happy to announce that we’re partnering with cross-platform entertainment media brands Fuse and FM to bring the Xbox E3 2018 Briefing to cable and satellite subscribers in the U.S. and Canada at 1:00 p.m. PDT (or 4:00 p.m. EDT for you east coast dwellers!). The Briefing will also livestream on Fuse.tv and an encore presentation will air on FM at 9:00 p.m. PDT (12:00 a.m. EDT).

Be sure to hit up Fuse.tv to find out where you can watch Fuse.

This year will mark the first year that Inside Xbox will be airing during E3. Inside Xbox will air Monday, June 11 at 3 p.m. PDT and will feature a livestream full of exclusive announcements, game demos, interviews, giveaways and more.

Mixer at E3 2018

Mixer is the best place to catch all of the action from this year’s E3. From Saturday, June 9 to Friday, June 15, tune in at www.mixer.com for the latest news, gameplay, exclusive interviews and more. For fans attending E3 in person this year, we’ll have a dedicated Mixer booth located in the South Hall of the LACC, where you can get hands-on with new titles, watch the live broadcast each day, and catch your favorite Mixer Partners streaming live from the show floor. We’re also happy to announce a special showing of HypeZone Live featuring a new battle royale experience. Players can compete to see if they can make it into the HypeZone and walk away with some sweet swag.

Enjoy the Xbox Experience at the Microsoft Theater

This year, we’re excited to call the Microsoft Theater our Xbox home base for the week of E3.

On Tuesday, June 12 and Wednesday, June 13, E3 Expo Badge holders will have the opportunity to experience our brand new Xbox Experience at the Microsoft Theater during expo hours. Featuring a diverse lineup of blockbuster games and experiences, including many of the titles shown in our briefing, attendees will have an opportunity to experience hands-on why Xbox is the best place to play.

Whether you love first-person shooters, action-adventure games or the latest independent darling, the Xbox Experience is the place to be this E3.

Visit the Xbox Official Gear Shop

For the first time, come and visit the Xbox Official Gear Shop by Microsoft Stores in the Xbox Experience at E3. Fly your gaming colors and show off your fandom for Xbox and award-winning franchises like Halo, Forza Motorsport, and Gears of War as well as limited edition designer collaborations. We will have more information on this exciting new initiative over the coming weeks.

Celebrate E3 at Microsoft Store

Check out your local Microsoft Store on timing and details to watch the Xbox E3 2018 briefing taking place on Sunday, June 10, and participate in Forza Motorsport 7 tournaments for a chance to win Xbox One themed prizes.

If you are in Los Angeles, we’ve also got a special event taking place at the Microsoft Store at Westfield Century City where we are celebrating E3 with USC Alum and now Tennessee Titans cornerback Adoree’ Jackson on Sunday, June 10. Visit Microsoft Store for more information and timing.

Finally, for fans planning to attend in person, we recommend you take a look at E3’s updated security protocols to ensure you have an optimal experience.

Be sure to head on over to the Xbox E3 Online Experience for more information and details on what we’ve got going on for the week.

Here’s to a great E3!

Posted on Leave a comment

Minecraft’s new Coral Crafters skin pack arrives: Proceeds help The Nature Conservancy help the oceans

We’re supporting the incredible work of The Nature Conservancy to protect and restore these coral reefs (which you can learn more about here). Both from sales of this new skin pack and with the promise to donate more money for every coral block YOU place in the game.

It’s true! As soon as players have collectively placed ten million coral blocks underwater in Minecraft, we’ll donate one hundred thousand dollars to The Nature Conservancy and their efforts. We’ve got no doubt you’ll manage it in no time!

So what are you waiting for? Build something amazing out of coral, help us help the oceans and enjoy the new skin pack!

Learn more about the Nature Conservancy by clicking this lovely line of green text.

IMPORTANT LEGAL STUFF:

Net proceeds from sales of the Coral Crafter Skin Pack excluding platform and marketplace operating fees will be donated to The Nature Conservancy, 4245 North Fairfax Drive, Suite 100, Arlington, VA, 22203-1606, USA, www.nature.org. No portion of purchase or gift is tax deductible.

Minecraft will contribute $100,000.00 to The Nature Conservancy to protect and restore coral reefs around the world once players have placed 10 million coral blocks underwater, beginning on June 8th. (Coral blocks are only counted in Minecraft versions without “Edition” in the title.) The mission of The Nature Conservancy is to conserve the land and waters on which all life depends. More information about the Conservancy is available at www.nature.org.

We’ll update on Twitter when ten million coral blocks have been placed.

Posted on Leave a comment

Block party: Communities use Minecraft to build new public spaces

As a native of Stockholm, Melin heard about the trial projects with Minecraft back in his hometown. During his next visit to Sweden, he made an appointment at Mojang to chat about some ideas. By the summer of 2012, Bui and Winters were on a flight to Nairobi to meet with Melin and U.N.-Habitat’s new hire, Westerberg, who would oversee the development of a Minecraft-based public space program with global ambitions soon to be known as Block by Block.

“One of most exciting parts is that Minecraft can bring millions of people into a debate about public space and make it more of a mainstream conversation,” said Melin. “We want people to ask their parents and politicians, ‘Why isn’t public space working in my city?’”

Westerberg, whose background is in digital communications for non-governmental organizations, took on more and more responsibilities around Block by Block, until it became his whole job. Also Swedish by birth, he lived in Zimbabwe for a few years during his youth and first recognized the depth of inequality when other kids on his soccer team had to play with borrowed shoes, or none at all. He said, “We knew that we couldn’t just host some workshops and pat ourselves on the back. From the start, we focused on the program’s methodology so that it would be able to build its own momentum and eventually take on a life of its own.”

The goals were relatively straightforward. Working with Minecraft collectives, U.N.-Habitat builds Minecraft models of public spaces that are slated for redevelopment. The models are then used in workshops in which participants are trained in the use of Minecraft and then asked to re-design the public space models in groups. On the final day of the workshop, the groups come together with other stakeholders to prioritize the top ideas. The community-developed Minecraft models are then used to inspire the final designs of the public spaces and, ultimately, the construction work.

Cities can be drivers of innovation and great contributors to economic growth. But done badly, cities cause social disparity and huge environmental problems. That’s true in the slums of Nairobi or Kathmandu but also in the sprawling cities of North America.

The first Block by Block projects were in Nairobi. After a trial project at Silanga sports field, they moved on to Dandora, a once well-planned area that had degenerated to near slum status and is known for its high crime rate and as the location of the largest garbage dump in East Africa.

Block by Block teamed up with a variety of local organizations to revitalize Dandora’s public spaces, initially focusing on creating a “model street” that would influence other improvements in the neighborhood. Proposals built in Minecraft in the Block by Block workshop led to upgrading a main street, clearing ditches, planting trees and now building gateways along the corridor.

“Designing in Minecraft allowed people in Dandora to explore the merits of various design alternatives and visualize their ideas,” said Westerberg. “The process also encouraged people to develop a broader understanding of the urban environment, speak in public with greater confidence and improve community relations.” For many participants, it was the first time they had publicly expressed opinions about local issues.

Melin added, “Minecraft is a tool that is increasing community engagement in public space projects by enabling participants to express themselves in a visual way, develop skills, network with other people from the community and provide new ways to influence the policy agenda.”

U.N.-Habitat and Mojang set out the grand goal of 300 Block by Block projects in the coming years. However, they found that they didn’t have the human resources or capital to hit that target within their desired timeline.

Then, Mojang was acquired by Microsoft in 2014. After careful consideration and planning, Microsoft and Mojang re-launched the Block by Block Foundation as an official 501(c)(3) nonprofit in 2016.

“As a nonprofit, Block by Block can now accept donations, and we can focus on the growth of that charity and making sure it gets everything it needs to succeed. Like all organizations, it must continue to evolve,” said David Boker, a senior director on the Minecraft team who celebrated 20 years with Microsoft while in Hanoi.

U.N.-Habitat signed a long-term agreement with the foundation in August 2016, ensuring sustainable funding for Block by Block for years to come. The board now meets three times a year to approve public space projects, which will be funded by the foundation.

In 2016, Block by Block held community participation workshops using Minecraft in Indonesia, Madagascar, India, Kosovo, Mexico, Nepal, the U.S., Ecuador and Lebanon. There are currently more than 650 applications for Block by Block projects around the world.

The Block by Block project at the public market in Mitrovica, Kosovo, was designated as the site for the first board meeting in the field. The bridge over the river in Mitrovica in Northern Kosovo is a symbol of traditional ethnic division between the Serbian and Albanian communities. The project aimed to revitalize the city market neighborhoods around the bridge, one of few areas in the city where the two communities meet.

Using Minecraft to devise urban design improvements for the city market and both river banks helped local stakeholders and citizens to think of Mitrovica as one city.

“It not only democratized the development process but really gave people ownership over the space,” said Winters, who was on-site for the project. “There are a lot of new residents in the area, and Block by Block gave them a path to come together in a positive way. They even created one of the first skate parks in Kosovo.”

Hanoi was the kickoff project for 2017 and a chance for the board to re-convene and plan for the upcoming year while getting to witness the first Block by Block in Vietnam. The project goal was to design secure and friendly public spaces in the burgeoning, working-class neighborhood of Kim Chung, especially as many of the local girls must travel many miles to reach the school and need to have a safe zone around the buildings.

Prior to the workshop, the schoolgirl participants did “safety walks” to score the surrounding areas in various categories including “can see and be seen,” “can hear and be heard” and “able to get away.”

Problem areas that emerged included: inadequate lighting, dark corners where criminals can hide and piles of garbage in the streets. They judged the tunnel under the five-lane highway to be particularly challenging.

“I hate the tunnel and never like to walk through it by myself, but I have to do it at least twice per day when I go to school,” said 15-year-old Nguyen Ngoc Anh. “We have lots of ideas how to make it nicer so that people will learn to treat it better and then it can be a safer place for everyone.”

As for the workshop itself, the 45 girls divided into seven teams and Christelle Lahoud, a Lebanese architect and urban planner who works for U.N.-Habitat, ran the day’s events.

“I have no specific background in Minecraft but was still able to teach everyone how to use it in an hour or so,” said Lahoud. “Then they were able to start creating their designs.”

They sat four to six at a desktop computer, as they built out their designs in Minecraft atop a model of the neighborhood around their school. Phan Thi Ngoc Huyen, also 15, said, “It was really fun and exciting to have an idea and then be able to make it to show to adults.”

The true significance of the day became clear as the teams of girls presented not only their findings but interactive 3D models built in Minecraft. By improving the security, the girls will have a chance at more inclusion and participation in their education. But there was another level to the experience. By presenting these findings to local government officials, U.N.-Habitat officials, architects and others, the girls are building their confidence in using technology, expressing their ideas and learning that their views matter.

Prior to Block by Block, Westerberg had long searched for a way to use technology to engage youth in the development process. “We found a language that kids enjoy and understand which is important because they are the majority in many places and will grow up to be the adults in the city,” he said. “Minecraft is not just a game. It is a co-creation tool to build better cities and better communities with more equal societies.”

Deirdre Quarnstrom, director of Minecraft Education, who is also on the board, said, “In the workshops we saw valuable ideas for better lighting and safer walkways. The students were able to communicate specific safety improvements to city planners through their Minecraft designs. I see the same increase in student voice and shifting power dynamic when I visit classrooms using Minecraft as part of their curriculum as well.”

Quarnstrom agreed that the workshops and other game-based learning offer numerous indirect impacts too. “Participation also builds confidence in youth and in girls who are often left out of planning and design conversations. They see that they have the potential to make a difference. And this confidence encourages girls to use technology and express their ideas.”

“Minecraft inspires people to be creative,” said Winters. “For some, they have never been able to express that side of themselves before. You can take a complex idea, and easily create a virtual world.” Phan Thi Ngoc Huyen added, “Games are usually fantasy. It was nice to use a game for the real world.”

The ideas that the girls presented to the board, other NGOs and Vietnamese politicians ranged from play areas to a women-only coffee shop to a shelter with a camera that does facial identification at the door. There were plans for unbreakable streetlights in the tunnel, a tree house shelter (why not?) and a free phone to call for help. Other general improvements included street benches, trash cans, improved signage, lighted walkways, security fences along a stream, murals in the tunnel, flower beds and cutting back overgrown hedges. They even talked about converting abandoned structures into public restrooms.

Dr. Nguyen Quay of U.N.-Habitat Vietnam said, “It was great to see how this engages young minds in creative thinking.” But the girls still expect to see their plans come to fruition. They even came up with a group slogan: “Just take action.”

Sometimes Block by Block funds the construction of the projects. Sometimes they fund the workshop and the municipality funds the construction. But the ultimate goal for every project is for the methodology to go viral. They want it to get to the point where Block by Block need not be involved at all.

“That’s when we’ll start to see real scale and growth,” said Westerberg. “People are recognizing the value of participation and value of Minecraft in this process. It’s already gaining momentum. We can accomplish more by educating people than by trying to fund it all ourselves.”

He said, “Now, in Nairobi, the local government is going to upgrade 60 public spaces. At first they didn’t even think about public spaces. It took us two years to get the line in the budget for public spaces, and it was still at zero. Now, after all of the Block by Block workshops, they see the impact and are going to fund all of these new developments themselves.”

The inspiration goes both ways, Bui mused. “We grew into this. Our community brought us into all of these experiences. We continue to listen to the community and are busy figuring out other cool things we can do with Minecraft.”

When asked what is the most common thing that they see across all of the Block by Block projects, Winters responded immediately. “People are shocked and always say, ‘Who knew kids would have such good ideas?’”

Bui smiled. “And we always answer, ‘We did.’”

Posted on Leave a comment

Not a cliché: when being ‘out and proud’ is a call to action

One of Microsoft’s directors of government affairs kept his authentic self quiet and closed off for too long. Now, he’s working to make that path easier and safer for fellow LGBTQ+ people.

By Candace Whitney-Morris

John Galligan spent half of his adult life as a closeted gay man, a time he describes as not truly living. In fact, he said he didn’t start to live his life until his early thirties.

“I was trying to be something I wasn’t,” he said. “And that slow release of power and energy, it’s exhausting and was always affecting my work. Being very good at acting like something I wasn’t . . . it’s the art that I’d perfected.”

That all changed when Galligan met his partner, now husband, 20 years ago, who helped him accept who he was, to live as a gay man proudly, and to even confront some of his own prejudices about what he assumed people could or couldn’t handle. “I thought I was protecting people by not confronting them with who I was,” he said. “I was wrong.”

The past two decades with his husband have been a journey not only of love and fun, he said, but also in helping Galligan be more accepting of his own sexuality, who he is, and who he could become.

Galligan is now out and active in his community. He’s also a senior director for Microsoft’s global government affairs team, working to protect and advance the rights of all people, including those who are LGBTQ+ and who don’t feel safe or welcome.

Across the globe, the cultural views and tolerance around being gay still vary widely. Galligan’s team focuses in part on making sure LGBTQ+ employees are safe and supported within the walls of their workplace wherever they live.

“Microsoft can be a safe place for people to bring their authentic self, even if the outside world is hostile to them, even if their friends and family might not accept them,” he said. “They can come to a place that will accept them not just for who they are but also for who they can be.”

“I thought I was protecting people by not confronting them with who I was. I was wrong.”

Because Galligan knows what it’s like to not live his truth at work, he’s determined to help Microsoft support the rights of its employees and live up to its values of empowering every person on the planet—even when the outside culture is slow to adapt and when equality for LGBTQ+ people is lacking.

Before moving to Seattle, Galligan and his partner lived in Singapore, where there are still laws criminalizing homosexuality. And while these laws are rarely enforced, he did feel the discomfort of living in ambiguity. “The middle path is in some ways the most uncomfortable because it doesn’t challenge you to actually go out and confront systemic intolerance.”

That’s why it’s important to him that he doesn’t get too comfortable—that he remembers what some LGBTQ+ people and employees face and does what he can to help. Working in a company where the culture is attuned to human rights near and far reminds him of what inclusion feels like and what to strive for in his advocacy.

“Microsoft can be a safe place for people to bring their authentic self. They can come to a place that will accept them not just for who they are but also for who they can be.”

“I’ve never felt, in any way, excluded [at Microsoft]. I think that’s a tribute to the company, but I also think that’s a tribute to the tens of thousands of people who continue to move the company increasingly toward a diverse and inclusive environment.”

Galligan reminds himself all the time that there’s still so much to fight against. But when feelings of powerlessness threaten to steal momentum, he focuses on the power of individual contribution.

“I think the most weak and ineffectual thing we can do is to not think about what can be done on an individual level. I may not be able to change laws, but I can be proud of who I am and show others to be proud of who they are.”

He hopes that being a visible, comfortable, and confident gay man will inspire others to also be themselves and to take up the fight, because “being out and proud is not a cliché,” he said. “It’s a call to action.”

“Everyone can make a contribution, even if that contribution is to be yourself and use whatever influence you have to make the world and workplace more inclusive, more diverse, and more welcoming for everyone.”

Meet more Microsoft employees who are changing hearts and minds and advancing human rights.
https://news.microsoft.com/life/topic/pride/

See how Microsoft is celebrating Pride 2018 and how you an be an ally.
https://www.microsoft.com/pride

Learn how Microsoft and its LGBTQ+ employees push for change across borders.
https://news.microsoft.com/life/pride/

Posted on Leave a comment

Simplifying IT with the latest updates from Windows Autopilot

With Windows Autopilot, our goal is to simplify deployment of new Windows 10 devices by eliminating the cost and complexity associated with creating, maintaining, and loading custom images. Windows Autopilot will revolutionize how new devices get deployed in your organization—now you can deliver new off-the-shelf Windows 10 devices directly to your users. With a few simple clicks, the device transforms itself into a fully business-ready state, dramatically reducing the time it takes for your users to get up and running with new devices.

Not only does Windows Autopilot significantly reduce the cost of deploying Windows 10 devices but also delivers an experience that’s magical for users and zero-touch for IT.

I’m excited to share that we are extending that zero-touch experience even further with several new capabilities available in preview with the Windows Insider Program today.

  • Self-Deploying mode—Currently, the Windows Autopilot experience requires the user to select basic settings like Region, Language, and Keyboard, and also enter their credentials, in the Windows 10 out-of-the-box experience. With a new Windows Autopilot capability called “Self-Deploying mode,” we’re extending the zero-touch experience from IT to the user deploying the device. Power on* is all it takes to deploy a new Windows 10 device into a fully business-ready state—managed, secured, and ready for usage—no need for any user interaction. You can configure the device to self-deploy into a locked down kiosk, a digital signage, or a shared productivity device—all it takes is power on.*
  • Windows Autopilot reset—This feature extends the zero-touch experience from deployment of new Windows 10 devices to reset scenarios where a device is being repurposed for a new user. We’re making it possible to completely reset and redeploy an Intune-managed Windows 10 device into a fully business-ready state without having to physically access the device. All you need to do is click a button in Intune!

Windows Insiders can test these features with the latest Windows 10 build and Microsoft Intune now.

I cannot wait to see the feedback from the Insider community! To see how this works, and several exciting updates to Windows Autopilot, check out this quick video:

 Source video.

You can head over to the Windows IT Pro blog right now for further details.

One final note: A big part of what we build is based on feedback from our customers. With this in mind, we also added several new Windows Autopilot capabilities into the Windows 10 April 2018 Update (version 1803) based on feedback, and these capabilities are also available today:

  • Enrollment Status page—We received tons of feedback from Windows Autopilot customers who want the ability to hold the device in the out-of-box setup experience until the configured policies and apps have been provisioned to the device. This enables IT admins to be assured the device is configured into a fully business-ready state prior to users getting to the desktop. This is made possible with a capability called “Enrollment Status” and is available today with Windows 10 April 2018 Update (version 1803) and Microsoft Intune.
  • Device vendor supply chain integration—We enabled Windows 10 OEMs and hardware vendors to integrate Windows Autopilot into their supply chain and fulfillment systems so that devices are registered in Windows Autopilot to your organization the moment your purchase is fulfilled. This makes the registration of Windows Autopilot devices completely hands-free and zero-touch for you as well as your device vendor/OEM. Contact your device reseller to find out if they are supporting Windows Autopilot.
  • Automatic Windows Autopilot profile assignment—We integrated Azure Active Directory (AD) dynamic groups with Windows Autopilot and Microsoft Intune to deliver a zero-touch experience for Windows Autopilot profile assignments on all Windows Autopilot devices.

I said this in my prior post and I’ll say it again—Windows Autopilot is an absolute game changer. I urge you to spend some time learning more about it.

To learn more about how to use Windows Autopilot and Co-Management together, check out this quick video.

*Requires network connection and TPM2.0.

Posted on Leave a comment

Find the perfect gift for dads and grads from Microsoft Store and our partners

June 7, 2018 9:00 am

Today, we’re highlighting gift ideas to help you find the perfect gift for the dad or grad in your life. From Xbox One S to Surface devices, here are 16 awesome deals for the dad or grad in your life.

A dad cooking dinner with his kids

With Father’s Day just around the corner and graduation season in full force, you won’t want to miss these steep discounts coming to Microsoft Store and other partner retailers this month! If your Dad or recent grad is a gadget geek, mark your calendar so you don’t miss out.  

Surface Book 2

1. Save up to $200 on select Surface Book 2 today through 6/16 in the US/PR.

Boy wearing headphones and holding an Xbox controller gaming on a PC.

2. Save up to $400 on select gaming PCs today through 6/24 in the US/CA.

Surface Pro sitting on a white desk.

3. Save $200 on select Surface Pro i5 beginning 6/10-6/30 in the US/PR.

Xbox One S

4. Save on select Xbox One S 1TB ($249) today through 6/23 in the US/PR.

Father and daughter sitting at table working on a PC.

5. Save up to $500 on select Windows 10 PCs today through 6/24 in the US/CA.

Samsung HMD Odyssey Windows Mixed Reality headset

6. Save $100 on the Samsung HMD Odyssey Windows Mixed Reality headset today through 6/16 in the US/PR/CA.

Belkin accessory

7. Save up to 50% on select Belkin accessories and more today through 6/24 in the US/CA.

JLab Audio Epic Sport Wireless Earbuds

8. Save $20 on the JLab Audio Epic Sport Wireless Earbuds in the US/PR, and $25 in CA today through 6/17.

Acer - Nitro 5 15.6" Laptop

9. Save $50 on the Acer – Nitro 5 15.6″ Laptop – Intel Core i5 at Best Buy today through 6/10 in the US.

ASUS ZenBook Pro UX550VE

10. Save up to $150 on the ASUS ZenBook Pro UX550VE today through 6/17 in the US at participating retailers including Amazon.

ASUS VivoBook K570

11. Save up to $50 on the ASUS VivoBook K570 today through 6/17 in the US at participating retailers including Amazon.

HP Spectre Laptop 13t

12. For a limited time in the US save up to $250 on the HP Spectre Laptop 13t and up to 25% on the HP ENVY Laptop X360 on HP.com from 6/17 to 6/23. You can check out even more great deals for dad from HP here.

Huawei MateBook X Pro

13. Get a $300 Microsoft Store gift card when you purchase the Huawei MateBook X Pro at Microsoft Store today through 6/10 in the US, China, and Western Europe.

Samsung Notebook 9 (2018) 15’’

14. Save $100 on the Samsung Notebook 9 (2018) 15’’ on Samsung.com from 6/10-6/16 and $100 off the Notebook 9 (2019) 13’’ model from 6/17-6/23 exclusively on Samsung.com.

Lenovo Thinkpad L380 Yoga from

15. Save up to 28% in the US off the Lenovo Thinkpad L380 Yoga from 6/14-6/20 on Lenovo.com.

Lenovo Thinkpad X1 Yoga 3rd Gen

16. Save 25% off all customized or Quickship Lenovo Thinkpad X1 Yoga 3rd Gen from 6/14-6/20 in the US at Lenovo.com.

Interested in even more great deals? Head over to Microsoft Store, in personoronline.

Find the perfect gift for dads and grads from Microsoft Store and our partners

Tweet This

Updated June 7, 2018 10:44 am

Posted on Leave a comment

How Microsoft uses machine learning to fight social engineering attacks

Machine learning is a key driver in the constant evolution of security technologies at Microsoft. Machine learning allows Microsoft 365 to scale next-gen protection capabilities and enhance cloud-based, real-time blocking of new and unknown threats. Just in the last few months, machine learning has helped us to protect hundreds of thousands of customers against ransomware, banking Trojan, and coin miner malware outbreaks.

But how does machine learning stack up against social engineering attacks?

Social engineering gives cybercriminals a way to get into systems and slip through defenses. Security investments, including the integration of advanced threat protection services in Windows, Office 365, and Enterprise Mobility + Security into Microsoft 365, have significantly raised the cost of attacks. The hardening of Windows 10 and Windows 10 in S mode, the advancement of browser security in Microsoft Edge, and the integrated stack of endpoint protection platform (EPP) and endpoint detection and response (EDR) capabilities in Windows Defender Advanced Threat Protection (Windows Defender ATP) further raise the bar in security. Attackers intent on overcoming these defenses to compromise devices are increasingly reliant on social engineering, banking on the susceptibility of users to open the gate to their devices.

Modern social engineering attacks use non-portable executable (PE) files like malicious scripts and macro-laced documents, typically in combination with social engineering lures. Every month, Windows Defender AV detects non-PE threats on over 10 million machines. These threats may be delivered as email attachments, through drive-by web downloads, removable drives, browser exploits, etc. The most common non-PE threat file types are JavaScript and VBScript.

Figure 1. Ten most prevalent non-PE threat file types encountered by Windows Defender AV

Non-PE threats are typically used as intermediary downloaders designed to deliver more dangerous executable malware payloads. Due to their flexibility, non-PE files are also used in various stages of the attack chain, including lateral movement and establishing fileless persistence. Machine learning allows us to scale protection against these threats in real-time, often protecting the first victim (patient zero).

Catching social engineering campaigns big and small

In mid-May, a small-scale, targeted spam campaign started distributing spear phishing emails that spoofed a landscaping business in Calgary, Canada. The attack was observed targeting less than 100 machines, mostly located in Canada. The spear phishing emails asked target victims to review an attached PDF document.

When opened, the PDF document presents itself as a “secure document” that requires action – a very common social engineering technique used in enterprise phishing attacks. To view the supposed “secure document”, the target victim is instructed to click a link within the PDF, which opens a malicious website with a sign-in screen that asks for enterprise credentials.

Phished credentials can then be used for further attacks, including CEO fraud, additional spam campaigns, or remote access to the network for data theft or ransomware. Our machine learning blocked the PDF file as malware (Trojan:Script/Cloxer.A!cl) from the get-go, helping prevent the attack from succeeding. 

Figure 2. Phishing email campaign with PDF attachment

Beyond targeted credential phishing attacks, we commonly see large-scale malware campaigns that use emails with archive attachments containing malicious VBScript or JavaScript files. These emails typically masquerade as an outstanding invoice, package delivery, or parking ticket, and instruct targets of the attack to refer to the attachment for more details. If the target opens the archive and runs the script, the malware typically downloads and runs further threats like ransomware or coin miners.

Figure 3. Typical social engineering email campaign with an archive attachment containing a malicious script

Malware campaigns like these, whether limited and targeted or large-scale and random, occur frequently. Attackers go to great lengths to avoid detection by heavily obfuscating code and modifying their attack code for each spam wave. Traditional methods of manually writing signatures identifying patterns in malware cannot effectively stop these attacks. The power of machine learning is that it is scalable and can be powerful enough to detect noisy, massive campaigns, but also specific enough to detect targeted attacks with very few signals. This flexibility means that we can stop a wide range of modern attacks automatically at the onset.

Machine learning models zero in on non-executable file types

To fight social engineering attacks, we build and train specialized machine learning models that are designed for specific file types.

Building high-quality specialized models requires good features for describing each file. For each file type, the full contents of hundreds of thousands of files are analyzed using large-scale distributed computing. Using machine learning, the best features that describe the content of each file type are selected. These features are deployed to the Windows Defender AV client to assist in describing the content of each file to machine learning models.

In addition to these ML-learned features, the models leverage expert researcher-created features and other useful file metadata to describe content. Because these ML models are trained for specific file types, they can zone in on the metadata of these file types.

Figure 4. Specialized file type-specific client ML models are paired with heavier cloud ML models to classify and protect against malicious script files in real-time

When the Windows Defender AV client encounters an unknown file, lightweight local ML models search for suspicious characteristics in the file’s features. Metadata for suspicious files are sent to the cloud protection service, where an array of bigger ML classifiers evaluate the file in real-time.

In both the client and the cloud, specialized file-type ML classifiers add to generic ML models to create multiple layers of classifiers that detect a wide range of malicious behavior. In the backend, deep-learning neural network models identify malicious scripts based on their full file content and behavior during detonation in a controlled sandbox. If a file is determined malicious, it is not allowed to run, preventing infection at the onset.

File type-specific ML classifiers are part of metadata-based ML models in the Windows Defender AV cloud protection service, which can make a verdict on suspicious files within a fraction of a second.

Figure 5. Layered machine learning models in Windows Defender ATP

File type-specific ML classifiers are also leveraged by ensemble models that learn and combine results from the whole array of cloud classifiers. This produces a comprehensive cloud-based machine learning stack that can protect against script-based attacks, including zero-day malware and highly targeted attacks. For example, the targeted phishing attack in mid-May was caught by a specialized PDF client-side machine learning model, as well as several cloud-based machine learning models, protecting customers in real-time.

Microsoft 365 threat protection powered by artificial intelligence and data sharing

Social engineering attacks that use non-portable executable (PE) threats are pervasive in today’s threat landscape; the impact of combating these threats through machine learning is far-reaching.

Windows Defender AV combines local machine learning models, behavior-based detection algorithms, generics, and heuristics with a detonation system and powerful ML models in the cloud to provide real-time protection against polymorphic malware. Expert input from researchers, advanced technologies like Antimalware Scan Interface (AMSI), and rich intelligence from the Microsoft Intelligent Security Graph continue to enhance next-generation endpoint protection platform (EPP) capabilities in Windows Defender Advanced Threat Protection.

In addition to antivirus, components of Windows Defender ATP’s interconnected security technologies defend against the multiple elements of social engineering attacks. Windows Defender SmartScreen in Microsoft Edge (also now available as a Google Chrome extension) blocks access to malicious URLs, such as those found in social engineering emails and documents. Network protection blocks malicious network communications, including those made by malicious scripts to download payloads. Attack surface reduction rules in Windows Defender Exploit Guard block Office-, script-, and email-based threats used in social engineering attacks. On the other hand, Windows Defender Application Control can block the installation of untrusted applications, including malware payloads of intermediary downloaders. These security solutions protect Windows 10 and Windows 10 in S mode from social engineering attacks.

Further, Windows Defender ATP endpoint detection and response (EDR) uses the power of machine learning and AMSI to unearth script-based attacks that “live off the land”. Windows Defender ATP allows security operations teams to detect and mitigate breaches and cyberattacks using advanced analytics and a rich detection library. With the April 2018 Update, automated investigation and advance hunting capabilities further enhance Windows Defender ATP. Sign up for a free trial.

Machine learning also powers Office 365 Advanced Threat Protection to detect non-PE attachments in social engineering spam campaigns that distribute malware or steal user credentials. This enhances the Office 365 ATP comprehensive and multi-layered solution to protect mailboxes, files, online storage, and applications against threats.

These and other technologies power Microsoft 365 threat protection to defend the modern workplace. In Windows 10 April 2018 Update, we enhanced signal sharing across advanced threat protection services in Windows, Office 365, and Enterprise Mobility + Security through the Microsoft Intelligent Security Graph. This integration enables these technologies to automatically update protection and detection and orchestrate remediation across Microsoft 365.

Gregory Ellison and Geoff McDonald
Windows Defender Research


Talk to us

Questions, concerns, or insights on this story? Join discussions at the Microsoft community and Windows Defender Security Intelligence.

Follow us on Twitter @WDSecurity and Facebook Windows Defender Security Intelligence.

Posted on Leave a comment

Podcast: Dr. Chris White talks about the democratization of data science

Dr. Chris White, Principal Researcher. Photo courtesy of Maryatt Photography

Episode 27, June 6, 2018

When we think of medals, we usually picture them over the pocket of a military hero, not over the pocket protector of a computer scientist. That may be because not many academics end up working with the Department of Defense. But Dr. Chris White, now a Principal Researcher at Microsoft Research, has, and he’s received several awards for his efforts in fighting terrorism and crime with big data, statistics and machine learning.

Today, Dr. White talks about his “problem-first” approach to research, explains the vital importance of making data understandable for everyone, and shares the story of how a one-week detour from academia turned into an extended tour in Afghanistan, a stint at DARPA, and, eventually, a career at Microsoft Research.

Related:


Transcript

Chris White: I got approached to work on this very short-term project in Washington, D.C. And I said, “No thanks.” I got asked a second time. I said, “That’s great, but no thanks.” And then the third time, as kind of a personal favor, and so I said, “Yes, of course.” Turns out I went down for one week. One week turned into two weeks. Two weeks turned into three months. And instead of going back to Harvard, I went to Afghanistan.

(music plays)

Host: You’re listening to the Microsoft Research Podcast, a show that brings you closer to the cutting-edge of technology research and the scientists behind it. I’m your host, Gretchen Huizinga.

Host: When we think of medals, we usually picture them over the pocket of a military hero, not over the pocket protector of a computer scientist. That may be because not many academics end up working with the Department of Defense. But Dr. Chris White, now a Principal Researcher at Microsoft Research, has, and he’s received several awards for his efforts in fighting terrorism and crime with big data, statistics and machine learning.

Today, Dr. White talks about his “problem-first” approach to research, explains the vital importance of making data understandable for everyone, and shares the story of how a one-week detour from academia turned into an extended tour in Afghanistan, a stint at DARPA, and, eventually, a career at Microsoft Research. That and much more on this episode of the Microsoft Research Podcast.

(music plays)

Host: Chris White, welcome to the podcast.

Chris White: Hi, Gretchen, thanks.

Host: So, you’re a principal researcher at MSR, and you work on special projects. We’ll talk about that in a second, what that means. But for now, let’s talk in general about what gets you up in the morning. What are the big problems you’re working on and the big questions that you’re asking?

Chris White: Well, there’s a bunch of questions and problems worth looking at. And from my point of view, I looked at problems that were happening in society, problems that technology companies could build technology to address, technology that could also have a business purpose. And it sort of inspires me in lots of ways. One way to think about it is, you know, what does terrorist financing, human trafficking, propaganda, ransomware – what do those have in common? Well, those are all things that appear online. They appear in the vastness of big data and the darkness of usernames. And so, if one were trying to address those problems, technology would be a helpful aid, and a company like Microsoft, who has a huge technology platform and has the responsibility to maintain trust worldwide, would be a great place to work on it.

Host: So, the term “research” covers a broad range of approaches to discovery, finding stuff out for, more colloquially. And the special projects approach you bring to the mix here, by way of the Defense Advanced Research Project Agency, or DARPA, is a little different from traditional academic research. Can you talk about that? How is this approach different? What advantages does it offer for specific kinds of research questions?

Chris White: Sure. One way to think about research is not knowing what you’re doing. That’s why it’s called research, right? And given that, there are many ways to approach solving problems that you don’t know how to solve. Sometimes the question depends on the scope of the problem. Sometimes it depends on the maturity of the approaches to solve the problem. Sometimes it depends on the state of society and its ability to adopt and use and afford solutions to problems. And so, at DARPA, the way it’s approached is by identifying the problem first. And then understanding how to organize money, technology, talent, people, organizations… to best execute against solving that problem. And that usually means that you assemble lots of different kinds of people, as opposed to a classical view of research from the academic point of view where you study a problem, you write papers that are reviewed by your peers, and you advance the field by that kind of approach. In the projects kind of approach, you bring together people with different skills, and then you organize them to approach a problem with larger scope than you could address as a single person. And the hope is that you can do something impactful.

Host: Yeah. Do you find purchase with that method, as they say in the academic world?

Chris White: Well, for sure. In my world, we work on data analytics. We work on how to enable people to interact with computers to make decisions from information. We want them to have help from AI. And we focus on how to help them organize and structure information, and how to help them interact and visualize that to make decisions. To do that, requires people with different backgrounds. It requires user interface application developers. It requires big data distributed computing developers. It requires people familiar with machine learning and artificial intelligence techniques. Any one of those people can address part of the problem, but to address it end-to-end requires organizing them together. And so, that’s the projects approach we take here.

Host: OK. Let’s talk about data science, write large, for a minute. The massive amounts and multiple sources of data that we have, today, have prompted a need for big data analytics and data visualization tools. So, what are the specific challenges of big data problems, and how are you tackling them?

Chris White: Well, “big data,” much like “artificial intelligence,” are terms that are vague. In fact, they don’t mean anything. Neither big nor data. They’re not qualified. Just like artificial intelligence. And so that’s good and bad. You know, it’s good because there’s a movement. That movement has funding and interest from policymakers. It has the need for understanding implications. But that movement is still very large and very vague. And so, I think about big data, really, in terms of publicly accessible information, as a starting point, because that’s something that people are familiar with. They’ve all gone to a search bar. They’ve all issued a bunch of queries. They’ve all had a bunch of browser tabs open and had that familiar feeling of, gah, there’s just like a lot of information out there. How do I find what I need? How do I organize it? And when that problem is a business problem, it’s even bigger. And so, I think of it like that. Sometimes there’s images, like an iceberg, where what you see from a search bar, what you see if you did a Bing search for a product or a celebrity or an event, and you get a list of links and an answer card, they think of that as data interaction. And it’s true, but behind that there’s a lot more. There are databases. There are APIs with streams like Twitter and Facebook. There are public records from FOIA results. There are all kinds of things that you have to have a different kind of skill to access. And a lot of the big data approaches are how to use technology to access that information, and how to present it to people so they can make use of it. One way I think about it, sometimes, is I go all the way back to the beginning of computers. 1830s. Charles Babbage is envisioning a computational machine of some kind. In the end, one gets built. He calls it “difference engine.” And really, that was an engine that let you compare numbers. But what is happening now is the same fundamental operation of comparison, but it’s not zeros and ones. People want to compare concept-like entities. They want to compare events. They want to understand the reaction to things, and those are the kinds of questions you can answer with big data. It’s not a fact. It’s more understanding the situation, understanding what’s happening, who’s involved, how to do the analysis. And those are the empowered abilities we want our users to have.

Host: What’s your particular focus in the machine learning space?

Chris White: Right, so. I view the process as one where people are more or less doing the same thing they’ve always been doing in the world. But what’s changed is now we have lots more partial and noisy observations about behavior. And with that, we can start to infer what was going on and what to do about it, what’s changing. And so, we view that process through the lens of data analysis. How do we take in lots of partial, noisy observations from streams of sensors like social media, like news, like webpages and documents, internal reports, measurements of various kinds, to organize them in a way that lets people understand what might have been going on and to understand what might be related, and what they might be able to do about it? And so, employ methods of graph analysis and graph statistics to posit a data-generating process that we can measure, and then to evaluate that as a good representation. And then to bridge to the user, we find that that’s not enough. So, we need ways to visualize and explain it. Those require advances and inventions in that visual space of representation and in the space of interaction. And so, we have focused in that space as well. So, I say that in a way my home is in machine learning and information theory. And I’m a tourist in the HCI space. But really now, there’s like a second home. When I went overseas, I was there to do a machine learning problem. It turned out that I needed to do visualization and HCI, because people wouldn’t use the results if they didn’t understand them. People wouldn’t take advantage and take action on information if they couldn’t interrogate it. And so, very quickly, that process of visualization, of interaction, of application development, became as important, if not more, than the machine learning algorithms to transform data into a data structure for use. And so, we continue focusing on advances in modeling that are more realistic, that are more efficient, that are more expressive, as well as advances in HCI that are more representative, that have more points of view for interaction, that allow for different kinds of users to understand things more quickly, to have less training material and tutorial. And those are the basis for our research.

(music plays)

Host: Let’s go back a little bit. You have a fascinating background. Talk about that for a minute.

Chris White: Well, I grew up in the Midwest, in Oklahoma, and focused on electrical engineering, and over time became more and more academic and got a PhD and did a postdoctoral fellowship, was planning to be faculty. That’s kind of what you get taught to do when you’re in that kind of schooling. And I got approached to work on this very short-term project in Washington, D.C. And I said, “No thanks.” I was really enjoying the summer in Cambridge. I got asked a second time, said it was good for my professional development. I said, “That’s great, but no thanks.” And then the third time as kind of a personal favor, and so I said, “Yes, of course.” Turns out I went down for one week. One week turned into two weeks. Two weeks turned into three months. And instead of going back to Harvard, I went to Afghanistan. And that began a very odd detour into fieldwork, where the reality of people using technology to understand information and make decisions really dramatically affected me and the way that I think about problem solving and the way I think about research. That led to several years of understanding and fielding technology for use in the Middle East, understanding how people adopt technology, what they need, how they prioritize their problems. And then all of those lessons got to come back with me and be part of major investments for DARPA. That included XDATA, which is a program that was part of President Obama’s Big Data initiative. It was the lead project for DARPA. And Memex, which is titled after Vannevar Bush’s famous article, As We May Think, where he anticipated Wikipedia and hyperlinks, and he describes this machine called a Memex that lets you dig into information and make sense of it. And the Open Catalog, which lets us publish and share the results from research funded by taxpayers at DARPA.

Host: Nice.

Chris White: In all of these, my view is that if we’re investing taxpayer dollars, unless there’s a compelling security reason to keep something secret, we should make it free and easy to access. And those projects – those were opportunities to invest in small companies, large companies, universities, to bring both general purpose technology, but then to bring it together to solve important problems like human trafficking and terrorism financing.

Host: Let’s talk about that for a minute. You went from doing military work in Afghanistan to digital crime fighting. Can you talk about that era of your life for a minute?

Chris White: Sure. Many of these technologies, data analysis technologies, machine learning technologies, human computer interfaces – these are very general. Again, they’re almost like utilities from my point of view. That’s why having them as open source projects makes a lot of sense to me, or having them as low-cost products makes a lot of sense to me. And the observation coming back from Afghanistan was that many parts of the government had similar problems. And there were many law enforcement and related organizations that had similar problems. And so, we decided to pick a few of those and focus on them as applications, knowing that if we could address those as well as build general purpose technology, then other people might help apply them to other problems. And coming from the government to Microsoft, there was a real opportunity. And therefore, we thought, this a great place to work on that problem. We have a digital crimes unit. We have the ability to apply those techniques we’ve learned. And we have the technology platforms that Microsoft has. So, we took a shot at it.

Host: And?

Chris White: Well, the first problem we worked on with the digital crimes unit was a cousin problem to ransomware. There’s a version of that problem called tech scams. And it works like this: you’re on your computer, and either you click on something or you get an email or somehow your computer gets into a state where there’s a popup that says, whoa, hey, you have a virus. You need to call tech support. And here’s the number. Call it. Now, first of all, none of you should ever do that, ever call tech support if you’re prompted to from a computer. It doesn’t work that way, and you’re going to get in trouble. We get tens of thousands of complaints, in writing, a month where people say, there was this thing that popped up on my computer. Popups, popups, popups, popups, wouldn’t go away, wouldn’t go away, wouldn’t go away, couldn’t delete it, couldn’t get rid of it. And then what happens? Have to buy security software, have to give credentials, have to lose control of the computer, someone using it remotely. All these kinds of things. And it’s just a difficult situation. And so, this problem, it’s pervasive. It’s something like, you know, one in twelve people that were interviewed had this problem happen to them, and of those, many of them were ensnared. And so, we took on this problem and the way we approached it was by building a web-scale crawling architecture to find where all of these scams are happening on webpages anywhere.

Host: And this is not easy?

Chris White: No, this is at the same scale as crawling the web to build a search index. It doesn’t have the same difficulties in one sense because you’re not enabling millions or billions of people to access that simultaneously, which is a very hard operational problem. You’re talking about, instead, the analysts at the digital crimes unit or the Federal Trade Commission that we cooperate with, or other internal groups. So, it’s a smaller number of users, but the size of data are still very large…

Host: More needle in the haystack kind of problem?

Chris White: Yeah, it’s… exactly. It’s more targeted. And so, with this problem, it’s a crime problem, but we need something that people can use. How can they understand the vastness of this tech scam problem? How big is the problem? Where is it occurring? How many scams? How organized are the scams? These are the kinds of analysis questions that one can answer with big data access and these kinds of tools. But we have to build them. And so, we built a web crawling, distributed, back-end infrastructure that would find where these scams were happening online. One of the challenges was to find them as they were happening and to capture that, because one detail around law enforcement and digital crime is you have to have evidence. By building the ability for people to organize this kind of content, organize it with provenance, with comparability, with the ability to query and reason, we were able to then start to build tools that analysts could use. The second half of that problem was, okay, now we maybe have found all of this content. Maybe we’ve started to use machine learning and artificial intelligence to structure it. How do we make that available to people? How do we make that artificial intelligence visible and useable? Well, we have to build a bridge. And that bridge is through user interfaces or through HCI approaches in general. And so, we had to build many of those and organize them into an application and make that available to these analysts. The outcome, though, was satisfying. The outcome was that we worked with the Federal Trade Commission on Operation Tech Trap last year. We were able to supply them with the appropriate and relevant information to contribute to indictments. And they levied several indictments and raids. One of them involved a group in Ohio that had been defrauding 25,000 people of $40 million dollars. So, the ability to go end-to-end, to identify the problem, to organize the technologies to find relevant information, to make it accessible to an analyst, and then to matriculate those results into action, that, to me, is the real challenge of the modern era of computing using data and evidence-based decision-making. And so that’s why our research focuses on both that organizational aspect, but then also, how do you present it? How do you make it navigable? How do you make it understandable and cheap?

Host: It seems like it would be satisfying as well. I mean, you’ve got all of it, this huge problem, and then the outcome is good. People were able to catch the bigger fish using those kinds of tools.

Chris White: Absolutely. With those tools, those are the kinds of questions you can ask. What is the biggest fish? What is the most recent fish? Using that to stay ahead, and work at the speed and scale of those that are doing exploitation, that’s the opportunity. And we’re in a good position to do it.

Host: So, let me ask you this, because it sounds like you’re matching wits. I mean, the people that are doing these scams, do they employ guys like you, to do the bad stuff, and then you’ve got this cat and mouse game of who’s going to stay ahead of whom in the big tech picture?

Chris White: One of the lessons I learned in Afghanistan was that people are capable of a lot. People see movies, they read books, but very few people really are exposed to what humans are capable of doing to each other and for money. And so, the problem you mentioned, this problem of keeping up with the adversary, is also one of the limitations of the work that we’ve done with the digital crimes unit, is that it still has a little bit of a whack-a-mole kind of approach for trying to fight crime and catch bad people. And that is useful, for example, it’s useful for deterrence. It’s useful for characterizing the problem. But it has limitation in terms of the long-term-ness of its impact. And so, from my point of view, the other reason we focus on the general purpose-ness of the technology is because the real impact in those problems is likely to be won through economics, through understanding how people are making money doing this stuff, and how to then use that as a way to approach a more systematic way to deal with the problem. And so, given all of that, to me, it allows us to talk about beyond the whack-a-mole approach, beyond the case-by-case approach, because if we think about how spheres of influence, like cyber and information, are being used systematically, then we can start to approach them with tactics and understanding. For example, if we now see that there are organizations that are trying to influence groups of people, we can ask questions like, how long does that take? What kind of measurement system would we need to understand that? And if we had such a system, such as big data and technology measurement system, how might we use it to protect ourselves?

Host: It sounds like new fronts and new frontiers.

Chris White: Well, I think what we’re seeing with the rise of the cloud, and with the pervasive increase in sensors collecting and storing information, is we’re seeing how people are starting to use that. And in the end, a lot of this really is about people, and the way they’re using it to make money and exploit each other is something that’s really happening. Just like people are also using it for business purposes, for normal everyday life, for just getting their work done. And so, we so have to acknowledge that and make sure that we can protect our platforms as a company built on trust. As the “designated driver” of the IT industry, as being recently reported. And then, at the same time, when we do see these things happening, how can we make sure to empower the people that are protecting us with the tools they need to make decisions using information.

(music plays)

Host: You’ve been called “The Man Who Lit the Dark Web.” Despite the sensationalism of that headline, how did you do that? How did you light the dark web? I mean, what was the context of why they said that, is a better question?

Chris White: Well, as I mentioned, with big data in general, and the rise of publicly accessible information, and the way it’s being used now for both exploitive purposes as well as constructive purposes, we were trying to understand the right place to start applying the technology we were investing in from DARPA’s point of view. And we looked around, and we found, to our surprise, that there was a tremendous use of the internet, and communication networks on the internet, as a mechanism for connecting buyers to their products, where the products were people. And that’s the way I talk about it, because in the end, it does seem to be a function of economics, that there is a demand for products, and they’re willing to pay for them. And there is a supply, and those are people who are willing to take risk from law enforcement in order to make money meeting demand, and the way that the internet is used for advertising and connecting the buyer and the product is where there’s both an opportunity, as well as a use that seems suspicious. And so, when people are going online, and they’re doing these searches, some of them are not looking for anything in particular, and then those that are trying to look for something a little bit more risky, or a little bit more dangerous, start to find places online where they are sought out. And so, our view is that these places that are before them, a place where you could operate with relative impunity, because no one could see what you were doing… If we could start to make it available for people to see what you’re doing, even without judging exactly whether what you’re doing is good or not – because that’s what our, you know, legal system is for is to help us make arbitrary distinctions – that at least then people could have the evidence to know what you were doing and then decide whether it’s worth prosecuting under our legal system or not. And that was the big opportunity, it was that this darkness of different types of networks of web pages, of usernames and large databases of FOIA documents and leaks, this darkness was something, where if we could make the information within it visible to regular people, subject matter experts, then maybe they would do something about it. And so, we took on the worst of the worst: people who were abusing children and who were abusing women and men in labor and sex situations. And they were doing it a lot. And without really much consequence. And so, that was why we picked that problem, and I think that we had a good impact, although there’s still a lot of work to do.

Host: I really like the framework of illuminating. Simply by putting a light on something, and then allowing people to discern and follow up if they can. Right?

Chris White: Oh, for sure. Well, and when things are dark and when things are vague or unknown, they can be scary because you don’t know their qualities. And once you start to make something visible, then you can operate on it. You can ask questions like, okay, we’re in, you know, New York and we have a special victims bureau, and there are 500,000 ads for sex in a year in this jurisdiction…

Host: Unreal.

Chris White: How do we prioritize who to go after? How do we complement that work with work in domestic violence? How do we understand what hospital staff are needed, what victim outreach services? These are analysis questions. Analysis questions require the granularity to answer them, and from our point of view, a lot of that was available online. And so, if we could enable people to have access to it in an understandable way, then they wouldn’t have to make those decisions by gut instinct or by precedent or by highest paid opinion. They could put it into a framework that let them evaluate it. And that way it wasn’t even forever. They could make a decision. They would then have a measurement system to see the effect of their decision. And then they could decide to keep doing it or not. That, to me, was a much more maintainable, workable situation.

Host: Yeah, and this is a distinctly digital problem. I mean, the ways that people communicated about exploiting people or themselves for money in the past were much more, you know, seeable. And so now what you’ve done is transfer that into this digital realm and you’re doing fingerprint analysis in cyberspace.

Chris White: Absolutely. If we look at parts of the world where physical security is still an issue, you’ll see tall walls and razor wire. You’ll see bars. You’ll see people with machine guns. In the information space, in the cyber space, no such protections really exist, even here. I mean, very few. There’s a large burden placed on platform companies to protect our customers and their data. And for now, if we want to proceed with business, if we want to have a market where people have value assigned to the services we offer, including the trust of our platform, then we have to protect it well. It’s often the case, especially in the research community, that people think of users in terms of “novice” and “advanced.” I just think that’s the wrong approach. There are not novice and advanced users. There’s really technical experts and domain experts. And domain experts know a lot about what they’re doing. They know the patrol. They know their patients. They know their company. They know the issues. They may not be comfortable with random variables, or different AI techniques, but they certainly have been doing something well for a while. And those are the kind of people that we have to enable, that we have to protect, we have to provide information to. And understanding that, then, also affects research, because you then design and build for those people, not just based on what the literature says is an innovation.

(music plays)

Host: Let’s talk specifically about how the background you brought, the same fundamental technological thinking but applied in different areas. And so, it’s been useful in law enforcement, useful in the military, useful in digital crime. How is it playing out now?

Chris White: Well, our approach to applied research is to take a look at organizing data on one side, creating data structures, using graph modeling, graph analytics, graph statistics, using natural language processing and computer vision… basically turning streaming access points of unstructured information into a data structure that one can work with, and at the same time, bridging the gap to the user through user interfaces, through HCI that has AI enabling it. That combination is possible partly because of our cloud, but also because of Power BI. Power BI is an Excel-like took for business intelligence, ostensibly, but it’s grown, and growing, into more of a platform for data analysis. The business intelligence community was one that had a “dashboard approach” to looking at graphs of numbers and status updates. But it also was a marketplace where people were going to be doing more complicated kinds of analytics. And so, we used that as our approach to organizing our research. And so, we decided that we could take that business intelligence market and expand what that meant, so that it didn’t just mean tables of numbers, but it meant metadata and graphs and steams of content. To do that, we took the two areas of our research, streaming graph analytics and visual analytics with user interfaces, and we built them into Power BI. We built them by enabling end-to-end processes that would transform data using AI techniques, and we built them using new visual representations for interacting with content. That was something that allowed us to bridge the gap between the abstract notion of AI, the API notion of AI, the algorithmic notion of AI, in more like a real application experience. And the outcomes were quite useful. It was a way that we found to take the abstract notion of AI and make it approachable and workable with something that you can download and see and start to work with. But one part of the impact was, to me, very important: if the thing you’re building in research can only be used by a Fortune 10, and costs millions of dollars, and requires a PhD in computer science, then there will be limited impact by definition, almost. If, instead, we want to enable a billion people, how do we get a billion people to understand how to use data? It’s got to be cheap and it doesn’t require a PhD in computer science. And so, to me, that outcome, while it seems like an economic or a business issue, is actually to me a research issue because it helps confirm that, as a priority, we can still build useful things, but have the constraint of low cost and ease of use.

Host: I’ve heard Microsoft Research described as a values-forward organization, and I hear that over and over when I talk to the researchers in this booth. It’s interesting where you can marry business interests with global good interests. How could we move toward making sure those two stay married?

Chris White: Well, my dad always tells me that our goal is to do well by doing good. And with Microsoft, there’s the opportunity, because of its position in the marketplace, because of its size, where things like trust, things like responsibility, those things are core to our business interests. They’re not just company values. But for me, you know, on the research side, I often ask researchers, you know, what’s a high-risk project for you? Like, how do you think about risk? Because to me, research is where you should take risk. Which means that you should do things that product groups can’t do, can’t afford, is not on their roadmap. If we take research, what we can do is we can take risk and then we can, if successful, make sure that the rest of the company benefits. And so, this problem of, how do we do well in the world, how do we address impacts to society, how do we approach problems that may have a non-market value at first – well, research is a great place to take that risk, because, when successful, it helps the company in many ways. And there’s room for all kinds of people. Sometimes I think about complicated research as like baseball pitching, where, with baseball, occasionally, one person can pitch nine innings and succeed, but often, you need three pitchers: a starter, a middle reliever, and a closer. And they often have to have different skills. And so, in research, the starter, these are people that have really original ideas that are groundbreaking. You know, people like Yoshua Bengio, who works with us on deep learning. They set the field for everyone else to work in. Middle relievers, they take work and then they advance it to a usable degree, maybe. And then closers, they have to have the patience to deal with the tediousness of deployment and fielding, and the reality of operations, right? All those skills are very necessary to stay innovative and so, we need those different people. And so, to me, having a large research organization, almost an institution, comprised of these different kinds of people, is the best chance we have to stay innovative, to stay on the edge of what’s relevant of society, and to make sure that Microsoft has businesses in the future.

Host: Proving once again that there’s a baseball analogy for everything. Listen, I ask all the researchers that come in this booth, what keeps you up at night? I’m not even going to ask you that question because most of the stuff you said at the beginning keeps me up at night. But I do want to ask you, as we close, I wonder if you could give some advice to aspiring researchers who might look at you and say, “What should I be thinking as I plunge into what I’m going to do after my PhD?”

Chris White: Right! My point of view is that being flexible, being relaxed, having an open mind, that those are really important characteristics. Right before I went over to Afghanistan, there was this former 3 Star General, and he told me a piece of advice. He said that when I was in charge, if I were organized, if I was on top of the situation, then I could really see an opportunity walk in the door. I could see it, I could take advantage of it, and I could execute on it. But if I was too concerned with my position, with my career, with what I thought of myself, with my identity, then I would miss them. And I really took that to heart. And it’s not that there’s one way to approach any of these things. But I do think that, given the pace of technology change in computer science, and given the role that’s changing between companies, governments, and academic institutions, that it’s very important to have that kind of flexible attitude, because the thing that you studied for a long time might be irrelevant in three years, and the locus of action might change for one kind of institution to another. And so, my point of view is to roll with that and to take advantage of those opportunities, and then to try to make it about the work. Because when I make it about the work, then it’s not about me, and we can debate about the work in ways we can measure. And then other people can contribute things, and if no one cares where that comes from, then the work can proceed. And that’s, to me, also why I left DARPA. I wanted to make sure I could leave in time for the work to survive my own point of view, because if it were good enough, then it should. And if it requires a single person’s personality or oversight, then it’s fragile. And so, I would encourage any perspective researcher to take a broad view of research and to avoid getting stuck too much on how they think of themselves and their career.

(music plays)

Host: And to say yes on that third ask.

Chris White: Yeah, “Yes and!”

Host: Yes-and. Chris White, it’s been a delight. Thank you so much for coming in and talking to us today.

Chris White: Happy to. Thanks for having me.

Host: To learn more about Dr. Chris White, and how data science, AI and the cloud are solving big data problems at scale, visit Microsoft.com/research

Posted on Leave a comment

Xbox Live Gold members: Play ‘NBA 2K18’ for free through June 10

Take a break from watching the NBA Finals this weekend and hit the court with NBA 2K18 during Xbox Live Gold Free Play Days. Xbox Live Gold members can enjoy NBA 2K18 for free and enjoy a limited time discount on this fantastic sports game and its virtual currency.

Starting Thursday, June 7 at 9:00 a.m. PT and running through to Sunday, June 10 at 11:59 p.m. PT, Xbox Live Gold members in Xbox One markets can play the most critically acclaimed basketball video game. During the weekend you can build up your career in NBA games, hit the courts in The Playground, join the Pro-Am circuit, or explore an all-new open neighborhood setting.

As mentioned earlier, you’ll also have the option to purchase NBA 2K18 Legend and NBA 2K18 Legend Gold Edition through the Microsoft Store at a 67% discount and up to a 30% discount on virtual currency to continue your gameplay experience. If you pass up on this opportunity, don’t worry – all your saved progress and earned achievements will be waiting for you should you decide to pick up the ball later to continue your career.

You can download NBA 2K18 by clicking on the Gold Member area on the home dashboard from your home console or by downloading directly from the Microsoft Store.

Posted on Leave a comment

Check out what’s next for Visual Studio

Since we launched Visual Studio 2017 in March of that year, it has become our most popular Visual Studio release ever. Your feedback has helped our team publish seven updates since our initial GA, which have improved solution load performance, build performance, and unit test discovery performance. We’ve also made Visual Studio 2017 our most accessible releases ever, helping developers with low-vision or no-vision be more productive.

Our team is focused on introducing features that make every developer more productive: better navigation features like “go to all” (Ctrl + ,), features to improve code quality like Live Unit Testing, and most recently, to enable real time collaboration with Live Share. And we have even started to show how we will use artificial intelligence to assist developers with IntelliCode.

Now, it’s time to start to look at what comes next.

The short answer is Visual Studio 2019

Because the Developer Tools teams (especially .NET and Roslyn) do so much work in GitHub, you’ll start to see check-ins that indicate that we’re laying the foundation for Visual Studio 2019, and we’re now in the early planning phase of Visual Studio 2019 and Visual Studio for Mac. We remain committed to making Visual Studio faster, more reliable, more productive for individuals and teams, easier to use, and easier to get started with. Expect more and better refactorings, better navigation, more capabilities in the debugger, faster solution load, and faster builds. But also expect us to continue to explore how connected capabilities like Live Share can enable developers to collaborate in real time from across the world and how we can make cloud scenarios like working with online source repositories more seamless. Expect us to push the boundaries of individual and team productivity with capabilities like IntelliCode, where Visual Studio can use Azure to train and deliver AI-powered assistance into the IDE.

Our goal with this next release is to make it a simple, easy upgrade for everyone – for example, Visual Studio 2019 previews will install side by side with Visual Studio 2017 and won’t require a major operating system upgrade.

As for timing of the next release, we’ll say more in the coming months, but be assured we want to deliver Visual Studio 2019 quickly and iteratively. We’ve learned a lot from the cadence we’ve used with Visual Studio 2017, and one of the biggest things we have learned is that we can do a lot of good work if we focus on continually delivering and listening to your feedback. There are no bits to preview yet, but the best way to ensure you are on the cutting edge will be to watch this blog and to subscribe to the Visual Studio 2017 Preview.

In the meantime, our team will continue to publish a roadmap of what we’re planning online, work in many open source repositories, and take your feedback through our Developer Community website. This blog post is just another example of sharing our plans with you early, so you can plan and work with us to continue to make Visual Studio a great coding environment.

John

John Montgomery, Director of Program Management for Visual Studio
@JohnMont

John is responsible for product design and customer success for all of Visual Studio, C++, C#, VB, JavaScript, and .NET. John has been at Microsoft for 17 years, working in developer technologies the whole time.