Posted on Leave a comment

Microsoft acquires Movere to help customers unlock cloud innovation with seamless migration tools

As cloud growth continues to unlock opportunities for our customers, cloud migration is increasingly important for business’s digital strategy. Today, I am pleased to announce that Microsoft has acquired Movere, an innovative technology provider in the cloud migration space.

We’re committed to providing our customers with a comprehensive experience for migrating existing applications and infrastructure to Azure, which include the right tools, processes, and programs. As part of that ongoing investment, we’re excited to welcome the leadership, talent, technology, and deep expertise Movere has built in enabling customers’ journey to the cloud over the last 11 years.

Movere’s innovative discovery and assessment capabilities will complement Azure Migrate and our integrated partner solutions, making migration an easier process for our customers. We believe that successful cloud migrations enable business transformation, and this acquisition underscores our investments to make that happen.

Together, Azure Migrate, Movere, and our ecosystem of independent software vendor (ISV) partners’ solutions provide choice and a comprehensive set of capabilities from discovery, assessment, to migration and optimization. We aim to streamline our customers’ journey to the cloud, enabling them to bring innovation and transformation with the power of Azure. You can read thoughts from Movere founders in their blog.

Posted on Leave a comment

Teachers: Bring World Wildlife Fund experts into your classroom via Skype and access their Minecraft Biodiversity Curriculum

We are excited to be partnering with World Wildlife Fund (WWF) to bring teachers the Our Planet Live collection of activities for teachers to join live via Skype. The collection consists of experts and scientists from around the world who can give a deeper insight into the species, locations, issues and solutions introduced by the “Our Planet” series and website. The series explores rich natural wonders, iconic species and wildlife spectacles that still remain and reveals the key issues that urgently threaten their existence.

We spoke to Matt Larsen-Daw, WWF-UK

Matt is Education Manager for “Our Planet” and a member of the Education Leadership Group for the WWF Global Network. His background is as a campaigner, trainer and consultant in participatory community development. Matt is also Chair of socio-educational charity HVP Nepal-UK. 

Tell us a bit about “Our Planet”

WWF’s 2018 Living Planet Report revealed the scale of human impact on our precious natural world. “Our Planet,” launched on Netflix in April, takes the story further. The eight-part series, voiced by David Attenborough, reveals the natural wonders that remain and explores what we need to do to ensure a future in which nature and people thrive.

Why is it important to WWF to involve students in this?

Today’s young people will be the stewards of our planet in the years to come, and the future of all life depends on them gaining the knowledge, skills and passion for nature necessary to transform humanity’s relationship with the natural world and build a more sustainable future. With just 10 years to bring huge changes to lifestyles and business practices worldwide if we are to avoid global environmental collapse, young people will be faced with a turbulent and challenging world as they move into adulthood and make decisions about their own personal and professional futures. 

How can teachers get their students involved?

Students have a great opportunity to connect in real time with the experts behind the series—you can request a free session via the Skype in the Classroom collection—you can filter by subject, location and availability to find the right expert for your students to engage with. In addition to the live experience, you can support their learning with a range of resources and activities for schools and young people that build on “Our Planet” and ensure that the important subjects and messages in the series can be accessed by a wide spectrum of young people around the world. We are empowering educators in primary and secondary schools to draw on the incredible wealth of free high-quality video resources on ourplanet.com to delve into the key issues of our time with their students.

What are some examples of the sorts of connections teachers can make?

polar bears on vast tundra

polar bears on vast tundraThrough his own personal story, polar expert Rod Downie will give students an insight into what it’s really like to visit the frozen Arctic and come face to face with a polar bear.

https://education.microsoft.com/wwfpolar

bat eating at night

bat eating at night

You could meet a film producer from Silverback Films—the talented team behind “Our Planet”—and learn about the highs and lows of capturing breath-taking footage of the natural world.

https://education.microsoft.com/wwffilming

headshot of author Nicola Davies

headshot of author Nicola Davies

You could connect with bestselling nature author Nicola Davies and explore how fiction can encourage a connection with nature.

https://education.microsoft.com/NatureOnThePage

Collaborate with classes in schools around the world as you explore your local biodiversity and take action to protect and restore nature in your area, guided by the Our Planet LAB toolkit. Find out more and register your interest here: https://education.microsoft.com/ourplanetlab

More experts and educators are joining each month throughout 2019—bookmark the page and look out for exciting opportunities to gain new insight on our planet and the fight for its future.

Extra Resources for you and your classroom

  • Bring the story of our planet to life for young people with the spectacular videos and interactive explorable globe available for free on OurPlanet.com.
  • Take inspiration and guidance from the Our Planet educator guide, which includes ideas for sparking ideas, discussion and engagement with videos.
  • Present to the whole school or even the wider community with the Our Planet Assembly Pack.

And if you are using Minecraft Education Edition in your classroom…

Image of giant Minecraft-created rhino and moose with World Wildlife Fund logo in lower right hand corner and Minecraft Education Edition logo in lower right hand cornerImage of giant Minecraft-created rhino and moose with World Wildlife Fund logo in lower right hand corner and Minecraft Education Edition logo in lower right hand corner

Minecraft: Education Team launched a new curriculum in partnership with the World Wildlife Fund to help educators teach biodiversity and conservation. The curriculum includes an immersive Minecraft world and three standards-based lessons. Students will learn about what causes extinction, interact with scientists and tackle threats to our planet’s ecosystems in different Minecraft biomes. Explore these resources for hands-on learning and download the Minecraft world at aka.ms/biodiversity. Tens of millions of educators and students are licensed to use Minecraft: Education Edition. Visit aka.ms/meegetstarted to learn how to use this tool in your classroom!

Click here for free STEM resourcesExplore tools for student-centered learning

Posted on Leave a comment

The story behind the world’s first AI-created whisky

Opening new doors
Together, Mackmyra and Fourkind have, for the first time, used AI in the creation of a new whisky, by augmenting the capabilities of the master blender to produce novel suggestions.

Their partnership demonstrates how technology can be used to help people achieve their best work, while still relying on their own skills, knowledge and expertise.

For D’Orazio, the experience has changed the way she views technology, and the transformative effects it can have. “We always strive to challenge the traditions in the very traditional whisky trade, and that’s something we can really do now with the help of AI.”

“We see AI as a part of our digital development, and it is really exciting to let AI be a complement to the craft of producing a high-quality whisky. For me as a Master Blender, it is a great achievement to be able to say that I’m now also a mentor for the first ever created AI whisky in the world.”

The success of the world’s first AI whisky has also introduced new business opportunities for Fourkind, allowing it to use the same principles used for Mackmyra, across different industries:

“This AI-generation can have an impact in different industries globally,” says Kartela. “I envision AI systems generating recipes for sweets, perfumes, beverages, and maybe even sneaker designs, and I think we’ll see a lot of complex consumer products being designed by AI or with AI during the next few years.”

“We are showing the way forward, and these new AI solutions can be used to generate products that retain the spirit, look and feel of the brands behind them, while at the same time being new and unique. From medicine to creative tasks, humans will outperform machines in many areas. We just need to know where to use AI to get the most out of us as employees and experts.”

Posted on Leave a comment

Hacker movies that have an echo of truth

Films about hacks and cyberattacks have been popular for decades. These movies helped create the image of the hacker genius — just think of Stanley Jobson in “Swordfish.”

There is “Hackers,” in which a group of high schoolers access the mainframe of an oil company and discover evidence of embezzlement and “The Net,” about a woman (Sandra Bullock) whose identity is stolen.

You may think Hollywood depictions of hacking bear no resemblance to real life, but in each of the films below, there is an echo of truth in the fiction.

[Subscribe to Microsoft on the Issues for more on the topics that matter most.]

 “The Italian Job” (1969)

The Italian Job

A classic caper on a list of hacker movies. This story of British bank robbers undertaking a job in Turin, Italy, offers a surprising nod of things to come.

How do Michael Caine and his team plan to escape from this city? By hacking its traffic light system and causing widespread gridlock. This leads to the famous Mini Cooper getaway scene.

From Saudi Arabia to South Africa, billions of dollars are being invested in smart city projects. Some researchers estimate that spending on smart cities will reach $27.5 billion by 2023. It makes protecting those cities reliant on technology from disruption ever more crucial.

“WarGames” (1983)

At the height of the Cold War, a young hacker (Matthew Broderick) breaks into a US military supercomputer and comes close to starting a nuclear war. He thinks he’s playing a game based on a simulation, but this is not a drill.

According to a 2016 study by ISACA and RSA Conference, 74 percent of the world’s businesses expect to be hacked each year. And the economic loss due to cybercrime is estimated to reach $3 trillion by 2020.  It is one of the reasons that Microsoft has called for a Digital Geneva Convention to help protect cyberspace in times of peace.

“Sneakers” (1992)

Sneakers

This tech thriller, which spans from the late 1960s to the more computer-literate 1990s, boasts a heavyweight cast that includes Robert Redford and Sidney Poitier. A team of security specialists is approached by the NSA and commissioned to locate a mysterious black box. This team, propelled into a world of espionage, is soon hunted by rogue agents. The box turns out to be the key to cracking all known encryption and is, the team realizes, too powerful to fall into the wrong hands.

In 1992, the idea that something could break all known encryption sounded scary and a little implausible. Today, the existence of such technology is more likely thanks to quantum computing.

According to Martin Giles of the MIT Technology Review, quantum computers are “a security threat that we’re still totally unprepared for,” and it could be 20 years before cybersecurity catches up. Working closely with the United States National Institute for Standards and Technology, Microsoft is engaged with the development of post-quantum cryptography that will be able to withstand quantum computer capabilities, while still working with existing protocols.

“Hackers” (1995)

Hackers

Starring Angelina Jolie and Jonny Lee Miller, “Hackers” is the story of a group of high school technology enthusiasts with codenames and complicated backstories. They hack into the mainframe of an oil company and discover evidence of embezzlement — but their activities are soon detected.

Robust cybersecurity is important for businesses and to the future of national economies, and it has become a priority for governments around the world. The Cybersecurity Tech Accord, announced by Microsoft in April 2018, is a public commitment among more than 100 global companies to protect and empower civilians online and help defend them against threats.

“The Net” (1995)

Sandra Bullock plays the lead role in this thriller that foreshadows one worry of the modern security landscape: identity theft.

Admittedly, in 1995, many important records were still paper-based, after all. Still, this is one of the central themes in the plot: Can Angela Bennett (Bullock) overcome a series of interconnected threats and regain her identity?

Today, secure passwords are a must. There is a wealth of personal data stored digitally that can all too easily compromise the security of your identity.

Cyberspace has become a battlefield and powerful cyberweapons are being used against civilians. Tools and Weapons, by Microsoft President Brad Smith and Carol Ann Browne, looks at how the world can respond. To read more and pre-order the book, visit Tools and Weapons. And follow @MSFTIssues on Twitter.

Posted on Leave a comment

Why Microsoft applauds the European Banking Authority’s revised guidelines on outsourcing arrangements

The financial services community has unprecedented opportunity ahead. With new technologies like cloud, AI and blockchain, firms are creating new customer experiences, managing risk more effectively, combating financial crime, and meeting critical operational objectives. Banks, insurers and other services providers are choosing digital innovation to address these opportunities at a time when competition is increasing from every angle – from traditional and non-traditional players alike.

At the same time, our experience is that lack of clarity in regulation can hinder adoption of these exciting technologies, as regulatory compliance remains fundamental to financial institutions using technology they trust.  Indeed, the common question I get from customers is: Will regulators let me use your technology, and have you built in the capabilities to help me meet my compliance obligations?

A portrait of Dave Dadoun, assistant general counsel for Microsoft.
Dave Dadoun.

With this in mind, we applaud the European Banking Authority’s (EBA) revised Guidelines on outsourcing arrangements which, in part, address the use of cloud computing. For several years now we have shared perspectives with regulators on how regulation can be modernized to address cloud computing without diminishing the security, privacy, transparency and compliance safeguards necessary in a native cloud or hybrid-cloud world. In fact, cloud computing can afford financial institutions greater risk assurance – particularly on key things like managing data, securing data, addressing cyber threats and maintaining resilience.

At the core of the revised guidelines are a set of flexible principles addressing cloud in financial services. Indeed, the EBA has been clear these “guidelines are subject to the principle of proportionality,” and should be “applied in a manner that is appropriate, taking into account, in particular, the institution’s or payment institution’s size … and the nature, scope and complexity of its activities.” In addition, the guidelines set out to harmonize approaches across jurisdictions, a big step forward for financial institutions to have predictability and consistency among regulators in Europe. We think the EBA took this smart move to support leading-edge innovation and responsible adoption, and prepare for more advanced technology like machine learning and AI going forward.

Given these guidelines reflect a modernized approach that transcends Europe, we have updated our global Financial Services Amendment for customers to reflect these key changes. We have also created a regulatory mapping document which shows how our cloud services and underlying contractual commitments map to these requirements in an EU Checklist. The EU Checklist is accessible on the Microsoft Service Trust Portal. In essence, Europe offers the benchmark in establishing rules to permit use of cloud for financial services and we are proud to align to such requirements.

Because this is such an important milestone for the financial sector, we wanted to share our point-of-view on a few key aspects of the guidelines, which may help firms accelerate technology transformation with the Microsoft cloud going forward:

  • Auditability: As cloud has become more prevalent, we think it is natural to extend audit rights to cloud vendors in circumstances that warrant it. We also think that audits are not a one-size-fits-all approach but adaptable based on use cases – particularly whether it involves running core banking systems in the cloud. Microsoft has provided innovations to help supervise and audit hyper-scale cloud, including:
  • Data localization: We are pleased there are no data localization requirements in the EBA guidance. Rather, customers must assess the legal, security and other risks where data is stored, as opposed to mandating data be stored strictly in Europe. We help customers manage and assess such risk by providing:
    • Contractual commitments to store data at rest in a specified region (including Europe).
    • Transparency where data is stored.
    • Full commitments to meet key privacy requirements, like the General Data Protection Regulation (GDPR).
    • Flow-through of such commitments to our subcontractors.
  • Subcontractors. The guidelines address subcontractors, particularly those that provide “critical or important” functions. Management, governance and oversight of Microsoft’s subcontractors is core to what we do.  Among other things:
    • Microsoft’s subcontractors are subject to a vetting process and must follow the same privacy and governance controls we ourselves implement to protect customer data.
    • We provide transparency about subcontractors who may have access to customer data and provide 180 days notification about any new subcontractors as well.
    • We provide customers termination rights should they conclude a subcontractor presents a material increase in risk to a critical or important function of their operations.
  • Core platforms: We welcome the EBA’s position providing clarity that core platforms may run in the cloud. What matters is governance, documenting protocols, the security and resiliency of such systems, and having appropriate oversight (and audit rights), and commitments to terminate an agreement, if and when that becomes necessary. These are all capabilities Microsoft offers to its customers and we now see movement among leading banks to put core systems into our cloud because of the benefits we provide.
  • Business Continuity and Exit Planning. Institutions must have business continuity plans and test them periodically for use of critical or important functions. Microsoft has supported our customers to meet this requirement, including providing a Modern Cloud Risk Assessment toolkit and, in addition, in the Service Trust Portal documentation on our service resilience architecture, our Enterprise Business Continuity Management team (EBCM), and a quarterly report detailing results from our recent EBCM testing. In addition, we have supported our customers in preparing exit planning documentation, and we work with industry bodies like the European Banking Federation towards further industry guidance for these new EBA requirements.
  • Concentration risk: The EBA addresses the need to assess whether concentration risk may exist due to potential systemic failures in use of cloud services (and other legacy infrastructure). However, this is balanced with understanding what the risks are of a single point of failure, and to balance those risks and trade-offs from existing legacy systems. In short, financial institutions should assess the resiliency and safeguards provided with our hyper-scale cloud services, which can offer a more robust approach than systems in place today. When making those assessments, financial institutions may decide to lean-in more with cloud as they transform their businesses going forward.

The EBA framework is a great step forward to help modernize regulation and take advantage of cloud computing. We look forward to participating in ongoing industry discussion, such as new guidance under consideration by the European Insurance and Occupational Pension Authority concerning use of cloud services, as well as assisting other regions and countries in their journey to creating more modern policy that both supports innovation while protecting the integrity of critical global infrastructure.

For more information on Microsoft in the financial services industry, please go here.

Top photo courtesy of the European Banking Authority.

Posted on Leave a comment

New ‘Gears Forever’ trailer now online

We’re just a short time away from the biggest Gears yet with Early Access for either Xbox Game Pass Ultimate or with Gears 5 Ultimate Edition, and today while fans eagerly await its release, we’ve got a brand new trailer showing off Gears 5’s five modes.

In Gears 5, there are five thrilling ways to play: the all-new aggressive, high-stakes co-op mode Escape; the competitive Versus mode, featuring nine modes including the all-new Arcade for players of all levels; the deepest Horde Mode ever;  the intuitive Map Builder and the biggest Campaign yet.

Yesterday, we shared news about latest blockbuster partnership in Gears 5 with WWE Superstar Batista making an appearance in Gears 5 as a multiplayer character, donning the armor of the legendary Marcus Fenix. Fans can also look forward to the inclusion of Sarah Connor and the T-800 Endoskeleton from Terminator: Dark Fate and Spartans Emile-A239 and Kat-B320 from Halo: Reach with Xbox Game Pass Ultimate and Gears 5 Ultimate Edition.

Gears 5 early access will begin at 9pm on September 5th in your local time zone. For countries with multiple time zones, the earliest time zone will determine when you can play. For example, North American early access will begin at simultaneously at 9pm ET, 8pm CT and 6pm PT.

Both Xbox Game Pass Ultimate members and Gears 5 Ultimate Edition owners will be able to gear up and take the fight to the Swarm. On behalf of everyone at The Coalition, we’re excited to have fans jump into the world of Gears 5.

For more information on Gears 5 and the Gears franchise, stay tuned to Xbox Wire or follow Gears on Twitter @gearsofwar.

Posted on Leave a comment

Deep learning rises: new methods for detecting malicious PowerShell scripts

Scientific and technological advancements in deep learning, a category of algorithms within the larger framework of machine learning, provide new opportunities for development of state-of-the art protection technologies. Deep learning methods are impressively outperforming traditional methods on such tasks as image and text classification. With these developments, there’s great potential for building novel threat detection methods using deep learning.

Machine learning algorithms work with numbers, so objects like images, documents, or emails are converted into numerical form through a step called feature engineering, which, in traditional machine learning methods, requires a significant amount of human effort. With deep learning, algorithms can operate on relatively raw data and extract features without human intervention.

At Microsoft, we make significant investments in pioneering machine learning that inform our security solutions with actionable knowledge through data, helping deliver intelligent, accurate, and real-time protection against a wide range of threats. In this blog, we present an example of a deep learning technique that was initially developed for natural language processing (NLP) and now adopted and applied to expand our coverage of detecting malicious PowerShell scripts, which continue to be a critical attack vector. These deep learning-based detections add to the industry-leading endpoint detection and response capabilities in Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP).

Word embedding in natural language processing

Keeping in mind that our goal is to classify PowerShell scripts, we briefly look at how text classification is approached in the domain of natural language processing. An important step is to convert words to vectors (tuples of numbers) that can be consumed by machine learning algorithms. A basic approach, known as one-hot encoding, first assigns a unique integer to each word in the vocabulary, then represents each word as a vector of 0s, with 1 at the integer index corresponding to that word. Although useful in many cases, the one-hot encoding has significant flaws. A major issue is that all words are equidistant from each other, and semantic relations between words are not reflected in geometric relations between the corresponding vectors.

Contextual embedding is a more recent approach that overcomes these limitations by learning compact representations of words from data under the assumption that words that frequently appear in similar context tend to bear similar meaning. The embedding is trained on large textual datasets like Wikipedia. The Word2vec algorithm, an implementation of this technique, is famous not only for translating semantic similarity of words to geometric similarity of vectors, but also for preserving polarity relations between words. For example, in Word2vec representation:

Madrid – Spain + Italy ≈ Rome

Embedding of PowerShell scripts

Since training a good embedding requires a significant amount of data, we used a large and diverse corpus of 386K distinct unlabeled PowerShell scripts. The Word2vec algorithm, which is typically used with human languages, provides similarly meaningful results when applied to PowerShell language. To accomplish this, we split the PowerShell scripts into tokens, which then allowed us to use the Word2vec algorithm to assign a vectorial representation to each token .

Figure 1 shows a 2-dimensional visualization of the vector representations of 5,000 randomly selected tokens, with some tokens of interest highlighted. Note how semantically similar tokens are placed near each other. For example, the vectors representing -eq, -ne and -gt, which in PowerShell are aliases for “equal”, “not-equal” and “greater-than”, respectively, are clustered together. Similarly, the vectors representing the allSigned, remoteSigned, bypass, and unrestricted tokens, all of which are valid values for the execution policy setting in PowerShell, are clustered together.

Figure 1. 2D visualization of 5,000 tokens using Word2vec

Examining the vector representations of the tokens, we found a few additional interesting relationships.

Token similarity: Using the Word2vec representation of tokens, we can identify commands in PowerShell that have an alias. In many cases, the token closest to a given command is its alias. For example, the representations of the token Invoke-Expression and its alias IEX are closest to each other. Two additional examples of this phenomenon are the Invoke-WebRequest and its alias IWR, and the Get-ChildItem command and its alias GCI.

We also measured distances within sets of several tokens. Consider, for example, the four tokens $i, $j, $k and $true (see the right side of Figure 2). The first three are usually used to represent a numeric variable and the last naturally represents a Boolean constant. As expected, the $true token mismatched the others – it was the farthest (using the Euclidean distance) from the center of mass of the group.

More specific to the semantics of PowerShell in cybersecurity, we checked the representations of the tokens: bypass, normal, minimized, maximized, and hidden (see the left side of Figure 2). While the first token is a legal value for the ExecutionPolicy flag in PowerShell, the rest are legal values for the WindowStyle flag. As expected, the vector representation of bypass was the farthest from the center of mass of the vectors representing all other four tokens.

Figure 2. 3D visualization of selected tokens

Linear Relationships: Since Word2vec preserves linear relationships, computing linear combinations of the vectorial representations results in semantically meaningful results. Below are a few interesting relationships we found:

high – $false + $true ≈’ low
‘-eq’ – $false + $true ‘≈ ‘-neq’
DownloadFile – $destfile + $str ≈’ DownloadString ‘
Export-CSV’ – $csv + $html ‘≈ ‘ConvertTo-html’
‘Get-Process’-$processes+$services ‘≈ ‘Get-Service’

In each of the above expressions, the sign ≈ signifies that the vector on the right side is the closest (among all the vectors representing tokens in the vocabulary) to the vector that is the result of the computation on the left side.

Detection of malicious PowerShell scripts with deep learning

We used the Word2vec embedding of the PowerShell language presented in the previous section to train deep learning models capable of detecting malicious PowerShell scripts. The classification model is trained and validated using a large dataset of PowerShell scripts that are labeled “clean” or “malicious,” while the embeddings are trained on unlabeled data. The flow is presented in Figure 3.

Figure 3 High-level overview of our model generation process

Using GPU computing in Microsoft Azure, we experimented with a variety of deep learning and traditional ML models. The best performing deep learning model increases the coverage (for a fixed low FP rate of 0.1%) by 22 percentage points compared to traditional ML models. This model, presented in Figure 4, combines several deep learning building blocks such as Convolutional Neural Networks (CNNs) and Long Short-Term Memory Recurrent Neural Networks (LSTM-RNN). Neural networks are ML algorithms inspired by biological neural systems like the human brain. In addition to the pretrained embedding described here, the model is provided with character-level embedding of the script.

Figure 4 Network architecture of the best performing model

Real-world application of deep learning to detecting malicious PowerShell

The best performing deep learning model is applied at scale using Microsoft ML.Net technology and ONNX format for deep neural networks to the PowerShell scripts observed by Microsoft Defender ATP through the AMSI interface. This model augments the suite of ML models and heuristics used by Microsoft Defender ATP to protect against malicious usage of scripting languages.

Since its first deployment, this deep learning model detected with high precision many cases of malicious and red team PowerShell activities, some undiscovered by other methods. The signal obtained through PowerShell is combined with a wide range of ML models and signals of Microsoft Defender ATP to detect cyberattacks.

The following are examples of malicious PowerShell scripts that deep learning can confidently detect but can be challenging for other detection methods:

Figure 5. Heavily obfuscated malicious script

Figure 6. Obfuscated script that downloads and runs payload

Figure 7. Script that decrypts and executes malicious code

Enhancing Microsoft Defender ATP with deep learning

Deep learning methods significantly improve detection of threats. In this blog, we discussed a concrete application of deep learning to a particularly evasive class of threats: malicious PowerShell scripts. We have and will continue to develop deep learning-based protections across multiple capabilities in Microsoft Defender ATP.

Development and productization of deep learning systems for cyber defense require large volumes of data, computations, resources, and engineering effort. Microsoft Defender ATP combines data collected from millions of endpoints with Microsoft computational resources and algorithms to provide industry-leading protection against attacks.

Stronger detection of malicious PowerShell scripts and other threats on endpoints using deep learning mean richer and better-informed security through Microsoft Threat Protection, which provides comprehensive security for identities, endpoints, email and data, apps, and infrastructure.

Shay Kels and Amir Rubin
Microsoft Defender ATP team

Additional references:

Posted on Leave a comment

WWE superstar Batista coming to ‘Gears 5’

Today, WWE Superstar Batista confirmed the long-standing hopes of many, including his own.

As revealed on his personal Twitter account, Batista will officially enter the Gears of War Universe later this month, donning the armor of Marcus Fenix as a Gears 5 multiplayer character.

Fans around the world have long expressed hope that Batista will be cast for the role of Marcus Fenix in the film version of Gears of War, an opportunity he’s described as a “dream role.”

While the movie remains in development, The Coalition didn’t want any more time to go by without giving Batista a chance to don the armor, which he wore for as part of an upcoming WWE Network promotion for Gears 5. According to those who were there, the armor which was created to match the specifications of the game, “fit him perfectly.”

Rod Fergusson, who has cast and directed every Gears title, directed Batista’s performance for Gears 5, including over seven hundred lines recorded for the game.

“Adding Batista to Gears 5, we started with the fantasy of ‘Batista as Marcus,’ putting Batista into Marcus’ armor, and starting with Marcus’ script. Then we added elements of “The Animal” Batista into his voice performance and onto his look by adding his signature Hollywood shades to his character.  Batista was great in the booth and I can’t wait for Gears and Batista fans alike to stomp some Swarm as The Animal.”

Gears 5 Batista

Gears 5 Batista

Xbox has partnered together with WWE to create a special countdown to Batista’s availability in the game, including behind-the-scenes with Gears 5 and Batista on WWE’s UpUpDownDown gaming channel. This all leads up to WWE Network’s “Clash of Champions” event on Sunday, September 15, available through a 30-day free subscription on the Xbox app (new subscribers only).

To unlock Batista, simply play any version of Gears 5 (including with your Xbox Game Pass membership) beginning September 15. The promotion ends October 28.

Gears 5 launches on Xbox One and Windows 10 PC on September 6 for Xbox Game Pass Ultimate members; September 10 for Xbox Game Pass members. Gears 5 is also available for pre-order today from the Microsoft Store. Click here for purchase details.

Posted on Leave a comment

Beyond the printed form: unlocking insights from documents with Form Recognizer

Data extraction from printed forms is by now a tried and true technology. Form Recognizer extracts key value pairs, tables and text from documents such as W2 tax statements, oil and gas drilling well reports, completion reports, invoices, and purchase orders. However, real-world businesses often rely on a variety of documents for their day-to-day needs that are not always cleanly printed.

We are excited to announce the addition of handwritten and mixed-mode (printed and handwritten) support. Starting now, handling handwritten and mixed-mode forms is the new norm.

Extracting data from handwritten and mixed-mode content with Form Recognizer

Entire data sets that were inaccessible in the past due to the limitations of extraction technology now become available. The handwritten and mixed-mode capability of Form Recognizer is available in preview and enables you to extract structured data out of handwritten text filled in forms such as:

  • Medical forms: New patient information, doctor notes.
  • Financial forms: Account opening forms, credit card applications.
  • Insurance: Claim forms, liability forms.
  • Manufacturing forms: Packaging slips, testing forms, quality forms.
  • And more.

By using our vast experience in optical character recognition (OCR) and machine learning for form analysis, our experts created a state-of-the-art solution that goes beyond printed forms. The OCR technology behind the service supports both handwritten and printed. Expanding the scope of Form Recognizer allows you to tap into previously uncharted territories, by making new sources of data available to you. You may extract valuable business information from newly available data, keeping you ahead of your competition.

Whether you are using Form Recognizer for the first time or already integrated it into your organization, you will now have an opportunity to create new business applications:

  • Expand your available data set: If you are only extracting data from machine printed forms, expand your total data set to mixed-mode forms and historic handwritten forms.
  • Create one application for a mix of documents: If you use a mix of handwritten and printed forms, you can create one application that applies across all your data.
  • Avoid manual digitization of handwritten forms: Original forms may be fed to Form Recognizer without any pre-processing, extracting the same key-value pairs and table data you would get from a machine-printed form to reduce costs, errors, and time.

Our customer: Avanade

Avanade values people as their most important asset. They are always on the lookout for talented and passionate professionals to grow their organization. One way they find these people is by attending external events, which may include university career fairs, trade shows, or technical conferences to name a few. 

During these events they often take the details of those interested in finding out more about Avanade, as well as their permission to contact them at a later date. Normally this is completed with a digital form using a set of tablets. But when the stand is particularly busy, they use a short paper form that attendees can fill in with their handwritten details. Unfortunately, these forms needed to be manually entered into the marketing database, requiring a considerable amount of time and resources. With the volume of potential new contacts at these events, multiplied by the number of events Avanade attends, this task can be daunting.

Azure Form Recognizer’s new handwritten support simplifies the process, giving Avanade peace of mind knowing no contact is lost and the information is there for them immediately.

In addition, Avanade integrated Form Recognizer as a skill within their cognitive search solution, enabling them to quickly use the service in their existing platform and follow-up with new leads, while their competitors may be spending time digitizing their handwritten forms.

Am image of a handwritten form and the data extracted via Form Recognizer.

“Azure Form Recognizer takes a vast amount of effort out of the process, changing the task from data entry to data validation. By integrating Form Recognizer with Azure Search, we are also immediately able to use the service in our existing platforms. If we need to find and check a form for any reason, for example to check for a valid signature there, we can simply search by any of the fields like name or job title and jump straight to that form. In our initial tests, using Form Recognizer has reduced the time taken to digitize the forms and double check the entries by 35 percent, a number we only expect to get better as we work to optimize our tools to work hand in hand with the service, and add in more automation.” – Fergus Kidd, Emerging Technology Engineer, Avanade

Getting started

To learn more about Form Recognizer and the rest of the Azure AI ecosystem, please visit our website and read the documentation.

Get started by contacting us.

For additional questions please reach out to us at formrecog_contact@microsoft.com

Posted on Leave a comment

Video: Hackathons show teen girls the potential for AI – and themselves

This summer, young women in San Francisco and Seattle spent a weekend taking their creative problem solving to a whole new level through the power of artificial intelligence. The two events were part of a Microsoft-hosted AI boot-camp program that started last year in Athens, then broadened its reach with events in London last fall and New York City in the spring. Check out the wrap-up video from the three U.S. events:

YouTube Video

data-video-id=”0uYtlKZtRqM”>

“I’ve been so impressed not only with the willingness of these young women to spend an entire weekend learning and embracing this opportunity, but with the quality of the projects,” said Didem Un Ates, one of the program organizers and a senior director for AI within Microsoft. “It’s just two days, but what they come up with always blows our minds.” (Read a LinkedIn post from Un Ates about the events.)

The problems these girls tackled aren’t kid stuff: The girls chose their weekend projects from among the U.N. Sustainable Development Goals, considered to be the most difficult and highest priority for the world.

The result? Dozens of innovative products that could help solve issues as diverse as ocean pollution, dietary needs, mental health, acne and climate change. Not to mention all those young women – 129 attended the U.S. events – who now feel empowered to pursue careers to help solve those problems. They now see themselves as “Alice,” a mascot created by the project team to represent the qualities young women possess that lend themselves to changing the world through AI.

Organizers plan to broaden the reach of these events, so that girls everywhere can learn about the possibility of careers in technology.

Related: