Posted on Leave a comment

Meet the 2019 AI for Good Idea Challenge winners

Thanks to developers, the world runs on software!

Developers have played a strong role in many of the massive transformations and technology shifts of the past few decades. And now that AI is redefining how software is created with the capability to learn through data and experiences and to perceive the world around us through vision, speech and understanding, we’re excited to see a whole new level of transformation and innovation coming to the forefront. We love learning from and showcasing the cool developers behind these innovations.

To that end, in 2018 Microsoft created the initial AI Idea Challenge to explore how developers were applying AI in meaningful and fascinating ways. As we explored the projects that poured in, it was clear that developers were incredibly inspired by the ability to use AI to positively impact society. This desire is directly aligned with our vision to use AI to empower people to take on some of society’s toughest issues. Voilá, a new developer challenge called the AI for Good Idea Challenge was born!

This challenge is focused on using developer creativity and skills specifically around AI for Good scenarios. Great winning projects from our first AI Idea Challenge, like Angel Eyes and Clean Water AI, helped to inspire more developers than ever to get involved and think up new ways to leverage Microsoft AI to tackle societal issues. I have been amazed by the sheer numbers and pure creativity of the ideas from developers across the globe. Ready to be inspired? Take a look at the highlight video to get an idea of the breadth of ideas that came in.

YouTube Video

data-video-id=”c8l7AqTmLEw”>

To help us select winners of the AI for Good Idea Challenge, we brought together a team of judges to evaluate each entry against three criteria: originality of impact, complexity to implement and solution feasibility. With such passion and creativity represented in work of these talented developers, it was very hard to pick the winners. My deepest gratitude goes out to all who entered. Thank you!

And now, I’m thrilled to share the winners of the AI for Good Idea Challenge:

First place: CardioVision, by Bohdan Petryshak, is an AI solution that can help patients at risk of coronary artery disease live a better life. This non-invasive screening measures the stiffness of the brachial artery in your arm, which correlates to stiff and even clogged coronary arteries that can lead to heart disease. By detecting artery defects and disease up to three times faster, patients are equipped for better heart attack prevention.

Second place: LeafAI, by Maanasa Mendu, identifies 38 classes of biotic plant disease from a basic smartphone picture – with an astounding 90% accuracy rate. The homogeneity of the current agriculture system combined with the effects of climate change has led to a growing threat of plant disease, contributing to malnutrition in nearly 700,000 people around the world. LeafAI’s technology can help identify plant diseases and provide information about treatment, taking us one step closer to better economic and food security.

Third place: OrganSecure, by Pratik Mohapatra, is a sophisticated set of machine learning algorithms that can quickly match organ donors and provide real-time updates with people in need of a transplant. Using health parameters such as blood group and antigen type, it becomes possible to predict the match of an organ and estimate the rank and time required for an awaiting recipient. Not only would this help people waiting for organs, but it would also make the host-donor matching process more transparent.

You can learn more about the winning projects here.

We were incredibly fortunate to have four stellar judges for our first AI for Good Idea Challenge who evaluated the projects and had the tough job of selecting the winners. Thank you to our judges: Stephen Ibaraki, Wendy Chisholm, Alma Cardena and David Carmona.

CONGRATULATIONS to each of our winners! Thank you to all the developers who took the time to share and submit their great ideas for the challenge. We can’t wait to do it again!

Related:

Posted on Leave a comment

Microsoft acquires BlueTalon, simplifying data privacy and governance across modern data estates

The data landscape has changed rapidly over the past few years, enabling tremendous opportunity for enterprises to digitally transform. Data estates are increasingly diverse with fit-for-purpose systems (NoSQL, RDBMs, Data Lakes & Big Data, SaaS apps, etc.) spanning on-premises and cloud environments capable of processing data of all shapes and sizes. This rapid evolution has empowered data professionals including data engineers, data scientists and data analysts to do much more, but at the same time has vastly increased the size and diversity of data estates, making data management and governance harder than ever. In fact, 57 percent of Gartner survey respondents cited “supporting data governance and data security” as one of the biggest challenges for their data management practice.1

At the heart of any digital transformation is making data discovery, access and use simple, secure, compliant and trustworthy. Data privacy is one of the defining issues of our time, as evidenced by the introduction and evolution of privacy laws across the globe (e.g., GDPR, CCPA, etc.). As technology becomes more engrained in our lives and our work, it must be simple to understand and control what data is collected and easily manage who has access to that data and for what purpose.

Today we are excited to announce the acquisition of BlueTalon, a leading provider of Unified Data Access Control solutions for modern data platforms. BlueTalon works with leading Fortune 100 companies to eliminate data security blind spots and gain visibility and control of data. BlueTalon provides a customer-proven, data-centric solution for data access management and auditing across the diverse systems resident in modern data estates.

The IP and talent acquired through BlueTalon brings a unique expertise at the apex of big data, security and governance. This acquisition will enhance our ability to empower enterprises across industries to digitally transform while ensuring right use of data with centralized data governance at scale through Azure.

Together with BlueTalon, we are committed to help enterprises become data-driven companies in a secure and compliant manner. We’re excited to welcome the BlueTalon team to Microsoft and can’t wait to get started. For more information, please see BlueTalon CEO Eric Tilenius’ blog post.

¹ Gartner Survey Analysis: Data Management Is Pressed Between Support for Analytics — and Data Governance, Risk and Compliance, Figure 3, Roxane Edjlali, March 22, 2018

Tags:

Posted on Leave a comment

General availability for the Azure Security Center for IoT announced

As organizations pursue digital transformation by connecting vital equipment or creating new connected products, IoT deployments will get bigger and more common. In fact, IDC forecasts that IoT will continue to grow at double digit rates until IoT spending surpasses $1 trillion in 2022. As these IoT deployments come online, newly connected devices will expand the attack surface available to attackers, creating opportunities to target the valuable data generated by IoT.

Organizations understand the risks and are rightly worried about IoT. Bain’s research shows that security concerns are the top reason organizations have slowed or paused IoT rollouts*. Because IoT requires integrating many different technologies (heterogenous devices must be linked to IoT cloud services that connect to analytics services and business applications), organizations face the challenge of securing both the pieces of their IoT solution and the connections between those pieces. Attackers target weak spots; even one weak device configuration, cloud service, or admin account can provide a way into your solution. Your organization must monitor for threats and misconfigurations across all parts of your IoT solution: devices, cloud services, the supporting infrastructure, and the admin accounts who access them.

To give your organization IoT threat protection and security posture management across your entire IoT solution, we’re announcing the general availability of Azure Security Center for IoT. Azure Security Center allows you to protect your end-to-end IoT deployment by identifying and responding to emerging threats, as well as finding issues in your configurations before attackers can use them to compromise your deployment. As organizations use Azure Security Center for IoT to manage their security roadblocks, they remove the barriers keeping them from business transformation:

“With Azure Security Center for IoT, we can both address very real IoT threat models with the velocity of Azure and gain management control over the fastest scaling part of our business, which allows me to focus on delivering outcomes rather than hot fixing devices.” – Alex Kreilein, CISO RapidDeploy

Building secure IoT solutions with Azure Security Center

Securing IoT is challenging for many reasons: IoT deployments are complicated, creating opportunity for integration errors that attackers can exploit; IoT devices are heterogenous and often lack proper security measures; organizations may not have the skillsets or SecOps headcount to take on a new IoT security workload; and IoT deployments are difficult to monitor using traditional IT security tools. When organizations choose Microsoft for their IoT deployments, however, they get secure-by-design devices and services such as Azure Sphere and IoT Hub, end-to-end integration and monitoring from device to cloud, and the expertise from Microsoft and our partners to build a secure solution that meets their exact use case.

Azure Security Center for IoT builds on Microsoft’s secure-by-design IoT services with threat protection and security posture management designed for securing entire IoT deployments, including Microsoft and 3rd party devices. Azure Security Center is the first IoT security service from a major cloud provider that enables organizations to prevent, detect, and help remediate potential attacks on all the different components that make up an IoT deployment: from small sensors, to edge computing devices and gateways, to Azure IoT Hub, and on to the compute, storage, databases, and AI/ML workloads that organizations connect to their IoT deployments. This end-to-end protection is vital to secure IoT deployments. Although devices may be a common target for attackers, the services that store your data and the admins who manage your IoT solution are also valuable targets.

An image showing the Overview tab in Azure Security Center.

As IoT threats evolve due to creative attackers analyzing the new devices, use cases, and applications the industry creates, Microsoft’s unique threat intelligence, sourced from the more than 6 trillion signals that Microsoft collects every day, keeps your organization ahead of attackers. Azure Security Center creates a list of potential threats, ranked by importance, so security pros and IoT admins can remediate problems across devices, IoT services, connected Azure services, and the admins who use them.

Azure Security Center also creates ranked lists of possible misconfigurations and insecure settings, allowing IoT admins and security pros to fix the most important issues in their IoT security posture first. To create these security posture suggestions, Azure Security Center draws from Microsoft’s unique threat intelligence, as well as the industry standards. Customers can also port their data into SIEMs such as Azure Sentinel, allowing security pros to combine IoT security data with data from across the organization for artificial intelligence or advanced analysis.

Organizations can monitor their entire IoT solution, stay ahead of evolving threats, and fix configuration issues before they become threats. When combined with Microsoft’s secure-by-design devices, services, and the expertise we share with you and your partners, Azure Security Center for IoT provides an important way to reduce the risk of IoT while achieving your business goals. 

Next steps

*Used with permission from Bain & Company

Posted on Leave a comment

How Microsoft 365 can help health providers adapt in an era of patient data protection and sharing

For years, patient data management meant one thing—secure the data. Now, healthcare leaders must protect and openly share the data with patients and with other healthcare organizations to support quality of care, patient safety, and cost reduction. As data flows more freely, following the patient, there’s less risk of redundant testing that increases cost and waste. Legacy infrastructure and cybersecurity concerns stand on the critical path to greater interoperability and patient record portability. Learn how Microsoft 365 can help.

Impact of regulatory changes and market forces

Regulatory changes are a big driver for this shift. Through regulations like the 21st Century Cures Act in the United States, healthcare organizations are required to improve their capabilities to protect and share patient data. The General Data Protection Regulation (GDPR) in the European Union expands the rights of data subjects over their data. Failing to share patient data in an effective, timely, and secure manner can result in significant penalties for providers and for healthcare payors.

Market forces are another driver of this shift as consumers’ expectations of omni-channel service and access spill over to healthcare. This augurs well for making the patient more central to data flows.

There are unintended consequences, however. The increasing need to openly share data creates new opportunities for hackers to explore, and new risks for health organizations to manage.

It’s more important than ever to have a data governance and proactive cybersecurity strategy that enables free data flow with an optimal security posture. In fact, government regulators will penalize healthcare organizations for non-compliance—and so will the marketplace.

How Microsoft 365 can prepare your organization for the journey ahead

Modernizing legacy systems and processes is a daunting, expensive task. Navigating a digitized but siloed information system is costly, impedes clinician workflow, and complicates patient safety goals.

To this end, Microsoft Teams enables the integration of electronic health record information and other health data, allowing care teams to communicate and collaborate about patient care in real-time. Leading interoperability partners continue to build the ability to integrate electronic health records into Teams through a FHIR interface. With Teams, clinical workers can securely access patient information, chat with other team members, and even have modern meeting experiences, all without having to switch between apps.

Incomplete data and documentation are among the biggest sources of provider and patient dissatisfaction. Clinicians value the ability to communicate with each other securely and swiftly to deliver the best informed care at point of care.

Teams now offers new secure messaging capabilities, including priority notifications and message delegation, as well as a smart camera with image annotation and secure sharing, so images stay in Teams and aren’t stored to the clinician’s device image gallery.

Image of phone screens showing priority notifications and message delegation.

What about cybersecurity and patient data? As legacy infrastructure gives way to more seamless data flow, it’s important to protect against a favorite tactic of cyber criminals—phishing.

Phishing emails—weaponized emails that appear to come from a reputable source or person—are increasingly difficult to detect. As regulatory pressure mounts within healthcare organizations to not “block” access to data, the risk of falling for such phishing attacks is expected to increase. To help mitigate this trend, Office 365 Advanced Threat Protection (ATP) has a cloud-based email filtering service with sophisticated anti-phishing capabilities.

For example, Office 365 ATP provides real-time detonation capabilities to find and block unknown threats, including malicious links and attachments. Links in email are continuously evaluated for user safety. Similarly, any attachments in email are tested for malware and unsafe attachments are removed.

Image of a message appearing on a tablet screen showing a website that has been classified as malicious.

For data to flow freely, it’s important to apply the right governance and protection to sensitive data. And that is premised on appropriate data classification. Microsoft 365 helps organizations find and classify sensitive data across a variety of locations, including devices, apps, and cloud services with Microsoft Information Protection. Administrators need to know that sensitive data is accessed by authorized personnel only. Microsoft 365, through Azure Active Directory (Azure AD), enables capabilities like Multi-Factor Authentication (MFA) and conditional access policies to minimize the risk of unauthorized access to sensitive patient information.

For example, if a user or device sign-in is tagged as high-risk, Azure AD can automatically enforce conditional access policies that can limit or block access or require the user to re-authenticate via MFA. Benefitting from the integrated signals of the Microsoft Intelligent Security Graph, Microsoft 365 solutions look holistically at the user sign-in behavior over time to assess risk and investigate anomalies where needed.

When faced with the prospect of internal leaks, Supervision in Microsoft 365 can help organizations monitor employees’ communications channels to manage compliance and reduce reputational risk from policy violations. As patient data is shared, tracking its flow is essential. Audit log and alerts in Microsoft 365 includes several auditing and reporting features that customers can use to track certain activity such as changes made to documents and other items.

Finally, as you conform with data governance regulatory obligations and audits, Microsoft 365 can assist you in responding to regulators. Advanced eDiscovery and Data Subject Requests (DSRs) capabilities offer the agility and efficiency you need when going through an audit, helping you find relevant patient data or respond to patient information requests.

Using the retention policies of Advanced Data Governance, you can retain core business records in unalterable, compliant formats. With records management capabilities, your core business records can be properly declared and stored with full audit visibility to meet regulatory obligations.

Learn more

Healthcare leaders must adapt quickly to market and regulatory expectations regarding data flows. Clinical and operations leaders depend on data flowing freely to make data-driven business and clinical decisions, to understand patterns in patient care and to constantly improve patient safety, quality of care, and cost management.

Microsoft 365 helps improve workflows through the integration power of Teams, moving the right data to the right place at the right time. Microsoft 365 also helps your security and compliance posture through advanced capabilities that help you manage and protect identity, data, and devices.

Microsoft 365 is the right cloud platform for you in this new era of patient data protection—and data sharing. Check out the Microsoft 365 for health page to learn more about how Microsoft 365 and Teams can empower your healthcare professionals in a modern workplace.

Posted on Leave a comment

New machine learning model sifts through the good to unearth the bad in evasive malware

We continuously harden machine learning protections against evasion and adversarial attacks. One of the latest innovations in our protection technology is the addition of a class of hardened malware detection machine learning models called monotonic models to Microsoft Defender ATP‘s Antivirus.

Historically, detection evasion has followed a common pattern: attackers would build new versions of their malware and test them offline against antivirus solutions. They’d keep making adjustments until the malware can evade antivirus products. Attackers then carry out their campaign knowing that the malware won’t initially be blocked by AV solutions, which are then forced to catch up by adding detections for the malware. In the cybercriminal underground, antivirus evasion services are available to make this process easier for attackers.

Microsoft Defender ATP’s Antivirus has significantly advanced in becoming resistant to attacker tactics like this. A sizeable portion of the protection we deliver are powered by machine learning models hosted in the cloud. The cloud protection service breaks attackers’ ability to test and adapt to our defenses in an offline environment, because attackers must either forgo testing, or test against our defenses in the cloud, where we can observe them and react even before they begin.

Hardening our defenses against adversarial attacks doesn’t end there. In this blog we’ll discuss a new class of cloud-based ML models that further harden our protections against detection evasion.

Most machine learning models are trained on a mix of malicious and clean features. Attackers routinely try to throw these models off balance by stuffing clean features into malware.

Monotonic models are resistant against adversarial attacks because they are trained differently: they only look for malicious features. The magic is this: Attackers can’t evade a monotonic model by adding clean features. To evade a monotonic model, an attacker would have to remove malicious features.

Monotonic models explained

Last summer, researchers from UC Berkeley (Incer, Inigo, et al, “Adversarially robust malware detection using monotonic classification”, Proceedings of the Fourth ACM International Workshop on Security and Privacy Analytics, ACM, 2018) proposed applying a technique of adding monotonic constraints to malware detection machine learning models to make models robust against adversaries. Simply put, the said technique only allows the machine learning model to leverage malicious features when considering a file – it’s not allowed to use any clean features.

Figure 1. Features used by a baseline versus a monotonic constrained logistic regression classifier. The monotonic classifier does not use cleanly-weighted features so that it’s more robust to adversaries.

Inspired by the academic research, we deployed our first monotonic logistic regression models to Microsoft Defender ATP cloud protection service in late 2018. Since then, they’ve played an important part in protecting against attacks.

Figure 2 below illustrates the production performance of the monotonic classifiers versus the baseline unconstrained model. Monotonic-constrained models expectedly have lower outcome in detecting malware overall compared to classic models. However, they can detect malware attacks that otherwise would have been missed because of clean features.

Figure 2. Malware detection machine learning classifiers comparing the unconstrained baseline classifier versus the monotonic constrained classifier in customer protection.

The monotonic classifiers don’t replace baseline classifiers; they run in addition to the baseline and add additional protection. We combine all our classifiers using stacked classifier ensembles–monotonic classifiers add significant value because of the unique classification they provide.

How Microsoft Defender ATP uses monotonic models to stop adversarial attacks

One common way for attackers to add clean features to malware is to digitally code-sign malware with trusted certificates. Malware families like ShadowHammer, Kovter, and Balamid are known to abuse certificates to evade detection. In many of these cases, the attackers impersonate legitimate registered businesses to defraud certificate authorities into issuing them trusted code-signing certificates.

LockerGoga, a strain of ransomware that’s known for being used in targeted attacks, is another example of malware that uses digital certificates. LockerGoga emerged in early 2019 and has been used by attackers in high-profile campaigns that targeted organizations in the industrial sector. Once attackers are able breach a target network, they use LockerGoga to encrypt enterprise data en masse and demand ransom.

Figure 3. LockerGoga variant digitally code-signed with a trusted CA

When Microsoft Defender ATP encounters a new threat like LockerGoga, the client sends a featurized description of the file to the cloud protection service for real-time classification. An array of machine learning classifiers processes the features describing the content, including whether attackers had digitally code-signed the malware with a trusted code-signing certificate that chains to a trusted CA. By ignoring certificates and other clean features, monotonic models in Microsoft Defender ATP can correctly identify attacks that otherwise would have slipped through defenses.

Very recently, researchers demonstrated an adversarial attack that appends a large volume of clean strings from a computer game executable to several well-known malware and credential dumping tools – essentially adding clean features to the malicious files – to evade detection. The researchers showed how this technique can successfully impact machine learning prediction scores so that the malware files are not classified as malware. The monotonic model hardening that we’ve deployed in Microsoft Defender ATP is key to preventing this type of attack, because, for a monotonic classifier, adding features to a file can only increase the malicious score.

Given how they significantly harden defenses, monotonic models are now standard components of machine learning protections in Microsoft Defender ATP‘s Antivirus. One of our monotonic models uniquely blocks malware on an average of 200,000 distinct devices every month. We now have three different monotonic classifiers deployed, protecting against different attack scenarios.

Monotonic models are just the latest enhancements to Microsoft Defender ATP’s Antivirus. We continue to evolve machine learning-based protections to be more resilient to adversarial attacks. More effective protections against malware and other threats on endpoints increases defense across the entire Microsoft Threat Protection. By unifying and enabling signal-sharing across Microsoft’s security services, Microsoft Threat Protection secures identities, endpoints, email and data, apps, and infrastructure.

Geoff McDonald (@glmcdona),Microsoft Defender ATP Research team
with Taylor Spangler, Windows Data Science team


Talk to us

Questions, concerns, or insights on this story? Join discussions at the Microsoft Defender ATP community.

Follow us on Twitter @MsftSecIntel.

Posted on Leave a comment

Co-hosts revealed for Sept. 28 MINECON Live event

Got any plans on September 28th? Meeting friends? Getting married? Watching paint dry? Well, CANCEL THEM ALL (unless it’s the marriage one) because September 28th is the date of MINECON Live, our epic livestream celebration of all things Minecraft! It’ll be easy to stream  LIVE all over the world, including at that aforementioned wedding. Don’t forget to scowl at anyone who objects and to tell the bride and groom to keep the volume down with those vows — you’re trying to enjoy all the new Minecraft announcements.

This handy page has loads of info about MINECON Live, but the page you’re currently on is no MINECON Live dunce either. Because today, we’re revealing the co-hosts, for the very first time! (Unless you follow us on Twitter!). Let’s meet the fabulous foursome who’ll be co-hosting with Lydia Winters:

MASUO

Japanese Influencer and a strong contender for ‘smiliest man ever filmed’, Masuo will be co-hosting MINECON Live! But what’s his favourite skill in Minecraft? What block would he like to see added to the game? What’s the meaning of life? Watch Masuo answer two-thirds of those questions in the video below!

Posted on Leave a comment

The stories behind Microsoft’s affordable housing initiative

The Puget Sound region has been home to Microsoft for more than 30 years. As the company has grown, the area has changed. New industries have brought more jobs, fresh opportunities and greater prosperity. 

But new housing has not kept up with job growth, and the Greater Seattle area has become the sixth most expensive place to live in the United States.  

That means many of the workers who make a community function – such as nurses, police officers, teachers and firefighters – can no longer afford to live in the cities or suburbs where they work. 

Chart showing Job growth compared to housing growth

The problem is particularly acute in the suburban cities around Seattle. Low- and middle-income workers often face long commutes.

[Subscribe to Microsoft on the Issues for more on the topics that matter most.]

Microsoft is committed to helping kick-start solutions to this crisis, and is  investing $500 million to advance affordable housing solutions. Microsoft is also advocating for changes in public policy at city and state levels to address the long-term factors affecting housing affordability.

This commitment is about more than housing. It is about the people who make our communities places we all want to live in.

For more on Microsoft’s initiatives in the Puget Sound region follow @MSFTIssues on Twitter.  

Posted on Leave a comment

At global Hackathon, customers break something to make something

Summer is a time for growth. Whether you’re traveling to an historical destination or picking out a book for the beach, the season is ripe for taking a break from the grind to focus on introspection and renewal, to make new friends, re-connect with old ones, and create shared experiences together. With any luck, come autumn you have a sharpened mind and a greater sense of where you want to go next.

Which is why summer is the ideal time for the Microsoft global Hackathon. Minds will be sharpened, advancement made tangible, and friends with diverse backgrounds will be brought together to create shared experiences.

By now you’re probably aware of the 27,000 employees who gather at Microsoft’s Redmond, Washington campus and 45 venues around the world, embracing the event (part of One Week – a series celebrating the company’s people, products and ideas) as a platform for innovation. But at the 6th annual installment, there’s another rapidly growing segment that deserves its own spotlight: customer collaborations.

Two participants wave
More than 30 customer teams join 27,000 Microsoft employees at the 2019 Microsoft global Hackathon. (Photo by Scott Eklund, Red Box Pictures)

“We started inviting customers two years ago,” explains Susie Kandzor, group program manager at The Garage, an experimentation and growth program at Microsoft that produces the Hackathon to further its mission of encouraging collaboration, creativity and experimentation. “In 2017, we only had four customers join us. Last year we had 10 customers join us, and the feedback from executive leadership was that they loved it and wanted more.”

For the 2019 installment, the largest private hackathon on the planet welcomes some 30 companies (a dozen more will participate around the globe). Each sends three to five representatives, cross-functionality encouraged, arriving with wildly diverse business hurdles they hope to jump – and confidence that the latest technological breakthroughs can get them there.

“This is how we channel innovation into a focused effort,” says Angela Yochem, executive vice president/chief digital and technology officer for Novant Health, a network of healthcare providers that attended the global Hackathon in 2018 and is sending two teams this year from their offices in North Carolina.

“Remember in the movie ‘Apollo 13,’ where there’s something wrong with the spacecraft and all the engineers get together, spill parts all over a table, and using their past experiences and backgrounds, solve the problem? A Hackathon is that, on steroids.”

A doctor uses a touch-screen device to consult with a patient.
By leveraging technology, Novant Health is improving the health of its community. (Photo courtesy of Novant Health)

“We’re going to talk about the art of the possible,” agrees Kirk Windisch, Novant Health’s vice president of Digital Products and Services. “I’m excited to find solutions that we haven’t even thought of yet.”

The 2019 list of customer attendees is as diverse as it is impressive. Where else could you find 3M, Starbucks, Mastercard and Blackbaud under one roof? From meals (Nestle) to electricity (Chesapeake Energy) to investments (Vanguard), you’d be hard-pressed to find a greater range of industries innovating alongside one another.

“In the past we’ve seen a lot of instances where companies talk between themselves, and the Microsoft Hackathon has introduced different companies to one another. We’re just humbled by the enthusiasm our customers have toward hacking, and honored that these customers have given us the opportunity to help develop their growth ideas,” Kandzor says of the Hackathon’s unique atmosphere.

One customer attending Hackathon 2019 is Bellevue, Washington-based T-Mobile – a company with over 80 million customers and annual revenues of $43 billion – wearing their self-proclaimed moniker of “The Un-carrier” with disruptive pride. Principal analyst Sarah O’Brien says T-Mobile is perfectly positioned for the Hackathon experience.

Two T-Mobile employees collaborate at a workstation.
T-Mobile employees, who proudly sport their branded black and magenta, are encouraged to share ideas that lead to new technology solutions. (Photo courtesy of T-Mobile)

“I was at a conference not long ago, and my takeaway was the sheer volume of publishing, whitepapers and patents around machine learning and AI coming out of Microsoft ­– the true investment in it – and the notion that rather than treating it like a buzzword, there is thought leadership and movement to drive it forward for everyone,” she says.

“Our companies have a lot of shared experience and recognition that what made you successful in the past does not guarantee success in the future, so I’m excited that we can put these great teams together and build something impactful.”

Novant Health has over 650 locations in five states, and provides increased access to care through digital channels, and through advanced tech in their hospitals and physician centers. “We just deployed an AI-based system for treating stroke patients faster than ever before,” says Yochem, citing one exciting example. “With a stroke victim, every minute matters, and now we are able to save many more lives. It’s an example of how leveraging technology can impact the health of our community.”

Two Novant Health employees consult monitors at a nursing station.
Novant Health team members train on new technology at patient check-in. (Photo courtesy of Novant Health)

And while Novant Health’s goal is nothing short of saving lives, other companies may simply seek to improve the quality of life.

“We’re empowered to achieve more, simply by combining forces,” says Jan-Jaap Oosterwijk, global head of innovation for digital platform security firm Irdeto, who is flying in with his team from The Netherlands. “I love the diversity of the event. I also really like that in the invitation, it was specified that the team doesn’t need to consist of engineers only. The Hackathon is open to people from any background, which will provide a wide range of perspectives.”

There are a lot of great brains working together at the global Hackathon, using a variety of technologies (last year, efforts focused on everything from artificial technology to sustainable farming). Much like a summer cookout, each customer brings their own specialty – in this case, a hack.

Posted on Leave a comment

Office 365 now available from new South Africa cloud datacenters

As Microsoft strives to support the digital transformation of organizations and enterprises around the world, we continue to drive innovation and expand into new geographies to empower more customers with Office 365, the world’s leading cloud-based productivity solution, with more than 180 million commercial monthly active users. Today, we’re taking another step in our ongoing investment to help enable digital transformation and societal impact across Africa with the general availability of Office 365 services from our new cloud datacenters in South Africa.

Office 365, delivered from local datacenters in South Africa, helps our customers enable the modern workplace and empower their employees with real-time collaboration and cloud-powered intelligence while maintaining security, compliance, and in-country customer data residency. The addition of South Africa as a new geography for Office 365 increases the options for secure, cloud productivity services combined with customer data residency in 16 geographies across the globe along with three additional geographies also announced.

In-country data residency for core customer data helps Office 365 customers meet regulatory requirements, which is particularly important and relevant in industries such as healthcare, financial services, and government—where organizations need to keep specific data in-country to comply with local requirements. Customer data residency provides additional assurances regarding data privacy and reliability for organizations and enterprises. Core customer data is stored only in their datacenter geography (Geo)—in this case, the cloud datacenters within South Africa.

Customers like Altron and the Gauteng Provincial Government have used Office 365 to transform their workplaces. This latest development will enable them—and other organizations and enterprises adopting Office 365—to ramp up their digital transformation journey.

“Altron is committed to improving our infrastructure and embracing a strategy to become a cloud-first company to better serve our customers and empower our employees through modern collaboration. We’ve noticed a tangible difference since making the move to Office 365.”
—Debra Marais, Lead, IT Shared Services at Altron

“Office 365 is driving our modernization journey of Government ICT infrastructure and services by allowing us to develop pioneering solutions at manageable costs and create overall improvements in operations management, all while improving transparency and accountability.”
—David Kramer, Deputy Director General, ICT at Gauteng Provincial Government

Microsoft recently became the first global provider to deliver cloud services from the African continent with the opening of our new cloud datacenter regions. Office 365 joins Azure to expand the intelligent cloud service available from Africa. Dynamics 365 and Power Platform, the next generation of intelligent business applications, are anticipated to be available in the fourth quarter of 2019.

By delivering the comprehensive Microsoft cloud—which includes Azure, Office 365, and Dynamics 365—from datacenters in a given geography, we offer scalable, available, and resilient cloud services to companies and organizations while meeting customer data residency, security, and compliance needs. We have deep expertise in protecting data and empowering customers around the globe to meet extensive security and privacy requirements, including offering the broadest set of compliance certifications and attestations in the industry.

The new cloud regions in South Africa are connected to Microsoft’s other regions via our global network, one of the largest and most innovative on the planet—spanning more than 100,000 miles (161,000 kilometers) of terrestrial fiber and subsea cable systems to deliver services to customers. Microsoft is bringing the global cloud closer to home for African organizations and citizens through our trans-Arabian paths between India and Europe, as well as our trans-Atlantic systems, including Marea, the highest capacity cable to ever cross the Atlantic.

We’re committed to accelerating digital transformation across the continent through numerous initiatives and also recently announced Microsoft’s first Africa Development Centre (ADC), with two initial sites in Nairobi, Kenya and Lagos, Nigeria. The ADC will serve as a premier center of engineering for Microsoft, where world-class African talent can create solutions for local and global impact. With our new cloud datacenter regions, the ADC, and programs like 4Afrika, we believe Africa is poised to develop locally and scale for global impact better than ever before.

Learn more about Office 365 and Microsoft in the Middle East and Africa.

Posted on Leave a comment

Accelerating innovation with Dynamics 365 and the Power Platform

Every year, we bring together thousands of Microsoft partners from around the world to celebrate, connect, and learn about what’s coming in the next year. Just last week, I had the chance to join this year’s Microsoft Inspire with 13,000 of our partners in Las Vegas, and it was an amazing week full of energy and excitement.

I had the opportunity to share how we’re accelerating innovation with Dynamics 365 and the Power Platform in two featured sessions. Hayden Stafford joined me to talk about the business opportunity in FY20 for Business Applications, and Charles Lamanna and Arun Ulagaratchagan showed off the innovation and partner investments across the Power Platform. In both sessions, partners from Hitachi Solutions, VeriPark, WorkSpan, and EY joined me on stage to talk about the opportunities they’re seeing in the market. Check out the session recordings to see more.

We also shared a few major announcements with the partner community throughout the week that will deepen our partnership, align with how our business is growing, and help customers realize the potential of digital transformation. Take a look at a few highlights below.

Launching the new Microsoft Business Applications ISV Connect Program

ISVs that build on Microsoft Dynamics 365 and PowerApps can offer their customers innovative apps they couldn’t build elsewhere using connections to industry-leading cloud services on Azure and developer tools built just for them.

After previewing elements of the program in the spring, we officially launched the Business Applications ISV Connect Program on July 15th. This program brings together platform and program benefits created specifically for ISVs to support their success. We’re laying a path for a stronger partnership with our ISVs through ongoing platform investments, development tooling enhancements, and go-to-market support for mutual success. Read Steven Guggenheimer’s blog for more information about the program’s requirements and benefits.

Expanding our Dynamics 365 Industry Accelerators

We know our partners want to go to market fast. Our industry accelerators help them do just that.

At Inspire, we introduced two new industry accelerators: the Dynamics 365 Automotive Accelerator and Dynamics 365 Banking Accelerator. We also announced significant updates to the Dynamics 365 Nonprofit Accelerator.

Each of these accelerators was developed in deep partnership with industry experts to provide pre-built dashboards, sample data, and workflows that align with common industry scenarios. Steven Guggenheimer’s blog has more on this update as well.

Updating our Dynamics 365 packaging model

In October, Microsoft will be moving from “one-size-fits-all” Microsoft Dynamics 365 licensing plans to focus on providing customers with the specific Dynamics 365 applications that meet the unique needs of their organization. Customers need software that aligns to their functional roles and scenarios, and they require the ability to add or remove applications as their company grows and changes over time. The new licensing model will allow customers to purchase the applications they need, when they need them. Each application is extensible and applications can be easily mixed and matched to configure integrated solutions that align to a customer’s unique business requirements.

To learn more about these new options for your customers, check out the Inspire sessions “Customer Engagement Licensing Updates” and “Unified Operations Licensing Updates.”

Introducing new licensing options for PowerApps and Microsoft Flow

Over the past few months, we’ve announced a set of continued investments in the Power Platform and vision for one connected platform that enables everyone, regardless of their skill set or background, to innovate.

In addition to the general availability of innovations like AI Builder and PowerApps Portals, we will be introducing new licensing options in October 2019 shaped by the feedback we’ve received from our customers and the community of makers and creators who have been with us on the Power Platform journey. At Inspire we previewed new licensing options for PowerApps and Microsoft Flow that:

  • Make it easier to get started with a single use case before rolling out the full platform for all users.
  • Make licensing easier to understand by simplifying the complex feature-level differences between P1 and P2 plans.

To learn more about these new options for your customers, check out the Inspire session Microsoft Power Platform business model and licensing updates or read the PowerApps community blog post with additional details.

Customers realizing the potential of digital transformation

Throughout the event, we heard inspiring stories from customers and partners around the world.

One highlight came in Monday’s Corenote with Judson Althoff. We saw how Unilever is transforming its business with Microsoft technology, including Power BI and PowerApps. With connected data at the core, Unilever is able to increase productivity with more accessible insights and empower individuals to solve problems on their own, without a developer.

On Wednesday, Satya Nadella talked about Crane Worldwide Logistics, a Dynamics 365 customer who grew from a startup to a major player in the global logistics industry over the past 10 years. With Dynamics 365 for Sales and LinkedIn Sales Navigator, Crane can seamlessly combine customer engagement data with data about customer and seller activities from Office 365, as well as from LinkedIn – even when these interactions take place outside their CRM. And with Dynamics 365 Sales Insights, sellers are able to focus on the right customers, thanks to AI-driven insights that flag existing accounts that need extra attention, as well as leads that offer the most potential.

These are just two of the stories we shared at Microsoft Inspire this year. If you missed any part of this year’s event, take some time to check out the content on-demand to learn how you can build success in the coming year.