Posted on Leave a comment

New updates to Azure AI boost business productivity, expand dev capabilities

As companies increasingly look to transform their businesses with AI, we continue to add improvements to Azure AI to make it easy for developers and data scientists to deploy, manage, and secure AI functions directly into their applications with a focus on the following solution areas:

  1. Leveraging machine learning to build and train predictive models that improve business productivity with Azure Machine Learning.
  2. Applying an AI-powered search experience and indexing technologies that quickly find information and glean insights with Azure Search.
  3. Building applications that integrate pre-built and custom AI capabilities like vision, speech, language, search, and knowledge to deliver more engaging and personalized experiences with our Azure Cognitive Services and Azure Bot Service.

Today, we’re pleased to share several updates to Azure Cognitive Services that continue to make Azure the best place to build AI. We’re introducing a preview of the new Anomaly Detector Service which uses AI to identify problems so companies can minimize loss and customer impact. We are also announcing the general availability of Custom Vision to more accurately identify objects in images. 

From using speech recognition, translation, and text-to-speech to image and object detection, Azure Cognitive Services makes it easy for developers to add intelligent capabilities to their applications in any scenario. To this date more than a million developers have already discovered and tried Cognitive Services to accelerate breakthrough experiences in their application.

Anomaly detection as an AI service

Anomaly Detector is a new Cognitive Service that lets you detect unusual patterns or rare events in your data that could translate to identifying problems like credit card fraud.

Today, over 200 teams across Azure and other core Microsoft products rely on Anomaly Detector to boost the reliability of their systems by detecting irregularities in real-time and accelerating troubleshooting. Through a single API, developers can easily embed anomaly detection capabilities into their applications to ensure high data accuracy, and automatically surface incidents as soon as they happen.

Common use case scenarios include identifying business incidents and text errors, monitoring IoT device traffic, detecting fraud, responding to changing markets, and more. For instance, content providers can use Anomaly Detector to automatically scan video performance data specific to a customer’s KPIs, helping to identify problems in an instant. Alternatively, video streaming platforms can apply Anomaly Detector across millions of video data sets to track metrics. A missed second in video performance can translate to significant revenue loss for content providers that monetize on their platform.

Custom Vision: automated machine learning for images

With the general availability of Custom Vision, organizations can also transform their business operations quickly and accurately identifying objects in images.

Powered by machine learning, Custom Vision makes it easy and fast for developers to build, deploy, and improve custom image classifiers to quickly recognize content in imagery. Developers can train their own classifier to recognize what matters most in their scenarios, or export these custom classifiers to run them offline and in real time on iOS (in CoreML), Android (in TensorFlow), and many other devices on the edge. The exported models are optimized for the constraints of a mobile device providing incredible throughput while still maintaining high accuracy.

Today, Custom Vision can be used for a variety of business scenarios. Minsur, the largest tin mine in the western hemisphere, located in Peru, applies Custom Vision to create a sustainable mining practice by ensuring that water used in the mineral extraction process is properly treated for reuse on agriculture and livestock by detecting treatment foam levels. They used a combination of Cognitive Services Custom Vision and Azure video analytics to replace a highly manual process so that employees can focus on more strategic projects within the operation.

Screenshot of the Custom Vision platform

Screenshot of the Custom Vision platform, where you can train the model to detect unique objects in an image, such as your brand’s logo.

Starting today, Custom Vision delivers the following improvements:

  • High quality models – Custom Vision features advanced training with a new machine learning backend for improved performance, especially on challenging datasets and fine-grained classification. With advanced training, you can specify a compute time budget and Custom Vision will experimentally identify the best training and augmentation settings.
  • Iterate with ease – Custom Vision makes it simple for developers to integrate computer vision capabilities into applications with 3.0 REST APIs and SDKs. The end to end pipeline is designed to support the iterative improvement of models, so you can quickly train a model, prototype in real world conditions, and use the resulting data to improve the model which gets models to production quality faster.
  • Train in the cloud, run anywhere – The exported models are optimized for the constraints of a mobile device, providing incredible throughput while still maintaining high accuracy. Now, you can also export classifiers to support Azure Resource Manager (ARM) for Raspberry Pi 3 and the Vision AI Dev Kit.

For more information, visit the Custom Vision Service Release Notes.

Get started today

Today’s milestones illustrate our commitment to make the Azure AI platform suitable for every business scenario, with enterprise-grade tools that simplify application development, and industry leading security and compliance for protecting customers’ data.

To get started building vision and search intelligent apps, please visit the Cognitive Services site.

Posted on Leave a comment

New tech hub launches for innovation in the Middle East, partners with Microsoft

Earlier today, the government of Abu Dhabi announced  the launch of Hub71, a new technology hub designed to spur innovation and development in the Middle East. Based in Abu Dhabi, Hub71’s mission is to help start-ups and entrepreneurs develop, scale and build transformational businesses.

HUB71_LogoDevelopment_v1

With Mubadala Investment Company leading Hub71, Microsoft will play a central role as a global technology partner, while SoftBank Vision Fund will leverage its investment networks to create a focal point for tech innovation in the region. Abu Dhabi Global Market, the business enabler completes the ecosystem creating an environment for innovation and entrepreneurial success. Within Hub71 we will host a Microsoft Reactor which will serve as a learning destination for founders and developers to work on tech projects, engage with each other and strengthen their local community while accessing leading technologies and industry experts.

You can find out more about Hub71 here you can read more about Microsoft Reactors here.

Posted on Leave a comment

From Microsoft Defender ATP alert to protecting customers: Follow the journey

With Microsoft continuously improving kernel mitigations and raising the bar for exploiting native kernel components, third-party kernel drivers are becoming a more appealing target for attackers and an important area of research for security analysts. A vulnerability in a signed third-party driver could have a serious impact: it can be abused by attackers to escalate privileges or, more commonly, bypass driver signature enforcement—without the complexity of using a more expensive zero-day kernel exploit in the OS itself.

Computer manufacturers usually ship devices with software and tools that facilitate device management. These software and tools, including drivers, often contain components that run with ring-0 privileges in the kernel. With these components installed by default, each must be as secure as the kernel; even one flawed component could become the Achilles’ heel of the whole kernel security design.

We discovered such a driver while investigating an alert raised by Microsoft Defender Advanced Threat Protection’s kernel sensors. We traced the anomalous behavior to a device management driver developed by Huawei. Digging deeper, we found a lapse in the design that led to a vulnerability that could allow local privilege escalation.

We reported the vulnerability (assigned CVE-2019-5241) to Huawei, who responded and cooperated quickly and professionally. On January 9, 2019, Huawei released a fix. In this blog post, we’d like to share our journey from investigating one Microsoft Defender ATP alert to discovering a vulnerability, cooperating with the vendor, and protecting customers.

Detecting kernel-initiated code injections with Microsoft Defender ATP

Starting in Windows 10, version 1809, the kernel has been instrumented with new sensors designed to trace User APC code injection initiated by a kernel code, providing better visibility into kernel threats like DOUBLEPULSAR. As described in our in-depth analysis, DOUBLEPULSAR is a kernel backdoor used by the WannaCry ransomware to inject the main payload into user-space. DOUBLEPULSAR copied the user payload from the kernel into an executable memory region in lsass.exe and inserted a User APC to a victim thread with NormalRoutine targeting this region.

figure-01-WannaCry-user-APC-injection-technique-schematic-diagram

Figure 1. WannaCry User APC injection technique schematic diagram

While the User APC code injection technique isn’t novel (see Conficker or Valerino’s earliest proof-of-concept), detecting threats running in the kernel is not trivial. Since PatchGuard was introduced, hooking NTOSKRNL is no longer allowed; there’s no documented way drivers could get notification for any of the above operations. Hence, without proper optics, the only sustainable strategy would be applying memory forensics, which can be complicated.

The new set of kernel sensors aim to address this kind of kernel threat. Microsoft Defender ATP leverages these sensors to detect suspicious operations invoked by a kernel code that might lead to code injection into user-mode. One such suspicious operation triggered this investigation.

Investigating an anomalous code injection from the kernel

While monitoring alerts related to kernel-mode attacks, one alert drew our attention:

figure-02-2-Microsoft-Defender-ATP-kernel-initiating-code-injection-alert

Figure 2. Microsoft Defender ATP kernel-initiating code injection alert

The alert process tree showed an abnormal memory allocation and execution in the context of services.exe by a kernel code. Investigating further, we found that an identical alert was fired on another machine around the same time.

To get a better understanding of the observed anomaly, we looked at the raw signals we got from the kernel sensors. This analysis yielded the following findings:

  • A system thread called nt!NtAllocateVirtualMemory allocated a single page (size = 0x1000) with PAGE_EXECUTE_READWRITE protection mask in services.exe address space
  • The system thread then called nt!KeInsertQueueApc to queue User APC to a services.exe arbitrary thread with NormalRoutine pointing to the beginning of the executable page and NormalContext pointing to offset 0x800

The payload copied from kernel mode is divided into two portions: a shellcode (NormalRoutine) and a parameter block (NormalContext). At this point, the overall behavior looked suspicious enough for us to proceed with the hunting. Our goal was to incriminate the kernel code that triggered the alert.

Incriminating the source

In user-mode threats, the caller process context could shed light on the actor and link to other phases in the attack chain. In contrast, with kernel-mode threats, the story is more complicated. The kernel by nature is asynchronous; callbacks might be called in an arbitrary context, making process context meaningless for forensics purposes.

Therefore, we tried to find an indirect evidence to third-party code loaded into the kernel. By inspecting the machine timeline, we found that several third-party drivers were loaded earlier that day.

We concluded based on their file path that they are all related to an app from Huawei called PC Manager, a device management software for Huawei MateBook laptops. The installer is available on Huawei website, so we downloaded it for inspection. For each Huawei driver we used dumpbin.exe to examine imported functions.

And then we had a hit:

figure-03-dumpbin-utility-used-to-detect-user-APC injection-primitives

Figure 3. dumpbin utility used to detect user APC injection primitives

HwOs2Ec10x64.sys: Unexpected behavior from a driver

Hunting led us to the kernel code that triggered the alert. One would expect that a device management software would perform mostly hardware-related tasks, with the supplied device drivers being the communication layer with the OEM-specific hardware. So why was this driver exhibiting unusual behavior? To answer this question, we reverse-engineered HwOs2Ec10x64.sys.

Our entry point was the function implementing the user APC injection. We found a code path that:

  1. allocates RWX page in some target process;
  2. resolves CreateProcessW and CloseHandle function pointers in the address space of the target process;
  3. copies a code area from the driver as well as what seemed to be a parameter block to the allocated page; and
  4. performs User APC injection targeting that page

The parameter block contains both the resolved function pointers as well as a string, which was found to be a command line.

figure-04-User-APC-injection-code

Figure 4. User APC injection code

The APC normal routine is a shellcode which calls CreateProcessW with the given process command line string. This implied that the purpose of the code injection to services.exe is to spawn a child process.

figure-05-User-shellcode-performing-process-creation

Figure 5. User shellcode performing process creation

Inspecting the xrefs, we noticed that the injection code originated from a create-process notify routine when Create = FALSE. Hence, the trigger was some process termination.

But what command does the shellcode execute? Attaching a kernel debugger and setting a breakpoint on the memcpy_s in charge of copying the parameters from kernel to user-mode revealed the created process: one of Huawei’s installed services, MateBookService.exe, invoked with “/startup” in its command line.

figure-06-2-Breakpoint-hit-on-the-call-to-memcpy_s-copying-shellcode-parameters

Figure 6. Breakpoint hit on the call to memcpy_s copying shellcode parameters

Why would a valid service be started that way? Inspecting MateBookService.exe!main revealed a “startup mode” that revived the service if it’s stopped – some sort of watchdog mechanism meant to keep the Huawei PC Manager main service running.

figure-07-MateBookService-exe-startup-code-path

Figure 7. MateBookService.exe /startup code path

At this point of the investigation, the only missing piece in the puzzle was making sure the terminated process triggering the injection is indeed MateBookService.exe.

figure-08-Validating-terminated-process-identity

Figure 8. Validating terminated process identity

The code path that decides whether to inject to services.exe uses a global list of watched process names. Hitting a breakpoint in the iteration loop revealed which process was registered: it was MateBookService.exe, as expected, and it was the only process on that list.

figure-09-Breakpoint-hit-during-process-name-comparison-against-global-list

Figure 9. Breakpoint hit during process name comparison against global list

HwOs2Ec10x64.sys also provided process protection against external tampering. Any attempt to force MateBookService.exe termination would fail with Access Denied.

Abusing HwOs2Ec10x64.sys process watch mechanism

The next step in our investigation was to determine whether an attacker can tamper with the global watched process list. We came across an IOCTL handler that added an entry to that list. MateBookService.exe process likely uses this IOCTL to register itself when the service starts. This IOCTL is sent to the driver control device, created from its DriverEntry.

figure-10-HwOs2Ec10x64.sys-control-device-creation-with-IoCreateDevice

Figure 10. HwOs2Ec10x64.sys control device creation with IoCreateDevice

Since the device object is created with IoCreateDevice, Everyone has RW access to it. Another important observation was that this device isn’t exclusive, hence multiple handles could be opened to it.

Nevertheless, when we tried to open a handle to the device \\.\HwOs2EcX64, it failed with Last Error = 537, “Application verifier has found an error in the current process”. The driver was rejecting our request to open the device. How is access enforced? It must be on the CreateFile path; in other words, in HwOs2Ec10x64.sys IRP_MJ_CREATE dispatch routine.

figure-11-IRP_MJ_CREATE-dispatch-routine

Figure 11. IRP_MJ_CREATE dispatch routine

This function validates the calling process by making sure that the main executable path belongs to a whitelist (e.g., C:\Program Files\Huawei\PCManager\MateBookService.exe). This simple check on the initiating process name, however, doesn’t guarantee the integrity of the calling process. An attacker-controlled instance of MateBookService.exe will still be granted access to the device \\.\HwOs2EcX64 and be able to call some of its IRP functions. Then, the attacker-controlled process could abuse this capability to talk with the device to register a watched executable of its own choice. Given the fact that a parent process has full permissions over its children, even a code with low privileges might spawn an infected MateBookService.exe and inject code into it. In our proof-of-concept, we used process hollowing.

figure-12-Procmon-utility-results-showing-POC-process-start-exit-IL

Figure 12. Procmon utility results showing POC process start/exit & IL

Because watched processes are blindly launched by the watchdog when they’re terminated, the attacker-controlled executable would be invoked as a child of services.exe, running as LocalSystem, hence with elevated privileges.

figure-13-Procexp-utility-process-tree-view-showing-LPE_POC-running-as-LocalSystem

Figure 13. Procexp utility process-tree view showing LPE_POC running as LocalSystem

Responsible disclosure and protecting customers

Once we had a working POC demonstrating the elevation of privilege from a low-integrity attacker-controlled process, we responsibly reported the bug to Huawei through the Microsoft Security Vulnerability Research (MSVR) program. The vulnerability was assigned CVE-2019-5241. Meanwhile, we kept our customers safe by building a detection mechanism that would raise an alert for any successful privilege escalation exploiting the HwOs2Ec10x64.sys watchdog vulnerability as we described.

figure-14-2-Microsoft-Defender-ATP-alerting-on-the-privilege-escalation-POC-code

Figure 14. Microsoft Defender ATP alerting on the privilege escalation POC code

Abusing a second IOCTL handler

Having been able to freely invoke IOCTL handlers of the driver from user-mode, we looked for other capabilities that can be abused. We found one: the driver provided a capability to map any physical page into user-mode with RW permissions. Invoking this handler allowed a code running with low privileges to read-write beyond the process boundaries—to other processes or even to kernel space. This, of course, means a full machine compromise.

We also worked with Huawei to fix this second vulnerability, which was assigned CVE-2019-5242. Huawei addressed the flaw in the same security advisory.

We presented our research at the Blue Hat IL Conference in February. Watch the video recording here, and get the slide deck here.

Summary

The two vulnerabilities we discovered in a driver prove the importance of designing software and products with security in mind. Security boundaries must be honored. Attack surface should be minimized as much as possible. In this case, the flaws could have been prevented if certain precautions were taken:

  • The device object created by the driver should be created with a DACL granting SYSTEM RW access (since only the vendor’s services were communicating directly with the driver)
  • If a service should persist, developers should check that it’s not already provided by the OS before trying to implement a complex mechanism
  • User-mode shouldn’t be allowed to perform privileged operations like writing to any physical page; if needed, the driver should do the actual writing for well-defined, hardware-related scenarios

Microsoft’s driver security checklist provides some guidelines for driver developers to help reduce the risk of drivers being compromised.

Our discovery of the driver vulnerabilities also highlights the strength of Microsoft Defender ATP’s sensors. These sensors expose anomalous behavior and give SecOps personnel the intelligence and tools to investigate threats, as we did.

Anomalous behaviors typically point to attack techniques perpetrated by adversaries with only malicious intent. In this case, they pointed to a flawed design that can be abused. Nevertheless, Microsoft Defender ATP exposed a security flaw and protected customers before it can even be used in actual attacks.

Not yet reaping the benefits of Microsoft Defender ATP’s industry-leading optics and detection capabilities? Sign up for free trial today.

Amit Rapaport (@realAmitRap)
Microsoft Defender Research team

Posted on Leave a comment

On World Water Day, Microsoft is delivering new approaches to ensure we leave no one behind

Today is World Water Day, and this year the theme is “Leaving no one behind.” This is a phrase oft-invoked, but it is particularly important when it comes to water because we are currently leaving 900 million people – much of the world’s population – behind when it comes to safe drinking water, and we’re trending in the wrong direction.

The UN predicts that by 2030, the world may face a 40 percent shortfall in available water. The causes? Climate change is making an already precious resource even more scarce, as rainfall becomes increasingly erratic with temperature changes. Demand is spiking, as the global population grows and consumes more water for farming, industry and personal consumption.

It is a daunting challenge, but a solvable one. It will require far greater understanding of the current state of water on the planet – the location, quantity and quality of freshwater reserves – and how (and how much) is currently being used and by whom. Then, we can use this information to drive efficiencies in delivery and consumption, incentivize behavior change on a local and global level and drive even greater innovation.

Water everywhere and not a drop to drink
Solving the water challenge begins with understanding where the most challenged areas are. Organizations like the World Resources Institute (WRI) and The Nature Conservancy are doing a great deal of work on this issue. The Nature Conservancy’s Protecting Water Atlas aims to drive better decision-making by showing the benefits of investments in water. WRI’s Aqueduct Water Risk Atlas shows both current and future conditions of where water-related risks are most severe, helping decision-makers understand and plan for potential changes in water availability due to climate change and economic development. Microsoft uses the WRI tool in both our global real estate portfolio planning and management and our climate resilience assessments, and supports The Nature Conservancy’s coastal resilience toolkit through AI for Earth and Azure credits.

It’s not just measuring risk – it’s about managing it through proactive approaches. This includes effective conservation measures. Water leakage is one area where improvements could make a big difference. In England and Wales alone, nonprofit organization Discover Water estimates that 3,183 million liters of water are leaked each day. That’s equivalent to filling 1,273 Olympic swimming pools per day! This isn’t a U.K. problem, it’s a global problem. The World Bank estimates that on average, 25 to 30 percent of a utility’s water is lost in the network, and in developing countries as much as 45 million cubic meters are said to be lost daily through leaks.

This prompted Powel, a European software solutions provider, to work with Microsoft to create an Internet of Things solution called SmartWater that can provide the ability to discover and react to these leakages early. The solution monitors water flow into a distribution system and in near real time, with the help of machine learning, detects anomalies so action can be taken.

Beyond conservation, some organizations are looking at water replenishment efforts motivated by the data. Microsoft is one of them. Through our early-stage initiative, we are identifying water-stressed areas around the world, the best partners in that region to collaborate with, and are making investments in projects that improve water conditions and alleviate water stress in those areas. That’s why one fall day last year, some Microsoft employees built beaver dams in Washington state. These beaver dam analogs offer water availability and quality benefits and represented our first public investment in this area.

We’re also engaging in collaborative platforms, such as the UN CEO Water Mandate, to identify opportunities to advance collective action to align and amplify the commitments of individual companies to contribute to achieving Sustainable Development Goal 6.

Beyond conservation to transformation
Water is one of the four key issue areas of our AI for Earth program, a $50 million, 5-year commitment to providing AI tools to researchers around the globe working on environmental challenges. More than 230 grantees are doing work, enabled by AI, in more than 60 countries on challenges related to water, as well as agriculture, biodiversity and climate change. Ultimately, these issues are interrelated – it’s difficult to solve any of the challenges in these areas without addressing others. Here are three grantees that are working across those disciplines, with AI, to drive new insights and behaviors, from algae blooms to precision agriculture with an eye toward water availability to predicting events like floods when we have too much water:

Providing early warning of harmful algal bloom outbreaks
For many years, the waters of Lake Atitlán in the Guatemalan highlands were pristine, a landmark for natural beauty and biodiversity. However, in 2009 the lake experienced the first of several harmful algal blooms (HABs) – out-of-control colonies of algae that suck oxygen out of the water and make it potentially toxic to life.

Africa Flores describes that first HAB in Lake Atitlán as a wake-up call for action to preserve its precious biodiversity. But Guatemala has limited resources and means to investigate and better understand the causes and help predict and prevent future outbreaks. Thankfully, Flores’ work as a research scientist at the Earth System Science Center at the University of Alabama in Huntsville allows her to focus on this very issue.

Flores and her team will conduct deep analyses on image datasets from different satellites. Machine learning will help them to identify the variables that could predict future algal blooms. Knowledge on what those triggers are can turn into precise preventative action, not just in the lake in Flores’ home country but also in other freshwater bodies with similar conditions in Central and South America.

Improving agricultural water use efficiency with AI
As climate change disrupts weather patterns, rainfall is becoming more unreliable. Farmers are drilling more wells for center-pivot irrigation – a method where crops are watered with sprinklers rotating around a central source. However, this approach can lead to lowered or even drained water tables, salination of coastal aquifers, land subsidence and disruption to ecosystems.

Kelly Caylor, a professor of ecohydrology at the University of California, Santa Barbara, is investigating how much water is being used from these groundwater sources. He is developing a web tool that uses machine learning to identify active crop fields in satellite imagery and geospatial analysis tools to monitor how crops change over time. Knowing where the crops are growing and for how long, and then correlating that to weather data, the system can also infer how much water is being used.

With a better understanding of how much groundwater is used by center-pivot irrigation will come opportunities to develop more optimal and efficient practices, as well as policies for better water stewardship. With the online map and tools, farmers, water resource managers, policymakers and the public will be better able to make agriculture more land and water efficient.

Improving long-range forecasts for flood prediction
Climate change disruption to weather patterns sometimes means drought and sometimes means flooding. Already, a United Nations study has shown an increase in weather-related disasters since 1995, with floods accounting for nearly half. Climate change projections suggest that the frequency and severity of floods will increase in years to come as temperatures rise. And flooding threatens the most people in some of the countries least able to predict or prevent the devastation.

To make these regions more resilient, long-range forecasts for precipitation and flooding risk must be improved. Existing weather forecast models have been shown to routinely underestimate precipitation even the day before, and neither amount nor location can be predicted accurately five days in advance. But professors Wei Ding and Shafiqul Islam are leading a small team to develop machine learning models with the goal of accurately predicting floods up to 15 days in advance.

The team’s approach is to process enormous historical weather data sets and look for patterns that precede flooding. With this analysis, they plan to build a new forecasting model that can give early flood warnings to vulnerable populations around the world. More accurate and timely predictions will help reduce the overall impact of these disasters.

Transformations don’t have to be fueled by AI to make a difference. Microsoft is also making it easy for you to get engaged – just watch some Minecraft! Our team has been hard at work at the “Village and Pillage” update, which includes a redesign of water wells. This weekend, we’re supporting the nonprofit Charity: Water effort to bring clean water to people around the world through their “Weekend for Water.” All you have to do is tune in to livestreams of Minecraft players – you can make donations, the streamers will be giving away Minecoins, and the money raised will help dig wells to provide clean water around the globe.

So this World Water Day, I encourage you to take action, and encourage your friends, neighbors, employers and government officials to take action as well. It will take all of us to ensure no one is left behind, and that work should begin today.

Tags: ,

Posted on Leave a comment

Wales to become one of the first countries in the world to give schools free access to Microsoft 365

Wales is helping nearly half a million young people improve their digital skills by becoming one of the first countries in the world to give all local authority schools free access to Microsoft 365.

The Welsh Government will pay for all 1,521 “maintained” schools to have access to programs such as Word, Excel and PowerPoint, in a bid to boost the use of technology among pupils and reduce costs for families and headteachers.

As part of the £1.2 million investment, which is expected to benefit around 467,000 young people, all teachers and students will be able to download and install the latest version of Office 365 ProPlus on up to five personal devices. Pupils can then collaborate and continue learning at home using the same programs as they do in the classroom.

Kirsty Williams, Minister for Education, said: “I’m proud to say we’re one of the first countries in the world to take this progressive approach to providing schools with this software. Through our curriculum reforms we want all learners to have relevant high-level digital, literacy and numeracy skills, and access to these applications is an important step towards achieving that.

“This will reduce the burden on schools to pay for their own licensing fees and also ensure all our schools have the same level of access to the digital tools they need to progress these skills in our learners. This is vital as we aim to reduce the attainment gap and increase standards in our schools.”



The deal also includes Minecraft: Education Edition, which contains Code Builder. This version of the popular block-building game will allow teachers and students to learn coding using Tynker and Microsoft MakeCode, and supports the Welsh Government’s Cracking the Code plan to encourage coding in every part of the country.

Users will be able to securely access Office 365 ProPlus in Welsh or English via the government’s Hwb digital learning platform, which is available to all maintained schools and actively used by more than 85%.

Online versions of the software will continue to be available through Hwb for use in public spaces such as libraries.

Cindy Rose, Chief Executive of Microsoft UK, said: “The introduction of Office 365 will be transformational for both teachers and pupils, empowering them to collaborate more effectively, saving time and generating better learning outcomes. Equally, Office 365 provides students with valuable skills to help them obtain employment following school.

“Additionally, the accessibility tools built into Office 365 will mean all students gain the confidence to contribute to learning discussions. Similarly, with Minecraft: Education Edition, students will develop computational thinking skills in an immersive and classroom-friendly format that sparks creativity and innovation. This agreement ensures Wales retains its position as a world leader in digital education delivery.”



The Office deal comes just days after the Welsh Government announced that Flipgrid, the social and personal learning program used by millions of teachers in more than 180 countries, will also be available to schools in Wales via Hwb.

Flipgrid lets teachers see and hear from every pupil in their class by posting questions to online discussion boards, called grids. Students answer by creating short videos but can practice and perfect their response before posting, helping to increase confidence and improve public speaking.

The move to make Office 365 ProPlus and Flipgrid available to schools will support the Welsh Government’s Digital Competence Framework (DCF), which was launched in 2016 and aims to help people develop the skills that will help them thrive in an increasingly digital world.

According to the US Department of Labor, 65% of today’s students will end up working in jobs that don’t exist yet, and more than 500,000 highly-skilled workers will be needed to fill digital roles by 2022 – three times the number of UK computer science students who graduated in the past 10 years. Just 5% of computer scientists are female, while people returning to work and those from black and minority ethnic backgrounds are also vastly underrepresented within the sector.

The DCF aims to tackle this issue by setting out the digital skills to be attained by students aged between three and 16, including communication, collaboration, creativity, data, problem solving and online behaviour.

Tags: , , , , ,

Posted on Leave a comment

‘ID@Xbox Game Pass’ debuts March 26

We are excited to announce ID@Xbox Game Pass, a stream highlighting great indie games coming soon to Xbox Game Pass, premiering March 26 at 9:00 AM PDT. In this show, you can expect to learn more about some of the hottest ID@Xbox titles coming to Xbox Game Pass with new reveals, gameplay highlights, and conversations with the developers. Fans will be able to check out our first ever episode here.

In our debut, we’ll dive into games previously shown at E3 and X018. Expect hits such as Afterparty, Void Bastards, and Supermarket Shriek to be highlighted. In addition to new game announcements, we’ll also share a visit to Night School Studio, the creative team behind the hit game Oxenfree, for a behind-the-scenes look at their upcoming game Afterparty. Extra made up bonus internet points if you tweet to us about your advanced frisbee college courses.

Hope you join us for our debut episode on March 26 at 9:00 AM PDT!

And to stay up to date with the latest news and announcements, be sure to follow us on Instagram and Twitter. With our Xbox Game Pass mobile app, you can also get notifications as new games are added and remote install games to your home console as soon as they are available!

Posted on Leave a comment

Educators: Bring Jane Goodall to your classroom with April 2 and 9 Skype events

Hello, changemakers and compassionate citizens!

Dr. Jane Goodall is one of the biggest changemakers in history, making huge discoveries about chimpanzees and dedicating her life to making things better all over the world. Despite growing threats to wildlife, people and ecosystems, she still has plenty of hope for the future. Why? Because she believes in the power of young people motivated to make a difference. That’s why she created the Roots & Shoots program of the Jane Goodall Institute!

So, what is it, and how did it start? It all began in 1991 on Jane Goodall’s front porch in Tanzania, when a small group of students told Jane they felt powerless thinking about the problems all around them. This is something she had heard from people everywhere she went, but what could she do? All at once Jane realized the solution was right in front of her. She encouraged the group to use their voices and ideas to address the issues they saw, the things that mattered most to them. Roots & Shoots was born.

In the 28 years since it started, Roots & Shoots has expanded its reach to over 80 countries around the globe, impacting the lives of countless young people. This very special program has been providing young people with the skill-building and tools that they need to make a positive impact in their communities.

Roots & Shoots is all about finding solutions by looking around and getting involved to address issues facing people, animals and the environment. This holistic approach, using the R&S 4-Step Formula, makes Roots & Shoots an “easy-to-adopt” framework creating a generation dedicated to building a more sustainable planet. The program operates with a firm understanding that young people aren’t waiting until tomorrow to take action, they’re facing problems today and are likewise addressing issues facing the planet head on, right now.

“More and more young people around the world are taking action now, today, on projects they are truly passionate about. I am very excited to have the opportunity to connect with classrooms around the globe for this Skype in the Classroom broadcast and to discuss how we can improve the world for people, animals and the environment we share.”

– Dr. Jane Goodall, DBE, Founder of the Jane Goodall Institute, UN Messenger of Peace

You may be wondering how young people can get involved with the program. The GREAT news is that there are many ways to participate as a part of Roots & Shoots! The program has a diverse network of change-makers and allows individuals to get involved at ANY LEVEL they feel comfortable with. No action is too small! During the Skype in the Classroom broadcast, you’ll have the opportunity to explore the actions you and the young people you mentor can take today and gain the skills to continue building service-learning campaigns in your own communities.

Roots & Shoots provides resources for both youth activists and adult mentors and empowers young people to become the type of leaders who will make compassionate decisions to make the world a better place. Through the program, youth activists lead local change through service while developing the skills and traits of compassionate citizens.

Whether it’s natural disasters, homelessness, pollution or even climate change, being a part of Roots & Shoots means choosing what kind of difference you want to make. From that front porch, a new generation has emerged to create a global movement. Young people in Roots & Shoots are not only the future, they’re the present, and they’re changing the world today.

An Idea for Educators

Adult mentors interested in assisting youth activists in their journey to make the world a better place have the opportunity to participate in Roots & Shoots FREE online course for educators. Throughout the course, educators unlock the skills necessary for fostering the growth of compassionate citizens. Not only will the educators receive professional development through this course, but they will then be capable of mentoring youth in the process of designing community action campaigns using the Roots & Shoots program model.

Connecting with students through Skype in the Classroom

Roots & Shoots is so delighted for the opportunity to work with Skype in the Classroom to bring an exciting broadcast and live chat experience to your students on April 2nd & 9th. Classrooms around the world will be able to tune in to this Skype in the Classroom broadcast event as we explore together how to make a difference in our own communities! Dr. Jane and the Jane Goodall Institute team will be answering as many questions as they can in the live chat.

We’re looking forward to sharing this experience with so many change-makers!

Ok, I’m in! How can I join the event and prepare my classroom?

Share the plans on your participation and preparations for the event with us @SkypeClassroom, @JaneGoodallInst and @RootsandShoots with #Skype2Learn.

Posted on Leave a comment

Public preview of Windows Virtual Desktop now available

Last September, we announced Windows Virtual Desktop and began a private preview. Since then, we’ve been hard at work developing the ability to scale and deliver a true multi-session Windows 10 and Office 365 ProPlus virtual desktop and app experience on any device.

Today, we move to the next phase and announce the public preview of Microsoft Windows Virtual Desktop. Now, all customers can access this service—the only service that delivers simplified management, a multi-session Windows 10 experience, optimizations for Office 365 ProPlus, and support for Windows Server Remote Desktop Services (RDS) desktops and apps. With Windows Virtual Desktop, you can deploy and scale your Windows desktops and apps on Azure in minutes and enjoy built-in security.

Through our private preview, we had the chance to work closely with customers and partners to help shape this new service. It has been rewarding to see the results so far—a great example being at X5 Music Group, a Warner Music Group company.

“Within the music industry, we have to access, manage, and store large volumes of complex metadata securely. Windows Virtual Desktop is a great way of bringing data-heavy applications into our cloud platform without the need to rewrite the application. Windows Virtual Desktop also provides several additional benefits, such as making it really easy to scale the number of users while minimizing the attack surface of our applications.”
—Klas Broman, CTO and Developer Lead, X5 Music Group

As we start public preview, we’ll continue listening and taking feedback, to ensure we’re meeting your needs as we head toward general availability in the second half of calendar year 2019.

With the end of extended support for Windows 7 coming up in January 2020, we also understand some customers need to continue to support Windows 7 legacy applications as they migrate to Windows 10. To support this need, you’ll soon be able to use Windows Virtual Desktop to virtualize Windows 7 desktops with free Extended Security Updates (ESU) until January 2023. This support provides a comprehensive virtualization solution for Windows 7 alongside your Windows 10 and Windows Server desktops and apps.

Solutions to extend Windows Virtual Desktop

In November 2018, we acquired FSLogix, a next-generation app-provisioning platform that reduces the resources, time, and labor required to support desktop and app virtualization. FSLogix technologies enable faster load times for non-persistent users accessing Outlook or OneDrive. FSLogix technology will support both client and server RDS deployments—helping on-premises customers more easily migrate to Windows Virtual Desktop and providing a great solution for customers in hybrid scenarios.

Windows Virtual Desktop will also be extended and enriched by leading partners in the following ways:

  • Citrix can extend Windows Virtual Desktop capabilities with their Citrix Cloud services.
  • Through our partnership with Samsung, Windows Virtual Desktop will provide highly mobile Firstline Workers access to a full Windows 10 and Office 365 ProPlus experience with Samsung DeX.
  • Software and service providers will extend Windows Virtual Desktop to offer targeted solutions in the Azure marketplace.
  • Microsoft Cloud Solution Providers (CSPs) will deliver end-to-end desktop-as-a-service (DaaS) offerings and value-added services to their customers.

Access to Windows Virtual Desktop

To deploy and manage your virtualization environment, you just need to set up an Azure subscription. You can choose the type of virtual machines (VMs) and storage you want to suit your environment. You can optimize costs by taking advantage of Reserved Instances (up to 72 percent discount) and by using multi-session Windows 10.

For users accessing the Windows 10 and Windows 7 desktops and apps, there’s no additional cost if you’re an existing Microsoft 365 F1/E3/E5, Windows 10 Enterprise E3/E5, or Windows VDA customer. For Windows Server desktops and apps, there’s no additional cost if you’re an existing Microsoft RDS Client Access License (CAL) customer.

Get started with the public preview of Windows Virtual Desktop

Windows Virtual Desktop is comprised of the Windows desktops and apps you’re delivering to users and the management solution hosted as a service on Azure by Microsoft. During public preview, desktops and apps can be deployed on VMs in any Azure region, and the management solution and data for these VMs will reside in the United States (US East 2 region). This may result in data transfer to the United States while you test the service in public preview.

We’ll start to scale out the management solution and data localization to all Azure regions starting at general availability. For more information on getting started, considerations for optimal deployment guidance, and to provide feedback as you preview the service, please visit the Windows Virtual Desktop preview page.

Posted on Leave a comment

New Bing Maps traffic coloring makes it easier to choose the fastest route

There is an old saying that you don’t know where you are going until you get there. With Bing Maps new route coloring feature, you will know right away where the delays will be along your selected route so you can change your route, your plans or your destination based on the route ahead!

For example, if you are leaving Redmond Town Center for Westlake Center in Seattle, you can see the delays on WA-520 W and I-90 W before you decide which route to take. Also, with our new route labels showing the travel mode, distance and time of each route, you can easily compare and toggle between the different routes quickly on the map.

Bing Maps Traffic Coloring

Bing Maps Traffic Coloring

While blue means no traffic delays, the orange and red colors highlight moderate to heavy traffic delays on the route. These are calculated based on a combination of current traffic updates and predictions from historic data depending on the length of the route.

Traffic coloring not only helps you select the best route for your trip, but can also be very useful when there are major traffic delays due to inclement weather, big events, accidents, or road construction nearby. For example, if there is an MLB or NFL game in town, you can avoid the most impacted roads near the event and choose an option that offers the least delays.

In addition, if you need to take a ferry as part of your route, Bing Maps visualizes the ferry segments using dashes to differentiate that part of the trip. The image below illustrates the route between Bellevue and Bainbridge Island in Washington State. Bing Maps highlights the ferry segment between Seattle and Bainbridge with a dashed line.

Bing Maps Traffic Coloring Ferry Route

The Bing Maps Routing and Traffic Team is constantly working to make navigation and route planning easier for our users. To try out the traffic coloring feature, go to https://www.bing.com/maps.

 – Bing Maps Team

Posted on Leave a comment

‘Vigor’ free weekend begins for Xbox Live Gold members

Xbox Live Gold members can play Vigor for free on Xbox One starting today until March 24, which makes this the perfect time to explore the beautiful landscapes of post-war Norway, scavenge for loot amongst other Outlanders in tense map-based encounters and start rebuilding your safe haven amidst a fallen civilization.

This free weekend hits shortly after the release of the 0.8 “Signal” update, which brought new content and game events, a player lobby and gesture system, as well as implementing numerous improvements and an enhanced gameplay experience overall. Previous updates 0.7 and 0.6 have already added optional objectives, randomized events, duos mode, improved weapon play (with over 17 additional weapons added) and numerous bug fixes and optimizations.

Although Vigor will release onto Xbox One as a free-to-play title this year, players can opt to continue playing – and supporting – the game after the Xbox Live free play weekend has ended by purchasing the game during its Xbox Game Preview period, which will also unlock the Founder’s Pack. This not only gives you immediate full access to the game but also rewards you with exclusive in-game items only obtainable during the Xbox Game Preview period of development. Please note that any progress made before 1.0 will be reset once the game fully releases – more info soon on vigorgame.com.

If the idea of a tense shoot n’ loot experience set against the picturesque backdrop of 90s Norway piques your interest, then be sure to head to the Gold Member of the Microsoft Store and download Vigor for free starting today.

See you in the game, outlanders!