Posted on Leave a comment

‘Power On: The Story of Xbox’ wins several awards, including Daytime Emmy

It’s been just over six months since the docuseries “Power On: The Story of Xbox” was released around the world.  The six-part series, a ten100 production directed by Andrew Stephan, takes you on a behind-the-scenes journey through the 20-year history of Xbox. From the design behind the original prototype console, to heartbreaking challenges like the “RRoD,” to more recent milestones like the creation of Xbox Game Pass…you’ll hear directly from the team who lived through the triumphs and challenges.  And it’s been so fun hearing from those of you who have watched the series talk about your favorite surprises and the nostalgia you felt in re-experiencing many of the iconic moments in Xbox history. 

We are incredibly grateful to share that “Power On: The Story of Xbox” has recently received multiple entertainment industry awards, including:

We are so thankful for the many of you who voted to support “Power On” in the People’s Voice Webby Awards, and for the judges that have honored the series with these other prestigious awards and nominations.

If you haven’t yet had a chance to watch the series, or if you want to re-watch your favorite parts, you now have more viewing options available. All six episodes of “Power On: The Story of Xbox” are now available to watch for free on Tubi, and will be coming to VIZIO WatchFree+ on July 1. 

In addition to these new platforms, the series continues to be available to watch on The Roku Channel, freevee, YouTube, Redbox, Microsoft Movies & TV, and others. The series is offered in 30 languages along with audio descriptions in English to enable players around the world to enjoy the journey. For more details, please visit the “Power On” site here.

Thank you again for celebrating the story of Xbox with us!

Posted on Leave a comment

Defending Ukraine: Early lessons from the cyber war

Editor’s note: Today Microsoft published a new intelligence report, Defending Ukraine: Early Lessons from the Cyber War. This report represents research conducted by Microsoft’s threat intelligence and data science teams with the goal of sharpening our understanding of the threat landscape in the ongoing war in Ukraine. The report also offers a series of lessons and conclusions resulting from the data gathered and analyzed. Notably, the report reveals new information about Russian efforts including an increase in network penetration and espionage activities amongst allied governments, non-profits and other organizations outside Ukraine. This report also unveils detail about sophisticated and widespread Russian foreign influence operations being used among other things, to undermine Western unity and bolster their war efforts. We are seeing these foreign influence operations enacted in force in a coordinated fashion along with the full range of cyber destructive and espionage campaigns. Finally, the report calls for a coordinated and comprehensive strategy to strengthen collective defenses – a task that will require the private sector, public sector, nonprofits and civil society to come together. The foreword of this new report, written by Microsoft President and Vice Chair Brad Smith, offers additional detail below.


 The recorded history of every war typically includes an account of the first shots fired and who witnessed them. Each account provides a glimpse not just into the start of a war, but the nature of the era in which people lived. 

Historians who discuss the first shots in America’s Civil War in 1861 typically describe guns, cannons, and sailing ships around a fort near Charleston, South Carolina.  

Events spiraled toward the launch of World War I in 1914 when terrorists in plain view on a city street in Sarajevo used grenades and a pistol to assassinate the archduke of the Austrian-Hungarian Empire.  

It would take until the Nuremberg war trials to fully understand what happened near the Polish border 25 years later. In 1939, Nazi SS troops dressed in Polish uniforms and staged an attack against a German radio station. Adolf Hitler cited such attacks to justify a blitzkrieg invasion that combined tanks, planes, and troops to overrun Polish cities and civilians. 

Each of these incidents also provides an account of the technology of the time — technology that would play a role in the war that ensued and the lives of the people who lived through it. 

The war in Ukraine follows this pattern. The Russian military poured across the Ukrainian border on February 24, 2022, with a combination of troops, tanks, aircraft, and cruise missiles. But the first shots were in fact fired hours before when the calendar still said February 23. They involved a cyberweapon called “Foxblade” that was launched against computers in Ukraine. Reflecting the technology of our time, those among the first to observe the attack were half a world away, working in the United States in Redmond, Washington. 

As much as anything, this captures the importance of stepping back and taking stock of the first several months of the war in Ukraine, which has been devastating for the country in terms of destruction and loss of life, including innocent civilians. 

While no one can predict how long this war will last, it’s already apparent that it reflects a trend witnessed in other major conflicts over the past two centuries. Countries wage wars using the latest technology, and the wars themselves accelerate technological change. It’s therefore important to continually assess the impact of the war on the development and use of technology. 

The Russian invasion relies in part on a cyber strategy that includes at least three distinct and sometimes coordinated efforts – destructive cyberattacks within Ukraine, network penetration and espionage outside Ukraine, and cyber influence operations targeting people around the world. This report provides an update and analysis on each of these areas and the coordination among them. It also offers ideas about how to better counter these threats in this war and beyond, with new opportunities for governments and the private sector to work better together.  

The cyber aspects of the current war extend far beyond Ukraine and reflect the unique nature of cyberspace. When countries send code into battle, their weapons move at the speed of light. The internet’s global pathways mean that cyber activities erase much of the longstanding protection provided by borders, walls, and oceans. And the internet itself, unlike land, sea, and the air, is a human creation that relies on a combination of public and private- sector ownership, operation, and protection.  

This in turn requires a new form of collective defense. This war pits Russia, a major cyber-power, not just against an alliance of countries. The cyber defense of Ukraine relies critically on a coalition of countries, companies, and NGOs.  

The world can now start to assess the early and relative strengths and weaknesses of offensive and defensive cyber operations. Where are collective defenses successfully thwarting attacks and where are they falling short? What types of technological innovations are taking place? And critically, what steps are needed to effectively defend against cyberattacks in the future?  Among other things, it’s important to base these assessments on accurate data and not be misled into an unwarranted sense of tranquility from the external perception that the cyberwar in Ukraine has not been as destructive as some feared.  

This report offers five conclusions that come from the war’s first four months: 

First, defense against a military invasion now requires for most countries the ability to disburse and distribute digital operations and data assets across borders and into other countries. Russia not surprisingly targeted Ukraine’s governmental data center in an early cruise missile attack, and other “on premise” servers similarly were vulnerable to attacks by conventional weapons. Russia also targeted its destructive “wiper” attacks at on-premises computer networks. But Ukraine’s government has successfully sustained its civil and military operations by acting quickly to disburse its digital infrastructure into the public cloud, where it has been hosted in data centers across Europe.  

This has involved urgent and extraordinary steps from across the tech sector, including by Microsoft. While the tech sector’s work has been vital, it’s also important to think about the longer-lasting lessons that come from these efforts.  

Second, recent advances in cyber threat intelligence and end-point protection have helped Ukraine withstand a high percentage of destructive Russian cyberattacks. Because cyber activities are invisible to the naked eye, they are more difficult for journalists and even many military analysts to track. Microsoft has seen the Russian military launch multiple waves of destructive cyberattacks against 48 distinct Ukrainian agencies and enterprises. These have sought to penetrate network domains by initially comprising hundreds of computers and then spreading malware designed to destroy the software and data on thousands of others.  

Russian cyber tactics in the war have differed from those deployed in the NotPetya attack against Ukraine in 2017. That attack used “wormable” destructive malware that could jump from one computer domain to another and hence cross borders into other countries. Russia has been careful in 2022 to confine destructive “wiper software” to specific network domains inside Ukraine itself. But the recent and ongoing destructive attacks themselves have been sophisticated and more widespread than many reports recognize. And the Russian army is continuing to adapt these destructive attacks to changing war needs, including by coupling cyberattacks with the use of conventional weapons.  

A defining aspect of these destructive attacks so far has been the strength and relative success of cyber defenses. While not perfect and some destructive attacks have been successful, these cyber defenses have proven stronger than offensive cyber capabilities. This reflects two important and recent trends. First, threat intelligence advances, including the use of artificial intelligence, have helped make it possible to detect these attacks more effectively. And second, internet-connected end-point protection has made it possible to distribute protective software code quickly both to cloud services and other connected computing devices to identify and disable this malware. Ongoing wartime innovations and measures with the Ukrainian Government have strengthened this protection further. But continued vigilance and innovation will likely be needed to sustain this defensive advantage. 

Third, as a coalition of countries has come together to defend Ukraine, Russian intelligence agencies have stepped up network penetration and espionage activities targeting allied governments outside Ukraine. At Microsoft we’ve detected Russian network intrusion efforts on 128 organizations in 42 countries outside Ukraine. While the United States has been Russia’s number one target, this activity has also prioritized Poland, where much of the logistical delivery of military and humanitarian assistance is being coordinated. Russian activities have also targeted Baltic countries, and during the past two months there has been an increase in similar activity targeting computer networks in Denmark, Norway, Finland, Sweden, and Turkey. We have also seen an increase in similar activity targeting the foreign ministries of other NATO countries.  

Russian targeting has prioritized governments, especially among NATO members. But the list of targets has also included think tanks, humanitarian organizations, IT companies, and energy and other critical infrastructure suppliers. Since the start of the war, the Russian targeting we’ve identified has been successful 29 percent of the time. A quarter of these successful intrusions has led to confirmed exfiltration of an organization’s data, although as explained in the report, this likely understates the degree of Russian success.  

We remain the most concerned about government computers that are running “on premise” rather than in the cloud. This reflects the current and global state of offensive cyber espionage and defensive cyber protection. As the SolarWinds incident demonstrated 18 months ago, Russia’s intelligence agencies have extremely sophisticated capabilities to implant code and operate as an Advanced Persistent Threat (APT) that can obtain and exfiltrate sensitive information from a network on an ongoing basis. There have been substantial advances in defensive protection since that time, but the implementation of these advances remains more uneven in European governments than in the United States. As a result, significant collective defensive weaknesses remain. 

Fourth, in coordination with these other cyber activities, Russian agencies are conducting global cyber-influence operations to support their war efforts. These combine tactics developed by the KGB over several decades with new digital technologies and the internet to give foreign influence operations a broader geographic reach, higher volume, more precise targeting, and greater speed and agility. Unfortunately, with sufficient planning and sophistication, these cyber-influence operations are well positioned to take advantage of the longstanding openness of democratic societies and the public polarization that is characteristic of current times. 

As the war in Ukraine has progressed, Russian agencies are focusing their cyber-influence operations on four distinct audiences. They are targeting the Russian population with the goal of sustaining support for the war effort. They are targeting the Ukrainian population with the goal of undermining confidence in the country’s willingness and ability to withstand Russian attacks. They are targeting American and European populations with the goal of undermining Western unity and deflecting criticism of Russian military war crimes. And they are starting to target populations in nonaligned countries, potentially in part to sustain their support at the United Nations and in other venues. 

Russian cyber-influence operations are building on and are connected to tactics developed for other cyber activities. Like the APT teams that work within Russian intelligence services, Advance Persistent Manipulator (APM) teams associated with Russian government agencies act through social media and digital platforms. They are pre-positioning false narratives in ways that are similar to the pre-positioning of malware and other software code. They are then launching broad-based and simultaneous “reporting” of these narratives from government-managed and influenced websites and amplifying their narratives through technology tools designed to exploit social media services. Recent examples include narratives around biolabs in Ukraine and multiple efforts to obfuscate military attacks against Ukrainian civilian targets.  

As part of a new initiative at Microsoft, we are using AI, new analytics tools, broader data sets, and a growing staff of experts to track and forecast this cyber threat. Using these new capabilities, we estimate that Russian cyber influence operations successfully increased the spread of Russian propaganda after the war began by 216 percent in Ukraine and 82 percent in the United States.  

These ongoing Russian operations build on recent sophisticated efforts to spread false COVID narratives in multiple Western countries. These included state-sponsored cyber-influence operations in 2021 that sought to discourage vaccine adoption through English-language internet reports while simultaneously encouraging vaccine usage through Russian-language sites. During the last six months, similar Russian cyber influence operations sought to help inflame public opposition to COVID-19 policies in New Zealand and Canada.  

We will continue to expand Microsoft’s work in this field in the weeks and months ahead. This includes both internal growth and through the agreement we announced last week to acquire Miburo Solutions, a leading cyber threat analysis and research company specializing in the detection of and response to foreign cyber influence operations. 

We’re concerned that many current Russian cyber influence operations currently go for months without proper detection, analysis, or public reporting. This increasingly impacts a wide range of important institutions in both the public and private sectors. And the longer the war lasts in Ukraine, the more important these operations likely will become for Ukraine itself. This is because a longer war will require sustaining public support from the inevitable challenge of greater fatigue. This should add urgency to the importance of strengthening Western defenses against these types of foreign cyber influence attacks. 

Finally, the lessons from Ukraine call for a coordinated and comprehensive strategy to strengthen defenses against the full range of cyber destructive, espionage, and influence operations. As the war in Ukraine illustrates, while there are differences among these threats, the Russian Government does not pursue them as separate efforts and we should not put them in separate analytical silos. In addition, defensive strategies must consider the coordination of these cyber operations with kinetic military operations, as witnessed in Ukraine.  

New advances to thwart these cyber threats are needed, and they will depend on four common tenets and — at least at a high level — a common strategy. The first defensive tenet should recognize that Russian cyber threats are being advanced by a common set of actors inside and outside the Russian Government and rely on similar digital tactics. As a result, advances in digital technology, AI, and data will be needed to counter them. Reflecting this, a second tenet should recognize that unlike the traditional threats of the past, cyber responses must rely on greater public and private collaboration. A third tenet should embrace the need for close and common multilateral collaboration among governments to protect open and democratic societies. And a fourth and final defensive tenet should uphold free expression and avoid censorship in democratic societies, even as new steps are needed to address the full range of cyber threats that include cyber influence operations.  

An effective response must build on these tenets with four strategic pillars. These should increase collective capabilities to better (1) detect, (2) defend against, (3) disrupt, and (4) deter foreign cyber threats. This approach is already reflected in many collective efforts to address destructive cyberattacks and cyber-based espionage. They also apply to the critical and ongoing work needed to address ransomware attacks. We now need a similar and comprehensive approach with new capabilities and defenses to combat Russian cyber influence operations.  

As discussed in this report, the war in Ukraine provides not only lessons but a call to action for effective measures that will be vital to the protection of democracy’s future. As a company, we are committed to supporting these efforts, including through ongoing and new investments in technology, data, and partnerships that will support governments, companies, NGOs, and universities. 

Tags: ,

Posted on Leave a comment

Two years into our sustained commitment to address racial inequity both inside and outside Microsoft, it’s inspiring to see how entrepreneurs like Gilbert…

Posted on Leave a comment

Securing your IoT with Edge Secured-core devices

A recent study conducted by Microsoft in partnership with Ponemon Institute included a survey of companies that have adopted IoT solutions and 65 percent of them mentioned that security is a top priority when implementing IoT. Attacks targeting IoT devices put businesses at risk. Impacted devices can be bricked, held for ransom, employed as launch points for further network attacks, or used for malicious purposes. Among many consequences, we often see intellectual property (IP) and data theft and compromised regulatory status, all of which can have brand and financial implications on the business. 

Subsequently, we did a survey to understand the top concerns around the security of IoT devices, and we shared the findings in a previous blog about best practices for managing IoT security concerns. The following list summarizes the top security concerns from companies that have adopted IoT solutions:

  • Ensuring data privacy (46 percent).
  • Ensuring network-level security (40 percent).
  • Security endpoints for each IoT device (39 percent).
  • Tracking and managing each IoT device (36 percent).
  • Making sure all existing software is updated (35 percent).
  • Updating firmware and other software on devices (34 percent).
  • Performing hardware/software tests and device evaluation (34 percent).
  • Updating encryption protocols (34 percent).
  • Conducting comprehensive training programs for employees involved in IoT environment (33 percent).
  • Securely provisioning devices (33 percent).
  • Shifting from device-level to identity-level control (29 percent).
  • Changing default passwords and credentials (29 percent).

To help address these concerns, Microsoft is thrilled to announce today the general availability of the extension of our Secured-core platform to IoT devices along with new Edge Secured-core certified devices from our partners Aaeon, Asus, Lenovo and Intel in the Azure certified device catalog. We have added this new device certification for our Edge Secured-core platform so customers can more easily select IoT devices that meet this advanced security designation.   

As outlined in Microsoft’s Zero Trust paper, a key investment, especially around new devices, is to choose devices with built-in security. Devices built with Azure Sphere benefit from industry-leading built-in security, with servicing by Microsoft.

Announcements for Edge Secured-core

Edge Secured-core is a certification in the Azure Certified Device program for IoT devices. Devices that have achieved this certification provide enterprises the confidence that the devices they’re purchasing deliver the following security benefits:

  • Hardware-based device identity: In addition to the various security properties that a hardware-based device identity provides, this also enables the use of the hardware-backed identity when connecting to Azure IoT Hub and using the IoT Hub device provisioning service.  
  • Capable of enforcing system integrity: Using a combination of processor, firmware, and OS support to facilitate measurement of system integrity to help ensure the device works well with Microsoft Azure Attestation.
  • Stays up-to-date and is remotely manageable: Receives the necessary device updates for a period of at least 60 months from the date of submission.
  • Provides data-at-rest encryption: The device provides built-in support for encrypting the data at rest using up-to-date protocols and algorithms.
  • Provides data-in-transit encryption: IoT devices such as gateways, which are often used to connect downstream devices to the cloud, need inherent support for protecting data in transit. Edge Secured-core devices help support up-to-date protocols and algorithms that are used for data-in-transit encryption.
  • Built-in security agent and hardening: Edge Secured-core devices are hardened to help reduce the attack surface and include a built-in security agent to help secure from threats.

In addition to addressing many of the top concerns that we’ve heard from customers around the security of their IoT devices, our data shows that Secured-core PCs are 60 percent more resilient to malware than PCs that don’t meet the Secured-core specifications. We’ve brought the learnings from Secured-core PCs to define the requirements for Edge secured-core devices.

Today, we’re excited to announce the availability of Windows IoT Edge Secured-core devices available in the Azure Certified Device catalog.

Additionally, Microsoft invests with semiconductor partners to build IoT-connected industry-certified MCU security platforms that align with Microsoft’s security standards.  

Get started with Microsoft Security

Email us to request a call for more information about Azure Sphere, Edge Secured-core devices, or industry-certified devices. Learn more about Azure IoT security.

To learn more about Microsoft Security solutions, visit our website. Bookmark the Security blog to keep up with our expert coverage on security matters. Also, follow us at @MSFTSecurity for the latest news and updates on cybersecurity.

Posted on Leave a comment

Microsoft’s framework for building AI systems responsibly

Responsible AI graphic

Today we are sharing publicly Microsoft’s Responsible AI Standard, a framework to guide how we build AI systems. It is an important step in our journey to develop better, more trustworthy AI. We are releasing our latest Responsible AI Standard to share what we have learned, invite feedback from others, and contribute to the discussion about building better norms and practices around AI. 

Guiding product development towards more responsible outcomes
AI systems are the product of many different decisions made by those who develop and deploy them. From system purpose to how people interact with AI systems, we need to proactively guide these decisions toward more beneficial and equitable outcomes. That means keeping people and their goals at the center of system design decisions and respecting enduring values like fairness, reliability and safety, privacy and security, inclusiveness, transparency, and accountability.    

The Responsible AI Standard sets out our best thinking on how we will build AI systems to uphold these values and earn society’s trust. It provides specific, actionable guidance for our teams that goes beyond the high-level principles that have dominated the AI landscape to date.  

The Standard details concrete goals or outcomes that teams developing AI systems must strive to secure. These goals help break down a broad principle like ‘accountability’ into its key enablers, such as impact assessments, data governance, and human oversight. Each goal is then composed of a set of requirements, which are steps that teams must take to ensure that AI systems meet the goals throughout the system lifecycle. Finally, the Standard maps available tools and practices to specific requirements so that Microsoft’s teams implementing it have resources to help them succeed.  

Core components of Microsoft’s Responsible AI Standard graphic
The core components of Microsoft’s Responsible AI Standard

The need for this type of practical guidance is growing. AI is becoming more and more a part of our lives, and yet, our laws are lagging behind. They have not caught up with AI’s unique risks or society’s needs. While we see signs that government action on AI is expanding, we also recognize our responsibility to act. We believe that we need to work towards ensuring AI systems are responsible by design. 

Refining our policy and learning from our product experiences
Over the course of a year, a multidisciplinary group of researchers, engineers, and policy experts crafted the second version of our Responsible AI Standard. It builds on our previous responsible AI efforts, including the first version of the Standard that launched internally in the fall of 2019, as well as the latest research and some important lessons learned from our own product experiences.   

Fairness in Speech-to-Text Technology  

The potential of AI systems to exacerbate societal biases and inequities is one of the most widely recognized harms associated with these systems. In March 2020, an academic study revealed that speech-to-text technology across the tech sector produced error rates for members of some Black and African American communities that were nearly double those for white users. We stepped back, considered the study’s findings, and learned that our pre-release testing had not accounted satisfactorily for the rich diversity of speech across people with different backgrounds and from different regions. After the study was published, we engaged an expert sociolinguist to help us better understand this diversity and sought to expand our data collection efforts to narrow the performance gap in our speech-to-text technology. In the process, we found that we needed to grapple with challenging questions about how best to collect data from communities in a way that engages them appropriately and respectfully. We also learned the value of bringing experts into the process early, including to better understand factors that might account for variations in system performance.  

The Responsible AI Standard records the pattern we followed to improve our speech-to-text technology. As we continue to roll out the Standard across the company, we expect the Fairness Goals and Requirements identified in it will help us get ahead of potential fairness harms. 

Appropriate Use Controls for Custom Neural Voice and Facial Recognition 

Azure AI’s Custom Neural Voice is another innovative Microsoft speech technology that enables the creation of a synthetic voice that sounds nearly identical to the original source. AT&T has brought this technology to life with an award-winning in-store Bugs Bunny experience, and Progressive has brought Flo’s voice to online customer interactions, among uses by many other customers. This technology has exciting potential in education, accessibility, and entertainment, and yet it is also easy to imagine how it could be used to inappropriately impersonate speakers and deceive listeners. 

Our review of this technology through our Responsible AI program, including the Sensitive Uses review process required by the Responsible AI Standard, led us to adopt a layered control framework: we restricted customer access to the service, ensured acceptable use cases were proactively defined and communicated through a Transparency Note and Code of Conduct, and established technical guardrails to help ensure the active participation of the speaker when creating a synthetic voice. Through these and other controls, we helped protect against misuse, while maintaining beneficial uses of the technology.  

Building upon what we learned from Custom Neural Voice, we will apply similar controls to our facial recognition services. After a transition period for existing customers, we are limiting access to these services to managed customers and partners, narrowing the use cases to pre-defined acceptable ones, and leveraging technical controls engineered into the services. 

Fit for Purpose and Azure Face Capabilities 

Finally, we recognize that for AI systems to be trustworthy, they need to be appropriate solutions to the problems they are designed to solve. As part of our work to align our Azure Face service to the requirements of the Responsible AI Standard, we are also retiring capabilities that infer emotional states and identity attributes such as gender, age, smile, facial hair, hair, and makeup.  

Taking emotional states as an example, we have decided we will not provide open-ended API access to technology that can scan people’s faces and purport to infer their emotional states based on their facial expressions or movements. Experts inside and outside the company have highlighted the lack of scientific consensus on the definition of “emotions,” the challenges in how inferences generalize across use cases, regions, and demographics, and the heightened privacy concerns around this type of capability. We also decided that we need to carefully analyze all AI systems that purport to infer people’s emotional states, whether the systems use facial analysis or any other AI technology. The Fit for Purpose Goal and Requirements in the Responsible AI Standard now help us to make system-specific validity assessments upfront, and our Sensitive Uses process helps us provide nuanced guidance for high-impact use cases, grounded in science. 

These real-world challenges informed the development of Microsoft’s Responsible AI Standard and demonstrate its impact on the way we design, develop, and deploy AI systems.  

For those wanting to dig into our approach further, we have also made available some key resources that support the Responsible AI Standard: our Impact Assessment template and guide, and a collection of Transparency Notes. Impact Assessments have proven valuable at Microsoft to ensure teams explore the impact of their AI system – including its stakeholders, intended benefits, and potential harms – in depth at the earliest design stages. Transparency Notes are a new form of documentation in which we disclose to our customers the capabilities and limitations of our core building block technologies, so they have the knowledge necessary to make responsible deployment choices. 

Core principles graphic
The Responsible AI Standard is grounded in our core principles

A multidisciplinary, iterative journey
Our updated Responsible AI Standard reflects hundreds of inputs across Microsoft technologies, professions, and geographies. It is a significant step forward for our practice of responsible AI because it is much more actionable and concrete: it sets out practical approaches for identifying, measuring, and mitigating harms ahead of time, and requires teams to adopt controls to secure beneficial uses and guard against misuse. You can learn more about the development of the Standard in this video.   

While our Standard is an important step in Microsoft’s responsible AI journey, it is just one step. As we make progress with implementation, we expect to encounter challenges that require us to pause, reflect, and adjust. Our Standard will remain a living document, evolving to address new research, technologies, laws, and learnings from within and outside the company.  

There is a rich and active global dialog about how to create principled and actionable norms to ensure organizations develop and deploy AI responsibly. We have benefited from this discussion and will continue to contribute to it. We believe that industry, academia, civil society, and government need to collaborate to advance the state-of-the-art and learn from one another. Together, we need to answer open research questions, close measurement gaps, and design new practices, patterns, resources, and tools.  

Better, more equitable futures will require new guardrails for AI. Microsoft’s Responsible AI Standard is one contribution toward this goal, and we are engaging in the hard and necessary implementation work across the company. We’re committed to being open, honest, and transparent in our efforts to make meaningful progress. 

Posted on Leave a comment

Celebrating Black entrepreneurs who are helping to make sure each industry ‘looks like America’

One such recruit grew up near a landfill in Durham, North Carolina, Campbell says, in a family plagued by health challenges. Communities made up of racial and ethnic minorities are more likely to be near toxic sites, causing much higher rates of severe asthma, hospitalization and death for Black and African American children — ailments that have been exacerbated by the COVID-19 pandemic.

“We paid this student as an intern to help build out the internship program for the summer, and she hops on the calls with Microsoft and tells the story in a way better way than I can,” drawing from her lived experience to eloquently share these communities’ needs, Campbell says. “If you have a seat at the table, you should responsibly use it to give a different perspective.”

Along with developing large-scale solar farms for corporations, Volt is investing in community solar projects to encourage developers and banks to participate and is helping low- to moderate-income households get loans for solar panels.

Campbell hopes his partnership with Microsoft will serve as inspiration for others.

“When you’re doing the right thing, others need to be able to see that and hopefully emulate it, and that’s how change comes about,” he says. “This is a great opportunity to reimagine the role corporations can play. To make underserved communities vibrant in a new clean-energy world they can play a vital part in would be a beautiful outcome.”

Building a gaming industry ‘reflective of our upbringing’

Two men sit on chairs
Cxmmunity co-founder and Chief Marketing Officer Chris Peay (left) and co-founder and CEO Ryan Johnson (right) (Photo provided by Cxmmunity)

Like Campbell, Ryan Johnson and Christopher Peay graduated from historically Black universities and then found the business world to be a lonely place. The two friends wanted to start careers in esports.

“We went to a ton of video-game and esports-centric events across the country, and there was never anyone of color,” Johnson says.

Even though 83% of Black teens play video games — a higher rate than other ethnicities — only 4% of video game developers are Black or African American.

“We quickly realized the industry isn’t reflective of our upbringing, so we decided to try to provide equal opportunities for minorities,” says Peay.

In 2020 Johnson and Peay reached out on LinkedIn to Darrell Booker, who had just helped start Microsoft’s Nonprofit Tech Acceleration program as part of the Racial Equity Initiative. With cash and skilling grants from the company, they created an esports league for historically Black colleges and universities — 32 HBCUs now participate, and students earn prizes including scholarships — along with high school and college academic programs to teach digital literacy through the lens of gaming. They also provide funding to build on-campus computer labs with equipment strong enough to support esports, a placement program for internships with video-game development companies in California, and an esports summer camp for kids in Atlanta.

“Over our 22-week program last school year, we reached an audience of 15 million people, so we’re bringing a level of awareness to the HBCU community that didn’t exist before 2020,” Johnson says. “It’s huge for us. And having Microsoft’s name behind us to go in and talk to different partners established us and helped us get other corporate sponsorships to accelerate the growth of our organization.”

Dad and daughter play video game
Cxmmunity Chief Financial Officer Warren Davis and his daughter, Charlotte (Photo provided by Cxmmunity)

They named their venture Cxmmunity — with the X replacing the O as a nod to inclusive gaming, since X is a main functional button for lower-cost video-game consoles as well as gaming computers that cost thousands.

Providing communities with the support they actually need

As Microsoft enters the third year of its commitment to the Racial Equity Initiative, Booker says, company leaders are tearing down walls, banishing preconceived notions and partnering with other corporations and organizations to provide underrepresented communities with the support that’s actually needed.

Booker was recently talking with a small nonprofit in San Francisco that’s a beneficiary of the initiative, and they asked if he could offer graphic design training. They were trying to create a one-page flyer to hang in schools promoting their work with student athletes, but it kept bleeding onto a second page.

Man stands on bridge
Darrell Booker, based in Atlanta, crafted and leads Nonprofit Tech Acceleration for Black and African American Communities, part of Microsoft’s Racial Equity Initiative. (Photo by DV Photo Video)

“It really hit home to me that these organizations have a huge need from a marketing standpoint, and that’s not something that we inherently provide,” Booker says. “But even if we can help them be the most advanced from a tech standpoint, if they’re missing that piece of it, they’ll never have the impact that they want. So I found another company who was able to come in and assist with some of those things, and that’s a lot of what I’m doing now as well.

“The less we all work in silos,” he says, “the more these organizations will benefit.”

That on-the-ground relationship is critical, says Charisse Bremond Weaver, who connected with Microsoft not long after she became CEO 16 years ago of the Brotherhood Crusade. It’s a nonprofit in South Los Angeles that her father founded in 1968 and at one point mortgaged the family home to keep open.

“It’s literally a labor of love,” says Bremond Weaver, who recalls growing up in a home full of Black and African American activists, entertainers and politicians — as well as friends in need of housing whom her parents invited in for months at a time. “I love my community, and if they’re in pain, I’m in pain, so I push to get as many resources as possible to love and care for the most vulnerable in south LA.”

A communications major, Bremond Weaver says she had to learn to be an entrepreneur as she followed in her father’s footsteps under the mentorship of Danny Bakewell Sr., who led the organization for 35 years. The most important thing she did, she says, was to create an advisory board of people who believed in the Brotherhood Crusade’s vision and had strengths different from her own. She also had a goal of meeting five new people every month, which was what connected her to leaders at Microsoft.

Woman sits at a table smiling
Brotherhood Crusade President and CEO Charisse Bremond Weaver (Photo provided by Bremond Weaver)

Cash and technology grants from the company have helped Bremond Weaver expand her organization to 45 full-time employees, from seven when she took over in 2006, and are helping the group provide and track wraparound services such as healthcare, sports and job training to more than 3,000 young people a year aged 10 to 24, 70% of whom are Black or African American. The Brotherhood Crusade’s services help kids who are growing up in neighborhoods without parks or green spaces to exercise in and without the technological infrastructure needed to study or work remotely, she says.

“That small investment we’re making in the lives of young Black students will pay dividends for life” — and for generations to come — Bremond Weaver says. “But it’s not just about the monetary support, but about seeing our students and hearing their stories. It’s not my story to tell. It’s different when you’re talking to a young person at a restaurant, and you have five young people and three executives at that table, it’s a real conversation. And the kids are learning that’s what happens when you go to the corporate world — you go out to lunch, you engage, you tell your story, you articulate who you are.”

Corporations have a responsibility to invest in the communities they do business in, and if they do, they’ll “reap the dividends of great results,” Bremond Weaver says, recalling the support she saw her father get from the community as well as the investments in her own leadership skills that gave her the confidence to succeed him.

“So many poured into me, and it’s now my responsibility to pour back into my community,” she says. “Everyone needs a door opened. It’s when those doors are opened that we get to do the great work we do.”


Top photo: Volt Energy Utility Founder and CEO Gilbert Campbell (Photo provided by Campbell) 

Posted on Leave a comment

Download and play 34 games through the ID@Xbox Summer Game Fest demo event

Good day, Xbox fans! Here we are kicking off our third Summer Game Fest Demo event with 35 exciting game demos on Xbox Series X|S and Xbox One. Just like last year’s Summer Game Fest Demo event, you can download and play these in the comfort of your own home (and favorite pjs!) between June 21st – 27th.

Demos are playable starting today, and we encourage you to continue to check them out all week. Don’t forget that you can provide feedback to the devs too! Keep in mind that most of these demos are an early look at gameplay and may not represent the full game at their release, including the availability in each country as developers continue to update and refine their title ahead of launch.

We’re also excited to share the 11 newly announced games below are coming to Xbox!

  • Ato (Tiny Warrior Games)

In Ato, every combat encounter is an intense duel to the death. Perform risky parry maneuvers, bounce off of your opponent, evade their attacks and unlock new abilities to further expand your arsenal of options against your adversaries. Every combat encounter has its own personality and fighting style. Challenge, observe, and overcome each opponent you face as you strive to retrieve your child back from the clan you once served.

  • Boxville (Triomatica Games)

The core idea of the game is that it’s not just a game – but also an animated film that you can watch and play at the same time. We designed Boxville’s gameplay with the purpose of taking away your anxiety and stress. You can explore and observe the world without rushing and pressure. The game is full of environmental quests and logical puzzles that we have carefully picked from among hundreds of options.

  • Despot’s Game (Konfa Games)

Guide puny humans through Despot’s Game – a rogue-like tactics army battler. Equip your team and sacrifice them through procedural dungeons as you fight enemies, and other players!

  • Exhausted Man (Candleman Games)

Exhausted Man is a slow-paced action game with funny physics and ridiculous missions offering an exhausted life experience.

  • MUSYNX (MUSYNX Studio)

Indie rhythm game MUSYNX now on Xbox! Real “KEY” Sound System, Classic Gameplay, Unique Visual Themes and Constant Music Updates! MUSYNX is waiting for you!

  • Overrogue (EXE-CREATE)

A card deck-building roguelite! Explore labyrinths each time from level 1!
In the underworld, a battle is announced to decide the next Overlord. Complete labyrinths and collect crystals to achieve the title of Overlord! Proceed through dungeon-like labyrinths building up your card deck in a roguelite style! Pre-order available now

  • RE:CALL (maitan69)

In RE:CALL you play through the memories of the character you’re controlling. Your actions inside these flashbacks have immediate consequences in the present moment, letting you take advantage of the situation in order to progress the story. Tackle mind-bending puzzles that rely on altering your own memories to shape the future.

  • Richman10 (Softstar Technology)

Richman10 is a classic chess game in which players earn money by luck (dicing) and strategy (buying land and buying cards) to defeat other players. Fine arts adopt pure 3D Q version of the original painting style.

  • Stuffed (Waving Bear Studio)

STUFFED is a procedurally generated first-person shooter, that takes place in the dreams of a little girl. Play as a teddy bear and fight waves of nightmares as you defend your owner. Play solo or join your friends in up to 4 player online co-op.

  • Wave Break (Funktronic Labs)

Grind, grab, and kickflip your boat while shooting your way through an explosive 80s crime-filled Miami Vice themed world in Wave Break, the world’s first skateBOATING game! Inspired by arcade skateboarding classics, enjoy the episodic single player campaign, online multiplayer with multiple custom game modes, and an advanced park creator!

  • YNGLET (Nifflas’ Games)

Ynglet is a platformer with no platforms. With fluid difficulty and movements, jump between floating, hand-drawn illustrations, and unusual creatures. Melt into a highly reactive and dynamic soundtrack created by Ynglet’s custom (and needlessly complicated) music software. Full release will also feature new content, including new levels, news “platforms” and an unlockable minigame!”

Along with those titles, there is a great variety of games that will be available to try! Below is a list of games, and their developers, participating in the [email protected] Summer Game Fest Demo event:

  • Another Crusade (Dragon Vein Studios)
  • Ato (Tiny Warrior Games)
  • Batora: Lost Haven (Stormind Games)
  • BattleCakes (Volcano Bean)
  • Boxville (Triomatica Games)
  • BROK the InvestiGator (COWCAT)
  • Broken Pieces (Elsewhere Experience)
  • Despot’s Game (Konfa Games)
  • Doodle God Evolution (JoyBits Games)
  • Endling – Extinction is Forever (Herobeat Studios), pre-order available now
  • Exhausted Man (Candleman Games)
  • Grid Force – Mask of the Goddess (Playtra Games)
  • Grotto (Brainwash Gang)
  • Lost Ruins (Altari Games), available now
  • Metal: Hellsinger (The Outsiders)
  • PolyFury (Wayfarer Games)
  • RE:CALL (maitan69)
  • Richman10 (Softstar Technology)
  • Sail Forth (David Evans Games)
  • Severed Steel (Greylock Studio)
  • Shadowrun Returns (Codeglue)
  • Spiderheck (Neverjam)
  • Strings Theory (BeautifulBee)
  • Strong Moon (Chihuas Games)
  • Stuffed (Waving Bear Studio)
  • Terror of Hemasaurus (Loren Lemcke)
  • Tinykin (Splashteam)
  • Warhammer 40,000: Shootas, Blood & Teef (Rogueside)
  • Wave Break (Funktronic Labs)
  • Wreck Out (Four5Six)
  • Ynglet (Nifflas’ Games)

Head over to your Xbox and start enjoying these fantastic game demos on Xbox One and Xbox Series X|S! And yes, we’d love to hear what you think. Connect with us on Twitter,  Instagram,  Discord, Twitch, and YouTube. Stay tuned to Xbox Wire to learn more about what Team Xbox has planned, and of course, have an incredibly fun summer of gaming!

Posted on Leave a comment

Take a behind-the-scenes tour of Microsoft’s datacenter operations

The Operations Room is where we prioritize the availability and resiliency of our datacenters. Not only do highly trained technicians and artifical intelligence monitor hundreds of thousands of daily data points from the site’s critical infrastructure —including power, cooling, network and security —but they are also supported by cross-company engineering teams and thousands of cybersecurity experts.

Posted on Leave a comment

World Refugee Day: Tech companies, together, can strengthen the safety net

Please don’t create the next trafficking app.” Those were the words I heard a few months ago when I visited a large international humanitarian organization as it focused on helping refugee children from Ukraine. The point of that statement was that too often and despite our best intentions, private sector technology companies, including us, jump in to help during crisis situations without first understanding the ecosystem of standards, privacy, and security necessary for nonprofits to best provide services to the vulnerable populations they serve.

For instance, a single application built for a single organization and point in time too often ends up contributing to a fractured ecosystem of applications that prevents scaled impact.

One of the things I learned by spending 10 years working at a large global health NGO, is that digital technology cannot solve complex social issues by itself. Technology is a tool, a valuable tool even, but it is also best used when part of a systems-based approach inclusive of policy, standards, program delivery, and cross-sector alignment. It requires strong public-private partnership, certainly, but also requires private sector companies to collaborate in areas where they naturally compete.

Today, on World Refugee Day, during this year of all years, we are committed to increasing our investments in innovation partnerships to help the millions of refugees across the world. We will do this through continued support of NGOs (nongovernmental organizations) as they work tirelessly to support personal safety, health, housing, and family reunification. We will do this by working together across sectors – NGO, public, and private to partner effectively and thoughtfully. And, we are recommitting to aligning with others on standards that benefit refugees. This means, we are committed to partnering across the tech sector to drive lasting impact in the humanitarian space.

These partnerships do work. We recently contributed to a collaboration led by NetHope and its members to establish a common data schema for delivering humanitarian aid to refugees and rural communities. Collaboratively, 15 international humanitarian aid organizations and a dozen private sector companies developed the Frontline Humanitarian Logistics data model, a new data standard designed to create sustainable, interoperable technology capability for the humanitarian community.

We also see tremendous public private partnership driving lasting solutions in the response to the war in Ukraine. As millions of refugees streamed out of Ukraine, many companies leaned in to help. There was an immediate need to align volunteers to refugees in need of services, healthcare, education, and housing.

Where private sector technology companies may normally compete, we have agreed to collaborate in these instances to create lasting solutions that align to international security and privacy standards. We agree to prevent inadvertently contributing to a fractured ecosystem of applications that expose the data of vulnerable populations.

We realize the nuances and challenges around engaging and recognize we don’t have all of the answers. Progress depends on us continuing to work together with our partners to share learnings. Refugees deserve all our attention, lasting support, and for us, as competitors, to align and collaborate for the greater purpose – their survival.

Learn more about Microsoft’s efforts, and reflections on World Refugee Day from Kate Behncken, Vice President, Microsoft Philanthropies

Posted on Leave a comment

How Immersive Reader helped one student with dyslexia gain the confidence to succeed in school and life

Thanks to the evolution of education technology, more students with learning difficulties are finding accommodations that help them thrive in the classroom and in life.

That was the experience of Elle-Mae (Elle) Taylor. The third-year student at a United Kingdom university learned during her first year there that she had dyslexia, but it was prior to that when she discovered Immersive Reader, a digital learning tool from Microsoft that helped address some of the challenges she was having in school. The tool not only improved her confidence and well-being as her learning-related stress declined, but also opened more possibilities for her future, including her options for higher education and perceptions about career choice.

“What Immersive Reader did was give me the ability to be on the same level as everyone else,” she says. It “helped me address certain challenges and made me more successful.”

Elle’s journey toward discovering her full potential as someone who just needed the right tools, techniques, and attention to improve her reading and writing shows how greater awareness and accessible technologies can make a big impact in students’ learning and broader lives, including people without learning differences. In the U.S. alone, 2.5 million students have learning disabilities—such as dyslexia, dysgraphia, and dyscalculia—that can affect their academic performance and progress and can contribute to emotional struggles. That grows significantly when including students in the United Kingdom and entire world. But assistive technology can also support how students feel about their learning and performance in areas where they struggle.

Some of Elle’s earlier school memories include being treated as less capable than others. She had messy handwriting and trouble with things like expressing her thoughts clearly in writing exams, so her educators encouraged her to focus less on academics and more on sports and performing arts. Though talented in the arts, she had a more academic career in mind and wondered if her love of technology—which she excelled at and found innovative and creative—could somehow intersect with that. She became a student eager to learn and perform better but discouraged by what felt like a lack of support and solutions.

This persisted in part because a diagnosis of dyslexia eluded Elle until she attended university. Though she’d always known it took her more time to process certain work, it wasn’t among the most common struggles she’d heard were tied to dyslexia, such as seeing or writing jumbled words on a page.

Things changed when Elle was introduced to Immersive Reader, which happened when she started using a computer for her studies during the latter part of high school, known as the “Sixth form” in the United Kingdom.  Her school’s accessibility services department made her aware of the tool, which she says changed the course of her life forever.

Immersive reader supports diverse learning styles.

Elle became able to recognize her mistakes and refine her work using a variety of Immersive Reader features that she learned about over time. She used a page color feature that changes the background color of the page and line focus to allow users to better concentrate on one sentence of text at a time, and the Read Aloud function, which uses text-to-speech to help users hear what their writing sounds like. These and other features helped her better understand online texts she had to read for school and tackle sentence structure. Previously, when she had to hand-write for homework and exams, she’d have to spend extra time thinking through how. But features such as Dictation in Word allowed her to write essays by speaking them into her computer, which made it easier to get ideas down and then check for accuracy and clarity by hearing it with Read Aloud.

Immersive Reader also helped Elle’s self-expression. “It really transformed the success of my essays. I came out of A-Levels [Advanced Level Qualifications] getting the highest mark you can get,” she says. This reshaped her future. “When I started getting better grades, I was able to go to a really good university.” 

That gave Elle easier access to the learning disability assessment she needed to reveal dyslexia. “When I had my dyslexia assessment, I was told that my reading and writing was really good, so it was almost like I had been overcoming a lot of the challenges by myself.”

Elle’s career outlook changed course. Because she could use assistive technology like Immersive Reader while taking courses on data and information systems, she was able to explore more options and pursue technology as she’d hoped. And her increased confidence “led me to be able to apply for other types of jobs in tech or business,” Elle says. She applied for an internship at Microsoft, hoping to learn and do more within the realm of using technology to increase student accessibility and equity.

Now, Elle is thriving as a Microsoft intern and still uses Immersive Reader to check emails before sending, and in other small ways in everyday life. At Microsoft, Elle has been involved in a variety of work. She has presented with the Microsoft Education Team to help customers determine which Microsoft Education solutions, including the accessibility tools, could benefit them.  She has also founded a TechHer Coding Day, ensuring the day was accessible, to provide resources and guidance aimed at encouraging more women and non-binary students to pursue a career in technology.

“I think it can help in so many ways,” Elle says of Immersive Reader, including alleviating pressure on students who “are so stressed and exhausted” these days. “It could help any student. I don’t think they need to have dyslexia or another learning difficulty,” says Elle. “I think if more students knew about it, they would use it.”

With Microsoft’s built-in learning tools, students everywhere can have the assistive technology they need. Learn more about how Microsoft learning tools might benefit your students.