By Derick Campbell, Microsoft External Research Releases such as the academic accelerators code named Dryad and DryadLINQ, currently available for free download, are great examples of what can be achieved when members of the global research community collaborate to develop…
Jim Gray’s untimely death in 2007 marked a profound loss for the global research community. Jim’s passionate approach to research drove him to explore and test his vision rigorously, to question assumptions at every turn, to relentlessly push the limits…
In the news | The New York Times
For decades, computer scientists have been pursuing artificial intelligence â the use of computers to simulate human thinking. But in recent years, rapid progress has been made in machines that can listen, speak, see, reason and learn, in their way.
Two Microsoft researchers, Jonathan Carlson and David Heckerman, working with two teams of HIV researchers at the Ragon Institute of MGH, MIT, and Harvard, and at the University of Alabama have identified new findings that could help in the fight…
By Janie Chang, Writer, Microsoft Research If there are network tools for troubleshooting complex corporate networks, then surely there must be simpler, low-end tools to assist the home or small-business network administrator. That was Victor Bahl’s assumption when he went…
The inspiration behind this blog is a strong desire to foster connections that lead to meaningful breakthroughs; to engage in ongoing dialog in an open forum; to discuss and debate the information and ideas critical to harnessing the power of…
By Janie Chang, Writer, Microsoft Research Emre Kıcıman was online browsing the business news when he noticed a box around the name of a startup company in an article about its acquisition by an industry giant. When he moved his…
By Rob Knies, Senior Writer, Microsoft Research Networks are ubiquitous in the digital age. Whether you’re at home, in your car, on your phone, or sending files halfway around the world, you’re utilizing computer networks―working with them, communicating on them,…
By Janie Chang, Writer, Microsoft Research Computer security has been described as a game of one-upmanship, an ongoing escalation of techniques as both sides attempt to find new ways to assault and protect system vulnerabilities. The most prevalent forms of…