{"id":508862,"date":"2018-10-05T09:28:42","date_gmt":"2018-10-05T16:28:42","guid":{"rendered":"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/?p=508862"},"modified":"2018-10-09T13:32:12","modified_gmt":"2018-10-09T20:32:12","slug":"msr-presents-its-latest-advances-in-computer-systems-at-osdi-2018","status":"publish","type":"post","link":"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/blog\/msr-presents-its-latest-advances-in-computer-systems-at-osdi-2018\/","title":{"rendered":"Microsoft Research presents its latest advances in computer systems at OSDI 2018"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-509339 aligncenter\" src=\"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-content\/uploads\/2018\/10\/ComputerSystemsOSDI_CS_Site_10_2018_1400x788-1024x576.png\" alt=\"computer data center\" width=\"1024\" height=\"576\" srcset=\"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-content\/uploads\/2018\/10\/ComputerSystemsOSDI_CS_Site_10_2018_1400x788-1024x576.png 1024w, https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-content\/uploads\/2018\/10\/ComputerSystemsOSDI_CS_Site_10_2018_1400x788-300x169.png 300w, https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-content\/uploads\/2018\/10\/ComputerSystemsOSDI_CS_Site_10_2018_1400x788-768x432.png 768w, https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-content\/uploads\/2018\/10\/ComputerSystemsOSDI_CS_Site_10_2018_1400x788-1066x600.png 1066w, https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-content\/uploads\/2018\/10\/ComputerSystemsOSDI_CS_Site_10_2018_1400x788-655x368.png 655w, https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-content\/uploads\/2018\/10\/ComputerSystemsOSDI_CS_Site_10_2018_1400x788-343x193.png 343w, https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-content\/uploads\/2018\/10\/ComputerSystemsOSDI_CS_Site_10_2018_1400x788.png 1400w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p>Researchers from Microsoft Research will present their latest advances in computer systems at the <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/www.usenix.org\/conference\/osdi18\/\">USENIX Symposium on Operating Systems Design and Implementation 2018<span class=\"sr-only\"> (opens in new tab)<\/span><\/a> \u2014 the biennial flagship conference for systems research \u2014 October 8\u201310 in Carlsbad, California.<\/p>\n<p>These advances cover a broad spectrum of topics, as evident by the number of papers coauthored by researchers from Microsoft Research, which constitutes about a quarter of the conference\u2019s<a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/www.usenix.org\/conference\/osdi18\/technical-sessions\"> technical program<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>. These papers will be presented in nine out of the twelve different sessions. Many of these advances are a result of our collaboration with our academic partners,\u00a0such as research interns visiting Microsoft Research for their summer internships.<\/p>\n<p>The papers describe the latest breakthroughs and progress toward long-standing problems in cloud computing, artificial intelligence, distributed systems, blockchains, and operating systems, among other areas. Specifically, they make tremendous progress in improving the reliability, efficiency, and security of large-scale systems. Not only do these developments represent advancement over prior technology, several of these works have already been deployed in Microsoft products and services. Here, we preview some of these papers.<\/p>\n<p><a href=\"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/publication\/orca-differential-bug-localization-in-large-scale-services\/\"><strong>Orca: Differential Bug Localization in Large-Scale Services<\/strong><\/a><\/p>\n<p>Today, we depend on numerous large-scale services for basic operations such as email. These services are elaborate and extremely dynamic, as developers continuously commit code and introduce new features, new fixes, and \u2014 consequently \u2014 new bugs. Hundreds of commits may enter a deployment simultaneously. Therefore, one of the most time-critical, yet complex tasks toward mitigating service disruption is to localize bugs to the right commit.<\/p>\n<p>In this work, researchers present the concept of differential bug localization, which uses a combination of differential code analysis and software provenance tracking to effectively pinpoint buggy commits, and introduce Orca, a customized code search engine that implements differential bug localization. On-call engineers (OCEs) of O365 Core, a large enterprise email and collaboration service, use Orca to localize bugs to the appropriate buggy commits. The authors\u2019 evaluation shows that Orca correctly localizes 77 percent of bugs caused by code regressions and leads to a four times reduction in the work done by the OCE.<\/p>\n<p><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/www.usenix.org\/conference\/osdi18\/presentation\/weidong\"><strong>REPT: Reverse Debugging of Failures in Deployed Software<\/strong><span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/p>\n<p>Microsoft is committed to providing high-quality services and products. Unfortunately, not all bugs can be found prior to release, so Microsoft constantly improves its services and products by collecting crash reports from customers for postmortem failure diagnosis. However, debugging such failures is hard because developers must speculate the conditions leading up to the failure based on limited information such as memory dumps, program end states when failures are detected. The execution history is usually unavailable because high-fidelity tracing is not affordable in production environments, especially when software failures are rare and consequently most traces would be discarded for successful runs.<\/p>\n<p>In response, researchers created REPT, a practical reverse-debugging solution for production failures. REPT acts as a time machine, allowing developers to go back and replay the failure multiple times to better understand its root cause and devise an effective fix. Researchers realize this in two steps. First, they leveraged the highly efficient hardware tracing to log the control flow and timing information of unmodified programs at runtime. Second, they designed a sophisticated binary analysis algorithm to recover the data flow offline based on the memory dumps, as well as the control flow logged by the hardware tracing.<\/p>\n<p>REPT has been deployed into the ecosystem of Windows. Its hardware tracing component runs on hundreds of millions of Windows 10 devices, its binary analysis component is integrated into Windows Debugger, and Windows Error Reporting is enhanced to support REPT.<\/p>\n<p><a href=\"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/publication\/proving-the-correct-execution-of-concurrent-services-in-zero-knowledge\/\"><strong>Proving the Correct Execution of Concurrent Services in Zero-Knowledge<\/strong><\/a><\/p>\n<p>In this paper, my coauthors and I introduce a system called Spice. Spice makes a significant advance toward realizing a foundational primitive called verifiable state machines (VSMs), which has applications in third-party computing models such as cloud computing and blockchains.<\/p>\n<p>A VSM is a request-processing service that produces cryptographic proofs establishing requests were executed correctly according to a specification. These proofs satisfy two important properties: They are very short and a verifier can check them efficiently without re-execution, and they are zero-knowledge, meaning that a verifier does not learn anything about the content of requests, responses, or the internal state of the service. Because of these properties, VSMs can be used to implement publicly verifiable versions of security-critical services such as payment networks, private stock exchanges, blockchains, and smart contracts \u2014without exposing private, sensitive details of the service to a verifier or an auditor.<\/p>\n<p>There is prior work that implements this primitive, but they incur prohibitive resource costs. Spice addresses these issues with new techniques that span multiple areas, including systems, cryptography, and theory. These advances enable Spice, running on a cluster of 16 Microsoft Azure servers, to achieve 488\u20131,167 transactions\/second for a variety of services, including distributed payment networks, cloud-hosted ledgers, and dark pools. This represents an 18,000\u2013685,000 times higher throughput than prior state of the art.<\/p>\n<p><a href=\"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/publication\/focus-querying-large-video-datasets-with-low-latency-and-low-cost\/\"><strong>Focus: Querying Large Video Datasets with Low Latency and Low Cost<\/strong><\/a><\/p>\n<p>Large volumes of video are continuously recorded from cameras deployed for traffic control and surveillance. A key goal of these recordings is to answer \u201cafter the fact\u201d queries, such as identifying video frames with objects of certain classes, such as cars or bags, from many days of recorded video. Such queries are used by analysts for planning, investigations, and many other activities. Current systems for processing such queries incur either high cost at video ingest time or high latency at query time. Researchers present Focus, a system providing both low-cost and low-latency querying on large video datasets.<\/p>\n<p>Focus\u2019s architecture flexibly and effectively divides the query processing work between ingest time and query time. At ingest time of live videos, Focus uses cheap convolutional network classifiers (CNNs) to construct an \u201capproximate index\u201d of all possible object classes in each frame. At query time, Focus leverages this approximate index to provide low latency, compensating for the lower accuracy of the cheap CNNs through the judicious use of expensive and accurate CNNs. Experiments on commercial video streams show that Focus is 48 times (and up to 92 times) cheaper than using expensive CNNs for ingestion and provides 125 times (and up to 607 times) lower query latency than state-of-the-art video querying systems.<\/p>\n<p><a href=\"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/publication\/graviton-trusted-execution-environments-on-gpus\/\"><strong>Graviton: Trusted Execution Environments on GPUs<\/strong><\/a><\/p>\n<p>Trusted execution environments (TEEs) can serve as a building block of a secure and trustworthy cloud. While cloud operators are increasingly relying on accelerators such as GPUs and specialized AI processors, existing TEEs are restricted to CPUs and cannot be used in applications that offload computation to accelerators, creating an undesirable tradeoff between security and performance. The Graviton project investigates the design of TEEs on GPUs to enable applications to securely offload security- and performance-sensitive computations to GPUs with strong isolation from privileged attackers. This work demonstrates several points: Hardware complexity is low, as the proposed hardware extensions are limited to peripheral components of the GPU; the complexity of all security protocols can be hidden behind the GPU programming model; and the performance overhead is low.<\/p>\n<p>Besides these papers previewed here, there are many other exciting papers that will be presented at OSDI by Microsoft Research. We look forward to sharing more details on these works at the conference!<\/p>\n<h3><strong>Microsoft Research Contributions to OSDI 2018<\/strong><\/h3>\n<p><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/www.usenix.org\/conference\/osdi18\/presentation\/huang\">Capturing and Enhancing In Situ System Observability for Failure Detection<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><br \/>\nPeng Huang, Johns Hopkins University; Chuanxiong Guo, ByteDance Inc.; Jacob R. Lorch and Lidong Zhou, Microsoft Research; Yingnong Dang, Microsoft<\/p>\n<p><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/www.usenix.org\/conference\/osdi18\/presentation\/weidong\">REPT: Reverse Debugging of Failures in Deployed Software<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><br \/>\nWeidong Cui and Xinyang Ge, Microsoft Research Redmond; Baris Kasikci, University of Michigan; Ben Niu, Microsoft Research Redmond; Upamanyu Sharma, University of Michigan; Ruoyu Wang, Arizona State University; Insu Yun, Georgia Institute of Technology<\/p>\n<p><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/www.usenix.org\/conference\/osdi18\/presentation\/berger\">RobinHood: Tail Latency Aware Caching \u2014 Dynamic Reallocation from Cache-Rich to Cache-Poor<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><br \/>\nDaniel S. Berger and Benjamin Berg, Carnegie Mellon University; Timothy Zhu, Pennsylvania State University; Siddhartha Sen, Microsoft Research; Mor Harchol-Balter, Carnegie Mellon University<\/p>\n<p><a href=\"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/publication\/focus-querying-large-video-datasets-with-low-latency-and-low-cost\/\">Focus: Querying Large Video Datasets with Low Latency and Low Cost<\/a><br \/>\nKevin Hsieh, Carnegie Mellon University; Ganesh Ananthanarayanan and Peter Bodik, Microsoft; Shivaram Venkataraman, Microsoft \/ UW-Madison; Paramvir Bahl and Matthai Philipose, Microsoft; Phillip B. Gibbons, Carnegie Mellon University; Onur Mutlu, ETH Zurich<\/p>\n<p><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/www.usenix.org\/conference\/osdi18\/presentation\/chajed\">Verifying Concurrent Software Using Movers in CSPEC<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><br \/>\nTej Chajed and Frans Kaashoek, MIT CSAIL; Butler Lampson, Microsoft; Nickolai Zeldovich, MIT CSAIL<\/p>\n<p><a href=\"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/publication\/proving-the-correct-execution-of-concurrent-services-in-zero-knowledge\/\">Proving the Correct Execution of Concurrent Services in Zero-Knowledge<\/a><br \/>\nSrinath Setty, Microsoft Research; Sebastian Angel, University of Pennsylvania; Trinabh Gupta, Microsoft Research and UCSB; Jonathan Lee, Microsoft Research<\/p>\n<p><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/www.usenix.org\/conference\/osdi18\/presentation\/lockerman\">The FuzzyLog: A Partially Ordered Shared Log<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><br \/>\nJoshua Lockerman, Yale University; Jose M. Faleiro, UC Berkeley; Juno Kim, UC San Diego; Soham Sankaran, Cornell University; Daniel J. Abadi, University of Maryland, College Park; James Aspnes, Yale University; Siddhartha Sen, Microsoft Research; Mahesh Balakrishnan, Yale University \/ Facebook<\/p>\n<p><a href=\"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/publication\/orca-differential-bug-localization-in-large-scale-services\/\">Orca: Differential Bug Localization in Large-Scale Services<\/a><br \/>\nRanjita Bhagwan, Rahul Kumar, Chandra Sekhar Maddila, and Adithya Abraham Philip, Microsoft Research India<\/p>\n<p><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/www.usenix.org\/conference\/osdi18\/presentation\/xiao\">Gandiva: Introspective Cluster Scheduling for Deep Learning<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><br \/>\nWencong Xiao, Beihang University & Microsoft Research; Romil Bhardwaj, Ramachandran Ramjee, Muthian Sivathanu, and Nipun Kwatra, Microsoft Research;Zhenhua Han, The University of Hong Kong and Microsoft Research; Pratyush Patel, Microsoft Research; Xuan Peng, Huazhong University of Science and Technology and Microsoft Research; Hanyu Zhao, Peking University and Microsoft Research; Quanlu Zhang, Fan Yang, and Lidong Zhou, Microsoft Research<\/p>\n<p><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/www.usenix.org\/conference\/osdi18\/presentation\/lee\">PRETZEL: Opening the Black Box of Machine Learning Prediction Serving Systems<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><br \/>\nYunseong Lee, Seoul National University; Alberto Scolari, Politecnico di Milano; Byung-Gon Chun, Seoul National University; Marco Domenico Santambrogio, Politecnico di Milano; Markus Weimer and Matteo Interlandi, Microsoft<\/p>\n<p><a href=\"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/publication\/graviton-trusted-execution-environments-on-gpus\/\">Graviton: Trusted Execution Environments on GPUs<\/a><br \/>\nStavros Volos and Kapil Vaswani, Microsoft Research; Rodrigo Bruno, INESC-ID \/ IST, University of Lisbon<\/p>\n<p><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/www.usenix.org\/conference\/osdi18\/presentation\/iyer\">ASAP: Fast, Approximate Graph Pattern Mining at Scale<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><br \/>\nAnand Padmanabha Iyer, UC Berkeley; Zaoxing Liu and Xin Jin, Johns Hopkins University; Shivaram Venkataraman, Microsoft Research \/ University of Wisconsin; Vladimir Braverman, Johns Hopkins University; Ion Stoica, UC Berkeley<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Researchers from Microsoft Research will present their latest advances in computer systems at the USENIX Symposium on Operating Systems Design and Implementation 2018 \u2014 the biennial flagship conference for systems research \u2014 October 8\u201310 in Carlsbad, California. These advances cover a broad spectrum of topics, as evident by the number of papers coauthored by researchers [&hellip;]<\/p>\n","protected":false},"author":37074,"featured_media":509339,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"msr-url-field":"","msr-podcast-episode":"","msrModifiedDate":"","msrModifiedDateEnabled":false,"ep_exclude_from_search":false,"_classifai_error":"","msr-author-ordering":[{"type":"user_nicename","value":"Srinath Setty","user_id":"33709"}],"msr_hide_image_in_river":0,"footnotes":""},"categories":[194489,194463],"tags":[],"research-area":[13558,13547],"msr-region":[],"msr-event-type":[],"msr-locale":[268875],"msr-post-option":[],"msr-impact-theme":[],"msr-promo-type":[],"msr-podcast-series":[],"class_list":["post-508862","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","category-systems","msr-research-area-security-privacy-cryptography","msr-research-area-systems-and-networking","msr-locale-en_us"],"msr_event_details":{"start":"","end":"","location":""},"podcast_url":"","podcast_episode":"","msr_research_lab":[],"msr_impact_theme":[],"related-publications":[],"related-downloads":[],"related-videos":[],"related-academic-programs":[],"related-groups":[],"related-projects":[],"related-events":[507671],"related-researchers":[{"type":"user_nicename","value":"Srinath Setty","user_id":33709,"display_name":"Srinath Setty","author_link":"<a href=\"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/people\/srinath\/\" aria-label=\"Visit the profile page for Srinath Setty\">Srinath Setty<\/a>","is_active":false,"last_first":"Setty, Srinath","people_section":0,"alias":"srinath"}],"msr_type":"Post","featured_image_thumbnail":"<img width=\"960\" height=\"540\" src=\"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-content\/uploads\/2018\/10\/ComputerSystemsOSDI_CS_Site_10_2018_1400x788.png\" class=\"img-object-cover\" alt=\"computer data center\" decoding=\"async\" loading=\"lazy\" srcset=\"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-content\/uploads\/2018\/10\/ComputerSystemsOSDI_CS_Site_10_2018_1400x788.png 1400w, https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-content\/uploads\/2018\/10\/ComputerSystemsOSDI_CS_Site_10_2018_1400x788-300x169.png 300w, https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-content\/uploads\/2018\/10\/ComputerSystemsOSDI_CS_Site_10_2018_1400x788-768x432.png 768w, https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-content\/uploads\/2018\/10\/ComputerSystemsOSDI_CS_Site_10_2018_1400x788-1024x576.png 1024w, https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-content\/uploads\/2018\/10\/ComputerSystemsOSDI_CS_Site_10_2018_1400x788-1066x600.png 1066w, https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-content\/uploads\/2018\/10\/ComputerSystemsOSDI_CS_Site_10_2018_1400x788-655x368.png 655w, https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-content\/uploads\/2018\/10\/ComputerSystemsOSDI_CS_Site_10_2018_1400x788-343x193.png 343w\" sizes=\"auto, (max-width: 960px) 100vw, 960px\" \/>","byline":"<a href=\"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/people\/srinath\/\" title=\"Go to researcher profile for Srinath Setty\" aria-label=\"Go to researcher profile for Srinath Setty\" data-bi-type=\"byline author\" data-bi-cN=\"Srinath Setty\">Srinath Setty<\/a>","formattedDate":"October 5, 2018","formattedExcerpt":"Researchers from Microsoft Research will present their latest advances in computer systems at the USENIX Symposium on Operating Systems Design and Implementation 2018 \u2014 the biennial flagship conference for systems research \u2014 October 8\u201310 in Carlsbad, California. These advances cover a broad spectrum of topics,&hellip;","locale":{"slug":"en_us","name":"English","native":"","english":"English"},"_links":{"self":[{"href":"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/posts\/508862","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/users\/37074"}],"replies":[{"embeddable":true,"href":"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/comments?post=508862"}],"version-history":[{"count":12,"href":"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/posts\/508862\/revisions"}],"predecessor-version":[{"id":510848,"href":"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/posts\/508862\/revisions\/510848"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/media\/509339"}],"wp:attachment":[{"href":"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/media?parent=508862"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/categories?post=508862"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/tags?post=508862"},{"taxonomy":"msr-research-area","embeddable":true,"href":"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/research-area?post=508862"},{"taxonomy":"msr-region","embeddable":true,"href":"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/msr-region?post=508862"},{"taxonomy":"msr-event-type","embeddable":true,"href":"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/msr-event-type?post=508862"},{"taxonomy":"msr-locale","embeddable":true,"href":"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/msr-locale?post=508862"},{"taxonomy":"msr-post-option","embeddable":true,"href":"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/msr-post-option?post=508862"},{"taxonomy":"msr-impact-theme","embeddable":true,"href":"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/msr-impact-theme?post=508862"},{"taxonomy":"msr-promo-type","embeddable":true,"href":"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/msr-promo-type?post=508862"},{"taxonomy":"msr-podcast-series","embeddable":true,"href":"https:\/\/new-cm-edgedigital.pages.dev\/en-us\/research\/wp-json\/wp\/v2\/msr-podcast-series?post=508862"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}