Microsoft: Linux Is the Top Operating System on Azure Today

Azure used to be a cloud platform dedicated to Windows. Now, it’s the most widely used operating system on Microsoft Azure. The New Stack’s Joab Jackson writes: These days, Microsoft expends considerable effort that Linux runs as smoothly as possible on Azure, according to a talk given earlier this year at the Linux Foundation Open Source Summit given by two Microsoft Azure Linux Platforms Group program managers, Jack Aboutboul, and Krum Kashan. “Linux is the #1 operating system in Azure today,” Aboutoul said. And all must be supported in a way that Microsoft users have come to expects. Hence, the need for the Microsoft’s Linux Platforms Group, which provides support Linux to both the internal customers and to Azure customers. These days, the duo of engineers explained, Microsoft knows about as much as anyone about how to operate Linux at hyperscale. […]

As of today, there are hundreds of Azure and Azure-based services running on Linux, including the Azure Kubernetes Service (AKS), OpenAI, HDInsight, and many of the other database services. “A lot of the infrastructure powering everything else is running on Linux,” Aboutoul said. “They’re different flavors of Linux running all over the place,” Aboutoul said. To run these services, Microsoft maintains its own kernel, Azure Linux, and in 2023 the company released its own version of Linux, Azure Linux. But Azure Linux is just a small portion of all the other flavors of Linux running on Azure, all of which Microsoft must work with to support.

Overall, there are about 20,000 third-party Software as a Service (SaaS) packages in the Azure marketplace that rely on some Linux distribution. And when things go wrong, it is the Azure service engineers who get the help tickets. The company keeps a set of endorsed Linux distributions, which include Red Hat Enterprise Linux, Debian, Flatcar, Suse, Canonical, and Oracle Linux and CentOS (as managed by OpenLogic, not Red Hat). […] Overall, the company gets about 1,000 images a month from these endorsed partners alone. Many of the distributions have multiple images (Suse has a regular one, and another one for high-performance computing, for instance).

Read more of this story at Slashdot.

One Nation Mostly Unaffected by the Crowdstrike Outage: China

The BBC reports that “while most of the world was grappling with the blue screen of death on Friday,” there was one country that managed to escape largely unscathed: China.

The reason is actually quite simple: CrowdStrike is hardly used there. Very few organisations will buy software from an American firm that, in the past, has been vocal about the cyber-security threat posed by Beijing. Additionally, China is not as reliant on Microsoft as the rest of the world. Domestic companies such as Alibaba, Tencent and Huawei are the dominant cloud providers.

So reports of outages in China, when they did come, were mainly at foreign firms or organisations. On Chinese social media sites, for example, some users complained they were not able to check into international chain hotels such as Sheraton, Marriott and Hyatt in Chinese cities. Over recent years, government organisations, businesses and infrastructure operators have increasingly been replacing foreign IT systems with domestic ones. Some analysts like to call this parallel network the “splinternet”.

“It’s a testament to China’s strategic handling of foreign tech operations,” says Josh Kennedy White, a cybersecurity expert based in Singapore. “Microsoft operates in China through a local partner, 21Vianet, which manages its services independently of its global infrastructure. This setup insulates China’s essential services — like banking and aviation — from global disruptions.”
“Beijing sees avoiding reliance on foreign systems as a way of shoring up national security.”
Thanks to long-time Slashdot reader hackingbear for sharing the article.

Read more of this story at Slashdot.

US Prepares Jamming Devices Targeting Russia, China Satellites

In April the U.S. Space Force began testing “a new ground-based satellite jamming weapon to help keep U.S. military personnel safe from potential ‘space-enabled’ attacks” (according to a report from Space.com). The weapon was “designed to deny, degrade, or disrupt communications with satellites overhead, typically through overloading specific portions of the electromagnetic spectrum with interference,” according to the article, with the miitary describing it as a small form-factor system “designed to be fielded in large numbers at low-cost and operated remotely” and “provide counterspace electronic warfare capability to all of the new Space Force components globally.”

And now, Bloomberg reports that the U.S. is about to deploy them:
The devices aren’t meant to protect U.S. satellites from Chinese or Russian jamming but “to responsibly counter adversary satellite communications capabilities that enable attacks,” the Space Force said in a statement to Bloomberg News. The Pentagon strives — on the rare occasions when it discusses such space capabilities — to distinguish its emerging satellite-jamming technology as purely defensive and narrowly focused. That’s as opposed to a nuclear weapon the U.S. says Russia is developing that could create high-altitude electromagnetic pulses that would take out satellites and disrupt entire communications networks.

The first 11 of 24 Remote Modular Terminal jammers will be deployed in several months, and all of them could be in place by Dec. 31 at undisclosed locations, according to the Space Force statement… The new terminals augment a much larger jamming weapon called the Counter Communications System that’s already deployed and a mid-sized one called Meadowlands “by providing the ability to have a proliferated, remotely controlled and relatively relocatable capability,” the Space Force said. The Meadowlands system has encountered technical challenges that have delayed its delivery until at least October, about two years later than planned.
China has “hundreds and hundreds of satellites on orbit designed to find, fix, track, target and yes, potentially engage, US and allied forces across the Indo-Pacific,” General Stephen Whiting, head of US Space Command, said Wednesday at the annual Aspen Security Forum. “So we’ve got to understand that and know what it means for our forces.”
Bloomberg also got this comment from the chief director of space security and stability at the Secure World Foundation (which produces reports on counterspace weapons). The new U.S. Space Force jamming weapons are “reversible, temporary, non-escalatory and allow for plausible deniability in terms of who the instigator is.”

Read more of this story at Slashdot.