CPUG.org: The risks of centralized open-source

Notice: This blog post was originally published on Indeni before its acquisition by BlueCat.

The content reflects the expertise and perspectives of the Indeni team at the time of writing. While some references may be outdated, the insights remain valuable. For the latest updates and solutions, explore the rest of our blog

The recent events with CPUG.org (Barry shutting down the site) have led to many conversations between Check Point users around the globe. Who owns the knowledge accumulated on CPUG.org? Are the users of CPUG.org for sale? If the site never comes back up, what happens to all the content contributed by thousands of users around the world?

It causes you to think – when a community picks a site and decides to contribute content to it, is the community aware that it doesn’t own the content? What happens if YouTube were to shut down? It’s very different to open-source development, where each contributor essentially has a copy of all the code. Here, no single contributor has a copy of any of the content that CPUG.org contained. It’s all lost now.

The only upside of this turn of events is that something important has been emphasized yet again – knowledge is critical. In order to do their jobs, Check Point administrators around the globe have relied on CPUG.org for the knowledge it contained. Their job is now negatively impacted by the lack of CPUG.org’s availability. Knowledge is something that needs to be collected and protected.

At indeni, that is what we do. We collect knowledge, we deliver it and we ensure it won’t disappear one day. We’re sad to see what’s going on at CPUG.org but would like to take the opportunity to say: your knowledge is safe with us. We welcome any contribution of knowledge and will make it available to all of our users immediately. Therefore, your effort turns into direct assistance to others around the world, almost instantly. That’s powerful.

For examples of the knowledge indeni has in the Check Point world, click here.


Published in:

Related content

Route traffic intelligently with DNS-based GSLB for BlueCat Edge

Discover how DNS-based GSLB with BlueCat Edge empowers networking teams to control traffic steering, reduce costs, and improve resilience.

Read more
Webinar

Making APIs Work for You (Part 5)

Welcome to Part 5 of Making APIs Work for You. Our community specialist, Vivek Mistry, is your guide, and today, Vivek will focus on user security…

Read more
Image shows BlueCat cathead image in the background with the text "Introducing Integrity X" appear over it. Integrity X is the newest version of BlueCat's DDI management solution.

Exciting product update: Introducing BlueCat Integrity X

Introducing BlueCat Integrity X, a single platform for complete visibility and control over critical network services.

Read more
Article

What is protective DNS (PDNS) and why is PDNS important?

Discover what protective DNS is, how it prevents cyber threats like phishing and malware, and why it’s essential for modern enterprise network security.

Read more