Language Selection

English French German Italian Portuguese Spanish

FlexiWAN Adopts an 'Open' Slant

Filed under
OSS
Security
  • Stealthy Start-Up Portends 'Second Wave of SD-WAN'
  • The First SD-WAN Open Source Driving the Second Wave of SD-WAN by flexiWAN
  • flexiWAN Launches With Open Source SD-WAN Architecture

    Will open source usher in the second-wave of SD-WAN? Startup flexiWAN's co-founder and CEO Amir Zmora thinks so.

  • FlexiWAN soft launches SD-WAN software based on open source architecture

    Israel-based start-up FlexiWAN has started conducting proof-of-concept trials to test its SD-WAN software product, which aims to use open source architecture as a differentiator. With this approach, the company hopes to attract IT managers by providing more control over the capabilities and elements within their networks.

  • FlexiWAN pushes SD-WAN into an open source architecture

    Among the goals of flexiWAN co-founder and CEO Amir Zmora is to give enterprises and service providers the ability to differentiate their SD-WAN services instead of relying on SD-WAN vendors to define them.

    After years of working in the VoIP space, and after attending numerous industry conferences where SD-WAN was a hot topic, Zmora said that he came to the realization that SD-WAN solutions were closed black boxes that didn't enable innovation.

    [...]

    Chua said he has been waiting to see an open-source approach to SD-WAN. He said there were two elements to SD-WAN; the SD-WAN element and the universal CPE element.

    "So, on the SD-WAN side of things, which is, I think, where he's (Zmora) starting, there are elements in place in open source where you can try to cobble things together to make an SD-WAN solution," Chua said. "So, there's IPSec or an open SSL VPN, firewalls, things like that.

    "What's missing is that cloud control policy elements that aren't quite there. So, there's no open source equivalent, that I know of, on the whole cloud control side for the centralized policies, centralized configuration and of all the different SD-WAN components out there."

More in Tux Machines

Screencasts and Shows: ArcoLinux 19.12 Run Through, TechSNAP and Python Bytes

today's howtos

Security Leftovers

  • WordPress 5.3.1 Security and Maintenance Release

    This security and maintenance release features 46 fixes and enhancements. Plus, it adds a number of security fixes—see the list below. WordPress 5.3.1 is a short-cycle maintenance release. The next major release will be version 5.4. You can download WordPress 5.3.1 by clicking the button at the top of this page, or visit your Dashboard → Updates and click Update Now.

  • 49% of workers, when forced to update their password, reuse the same one with just a minor change

    For instance, not only did 72% of users admit that they reused the same passwords in their personal life, but also 49% admitted that when forced to update their passwords in the workplace they reused the same one with a minor change.

  • The FSB’s personal hackers How Evil Corp, the world’s most powerful hacking collective, takes advantage of its deep family ties in the Russian intelligence community

    On December 5, the U.S. government formally indicted members of the Russian hacker group “Evil Corp.” Washington says these men are behind “the world’s most egregious cyberattacks,” causing hundreds of millions of dollars in damages to banks. The Justice Department believes Evil Corp’s leader is Maxim Yakubets, who remains at large and was still actively involved in hacking activities as recently as March 2019. Meduza investigative journalist Liliya Yapparova discovered that Evil Corp’s hackers belong to the families of high-ranking Russian state bureaucrats and security officials. She also learned more about the Russian intelligence community’s close ties to Maxim Yakubets, whose arrest is now worth $5 million to the United States.

Programming Leftovers

  • Fedora 32 Will Feature Bleeding-Edge Compilers Again With LLVM 10 + GCC 10

    Fedora Linux is on track to deliver another bleeding-edge compiler toolchain stack with Fedora 32 due out this spring.  Fedora's spring releases have tended to always introduce new GNU Compiler Collection (GCC) releases that are generally out a few weeks before the April~May Fedora releases. Thanks to Red Hat employing several GCC developers that collaborate with Fedora, they tend to stick to ensuring Fedora ships new GCC releases quite quickly while managing minimal bugs -- in part due to tracking GCC development snapshots well before launch to begin the package rebuilds. 

  • What makes Python a great language?

    I know I’m far from the only person who has opined about this topic, but figured I’d take my turn. A while ago I hinted on Twitter that I have Thoughts(tm) about the future of Python, and while this is not going to be that post, this is going to be important background for when I do share those thoughts. If you came expecting a well researched article full of citations to peer-reviewed literature, you came to the wrong place. Similarly if you were hoping for unbiased and objective analysis. I’m not even going to link to external sources for definitions. This is literally just me on a soap box, and you can take it or leave it. I’m also deliberately not talking about CPython the runtime, pip the package manager, venv the %PATH% manipulator, or PyPI the ecosystem. This post is about the Python language. My hope is that you will get some ideas for thinking about why some programming languages feel better than others, even if you don’t agree that Python feels better than most.

  • Python String Replace

    In this article, we will talk about how to replace a substring inside a string in Python, using the replace() method. .replace() Method In Python, strings are represented as immutable str objects. The str class comes with many methods that allow you to manipulate strings. The .replace() method takes the following syntax: str.replace(old, new[, maxreplace]) str - The string you are working with. old – The substring you want to replace.