Flyway’s Growth Demonstrates the Value of Open Source for Software Companies – RealWire

Following its $10 million acquisition of Flyway, Redgate Software has secured the future of the popular Open Source database migration tool by taking a new approach to software development.

CAMBRIDGE, England December 15, 2020 Redgate Softwares multimillion-dollar acquisition of Flyway in 2019 was an ambitious move to help organizations include any database in DevOps by using the tool to standardize migrations across more than 20 different databases and platforms. The investment encouraged Redgate to fully embrace the Open Source software approach, and the company today confirmed it is doubling the size of the development team behind Flyway and recommitted to maintaining a free Community version under the Apache v2 license.

Like many software companies, Redgate has a portfolio of proprietary database development tools and solutions, and Flyway was the companys first foray into the Open Source arena. This presented a challenge in the way the tool was managed and developed.

From day one, Redgate committed to keeping the Community Edition of the tool, which is free to individual users, and continuing to maintain, support and improve it. The company also wanted to increase the number of businesses using the paid-for versions of the tool by streamlining them to a Teams Edition and adding additional features and support.

This required a different approach to the ongoing development of Flyway because its success needed to be measured by the number of monthly active users of the Community edition as well as the monthly recurring revenue from the Teams edition.

As Kendra Little, Redgate DevOps Advocate and a big fan of Flyway, comments: Companies cant go wrong with Flyway, but it does present a dilemma. On one hand, you want individuals to keep using the free tool they already enjoy. On the other, you want larger teams to embrace the paid version with extra available features. It turns traditional software on its head because you need two go-to-market strategies, not one.

Redgate found the solution in the 1-2-3 Model developed by Adam Gross, technology investor and adviser, based on his work at Heroku. He helped to grow the revenue of the cloud application platform from $35m to $300m by shifting the companys focus away from the traditional approach of selling software at the department or enterprise level.

Instead, the model focuses on encouraging individual adoption with a free version, migrating users up to teams with a paid-for self-serve option, and having an enterprise version at the end of the customer journey rather than the beginning.

Flyway now fulfils the first two steps in the model, and is integrated into Redgate Deploy, Redgates new cross-database development solution, to meet the needs of enterprises. From version control to continuous delivery, Redgate Deploy lets enterprises automate database development processes across different databases, accelerate software delivery and ensure quality code.

Over the last 18 months, Flyway has broadened Redgates understanding of Open Source software and shown how the demands of individuals, teams and enterprises can all be satisfied by offering a stepladder of benefits and capabilities depending on need. Redgate now has better visibility of database deployments across different technologies and among full stack developers, which in turn is helping inform what additional features should be created.

As a direct result, Redgate has doubled the revenue from the paid-for edition of Flyway, and the 1-2-3 Model has cemented the future of the free Community Edition, downloads of which also doubled to 40 million in 2020.

For more information about Flyway, or to get in touch with the team, please visit http://www.flywaydb.org.

About Redgate SoftwareRedgate makes ingeniously simple software used by over 800,000 IT professionals around the world and is the leading Database DevOps solutions provider. Redgate's philosophy is to design highly usable, reliable tools which elegantly solve the problems developers and DBAs face every day and help them to adopt compliant database DevOps. As well as streamlining database development and preventing the database being a bottleneck, this helps organizations introduce data protection by design and by default. As a result, more than 100,000 companies use Redgate tools, including 91% of those in the Fortune 100.

ContactsMeghana ShendrikarAllison+Partners for Redgate SoftwareRedgate@allisonpr.com

Read the original post:

Flyway's Growth Demonstrates the Value of Open Source for Software Companies - RealWire

code Talks: a podcast series on driving innovation with an open health care ecosystem – cerner.com

2020 has taught us that health IT must evolve at a rapid pace to meet the needs of patients and providers. Creating a seamlessly connected world is key to breakthrough innovation.

The Cerner Open Developer Experience (code) program encourages third-party vendors and care organizations to build apps on top of Cerner technology that can quickly advance the health industry through improved interoperability capabilities.

In our three-part podcast series,code Talks, tech leaders share their insights around advancing care through collaboration and open and interoperable health ecosystems.

In this episode, we hear from Aaron Sheedy, chief operating officer and co-founder ofXealth, a platform that enablesclinicianstointegrate, prescribe and monitordigitalhealth tools forpatientsfrom one location in the electronic health record (EHR). Aaron talks about how the Cerner code validation and certification process helped drive quality, safety, security and usability for the Xealth app. He also gives his outlook for digital health and application programming interfaces.

Amwell offers telehealth integration within the Cerner EHR to give providers a single, unified workflow and improve access to care for patients. In this episode, Amwell Senior Vice President of Devices, Cory Costley, dives into the rapid growth of telehealth during COVID-19, examines how the Cerner code program helps break down barriers to health IT adoption and explores the industrys shift toward more proactive care.

Shez Partovi, M.D., worldwide lead of business development for healthcare, life sciences, genomics and medical devices at Amazon Web Services (AWS), discusses the importance of connecting patient data across the care continuum. Dr. Partovi also explains the role of interoperability, open standards in reducing care costs and providing more personalized health care.

The code program is leading health care innovation by opening our ecosystem to create new technologies and applications. Developers interested in building applications that integrate into client workflows can learn more here.

Read more from the original source:

code Talks: a podcast series on driving innovation with an open health care ecosystem - cerner.com

Visual Studio Code adds extension bisect to find out what’s troubling you – DevClass

The housekeeping session at Microsoft continued in November as it ironed out 5242 Visual Studio Code issues, paving the way to release v1.52 of the open source editor.

Aside from the end of year clean up, the VSC team worked on the IDEs usability, for example fitting the integrated file explorer with undo and redo functionality for all file operations a handy thing should you accidentally use the wrong shortcut. Operations taking unusually long will signal theyre still in progress via a status bar now, though theres also an initial implementation for a cancelling option. And if you really need all the views to be open, scrollbars will appear to let you get to the information youre looking for.

Developers who like their windows restored when opening the development environment no matter if theyre opening a project file or just start the programme can use a new setting in window.restoreWindows to enforce such a behaviour. VS Code will also preserve the Source Control view state across sessions, meaning that collapsed trees will stay that way after relaunching.

Git users should inspect the new additions to the Git command palette, which now includes cherry pick, rename, push tags, and checkout to (detached). Theyll also receive a nudge to save unsaved files before attempting to stash changes, and get to play with a variety of new settings which help with things like ignoring changes in submodules, controlling what refs are shown on checkout, and following tags when synchronising.

When tabs are disabled, VSC 1.52 adds file path information for better orientation should you have opened a diff via the source control view. The diff editor can now support word wrapping in both the inline and side-by-side displaying for a better overview.

IntelliSense has become a little smarter as well, now offering word suggestions based on other open files in instances where no language service is available or cant help because youre, for example, writing a comment. On the topic of spaces vs tabs, VSC now comes with a editor.stickyTabStops setting which makes VS Code treat cursor movements in leading spaces similar to tabs.

The VS Code team also worked on the Keyboard Shortcuts editor, which now allows configuring a keybinding for Command Palette commands via the Configure Keybinding gear, and introduced a new feature to help users find out if an extension is causing buggy behaviour.

This so-called Extension Bisect can be found in the Help section of the tool and guides developers through the process of disabling extensions and turning them back on again. After each reload the tool checks if the issue is still there, and ends in a prompt to report the problem once it has been resolved.

Read the original post:

Visual Studio Code adds extension bisect to find out what's troubling you - DevClass

5 key app sec trends for 2021: The shift is on for software teams – TechBeacon

For many companies, 2020 was about accelerating their move to the cloud. The pandemic drove a dramatic expansion of remote work, developers focused more on cloud-native deployments, and application security teamshad to adapt to a change in usage and, often, greater demand.

In 2021, many of those seeds will take root. Businesses that accelerated digital transformations will need to secure their infrastructure, developers working remotely on cloud-native applications will have more integrated security in their coding environments, and applicationsecurity teams will be tasked with facilitating faster development cycles, rather than just finding vulnerabilities.

Overall, expect more security, automation, and coding throughout the development and deployment process, said Mike Ware, senior director of technology for Synopsys, a software-security company. Rather than just shifting security leftward to the developer, security will become a part of every piece of infrastructure, he said.

"The notion of 'shift left' will rapidly become a philosophy of 'shift everywhere.' It is not that we are going to stop moving left;we have to move security left. But we need to shift a lot of responsibilities right as well."Mike Ware

While DevOps has broken down some barriers between developers and application security teams, the future will be about more tightly integrating security into developmentand making sure that security focuses on how to produce secure applications. Teams that only focus on finding bugs will continue to slow development, and that will undermine application security in the future, saidSandy Carielli, principal analyst with analyst firm Forrester Research.

Companies will have to broaden the bailiwick of the application security teamit's no longer just about applications, but about APIs, containers, and low-code/no-code services, she said.

Here are five trends your app sec team shouldexpect in the next year.

Digital transformation took over the conversation in 2020. While many companies had focused on moving to the cloud, adding automation, and using software-defined infrastructure to drive their business and operations at the start of the year, the coronavirus pandemic forced most of them to accelerate their plans.

About seven outof every eight executives intended to make their company's operations and infrastructure cloud-native, with about the same share also committing to greater use of containers for application development and deployment, according to a survey conducted by financial giant CapitalOne.

These mandates and realities have trickled down to developers and security teams, especially as remote work has expanded. Existing silos between the groups can slow development and the resolution of security issues, so the pressures have increased to knock those walls down, said Dan Cornell, a principal at the Denim Group, a software-security consultancy, who notedthat about 30% of employees at his firm have never set foot inside theoffice.

"We are seeing the collaboration capabilities of the tooling becoming more important. Because you can't walk down the hall and peek over the cubicle walland ask how something works, teams need better ways to communicate."Dan Cornell

In 2021, security programs will focus more on integrating tools that help developers avoid the mistakes that lead to vulnerabilities, rather than just detecting the software flaws leading to those vulnerabilities, said Martin Knobloch, global application security strategist for Micro Focus.

In the past, the tools typically used at the end of the development cyclestatic application security testing (SAST) and dynamic application security testing (DAST) scanners, for examplehave not been about making the application better, but about finding all the security mistakes, he said. Rather than finding ways to make applications more secure, most of the tools have focused on detailing what's wrong.

Yet, as security becomes more focused on working with developers, such programsbecomeblockers,said Knobloch, who callsthem "bad-o-meters."

"Who has to write the code? The developers. Who has to fix the code? The developers. What we are moving toward is tools for code quality used by developers, and not security tools."Martin Knobloch

Similarly, he said, penetration tests and pen-testing tools will increasingly inform the threat model that can be used to guide developers, rather than just focus on finding ways to break the applications and circumvent security.

Denim Group's Cornell agrees.

"It is hard enougheven when you know the resolution pathto get developers to fix stuff. When you don't know the resolution path, then you are just increasing the amount of badness that you see in the system, you are not actually fixing the application."Dan Cornell

With the expansion of DevOps and infrastructure as codefrom containers to serverless computingover the past five years, security has increasingly become part of the code as well. A great deal of software is based on building blocks, most commonly open-source components, that may not be instantiated until runtime, so security checks have to be built in, said Synopsys'Ware.

An application's security configurations for development, test, and production environments are often the purview of the developer, but more application security teams are also producing code to be included in the application at each stage as well.

"We are certainly seeing more and more software security initiatives focused on DevOps cultures. Software security teams in those groups are having to write more code, because more security is codemore of that software delivering is software-defined in nature."Mike Ware

The tools used by attackers, red teams, and penetration testers continue to integrate more automation and do a lot of the work for application security audits and penetration tests.

But with the shortageof cybersecurity professionals,automation is over-relied on, and this makes for shallow assessments, said Micro Focus's Knobloch. Moreover, because penetration tests are expensive, most assessments are under significant time pressures: A test typically takes fiveto 10 days, and with a day of setup and a day of reporting, often the actual assessment is relegated to as few as three days, he said.

In the end, penetration testers are often well-trained tool operators rather than security-intrusion specialists, Knobloch said.

"You just can't turn security teams into good tool monkeys. Companies need to look forand developreally knowledgeable pen testers."Martin Knobloch

The use of open-source libraries and components in development is almost ubiquitous, with some 99%of applications having at least one open-source component, according to Synopsys's 2020 Open Source Security and Risk Analysis Report. About onethird of vulnerabilities disclosed in 2019 were in open-source products, according to White Source's 2020 State of Open Source Security report.

Determining which open-source components are secure should be a primary concern for any application security group.

You have to provide the "plumbing" that can determine whether something that you are going to bring inwill pose a risk to the enterprise,said Ware.

"The developers needto be able to select the right tools that they need to create an application, but the security teamneeds to have the plumbing in place to educate them and warn them about security issues."Mike Ware

In the end, companies need to make software not only more secure, but more resilient as well, and that means security groups have to work with developers to create the environment to produce better software, said Micro Focus'Knobloch.

"Most security people have to change. They cannot be a gate that code has to go through to pass, or a security tollbooth: Stop here until you get the results back."Martin Knobloch

Forrester'sCarielli said big challenges are in storefor security teams.

"At the same time that security pros are giving up some of their dutiesfinding and fixing vulnerabilitiesto developers, they have to expand into these other fields. There is an expanding definition of code and what are application tools, and so security pros have to look at APIs, at no-code, and at infrastructure as code."Sandy Carielli

Go here to see the original:

5 key app sec trends for 2021: The shift is on for software teams - TechBeacon

Open source vs open core the development battle you may never have heard of [Q&A] – BetaNews

There's a battle playing out in the enterprise open source arena right now, but it's one you probably haven't heard about.

It's a clash between pure open source and commercialized open source (or 'open core') versions. While this may be below the radar for anyone not directly involved it has important long-term implications for the industry.

In an exclusive interview we spoke to Ben Bromhead, the chief technology officer at open source specialist Instaclustr to get his view of the battlefield.

BN: Research has begun to show that enterprise open source adoption has spiked this year and is related to changing economic conditions. Assuming conditions improve in 2021, what will that mean for the open source trajectory?

BB: COVID has accelerated myriad changes across industries that were already inevitable. We've all seen this with major spikes in online shopping and food delivery services, and businesses' expanded work from home policies, to name a few. These were trending up anyway; COVID just sped up the transitions. Open source adoption is firmly in this same category. Open technologies across the stack have been an inevitable trend for enterprises -- driven by better software quality, far more efficient costs, and continual innovation -- that has been accelerated by the conditions that COVID has created. Because of those fundamental factors underpinning open source adoption, I expect that the current rising trajectory will outlast the pandemic. Open source acceleration isn't a one-off spike, it's where more enterprises are headed.

BN: As open source has become more popular for enterprises, so has the rift between pure open source and commercialized open source. Will there be a winner, or are they built for different use cases?

BB: I'm strongly of the opinion that pure open source will be the winner. It's an inevitable truth of the open source/open core dynamic that all of the most valuable closed-source features offered by open core software products will be replicated in the pure open source versions. We've seen this many times over across various open source projects (and contribute to this phenomenon ourselves by developing open source tools when customers demand them). As an open source technology matures, it becomes harder and harder for open core providers to identify opportunities for features that differentiate their product from the 100 percent open source version. Therefore, the natural evolution of open source technology includes mechanisms that eventually leave open core strategies out in the cold, and rightfully so.

BN: Open source continues to make headlines for security concerns. What do enterprises need to understand about open source and security? How big a risk is it and what, specifically, needs to be vetted in an open source technology before using it?

BB: One important point to consider here is the different likelihoods that the vulnerabilities inevitably existing within any piece of complex software will be found and publicly reported. Here's what Im getting at: there's a strong argument that vulnerabilities existing in open source software are much more likely to be identified and reported than those within closed source software. This is one of the many key advantages that open source software intrinsically provides. Open source code is viewed by many more eyeballs, and approached from a much broader range of perspectives. There's a greater diversity of users and of use cases. That naturally results in more vulnerabilities being recognized. So, when comparing the raw numbers of vulnerabilities discovered in open source or closed source software, it's important to acknowledge that finding those vulnerabilities does result in software that is actually more secure.

This leads to another fundamental advantage of open source software, which is that you have an entire community contributing to resolve any bugs and vulnerabilities. The assembled cooperative talent backing open source solutions, and what these communities are capable of achieving, is really a tremendous feat to be celebrated. In comparison, hired teams at companies working to identify and patch vulnerabilities in proprietary software are much more limited in terms of the number of developers on the project, and the scope of what they can accomplish.

As for vetting open source projects, enterprises should evaluate whether a technology is truly free and open, carefully examine licensing terms, and understand the strength of the community and the business motivations of any large commercial entities in that community. The best solutions are supported by communities robust enough to serve the common good, and not be unduly influenced by any one commercial interest.

All that said, using open source software does often demand a greater degree of engineering sophistication than closed source. That's where organizations providing open source support and managed services can manage the risk of adopting new solutions and ensure enterprises can unlock the full benefits of open source software.

BN: Open source, as a term, has just entered its third decade. What's the biggest risk facing open technologies over the next ten years?

BB: The muddying of what open source means through the use of restricted open source licenses is a significant challenge for open source at the moment. At Instaclustr, we favor software governed by open source foundations such as the Apache Foundation, where you can be sure that the governance of the open source project is focused on acting in the best interest of users. And as mentioned, enterprise open source adoption is increasing and on quite a healthy path right now. The challenges of the next ten years may be in better distinguishing true open source offerings, and ensuring that the market gives new adopters the clarity to understand the potential pitfalls ahead when dealing with open core solutions. In scenarios where enterprises dont control their own code, vendor and technical lock-in are very real threats. Hopefully the next decade will see a stark reduction in the number of enterprises that find themselves in such situations.

BN: Do changes need to be made to make open source project development and maintenance more sustainable than they are now?

BB: Many open source projects have proven themselves to be sustainable over the long term under current arrangements. While projects sometimes go through painful periods, if theyre truly valuable then the community will most often find a way to ensure that they continue to be maintained and supported. I'd be hesitant to recommend any broad-brush changes, because successful projects evolve based on the motivations and capacity of the communities that find them useful. Where changes are helpful, communities will naturally determine and drive those changes. Open source projects feature powerful mechanisms that are the reason they command the success they've achieved, and I'm inclined to continue to trust in them.

Image credit:Stillness InMotion/Unsplash

See the original post:

Open source vs open core the development battle you may never have heard of [Q&A] - BetaNews

SD Times Open-Source Project of the Week: Google Fuchsia – SDTimes.com

Fuchsia is an open-source capability-based operating system that was initially released in 2016, and is currently under development by Google.

Google announced this week that it would be expanding on the project and making it easier for the public to contribute. The company released a new public mailing list for project discussions, added a governance model to help users understand how strategic decisions are made, and opened up the issue tracker for public contributors to visualize ongoing work. There is also a technical roadmap that will highlight project direction and priorities.

Currently, the key highlights in the roadmap include a driver framework for updating the kernel independently of the drivers, improving file systems for performance, and expanding the input pipeline to increase accessibility.

As an open source effort, we welcome high-quality, well-tested contributions from all. There is now a process to become a member to submit patches, or a committer with full write access, Wayne Piekarski, developer advocate for Fuchsia, stated in the post.

According to Piekarski, the project is not yet ready for product development or as a development target. However, developers can currently clone, compile, and contribute to it. For those who want to take part in code reviews, Fuchsia has the contribution guidelines and community resources available here.

Continued here:

SD Times Open-Source Project of the Week: Google Fuchsia - SDTimes.com

These startups create innovative products for everyday use – CTech

Fifteen companies advanced to the semifinals of Calcalists and Bank Hapoalim High-Techs StartUp+ competition and will face off for a spot in the finals. A representative from each company gave its 3-minute pitch presenting their solutions, and afterward answered judges' questions. Batsheva Moshe, Head of Poalim High-Tech at Bank Hapoalim spoke at the event.

The judges panel consisted of Eti Ben-Zeev - CIO, Head of Information Technology at Bank Hapoalim; Natalie Refuah, Partner at Viola Growth; Emanuel Timor, General Partner at Vertex Ventures; Sigalit Klimovsky, Partner at Grove Ventures; Ayal Itzkovich, Pitango managing partner; Yuval Cohen, Founder & Managing Partner of StageOne Ventures; Netalie Nadivi, Partner at Triventures; Nofar Amikam, Partner at Glilot Capital Partners; and Rotem Eldar, Managing partner at 10D.

Read the original:

These startups create innovative products for everyday use - CTech

Moving To Linux From Windows: Is Linux Hard To Use? – Fossbytes

The first time I heard about Linux was in 2017, when I was getting started with my college degree. I proceeded with my Computer Science major and stumbled upon Linux as a subject. Id often hear my senior friends terming Linux as a hard to learn subject and all I was taught by the lecturers is learn the syllabus and spill it out on the examination sheet.

As the saying goes by, Not everything you hear is always true, I had some enthusiasm for the subject, and Im glad I dug in and explored this amazing gem of software.

Linux is often overlooked as a hard to use operating system, hence people avoid it without even trying it. Most people want an operating system to work and work very well, and Windows strikes a perfect balance of not being too complex and working well at the same time. But, I bet many people in society are currently on the edge of their seats, trying to find one more reason to ignore Linux.

And to those people, Id say youre missing out on a lot of quality stuff out there, which will not fail to amaze you. Most users complained about the gaming scene on Linux, and Ive written a separate article on the same topic, so check it out.

If you havent got time to read the article, the gaming scene has improved drastically over the past few years. Games like GTA V, CS: GO, and many of them, which dont come with any anti-cheat mechanisms, work better on Linux than on Windows.

Being one of the largest open-source operating systems, people can modify the source code, contribute to the project, or fork (make their own copy) and create their own version of the OS. As a result, there are hundreds of variants that are called Linux Distributions. You always have the freedom to choose or hop into whatever distro that you think suits you.

Not to mention, the OS is a boon for developers. The CLI and the package manager allows developers to get things done faster and easier. Since it is built and maintained by developers, you dont miss out on any development tools. Installing apps on Linux from the GUI store or CLI requires minimum effort.

One of my favorite parts of Linux is customization. Different desktop environments have different features and customizations to make the OS truly yours.

Also, the fact that you get to choose from different desktop environments for the same distribution is amazing. Im a fan of almost all the desktop environments as each one of them has their own advantages and disadvantages.

You dont need to be a rocket scientist; neither do you need to graduate in Computer science to use Linux. All you need is a USB drive and a little curiosity to learn new things. It is not hard to use as most people claim it to be without even trying. In fact, Id say it has a shallow learning curve, and it is superior to Windows in terms of user-friendliness.

All Id say to people starting with their journey is; Dont give up or hesitate to ask if you get stuck. There are millions of people working on the project who can help you learn. Also, Google is your best friend.

That said, some distributions require you to be well versed in Linux. As you climb up the ladder by using easier distros first, youll eventually get to the Pro level IF you have even a tiny bit of enthusiasm in you.

I bet youve heard a lot about the security features of Linux. While it is more secure than Windows, the fact is that not every OS is 100% attack-proof. Due to many people contributing to the project, there are always users who are fixing stuff in the kernel as you read this article keeping the OS secure.

Your data is always safe on Linux and will not be sent to anyone, anywhere.

While 4GB of RAM is recommended for running Windows 10, lightweight distros like Linux Lite dont consume more than 1GB of RAM. Other heavy distros dont need more than 2GB of RAM.

As the OS is less power hungry, you can add new life to old computers that you thought were nothing less than junk.

Beginners often have issues deciding where to start as there are tonnes of distros out there. Id suggest starting by installing any Ubuntu-based distributions like Linux Mint or Pop!_OS or Ubuntu itself. Check out my review of Pop!_OS 20.04 (Spoiler: Its the best Ubuntu-based Linux distro that Ive ever tried.)

Remember, the key to learning Linux is to use it as much as you can. Getting familiar with the CLI would feel like a horrendous task but, once you master it, the skys the limit. Dont be shy about asking for help.

If you aspire to pursue a career in Linux development, make sure to check out this free to read book.

With developers, big firms, and us users putting a lot of effort into making the Linux operating system better, the future of Linux looks bright.

Link:

Moving To Linux From Windows: Is Linux Hard To Use? - Fossbytes

The Prosecution of Julian Assange Is an Assault on the First Amendment – Reason

Some establishment journalists in the U.S. consider Julian Assange to be a criminal whose work doesn't fit into the same category as their own.

In April 2019, police dragged the WikiLeaks founder out of the Ecuadorian embassy where he'd lived for seven years after the U.S. government indicted him for allegedly helping Chelsea Manning access government databases. The New York Times editorial board applauded the move, writing that it "could help draw a sharp line between legitimate journalism and dangerous cybercrime," and that, "The [Trump] administration has begun well by charging Mr. Assange with an indisputable crime."

"Julian Assange is not a free-press hero," The Washington Posteditorial board opined, "And he is long overdue for personal accountability."

Then in May 2019, the U.S. Department of Justice (DOJ) unsealed a second set of charges against Assange that, if they were to result in a conviction, could set a dangerous legal precedent that would put all investigative journalists who expose state secrets at risk of going to prison. Whether the media considers Assange one of their own, his fate could have a profound impact on the future of their profession.

The DOJ charged Assange with violating the Espionage Act of 1917 by publishing the information leaked by Chelsea Manning. If convicted, he could face up to 175 years in prison.

Edward Snowden, a former government contractor, has also been charged under the Espionage Act for leaking information to the media, which is how it's more commonly used. What's different about Assange's case is that the government is claiming that an individual unaffiliated with the government is guilty of a criminal violation for seeking out and publishing classified information, which is exactly what journalists do on a routine basis.

Even many of his biggest media critics are concerned by the additional charges.

"The Trump administration has just put every journalistic institution in this country on Julian Assange's side of the ledger, which, I know, is unimaginable," MSNBC's Rachel Maddow said on her show after the government revealed the Espionage Act charges. A little more than a month earlier, Maddow had devoted a segment to explaining why Assange's alleged offer to assist Chelsea Manning in cracking a password violated the rules of journalism.

"Really anybody who is concerned about press freedom should be deeply concerned about the prosecution of Julian Assange by the Trump administration," says Freedom of the Press Foundation co-founder Trevor Timm, who testified in Assange's U.K. extradition hearing. He says that Assange's conviction under the Espionage Act would set a precedent that could endanger any journalist publishing leaked information about the U.S. government.

"Maybe [some] journalists don't like Julian Assange, or they have criticizedhis actions over the years. And that's all well and good, but what really matters [are] the acts which the Justice Department is trying to criminalize here," says Timm.

Timm says that a journalist like Bob Woodward, who's made a career publishing government secrets, would be endangered by such a precedent, pointing to Woodward's 2011 book Obama's Wars as an example. "[That book] is page after page of highly classified informationbasically the most sensitive information that you could possibly imagine at a far higher classification level than anything WikiLeaks published."

Even the Watergate stories that Woodward published for theWashington Postwith Carl Bernstein might be illegal if the Assange standard were applied, argues Timm, because Woodward and Bernstein sought out secret information from grand jurors during their reporting.

"Richard Nixon may never have had to resign," says Timm. "And [Woodward and Bernstein] quite possibly could have gone to jail."

The government claims that WikiLeaks crossed a legal line by posting a list of "Most Wanted" classified documents and providing the encrypted dropbox that Manning would use to submit the Iraq and Afghanistan war logs. But Timm says this too is standard journalistic practice.

"Major newspapers around the country and around the world are constantly asking sources to leak them information," says Timm, who points out that the New York Timestook out a full-page advertisement for their SecureDrop box soliciting submissions, and that Timm himself published an article intheGuardianasking for leakers to release the classified CIA torture report in 2014.

One of the key accusations in the case against Assange is that he violated the Computer Fraud and Abuse Act by allegedly offering to help Chelsea Manning crack a password to a government database in an effort to cover her tracks.

On this count, many journalists have sided squarely with the government. But Timm says there's not much to the charge, and that it's not even clear Manning ever successfully cracked the password.

"I think this charge is potentially a sideshow trying to convince the judge that Assange is some sort of hacker and that [his case] doesn't relate to journalism," says Timm.

While recognizing that Assange's case is vital to the cause of press freedom, many journalists have treated him with disdain, often portraying his years-long confinement in the Ecuadorian embassy as "self-imposed," a ploy to dodge sex crime charges in Sweden, which were dropped in November 2019.

Assange defended himself by claiming his reason for seeking asylum wasn't to avoid facing the sex crime charges but to avoid extradition to the U.S. where he would be indicted on Espionage Act charges that would seek to deny him First Amendment protectionsa prediction that's been borne out.

The years of confinement have taken a toll on his mental and physical health. In 2018, doctors determined that Assange's condition was deteriorating after years of confinement and asked that he be allowed safe passage to a hospital. That request was denied.

In 2019, Nils Melzer, the U.N. special rapporteur on torture, described the conditions Assange has been subjected to as "psychological torture."

A decade ago, Assange was well-regarded in establishment circles. The standing ovation he received at a 2010 TED Talk is inconceivable today.

Assange created WikiLeaks in 2006 and leaked documents about the inner workings of Guantanamo Bay, vice presidential candidate Sarah Palin's emails, and bank fraud in Iceland.

The organization first grabbed widespread public attention with a video WikiLeaks would title "Collateral Murder." It showed footage from a U.S. Army Apache helicopter of soldiers gunning down more than a dozen people in Baghdad who weren't engaged in active combat, including two Reuters reporters.

The video generated international press and controversy. Assange told journalist John Pilger in 2010 that his intention in releasing the video was to expose to the American public "the 'another day at the office' [attitude of the soldiers], how routine it was."

The Iraq war logs, which followed, was the largest military leak in history, revealing that more than 15,000 civilian deaths hadn't been publicly reported. And it exposed the fact that the US military had ignored reports of torture, rape, and murder by Iraqi authorities and soldiers.

Then in November 2010, there was a leak of more than 3 million U.S. diplomatic cables, revealing corruption among various Arab governments, which helped inspire the Tunisian revolution that began the Arab Spring.

WikiLeaks also released thousands of pages of both CIA and Russian state surveillance techniques, exposed Saudi support for ISIS and undisclosed U.S. training of soldiers in Yemen, and helped provide Edward Snowden safe passage out of Hong Kong.

Assange says his guiding principle has been to grant regular citizens access to the information that powerful governments, corporations, and media gatekeepers wanted nobody to see.

"Someone's right to speak and someone's right to know create a right to communicate," Assange told Democracy Now journalist Amy Goodman at the Frontline Club in July 2011. "That is the grounding structure for all that we treasure about civilized life."

The 2016 leaks, which were damaging to the Hillary Clinton campaign and the Democratic Party, found Assange new allies on the political right and new critics on the left. NowPresident Donald Trump declared, "I love WikiLeaks!" in October 2016, and MSNBC host Chris Matthews wondered in April 2019 whether Robert Mueller's report might reveal Assange to be a Russian intelligence asset.

But Assange, who once said he viewed the choice between Clinton and Trump as a choice between cholera and gonorrhea and who denies any connection to the Russian government, maintains that his commitment is to bringing to light true information regardless of which political regime it might damage.

"[WikiLeaks believes] that the best kind of government comes from a government that is scrutinized by the people when they have true information about how governments and corporations and other power actors in society actually behave," Assange told Fox News' Sean Hannity in January 2017.

Timm says WikiLeaks' early work, which went a long way towards revealing the nature of 21st century American warfare and surveillance and exposing corrupt authoritarian governments, is what even those who dislike Assange should remember as he faces life in prison.

"[WikiLeaks] did a lot of good for the world, especially in their early days when they were releasing all sorts of really important stories and really important investigations. I think people kind of forget because their mind is clouded by 2016," says Timm.

Assange remains in a London prison, confined to his cell for 23 hours a day, according to WikiLeaks Editor in Chief Kristinn Hrafnsson.

He's awaiting a ruling from the British extradition court, which is scheduled for January 4. Government whistleblowers such as Edward Snowden, Daniel Ellsberg, John Kiriakou, and William Binney, along with more than 7,600 co-signers to an open letter, have called for Trump to drop all charges.

Throughout his career, however, Assange has been cynical about the notion that the democratic and judicial process can truly constrain government power and protect individual rights. People need to take matters into their own hands and protect themselves using encryption and other freedom-preserving tools.

"We will end up in a global, totalitarian surveillance society," Assange said on a 2012 episode of his online show. "Perhaps there will just be the last free-living peoplethose people who understand how to use cryptography to defend themselves against this complete, total surveillance."

Produced by Zach Weissmueller. Opening graphic by Lex Villena

Photos: Tolga Akmen/ZUMA Press/Newscom; JAE/WENN/Newscom; Ray Tang/ZUMA Press/Newscom; Mark Chew/ZUMA Press/Newscom; Dinendra Haria/ZUMA Press/Newscom; MAAA/ZDS/Wheatley/WENN/Newscom; Ole Spata/dpa/picture-alliance/Newscom; Andrew Parsons/i-Images / Polaris/Newscom; Dominic Lipinski/ZUMA Press/Newscom; Richard Ellis/ZUMAPRESS/Newscom; John Barrett/PHOTOlink.net PHOTOlink/Newscom; Mark Makela/ZUMAPRESS/Newscom; GARY CAMERON/Reuters/Newscom; Michal Fludra/ZUMA Press/Newscom; National News/ZUMA Press/Newscom; Euan Cherry/Photoshot/Newscom; Simon Webster/Atlas Photo Archive/Photoshot/Newscom; Victoria Jones/ZUMA Press/Newscom; News Licensing / MEGA / Newscom; tHuman Rights Watch/EyePress EPN/Newscom; DDAA/ZOB/WENN/Newscom; Chris Winter/ZUMAPRESS/Newscom; Andrew Parsons/ZUMAPRESS/Newscom; Jay Shaw Baker/ZUMA Press/Newscom; Steve Maisey/Photoshot/Newscom.

Music: "Reel," Melancholy," "Singularity," "Days Pass," and "Fall" by ANBR licensed through Artlist.io.

See the article here:
The Prosecution of Julian Assange Is an Assault on the First Amendment - Reason

Pamela Anderson tells Trump to be a hero and pardon Assange amid rumours president may intervene – The Independent

The former Baywatch star shared a picture of herself in a bikini alongside the words smart move @POTUS and #JulianAssange.

It isnt the first time the former Baywatch star has made such an appeal, but it comes amid growing speculation that the president could use his final days in office to intervene in the Assange case. The Wikileaks founder was jailed in London for skipping bail and fleeing inside the Ecuadorian Embassy in 2012, and is also wanted in the US on espionage charges.

Anderson has previously dismissed rumours of a romantic relationship with Assange, but told 60 Minutes in 2018 that I feel very close to him and he trusts me.

The pair met when Assange was staying at the embassy from 2012 to 2019, where he fled to avoid both the espionage charges in the US and an allegation of rape in Sweden, which was eventually dropped before he left the embassy and was immediately arrested in April last year.

In recent days a number of unofficial sources, including journalists, have taken to social media claiming the president is set to pardon the journalist imminently. However, some of the tweets were later deleted or retracted due to "faulty sourcing".

In April 2019, Assange was arrested in London and has been jailed at Belmarsh prison for the past 19 months as he fights extradition to the US. Anderson visited him in the prison alongside the Wikileaks editor-in-chief in May 2019, and described him as the worlds most innocent man.

Assange co-founded the whistleblower site Wikileaks in 2006 but rose to prominence in 2010 when he released material passed to him by then US army intelligence analyst Chelsea Manning.

Assange said the material showed the US and its allies were committing war crimes during its occupation of Iraq.

One of the leaks showed disturbing video footage of two US AH-64 Apache helicopters attacking buildings in Baghdad in 2007, and then closing in on a group of people. Among the people were children and journalists.

Assange faces a maximum sentence of 175 years in prison if convicted in the US.

More:
Pamela Anderson tells Trump to be a hero and pardon Assange amid rumours president may intervene - The Independent