- Richard Stallman is giving a speech at New York University to rebut a recent speech by Microsoft criticizing the GNU General Public License (GPL). The GPL is a license conceived by Stallman 16 years prior to lock software into communal ownership through copyright.
- There is a debate around whether the GPL model or a private software model best promotes innovation. Proponents of each side argue the other risks stagnation and lack of participation. The success of Linux and Windows shows there is wisdom on both sides of the debate.
- Stallman now looks very different than when he first conceived of the free software movement in the 1980s, having gained weight and grown a long beard, but still passionately advocates for his
This document provides tips for delivering powerful presentations. It emphasizes that the greatest resource is knowing yourself and what you are presenting. It stresses that one's physiological and psychological state impacts how the audience sees them. It advises to visualize the outcome, know your audience and connect with them visually, auditorily and kinesthetically. The document recommends listening to the audience and being flexible, focusing on them rather than yourself. It provides a breakdown of presentation content: 40% connecting with the audience, 10% techniques, 25% failures, 15% gains from taking action, and 10% calling for action. It encourages practicing and enjoying the presentation.
Solid State Synthesis of Mixed Metal Oxides is a study that aims to synthesize new compounds from combinations of metals through solid-state synthesis and heat treatment. The researchers obtained some oxide powders but not the crystal structures they expected. They synthesized various ternary and quaternary combinations of metals from groups 13, 14, 15 and chalcogens in a furnace, then analyzed the results microscopically. Future work will involve trying new combinations and further analysis to obtain novel compounds with unique properties.
The Grammar Translation Method (GTM) focuses on teaching grammar rules and using translation between the second language and native language. GTM was commonly used from the 1840s to 1940s and aims to teach grammar, writing accuracy, vocabulary, and translation skills. Key principles include an emphasis on reading, writing, vocabulary memorization through translation, and using the native language for instruction. Typical classroom techniques involve starting with a grammar lesson, reading passage, exercises, and translation practice.
A simple explanation to investment discount ratesJAE JUN
Investment discount rates can be very confusing to understand at first. For any budding investor, trying to understand future value and then discounting to get a present value can be quite tricky. This is a simple explanation.
Oss 2009- How Open Source Software Can Save the ICT Industrysayanc
The document discusses how open source software can save the ICT industry $1 trillion per year by reducing failed proprietary software implementations, which account for 18-30% of total ICT investments. It estimates that developing Linux and common open source packages privately would have cost over $1 billion, but they were developed through open source collaboration at a fraction of the cost. Open source also enables more innovation by allowing any user to be a developer. Studies show user-driven innovation accounts for 85% of "quantum" innovation, yet proprietary models limit this to 1/6th of the potential. With millions of volunteer developers, open source projects like Linux have exceeded the productive capacity of companies like Microsoft.
Richard Stallman and the Free Software Foundation were growing concerned about the growing split between GNU project developers and Linux kernel developers in the early 1990s. Stallman reached out to Ian Murdock, who was developing the Debian Linux distribution, to express interest in supporting Debian to help unify the communities. Murdock agreed to call the distribution GNU/Linux at Stallman's request to emphasize that Linux was built on the GNU userland and philosophy. This helped bring the communities closer together in their shared goal of developing free software.
Richard Stallman gives a speech at the Maui High Performance Computing Center about free software and user freedom. The Center houses one of the world's most powerful supercomputers. Stallman's message advocates for rules that maximize user freedom over proprietary control of software. He discusses the importance of credit for the GNU project and spreading freedom to all computer users. Stallman also warns about emerging issues like software patents limiting independent development. Though his political views diverge from open source advocates, his logical arguments resonate with the audience. Stallman ends his talk by dressing as "St. Ignucius of the Church of Emacs" to emphasize the importance of user freedom in a lighthearted way.
This document provides tips for delivering powerful presentations. It emphasizes that the greatest resource is knowing yourself and what you are presenting. It stresses that one's physiological and psychological state impacts how the audience sees them. It advises to visualize the outcome, know your audience and connect with them visually, auditorily and kinesthetically. The document recommends listening to the audience and being flexible, focusing on them rather than yourself. It provides a breakdown of presentation content: 40% connecting with the audience, 10% techniques, 25% failures, 15% gains from taking action, and 10% calling for action. It encourages practicing and enjoying the presentation.
Solid State Synthesis of Mixed Metal Oxides is a study that aims to synthesize new compounds from combinations of metals through solid-state synthesis and heat treatment. The researchers obtained some oxide powders but not the crystal structures they expected. They synthesized various ternary and quaternary combinations of metals from groups 13, 14, 15 and chalcogens in a furnace, then analyzed the results microscopically. Future work will involve trying new combinations and further analysis to obtain novel compounds with unique properties.
The Grammar Translation Method (GTM) focuses on teaching grammar rules and using translation between the second language and native language. GTM was commonly used from the 1840s to 1940s and aims to teach grammar, writing accuracy, vocabulary, and translation skills. Key principles include an emphasis on reading, writing, vocabulary memorization through translation, and using the native language for instruction. Typical classroom techniques involve starting with a grammar lesson, reading passage, exercises, and translation practice.
A simple explanation to investment discount ratesJAE JUN
Investment discount rates can be very confusing to understand at first. For any budding investor, trying to understand future value and then discounting to get a present value can be quite tricky. This is a simple explanation.
Oss 2009- How Open Source Software Can Save the ICT Industrysayanc
The document discusses how open source software can save the ICT industry $1 trillion per year by reducing failed proprietary software implementations, which account for 18-30% of total ICT investments. It estimates that developing Linux and common open source packages privately would have cost over $1 billion, but they were developed through open source collaboration at a fraction of the cost. Open source also enables more innovation by allowing any user to be a developer. Studies show user-driven innovation accounts for 85% of "quantum" innovation, yet proprietary models limit this to 1/6th of the potential. With millions of volunteer developers, open source projects like Linux have exceeded the productive capacity of companies like Microsoft.
Richard Stallman and the Free Software Foundation were growing concerned about the growing split between GNU project developers and Linux kernel developers in the early 1990s. Stallman reached out to Ian Murdock, who was developing the Debian Linux distribution, to express interest in supporting Debian to help unify the communities. Murdock agreed to call the distribution GNU/Linux at Stallman's request to emphasize that Linux was built on the GNU userland and philosophy. This helped bring the communities closer together in their shared goal of developing free software.
Richard Stallman gives a speech at the Maui High Performance Computing Center about free software and user freedom. The Center houses one of the world's most powerful supercomputers. Stallman's message advocates for rules that maximize user freedom over proprietary control of software. He discusses the importance of credit for the GNU project and spreading freedom to all computer users. Stallman also warns about emerging issues like software patents limiting independent development. Though his political views diverge from open source advocates, his logical arguments resonate with the audience. Stallman ends his talk by dressing as "St. Ignucius of the Church of Emacs" to emphasize the importance of user freedom in a lighthearted way.
The document summarizes the history of the free software and open source movements. It discusses early hacker culture at MIT, the founding of the GNU project and Free Software Foundation by Richard Stallman, the development of Linux by Linus Torvalds, and Eric Raymond's analysis of open source collaboration in "The Cathedral and the Bazaar." It also covers diversity between the free software and open source communities and the impact of open source software.
The documentary Revolution OS explores the origins and growth of the open source software movement. It begins with Richard Stallman's creation of the GNU operating system in response to the closing of proprietary software code. Linux was later created by Linus Torvalds, combining GNU components and an open source kernel. Linux grew from a personal project into a viable alternative to Windows. Companies like Google and IBM adopted Linux, following the model of openly sharing code to encourage contributions from developers around the world. The open source approach manages to produce high-quality software through massive peer review and independent validation of code.
1) Computers will never be completely secure due to the immense complexity of software and the many potential vulnerabilities across entire technology supply chains.
2) The risks of computer insecurity are growing as computers are integrated into more physical systems like cars, medical devices, and household appliances through the "Internet of Things".
3) While technical solutions can help, the incentives for companies to prioritize security are often weak, and economic and policy tools may be needed to better manage cyber risks, such as through regulation, liability standards, and cybersecurity insurance.
The document provides an overview of the past, present, and future of free/open source software (FOSS).
In the past section, it describes the origins of software sharing in the 1960s-70s and key events like the creation of GNU in 1983 and Linux in 1991.
The present section outlines government FOSS adoption in countries like Peru, Venezuela, India, and Malaysia. It also discusses FOSS use in Europe and other parts of Asia.
The future section features quotes from industry leaders acknowledging trends like greater FOSS skills being necessary for careers and the vision of all devices running Linux. The document concludes that the future is open.
The document discusses the creation of the GNU General Public License (GPL) by Richard Stallman for GNU Project software. It describes how the GPL was developed from the original GNU Emacs license to address issues around proprietary derivatives and to apply broadly to all GNU software. Key aspects of the GPL include requiring modifications to be published and for derivative works to also carry the GPL, closing loopholes that allowed proprietary versions. The GPL was seen as a way to legislate a basis for a new free software society within the existing legal system and expressed hacker values in a legally understandable way.
Somewhat General Tech Quiz | Tech Quiz | Aman & AnirbanQuNITe
This quiz contains 25 questions about technology and pop culture. It provides rules stating there are direct and pounced questions worth different points. For pounced questions, participants must privately message their answers to the host on Zoom. The questions cover topics like Ironhead Studio's creative director Jose Fernandez, SpaceX Dragon suits, hashtags, and movies, companies, and characters from popular sci-fi franchises.
Free Software Movement and Open Source CommunitiesHaggen So
The document summarizes the history of the free software and open source movements. It discusses early hacker culture at MIT, the founding of the GNU project and Free Software Foundation by Richard Stallman, the creation of the Linux kernel by Linus Torvalds, and Eric Raymond's influential essay "The Cathedral and the Bazaar" which helped popularize the open source term. It also covers diversity and conflicts between the free software and open source communities as well as the impact of open source software on the software industry and politics.
Open Source Insight: IoT, Medical Devices, Connected Cars All Vulnerable to ...Black Duck by Synopsys
Key cybersecurity and open source insight this week: The Internet of Things (IoT), pacemakers, and driverless/semi-autonomous vehicles (aka connected cars).
The 2015 Threat Report provides a comprehensive overview of the cyber
threat landscape facing both companies and individuals. Using data from 2015,
this report combines our observations on reported malware encounters with
threat intelligence, and identifies several key trends and developments.
The report introduces the Chain of Compromise as an analytical concept to
help readers, particularly those working in cyber security and information
technology roles, understand how attackers compromise security using
different combinations of tactics and resources. Some of 2015’s most prominent
threats, such as exploit kits, ransomware, and DNS hijacks, are discussed in
relation to this model, demonstrating how users become compromised by
modern cyber attacks.
Key findings discussed in the report include the establishment of worms,
exploits, and macro malware as trending threats; the increasing use of cryptoransomware
for online extortion; and an increase in the use and efficiency of
Flash vulnerabilities in exploit kits. The report also highlights the significance
of different cyber security events that occurred in 2015, including the discovery
of the XcodeGhost bug in Apple’s App Store, the exposure of the Dukes
advanced persistent threat group, and signs that the intersection between
geopolitics and cyber security is paving the way toward a cyber arms race.
Information on the global threat landscape is supplemented with details on
the prominent threats facing different countries and regions, highlighting the
fact that while the Internet connects everyone, attackers can develop and
distribute resources to selectively target people and companies with greater
efficiency
On April 3, 2000 Judge Thomas Penfield Jackson issued his conclusions.pdfamcointernationaljam
On April 3, 2000 Judge Thomas Penfield Jackson issued his conclusions of law regarding the
US vs Microsoft case. In his ruling, which was largely favorable to the plaintiff, Judge Jackson
stated that Microsoft had monopoly power and taken actions to crush attempts to challenge such
monopoly power. On June 7, he also ordered a rather severe remedy: the breakup of Microsoft
into two companies, one offering the Windows operating system and one offering other software
products. Was this to be the end of a twenty four year success story? Microsoft Corporation Soon
after dropping out of Harvard University, Bill Gates (with Paul Allen) founded Microsoft
Corporation on April on 4, 1975 in Albuquerque, New Mexico. During its first few years, the
company wrote a variety of software for Apple and other computer manufacturers. Microsoft's
first real successful product was the Disk Operating System (DOA), which it purchased in 1981
from Seattle Computer Products and was used in IBMs newly developed personal computer. In
November 1985 Microsoft released the first version of Windows, originally a graphical
extension of MS-DOS. Windows 95, which was launched ten years later, sold more than a
million copies in the first four days. As of 2008 , Microsoft employed a workforce of about
90,000 and grossed over $60 billion in sales. Per-processor fees Microsoft's legal problems in the
US started as early as in 1991, when the Federal Trade Commission opened an inquiry into the
software firm's actions in the PC operating system. Microsoft's MS-DOS operating system was
then competing with other versions of DOS, mostnotably DRI-DOS, as well as otheroperating
systems, such as the MacOS. Microsoft clearly dominated this market, but DRI-DOS's market
share was increasing rapidly. In addition to its operating system (MS-DOS and then Windows),
Microsoft also sold a variety of applications software, such as Word. Here the competition
consisted of thirdparty applications software that ran on Microsoft's OS (e.g., Word Perfect).
Possibly reacting to competitor threats to its dominance, Microsoft engaged in a series of pricing
strategies that were nothing less than brilliant. First, it forced original equipment manufacturers
(that is, desktop computer makers such as Hewlett Packard or Compaq) to pay Microsoft a fee
per computer processor sold regardless of whether such processor was shipped with MS-DOS or
with any other operating system. Second, Microsoft pressed OEM's to purchase a bundle of
products (tied sales) in a way that effectively disadvantaged third-party suppliers who could only
offer one of the products offered by Microsoft.
The FTC investigation was about these allegedly anti-competitive practices. In 1993 , the
commissioners deadlocked in a 2-2 vote and closed the investigation. However, soon after the
FTC stalemate the Department of Justice (DoJ) opened its own investigation. Differently from
the FTC, the DOJ considered Microsoft's practices to be anticompetitive.
The document compares Apple Macintosh computers to Microsoft Windows PCs. It discusses that both have dedicated fans and each have pros and cons that should be considered to determine the best fit. It breaks down the comparison into build quality, operating system, and software/apps to examine the differences between Macs and PCs in these key areas.
The document provides a brief history and overview of open source software:
1) Open source software refers to software that is liberally licensed, allowing users more freedom than conventional licenses. It traces its origins to software sharing in the MIT and academic communities in the 1970s.
2) In the late 1970s and 1980s, commercial vendors began charging for software licenses and imposing legal restrictions, seeing software as assets. Bill Gates' 1976 open letter signaled this change.
3) Open source creates better software by allowing everyone to collaborate globally on ideas and code, with the best technology winning out over proprietary restrictions.
Open Source Insight: Samba Vulnerability, Connected Car Risks, and Are You R...Black Duck by Synopsys
Open source insight into the Samba vulnerability, four risks in connected cars, and how the General Data Protection Regulation (GDPR) may impact you. Plus much more - read on.
- Eric Raymond attended a 1996 conference on freely redistributable software that brought together developers of free software projects like Linux and GNU.
- At the conference, Linus Torvalds surprised attendees with his quick wit and willingness to critique other prominent hackers like Richard Stallman.
- Inspired by this, Raymond analyzed the collaborative development model used for Linux and contrasted it to the more centralized approach of GNU in his influential paper "The Cathedral and the Bazaar."
- This paper helped popularize open source software development and influenced Netscape's 1998 decision to release the Mozilla browser source code.
Microsoft faces competition in many areas despite its dominance in desktop operating systems and office software. While it has a monopoly on these two markets, its share is much smaller in other areas like databases, web servers, internet access, and programming languages. The outcome of antitrust settlement talks may not significantly impact Microsoft where it is already weak, such as in new markets like games consoles, but could affect its legacy businesses if its practices are more strictly regulated. Microsoft will need to adapt to increasing competition from open standards and technologies that are independent of the Windows platform.
Tech M&A Monthly - Q3 Quarterly Report October 2013Corum Group
Q3 2013 came to a remarkable close in the tech M&A arena--this report included our in depth quarterly report on the deals, trends and valuations, plus what it all means to technology CEOs, owners and investors considering their M&A options.
In addition to a detailed breakdown of the six software and related technology markets, and the 26 subsectors, the Corum team discussed the latest news from the world of tech & finance, with a look at unusual deals--with Blackberry acquired by an insurance company, we look at other buyers you might not think of; the JOBS Act--with Twitter taking advantage and some of the fundraising provisions coming into effect, how is the impact on tech M&A shaping up? And, finally, Corum President Nat Burgess provides his thoughts on why he thinks this that Tech M&A is currently a seller's market.
The document discusses several factors that have contributed to the creation of a "flat world" and the globalizing economy, including:
1) The fall of the Berlin Wall in 1989 opened formerly closed political systems and increased global exchange of digital information.
2) The emergence of the Netscape browser in 1995 and Windows 95 made accessing the internet much easier, facilitating global communication and collaboration.
3) Work-flow software allowed computers in different locations to communicate and collaborate through sharing of audio, video and other files.
4) Outsourcing of jobs to countries like India was enabled by India's educational system producing skilled workers, reforms to telecommunications, and the Y2K issue which increased work sent to India
The opening slide starts with 'I am not anti-Microsoft. Microsoft is anti-me. Slide Share has omitted a section of the slide for some reason.
The presentation discusses the importance of using Open Source Software in education.
The opening slide starts with 'I am not anti-Microsoft. Microsoft is anti-me. Slide Share has omitted a section of the slide for some reason.
The ECA Alumni Conference was held on July 13 – 16, 2010 at the Grand Hotel, Stella Di Mare, Ain Sokhna.
The presentation discusses the importance of using Open Source Software in education.
Open source software promotes quality and reliability through independent peer review and rapid code evolution. It has become pervasive as computers have become more of a commodity. While patents protect new inventions, open source relies on collaborative development by groups like Linux organizations. Main players include non-profit enthusiasts, for-profit support companies, and new open source capitalists at firms like IBM and HP. Open source faces challenges from lack of business applications and home use, but projects aim to solve such issues while new users may be more accepting. The growth of open source is inevitable but managerial ignorance benefits monopolists; overcoming this can accelerate appropriate industry acceptance.
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
The document summarizes the history of the free software and open source movements. It discusses early hacker culture at MIT, the founding of the GNU project and Free Software Foundation by Richard Stallman, the development of Linux by Linus Torvalds, and Eric Raymond's analysis of open source collaboration in "The Cathedral and the Bazaar." It also covers diversity between the free software and open source communities and the impact of open source software.
The documentary Revolution OS explores the origins and growth of the open source software movement. It begins with Richard Stallman's creation of the GNU operating system in response to the closing of proprietary software code. Linux was later created by Linus Torvalds, combining GNU components and an open source kernel. Linux grew from a personal project into a viable alternative to Windows. Companies like Google and IBM adopted Linux, following the model of openly sharing code to encourage contributions from developers around the world. The open source approach manages to produce high-quality software through massive peer review and independent validation of code.
1) Computers will never be completely secure due to the immense complexity of software and the many potential vulnerabilities across entire technology supply chains.
2) The risks of computer insecurity are growing as computers are integrated into more physical systems like cars, medical devices, and household appliances through the "Internet of Things".
3) While technical solutions can help, the incentives for companies to prioritize security are often weak, and economic and policy tools may be needed to better manage cyber risks, such as through regulation, liability standards, and cybersecurity insurance.
The document provides an overview of the past, present, and future of free/open source software (FOSS).
In the past section, it describes the origins of software sharing in the 1960s-70s and key events like the creation of GNU in 1983 and Linux in 1991.
The present section outlines government FOSS adoption in countries like Peru, Venezuela, India, and Malaysia. It also discusses FOSS use in Europe and other parts of Asia.
The future section features quotes from industry leaders acknowledging trends like greater FOSS skills being necessary for careers and the vision of all devices running Linux. The document concludes that the future is open.
The document discusses the creation of the GNU General Public License (GPL) by Richard Stallman for GNU Project software. It describes how the GPL was developed from the original GNU Emacs license to address issues around proprietary derivatives and to apply broadly to all GNU software. Key aspects of the GPL include requiring modifications to be published and for derivative works to also carry the GPL, closing loopholes that allowed proprietary versions. The GPL was seen as a way to legislate a basis for a new free software society within the existing legal system and expressed hacker values in a legally understandable way.
Somewhat General Tech Quiz | Tech Quiz | Aman & AnirbanQuNITe
This quiz contains 25 questions about technology and pop culture. It provides rules stating there are direct and pounced questions worth different points. For pounced questions, participants must privately message their answers to the host on Zoom. The questions cover topics like Ironhead Studio's creative director Jose Fernandez, SpaceX Dragon suits, hashtags, and movies, companies, and characters from popular sci-fi franchises.
Free Software Movement and Open Source CommunitiesHaggen So
The document summarizes the history of the free software and open source movements. It discusses early hacker culture at MIT, the founding of the GNU project and Free Software Foundation by Richard Stallman, the creation of the Linux kernel by Linus Torvalds, and Eric Raymond's influential essay "The Cathedral and the Bazaar" which helped popularize the open source term. It also covers diversity and conflicts between the free software and open source communities as well as the impact of open source software on the software industry and politics.
Open Source Insight: IoT, Medical Devices, Connected Cars All Vulnerable to ...Black Duck by Synopsys
Key cybersecurity and open source insight this week: The Internet of Things (IoT), pacemakers, and driverless/semi-autonomous vehicles (aka connected cars).
The 2015 Threat Report provides a comprehensive overview of the cyber
threat landscape facing both companies and individuals. Using data from 2015,
this report combines our observations on reported malware encounters with
threat intelligence, and identifies several key trends and developments.
The report introduces the Chain of Compromise as an analytical concept to
help readers, particularly those working in cyber security and information
technology roles, understand how attackers compromise security using
different combinations of tactics and resources. Some of 2015’s most prominent
threats, such as exploit kits, ransomware, and DNS hijacks, are discussed in
relation to this model, demonstrating how users become compromised by
modern cyber attacks.
Key findings discussed in the report include the establishment of worms,
exploits, and macro malware as trending threats; the increasing use of cryptoransomware
for online extortion; and an increase in the use and efficiency of
Flash vulnerabilities in exploit kits. The report also highlights the significance
of different cyber security events that occurred in 2015, including the discovery
of the XcodeGhost bug in Apple’s App Store, the exposure of the Dukes
advanced persistent threat group, and signs that the intersection between
geopolitics and cyber security is paving the way toward a cyber arms race.
Information on the global threat landscape is supplemented with details on
the prominent threats facing different countries and regions, highlighting the
fact that while the Internet connects everyone, attackers can develop and
distribute resources to selectively target people and companies with greater
efficiency
On April 3, 2000 Judge Thomas Penfield Jackson issued his conclusions.pdfamcointernationaljam
On April 3, 2000 Judge Thomas Penfield Jackson issued his conclusions of law regarding the
US vs Microsoft case. In his ruling, which was largely favorable to the plaintiff, Judge Jackson
stated that Microsoft had monopoly power and taken actions to crush attempts to challenge such
monopoly power. On June 7, he also ordered a rather severe remedy: the breakup of Microsoft
into two companies, one offering the Windows operating system and one offering other software
products. Was this to be the end of a twenty four year success story? Microsoft Corporation Soon
after dropping out of Harvard University, Bill Gates (with Paul Allen) founded Microsoft
Corporation on April on 4, 1975 in Albuquerque, New Mexico. During its first few years, the
company wrote a variety of software for Apple and other computer manufacturers. Microsoft's
first real successful product was the Disk Operating System (DOA), which it purchased in 1981
from Seattle Computer Products and was used in IBMs newly developed personal computer. In
November 1985 Microsoft released the first version of Windows, originally a graphical
extension of MS-DOS. Windows 95, which was launched ten years later, sold more than a
million copies in the first four days. As of 2008 , Microsoft employed a workforce of about
90,000 and grossed over $60 billion in sales. Per-processor fees Microsoft's legal problems in the
US started as early as in 1991, when the Federal Trade Commission opened an inquiry into the
software firm's actions in the PC operating system. Microsoft's MS-DOS operating system was
then competing with other versions of DOS, mostnotably DRI-DOS, as well as otheroperating
systems, such as the MacOS. Microsoft clearly dominated this market, but DRI-DOS's market
share was increasing rapidly. In addition to its operating system (MS-DOS and then Windows),
Microsoft also sold a variety of applications software, such as Word. Here the competition
consisted of thirdparty applications software that ran on Microsoft's OS (e.g., Word Perfect).
Possibly reacting to competitor threats to its dominance, Microsoft engaged in a series of pricing
strategies that were nothing less than brilliant. First, it forced original equipment manufacturers
(that is, desktop computer makers such as Hewlett Packard or Compaq) to pay Microsoft a fee
per computer processor sold regardless of whether such processor was shipped with MS-DOS or
with any other operating system. Second, Microsoft pressed OEM's to purchase a bundle of
products (tied sales) in a way that effectively disadvantaged third-party suppliers who could only
offer one of the products offered by Microsoft.
The FTC investigation was about these allegedly anti-competitive practices. In 1993 , the
commissioners deadlocked in a 2-2 vote and closed the investigation. However, soon after the
FTC stalemate the Department of Justice (DoJ) opened its own investigation. Differently from
the FTC, the DOJ considered Microsoft's practices to be anticompetitive.
The document compares Apple Macintosh computers to Microsoft Windows PCs. It discusses that both have dedicated fans and each have pros and cons that should be considered to determine the best fit. It breaks down the comparison into build quality, operating system, and software/apps to examine the differences between Macs and PCs in these key areas.
The document provides a brief history and overview of open source software:
1) Open source software refers to software that is liberally licensed, allowing users more freedom than conventional licenses. It traces its origins to software sharing in the MIT and academic communities in the 1970s.
2) In the late 1970s and 1980s, commercial vendors began charging for software licenses and imposing legal restrictions, seeing software as assets. Bill Gates' 1976 open letter signaled this change.
3) Open source creates better software by allowing everyone to collaborate globally on ideas and code, with the best technology winning out over proprietary restrictions.
Open Source Insight: Samba Vulnerability, Connected Car Risks, and Are You R...Black Duck by Synopsys
Open source insight into the Samba vulnerability, four risks in connected cars, and how the General Data Protection Regulation (GDPR) may impact you. Plus much more - read on.
- Eric Raymond attended a 1996 conference on freely redistributable software that brought together developers of free software projects like Linux and GNU.
- At the conference, Linus Torvalds surprised attendees with his quick wit and willingness to critique other prominent hackers like Richard Stallman.
- Inspired by this, Raymond analyzed the collaborative development model used for Linux and contrasted it to the more centralized approach of GNU in his influential paper "The Cathedral and the Bazaar."
- This paper helped popularize open source software development and influenced Netscape's 1998 decision to release the Mozilla browser source code.
Microsoft faces competition in many areas despite its dominance in desktop operating systems and office software. While it has a monopoly on these two markets, its share is much smaller in other areas like databases, web servers, internet access, and programming languages. The outcome of antitrust settlement talks may not significantly impact Microsoft where it is already weak, such as in new markets like games consoles, but could affect its legacy businesses if its practices are more strictly regulated. Microsoft will need to adapt to increasing competition from open standards and technologies that are independent of the Windows platform.
Tech M&A Monthly - Q3 Quarterly Report October 2013Corum Group
Q3 2013 came to a remarkable close in the tech M&A arena--this report included our in depth quarterly report on the deals, trends and valuations, plus what it all means to technology CEOs, owners and investors considering their M&A options.
In addition to a detailed breakdown of the six software and related technology markets, and the 26 subsectors, the Corum team discussed the latest news from the world of tech & finance, with a look at unusual deals--with Blackberry acquired by an insurance company, we look at other buyers you might not think of; the JOBS Act--with Twitter taking advantage and some of the fundraising provisions coming into effect, how is the impact on tech M&A shaping up? And, finally, Corum President Nat Burgess provides his thoughts on why he thinks this that Tech M&A is currently a seller's market.
The document discusses several factors that have contributed to the creation of a "flat world" and the globalizing economy, including:
1) The fall of the Berlin Wall in 1989 opened formerly closed political systems and increased global exchange of digital information.
2) The emergence of the Netscape browser in 1995 and Windows 95 made accessing the internet much easier, facilitating global communication and collaboration.
3) Work-flow software allowed computers in different locations to communicate and collaborate through sharing of audio, video and other files.
4) Outsourcing of jobs to countries like India was enabled by India's educational system producing skilled workers, reforms to telecommunications, and the Y2K issue which increased work sent to India
The opening slide starts with 'I am not anti-Microsoft. Microsoft is anti-me. Slide Share has omitted a section of the slide for some reason.
The presentation discusses the importance of using Open Source Software in education.
The opening slide starts with 'I am not anti-Microsoft. Microsoft is anti-me. Slide Share has omitted a section of the slide for some reason.
The ECA Alumni Conference was held on July 13 – 16, 2010 at the Grand Hotel, Stella Di Mare, Ain Sokhna.
The presentation discusses the importance of using Open Source Software in education.
Open source software promotes quality and reliability through independent peer review and rapid code evolution. It has become pervasive as computers have become more of a commodity. While patents protect new inventions, open source relies on collaborative development by groups like Linux organizations. Main players include non-profit enthusiasts, for-profit support companies, and new open source capitalists at firms like IBM and HP. Open source faces challenges from lack of business applications and home use, but projects aim to solve such issues while new users may be more accepting. The growth of open source is inevitable but managerial ignorance benefits monopolists; overcoming this can accelerate appropriate industry acceptance.
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPRAHUL
This Dissertation explores the particular circumstances of Mirzapur, a region located in the
core of India. Mirzapur, with its varied terrains and abundant biodiversity, offers an optimal
environment for investigating the changes in vegetation cover dynamics. Our study utilizes
advanced technologies such as GIS (Geographic Information Systems) and Remote sensing to
analyze the transformations that have taken place over the course of a decade.
The complex relationship between human activities and the environment has been the focus
of extensive research and worry. As the global community grapples with swift urbanization,
population expansion, and economic progress, the effects on natural ecosystems are becoming
more evident. A crucial element of this impact is the alteration of vegetation cover, which plays a
significant role in maintaining the ecological equilibrium of our planet.Land serves as the foundation for all human activities and provides the necessary materials for
these activities. As the most crucial natural resource, its utilization by humans results in different
'Land uses,' which are determined by both human activities and the physical characteristics of the
land.
The utilization of land is impacted by human needs and environmental factors. In countries
like India, rapid population growth and the emphasis on extensive resource exploitation can lead
to significant land degradation, adversely affecting the region's land cover.
Therefore, human intervention has significantly influenced land use patterns over many
centuries, evolving its structure over time and space. In the present era, these changes have
accelerated due to factors such as agriculture and urbanization. Information regarding land use and
cover is essential for various planning and management tasks related to the Earth's surface,
providing crucial environmental data for scientific, resource management, policy purposes, and
diverse human activities.
Accurate understanding of land use and cover is imperative for the development planning
of any area. Consequently, a wide range of professionals, including earth system scientists, land
and water managers, and urban planners, are interested in obtaining data on land use and cover
changes, conversion trends, and other related patterns. The spatial dimensions of land use and
cover support policymakers and scientists in making well-informed decisions, as alterations in
these patterns indicate shifts in economic and social conditions. Monitoring such changes with the
help of Advanced technologies like Remote Sensing and Geographic Information Systems is
crucial for coordinated efforts across different administrative levels. Advanced technologies like
Remote Sensing and Geographic Information Systems
9
Changes in vegetation cover refer to variations in the distribution, composition, and overall
structure of plant communities across different temporal and spatial scales. These changes can
occur natural.
How to Build a Module in Odoo 17 Using the Scaffold MethodCeline George
Odoo provides an option for creating a module by using a single line command. By using this command the user can make a whole structure of a module. It is very easy for a beginner to make a module. There is no need to make each file manually. This slide will show how to create a module using the scaffold method.
Executive Directors Chat Leveraging AI for Diversity, Equity, and InclusionTechSoup
Let’s explore the intersection of technology and equity in the final session of our DEI series. Discover how AI tools, like ChatGPT, can be used to support and enhance your nonprofit's DEI initiatives. Participants will gain insights into practical AI applications and get tips for leveraging technology to advance their DEI goals.
The simplified electron and muon model, Oscillating Spacetime: The Foundation...RitikBhardwaj56
Discover the Simplified Electron and Muon Model: A New Wave-Based Approach to Understanding Particles delves into a groundbreaking theory that presents electrons and muons as rotating soliton waves within oscillating spacetime. Geared towards students, researchers, and science buffs, this book breaks down complex ideas into simple explanations. It covers topics such as electron waves, temporal dynamics, and the implications of this model on particle physics. With clear illustrations and easy-to-follow explanations, readers will gain a new outlook on the universe's fundamental nature.
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...PECB
Denis is a dynamic and results-driven Chief Information Officer (CIO) with a distinguished career spanning information systems analysis and technical project management. With a proven track record of spearheading the design and delivery of cutting-edge Information Management solutions, he has consistently elevated business operations, streamlined reporting functions, and maximized process efficiency.
Certified as an ISO/IEC 27001: Information Security Management Systems (ISMS) Lead Implementer, Data Protection Officer, and Cyber Risks Analyst, Denis brings a heightened focus on data security, privacy, and cyber resilience to every endeavor.
His expertise extends across a diverse spectrum of reporting, database, and web development applications, underpinned by an exceptional grasp of data storage and virtualization technologies. His proficiency in application testing, database administration, and data cleansing ensures seamless execution of complex projects.
What sets Denis apart is his comprehensive understanding of Business and Systems Analysis technologies, honed through involvement in all phases of the Software Development Lifecycle (SDLC). From meticulous requirements gathering to precise analysis, innovative design, rigorous development, thorough testing, and successful implementation, he has consistently delivered exceptional results.
Throughout his career, he has taken on multifaceted roles, from leading technical project management teams to owning solutions that drive operational excellence. His conscientious and proactive approach is unwavering, whether he is working independently or collaboratively within a team. His ability to connect with colleagues on a personal level underscores his commitment to fostering a harmonious and productive workplace environment.
Date: May 29, 2024
Tags: Information Security, ISO/IEC 27001, ISO/IEC 42001, Artificial Intelligence, GDPR
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27001 Information Security Management System - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
General Data Protection Regulation (GDPR) - Training Courses - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
How to Manage Your Lost Opportunities in Odoo 17 CRMCeline George
Odoo 17 CRM allows us to track why we lose sales opportunities with "Lost Reasons." This helps analyze our sales process and identify areas for improvement. Here's how to configure lost reasons in Odoo 17 CRM
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
How to Make a Field Mandatory in Odoo 17Celine George
In Odoo, making a field required can be done through both Python code and XML views. When you set the required attribute to True in Python code, it makes the field required across all views where it's used. Conversely, when you set the required attribute in XML views, it makes the field required only in the context of that particular view.
How to Add Chatter in the odoo 17 ERP ModuleCeline George
In Odoo, the chatter is like a chat tool that helps you work together on records. You can leave notes and track things, making it easier to talk with your team and partners. Inside chatter, all communication history, activity, and changes will be displayed.
1. Free as in Freedom
Richard Stallman's Crusade for Free Software
By Sam Williams
March 2002
0-596-00287-4, Order Number: 2874
240 pages, $22.95 US $34.95 CA
Chapter 2
2001: A Hacker's Odyssey
The New York University computer-science department sits inside Warren Weaver Hall, a
fortress-like building located two blocks east of Washington Square Park. Industrial-strength
air-conditioning vents create a surrounding moat of hot air, discouraging loiterers and
solicitors alike. Visitors who breach the moat encounter another formidable barrier, a security
check-in counter immediately inside the building's single entryway.
Beyond the security checkpoint, the atmosphere relaxes somewhat. Still, numerous signs
scattered throughout the first floor preach the dangers of unsecured doors and propped-open
fire exits. Taken as a whole, the signs offer a reminder: even in the relatively tranquil
confines of pre-September 11, 2001, New York, one can never be too careful or too
suspicious.
The signs offer an interesting thematic counterpoint to the growing number of visitors
gathering in the hall's interior atrium. A few look like NYU students. Most look like
shaggy-aired concert-goers milling outside a music hall in anticipation of the main act. For
one brief morning, the masses have taken over Warren Weaver Hall, leaving the nearby
security attendant with nothing better to do but watch Ricki Lake on TV and shrug her
shoulders toward the nearby auditorium whenever visitors ask about "the speech."
Once inside the auditorium, a visitor finds the person who has forced this temporary
shutdown of building security procedures. The person is Richard M. Stallman, founder of the
GNU Project, original president of the Free Software Foundation, winner of the 1990
MacArthur Fellowship, winner of the Association of Computing Machinery's Grace Murray
Hopper Award (also in 1990), corecipient of the Takeda Foundation's 2001 Takeda Award,
and former AI Lab hacker. As announced over a host of hacker-related web sites, including
the GNU Project's own http://www.gnu.org site, Stallman is in Manhattan, his former
hometown, to deliver a much anticipated speech in rebuttal to the Microsoft Corporation's
recent campaign against the GNU General Public License.
The subject of Stallman's speech is the history and future of the free software movement. The
location is significant. Less than a month before, Microsoft senior vice president Craig
Mundie appeared at the nearby NYU Stern School of Business, delivering a speech blasting
the General Public License, or GPL, a legal device originally conceived by Stallman 16 years
Free as in Freedom: Chapter 2 http://oreilly.com/openbook/freedom/ch02.html
1 of 8 03-01-2012 12:54
2. before. Built to counteract the growing wave of software secrecy overtaking the computer
industry-a wave first noticed by Stallman during his 1980 troubles with the Xerox laser
printer-the GPL has evolved into a central tool of the free software community. In simplest
terms, the GPL locks software programs into a form of communal ownership-what today's
legal scholars now call the "digital commons"-through the legal weight of copyright. Once
locked, programs remain unremovable. Derivative versions must carry the same copyright
protection-even derivative versions that bear only a small snippet of the original source code.
For this reason, some within the software industry have taken to calling the GPL a "viral"
license, because it spreads itself to every software program it touches.1
In an information economy increasingly dependent on software and increasingly beholden to
software standards, the GPL has become the proverbial "big stick." Even companies that once
laughed it off as software socialism have come around to recognize the benefits. Linux, the
Unix-like kernel developed by Finnish college student Linus Torvalds in 1991, is licensed
under the GPL, as are many of the world's most popular programming tools: GNU Emacs,
the GNU Debugger, the GNU C Compiler, etc. Together, these tools form the components of
a free software operating system developed, nurtured, and owned by the worldwide hacker
community. Instead of viewing this community as a threat, high-tech companies like IBM,
Hewlett Packard, and Sun Microsystems have come to rely upon it, selling software
applications and services built to ride atop the ever-growing free software infrastructure.
They've also come to rely upon it as a strategic weapon in the hacker community's perennial
war against Microsoft, the Redmond, Washington-based company that, for better or worse,
has dominated the PC-software marketplace since the late 1980s. As owner of the popular
Windows operating system, Microsoft stands to lose the most in an industry-wide shift to the
GPL license. Almost every line of source code in the Windows colossus is protected by
copyrights reaffirming the private nature of the underlying source code or, at the very least,
reaffirming Microsoft's legal ability to treat it as such. From the Microsoft viewpoint,
incorporating programs protected by the "viral" GPL into the Windows colossus would be the
software equivalent of Superman downing a bottle of Kryptonite pills. Rival companies could
suddenly copy, modify, and sell improved versions of Windows, rendering the company's
indomitable position as the No. 1 provider of consumer-oriented software instantly
vulnerable. Hence the company's growing concern over the GPL's rate of adoption. Hence the
recent Mundie speech blasting the GPL and the " open source" approach to software
development and sales. And hence Stallman's decision to deliver a public rebuttal to that
speech on the same campus here today.
20 years is a long time in the software industry. Consider this: in 1980, when Richard
Stallman was cursing the AI Lab's Xerox laser printer, Microsoft, the company modern
hackers view as the most powerful force in the worldwide software industry, was still a
privately held startup. IBM, the company hackers used to regard as the most powerful force
in the worldwide software industry, had yet to to introduce its first personal computer,
thereby igniting the current low-cost PC market. Many of the technologies we now take for
granted-the World Wide Web, satellite television, 32-bit video-game consoles-didn't even
exist. The same goes for many of the companies that now fill the upper echelons of the
corporate establishment, companies like AOL, Sun Microsystems, Amazon.com, Compaq,
and Dell. The list goes on and on.
The fact that the high-technology marketplace has come so far in such little time is fuel for
both sides of the GPL debate. GPL-proponents point to the short lifespan of most computer
hardware platforms. Facing the risk of buying an obsolete product, consumers tend to flock to
Free as in Freedom: Chapter 2 http://oreilly.com/openbook/freedom/ch02.html
2 of 8 03-01-2012 12:54
3. companies with the best long-term survival. As a result, the software marketplace has become
a winner-take-all arena.2
The current, privately owned software environment,
GPL-proponents say, leads to monopoly abuse and stagnation. Strong companies suck all the
oxygen out of the marketplace for rival competitors and innovative startups.
GPL-opponents argue just the opposite. Selling software is just as risky, if not more risky,
than buying software, they say. Without the legal guarantees provided by private software
licenses, not to mention the economic prospects of a privately owned "killer app" (i.e., a
breakthrough technology that launches an entirely new market),3
companies lose the
incentive to participate. Once again, the market stagnates and innovation declines. As Mundie
himself noted in his May 3 address on the same campus, the GPL's "viral" nature "poses a
threat" to any company that relies on the uniqueness of its software as a competitive asset.
Added Mundie:
It also fundamentally undermines the independent commercial software sector
because it effectively makes it impossible to distribute software on a basis where
recipients pay for the product rather than just the cost of distribution.4
The mutual success of GNU/ Linux, the amalgamated operating system built around the
GPL-protected Linux kernel, and Windows over the last 10 years reveals the wisdom of both
perspectives. Nevertheless, the battle for momentum is an important one in the software
industry. Even powerful vendors such as Microsoft rely on the support of third-party software
developers whose tools, programs, and computer games make an underlying software
platform such as Windows more attractive to the mainstream consumer. Citing the rapid
evolution of the technology marketplace over the last 20 years, not to mention his own
company's admirable track record during that period, Mundie advised listeners to not get too
carried away by the free software movement's recent momentum:
Two decades of experience have shown that an economic model that protects
intellectual property and a business model that recoups research and
development costs can create impressive economic benefits and distribute them
very broadly.4
Such admonitions serve as the backdrop for Stallman's speech today. Less than a month after
their utterance, Stallman stands with his back to one of the chalk boards at the front of the
room, edgy to begin.
If the last two decades have brought dramatic changes to the software marketplace, they have
brought even more dramatic changes to Stallman himself. Gone is the skinny, clean-shaven
hacker who once spent his entire days communing with his beloved PDP-10. In his place
stands a heavy-set middle-aged man with long hair and rabbinical beard, a man who now
spends the bulk of his time writing and answering email, haranguing fellow programmers,
and giving speeches like the one today. Dressed in an aqua-colored T-shirt and brown
polyester pants, Stallman looks like a desert hermit who just stepped out of a Salvation Army
dressing room.
The crowd is filled with visitors who share Stallman's fashion and grooming tastes. Many
come bearing laptop computers and cellular modems, all the better to record and transmit
Stallman's words to a waiting Internet audience. The gender ratio is roughly 15 males to 1
female, and 1 of the 7 or 8 females in the room comes in bearing a stuffed penguin, the
official Linux mascot, while another carries a stuffed teddy bear.
Free as in Freedom: Chapter 2 http://oreilly.com/openbook/freedom/ch02.html
3 of 8 03-01-2012 12:54
4. Richard Stallman, circa 2000. "I decided I would develop a free software operating system or
die trying . . . of old age of course." Photo courtesy of http://www.stallman.org.
Agitated, Stallman leaves his post at the front of the room and takes a seat in a front-row
chair, tapping a few commands into an already-opened laptop. For the next 10 minutes
Stallman is oblivious to the growing number of students, professors, and fans circulating in
front of him at the foot of the auditorium stage.
Before the speech can begin, the baroque rituals of academic formality must be observed.
Stallman's appearance merits not one but two introductions. Mike Uretsky, codirector of the
Stern School's Center for Advanced Technology, provides the first.
"The role of a university is to foster debate and to have interesting discussions," Uretsky says.
"This particular presentation, this seminar falls right into that mold. I find the discussion of
open source particularly interesting."
Before Uretsky can get another sentence out, Stallman is on his feet waving him down like a
stranded motorist.
"I do free software," Stallman says to rising laughter. "Open source is a different movement."
The laughter gives way to applause. The room is stocked with Stallman partisans, people who
know of his reputation for verbal exactitude, not to mention his much publicized 1998 falling
out with the open source software proponents. Most have come to anticipate such outbursts
the same way radio fans once waited for Jack Benny's trademark, "Now cut that out!" phrase
during each radio program.
Uretsky hastily finishes his introduction and cedes the stage to Edmond Schonberg, a
professor in the NYU computer-science department. As a computer programmer and GNU
Project contributor, Schonberg knows which linguistic land mines to avoid. He deftly
summarizes Stallman's career from the perspective of a modern-day programmer.
"Richard is the perfect example of somebody who, by acting locally, started thinking globally
[about] problems concerning the unavailability of source code," says Schonberg. "He has
developed a coherent philosophy that has forced all of us to reexamine our ideas of how
software is produced, of what intellectual property means, and of what the software
Free as in Freedom: Chapter 2 http://oreilly.com/openbook/freedom/ch02.html
4 of 8 03-01-2012 12:54
5. community actually represents."
Schonberg welcomes Stallman to more applause. Stallman takes a moment to shut off his
laptop, rises out of his chair, and takes the stage.
At first, Stallman's address seems more Catskills comedy routine than political speech. "I'd
like to thank Microsoft for providing me the opportunity to be on this platform," Stallman
wisecracks. "For the past few weeks, I have felt like an author whose book was fortuitously
banned somewhere."
For the uninitiated, Stallman dives into a quick free software warm-up analogy. He likens a
software program to a cooking recipe. Both provide useful step-by-step instructions on how
to complete a desired task and can be easily modified if a user has special desires or
circumstances. "You don't have to follow a recipe exactly," Stallman notes. "You can leave
out some ingredients. Add some mushrooms, 'cause you like mushrooms. Put in less salt
because your doctor said you should cut down on salt-whatever."
Most importantly, Stallman says, software programs and recipes are both easy to share. In
giving a recipe to a dinner guest, a cook loses little more than time and the cost of the paper
the recipe was written on. Software programs require even less, usually a few mouse-clicks
and a modicum of electricity. In both instances, however, the person giving the information
gains two things: increased friendship and the ability to borrow interesting recipes in return.
"Imagine what it would be like if recipes were packaged inside black boxes," Stallman says,
shifting gears. "You couldn't see what ingredients they're using, let alone change them, and
imagine if you made a copy for a friend. They would call you a pirate and try to put you in
prison for years. That world would create tremendous outrage from all the people who are
used to sharing recipes. But that is exactly what the world of proprietary software is like. A
world in which common decency towards other people is prohibited or prevented."
With this introductory analogy out of the way, Stallman launches into a retelling of the Xerox
laser-printer episode. Like the recipe analogy, the laser-printer story is a useful rhetorical
device. With its parable-like structure, it dramatizes just how quickly things can change in the
software world. Drawing listeners back to an era before Amazon.com one-click shopping,
Microsoft Windows, and Oracle databases, it asks the listener to examine the notion of
software ownership free of its current corporate logos.
Stallman delivers the story with all the polish and practice of a local district attorney
conducting a closing argument. When he gets to the part about the Carnegie Mellon professor
refusing to lend him a copy of the printer source code, Stallman pauses.
"He had betrayed us," Stallman says. "But he didn't just do it to us. Chances are he did it to
you."
On the word "you," Stallman points his index finger accusingly at an unsuspecting member
of the audience. The targeted audience member's eyebrows flinch slightly, but Stallman's own
eyes have moved on. Slowly and deliberately, Stallman picks out a second listener to nervous
titters from the crowd. "And I think, mostly likely, he did it to you, too," he says, pointing at
an audience member three rows behind the first.
By the time Stallman has a third audience member picked out, the titters have given away to
general laughter. The gesture seems a bit staged, because it is. Still, when it comes time to
wrap up the Xerox laser-printer story, Stallman does so with a showman's flourish. "He
Free as in Freedom: Chapter 2 http://oreilly.com/openbook/freedom/ch02.html
5 of 8 03-01-2012 12:54
6. probably did it to most of the people here in this room-except a few, maybe, who weren't
born yet in 1980," Stallman says, drawing more laughs. "[That's] because he had promised to
refuse to cooperate with just about the entire population of the planet Earth."
Stallman lets the comment sink in for a half-beat. "He had signed a nondisclosure
agreement," Stallman adds.
Richard Matthew Stallman's rise from frustrated academic to political leader over the last 20
years speaks to many things. It speaks to Stallman's stubborn nature and prodigious will. It
speaks to the clearly articulated vision and values of the free software movement Stallman
helped build. It speaks to the high-quality software programs Stallman has built, programs
that have cemented Stallman's reputation as a programming legend. It speaks to the growing
momentum of the GPL, a legal innovation that many Stallman observers see as his most
momentous accomplishment.
Most importantly, it speaks to the changing nature of political power in a world increasingly
beholden to computer technology and the software programs that power that technology.
Maybe that's why, even at a time when most high-technology stars are on the wane,
Stallman's star has grown. Since launching the GNU Project in 1984,5
Stallman has been at
turns ignored, satirized, vilified, and attacked-both from within and without the free software
movement. Through it all, the GNU Project has managed to meet its milestones, albeit with a
few notorious delays, and stay relevant in a software marketplace several orders of magnitude
more complex than the one it entered 18 years ago. So too has the free software ideology, an
ideology meticulously groomed by Stallman himself.
To understand the reasons behind this currency, it helps to examine Richard Stallman both in
his own words and in the words of the people who have collaborated and battled with him
along the way. The Richard Stallman character sketch is not a complicated one. If any person
exemplifies the old adage "what you see is what you get," it's Stallman.
"I think if you want to understand Richard Stallman the human being, you really need to see
all of the parts as a consistent whole," advises Eben Moglen, legal counsel to the Free
Software Foundation and professor of law at Columbia University Law School. "All those
personal eccentricities that lots of people see as obstacles to getting to know Stallman really
are Stallman: Richard's strong sense of personal frustration, his enormous sense of principled
ethical commitment, his inability to compromise, especially on issues he considers
fundamental. These are all the very reasons Richard did what he did when he did."
Explaining how a journey that started with a laser printer would eventually lead to a sparring
match with the world's richest corporation is no easy task. It requires a thoughtful
examination of the forces that have made software ownership so important in today's society.
It also requires a thoughtful examination of a man who, like many political leaders before
him, understands the malleability of human memory. It requires an ability to interpret the
myths and politically laden code words that have built up around Stallman over time. Finally,
it requires an understanding of Stallman's genius as a programmer and his failures and
successes in translating that genius to other pursuits.
When it comes to offering his own summary of the journey, Stallman acknowledges the
fusion of personality and principle observed by Moglen. "Stubbornness is my strong suit," he
says. "Most people who attempt to do anything of any great difficulty eventually get
discouraged and give up. I never gave up."
Free as in Freedom: Chapter 2 http://oreilly.com/openbook/freedom/ch02.html
6 of 8 03-01-2012 12:54
7. He also credits blind chance. Had it not been for that run-in over the Xerox laser printer, had
it not been for the personal and political conflicts that closed out his career as an MIT
employee, had it not been for a half dozen other timely factors, Stallman finds it very easy to
picture his life following a different career path. That being said, Stallman gives thanks to the
forces and circumstances that put him in the position to make a difference.
"I had just the right skills," says Stallman, summing up his decision for launching the GNU
Project to the audience. "Nobody was there but me, so I felt like, `I'm elected. I have to work
on this. If not me , who?'"
Endnotes
Actually, the GPL's powers are not quite that potent. According to section 10 of the
GNU General Public License, Version 2 (1991), the viral nature of the license depends
heavily on the Free Software Foundation's willingness to view a program as a
derivative work, not to mention the existing license the GPL would replace.
If you wish to incorporate parts of the Program into other free programs whose
distribution conditions are different, write to the author to ask for permission. For
software that is copyrighted by the Free Software Foundation, write to the Free
Software Foundation; we sometimes make exceptions for this. Our decision will be
guided by the two goals of preserving the free status of all derivatives of our free
software and of promoting the sharing and reuse of software generally.
"To compare something to a virus is very harsh," says Stallman. "A spider plant is a
more accurate comparison; it goes to another place if you actively take a cutting."
For more information on the GNU General Public License, visit http://www.gnu.org
/copyleft/gpl.html.
1.
See Shubha Ghosh, "Revealing the Microsoft Windows Source Code," Gigalaw.com
(January, 2000).
http://www.gigalaw.com/articles/ghosh-2000-01-p1.html
2.
Killer apps don't have to be proprietary. Witness, of course, the legendary Mosaic
browser, a program whose copyright permits noncommercial derivatives with certain
restrictions. Still, I think the reader gets the point: the software marketplace is like the
lottery. The bigger the potential payoff, the more people want to participate. For a good
summary of the killer-app phenomenon, see Philip Ben-David, "Whatever Happened to
the `Killer App'?" e-Commerce News (December 7, 2000).
http://www.ecommercetimes.com/perl/story/5893.html
3.
See Craig Mundie, "The Commercial Software Model," senior vice president,
Microsoft Corp. Excerpted from an online transcript of Mundie's May 3, 2001, speech
to the New York University Stern School of Business.
http://www.microsoft.com/presspass/exec/craig/05-03sharedsource.asp
4.
The acronym GNU stands for "GNU's not Unix." In another portion of the May 29,
2001, NYU speech, Stallman summed up the acronym's origin:
We hackers always look for a funny or naughty name for a program,
because naming a program is half the fun of writing the program. We also
had a tradition of recursive acronyms, to say that the program that you're
writing is similar to some existing program . . . I looked for a recursive
acronym for Something Is Not UNIX. And I tried all 26 letters and
5.
Free as in Freedom: Chapter 2 http://oreilly.com/openbook/freedom/ch02.html
7 of 8 03-01-2012 12:54