SlideShare a Scribd company logo
Richard
Matthew
Stallman
The Father Of
Free Software
Early Life and Education
Richard Matthew Stallman was born in Manhattan, New York,on born March 16,
1953. He first accessed a computer during his senior year at high school in 1969.
He was hired by IBM New York Scientific Centre, while he was still in high-school.
He wrote his first program, a preprocessor for the PL/I programming language on
the IBM 360.
In June 1971, as a first year student at Harvard University, Stallman became a pro-
grammer at the AI Laboratory of MIT.
Stallman graduated from Harvard earning a BA in Physics in 1974. He then en-
rolled at MIT as a graduate student, but abandoned his pursuit of a graduate
degree while remaining a programmer at the MIT AI Laboratory.
In 1977, Stallman published a paper on an AI truth maintenance system called de-
pendency-directed backtracking.
Contributions
GNU Project – Free Software Foundation
In 1983 he started GNU project and in January 1984, Stall-
man quit his job at MIT to work full-time on the GNU proj-
ect, he founded the GNU Project to create a free unix-like
operating system, and has been the project's lead archi-
tect and organizer.
He co-founded the League for Programming Freedom in
1989 to unite free software developers as well as develop-
ers of proprietary software to fight against software pat-
ents and the extension of the scope of copyright.
He also introduced the concept of copyleft to protect the
ideals of this movement, and enshrined this concept in
the widely-used GPL (General Public License) for software,
the most widely used free software license.
Free Software Foundation
The Free Software Foundation (FSF) was founded by Rich-
ard Stallman on 4 October 1985, targeted towards the
growth of new free generation of users as our life every
day gives us more reasons to use different software.
Interesting fact that free software foundation itself uses
only free software for their work, as it is their life’s princi-
ple.
Every year thousands of corporations and individual soft-
ware developers register their copyrights with enforcing
the license and the US copyright office through Compli-
ance Lab and Free Software Licensing.
Emacs
The most popular, and most ported, version of Emacs is
GNU Emacs, which was created by Stallman for the GNU
Project.
Emacs is Extensible - The GNU Emacs manual describes
Emacs as the extensible, customizable, self-documenting,
real-time display editor.
Emacs Integrates well with lots of external tools, it pro-
vides commands to manipulate words and paragraphs,
syntax highlighting for making source code easier to read,
and keyboard macros for performing user-defined batches
of editing commands.
Open Source vs Free Software
Richard Stallman is known as a person who fought all his
life for right definitions of his project. Open Source vs Free
Software has always been a source of misunderstanding
between the respective user communities.
When you are speaking about free software, avoid saying
“for free” or “giveaway”, as it will change the meaning to
the issue about the cost, not the freedom, as human
rights.
Awards and Achievments
In 1991 Stallman was awarded by The Association for
Computing Machinery's Grace Murray Hopper for pio-
neering work in the development of the extensible editor
EMACS (Editing Macros)."
In 2013 the Internet Hall of Fame inducted Stallman for his
contributions as creator of the GNU Project, main author
of the GNU General Public License, and his philosophical
contributions as founder of the free software move-
ment.Opinion/Views

More Related Content

What's hot

Ethical Hacking (CEH) - Industrial Training Report
Ethical Hacking (CEH) - Industrial Training ReportEthical Hacking (CEH) - Industrial Training Report
Ethical Hacking (CEH) - Industrial Training Report
Raghav Bisht
 
Operating system
Operating systemOperating system
Operating system
RADHIKA GUPTA
 
Array in c++
Array in c++Array in c++
Array in c++
Mahesha Mano
 
Loops c++
Loops c++Loops c++
Loops c++
Shivani Singh
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
sadique_ghitm
 
Lecture 1- History of C Programming
Lecture 1- History of C Programming Lecture 1- History of C Programming
Lecture 1- History of C Programming
Md. Imran Hossain Showrov
 
Constructor and Types of Constructors
Constructor and Types of ConstructorsConstructor and Types of Constructors
Constructor and Types of Constructors
Dhrumil Panchal
 
Introduction of c programming
Introduction of c programmingIntroduction of c programming
Introduction of c programming
Tarun Sharma
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
shohrabkhan
 
INTRODUCTION TO C PROGRAMMING
INTRODUCTION TO C PROGRAMMINGINTRODUCTION TO C PROGRAMMING
INTRODUCTION TO C PROGRAMMING
Abhishek Dwivedi
 
Debian general presentation
Debian general presentationDebian general presentation
Debian general presentationDing Zhou
 
Virus
VirusVirus
Virus
Protik Roy
 
The World's First Cyber Weapon - Stuxnet
The World's First Cyber Weapon - StuxnetThe World's First Cyber Weapon - Stuxnet
The World's First Cyber Weapon - Stuxnet
Sean Xie
 
C keywords and identifiers
C keywords and identifiersC keywords and identifiers
C keywords and identifiers
Akhileshwar Reddy Ankireddy
 
C by balaguruswami - e.balagurusamy
C   by balaguruswami - e.balagurusamyC   by balaguruswami - e.balagurusamy
C by balaguruswami - e.balagurusamy
Srichandan Sobhanayak
 
Linux commands
Linux commandsLinux commands
Linux commands
Mannu Khani
 
Antivirus - Virus detection and removal methods
Antivirus - Virus detection and removal methodsAntivirus - Virus detection and removal methods
Antivirus - Virus detection and removal methods
Somanath Kavalase
 
Algorithm and flowchart
Algorithm and flowchartAlgorithm and flowchart
Algorithm and flowchart
Rabin BK
 

What's hot (20)

Ethical Hacking (CEH) - Industrial Training Report
Ethical Hacking (CEH) - Industrial Training ReportEthical Hacking (CEH) - Industrial Training Report
Ethical Hacking (CEH) - Industrial Training Report
 
Operating system
Operating systemOperating system
Operating system
 
Array in c++
Array in c++Array in c++
Array in c++
 
Loops c++
Loops c++Loops c++
Loops c++
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 
Lecture 1- History of C Programming
Lecture 1- History of C Programming Lecture 1- History of C Programming
Lecture 1- History of C Programming
 
Constructor and Types of Constructors
Constructor and Types of ConstructorsConstructor and Types of Constructors
Constructor and Types of Constructors
 
Introduction of c programming
Introduction of c programmingIntroduction of c programming
Introduction of c programming
 
Computer Virus powerpoint presentation
Computer Virus powerpoint presentationComputer Virus powerpoint presentation
Computer Virus powerpoint presentation
 
INTRODUCTION TO C PROGRAMMING
INTRODUCTION TO C PROGRAMMINGINTRODUCTION TO C PROGRAMMING
INTRODUCTION TO C PROGRAMMING
 
Debian general presentation
Debian general presentationDebian general presentation
Debian general presentation
 
Virus
VirusVirus
Virus
 
The World's First Cyber Weapon - Stuxnet
The World's First Cyber Weapon - StuxnetThe World's First Cyber Weapon - Stuxnet
The World's First Cyber Weapon - Stuxnet
 
C keywords and identifiers
C keywords and identifiersC keywords and identifiers
C keywords and identifiers
 
C by balaguruswami - e.balagurusamy
C   by balaguruswami - e.balagurusamyC   by balaguruswami - e.balagurusamy
C by balaguruswami - e.balagurusamy
 
Linux commands
Linux commandsLinux commands
Linux commands
 
Os ppt
Os pptOs ppt
Os ppt
 
Linux Vs Unix
Linux Vs UnixLinux Vs Unix
Linux Vs Unix
 
Antivirus - Virus detection and removal methods
Antivirus - Virus detection and removal methodsAntivirus - Virus detection and removal methods
Antivirus - Virus detection and removal methods
 
Algorithm and flowchart
Algorithm and flowchartAlgorithm and flowchart
Algorithm and flowchart
 

Similar to Richard Matthew Stallman - A Brief Biography

Fsf philosophy
Fsf philosophyFsf philosophy
Fsf philosophy
ayesha8bg
 
Os revolution reaction paper
Os revolution reaction paperOs revolution reaction paper
Os revolution reaction paperMarklin
 
Computing people
Computing people  Computing people
Open source an origin story to freedom
Open source   an origin story to freedomOpen source   an origin story to freedom
Open source an origin story to freedom
Edzo Botjes
 
Famous perssonalities related to it.
Famous perssonalities related to it.Famous perssonalities related to it.
Famous perssonalities related to it.
Saqlain Memon
 
Open Source Possibility in Nepal
Open Source Possibility in NepalOpen Source Possibility in Nepal
Open Source Possibility in Nepal
Resham Acharya
 
History Of Linux
History Of LinuxHistory Of Linux
History Of Linux
anand09
 
Mac281 Open Source software
Mac281 Open Source softwareMac281 Open Source software
Mac281 Open Source software
Rob Jewitt
 
Nt1330 Unit 4.3 Assignment 1
Nt1330 Unit 4.3 Assignment 1Nt1330 Unit 4.3 Assignment 1
Nt1330 Unit 4.3 Assignment 1
Amanda Reed
 
Open Souce Ver5
Open Souce Ver5Open Souce Ver5
Open Souce Ver5
Henry Briggs
 
Should we floss in education
Should we floss in educationShould we floss in education
Should we floss in education
Hayah International Academy
 
Should we floss in education
Should we floss in educationShould we floss in education
Should we floss in education
Atif Hussain
 
GNU turns 30
GNU turns 30GNU turns 30
GNU turns 30
Atif Hussain
 
Linus Case Synthesis Essay
Linus Case Synthesis EssayLinus Case Synthesis Essay
Linus Case Synthesis Essay
Kim Moore
 
Open source ecosystem evolution open stack and kubernetes models
Open source ecosystem evolution open stack and kubernetes modelsOpen source ecosystem evolution open stack and kubernetes models
Open source ecosystem evolution open stack and kubernetes models
Antonio Ojea Garcia
 
Open source presentation_v03
Open source presentation_v03Open source presentation_v03
Open source presentation_v03
Sergi Torrellas
 
Software Trends: Past, Present and Future
Software Trends: Past, Present and FutureSoftware Trends: Past, Present and Future
Software Trends: Past, Present and Future
Biniam Asnake
 
Fsf philosophy
Fsf philosophyFsf philosophy
Fsf philosophy
ShereenaAlfahim
 

Similar to Richard Matthew Stallman - A Brief Biography (20)

Fsf philosophy
Fsf philosophyFsf philosophy
Fsf philosophy
 
Os revolution reaction paper
Os revolution reaction paperOs revolution reaction paper
Os revolution reaction paper
 
Computing people
Computing people  Computing people
Computing people
 
Opensource
OpensourceOpensource
Opensource
 
Open source an origin story to freedom
Open source   an origin story to freedomOpen source   an origin story to freedom
Open source an origin story to freedom
 
Famous perssonalities related to it.
Famous perssonalities related to it.Famous perssonalities related to it.
Famous perssonalities related to it.
 
Open Source Possibility in Nepal
Open Source Possibility in NepalOpen Source Possibility in Nepal
Open Source Possibility in Nepal
 
History Of Linux
History Of LinuxHistory Of Linux
History Of Linux
 
Mac281 Open Source software
Mac281 Open Source softwareMac281 Open Source software
Mac281 Open Source software
 
Nt1330 Unit 4.3 Assignment 1
Nt1330 Unit 4.3 Assignment 1Nt1330 Unit 4.3 Assignment 1
Nt1330 Unit 4.3 Assignment 1
 
Open Souce Ver5
Open Souce Ver5Open Souce Ver5
Open Souce Ver5
 
Free software
Free softwareFree software
Free software
 
Should we floss in education
Should we floss in educationShould we floss in education
Should we floss in education
 
Should we floss in education
Should we floss in educationShould we floss in education
Should we floss in education
 
GNU turns 30
GNU turns 30GNU turns 30
GNU turns 30
 
Linus Case Synthesis Essay
Linus Case Synthesis EssayLinus Case Synthesis Essay
Linus Case Synthesis Essay
 
Open source ecosystem evolution open stack and kubernetes models
Open source ecosystem evolution open stack and kubernetes modelsOpen source ecosystem evolution open stack and kubernetes models
Open source ecosystem evolution open stack and kubernetes models
 
Open source presentation_v03
Open source presentation_v03Open source presentation_v03
Open source presentation_v03
 
Software Trends: Past, Present and Future
Software Trends: Past, Present and FutureSoftware Trends: Past, Present and Future
Software Trends: Past, Present and Future
 
Fsf philosophy
Fsf philosophyFsf philosophy
Fsf philosophy
 

More from HackerEarth

How to hire a data scientist recruit page
How to hire a data scientist recruit pageHow to hire a data scientist recruit page
How to hire a data scientist recruit page
HackerEarth
 
Build accurate assessment with question analytics
Build accurate assessment with question analyticsBuild accurate assessment with question analytics
Build accurate assessment with question analytics
HackerEarth
 
Make your assessments more effective with test analytics
Make your assessments more effective with test analyticsMake your assessments more effective with test analytics
Make your assessments more effective with test analytics
HackerEarth
 
How to hire a data scientist
How to hire a data scientistHow to hire a data scientist
How to hire a data scientist
HackerEarth
 
Changing landscape of Technical Recruitment
Changing landscape of Technical RecruitmentChanging landscape of Technical Recruitment
Changing landscape of Technical Recruitment
HackerEarth
 
Multi-Skilling: A unique way to train, retain and develop in a manufacturing ...
Multi-Skilling: A unique way to train, retain and develop in a manufacturing ...Multi-Skilling: A unique way to train, retain and develop in a manufacturing ...
Multi-Skilling: A unique way to train, retain and develop in a manufacturing ...
HackerEarth
 
How to recruit excellent talent
How to recruit excellent talentHow to recruit excellent talent
How to recruit excellent talent
HackerEarth
 
Interpersonal Dynamics at work
Interpersonal Dynamics at workInterpersonal Dynamics at work
Interpersonal Dynamics at work
HackerEarth
 
The Power of HR Analytics
The Power of HR AnalyticsThe Power of HR Analytics
The Power of HR Analytics
HackerEarth
 
Leading change management
Leading change managementLeading change management
Leading change management
HackerEarth
 
Enhancing the employer brand
Enhancing the employer brandEnhancing the employer brand
Enhancing the employer brand
HackerEarth
 
Global Hackathon Report
Global Hackathon ReportGlobal Hackathon Report
Global Hackathon Report
HackerEarth
 
How to organize a successful hackathon
How to organize a successful hackathonHow to organize a successful hackathon
How to organize a successful hackathon
HackerEarth
 
How hackathons can drive top line revenue growth
How hackathons can drive top line revenue growthHow hackathons can drive top line revenue growth
How hackathons can drive top line revenue growth
HackerEarth
 
6 rules of enterprise innovation
6 rules of enterprise innovation6 rules of enterprise innovation
6 rules of enterprise innovation
HackerEarth
 
How to recruit excellent tech talent
How to recruit excellent tech talentHow to recruit excellent tech talent
How to recruit excellent tech talent
HackerEarth
 
How to assess & hire Java developers accurately?
How to assess & hire Java developers accurately?How to assess & hire Java developers accurately?
How to assess & hire Java developers accurately?
HackerEarth
 
Managing innovation: A Process Overview
Managing innovation: A Process OverviewManaging innovation: A Process Overview
Managing innovation: A Process Overview
HackerEarth
 
Open Innovation - A Case Study
Open Innovation - A Case StudyOpen Innovation - A Case Study
Open Innovation - A Case Study
HackerEarth
 
How to Win Machine Learning Competitions ?
How to Win Machine Learning Competitions ? How to Win Machine Learning Competitions ?
How to Win Machine Learning Competitions ?
HackerEarth
 

More from HackerEarth (20)

How to hire a data scientist recruit page
How to hire a data scientist recruit pageHow to hire a data scientist recruit page
How to hire a data scientist recruit page
 
Build accurate assessment with question analytics
Build accurate assessment with question analyticsBuild accurate assessment with question analytics
Build accurate assessment with question analytics
 
Make your assessments more effective with test analytics
Make your assessments more effective with test analyticsMake your assessments more effective with test analytics
Make your assessments more effective with test analytics
 
How to hire a data scientist
How to hire a data scientistHow to hire a data scientist
How to hire a data scientist
 
Changing landscape of Technical Recruitment
Changing landscape of Technical RecruitmentChanging landscape of Technical Recruitment
Changing landscape of Technical Recruitment
 
Multi-Skilling: A unique way to train, retain and develop in a manufacturing ...
Multi-Skilling: A unique way to train, retain and develop in a manufacturing ...Multi-Skilling: A unique way to train, retain and develop in a manufacturing ...
Multi-Skilling: A unique way to train, retain and develop in a manufacturing ...
 
How to recruit excellent talent
How to recruit excellent talentHow to recruit excellent talent
How to recruit excellent talent
 
Interpersonal Dynamics at work
Interpersonal Dynamics at workInterpersonal Dynamics at work
Interpersonal Dynamics at work
 
The Power of HR Analytics
The Power of HR AnalyticsThe Power of HR Analytics
The Power of HR Analytics
 
Leading change management
Leading change managementLeading change management
Leading change management
 
Enhancing the employer brand
Enhancing the employer brandEnhancing the employer brand
Enhancing the employer brand
 
Global Hackathon Report
Global Hackathon ReportGlobal Hackathon Report
Global Hackathon Report
 
How to organize a successful hackathon
How to organize a successful hackathonHow to organize a successful hackathon
How to organize a successful hackathon
 
How hackathons can drive top line revenue growth
How hackathons can drive top line revenue growthHow hackathons can drive top line revenue growth
How hackathons can drive top line revenue growth
 
6 rules of enterprise innovation
6 rules of enterprise innovation6 rules of enterprise innovation
6 rules of enterprise innovation
 
How to recruit excellent tech talent
How to recruit excellent tech talentHow to recruit excellent tech talent
How to recruit excellent tech talent
 
How to assess & hire Java developers accurately?
How to assess & hire Java developers accurately?How to assess & hire Java developers accurately?
How to assess & hire Java developers accurately?
 
Managing innovation: A Process Overview
Managing innovation: A Process OverviewManaging innovation: A Process Overview
Managing innovation: A Process Overview
 
Open Innovation - A Case Study
Open Innovation - A Case StudyOpen Innovation - A Case Study
Open Innovation - A Case Study
 
How to Win Machine Learning Competitions ?
How to Win Machine Learning Competitions ? How to Win Machine Learning Competitions ?
How to Win Machine Learning Competitions ?
 

Recently uploaded

GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 

Recently uploaded (20)

GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 

Richard Matthew Stallman - A Brief Biography

  • 2. Early Life and Education Richard Matthew Stallman was born in Manhattan, New York,on born March 16, 1953. He first accessed a computer during his senior year at high school in 1969. He was hired by IBM New York Scientific Centre, while he was still in high-school. He wrote his first program, a preprocessor for the PL/I programming language on the IBM 360. In June 1971, as a first year student at Harvard University, Stallman became a pro- grammer at the AI Laboratory of MIT. Stallman graduated from Harvard earning a BA in Physics in 1974. He then en- rolled at MIT as a graduate student, but abandoned his pursuit of a graduate degree while remaining a programmer at the MIT AI Laboratory. In 1977, Stallman published a paper on an AI truth maintenance system called de- pendency-directed backtracking.
  • 3. Contributions GNU Project – Free Software Foundation In 1983 he started GNU project and in January 1984, Stall- man quit his job at MIT to work full-time on the GNU proj- ect, he founded the GNU Project to create a free unix-like operating system, and has been the project's lead archi- tect and organizer. He co-founded the League for Programming Freedom in 1989 to unite free software developers as well as develop- ers of proprietary software to fight against software pat- ents and the extension of the scope of copyright. He also introduced the concept of copyleft to protect the ideals of this movement, and enshrined this concept in the widely-used GPL (General Public License) for software, the most widely used free software license.
  • 4. Free Software Foundation The Free Software Foundation (FSF) was founded by Rich- ard Stallman on 4 October 1985, targeted towards the growth of new free generation of users as our life every day gives us more reasons to use different software. Interesting fact that free software foundation itself uses only free software for their work, as it is their life’s princi- ple. Every year thousands of corporations and individual soft- ware developers register their copyrights with enforcing the license and the US copyright office through Compli- ance Lab and Free Software Licensing.
  • 5. Emacs The most popular, and most ported, version of Emacs is GNU Emacs, which was created by Stallman for the GNU Project. Emacs is Extensible - The GNU Emacs manual describes Emacs as the extensible, customizable, self-documenting, real-time display editor. Emacs Integrates well with lots of external tools, it pro- vides commands to manipulate words and paragraphs, syntax highlighting for making source code easier to read, and keyboard macros for performing user-defined batches of editing commands.
  • 6. Open Source vs Free Software Richard Stallman is known as a person who fought all his life for right definitions of his project. Open Source vs Free Software has always been a source of misunderstanding between the respective user communities. When you are speaking about free software, avoid saying “for free” or “giveaway”, as it will change the meaning to the issue about the cost, not the freedom, as human rights.
  • 7. Awards and Achievments In 1991 Stallman was awarded by The Association for Computing Machinery's Grace Murray Hopper for pio- neering work in the development of the extensible editor EMACS (Editing Macros)." In 2013 the Internet Hall of Fame inducted Stallman for his contributions as creator of the GNU Project, main author of the GNU General Public License, and his philosophical contributions as founder of the free software move- ment.Opinion/Views