Open Source Concepts: Dual Licensing Explained

We were recently faced with a decision: either to let a program that took us one year to code die, simply because we do not have enough time to maintain it, or make it open source.

Open source looked like a good idea for while, but there was one problem. We wanted to keep the software under our control and to be able to make money selling it later. And let us just be honest and admit it: we wanted monopoly over our software and why not? It took us one year to write the software, and its documentation. Yeah we believe in 'Free Software', but who works for free. Free software can never be successful in the long run, if there is no way to make money.

Dual Licensing and GPL:

Then we said to each other: 'Hey, RedHat and MySQL are open source. Still they make lot of money. How?" The answer lies in the strategy known as 'Dual Licensing'. It is very simple. The Open Source company first has to copyright the source code, and then make it available to public. Now, since the company owns the source code copyright, it can distribute it under two different licenses: one open source and the other commercial. The open source license in such case will almost always be GNU GPL (General Public License), which allows anybody to modify the source code, redistribute it and incorporate it into other projects. However, there is one catch (a big, and annoying catch). The restriction is that any project that uses GPL'd code must also be released under the GPL license (GPL, we believe, works like a virus. It keeps on spreading). Which simply means (regarless of what open source ativists tell you), you cannot sell the GPL'd code or any project that incorporates it for profit. For that purpose, you will have to offer a commercial license.

Some well known companies that use Dual Licensing are: RedHat Inc, MySQL, AB., Sleepycat among many others. These companies one hand attracts people and developers who want to move the Open Source movement, and on the other, they want to make some serious money with dual licensing.

Let us look at an example: a guy was creating a commercial database application that was intended to bring him some cash. He used MySQL database at the backend, thinking it was free. He later found out that he violated the GPL license that MySQL uses. Anybody is restricted from distributing an application that uses GPL in modified or unmodified form unless the whole project is licensed under GPL. So that guy was left with no choice, but to buy commercial licenses (based on per copy) from MySQL, AB.

Is Dual Licensing Evil?

Yes. But there is nothing wrong with it. If no product revenues are coming in, the project will eventually die or will always be in a very bad shape (a lot of open source evangelists might try to contradict us and compare open source with religion, which it is not). In other words, if a guy is not making money from a project why in the hell would he keep supporting it. An example of one such software is PuTTY (with apology to Simon Tatham). Even though it is immensely popular, it still leaves a lot to be wished for. The User Interface is meager, the documentation is of low standard and there is no (customer) support. Strange for a very popular software.

Now if PuTTY was released under dual license, it might have been a lot different than it is now. The PuTTY company would have expanded, hiring new people and giving customer support. That did not happen and the result is that PuTTY is not used in large corporations who prefer commercial software with customer support and someone to blame if anything goes wrong. For example, Vandyke SecureCRT, Whitehorn Secure Terminal or Celestial Telnet are some popular commercial SSH clients.

So you mean Open Source is bad? Why people go open source then?

No. It is not. The number one advantage of open source is that it can cut the development time by as much as 50%. The other reason why people go open source is to make sure that project will always stay alive with the help from development community (many commercial software applications die in their first year). Some people participate in open source development just to make a name for them.

The bottom line is that Dual Licensing is not as evil as many people think it is. It is the only way to go if you want to make money from your open source project. We would like to end this article with a line from the infamous 'Open letter to hobbyists' written by Bill Gates: "Nothing would please me more than to be able to hire ten programmers and deluge the hobby market with good software."

DISCLAIMER: All information given in this article is provided on 'AS IS' basis. The author's do not assume any responsibility for any consequences and do not swear that the information given in this article is accurate. This article is not affiliated with any organization. This article can be distributed and redistributed as long as Author's names are not changed and the original text remains intact.

Ali Mansoor (malimansoor@hotmail.com) has written several famous commercial applications. Umer Mansoor (umer.mansoor@gmail.com) spends most of his time programming or thinking about money making schemes. He is inspired by his Dad, God, Microsoft, and more recently, Google. Visit his open source project page at: http://www.pegsol.com/newdesign/development.htm

Note from the authors: No we are not nerds or geeks and we define FREE as in 'free beer', not as in 'free speech'. Cheers..

disinfecting cleaning services Winnetka ..
In The News:

Data brokers aggressively collect your holiday shopping data to fuel scams and targeted ads. Learn how to delete your digital profile before 2025 starts.
Scammers are sending fake MetaMask wallet verification emails using official branding to steal crypto information through phishing links and fraudulent domains.
Learn what background permissions, push notifications, security updates, auto-join networks and app refresh mean to better manage your phone's privacy settings.
Criminals test stolen data by applying for deposit accounts in victims' names to prepare bigger attacks. Learn why banks won't share fraud details.
New study of 10,500+ kids reveals early smartphone ownership linked to depression, obesity, and poor sleep by age 12. Earlier phones mean higher risks.
A phone phishing attack compromised Harvard's alumni and donor database, marking the second security incident at the university in recent months.
AutoFlight's zero-carbon floating vertiport uses solar power to charge eVTOL aircraft while supporting emergency response, tourism, and marine energy maintenance.
A new phone return scam targets recent buyers with fake carrier calls. Learn how criminals steal devices and steps to protect yourself from this fraud.
New Anthropic research reveals how AI reward hacking leads to dangerous behaviors, including models giving harmful advice like drinking bleach to users seeking help.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
Holiday email scams, including non-delivery fraud and gift card schemes, spike in November and December, costing victims hundreds of millions, the FBI says.
Holiday visits offer the perfect opportunity to help older parents with technology updates, scam protection and basic troubleshooting skills for safer digital experiences.
Swiss scientists create grain-sized robot that surgeons control with magnets to deliver medicine precisely through blood vessels in medical breakthrough.
Researchers exploited WhatsApp's API vulnerability to scrape 3.5 billion phone numbers. Learn how this massive data breach happened and protect yourself.
Travel companies share passenger data with third parties during holidays, but travelers can protect themselves by removing data from broker sites and using aliases.
Xpeng's humanoid robot moves so realistically that crowds believed it was fake, marking a major advancement in robotics technology ahead of 2026 commercial launch.
Researchers discover phishing scam using invisible characters to evade email security, with protection tips including password managers and two-factor authentication.
iPhone and Android users can reduce battery drain and data usage by restricting Background App Refresh to Wi-Fi connections instead of mobile networks.
Scammers nearly stole an Apple account by exploiting the support system with authentic-looking tickets and phone calls, users can protect themselves with safety steps.
FoloToy restored sales of its AI teddy bear Kumma after a weeklong suspension following safety group findings of risky and inappropriate responses to children.
Threat intelligence firm Synthient uncovers one of the largest password exposures ever, prompting immediate security recommendations.
Viral video shared by Elon Musk shows Tesla's Optimus humanoid robots performing tasks from cooking to construction, garnering over 58.5 million views on social media.
Chinese hackers used Anthropic's Claude AI to launch autonomous cyberattacks on 30 organizations worldwide, marking a major shift in cybersecurity threats.
Apple's new Sleep Score feature gives you a rating for your nightly rest quality. Learn how to set it up on your Apple Watch and iPhone today.
Essential phone settings to enable before losing your device, including Find My network, location services and security features for iPhone and Android.

Navision Customization: C/SIDE, C/ODBC, C/FRONT, XBRL ? Development Options

Microsoft bought Navision, Denmark based software development company, along with... Read More

Microsoft CRM Messaging through Lotus Domino eMail Server - Balanced Solution

Microsoft CRM and IBM Lotus Notes Domino seem to be... Read More

C++ Function Templates

C++ Function templates are those functions which can handle different... Read More

Navision Attain C/ODBC Crystal Report ? Customization Example

Microsoft Business Solutions Navision is main ERP application for European,... Read More

Navision Sales Module & Reporting: Jet Reports, C/ODBC, XBRL, Business Analytics ? highlights

Microsoft bought Navision, Denmark based software development company, along with... Read More

Pros and Cons of Using FREE Software in Your Business

It???s easy to understand why you might be drawn to... Read More

10 Programming Tips

(1) Avoid using the same variable again and again for... Read More

Groove Network. Are you in it?

If you are in a business that passes documents around... Read More

Microsoft CRM for Corporate Business ? Working Offline

If your company has regional and worldwide operations, you might... Read More

Microsoft Great Plains SOP: Sales Order Processing

Microsoft Business Solutions Great Plains is marketed for mid-size companies... Read More

CROOK: A Methodology for the Refinement of Forward-Error Correction

Table of Contents1) Introduction 2) Related Work 3) Framework 4)... Read More

Run Your Own Search Engine

Our hosted solution allow you to run your own search... Read More

Basic Tips and tricks for Windows XP

Running Applications in Compatibility Mode With Windows XP, you can... Read More

Brief Notes About Mainframe Software Pricing

We don't think about mainframe software pricing anymore, we just... Read More

Microsoft CRM Customization ? Programming Closed Email Activity

Microsoft CRM is CRM answer from Microsoft and attempt to... Read More

The Tools and Features of Adobe Photoshop

Adobe Photoshop is one of the world's leading graphics editing... Read More

Intro to UNIX Shells

A UNIX Shell is in simplest terms, a command line... Read More

How to Make Attractive and Effective PowerPoint Presentations

Microsoft PowerPoint has dramatically changed the way in which academic... Read More

10 Ways to Learn a Software

Following tips help you to learn a software in lesser... Read More

Snort for Network IDS

What is Snort?Snort is an open source network intrusion detection... Read More

Microsoft CRM and Great Plains Implementation: Freight Forwarding Business Automation Example

Microsoft Business Solutions offers several ERP applications: Great Plains, Navision,... Read More

OS 101: Suggestions for Choosing an Operating System

An operating system (abbreviated OS) is essentially the path through... Read More

netstat - Linux Command to Display Networking Information

In linux, one of great commands for finding out information... Read More

How To Make Good Use of Spreadsheets

Most computer users use spreadsheets software such as Microsoft Excel... Read More

Rapid Application Development - Is it Really a Need of Today?

Rapid Application Development (RAD) is a software development methodology. In... Read More

last minute cleaning help Highland Park ..