Open Source Concepts: Dual Licensing Explained

We were recently faced with a decision: either to let a program that took us one year to code die, simply because we do not have enough time to maintain it, or make it open source.

Open source looked like a good idea for while, but there was one problem. We wanted to keep the software under our control and to be able to make money selling it later. And let us just be honest and admit it: we wanted monopoly over our software and why not? It took us one year to write the software, and its documentation. Yeah we believe in 'Free Software', but who works for free. Free software can never be successful in the long run, if there is no way to make money.

Dual Licensing and GPL:

Then we said to each other: 'Hey, RedHat and MySQL are open source. Still they make lot of money. How?" The answer lies in the strategy known as 'Dual Licensing'. It is very simple. The Open Source company first has to copyright the source code, and then make it available to public. Now, since the company owns the source code copyright, it can distribute it under two different licenses: one open source and the other commercial. The open source license in such case will almost always be GNU GPL (General Public License), which allows anybody to modify the source code, redistribute it and incorporate it into other projects. However, there is one catch (a big, and annoying catch). The restriction is that any project that uses GPL'd code must also be released under the GPL license (GPL, we believe, works like a virus. It keeps on spreading). Which simply means (regarless of what open source ativists tell you), you cannot sell the GPL'd code or any project that incorporates it for profit. For that purpose, you will have to offer a commercial license.

Some well known companies that use Dual Licensing are: RedHat Inc, MySQL, AB., Sleepycat among many others. These companies one hand attracts people and developers who want to move the Open Source movement, and on the other, they want to make some serious money with dual licensing.

Let us look at an example: a guy was creating a commercial database application that was intended to bring him some cash. He used MySQL database at the backend, thinking it was free. He later found out that he violated the GPL license that MySQL uses. Anybody is restricted from distributing an application that uses GPL in modified or unmodified form unless the whole project is licensed under GPL. So that guy was left with no choice, but to buy commercial licenses (based on per copy) from MySQL, AB.

Is Dual Licensing Evil?

Yes. But there is nothing wrong with it. If no product revenues are coming in, the project will eventually die or will always be in a very bad shape (a lot of open source evangelists might try to contradict us and compare open source with religion, which it is not). In other words, if a guy is not making money from a project why in the hell would he keep supporting it. An example of one such software is PuTTY (with apology to Simon Tatham). Even though it is immensely popular, it still leaves a lot to be wished for. The User Interface is meager, the documentation is of low standard and there is no (customer) support. Strange for a very popular software.

Now if PuTTY was released under dual license, it might have been a lot different than it is now. The PuTTY company would have expanded, hiring new people and giving customer support. That did not happen and the result is that PuTTY is not used in large corporations who prefer commercial software with customer support and someone to blame if anything goes wrong. For example, Vandyke SecureCRT, Whitehorn Secure Terminal or Celestial Telnet are some popular commercial SSH clients.

So you mean Open Source is bad? Why people go open source then?

No. It is not. The number one advantage of open source is that it can cut the development time by as much as 50%. The other reason why people go open source is to make sure that project will always stay alive with the help from development community (many commercial software applications die in their first year). Some people participate in open source development just to make a name for them.

The bottom line is that Dual Licensing is not as evil as many people think it is. It is the only way to go if you want to make money from your open source project. We would like to end this article with a line from the infamous 'Open letter to hobbyists' written by Bill Gates: "Nothing would please me more than to be able to hire ten programmers and deluge the hobby market with good software."

DISCLAIMER: All information given in this article is provided on 'AS IS' basis. The author's do not assume any responsibility for any consequences and do not swear that the information given in this article is accurate. This article is not affiliated with any organization. This article can be distributed and redistributed as long as Author's names are not changed and the original text remains intact.

Ali Mansoor (malimansoor@hotmail.com) has written several famous commercial applications. Umer Mansoor (umer.mansoor@gmail.com) spends most of his time programming or thinking about money making schemes. He is inspired by his Dad, God, Microsoft, and more recently, Google. Visit his open source project page at: http://www.pegsol.com/newdesign/development.htm

Note from the authors: No we are not nerds or geeks and we define FREE as in 'free beer', not as in 'free speech'. Cheers..

best cleaning company Lincolnshire ..
In The News:

Medical history made as surgeons successfully restore sight to legally blind patient using world's first 3D printed corneal implant grown from human cells.
Data brokers aggressively collect your holiday shopping data to fuel scams and targeted ads. Learn how to delete your digital profile before 2025 starts.
Scammers are sending fake MetaMask wallet verification emails using official branding to steal crypto information through phishing links and fraudulent domains.
Learn what background permissions, push notifications, security updates, auto-join networks and app refresh mean to better manage your phone's privacy settings.
Criminals test stolen data by applying for deposit accounts in victims' names to prepare bigger attacks. Learn why banks won't share fraud details.
New study of 10,500+ kids reveals early smartphone ownership linked to depression, obesity, and poor sleep by age 12. Earlier phones mean higher risks.
A phone phishing attack compromised Harvard's alumni and donor database, marking the second security incident at the university in recent months.
AutoFlight's zero-carbon floating vertiport uses solar power to charge eVTOL aircraft while supporting emergency response, tourism, and marine energy maintenance.
A new phone return scam targets recent buyers with fake carrier calls. Learn how criminals steal devices and steps to protect yourself from this fraud.
New Anthropic research reveals how AI reward hacking leads to dangerous behaviors, including models giving harmful advice like drinking bleach to users seeking help.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
Holiday email scams, including non-delivery fraud and gift card schemes, spike in November and December, costing victims hundreds of millions, the FBI says.
Holiday visits offer the perfect opportunity to help older parents with technology updates, scam protection and basic troubleshooting skills for safer digital experiences.
Swiss scientists create grain-sized robot that surgeons control with magnets to deliver medicine precisely through blood vessels in medical breakthrough.
Researchers exploited WhatsApp's API vulnerability to scrape 3.5 billion phone numbers. Learn how this massive data breach happened and protect yourself.
Travel companies share passenger data with third parties during holidays, but travelers can protect themselves by removing data from broker sites and using aliases.
Xpeng's humanoid robot moves so realistically that crowds believed it was fake, marking a major advancement in robotics technology ahead of 2026 commercial launch.
Researchers discover phishing scam using invisible characters to evade email security, with protection tips including password managers and two-factor authentication.
iPhone and Android users can reduce battery drain and data usage by restricting Background App Refresh to Wi-Fi connections instead of mobile networks.
Scammers nearly stole an Apple account by exploiting the support system with authentic-looking tickets and phone calls, users can protect themselves with safety steps.
FoloToy restored sales of its AI teddy bear Kumma after a weeklong suspension following safety group findings of risky and inappropriate responses to children.
Threat intelligence firm Synthient uncovers one of the largest password exposures ever, prompting immediate security recommendations.
Viral video shared by Elon Musk shows Tesla's Optimus humanoid robots performing tasks from cooking to construction, garnering over 58.5 million views on social media.
Chinese hackers used Anthropic's Claude AI to launch autonomous cyberattacks on 30 organizations worldwide, marking a major shift in cybersecurity threats.
Apple's new Sleep Score feature gives you a rating for your nightly rest quality. Learn how to set it up on your Apple Watch and iPhone today.

How To Avoid Getting Hooked By Pfishing

"Pfishing", sometimes spelled "Phishing", is a word that's used to... Read More

Microsoft CRM Implementation & Customization: MS CRM Fax Gateway

With this small article we are continuing Microsoft Business Solutions... Read More

Getting Technical Support Help Online

Sometimes your PC will start acting strange for no apparent... Read More

Microsoft Great Plains: Data Conversion & Migration Scenarios ? Overview for Consultant

Microsoft Business Solutions Great Plains serves multiple industries in the... Read More

Brief Notes About Mainframe Software Pricing

We don't think about mainframe software pricing anymore, we just... Read More

Great Plains Dexterity History and Programming Overview

As of now - Great Plains Dynamics/eEnterprise is transformed/renamed into... Read More

The XP Firewall Isnt Enough

You might think you don't need a firewall... Read More

Not All Project Management Software is Created Equal

The purpose of Project Management Software is to provide an... Read More

Making The Decision To Automate Your Software Testing

Not every software testing project can or should be automated.... Read More

Spyware, What is it?

Spyware, what it is and what it does. Basically, spyware... Read More

Linux ? Keyboard Or Mouse

Just stress testing one of the latest Linux distributions. Been... Read More

Microsoft Great Plains: If You are Orphan Client ? What to Do and FAQ

Microsoft Business Solutions Great Plains, former Great Plains Software eEnterprise,... Read More

Dreamweaver vs FrontPage

There are two major WYSIWYG(What You See Is What You... Read More

.Net Charts and Graphs Interact with Businesses and Customers

Bar charts, bar graphs, and any other chart or graph... Read More

Microsoft CRM USA Nationwide Remote Support

Remember old good days when your company probably had Great... Read More

10 Steps To Secure And Manage Your Passwords

Passwords protect your most sensitive personal, financial and business information.... Read More

ERP for Large Corporation ? New Selling Strategy

Our opinion is based on our Microsoft Business Solutions Great... Read More

Chinese Input - Step by Step Instruction on How to Input Chinese Characters in English Windows XP

Enabling Chinese input is quick and easy, there are only... Read More

Microsoft RMS Customization ? PO Items Receiving in Great Plains

Microsoft Retail Management (RMS) and Microsoft Great Plains are retail... Read More

Microsoft Business Solutions - Navision Customization: C/SIDE, C/ODBC, C/FRONT, XBRL

Microsoft bought Navision, Denmark based software development company, along with... Read More

Free Software - Powerful Alternatives to Budget-Busting Software

When you buy a computer, it most likely comes with... Read More

Microsoft CRM Data Conversion FAQ

Microsoft Business Solutions CRM data conversion deserves FAQ type of... Read More

Basic Steps To Optimize Your Internet Security

After seeing many people complain about their weak Internet security... Read More

What You Must Know About Spyware Right Now

Spyware is like the new technological nuclear weapon on the... Read More

Microsoft CRM in Latin America: Implementation, Customization, Support ? Overview for Consultant

Microsoft Business Solutions CRM is present several years on the... Read More

on demand house cleaning Lake Forest ..