Open Source Concepts: Dual Licensing Explained

We were recently faced with a decision: either to let a program that took us one year to code die, simply because we do not have enough time to maintain it, or make it open source.

Open source looked like a good idea for while, but there was one problem. We wanted to keep the software under our control and to be able to make money selling it later. And let us just be honest and admit it: we wanted monopoly over our software and why not? It took us one year to write the software, and its documentation. Yeah we believe in 'Free Software', but who works for free. Free software can never be successful in the long run, if there is no way to make money.

Dual Licensing and GPL:

Then we said to each other: 'Hey, RedHat and MySQL are open source. Still they make lot of money. How?" The answer lies in the strategy known as 'Dual Licensing'. It is very simple. The Open Source company first has to copyright the source code, and then make it available to public. Now, since the company owns the source code copyright, it can distribute it under two different licenses: one open source and the other commercial. The open source license in such case will almost always be GNU GPL (General Public License), which allows anybody to modify the source code, redistribute it and incorporate it into other projects. However, there is one catch (a big, and annoying catch). The restriction is that any project that uses GPL'd code must also be released under the GPL license (GPL, we believe, works like a virus. It keeps on spreading). Which simply means (regarless of what open source ativists tell you), you cannot sell the GPL'd code or any project that incorporates it for profit. For that purpose, you will have to offer a commercial license.

Some well known companies that use Dual Licensing are: RedHat Inc, MySQL, AB., Sleepycat among many others. These companies one hand attracts people and developers who want to move the Open Source movement, and on the other, they want to make some serious money with dual licensing.

Let us look at an example: a guy was creating a commercial database application that was intended to bring him some cash. He used MySQL database at the backend, thinking it was free. He later found out that he violated the GPL license that MySQL uses. Anybody is restricted from distributing an application that uses GPL in modified or unmodified form unless the whole project is licensed under GPL. So that guy was left with no choice, but to buy commercial licenses (based on per copy) from MySQL, AB.

Is Dual Licensing Evil?

Yes. But there is nothing wrong with it. If no product revenues are coming in, the project will eventually die or will always be in a very bad shape (a lot of open source evangelists might try to contradict us and compare open source with religion, which it is not). In other words, if a guy is not making money from a project why in the hell would he keep supporting it. An example of one such software is PuTTY (with apology to Simon Tatham). Even though it is immensely popular, it still leaves a lot to be wished for. The User Interface is meager, the documentation is of low standard and there is no (customer) support. Strange for a very popular software.

Now if PuTTY was released under dual license, it might have been a lot different than it is now. The PuTTY company would have expanded, hiring new people and giving customer support. That did not happen and the result is that PuTTY is not used in large corporations who prefer commercial software with customer support and someone to blame if anything goes wrong. For example, Vandyke SecureCRT, Whitehorn Secure Terminal or Celestial Telnet are some popular commercial SSH clients.

So you mean Open Source is bad? Why people go open source then?

No. It is not. The number one advantage of open source is that it can cut the development time by as much as 50%. The other reason why people go open source is to make sure that project will always stay alive with the help from development community (many commercial software applications die in their first year). Some people participate in open source development just to make a name for them.

The bottom line is that Dual Licensing is not as evil as many people think it is. It is the only way to go if you want to make money from your open source project. We would like to end this article with a line from the infamous 'Open letter to hobbyists' written by Bill Gates: "Nothing would please me more than to be able to hire ten programmers and deluge the hobby market with good software."

DISCLAIMER: All information given in this article is provided on 'AS IS' basis. The author's do not assume any responsibility for any consequences and do not swear that the information given in this article is accurate. This article is not affiliated with any organization. This article can be distributed and redistributed as long as Author's names are not changed and the original text remains intact.

Ali Mansoor (malimansoor@hotmail.com) has written several famous commercial applications. Umer Mansoor (umer.mansoor@gmail.com) spends most of his time programming or thinking about money making schemes. He is inspired by his Dad, God, Microsoft, and more recently, Google. Visit his open source project page at: http://www.pegsol.com/newdesign/development.htm

Note from the authors: No we are not nerds or geeks and we define FREE as in 'free beer', not as in 'free speech'. Cheers..

detailed home cleaning Park Ridge ..
In The News:

Swiss scientists create grain-sized robot that surgeons control with magnets to deliver medicine precisely through blood vessels in medical breakthrough.
Researchers exploited WhatsApp's API vulnerability to scrape 3.5 billion phone numbers. Learn how this massive data breach happened and protect yourself.
Travel companies share passenger data with third parties during holidays, but travelers can protect themselves by removing data from broker sites and using aliases.
Xpeng's humanoid robot moves so realistically that crowds believed it was fake, marking a major advancement in robotics technology ahead of 2026 commercial launch.
Researchers discover phishing scam using invisible characters to evade email security, with protection tips including password managers and two-factor authentication.
iPhone and Android users can reduce battery drain and data usage by restricting Background App Refresh to Wi-Fi connections instead of mobile networks.
Scammers nearly stole an Apple account by exploiting the support system with authentic-looking tickets and phone calls, users can protect themselves with safety steps.
FoloToy restored sales of its AI teddy bear Kumma after a weeklong suspension following safety group findings of risky and inappropriate responses to children.
Threat intelligence firm Synthient uncovers one of the largest password exposures ever, prompting immediate security recommendations.
Viral video shared by Elon Musk shows Tesla's Optimus humanoid robots performing tasks from cooking to construction, garnering over 58.5 million views on social media.
Chinese hackers used Anthropic's Claude AI to launch autonomous cyberattacks on 30 organizations worldwide, marking a major shift in cybersecurity threats.
Apple's new Sleep Score feature gives you a rating for your nightly rest quality. Learn how to set it up on your Apple Watch and iPhone today.
Essential phone settings to enable before losing your device, including Find My network, location services and security features for iPhone and Android.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
Cybersecurity research shows weak passwords remain a major threat, with simple patterns and number sequences putting millions of accounts at risk.
New Android malware BankBot YNRK silences phones, steals banking data and drains crypto wallets automatically. Learn how this advanced threat works.
FDA approves first human trial for Paradromics' brain-computer interface that could restore speech for paralyzed patients through neural technology.
New phishing platform QRR targets Microsoft 365 users across 1,000 domains in 90 countries. Learn how to spot fake login pages and protect your accounts.
OpenTable now uses AI to track your dining habits and share insights with restaurants. Learn what data they collect and how to protect your privacy.
Google's discontinued Nest thermostats still secretly upload home data to company servers despite losing smart features, raising serious privacy concerns.
New Android malware NGate steals NFC payment codes in real-time, allowing criminals to withdraw cash from ATMs without your card. Learn protection tips.
DoorDash confirms data breach exposing customer names, emails, addresses after social engineering attack. Learn how to protect yourself from scams.
Concerned about Google's AI scanning your Gmail? Learn how to disable Gemini features that access your emails, Drive files and Chat messages for privacy.
Google warns Android users about dangerous fake VPN apps hiding malware that steals passwords, banking details and personal data from phones and tablets.
Apple's digital passport feature lets iPhone users breeze through TSA checkpoints this holiday season using Digital ID technology at 250+ airports.

Secure File Transfer Using SSH Plus Additional Audit & Automation - FSA Reporting

In order to meet regulatory and corporate compliance requirements reporting... Read More

Things You Can Do With Windows XP!

Did you ever give a thought to the number of... Read More

You Can Write Microsoft Office Program in About 60 Minutes

Microsoft Office program is a programming tool called Visual Basic... Read More

Microsoft Great Plains Customization and Development ? Overview for Programmer

When Great Plains Software was designing and developing Great Plains... Read More

Microsoft Update - 5 Reasons to Update Service Pack 2

Microsoft released Service Pack 2 (SP2) for the Windows XP... Read More

Microsoft Moves to Small Business Accounting/Retail Market ? Stakes and Thoughts

In this small article we will be looking at the... Read More

ERP System of the Future: Database, Business Logic and Interface

We will base our prognosis on our Microsoft Business Solutions... Read More

Call Alert Notifications - Free Answering Machine Software for PCs

If you're online using a dialup Internet connection, you'll probably... Read More

MicroWorld Releases New Version of MailScan Ver. 4.5 - Antivirus and Content Security Software

MicroWorld Technologies, Inc. the leading solutions provider in the area... Read More

Microsoft Great Plains international implementation ? USA / Mexico ? overview for consultant

Microsoft Business Solutions Great Plains was purchased from Great Plains... Read More

Constructionalist Parsing - Deciphering Natural Language

The research in the field of Natural Language Processing usually... Read More

My Experience - Making a Vision into Reality

Disclaimer: All the thoughts expressed are my views only! Your... Read More

An Easy Way to Deal with Email Viruses and Worms

If you feel intimidated when someone tries to teach you... Read More

C++ Tutorial 2, Input and Variables

This is the tutorial where we really get into programming.... Read More

Microsoft Great Plains ? Licensing & Product Versions

Current Microsoft Business Solutions Great Plains has more that 10... Read More

Three Steps To Windows Safety Heaven

Now there are Three Steps To Heaven Just listen and... Read More

Who?s Watching What You Type?

If someone entered your home, uninvited and installed numerous cameras... Read More

Microsoft Great Plains Nationwide Remote Support

ERP Consulting industry is on the way to serve clients... Read More

What is Software Piracy?

There are several kinds of software piracy. The bottom line... Read More

Microsoft CRM Customization ? Programming Closed Email Activity

Microsoft CRM is CRM answer from Microsoft and attempt to... Read More

Software For Your Hard-Drive

All your software is stored on a hard-drive. But how... Read More

Do You Want Your Own Fully Programmable ERP? - Part 1

We are in a transition phase in the Managerial Administration... Read More

Lotus Notes Domino and Microsoft CRM Integration

Well, even if the combination might look very unusual, we... Read More

The Opera Alternative

Security flaws have long plagued Internet Explorer (IE), the market-dominating... Read More

Microsoft CRM ? Typical Customizations

Microsoft CRM was designed to be easily customizable. Microsoft CRM... Read More

express cleaning service Des Plaines ..