Jump to content

Vendor lock-in

From Wikipedia, the free encyclopedia

This is the current revision of this page, as edited by Rodw (talk | contribs) at 15:42, 4 December 2024 (Disambiguating links to Daw (link changed to Digital audio workstation) using DisamAssist.). The present address (URL) is a permanent link to this version.

(diff) ← Previous revision | Latest revision (diff) | Newer revision → (diff)

In economics, vendor lock-in, also known as proprietary lock-in or customer lock-in, makes a customer dependent on a vendor for products, unable to use another vendor without substantial switching costs.

The use of open standards and alternative options makes systems tolerant of change, so that decisions can be postponed until more information is available or unforeseen events are addressed. Vendor lock-in does the opposite: it makes it difficult to move from one solution to another.

Lock-in costs that create barriers to market entry may result in antitrust action against a monopoly.

Lock-in types

[edit]
Monopolistic Collective Popular term
No No
Yes Technology lock-in
Yes No Vendor lock-in
Yes
Monopolistic
Whether a single vendor controls the market for the method or technology being locked in to. Distinguishes between being locked to the mere technology, or specifically the vendor of it.

This class of lock-in is potentially technologically hard to overcome if the monopoly is held up by barriers to market that are nontrivial to circumvent, such as patents, secrecy, cryptography or other technical hindrances.

Collective
Whether individuals are locked in collectively, in part through each other. Economically, there is a cost to resist the locally dominant choice, as if by friction between individuals. In a mathematical model of differential equations, disregarding discreteness of individuals, this is a distributed parameter system in market share, applicable for modeling by partial differential equations, for example the heat equation.

This class of lock-in is potentially inescapable to rational individuals not otherwise motivated, by creating a prisoner's dilemma—if the cost to resist is greater than the cost of joining, then the locally optimal choice is to join—a barrier that takes cooperation to overcome. The distributive property (cost to resist the locally dominant choice) alone is not a network effect, for lack of any positive feedback; however, the addition of bistability per individual, such as by a switching cost, qualifies as a network effect, by distributing this instability to the collective as a whole.

Technology lock-in

[edit]

As defined by The Independent, this is a non-monopoly (mere technology), collective (on a society level) kind of lock-in:[1]

Technological lock-in is the idea that the more a society adopts a certain technology, the more unlikely users are to switch.

Examples:

Personal technology lock-in

[edit]

Technology lock-in, as defined, is strictly of the collective kind. However, the personal variant is also a possible permutation of the variations shown in the table, but with no monopoly and no collectivity, it would be expected to be the weakest lock-in. Equivalent personal examples:

  • A person who has become proficient on QWERTY keyboards will have an incentive to continue using QWERTY keyboards.
  • A person who has become proficient at using a DAW's MIDI piano roll for composition and editing will have an incentive to keep using applications that provide a piano roll, as opposed to traditional Western musical notation or a music tracker
  • A car owner has an incentive to make use of their car, because gas and eventual maintenance from wear and tear is cheap compared to the cost of the car itself and the cost of insurance (assuming the insurance plan does not factor in mileage); the car is said to be a sunk cost.
  • A person who has ripped their CD collection to MP3 will have an incentive to prefer audio equipment that supports this format; and vice versa, for personal investment reasons, has an incentive to continue ripping to this format.
  • A person who has most of their multimedia equipment interconnected with HDMI will tend to seek HDMI compatibility to all their other multimedia-capable equipment (although this is a far less severe case of lock-in than those above, due to the wide availability of adapters that can be used to connect HDMI equipment to and from—for instance—DVI or DisplayPort equipment).

Collective vendor lock-in

[edit]

There exist lock-in situations that are both monopolistic and collective. Having the worst of two worlds, these can be very hard to escape — in many examples, the cost to resist incurs some level of isolation from the (dominating technology in) society, which can be socially costly, yet direct competition with the dominant vendor is hindered by compatibility.

As one blogger expressed:[3]

If I stopped using Skype, I'd lose contact with many people, because it's impossible to make them all change to [other] software.

While MP3 is patent-free as of 2017, in 2001 it was both patented and entrenched, as noted by Richard Stallman in that year (in justifying a lax license for Ogg Vorbis):[4]

there is […] the danger that people will settle on MP3 format even though it is patented, and we won't be *allowed* to write free encoders for the most popular format. […] Ordinarily, if someone decides not to use a copylefted program because the license doesn't please him, that's his loss not ours. But if he rejects the Ogg/Vorbis code because of the license, and uses MP3 instead, then the problem rebounds on us—because his continued use of MP3 may help MP3 to become and stay entrenched.

More examples:

  • Proprietary file formats that have become widespread on the Web: examples include GIF (patent expired), Adobe Flash and H.264.
  • Communication services that require membership with the same vendor as the communication partner: Unlike telephone service providers or email service providers, which enable communication with competing providers' users, services like Skype and Facebook are effectively single-vendor communication protocols. Facebook is said to have achieved technological lock-in, in terms of its self-reinforcing presence on a society level.[1] However, if the lock-in is to Facebook specifically, not social media in general, then it is fair to promote this title to collective vendor lock-in.

Examples

[edit]

Microsoft

[edit]

The European Commission, in its March 24, 2004 decision on Microsoft's business practices,[5] quotes, in paragraph 463, Microsoft general manager for C++ development Aaron Contorer as stating in a February 21, 1997 internal Microsoft memo drafted for Bill Gates:

"The Windows API is so broad, so deep, and so functional that most ISVs [independent software vendors] would be crazy not to use it. And it is so deeply embedded in the source code of many Windows apps that there is a huge switching cost to using a different operating system instead. It is this switching cost that has given customers the patience to stick with Windows through all our mistakes, our buggy drivers, our high TCO [total cost of ownership], our lack of a sexy vision at times, and many other difficulties. […] Customers constantly evaluate other desktop platforms, [but] it would be so much work to move over that they hope we just improve Windows rather than force them to move. In short, without this exclusive franchise called the Windows API, we would have been dead a long time ago. The Windows franchise is fueled by application development which is focused on our core APIs."

Microsoft's application software also exhibits lock-in through the use of proprietary file formats. Microsoft Outlook uses a proprietary, publicly undocumented datastore format. Present versions of Microsoft Word have introduced a new format MS-OOXML. This may make it easier for competitors to write documents compatible with Microsoft Office in the future by reducing lock-in.[citation needed] Microsoft released full descriptions of the file formats for earlier versions of Word, Excel and PowerPoint in February 2008.[6]

Apple Inc.

[edit]

Prior to March 2009, digital music files with digital rights management (DRM) were available for purchase from the iTunes Store, encoded in a proprietary derivative of the AAC format that used Apple's FairPlay DRM system. These files are compatible only with Apple's iTunes media player software on Macs and Windows, their iPod portable digital music players, iPhone smartphones, iPad tablet computers, and the Motorola ROKR E1 and SLVR mobile phones. As a result, that music was locked into this ecosystem and available for portable use only through the purchase of one of the above devices,[7] or by burning to CD and optionally re-ripping to a DRM-free format such as MP3 or WAV.

In January 2005, an iPod purchaser named Thomas Slattery filed a suit against Apple for the "unlawful bundling" of their iTunes Music Store and iPod device. He stated in his brief: "Apple has turned an open and interactive standard into an artifice that prevents consumers from using the portable hard drive digital music player of their choice." At the time Apple was stated to have an 80% market share of digital music sales and a 90% share of sales of new music players, which he claimed allowed Apple to horizontally leverage its dominant positions in both markets to lock consumers into its complementary offerings.[8] In September 2005, U.S. District Judge James Ware approved Slattery v. Apple Computer Inc. to proceed with monopoly charges against Apple in violation of the Sherman Antitrust Act.[9]

On June 7, 2006, the Norwegian Consumer Council stated that Apple's iTunes Music Store violates Norwegian law. The contract conditions were vague and "clearly unbalanced to disfavor the customer".[10] The retroactive changes to the DRM conditions and the incompatibility with other music players are the major points of concern. In an earlier letter to Apple, consumer ombudsman Bjørn Erik Thon complained that iTunes' DRM mechanism was a lock-in to Apple's music players, and argued that this was a conflict with consumer rights that he doubted would be defendable by Norwegian copyright law.[11]

As of 29 May 2007, tracks on the EMI label became available in a DRM-free format called iTunes Plus. These files are unprotected and are encoded in the AAC format at 256 kilobits per second, twice the bitrate of standard tracks bought through the service. iTunes accounts can be set to display either standard or iTunes Plus formats for tracks where both formats exist.[12] These files can be used with any player that supports the AAC file format and are not locked to Apple hardware. They can be converted to MP format if desired.[clarification needed]

As of January 6, 2009, all four big music studios (Warner Bros., Sony BMG, Universal, and EMI) have signed up to remove the DRM from their tracks, at no extra cost. However, Apple charges consumers to have previously purchased DRM music restrictions removed.[13]

Google

[edit]

Although Google has stated its position in favor of interoperability,[14] the company has taken steps away from open protocols replacing open standard Google Talk by proprietary protocol Google Hangouts.[15][16] Also, Google's Data Liberation Front has been inactive on Twitter since 2013[17] and its official website, www.dataliberation.org, now redirects to a page on Google's FAQs, leading users to believe the project has been closed.[18][19] Google's mobile operating system Android is open source; however, the operating system that comes with the phones that most people actually purchase in a store is more often than not shipped with many of Google's proprietary applications that promote users to use only Google services.

Cloud computing

[edit]

Because cloud computing is still relatively new, standards are still being developed.[20] Many cloud platforms and services are proprietary, meaning that they are built on the specific standards, tools and protocols developed by a particular vendor for its particular cloud offering.[20] This can make migrating off a proprietary cloud platform prohibitively complicated and expensive.[20]

Three types of vendor lock-in can occur with cloud computing:[21]

  • Platform lock-in: cloud services tend to be built on one of several possible virtualization platforms, for example VMware or Xen. Migrating from a cloud provider using one platform to a cloud provider using a different platform could be very complicated.
  • Data lock-in: since the cloud is still new, standards of ownership, i.e. who actually owns the data once it lives on a cloud platform, are not yet developed, which could make it complicated if cloud computing users ever decide to move data off of a cloud vendor's platform.
  • Tools lock-in: if tools built to manage a cloud environment are not compatible with different kinds of both virtual and physical infrastructure, those tools will only be able to manage data or apps that live in the vendor's particular cloud environment.

Heterogeneous cloud computing is described as a type of cloud environment that prevents vendor lock-in, and aligns with enterprise data centers that are operating hybrid cloud models.[22] The absence of vendor lock-in lets cloud administrators select their choice of hypervisors for specific tasks, or to deploy virtualized infrastructures to other enterprises without the need to consider the flavor of hypervisor in the other enterprise.[23]

A heterogeneous cloud is considered one that includes on-premises private clouds, public clouds and software-as-a-service clouds. Heterogeneous clouds can work with environments that are not virtualized, such as traditional data centers.[24] Heterogeneous clouds also allow for the use of piece parts, such as hypervisors, servers, and storage, from multiple vendors.[25]

Cloud piece parts, such as cloud storage systems, offer APIs but they are often incompatible with each other.[26] The result is complicated migration between backends, and makes it difficult to integrate data spread across various locations.[26] This has been described as a problem of vendor lock-in.[26] The solution to this is for clouds to adopt common standards.[26]

Heterogeneous cloud computing differs from homogeneous clouds, which have been described as those using consistent building blocks supplied by a single vendor.[27] Intel General Manager of high-density computing, Jason Waxman, is quoted as saying that a homogeneous system of 15,000 servers would cost $6 million more in capital expenditure and use 1 megawatt of power.[27]

Other examples

[edit]
  • Many printer manufacturers claim that if any ink cartridges, beyond those sold by themselves, are used in the printer, the warranty of the printer becomes void. Lexmark tried to go further, making ink cartridges containing an authentication system, the purpose of which was intended to make it illegal in the United States (under the DMCA) for a competitor to make an ink cartridge compatible with Lexmark printers.[28] The United States Court of Appeals for the Sixth Circuit held in 2004 that third parties replicating such devices purely to make their cartridges interface with printers does not in fact violate the DMCA.
  • Test strips for glucose meters are typically made for a specific make or model. Strips designed for Accu-chek devices, for example, are incompatible with meters from other manufacturers. This lack of standardization can lead to problems especially in developing countries, where glucose meters and their associated strips are a scarce commodity. Some companies, despite claiming to have lifetime warranty on their products, stop making specific models and their respective strips so that even those who have a good functioning model have to buy a new model.[29]
  • The K-Cup single-serving coffee pod system was covered by a patent owned by Keurig, which is a subsidiary of Green Mountain Coffee Roasters, and no other manufacturer could create K-Cup packs compatible with Keurig coffee makers without a license from Keurig. While the company does have patents on improvements to the system, the original K-Cup patents expired in September 2012.[30] Other single-serving coffee brands, such as Nespresso, also have proprietary systems.
  • Lens mounts of competing camera manufacturers are almost always incompatible. Therefore, a photographer with a set of lens mounts of a certain manufacturer will prefer not to buy a camera from another manufacturer.
  • Nvidia, as of 2018, still only supports the proprietary Nvidia G-Sync despite the availability of the open Video Electronics Standards Association (VESA) standard Adaptive Sync technology (FreeSync). In January 2019, Nvidia announced that it will advance compatibility of its video cards with FreeSync-compatible monitors.[31]
  • Some cordless tool manufacturers make batteries that fit only their own brand of tools, and often are not backwards compatible. Often multiple brands are owned by the same company, and share tool designs and features, accessories and batteries are deliberately changed to make them incompatible. An example would be Stanley Black & Decker which also owns or manufactures Black & Decker, DeWalt, Porter Cable, Mastercraft, and Craftsman. All use almost identical batteries, yet all have some feature designed to stop use in other tools.[citation needed]
  • Dell laptops will 'throttle', or limit the processing speed available to the end-user, if genuine Dell OEM power supplies are not used with their devices (Users are presented with the warning: "The AC adapter type cannot be determined. This will prevent optimal system performance.").[32]

See also

[edit]

Notes

[edit]
  1. ^ a b c "Facebook may "lock in" its internet dominance". The Independent. 2010-01-27. Archived from the original on May 18, 2015. Retrieved 2015-05-05.
  2. ^ "Can I convert my MP3 collection to the Ogg Vorbis format?". Vorbis.com: FAQ. Xiph.Org. 2003-10-03. Archived from the original on 2012-09-22. Retrieved 2012-08-26.
  3. ^ "Top 10 reasons I hate Skype". dgeex.de. 2015-04-04. Archived from the original on 2015-04-29. Retrieved 2015-04-26.
  4. ^ a b Stallman, Richard (2001-02-26). "RMS on the Ogg Vorbis license". Archived from the original on 2019-12-09. Retrieved 2016-06-05. In general I would rather see software copylefted, which is one way of defending users' freedom against one particular danger. In the case of Ogg/Vorbis, there is a bigger danger from another direction: the danger that people will settle on MP3 format even though it is patented, and we won't be *allowed* to write free encoders for the most popular format. To overcome the inertia that supports MP3 format will require strenuous effort. Even if we do our utmost to encourage everyone to replace MP3 format with Ogg/Vorbis format, it is not certain they will do so. Consider how long we have been trying to replace GIF with PNG. Ordinarily, if someone decides not to use a copylefted program because the license doesn't please him, that's his loss not ours. But if he rejects the Ogg/Vorbis code because of the license, and uses MP3 instead, then the problem rebounds on us—because his continued use of MP3 may help MP3 to become and stay entrenched.
  5. ^ "Commission Decision of 24.03.2004 relating to a proceeding under Article 82 of the EC Treaty (Case COMP/C-3/37.792 Microsoft)" (PDF). European Commission. 2019-02-06. Archived (PDF) from the original on 2011-02-21. Retrieved 2009-06-17.
  6. ^ "Microsoft Office Binary (doc, xls, ppt) File Formats". Microsoft. 2008-02-15. Archived from the original on 2009-03-08. Retrieved 2009-06-17.
  7. ^ Sharpe, Nicola F.; Arewa, Olufunmilayo B. (Spring 2007). "Is Apple Playing Fair? Navigating the iPod FairPlay DRM Controversy". Northwestern Journal of Technology and Intellectual Property. 5 (2). Northwestern University. Archived from the original on 2012-02-07. Retrieved 2009-06-17.
  8. ^ "Itunes user sues Apple over iPod". BBC. 2005-01-06. Archived from the original on 2009-07-09. Retrieved 2009-06-17.
  9. ^ Higgins, Donna (2005-09-22). "Antitrust Suit Against Apple Over iPod, iTunes to Proceed". FindLaw Legal News. Archived from the original on 2009-07-23. Retrieved 2009-06-17.
  10. ^ "iTunes violates Norwegian law". Norwegian Consumer Ombudsman. 2006-06-07. Archived from the original on 2006-06-25. Retrieved 2006-06-08.
  11. ^ Thon, Bjørn Erik (2006-05-30). "iTunes' terms of service vs Norwegian marketing law §9a" (PDF). Archived from the original (PDF) on March 4, 2016. Retrieved 2015-05-02. English transcribed: The Consumer Council reacts to the observation that iTunes' DRM entails that the files can only be played on a few players, mainly Apple's own players. They furthermore believe that the terms of service's point 9b, where the customer among other things must agree not to circumvent or change such technical hindrances, is in conflict with the copyright law §53a(3). […] Copyright holders are by the copyright law entitled to decide if the work is to be made available, and in principle also how it is made available. […] Copyright can in my opinion not give the copyright holder right to demand all kinds of conditions when sold to consumers in generality. Norwegian original: Forbrukerrådet reagerer på at iTunes Music Stores DRM medfører at filene kun kan spilles på et fåtall spillere, hovedsakelig Apples egne spillere. De mener videre at tjenestevilkårenes punkt 9b, hvor kunden blant annet må samtykke til ikke å omgå eller endre slike tekniske sperrer, er i strid med åndsverksloven §53a(3). […] Rettighetshaverens enerett etter åndsverksloven gir anledning til å bestemme om verket skal gjøres tilgjengelig, og rettighetshaveren kan også i utgangspunktet bestemme måten dette skal skje på. […] Opphavsretten kan etter min mening ikke gi rettighetshaveren rett til å stille enhver form for betingelser ved salg til forbrukere i alminnelighet.
  12. ^ "Apple Launches iTunes Plus". Apple Inc. 2007-05-30. Archived from the original on 2011-06-08. Retrieved 2007-05-30.
  13. ^ "Changes Coming to the iTunes Store". Apple Inc. 2009-01-06. Archived from the original on 2011-09-04. Retrieved 2011-08-30.
  14. ^ "Open Communications - Google Talk for Developers". Google Inc. 2013-05-15. Archived from the original on 2016-10-18. Retrieved 2015-05-04.
  15. ^ "Google Abandons Open Standards for Instant Messaging". EFF. 2013-05-22. Archived from the original on 2014-08-01. Retrieved 2015-05-04.
  16. ^ "You Have No Choice: Google To Shutdown GTalk Feb. 23, Hello Hangouts". TechTimes. 2015-02-17. Archived from the original on 2015-04-29. Retrieved 2015-05-04.
  17. ^ "dataliberation (@dataliberation) on Twitter". 2013-04-24. Archived from the original on 2015-03-14. Retrieved 2015-05-04.
  18. ^ "Vincent Toubiana (@vtoubiana) on Twitter". 2014-02-10. Archived from the original on 2015-12-01. Retrieved 2015-05-04.
  19. ^ "Rob Dolin(@robdolin) on Twitter". 2014-07-29. Archived from the original on 2015-12-01. Retrieved 2015-05-04.
  20. ^ a b c McKendrick, Joe. (2011-11-20) "Cloud Computing's Vendor Lock-In Problem: Why the Industry is Taking a Step Backward," Forbes.com [1]
  21. ^ Hinkle, Mark. (2010-6-9) "Three cloud lock-in considerations", Zenoss Blog [2]
  22. ^ Staten, James (2012-07-23). "Gelsinger brings the 'H' word to VMware". ZDNet. [3]
  23. ^ Vada, Eirik T. (2012-06-11) "Creating Flexible Heterogeneous Cloud Environments", page 5, Network and System Administration, Oslo University College [4]
  24. ^ Geada, Dave. (June 2, 2011) "The case for the heterogeneous cloud," Cloud Computing Journal [5] Archived 2014-03-27 at the Wayback Machine
  25. ^ Burns, Paul (2012-01-02). "Cloud Computing in 2012: What's Already Happening". Neovise.[6] Archived 2014-07-01 at the Wayback Machine
  26. ^ a b c d Livenson, Ilja. Laure, Erwin. (2011) "Towards transparent integration of heterogeneous cloud storage platforms", pages 27–34, KTH Royal Institute of Technology, Stockholm, Sweden. [7]
  27. ^ a b Gannes, Liz. GigaOm, "Structure 2010: Intel vs. the Homogeneous Cloud," June 24, 2010. [8][permanent dead link]
  28. ^ McCullagh, Declan (2003-01-08). "Lexmark invokes DMCA in toner suit". CNET. Retrieved 2013-07-07.
  29. ^ Babaria, Palav; O'Riordan, Aisling (2013-11-14). "A Haitian Boy's Needless Death From Diabetes". New York Times. Archived from the original on 2014-07-26. Retrieved 2014-07-17.
  30. ^ "The K-Cup Patent Is Dead, Long Live The K-Cup". Wall Street Journal. Archived from the original on 2018-11-23. Retrieved 2014-03-08.
  31. ^ Kerns, Michael. "The (Unproductive) Battle of FreeSync and G-Sync". Gamer's Nexus. Archived from the original on 2016-11-01. Retrieved 2016-10-11.
  32. ^ "How to Troubleshoot AC Adapter Issues | Dell US". www.dell.com. Archived from the original on 2020-07-20. Retrieved 2020-07-20.

References

[edit]
  • Arthur, W. B. (1989). "Competing technologies, increasing returns, and lock-in by historical events". Economic Journal. 97: 642–665.
  • David, P. A. (1985). "Clio and the economics of QWERTY". American Economic Review. 75: 332–337.
  • Liebowitz, S. J.; Margolis, Stephen E. (1995). "Path dependence, lock-in and history". Journal of Law, Economics, and Organization. 11: 205–226.
  • Liebowitz, S. J.; Margolis, Stephen E. (1998). "Path Dependence" entry". The New Palgraves Dictionary of Economics and the Law. MacMillan.
  • Liebowitz, S. J.; Margolis, Stephen E. (1990). "The Fable of the Keys". Journal of Law and Economics. 33: 1–26. doi:10.1086/467198. S2CID 14262869.
[edit]