Skip to search formSkip to main contentSkip to account menu

Vendor lock-in

Known as: Connector conspiracy, File format lock-in, Vendor lock in 
In economics, vendor lock-in, also known as proprietary lock-in or customer lock-in, makes a customer dependent on a vendor for products and services… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2012
2012
Marketing strategists should create, maintain, and arrest the decay of causally ambiguous resource competences that lead to… 
Highly Cited
2011
Highly Cited
2011
The recent meteoric rise in the use of smart phones and other mobile devices has led to a new class of applications, i.e., micro… 
2010
2010
Big hydro, big solar photovoltaic (PV) and big wind - these are the usual focus of accounts of low carbon technologies in China… 
2009
2009
Constructing 2D mesh topology network on chips (NoCs) without using virtual channels becomes attractive approach to building… 
2008
2008
This chapter is part of the developing literature on the use of real options in the design and development of major projects… 
2006
2006
Vortex-Induced Vibration (VIV) is a key issue in deep water riser design. Water depths up to 3000 m are found in typical oil… 
2004
2004
Does the concept of path dependence provide a plausible theoretical framework for historical institutionalism? Practitioners of… 
Highly Cited
1998
Highly Cited
1998
Gram-negative magnetic bacteria of the species Magnetospirillum gryphiswaldense were investigated by atomic force microscopy (AFM… 
Review
1989