Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 224,728,503 papers from all fields of science
Search
Sign In
Create Free Account
Vendor lock-in
Known as:
Connector conspiracy
, File format lock-in
, Vendor lock in
Expand
In economics, vendor lock-in, also known as proprietary lock-in or customer lock-in, makes a customer dependent on a vendor for products and services…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
125 High Speed Mode
Anti-pattern
Backward compatibility
Bistability
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2017
Highly Cited
2017
DAC: Improving storage availability with Deduplication-Assisted Cloud-of-Clouds
Suzhen Wu
,
Kuan-Ching Li
,
Bo Mao
,
Minghong Liao
Future generations computer systems
2017
Corpus ID: 41364058
2012
2012
Competence resource specialization, causal ambiguity, and the creation and decay of competitiveness: the role of marketing strategy in new product performance and shareholder value
J. Hansen
,
Robert E. McDonald
,
Ronald K. Mitchell
2012
Corpus ID: 28161531
Marketing strategists should create, maintain, and arrest the decay of causally ambiguous resource competences that lead to…
Expand
Highly Cited
2011
Highly Cited
2011
Exploring the Development of Micro-apps: A Case Study on the BlackBerry and Android Platforms
Mark D. Syer
,
Bram Adams
,
Ying Zou
,
A. Hassan
IEEE 11th International Working Conference on…
2011
Corpus ID: 534151
The recent meteoric rise in the use of smart phones and other mobile devices has led to a new class of applications, i.e., micro…
Expand
2010
2010
Game-changing China : lessons from China about disruptive low carbon innovation.
D. Tyfield
,
Jun-Na Jin
,
T. Rooker
2010
Corpus ID: 14025431
Big hydro, big solar photovoltaic (PV) and big wind - these are the usual focus of accounts of low carbon technologies in China…
Expand
2009
2009
Fault-Tolerant Routing Algorithm for Network on Chip without Virtual Channels
Y. Fukushima
,
Masaru Fukushi
,
S. Horiguchi
24th IEEE International Symposium on Defect and…
2009
Corpus ID: 604078
Constructing 2D mesh topology network on chips (NoCs) without using virtual channels becomes attractive approach to building…
Expand
2008
2008
IDENTIFYING REAL OPTIONS TO IMPROVE THE DESIGN OF ENGINEERING SYSTEMS
R. Neufville
,
O. Weck
,
Jijun Lin
,
S. Scholtes
2008
Corpus ID: 14779235
This chapter is part of the developing literature on the use of real options in the design and development of major projects…
Expand
2006
2006
Multi-mode vortex-induced vibrations of a flexible circular cylinder
Huera Huarte
,
Francisco Javier.
2006
Corpus ID: 121855147
Vortex-Induced Vibration (VIV) is a key issue in deep water riser design. Water depths up to 3000 m are found in typical oil…
Expand
2004
2004
Down the Wrong Path : Path Dependence , Increasing Returns , and Historical
H. Schwartz
2004
Corpus ID: 43822271
Does the concept of path dependence provide a plausible theoretical framework for historical institutionalism? Practitioners of…
Expand
Highly Cited
1998
Highly Cited
1998
Elastic properties of the cell wall of Magnetospirillum gryphiswaldense investigated by atomic force microscopy
Markus Arnoldi
,
C. M. Kacher
,
Edmund Bäuerlein
,
M. Radmacher
,
Monika Fritz
1998
Corpus ID: 59467381
Gram-negative magnetic bacteria of the species Magnetospirillum gryphiswaldense were investigated by atomic force microscopy (AFM…
Expand
Review
1989
Review
1989
Diffraction studies of rare earth metals and superlattices
J. Bohr
,
D. Gibbs
,
+7 authors
J. Jensen
1989
Corpus ID: 54609416
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE