Home > Articles > Operating Systems, Server > Linux/UNIX/Open Source

  • Print
  • + Share This
This chapter is from the book

Deny Vendor Lock-in

In economics, vendor lock-in, also known as proprietary lock-in or more simply lock-in, is a situation in which a customer is dependent on a vendor for products and services and cannot move to another vendor without substantial costs, real and/or perceived. By the creation of these costs to the customer, lock-in favors the company (vendor) at the expense of the consumer. Lock-in costs create a barrier to entry in a market that, if great enough to result in an effective monopoly, might result in antitrust actions from the relevant authorities (the FTC in the United States).

Lock-in is often used in the computer industry to describe the effects of a lack of compatibility between different systems. Different companies or a single company might create different versions of the same system architecture that cannot interoperate. Manufacturers might design their products so that replacement parts or add-on enhancements must be purchased from the same manufacturer rather than from a third party (connector conspiracy). The purpose is to make it difficult for users to switch to competing systems. (Source: Wikipedia, the free encyclopedia.)

"Enraged" is probably the most appropriate description of CIO sentiments toward a certain ISV market leader’s attempts to limit choice through the practice of vendor lock-in. After a quick review of recent history, it’s not hard to conclude that a good deal of the intensity and momentum of the entire open source movement is a reactive backlash to the monopolistic and coercive methods of commercial software vendors.

Many ISVs, including Novell, work to ensure that customers return again and again for services and establish income flows through subscriptions and maintenance. But historically, others have consistently endeavored to limit choice to a single vendor with closed and proprietary solutions. As described in a recent eWeek article, "The economic value of ’open’ lies in the ability for users to walk away from onerous vendor pricing or licensing, the negotiating leverage they have, and the ability to avoid vendor-unique extensions."

The following list includes several of John Terpstra’s definitions of vendor lock-in. John has been part of the open source Samba project since its early days, and has methodically identified several restrictions that illustrate vendor lock-in scenarios:

  • Proprietary data storage formats that lack interoperability with other vendors’ software applications and/or that prevent the data from being exported from the vendor’s product to another vendor’s product

  • A vendor that has a restrictive partnership agreement to implement (that is, support) the product only on said partners’ platforms or systems

  • A vendor that requires customers to sign an agreement that mandates that support fees will continue to be paid even if use of that vendor’s product is discontinued within the contract period

  • A vendor that places license restrictions on what OS platform data from the vendor’s application may be placed

  • A vendor that demands contractual exclusivity, preventing all other competitors’ products from being onsite

  • A vendor that does not supply source code for its applications

  • A vendor that provides source code but fails to provide any essential component or software needed to rebuild a working binary application from that code

Open source provides fundamental freedom of choice. Sure, there are differences in distributions and features, but the fact that code is open and available means that in the majority of cases, good features and enhancements will eventually be merged with the mainstream code. Several elements of open source reduce the probability of vendor lock-in. These include open standards, application portability, and alternative selection:

  • Open standards—Support for open standards and being open standards-based can be two completely different things. Hundreds of examples exist in which a solution that accommodates a standard by conversion, tunneling, or mapping often breaks down when a new version arrives, or the "patch" must be flexed to conform to supposed standard requirements. Although standards themselves are sometimes fluid, there is more longevity, momentum, support, and compatibility when a solution is based on open standards. If an implemented solution is only open standards-compliant, any changes such as adding new components, upgrading applications, making new connections, and so on could require reimplementing the original solution at additional cost. If the support-solution doesn’t flex, you’re locked in.

    Internet mail is a good example. Microsoft Outlook and Exchange, although compliant with mail standards such as POP and IMAP, are not based on them. Therefore, integrating other standards-based mail systems in the event of a merger or acquisition takes a lot of work. They don’t seamlessly interoperate, and the net result is usually a complete conversion of one system to another. If you convert to Exchange, you’ve solved the immediate problem, but it will resurface again at the next reorganization.

    Open source solutions are, by and large, interoperable with little modification. It doesn’t matter if your email system is Sendmail or Postfix, one can be substituted for another. Any POP client works with both. There’s no pressure to get into a proprietary groove and stay with the commercially metered flow for everything to work together.

  • Portability—Open source means you’re not tied to a specific operating system or platform. The great majority of open source applications that have been written for Linux run on all distributions of Linux. They also run on most versions of Unix, including multiple versions of BSD. This extends to the majority of web applications and services as well. PHP, Perl, Python, Java, and the solutions that are built using them run virtually unchanged anywhere. There’s no requirement to develop to a specific platform and then port it to another platform while maintaining multiple versions of code.

    The Unix/Linux architecture design provides for performance without intricate hooks or hardwiring between the operating system and the application. The thought of Internet Explorer or Exchange running on Linux seems odd, but it shouldn’t be.

  • Substitutes—In a free-market economy, the availability of substitutes is responsible for a number of market factors, including competitive pricing and an increase in features. Vendor lock-in is achieved when there are no practical substitutes and prices are at a premium. As a source of substitutes for a widening selection of mass-market software solutions, open source is helping release the stranglehold of monolithic, end-to-end solution providers.

At this point in time, almost every common software solution needed for a typical business is available as an open source solution. Operating system, file sharing, firewall, web server, database, office productivity applications—multiple versions are available for each of these with no interlocking dependencies.

Here are the top vendor lock-in dangers:

  • Price—Call it monopolistic pricing, call it extortion. If you don’t have choice, you’re stuck paying whatever the vendor demands. With a subscription fee schedule and no competition, you don’t necessarily get enhancements, but you keep paying.

  • Adequate technology—Why be saddled with "good enough" solutions when excellent options are available? If you’re on a train, you eat what’s in the dining car, sleep where they put you, and go where the train is going. If you drive, you have your choice of restaurants, hotels, and destinations. Windows is good enough, but you get viruses, blue screens, and you have to rebuild it periodically. A Windows file and print server will support 50–100 users, but Linux on the same hardware will support thousands. Windows supports clustering, but Linux supports it powerfully and elegantly. An "adequate technology" strategy works for some organizations, but most will suffer long-term disadvantages by being locked in to only what a vendor provides.

  • Flexibility—Most organizations are NOT single-vendor shops. They are a heterogeneous mix of dissimilar systems, and monolithic vendor solutions don’t "work and play well with others." Common administration, holistic and comprehensive management, and seamless interoperability are not priorities for a vendor bent on eliminating all competing options.

Lest you think it hypocritical to point out the blemishes of vendor lock-in in the face of Novell’s 20-plus years as an independent software vendor, we must look at the facts. Novell’s first product was an effort to get Unix, CPM, and DOS machines to work together seamlessly with the capability to share back and forth. If you look at Novell’s history, practically every product produced has had the stamp of interoperability—getting heterogeneous, disparate systems to work together. This includes NetWare with its many clients, eDirectory with its user authentication synchronization, ZENworks with cross-platform management, and now products such as SUSE Linux, Open Enterprise Server, and iFolder. In a way, Novell’s success is a result of providing interoperability and connection services between disparate systems. With a focus on open source and Linux, the tradition of managing flexibility and choice continues.

  • + Share This
  • 🔖 Save To Your Account

InformIT Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from InformIT and its family of brands. I can unsubscribe at any time.

Overview


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information


To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites, develop new products and services, conduct educational research and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information


Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children


This site is not directed to children under the age of 13.

Marketing


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information


If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

Choice/Opt-out


Users can always make an informed choice as to whether they should proceed with certain services offered by InformIT. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.informit.com/u.aspx.

Sale of Personal Information


Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents


California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure


Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact


Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice


We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020