Category Archives: Proprietary Protocols

Vendor lock-in and user lock-out. How to control and, thereby, destroy your market.

Closed Source, No Exceptions

The first few days of the school year are always a rush of working out schedules, buying books, buying supplies, and fielding the administrivia associated with the education system.  Annoying and difficult, particularly when there are multiple schools involved, but … Continue reading

Posted in Digital Politics, Proprietary Protocols | Tagged | 1 Comment