tech lock¶
- mahy people waste their life working for a computer
- they were designed to do work for you not make you do it
- learn to program and stay in the command line when possible and you will live a better life
- there is no excuse now to not learn to make a computer work for you
- some solutions & sites about tech lock in
- life is short don't waste your time on nonsense like tech lock in
Website Link | Name | Description |
---|---|---|
killedbygoogle.com | Killed by Google | Catalogs Google products and services discontinued over the years. |
mcbroken.com | McBroken | Tracks the status of McDonald's ice cream machines globally. |
right-to-repair.org | Right to Repair | Advocates for the right to repair electronics and machinery, including John Deere tractors. |
fixmystreet.com | Fix My Street | Enables citizens to report local street issues to authorities in the UK. |
repair.org | Repair.org | Organizes efforts to promote Right to Repair legislation globally. |
monopolies.dev | Monopolies.dev | Highlights tech monopolies and their restrictive practices. |
alternativeto.net | AlternativeTo | Provides user-recommended alternatives to popular apps and software. |
openbenches.org | Open Benches | Crowdsources the locations and details of public memorial benches. |
wikileaks.org | WikiLeaks | Publishes classified and censored information provided by whistleblowers. |
haveibeenpwned.com | Have I Been Pwned | Lets users check if their data has been part of a security breach. |
rutracker.org | RuTracker | Russian tracker for digital files often locked behind paywalls or inaccessible. |
nosfer.app | NOSFER | Decentralized app catalog countering centralized app stores like Apple's or Google's. |
letsencrypt.org | Let’s Encrypt | Provides free SSL/TLS certificates to secure websites. |
archive.org | Internet Archive | Digital library offering free access to billions of books, movies, software, and websites. |
degoogle.jmoore.dev | Degoogle Yourself | Resources for reducing reliance on Google services. |
themarkup.org | The Markup | Investigates technology's influence on society. |
glassdoor.com | Glassdoor | Allows employees to anonymously review companies and their work environments. |
publicdomainreview.org | Public Domain Review | Showcases works that have entered the public domain. |
goodreads.com | Goodreads | A platform to track, share, and review books outside of proprietary bookstores. |
tinkercad.com | Tinkercad | Advocates open design by providing free 3D modeling tools for creators. |
Website | Year Created | Tech Lock-In Cause |
---|---|---|
2004 | Network effects and social graph lock-in. | |
2006 | Dependency on unique, centralized short-form social communication. | |
YouTube | 2005 | Content ecosystem requiring its hosting and distribution infrastructure. |
2010 | Network effects in photo-sharing and integrated mobile experiences. | |
Snapchat | 2011 | Ephemeral messaging with locked-in user base via unique filters/features. |
TikTok | 2016 | Algorithm-driven content ecosystem unique to its app experience. |
2009 | Messaging lock-in via wide adoption and encryption protocols. | |
Spotify | 2006 | Music library access tied to proprietary streaming agreements. |
iCloud | 2011 | Apple ecosystem lock-in through seamless device integration. |
Google Drive | 2012 | File storage and sharing tied to Google account integration. |
Zoom | 2011 | Video conferencing dominance through specific enterprise integrations. |
2003 | Professional networking reliant on its entrenched business profiles. | |
GitHub | 2008 | Development collaboration based on proprietary Git hosting services. |
AWS Marketplace | 2012 | Cloud services tethering businesses to Amazon ecosystem. |
Salesforce | 1999 (relevant) | CRM lock-in through proprietary APIs and third-party app reliance. |
WordPress | 2003 | CMS dominance due to plugin ecosystem and hosting lock-in. |
Wix | 2006 | Website building tied to its hosted infrastructure. |
Netflix | 2007 | Streaming lock-in via exclusive licensing agreements and original content. |
Shopify | 2006 | E-commerce lock-in through app ecosystem and integrated payments. |
Slack | 2013 | Team communication reliant on proprietary integrations and APIs. |
Event | Year | Details |
---|---|---|
Microsoft blocked Office 365 competitors with restrictive contracts | 2019 | Made software harder to use on non-Azure platforms, driving cloud lock-in. 【5】【6】 |
European Union fines for anticompetitive cloud practices | 2020 | EU accused Microsoft of unfair licensing to hinder competitors like AWS. 【5】 |
VA forced into Azure through restrictive Microsoft licensing | 2021 | Veterans Affairs spent $1.6B without meaningful competition due to vendor lock-in. 【7】 |
Cloud exit fees soared for leaving Azure | 2022 | Microsoft imposed hefty penalties, making it costly to leave its ecosystem. 【6】 |
Teams bundled with Office, stifling Slack competition | 2020 | Microsoft faced investigations for unfairly bundling its software. 【5】【7】 |
Surface Hub exclusive to Teams | 2018 | Hardware only compatible with Microsoft services, excluding other conferencing tools. 【5】 |
Windows preloads limited user choice | Ongoing | OEMs locked into shipping Windows by default, limiting Linux or other OS options. 【6】 |
UK government Azure exclusivity | 2023 | Contract terms limited options for using non-Microsoft services, affecting public funds. 【6】 |
Azure AD enforced for Microsoft apps | 2022 | Popular apps required Azure for authentication, marginalizing alternatives. 【5】 |
Skype deprecation to push Teams | 2020 | Microsoft sunset Skype for Business to drive Teams adoption. 【6】 |
Microsoft pushed DirectX API changes | 2017 | Favored its gaming ecosystem, making alternatives like OpenGL less viable. 【6】 |
OneDrive made incompatible with third-party file managers | 2021 | Limited user options to integrate cloud services. 【5】 |
Internet Explorer legacy dependencies enforced | Ongoing | Many organizations locked into IE-compatible intranet apps. 【6】 |
Microsoft cloud data export fees | Ongoing | High costs penalized customers moving data to competing clouds. 【6】 |
Windows 11 TPM requirements | 2021 | Hardware locks excluded non-compliant machines, pushing new purchases. 【5】 |
Azure discounts conditional on full commitment | Ongoing | Conditional pricing favored long-term lock-in over flexibility. 【6】 |
Cortana’s deep Windows integration | 2019 | Forced adoption as default voice assistant in Windows builds. 【6】 |
Office perpetual licensing phased out | 2021 | Drove users to Office 365 subscriptions instead of one-time purchases. 【7】 |
Windows Server forced renewal terms | Ongoing | Limited use outside Azure, driving continued reliance on Microsoft services. 【5】【7】 |
DirectStorage API exclusivity | 2022 | Tied cutting-edge game performance to Windows, sidelining Linux or macOS. 【6】 |
# | Event | Description | Year |
---|---|---|---|
1 | Windows XP End-of-Life | Microsoft ended support for Windows XP, leaving organizations locked into outdated, insecure systems. | 2014 |
2 | Adobe Flash End-of-Life | Adobe phased out Flash, forcing many web developers to transition hastily to newer standards. | 2020 |
3 | Internet Explorer Dependency | Organizations remained locked into using outdated Internet Explorer versions for legacy applications. | 2010s |
4 | Printer DRM | Printer manufacturers embedded DRM in ink cartridges, locking users into buying overpriced, brand-specific replacements. | Ongoing |
5 | Tesla Charging Standard | Tesla used proprietary charging plugs, causing difficulties for owners of other EV brands until wider adapter support emerged. | 2010s |
6 | Apple Lightning Cables | Apple's use of Lightning cables for iPhones forced consumers into buying expensive proprietary chargers. | 2012+ |
7 | Amazon Kindle Format Lock-in | Kindle e-readers supported proprietary formats, locking users into Amazon's ecosystem for books. | Ongoing |
8 | Digital Cameras with Proprietary Formats | Some camera manufacturers used proprietary RAW formats, complicating workflows for photographers. | Ongoing |
9 | Google Stadia's Failure | Google's gaming service lacked support for transferring purchases to other platforms, leaving users stranded upon shutdown. | 2022 |
10 | Proprietary IoT Platforms | Smart home devices locked users into specific ecosystems, such as Amazon Alexa or Google Home. | Ongoing |
11 | Microsoft Office File Format Wars | Continued reliance on proprietary DOCX and XLSX formats hampered interoperability with free alternatives like LibreOffice. | Ongoing |
12 | Epic vs. Steam Ecosystem Wars | Gamers faced fragmentation due to exclusivity deals locking games into Epic or Steam platforms. | Ongoing |
13 | TikTok Algorithms | Content creators became locked into TikTok due to its unique algorithm favoring specific formats and behaviors. | Ongoing |
14 | Ride-Share App Exclusivity | Uber and Lyft locked drivers and riders into specific ecosystems through pricing models and app exclusivity. | 2010s |
15 | Social Media Account Recovery Issues | Facebook and Google users struggled to recover accounts due to dependency on their platforms' unique processes. | Ongoing |
16 | Broadband Monopoly | ISPs in the U.S. often monopolized regions, forcing customers into limited service options without alternatives. | Ongoing |
17 | Crypto Wallet Lock-in | Users lost funds due to reliance on specific, incompatible cryptocurrency wallets. | Ongoing |
18 | Streaming Exclusivity Wars | Platforms like Netflix, Disney+, and HBO Max locked content behind exclusive paywalls, fragmenting entertainment access. | 2010s+ |
19 | Tesla Autopilot Updates | Tesla customers were locked into Tesla's ecosystem to access critical software updates for self-driving features. | Ongoing |
20 | Zoom's Videoconferencing Domination | Companies became dependent on Zoom during the pandemic, with limited integration across other platforms. | 2020 |
# | Event | Description |
---|---|---|
1 | QWERTY Keyboard | The QWERTY layout was designed to prevent typewriter jams, not for efficiency. |
2 | VHS vs Betamax | VHS won despite Betamax being technically superior, due to marketing and licensing. |
3 | HD-DVD vs Blu-Ray | HD-DVD was technically better, but Blu-Ray won due to Sony's dominance and exclusive content deals. |
4 | Windows Vista | Despite its many flaws and poor performance, Microsoft pushed it for years, locking users into bad software. |
5 | Apple's 30-pin Dock Connector | Apple forced users to adopt a proprietary connector, only to replace it with Lightning years later. |
6 | Sony's MiniDisc | Sony’s proprietary MiniDisc format was locked into their ecosystem, but was eclipsed by MP3 players. |
7 | Google Glass | Early adoption of wearable tech led to failure due to privacy concerns and impractical design. |
8 | The Concorde Supersonic Jet | A technological marvel that became financially unsustainable, locking in expensive air travel. |
9 | Microsoft Internet Explorer | Microsoft included Internet Explorer as the default browser on Windows, forcing users into a subpar browser. |
12 | Apple's "Antennagate" | Apple's iPhone 4 antenna design was flawed, locking users into defective products. |
13 | LaserDisc | A high-quality video format that failed to gain traction, locked in by high cost and poor convenience. |
14 | Betamax's Blockbuster Agreement | Blockbuster's exclusive deal with VHS over Betamax kept VHS the dominant format, even though Betamax was superior. |
15 | Windows XP's continued dominance | Despite many technical advancements in the 2000s, Windows XP stayed locked in as the dominant OS for too long, even when outdated. |
16 | The Great Network Effect of MySpace | MySpace's dominance was locked in by early social network usage patterns, preventing the platform from improving. |
17 | IBM PC Jr. | IBM's attempt to enter the personal computer market was doomed by its own proprietary technology, and poor design decisions. |
18 | The Gold Standard | A rigid monetary system that locked economies into a limited supply of gold, restricting growth and flexibility. |
19 | Beta Testing in Early Internet Era | Tech companies relied on their early users to test unstable software, often locking them into broken systems. |
20 | The Tower of Babel (Language Lock-in) | The construction of the Tower of Babel led to the "lock-in" of human communication through language barriers. |
This table highlights 20 real historical events that exhibit how technology lock-in, bad design choices, or poor execution led to failures or long-lasting consequences in tech history.
childish patents¶
- adults fight over things using patents
- overall it slows down progress for humanity
Patent Name/Description | Patent Number | Why It's Childish |
---|---|---|
"Interactive Virtual Pet" | U.S. Patent 6,491,607 | A patent for a virtual pet on a computer, reminiscent of Tamagotchi. |
"Method of Swinging on a Swing" | U.S. Patent 6,368,227 | An algorithm for optimizing the motion of swinging, making playtime "efficient." |
"Digital Kisses" | U.S. Patent 7,089,952 | A system to send virtual kisses through a mobile device—romantic or childish? |
"Toy Simulation Device" | U.S. Patent 6,429,846 | A software simulation of toy functions, effectively turning play into code. |
"Storyline Creation for Interactive Media" | U.S. Patent 5,935,223 | A patent for creating choose-your-own-adventure stories in software. |
"Apple Patenting Round Corners" | U.S. Patent D670,286 | Apple's famous design patent for devices with rounded corners. |
"Mood Detection Through Emojis" | U.S. Patent 9,235,989 | Detecting user mood through emoji usage—a playful take on emotions in text. |
"Digital Sandbox for Kids" | U.S. Patent 8,910,789 | Software that simulates playing in a sandbox, bringing physical play to digital. |
"Virtual Bubble Wrap" | U.S. Patent 6,377,191 | A software-based bubble wrap simulator for popping virtual bubbles. |
"Virtual Paper Airplane Game" | U.S. Patent 7,756,755 | Simulating the throwing of paper airplanes in a virtual environment. |
certifcation¶
- for a while there were computer certificates you could buy
- they were notorious for having test questions with multiple "right" answers
- a way that works and a "
way" that you would not know unless you paid for special proprietary test preparation classes or books or even subscription based training? - this also happens in tech interviews, there are sites and software corporations use to exclude people unless they know the latest questions that you only see if you pay various tech training interview prep sites
requiring additional purchases¶
- disabling a feaature that is useful & licening pieces of products
more examples¶
- medical software that requires expensive hardware or software
- gets cut when executives cut budgets
- dies or is killed intentionally by the provider
- remember political parties recieve billions every year from corporations
- government involvement often forces tech lock in in multiple industries
- legislation gets passed requiring purchases or accreditation
- software i have seen with updates with breaking changes
- az cli
- azure keyvault library
- oracle db
- enforced specific programming language requirements
- some software companies are owned and ran by non technical people
- they buy software just to kill it to monopolize or otherwise dominate an industry
solutions¶
- the easiest thing is to stay in the command line and stick with a few programming languages
- linus torvalds built the kernel and git all he has installed on his laptop is a terminal and a browser
- this site is packed with solutions
- chat bots exist now
- so there is no excuse or reason not to learn to program yourself
- programmable keyboards: you should use this because its stupid fast
- vim: you should use this because its stupid fast
- markdown: you should use this because its stupid fast
- they are all easy to learn
- markdown: easily be converted to pdf html
- markdown: easily converted to slideshows flash cards
- mkdocs
- python click
- python cookiecutter
- excel: open office learn a db csv or python pandas
- sharepoint: mkdocs
- task management: todocli
- linux
other rackets¶
- this is a story in itself
- a racket is when a group creates a problem to sell a fake solution
- this is how the mafia would operate
- mob tells thieves what businesses they can rob
- theives give the mob their cut
- the mob comes in demands money for "protection"
- this poison has infected every nation and global corporation
- pollution is particularly profitable
- think about this: anytime there is a problem and things went wrong, something broke, lost luggage, disasters, medical problems, food shortages, any scarcity or any inconvenience people fork out money to get rid of, often has a racket surrounding it
- why is this? when anything becomes more expensive that generates profit, someone collects more when something is expensive
- example: overall tax collection, everything is taxed so when any process becomes more expensive then more tax is collected
- example: global investors, take lost luggage, i recently had this happen and it seems to be a growing problem, an entire plane full of luggage had to be shipped overnight, global investors invest accross the board so they profit any time something costs more overall so they intentionally or unintentionally create problems
- example: non profits which are often hospitals who grandfathered in non profit status due to originally being religious charity organizations will spend money for no other reason than to perpetuate their budget otherwise a given departments annual budget drops
use-it-or-lose-it budgeting¶
Explanation¶
Organizations, particularly those with annual budgets, may have funds that do not roll over to the next fiscal year. If the allocated budget is not fully spent, the unspent amount might lead to reduced allocations in the following year. To avoid this, departments or teams often rush to spend leftover funds on unnecessary items or services before the fiscal year ends, even if the expenses aren't essential.
Example Contexts¶
- Government and Public Sector: Departments might spend on office supplies, technology upgrades, or unneeded contracts to avoid future budget cuts.
- Corporate Settings: Teams may purchase equipment or organize events late in the year to use their remaining funds.
This behavior can lead to inefficiency and waste, as the spending is driven by budgetary incentives rather than organizational needs.
planned obsolescence¶
Explanation¶
Planned obsolescence involves designing products with a limited useful life or ensuring that certain components are incompatible with future models. This strategy encourages consumers to purchase new products more frequently, boosting sales but often frustrating customers and generating more waste.
Types of Planned Obsolescence¶
- Technical Incompatibility: Designing parts or accessories (like chargers or components) so they won't work with newer versions of the product.
- Example: Changing connector designs to force consumers to buy new accessories.
- Perceived Obsolescence: Updating designs or features to make older models appear outdated, even if they're still functional.
- Example: Cosmetic changes that encourage style-conscious consumers to upgrade.
- Limited Repairability: Making products hard or expensive to repair, pushing customers to buy replacements instead.
- Example: Using proprietary screws or sealing components to prevent easy fixes.
Planned obsolescence is often criticized for being anti-consumer and environmentally harmful, leading to movements advocating for "right to repair" and sustainable design practices.
perverse incentives or profit-driven problem perpetuation¶
Explanation¶
Perverse incentives occur when organizations or industries have financial motivations to maintain or exacerbate a problem rather than solve it. Solving the problem would eliminate the source of ongoing profits, so the incentive structure discourages resolution.
Examples¶
- Healthcare: A focus on treatments rather than cures because chronic illnesses generate recurring revenue.
- Planned Obsolescence: Designing products to wear out prematurely so customers must buy replacements.
- Environmental Issues: Companies profiting from pollution-heavy practices may resist adopting cleaner technologies, as addressing the problem could reduce profits.
- Subscription Models: Offering temporary fixes or partial solutions to problems (e.g., software bugs or feature limitations) to encourage recurring payments.
Alternate Terms¶
- Conflict of Interest: When profit motives conflict with the ethical obligation to solve the problem.
- Rent-Seeking Behavior: When companies profit without adding value, often by exploiting a systemic issue.
- Problem Monetization: Turning ongoing issues into revenue streams without addressing root causes.
These terms emphasize the economic and ethical challenges of such behavior.
regulatory capture or policy exclusion¶
- highlights different aspects of how government regulations can inadvertently perpetuate problems or exclude certain groups.
Key Terms and Explanations¶
- Regulatory Capture
- What it means: When regulatory agencies are influenced or dominated by the industries or entities they are supposed to regulate, leading to rules that benefit specific groups at the expense of the public.
-
Example: Regulations that create high barriers to entry, favoring large, established companies while excluding smaller competitors or new entrants.
-
Bureaucratic Inertia
- What it means: The tendency of bureaucracies to resist change and stick with existing policies or processes, even if they are ineffective or harmful.
-
Example: Outdated licensing laws that prevent skilled workers from entering certain professions.
-
Policy Exclusion
- What it means: When regulations unintentionally or intentionally exclude certain populations or create unequal access to resources.
-
Example: Zoning laws that limit affordable housing, excluding low-income residents from certain areas.
-
Unintended Consequences
- What it means: When well-intentioned regulations result in outcomes that exacerbate the original problem or create new ones.
-
Example: Overly strict environmental regulations that drive businesses to relocate to less-regulated regions, increasing global emissions.
-
Legal Pluralism
- What it means: When overlapping or conflicting regulations create confusion and inefficiencies, making it difficult for individuals or organizations to comply or benefit.
- Example: Contradictory local and federal policies on cannabis use that exclude certain groups from participating in legal markets.
These terms reflect how regulations can sometimes serve entrenched interests, become outdated, or fail to address systemic inequities.
disaster capitalism or profiteering from crises¶
- examples: insurance fake food proprietary hardware or software
Explanation¶
- Disaster Capitalism: Coined by author Naomi Klein, this term refers to the practice of capitalizing on crises (natural disasters, economic crashes, or pandemics) to push through policies or business strategies that increase profits, often at the expense of those affected.
- Profiteering from Crises: Refers to deriving excessive or opportunistic profits from disastrous events, often seen as ethically questionable.
Why It's Relevant¶
In the case of a CEO excited about disasters increasing insurance policy sales:
- Natural disasters lead to heightened awareness of risk, prompting more people to purchase insurance.
- While legitimate business operations might expand during such times, celebrating the disasters themselves can reveal a prioritization of profit over empathy or social responsibility.
Related Terms¶
- Moral Hazard: When a company benefits from a risky or harmful situation without bearing the consequences (e.g., benefiting from increased risk awareness without addressing systemic risks).
- Crisis Exploitation: Using a crisis as an opportunity to boost profits or implement strategies that wouldn't be accepted otherwise.
- Ethical Blindness: Failing to consider the ethical implications of benefiting from others' misfortunes.
data colonialism or digital colonialism¶
- captch was and still is using the public to train ocr character recognition and audio recognition and image recognition
- chat bots are colonizing users
- any software that reports home
- vscode telemetry
- all of googles products the browser
- operating systems
Explanation¶
- Data Colonialism: A concept that draws parallels between historical colonialism and the modern extraction of data. In this context, users are seen as a resource to be "mined" for data, which is then used to train and improve proprietary software (e.g., AI models), often without fair compensation or consent.
- Digital Colonialism: Emphasizes the power imbalance where corporations dominate users and their digital environments, using them to fuel profit-driven algorithms while offering limited transparency or control.
Characteristics¶
- Exploitation of User Data:
- Users provide data (intentionally or unintentionally) that is used to train machine learning models, often without adequate compensation.
-
Example: Social media companies using uploaded photos to improve facial recognition algorithms.
-
Asymmetrical Power Dynamics:
- Users lack meaningful control over how their data is used or the ability to opt out.
-
Example: Free software or services that monetize user activity instead of offering fair trade-offs.
-
Opaque Consent Mechanisms:
- Terms of service agreements often bury data usage details, making it difficult for users to fully understand their participation.
- Example: AI chatbots improving their language models by analyzing user conversations without explicit consent.
Related Terms¶
- Surveillance Capitalism: The commodification of personal data for profit, often without users' full understanding or agreement.
- Crowdsourced Labor: When users unwittingly provide unpaid labor by interacting with software (e.g., solving CAPTCHAs to train AI models).
- Tech Colonialism: A broader term referring to global inequalities in how technology is developed, deployed, and exploited.
These terms critique the extractive practices of modern software corporations and highlight the need for ethical frameworks in data usage.