Hardware/information/Varian/Shapiro: users with massive information encoded in a specialized format are vulnerable if and when they require new hardware or improved software to work with the data. In these situations, a key question is whether the information can easily be ported over to another system. You must ask yourself what are the costs of transferring the information and what aspects of the information would be lost in a transfer.
Taken from: Information Rules
Shapiro, Carl. Information Rules: A Strategic Guide to the Network Economy Harvard Business Review Press. Kindle Edition._____________Explanation of symbols: Roman numerals indicate the source, arabic numerals indicate the page number. The corresponding books are indicated on the right hand side. ((s)…): Comment by the sender of the contribution. The note [Author1]Vs[Author2] or [Author]Vs[term] is an addition from the Dictionary of Arguments. If a German edition is specified, the page numbers refer to this edition.
Hal R. Varian
Information Rules: A Strategic Guide to the Network Economy Cambridge, MA 1998