Another possible solution to this problem is to use NAT traversal techniques using protocols such as STUN or ICE, or proprietary approaches in a session border controller.
Every criticism he makes of Adobe's proprietary approach applies equally to Apple, and every benefit attributed to the App Store can be had without it being a mandatory proprietary arrangement.
There are a variety of proprietary approaches available.
However this Bluetooth based approach is the best protected solution compared to other proprietary approaches without means comparable to mobile phone SIM locking ot to Bluetooth link protection.
But in seeking to paint its opponent as a right-wing tycoon whose assets represent a towering conflict of interest, the government is revealing its own highly proprietary approach to television.
Mr. Temirkanov, above, has extended that expertise with his own proprietary approach to the Russian repertory, particularly the music of Shostakovich.
To ensure the original company alone receives the profits from the sales of consumable, they use a proprietary approach to exclude other companies.
"We have a proprietary approach to cleaning products, and we want to protect our research and development," said Monica Nassif, the company's founder.
Building on that experience, Data General has redesigned its computer line, basing it on Unix, an industry standard, rather than taking a proprietary approach.
But he said it was simply in keeping with the culture of computer hackers - in the original, positive sense of "hacker" - idealistic techies like himself, who have long been at war with Microsoft's proprietary approach to computing.