Abstract:
A generic way of publishing globally available functionality that can be shared across applications. Utilizing an Installer Registry, an Installer, Descriptors and a Publish Component Table, related components can be retrieved using an qualifier. A request for a listing of related components, which includes a qualifier, is received from an application. The installer retrieves all the related components, matching the qualifier, from the Publish Component Table. The installer then retrieves the features associated with the components and presents the list of components to the application. The application then selects a specific component and the installer then determines the product associated with the selected component by using the feature and component information retrieved from the Publish Component Table. Once the product information is retrieved, the present invention searches the Installer Registry, using the product, feature and component information as a token, and returns a keypath for that token. If the keypath does not exist, the Installer installs the feature and associated component and then returns the keypath of the installed component.
Abstract:
A method and system for advertising software applications by placing application shortcuts on a start menu or desktop and writing entries to the system registry enabling file extension-based activation and Class ID-based activation of those applications, thereby advertising the applications as available even if not installed. In network settings, advertised applications may be assigned to a user via a policy. To this end, an advertising script is stored with a policy associated with computer or user policy recipients, and the advertising script includes assigned application identifier information. One or more scripts are applied, such as to a user at logon or a machine at re-boot. The scripts are processed by an installer mechanism to advertise the application. Applications advertised as available to the user prior to any installation thereof are installed by an installer as needed upon user activation. Other applications may be published, whereby they do not appear to be available, but the installer mechanism looks for them in a centralized network store when indirectly activated such as via file extension-based activation and Class ID-based activation. If found, the installer mechanism installs the published application and essentially changes it to an assigned application.
Abstract:
A method and mechanism for automatically installing software implementations such as applications and COM classes as they are needed from an external source. When a software implementation is needed, the mechanism first looks to the local system (e.g., registry) for that software implementation, and if found, returns the information such as a local path needed to use the software implementation. If the implementation is not found, the mechanism looks to another source, such as a CD-ROM or a centralized class store of a network, to locate the needed implementation. When located, the implementation is downloaded and locally installed from the source, and a local path is returned in a manner that is essentially transparent to the user. Software implementations such as application products may be divided into features and components to improve on-demand installation thereof.
Abstract:
Aspects of the subject matter described herein relate to backup up data. In aspects, a backup target determines a degree to which a data set included on the backup target is not backed up on a backup facility. The degree can represent more than just that the data set is completely backed up or is not backed up at all. If the degree satisfies a condition, the backup target utilizes information derived from a backup history of one or more attempted or successfully completed backup sessions between the backup target and the backup facility to determine whether to provide a notification regarding backup state. The backup target also may send the degree and other backup information to a backup facility which may use this information in determining a backup scheme to employ with the backup target.
Abstract:
Methods, systems, and media are provided for using a calculator application to calculate answer values by evaluating formulas based on user input. The calculator application is hosted by an operating system and includes a template store containing templates that define user interface elements such as input fields associated with variables. The templates also have embodied therein formulae that define relationships between the variables. A user-interface, generated from information in a template, is provided to a user that includes input fields for receiving values to be associated with variables. Answer values are calculated by evaluating the formulae based on user input.
Abstract:
Aspects of the subject matter described herein relate to backup up data. In aspects, a backup target determines a degree to which a data set included on the backup target is not backed up on a backup facility. The degree can represent more than just that the data set is completely backed up or is not backed up at all. If the degree satisfies a condition, the backup target utilizes information derived from a backup history of one or more attempted or successfully completed backup sessions between the backup target and the backup facility to determine whether to provide a notification regarding backup state. The backup target also may send the degree and other backup information to a backup facility which may use this information in determining a backup scheme to employ with the backup target.
Abstract:
A system and method for providing the ability to repair an installed application program if a resource needed by the application program becomes inadvertently deleted or otherwise unavailable to the application program. Briefly described, the present invention makes possible a system for verifying the existence of a resource needed to support a feature of the application program. The system may respond to a request from the application program to make use of the resource by first verifying the existence of the resource at an expected location. If the resource does not exist at the expected location, rather than returning an error to the application program, the system initiates an installation procedure for restoring the missing resource without interrupting the normal operation of the application program.