Ensuring access to long-term stored electronic documents
First Claim
Patent Images
1. A non-transitory computer readable storage device, tangibly embodying a program of instructions executable by the computer for ensuring access to long- term stored electronic documents, the program of instructions, when executing, performing the following steps:
- tracking, for each of a plurality of file types, a count of a number of installed software programs that are capable of accessing each of the file types;
storing data indicative of the tracked number of installed software programs, the stored data including for each of the plurality of file types the count of the number of installed software programs that are capable of accessing each of the file types;
determining when a user attempts to uninstall one of the tracked installed software programs; and
informing the user, based at least in part upon the stored data including for each of the plurality of file types the count of the number of installed software programs that are capable of accessing each of the file types and the determination of the attempt to uninstall, of at least one consequence of the attempted uninstall;
wherein the program of instructions, when executing, further performs the step of providing to the user an indication of a source of assistance in accessing a given file type; and
wherein the program of instructions, when executing, further performs the step of recording historical data regarding assistance provided; and
wherein the program of instructions, when executing, further performs the step of providing to the user a GUI dashboard;
wherein the GUI dashboard is based at least in part upon the stored data including for each of the plurality of file types the count of the number of installed software programs that are capable of accessing each of the file types; and
wherein the GUI dashboard indicates into which one of a plurality of zones each of the plurality of file types belongs based upon the count of the number of installed software programs that are capable of accessing each of the file types; and
the plurality of zones comprises a first zone, a second zone and a third zone;
the first zone is a comfort zone having, relative to the second and third zones, a highest count of the number of installed software programs that are capable of accessing a given file type;
the second zone is a risk zone having, relative to the first and third zones, a middle count of the number of installed software programs that are capable of accessing the given file type; and
the third zone is a danger zone having, relative to the first and second zones, a lowest count of the number of installed software programs that are capable of accessing the given file type.
1 Assignment
0 Petitions
Accused Products
Abstract
Mechanisms are provided for ensuring access to long-term stored electronic documents. In one example, one or more systems may provide for automatically ensuring access to long-term stored electronic documents. In another example, one or more algorithms may provide for automatically ensuring access to long-term stored electronic documents.
32 Citations
18 Claims
-
1. A non-transitory computer readable storage device, tangibly embodying a program of instructions executable by the computer for ensuring access to long- term stored electronic documents, the program of instructions, when executing, performing the following steps:
-
tracking, for each of a plurality of file types, a count of a number of installed software programs that are capable of accessing each of the file types; storing data indicative of the tracked number of installed software programs, the stored data including for each of the plurality of file types the count of the number of installed software programs that are capable of accessing each of the file types; determining when a user attempts to uninstall one of the tracked installed software programs; and informing the user, based at least in part upon the stored data including for each of the plurality of file types the count of the number of installed software programs that are capable of accessing each of the file types and the determination of the attempt to uninstall, of at least one consequence of the attempted uninstall; wherein the program of instructions, when executing, further performs the step of providing to the user an indication of a source of assistance in accessing a given file type; and wherein the program of instructions, when executing, further performs the step of recording historical data regarding assistance provided; and wherein the program of instructions, when executing, further performs the step of providing to the user a GUI dashboard; wherein the GUI dashboard is based at least in part upon the stored data including for each of the plurality of file types the count of the number of installed software programs that are capable of accessing each of the file types; and wherein the GUI dashboard indicates into which one of a plurality of zones each of the plurality of file types belongs based upon the count of the number of installed software programs that are capable of accessing each of the file types; and the plurality of zones comprises a first zone, a second zone and a third zone; the first zone is a comfort zone having, relative to the second and third zones, a highest count of the number of installed software programs that are capable of accessing a given file type; the second zone is a risk zone having, relative to the first and third zones, a middle count of the number of installed software programs that are capable of accessing the given file type; and the third zone is a danger zone having, relative to the first and second zones, a lowest count of the number of installed software programs that are capable of accessing the given file type. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer-implemented system for ensuring access to long-term stored electronic documents, the system comprising:
-
a processor; and a memory storing computer-readable instructions that, when executed by the processor, implement; a tracking element configured to track, for each of a plurality of file types, a count of a number of installed software programs that are capable of accessing each of the file types; a storing element configured to store data indicative of the tracked number of installed software programs, the stored data including for each of the plurality of file types the count of the number of installed software programs that are capable of accessing each of the file types; a determining element configured to determine when a user attempts to uninstall one of the tracked installed software programs; and an informing element configured to inform the user, based at least in part upon the stored data including for each of the plurality of file types the count of the number of installed software programs that are capable of accessing each of the file types and the determination of the attempt to uninstall, of at least one consequence of the attempted uninstall; wherein the computer-readable instructions, when executed by the processor, further implement a providing element configured to provide to the user an indication of a source of assistance in accessing a given file type; wherein the computer-readable instructions, when executed by the processor, further implement a recording element configured to record historical data regarding assistance provided; wherein the computer-readable instructions, when executed by the processor, further implement a providing element configured to provide to the user a GUI dashboard; wherein the GUI dashboard is based at least in part upon the stored data including for each of the plurality of file types the count of the number of installed software programs that are capable of accessing each of the file types; and wherein the GUI dashboard indicates into which one of a plurality of zones each of the plurality of file types belongs based upon the count of the number of installed software programs that are capable of accessing each of the file types; and the plurality of zones comprises a first zone, a second zone and a third zone; the first zone is a comfort zone having, relative to the second and third zones, a highest count of the number of installed software programs that are capable of accessing a given file type; the second zone is a risk zone having, relative to the first and third zones, a middle count of the number of installed software programs that are capable of accessing the given file type; and the third zone is a danger zone having, relative to the first and second zones, a lowest count of the number of installed software programs that are capable of accessing the given file type. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
Specification