"In general, section III.C.1 and throughout the document, it is assumed that the only way to allow applications or software facilities to be used is through icons, shortcuts, or menu entries\", when in reality, applications/middleware can also be activated by associating it with particular types of data, and when such types of data are accessed, the application associated with it is activated." . . . .