Abstract:
Systems, methods, and computer program products for identifying utility theft include a property management system operable to receive tenant data associated with a property. A service provider in communication with the property management system receives the tenant data from the property management system via a network such as the Internet, where the tenant data identifies a tenant responsible for payment of a utility service associated with a utility service account. The service provider, which may be a utility, compares the tenant data to utility data to determine if the tenant corresponds to a utility service account. A notification module provides one or more alerts identifying when the tenant fails to correspond to the utility service account.
Abstract:
Systems, methods, and computer program products for identifying utility theft include a property management system operable to receive tenant data associated with a property. A service provider in communication with the property management system receives the tenant data from the property management system via a network such as the Internet, where the tenant data identifies a tenant responsible for payment of a utility service associated with a utility service account. The service provider, which may be a utility, compares the tenant data to utility data to determine if the tenant corresponds to a utility service account. A notification module provides one or more alerts identifying when the tenant fails to correspond to the utility service account.
Abstract:
A content management migration manager method comprises accessing via a web interface executed by a computer an application interface, such as an API, for a first content management system and an application interface (API) for a second content management system. A site associated with the first content management system is thereafter replicated to the second content management system. Each document library folder in the replicated site is duplicated to the second content management system for the replicated site as well as all corresponding users, groups and their associated roles/permissions. Thereafter, one or more folders, users, or permissions existing in the second content management system not also existing in the first content management system may be removed by the content management migration manager.
Abstract:
Systems, methods, and computer program products for identifying utility theft include a property management system operable to receive tenant data associated with a property. A service provider in communication with the property management system receives the tenant data from the property management system via a network such as the Internet, where the tenant data identifies a tenant responsible for payment of a utility service associated with a utility service account. The service provider, which may be a utility, compares the tenant data to utility data to determine if the tenant corresponds to a utility service account. A notification module provides one or more alerts identifying when the tenant fails to correspond to the utility service account.
Abstract:
Notification systems and methods are provided for identifying utility theft for an entity associated with a premise under a Continuous Service Agreement with at least one utility service provider, where utility service is never turned off such that the entity may legally use utility services while a premise is vacant.
Abstract:
Notification systems and methods are provided for identifying utility theft for an entity associated with a premise under a Continuous Service Agreement with at least one utility service provider, where utility service is never turned off such that the entity may legally use utility services while a premise is vacant.