Abstract:
A system, method, and computer program product are provided for resource conversion in network function virtualization based networks. In use, a first resource of a first type is identified in a first hardware unit, the first resource at least potentially having insufficient availability and being associated with a Network Function Virtualization based (NFV-based) communication network. Additionally, a second resource of a second type is identified, the second resource being associated with the first hardware unit, the second resource being identified as sufficiently available. Further, a third resource of the first type is identified, the third resource being associated with a second hardware unit, the second hardware unit being associated with the second resource, the third resource being identified as sufficiently available.
Abstract:
A system, method, and computer program product are provided for generating event tests associated with a testing project. In use, an indication of one or more event types is received for creating one or more events on which to perform event testing associated with at least one testing project. Additionally, an indication of one or more parameters associated with the one or more events on which to perform the event testing is received. Further, one or more event files are generated for testing the one or more events based on the one or more event types and the one or more parameters. In addition, the one or more event files are sent to one or more event processing systems for testing the one or more events, the testing of the one or more events including storing information associated with all faults resulting from the testing of the one or more events in a risky events repository that is capable of being utilized to generate testing rules for additional testing projects. Moreover, at least one report including information associated with a result of testing the one or more events is generated.
Abstract:
A system, method, and computer program product are provided for generating an orchestration data tree utilizing a Network Function Virtualization Orchestrator (NFV-O) data model. In use, an NFV-O data model is identified, the NFV-O data model being associated with an NFV-O module corresponding to a communication network. Additionally, an orchestration data tree template is generated utilizing the NFV-O data model, the orchestration data tree being utilized to support orchestration of a plurality of services associated with the communication network, and the orchestration data tree template capable of including: a plurality of nodes, each of the nodes representing one of the plurality of services associated with the communication network; a plurality of node relations, each of the plurality of node relations representing a relation of a parent node and a sub-node; a plurality of links, each of the plurality of links defining a relationship between two of the plurality of nodes; and a plurality of connectors, each of the plurality of connectors being associated with one of the plurality of nodes and functioning to connect to one of the plurality of links.
Abstract:
A system, method, and computer program product are provided for performing preventative maintenance in a Network Function Virtualization based (NFV-based) communication network. In use, a first potential fault is identified in a first resource in an NFV-based communication network. Additionally, a first time for maintaining the first resource is identified to prevent an occurrence of the first potential fault. Further, a second resource is identified for replacing the first resource during the first time.
Abstract:
A system, method, and computer program product are provided for centralized guided testing. In use, at least one software testing project is identified. Additionally, data associated with the at least one software testing project is accessed from at least one of a plurality of knowledge repositories that are capable of being dynamically and constantly updated, the plurality of knowledge repositories including: at least one first repository including official testing methodology associated with a plurality of testing processes; at least one second repository including test project management information; at least one third repository including test knowledge information provided by users; and at least one fourth repository including historical testing project information and ongoing testing project information. Further, the data associated with the at least one software testing project is presented utilizing at least one user interface.
Abstract:
A system, method, and computer program product are provided where non-convertible lines in a database that that are comprised of characters that are not recognized by a codepage of the database are identified as result of a predefined assessment and are then exported from the database. The exported non-convertible lines are automatically converted to convertible lines by using a mapping table, and the non-convertible lines are deleted from the database. After deleting the non-convertible lines, a predefined conversion command is executed on the database, thereby converting all characters of the database from an ISO format to a UTF8 format, and then the convertible lines are imported into the database utilizing a predefined import utility that automatically converts all characters of the convertible lines, once inserted into the database, from the ISO format to the UTF8 format.
Abstract:
A system, method, and computer program product are provided for fetching data from a physical memory queue utilizing an alias queue name. In use, a physical queue associated with at least a portion of memory is identified. Additionally, a first alias queue name is mapped to the physical queue. Further, data is fetched utilizing the first alias queue name in response to a request to fetch the data from the physical queue.
Abstract:
A system, method, and computer program product are provided for partially authorizing a multi-target communication request. In use, a plurality of targets associated with a multi-target communication request are determined. Further, the multi-target communication request is automatically authorized, wherein the multi-target communication request includes a request to send at least one communication to each of the plurality of targets. Additionally, it is determined whether the multi-target communication request has been successfully authorized for each of the plurality of targets. Responsive to determining that the multi-target communication request has not been successfully authorized for at least one of the plurality of targets, the multi-target communication request is rolled back for only the at least one target.
Abstract:
Methods and systems for utilizing a database are disclosed. The methods and systems determine a key representative of a storage location of first RDF data in a NoSQL database. In addition, the methods and systems read the first RDF data in the NoSQL database using the key. The methods and systems also write second RDF data derived from the first RDF data into a second database stored in memory. The methods and systems may also modify the second RDF data, and write third RDF data derived from the modified second RDF data into the NoSQL database.
Abstract:
A system, method, and computer program product are provided for proactive customer care utilizing predictive models. In use, historical data associated with a plurality of customers of a service provider is identified. Further, at least one first predictive model is generated based on the historical data associated with the plurality of customers, the at least one first predictive model indicating a propensity of each of the plurality of customers to call a call center associated with the service provider. Additionally, a portion of the plurality of customers are proactively notified based on call propensity information associated with the at least one first predictive model, in response to identifying at least one customer issue associated with the plurality of customers, the portion of the plurality of customers including customers identified as persuadable customers based on the at least one first predictive model. Furthermore, a behavior of the plurality of customers is monitored. In addition, at least one second predictive model is generated, based at least in part on the behavior of the plurality of customers.