摘要:
A network upgrade tool identifies at least one new digital subscriber line (DSL) path pre-provisionable elements associated with the at least one new DSL path. The tool provisions the identified pre-provisionable elements prior to transition from at least one existing DSL path to the at least one new DSL path; receives a notification that physical network changes associated with a target digital subscriber line access multiplexer (DSLAM) have been made; and provisions non-pre-provisioned elements following receipt of the notification
摘要:
A method and system automatically harmonizes access to a given software application program via different access devices. Through use of the method and system, a financial institution can provide access to a given application (such as, for example, automatic bill payment services) to customers using different access devices such web browsers, screen phones and personal computers. A single application program is all that needs to be written and maintained by the financial institution. Also, the method and system enables financial institutions to “leverage” existing programs because now the institution can automatically “project” its existing stock of program services unto new access devices—devices which may not have even existed at the time the program was created. By receiving information from the user via the user's access device, including information identifying the type of device being used and the application program the user wishes to access, the present invention solves these problems. The application program is then accessed and the information to be displayed to the user is identified. This information is automatically translated into a format which is compatible with the device, including its display, and sent to the device for display. The user, in turn, inputs information in response to the displayed information and this input information is automatically translated into a format which is compatible with the application program and is sent to the application program. The response generated by the application program is automatically translated to be compatible with the device and is sent to the device.
摘要:
A network upgrade tool creates an upgrade project designating a source digital subscriber line access multiplexer (DSLAM), a target DSLAM, and an upgrade type and determines whether the source DSLAM and target DSLAM are eligible for upgrade based on the upgrade type. At least one new digital subscriber line (DSL) path associated with the target DSLAM is identified when the source DSLAM and target DSLAM are eligible for upgrade. Pre-provisionable elements associated with the at least one new DSL path are identified and the identified pre-provisionable elements are provisioned prior to transition from at least one existing DSL path to the at least one new DSL path. A cutover selection is received that indicates that physical network changes associated with the target DSLAM have been made and non-pre-provisioned elements are provisioned following receipt of the cutover selection.
摘要:
An apparatus and program product utilize a displayed pictorial representation that depicts the actual physical configuration of a plurality of hardware components in a physical computer system to facilitate the collective management of the underlying hardware components. Typically, within such a pictorial representation, a selected status is displayed for multiple of such hardware components, thereby permitting hardware components sharing common attributes or characteristics to be identified in an efficient and intuitive manner, as well as to permit collective management operations to be performed on all selected hardware components. In addition, a pictorial representation may be dynamically generated to represent the physical configuration of a plurality of hardware components within a plurality of computers. In connection with such dynamic generation, the plurality of computers may be accessed to identify the plurality of hardware components that are resident in such computers.
摘要:
A method and system for query-based management of a plurality of resources in a network environment. The system uses web technology, preferably XML-technology, to receive and store information related to back-end resources and to provide a framework by which client computer systems can manage the plurality of back-end resources in a uniform manner. The system and method associates a search components to an object type, wherein the search components may come from different resources. Consequently, in a network environment having multiple resources, search information may be shared between different resources. Additionally, searching for a known objects retrieves information, both task and otherwise, associated with all shared resources. Thus a user can perform many different tasks just by searching for and locating the proper object. Furthermore, each of the resources may include a dedicated search engine for performing searches on dedicated resources.
摘要:
The invention relates to a method and an arrangement for scrollable cross point navigation on a user interface in order to select a feature by combining object fields. Bars, where at least one of them is scrollable, have object fields which overlap and combine each other when scrolled or put to a visible focus area in the user interface at the cross point of the bars. Object fields in the focus area select a feature connected to a combination of fields, which is chosen by a confirmation action.
摘要:
A double firewalled system is disclosed for protecting remote enterprise servers that provide communication services to telecommunication network customers from unauthorized third parties. A first router directs all connection requests to one or more secure web servers, which may utilize a load balancer to efficiently distribute the session connection load among a high number of authorized client users. On the network side of the web servers, a second router directs all connection requests to a dispatcher server, which routes application server calls to a proxy server for the application requested. A plurality of data security protocols are also employed. The protocols provide for an identification of the user, and an authentication of the user to ensure the user is who he/she claims to be and a determination of entitlements that the user may avail themselves of within the enterprise system. Session security is described, particularly as to the differences between a remote user's copper wire connection to a legacy system and a user's remote connection to the enterprise system over a “stateless” public Internet, where each session is a single transmission, rather than an interval of time between logon and logoff, as is customary in legacy systems.
摘要:
An electronically controlled apparatus of the present invention includes: an input-output section, which electronically processes and outputs input data; a control section, which electronically controls the input-output section according to operating status data of each component of the input-output section; a managing section, which monitors the operating status data of each component of the input-output section, so as to store and manage the operating status data with corresponding time information of the operating status data; and a processing section, which creates graphic display of the operating status data in a given time scale according to the operating status data and the time information. With the electronically controlled apparatus, it becomes easier to manage regular inspections and replenishing expendables, without lowering an activity rate.
摘要:
A Web-based call routing management workstation application which allows authorized customers to control toll free routing and monitor call center status. An architecture including one or more web servers located in a firewalled demilitarized zone (DMZ) as communications medium between the customer workstations at the customer sites and the enterprise back-end applications providing the call routing management services, provides a secure infrastructure for accessing the enterprise applications via the otherwise insecure public Internet. The present invention enables creation and management of call by call routing rules by a customer with a workstation having an Internet access and a supported Web browser. The customized rules may be tested and/or debugged via the Web-enabled workstation, using a debugger/tester which runs the routing rules under a simulated environment. In addition, customers may provision hierarchies for their business; create, modify or delete agent pools; manipulate capacity tables; and define quota schemes, value lists and schedule tables, all at the customer site via the Web-enabled workstation. The present invention also enables the customers to view near real-time displays of call center ACD statistics and peg counts based on routing rules, as well as, run provisioning and statistical reports on provisioning and statistical data and also to extract the data for further analysis. Additionally, the present invention supports foreign language and branding features on a graphical user interface. An infrastructure is provided which enables secure initiation, acquisition, and presentation of the call manager functionalities to customers from any computer workstation having a web browser and located anywhere in the world.
摘要:
An integrated series of security protocols is disclosed that protect remote user communications with remote enterprise services, and simultaneously protect the enterprises services from third parties. In the first layer, an implementation of the Secure Sockets Layer (SSL) version of HTTPS provides communications security, including authentication of the enterprise web server and the security of the transmitted data. The protocols provide for an identification of the user, and an authentication of the user to ensure the user is who he/she claims to be and a determination of entitlements that the user may avail themselves of within the enterprise system. Session security is described, particularly as to the differences between a remote user's copper wire connection to a legacy system and a user's remote connection to the enterprise system over a “stateless” public Internet, where each session is a single transmission, rather than an interval of time between logon and logoff, as is customary in legacy systems. Security for the enterprise network and security for the data maintained by the various enterprise applications is also described.