Abstract:
A system, method, and computer program product are provided for rerating customer events in parallel with executing one or more open sessions in a consumer telecommunications network. In use, accumulated events of a current billing cycle are rerated in accordance with a billing plan associated with a telecommunications subscriber. Additionally, one or more counters associated with one or more accumulators corresponding to the telecommunications subscriber are updated, in response to the rerating. In addition, one or more open sessions associated with the telecommunications subscriber are identified. Furthermore, at least one existing reservation associated with the one or more open sessions that requires modification as a result of updating the one or more counters associated with the one or more accumulators corresponding to the telecommunications subscriber is identified. Moreover, authorization for at least one updated reservation for the at least one existing reservation associated with the one or more open sessions that requires modification is automatically requested.
Abstract:
A system, method, and computer program product are provided for determining geo-location of one or multiple User Equipment, that belong to the same subscriber subscription, that collectively are in simultaneous communication with a Cellular network and a Wi-Fi network. In use, it is determined that a subscriber utilizing at least one User Equipment is in simultaneous communication with at least one Cellular network and at least one Wi-Fi network. Cellular network measurement data associated with the at least one User Equipment is received. Additionally, Wi-Fi network measurement data associated with the at least one User Equipment is received. Further, the Cellular network measurement data and the Wi-Fi network measurement data are correlated to generate correlated measurement data associated with the at least one User Equipment. Moreover, the correlated measurement data is utilized to determine the geo-location of the at least one User Equipment, utilizing at least one geo-location determination algorithm and/or method, including and not limited to triangulation and correlation to Radio Frequency fingerprint.
Abstract:
A system, method, and computer program product are provided for automatically resolving non-sufficient funds (NSF) errors in a network. In use, it is automatically detected that a non-sufficient funds (NSF) error has occurred in a network, the NSF error being associated with a transaction of a consumer of the network while attempting to charge a first account. Additionally, it is automatically determined that the consumer has designated at least one alternative second account. Further, it is automatically determined that at least one of the at least one alternative second account has sufficient funds to complete the transaction. Furthermore, the at least one of the at least one alternative second account is automatically charged to complete the transaction.
Abstract:
A system, method, and computer program product are provided for detecting duplicated telecommunications events in a consumer telecommunications network. In use, a first telecommunications event and associated first event data are received. One or more fields of data are extracted from the first event data. Additionally, a single data string is generated from the extracted one or more fields of data. Further, a hash function is utilized to create a first event signature corresponding to the single data string from the extracted one or more fields of data. In addition, a first event signature hint is extracted from the first event signature, the first event signature hint including a portion of the first event signature. Furthermore, it is determined whether the first event signature hint exists in a signature hint hash table. Responsive to determining that the first event signature hint does not exist in the signature hint hash table, the first event signature hint is stored in the signature hint hash table and the first event data associated with the first telecommunications event is stored in a telecommunications event storage. Additionally, responsive to determining that the first event signature hint exists in the signature hint hash table, it is determined whether the first telecommunications event is identical to a previously received second telecommunications event stored in the telecommunications event storage. Moreover, responsive to determining that the first telecommunications event is identical to the previously received second telecommunications event stored in the telecommunications event storage, the first telecommunications event and the second telecommunications event are designated as a duplicate event.
Abstract:
A system, method, and computer program product are provided for displaying tasks as interactive thumbnails for interaction therewith by a user. In use, a plurality of tasks are identified. Additionally, for each of the tasks, an interactive thumbnail is generated which is representative of the task. Furthermore, the thumbnails are displayed for interaction therewith by a user.
Abstract:
A system, method, and computer program product are provided for big data integration and configuration. In use, a plurality of components associated with a big data solution are defined in a domain specific language utilizing one or more code generation tools. Additionally, relevant artifacts for the plurality of components associated with the big data solution are generated. Further, the relevant artifacts are packaged into a manifest, the manifest including elements required to support at least one business process. In addition, environment dependent variables of the manifest are replaced with target values associated with a target big data environment to which the manifest is to be deployed. Moreover, the manifest is deployed into operation in the target big data environment.
Abstract:
A flexible, modifiable, and sophisticated rules processing engine includes a user interface through which customers may design and modify a wide range of rules. The customer may thereby setup rules that determine any action, template, or other resultant appropriate to or for their input data. Consequently, the customer may develop sophisticated processing patterns tailored to their own input data, without the time and expense associated with obtaining a custom solution from a software vendor.
Abstract:
A system, method, and computer program product are provided for generating mobile subscriber network experience indicators based on geo-located events. In use, one or more call trace logs are received including protocol flow information between User Equipment and one or more network elements associated with a network. Additionally, one or more call detail records are generated utilizing the one or more call trace logs, each of the one or more call detail records including an associated international mobile subscriber identity (IMSI). Further, the one or more call detail records are geo-tagged with location information associated with the one or more call trace logs. In addition, the one or more geo-tagged call detail records are aggregated based on the international mobile subscriber identity associated with the one or more geo-tagged call detail records, such that a subscriber corresponding to the international mobile subscriber identity is associated with at least one of the aggregated geo-tagged call detail records. Furthermore, a plurality of key performance indicators are identified for the subscriber, utilizing the at least one aggregated geo-tagged call detail record associated with the subscriber. Moreover, a network experience indicator associated with the subscriber is generated utilizing one or more of the plurality of key performance indicators. Still yet, the network experience indicator associated with the subscriber is displayed utilizing a graphical user interface.
Abstract:
A system, method, and computer program product are provided for managing user access credentials in a computer network. In use, a Security Asset Repository (SAR) is maintained on a first computer connected to a network, the SAR being operable for storing user access credentials to resources on the network. Additionally, a first program residing on a second computer connected to the network is executed by a user, the user having first user access credentials for accessing the second computer. Responsive to executing of the first program, the SAR is accessed by the first program, by employing second user access credentials provided to the first program by the user. Responsive to accessing the SAR by the first program, the first program retrieves third user access credentials from the SAR, the third user access credentials being operable for accessing the SAR by a third computer. Responsive to retrieving the third user access credentials from the SAR, the first program executes a second program residing on the third computer connected to the network, and provides the third user access credentials to the second program. Responsive to providing the third user access credentials to the second program, the SAR is accessed by the second program by employing the third user access credentials, and the second program retrieves fourth user access credentials from the SAR, the fourth user access credentials being operable for accessing resources on the network other than the SAR.
Abstract:
According to one aspect of the present invention there is provided a system, method, and computer program product for communicating information in a communication network using network function virtualization (NFV-based communication network), the method including: sending a communication from a first entity of the NFV-based communication network, the first entity being a sender, and receiving the communication by a second entity of the NFV-based communication network, the second entity being a receiver, where the communication includes: an identification of the sender of the communication, and an identification of the receiver of the communication, an identification of a function associated with the NFV-based communication network, and an authorization associating one or more of the sender and the receiver with the function.