Abstract:
A computer implemented method for customer response management the method comprising the step of collecting information from social networking sites wherein the information is at least a post or comment for at least a brand or product; identifying customer among pluralities of authors of the information on the social networking sites; categorizing the information into at least a complaint, lead, service request, information request or feedback; analyzing the categorized information; prioritizing the analyzed information; and routing the prioritized information to at least a concerned personnel or a work flow of the Customer Relationship Management (CRM) system for response. The method further comprising identifying the influence of the customer wherein the influence is at least a global influence or local influence. The identification of customer is done by fetching information from at least the Customer Relationship Management (CRM) system or social profile aggregator service.
Abstract:
The present invention provides a gamification platform to provide one or more gamification services to one or more users in an enterprise. In accordance with an embodiment, the gamification platform includes a server, an application component, a consumer component and a DB layer, wherein said components and the DB layer are communicably coupled to the server. The application component provides a unified and an integrated gamification mechanics across one or more enterprise applications and comprises a tracker, a rule engine and a recommendation engine. The consumer component is configured to support one or more types of client applications. The DB layer is configured to manage and manipulate data in underlying database. The gamification platform further allows one or more users to virtually engage in accomplishing one or more target activities as a team and publishes the one or more gamification services in a user interface of the client application.
Abstract:
The present invention describes a system, method and computer product program for computation of alarm time. The system includes an alarm device for generating an alarm. The system also includes an alarm application hosted on the alarm device for providing at least one user defined alarm condition. The system further includes an alarm engine for receiving the user defined alarm condition, initiating a probe to receive data from data sources, processing the received alarm conditions and the received data to compute the alarm time and next probe time repeating iteratively until the next probe time is less than the computed alarm time. The system generates alarm at the computed alarm time when the next probe time becomes greater than the alarm time.
Abstract:
The present invention relates to computer-implemented methods, systems and computer-readable media for providing financial transactions. The method steps comprise initializing at least one transaction from a customer held device, wherein initializing comprises entering a network provider code, an acquiring institution number, a merchant identification number, a terminal identification number and sending a transaction request to an issuing institution. The method further comprises authenticating said transaction by said issuing institution, wherein authenticating comprises confirming said transaction by said issuing institution, sending said confirmation transaction to an acquiring institution and routing the confirmation to said terminal identification number by said acquiring institution and terminating said transaction at a merchant held device.
Abstract:
The present invention provides a system, wireless communication device, method and computer program product for combining one or more compatible services with a current service. A user of a wireless communication device is subscribed with a registered service provider. A user sends a request for identifying the one or more compatible services with the current service to the registered service provider. The registered service provider identifies and sends a list of the identified compatible services to the wireless communication device. The user then selects at least one compatible service from the list of the identified compatible services. Thereafter, the registered service provider sends the software required for combining the selected compatible services with the current service. The user creates a combined service by combining the selected compatible services with the current service using the software on the wireless communication device.
Abstract:
A system, medium and method of providing a centralized host manager module configured to manage a software-based host system having a plurality of independent host platforms is disclosed. A user interface is displayed to provide administrative tools for performing corresponding administrative functions on the plurality of host platforms. A selection is received via the user interface, wherein the selection is to perform a first administrative function on a first host platform. The first administrative function is associated with a generic command line program. Input data is received that is in conformance with the generic command line program. A finalized command line program is generated utilizing the generic command line program and first input data. The finalized command line program is sent to the identified host platform to cause the host platform to execute the finalized command line program.
Abstract:
The present invention provides a method and system for detecting a partial commit of software. A dependency information of the software is extracted from a version history and a bug database. A dimensional matrix containing a set of commit, and relationship information with a set of files with each commit is created from the dependency information. A centrality matrix is computed by performing a first set of matrix transformations on the dimensional matrix. A set of missing files of a partial commit, is identified by performing a second set of matrix transformations on the centrality matrix and a file vector, the file vector including a file dependency information of the partial commit.
Abstract:
A method and a system for generating one or more transition plans for one or more applications of an organization are provided. Transition information for identifying a set of applications for transition is obtained from information corresponding to the one or more applications. One or more groups of the identified set of applications are created. Further, one or more activities for transition execution are identified for each application of the identified set of applications. Thereafter, one or more transition plans comprising the one or more identified activities are generated.
Abstract:
A system and method for generating an account number are described. In an example embodiment, the creation of a first table and a first field, capable of receiving alphanumeric characters, is disclosed. An alphanumeric input is received and recorded in the first field, and a sequence number associated with the input so received is recorded. In a further aspect of the present invention, a second table is created, and an account number key stored therein. An account number may then be generated in accordance with the key. In an additional aspect, an alphanumeric field may be created specifically to aid in the application of a check digit methodology
Abstract:
The present invention relates to a computer-implemented method, system and computer readable medium for providing a searching over encrypted keywords in a database. The method comprises the steps of generating at least one keyword, generating a plurality of different encrypted keywords corresponding to said keyword, storing said at least one encrypted keyword in said database; generating a plurality of different trapdoors for said keyword, verifying said plurality of different trapdoors with said plurality of different encrypted keywords corresponding to said keyword and determining said keyword if said plurality of different trapdoors match with one said encrypted keyword corresponding to said keyword else determining said keyword is not found.