摘要:
Data flow analysis and routing processes include monitoring a process of a workflow, intercepting data traffic for data entered for the process, and identifying a communication path of a destination location for the data traffic. The method also includes verifying compliance of the process by applying business rules to the data, and notifying an entity of any non-compliance identified from the verification.
摘要:
Data flow analysis and routing processes include monitoring a process of a workflow, intercepting data traffic for data entered for the process, and identifying a communication path of a destination location for the data traffic. The method also includes verifying compliance of the process by applying business rules to the data, and notifying an entity of any non-compliance identified from the verification.
摘要:
A method and system of managing work flow in provisioning service orders is provided, particularly telecommunications service delivery orders, where each service order may include of tasks from different worklists from different sources. The method includes merging the worklists and prioritizing tasks in accordance with work-when-ready work flow. The merged worklist provides an end-to-end view on a graphical user interface of all tasks pending to provision each service order. A change of status of a task results in automatically updating both the native and merged worklists. When a task is completed on the native system, the task is automatically deleted from both worklists. Selected search criteria and sorting fields may be used to narrow the displayed results. New tasks created by exceptions are inserted appropriately into the active worklist. The method eliminates the need for a user to log onto different systems to manually prioritize tasks.
摘要:
In accordance with a method of managing work flow, tasks associated with a telecommunications service order from a plurality of worklists of computing source systems are merged into a merged worklist. Each computing source system maintains a respective worklist that includes a task associated with the service order. The tasks of the service order in the merged worklist are prioritized into a prioritized sequence to be completed on a work-when-ready basis. An error in completion of a task associated with a worklist of a source system is detected and a new task to correct the detected error is generated. Further, the worklist of the source system associated with the detected error is updated with the new task and the new task is integrated into a proper position of the prioritized sequence in the merged worklist in accordance with the work-when-ready basis.
摘要:
In accordance with a method of managing work flow, tasks associated with a telecommunications service order from a plurality of worklists of computing source systems are merged into a merged worklist. Each computing source system maintains a respective worklist that includes a task associated with the service order. The tasks of the service order in the merged worklist are prioritized into a prioritized sequence to be completed on a work-when-ready basis. An error in completion of a task associated with a worklist of a source system is detected and a new task to correct the detected error is generated. Further, the worklist of the source system associated with the detected error is updated with the new task and the new task is integrated into a proper position of the prioritized sequence in the merged worklist in accordance with the work-when-ready basis.
摘要:
Certain exemplary embodiments comprise a method, comprising storing, within a telecommunications network, contact information for each of a plurality of contacts, the contact information for at least one of the plurality of contacts comprising a telephone availability status; and updating the telephone availability status for said at least one of the plurality of contacts.
摘要:
A method allows access to a set of secure databases and database applications over an untrusted network without replicating the secure database. The method involves authenticating a user using a first authentication application. When the user is verified, then the user's credentials are directed to a second authentication application associated with a secure database based on a first set of user settings retrieved for the user. The second authentication application, based on a second set of user settings, grants the user access to the secure database and database applications associated with the secure database.
摘要:
Methods are disclosed which relate to providing and billing for a service through a network regardless of the type of transport used to access the network. A customer who wishes to have a certain service first selects a transport. Transport options can be limited by the customer's location and bandwidth needs, but not by the service the customer desires. Once a transport option is selected it is installed and the customer receives the service through the transport by accessing a network. If a customer already has a transport and access to a network but desires another service, then the desired service can be simply added onto the existing access and billed accordingly. The transport type and service are calculated independently for billing purposes.
摘要:
An arrangement collects data from disparate system back-end sources, such as a contracts system, a billing system, a service provisioning system, and analyzes the data to determine whether any inconsistencies exist. If so, the system issues a modification request to compensate for the inconsistency.
摘要:
A method and system for authenticating access to a protected application are disclosed. For example, the method receives from a protected application a request by a user to gain access to the protected application. In one embodiment, the request contains an identification of the user and an identification of at least one media device of the user. The method then verifies the identification of the user and the identification of at least one media device of the user, e.g., via a database operated by a proxy server. The method then generates an access code if the identification of the user and the identification of at least one media device are verified. Finally, the method sends the access code to both the user and to the protected application.