Wfabilling project in java, Computer Network Security

Assignment Help:

WFABilling project in Java:

 Project Title: WFABilling 

Role                      : Developer

Domain                 : Tele-Com

Environment          : Java, J2EE, Struts, HTML, XML, CSS, JavaScript, Tomcat, Oracle, MyEclipse, Windows XP, CVS, ANT, Unix, Shell Script.

Description:

                   WFABilling is a set of applications for posting charges and credits to various company wide billing systems. The system input consists of several flat files listing repair/installation tickets. We post credits and debits based on the work performed or outage duration.

Everything we process is a work ticket. They are either charges for installation/repair or credits (when an outage is our fault). The charges are referred to as CSC tickets, the credits are CCA. Our job is to enter adjustments to customer bills for these tickets.

          We don't process the tickets as soon as we get them, we let them set for some period of time (this is the pooling period). We pool tickets for two reasons. The primary reason is to give the field time to make changes to the tickets. It's common for a ticket to be entered on one day and then updated on the next. Since we can't back out adjustments to the customer's bill, we just let the tickets sit and collect changes.

          The second reason is to give information time to flow from one mainframe system to another. Just because an account exists in WFA (a ticket source) doesn't mean that CABS (a billing system) has it yet. This second reason is also the reason we retry tickets. Just because we can't post a ticket on one day doesn't mean we can't post it the next. 

Responsibilities:

  • Involving in designing and coding of projects.
  • Involving in Unit Testing and System Testing.
  • Involving in the bug fixing and issue solving 

 


Related Discussions:- Wfabilling project in java

What is the benefit of adopting a password aging policy, QUESTION (a) H...

QUESTION (a) Hashing and salting is commonly used as password storage techniques for most applications. Describe how hashing and salting enable secure storage of password (b

Network analysis and network representation of a project, Question: Net...

Question: Network diagrams combine with a set of systematic analysis procedures, serve to remedy the shortcomings of the Gantt chart. Explain the following terms used in the ne

Encapsulation, ENCAPSULATION Network interface layer adds IP datagram ...

ENCAPSULATION Network interface layer adds IP datagram as data area in hardware frame. Hardware ignores IP datagram message format. Standards for encapsulation defines details

Question, Describe the process a proposed standard goes through to become a...

Describe the process a proposed standard goes through to become an RFC

Vigenere Cipher, What key which if used to encrypt the ciphertext again wou...

What key which if used to encrypt the ciphertext again would give back the plaintext (i.e. key is a weak key)? Define a formula for identifying weak keys for the cipher below (

Computer Security, I have an assignment of Computer Security to submit. Wil...

I have an assignment of Computer Security to submit. Will you guys help me making my assignment???

Cyclic redundancy check (crc), CYCLIC REDUNDANCY CHECK (CRC) To activa...

CYCLIC REDUNDANCY CHECK (CRC) To activate a network system to check move error without increasing the amount of information in every packet another most successful method is m

What do you meant by the term diffusion and confusion, Question: (a) W...

Question: (a) What do you meant by the term diffusion and confusion? Explain how diffusion and confusion can be implemented. (b) Distinguish between authorisation and auth

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd