Wfabilling project in java, Computer Network Security

Assignment Help:

WFABilling project in Java:

 Project Title: WFABilling 

Role                      : Developer

Domain                 : Tele-Com

Environment          : Java, J2EE, Struts, HTML, XML, CSS, JavaScript, Tomcat, Oracle, MyEclipse, Windows XP, CVS, ANT, Unix, Shell Script.

Description:

                   WFABilling is a set of applications for posting charges and credits to various company wide billing systems. The system input consists of several flat files listing repair/installation tickets. We post credits and debits based on the work performed or outage duration.

Everything we process is a work ticket. They are either charges for installation/repair or credits (when an outage is our fault). The charges are referred to as CSC tickets, the credits are CCA. Our job is to enter adjustments to customer bills for these tickets.

          We don't process the tickets as soon as we get them, we let them set for some period of time (this is the pooling period). We pool tickets for two reasons. The primary reason is to give the field time to make changes to the tickets. It's common for a ticket to be entered on one day and then updated on the next. Since we can't back out adjustments to the customer's bill, we just let the tickets sit and collect changes.

          The second reason is to give information time to flow from one mainframe system to another. Just because an account exists in WFA (a ticket source) doesn't mean that CABS (a billing system) has it yet. This second reason is also the reason we retry tickets. Just because we can't post a ticket on one day doesn't mean we can't post it the next. 

Responsibilities:

  • Involving in designing and coding of projects.
  • Involving in Unit Testing and System Testing.
  • Involving in the bug fixing and issue solving 

 


Related Discussions:- Wfabilling project in java

Electronic mail, Electronic Mail: Electronic mail which is famous as e-...

Electronic Mail: Electronic mail which is famous as e-mail, as it is known to its number of users, has been around for more than two decades. Before 1990, it was mainly used in

Software vulnerabilities, 1.  We used the National Vulnerability Database. ...

1.  We used the National Vulnerability Database. Select a recent vulnerability from that Database and analyse it from the following aspects: Criticality level Impact in

Symmetric encryption-cryptography, Symmetric Encryption This encryption ...

Symmetric Encryption This encryption method makes use of same “secret key” to encipher and decipher the message and it is termed as private key encryption. This type of encrypti

Digital certificates, A Certificate presents an organization in an official...

A Certificate presents an organization in an official digital form. This is same to an electronic identity card which serves the purpose of Identifying the owner of the certificate

Explain symmetric and asymmetric encryption system, Question 1: (a) Dif...

Question 1: (a) Differentiate between symmetric and asymmetric encryption system. (b) Describe how a digital signature is created. (c) Explain briefly what SSL (secure so

Steganography-cryptography, Steganography It is a process of hiding info...

Steganography It is a process of hiding information in use for a long time. Most popular modern version of this process hides information within files appearing to contain digit

Example of a public key algorithm, Question : (a) There are two approa...

Question : (a) There are two approaches for providing confidentiality for packets in a network using symmetric encryption: End-to-End Encryption and Link Encryption. State wh

Evaluate the sample correlation between y and z, Question: (a) Data on ...

Question: (a) Data on four variables are stored in a file called file1.dat. The first line of the file is the variable names f, x, y and z. Give the R commands to (i) read t

Mobile wireless networks , Is standard TCP effective in mobile wireless net...

Is standard TCP effective in mobile wireless networks that operate with the IEEE 802.11 wireless local area network protocol?Discuss the issue

Systems development life cycle (sdlc)-information security, SDLC Systems ...

SDLC Systems development life cycle (SDLC) is process of developing information systems through analysis, design, investigation, implementation and maintenance. SDLC is called as

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd