Wfabilling project in java, Computer Network Security

Assignment Help:

WFABilling project in Java:

 Project Title: WFABilling 

Role                      : Developer

Domain                 : Tele-Com

Environment          : Java, J2EE, Struts, HTML, XML, CSS, JavaScript, Tomcat, Oracle, MyEclipse, Windows XP, CVS, ANT, Unix, Shell Script.

Description:

                   WFABilling is a set of applications for posting charges and credits to various company wide billing systems. The system input consists of several flat files listing repair/installation tickets. We post credits and debits based on the work performed or outage duration.

Everything we process is a work ticket. They are either charges for installation/repair or credits (when an outage is our fault). The charges are referred to as CSC tickets, the credits are CCA. Our job is to enter adjustments to customer bills for these tickets.

          We don't process the tickets as soon as we get them, we let them set for some period of time (this is the pooling period). We pool tickets for two reasons. The primary reason is to give the field time to make changes to the tickets. It's common for a ticket to be entered on one day and then updated on the next. Since we can't back out adjustments to the customer's bill, we just let the tickets sit and collect changes.

          The second reason is to give information time to flow from one mainframe system to another. Just because an account exists in WFA (a ticket source) doesn't mean that CABS (a billing system) has it yet. This second reason is also the reason we retry tickets. Just because we can't post a ticket on one day doesn't mean we can't post it the next. 

Responsibilities:

  • Involving in designing and coding of projects.
  • Involving in Unit Testing and System Testing.
  • Involving in the bug fixing and issue solving 

 


Related Discussions:- Wfabilling project in java

Explain how the key exchange algorithm works, Question: (a) Explain how...

Question: (a) Explain how the Diffie-Hellman key establishment protocol works. (b) Prove that the Diffie-Hellman key establishment protocol is vulnerable to a `man in the mi

What is authentication? explain authentication protocols, What is Authentic...

What is Authentication/confirmation?  How it is different from  the Authorization/approval?  Explain in brief different authentication protocols along with their merits and demerit

Explain characteristics of associative memory networks, (a) Describe the pr...

(a) Describe the principal characteristics of associative memory networks? (b) Name the two basic types of associative memories and the differences between them. (c) Give an

Difference between a class profile and a child profile sheet, QUESTION ...

QUESTION (a) Mention two attitudes of a carer towards an inspector that could lead to negative outcomes (b) Give two performance indicators of Early Childhood Education that

Problem of spam mail, Topic -Spam is an ever-growing problem, with some net...

Topic -Spam is an ever-growing problem, with some network administrators reporting that 90% or moreof the email delivered to their mail servers is spam. Identify and briefly evalua

Increasingly significant impact on society, Question: (a) African gove...

Question: (a) African governments are slowly shifting to more transparent ICT regulations. However, but limited spectrum availability remains a key barrier to sustaining lon

Meaning of dns - domain name system, What do you understand by the DNS? Exp...

What do you understand by the DNS? Explain the usage of the resource rec or ds. Domain Name System is described below: The Domain Name Service (DNS) is the hierarchi

Introduction to physical security, INTRODUCTION TO PHYSICAL SECURITY The...

INTRODUCTION TO PHYSICAL SECURITY The Physical security addresses design, execution, and maintenance of countermeasures which protect physical resources of an organization. The

Hashing, Hashing is the transformation of a string of characters into a g...

Hashing is the transformation of a string of characters into a generally shorter fixed-length key or a value that presents the original string. Hashing is used to index and retri

Address resolution protocol (arp), ADDRESS RESOLUTION PROTOCOL (ARP) T...

ADDRESS RESOLUTION PROTOCOL (ARP) TCP/IP can use any of the three address resolution functions relaying on the addressing procedure used by the underlying hardware. To guarant

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd