Wfabilling project in java, Computer Network Security

Assignment Help:

WFABilling project in Java:

 Project Title: WFABilling 

Role                      : Developer

Domain                 : Tele-Com

Environment          : Java, J2EE, Struts, HTML, XML, CSS, JavaScript, Tomcat, Oracle, MyEclipse, Windows XP, CVS, ANT, Unix, Shell Script.

Description:

                   WFABilling is a set of applications for posting charges and credits to various company wide billing systems. The system input consists of several flat files listing repair/installation tickets. We post credits and debits based on the work performed or outage duration.

Everything we process is a work ticket. They are either charges for installation/repair or credits (when an outage is our fault). The charges are referred to as CSC tickets, the credits are CCA. Our job is to enter adjustments to customer bills for these tickets.

          We don't process the tickets as soon as we get them, we let them set for some period of time (this is the pooling period). We pool tickets for two reasons. The primary reason is to give the field time to make changes to the tickets. It's common for a ticket to be entered on one day and then updated on the next. Since we can't back out adjustments to the customer's bill, we just let the tickets sit and collect changes.

          The second reason is to give information time to flow from one mainframe system to another. Just because an account exists in WFA (a ticket source) doesn't mean that CABS (a billing system) has it yet. This second reason is also the reason we retry tickets. Just because we can't post a ticket on one day doesn't mean we can't post it the next. 

Responsibilities:

  • Involving in designing and coding of projects.
  • Involving in Unit Testing and System Testing.
  • Involving in the bug fixing and issue solving 

 


Related Discussions:- Wfabilling project in java

Deploying host-based idss, Deploying Host-Based IDSs -Proper implementat...

Deploying Host-Based IDSs -Proper implementation of HIDSs can be painstaking and time-consuming task .The process of deployment begins with implementing most critical systems fi

How to create a security policy, Five years ago, Calgary Kids' Cloth Ltd wa...

Five years ago, Calgary Kids' Cloth Ltd was just a small retail store in downtown Calgary. The company started their own factory in SE Calgary to produce outdoor clothes for kids.

Securing the network using a packet filter firewall, 1. Network Design ...

1. Network Design Design your network giving appropriate IP addresses for your hosts. Provide a topology and table showing your addressing scheme. 2. F i re wall po

Determine the round trip time, a) determine the RTT (round trip time) betwe...

a) determine the RTT (round trip time) between a client requesting a web page of 1024 bytes in size from an internal web server on a 100 Base-T Ethernet. Assume a one-way propagati

Explain the schemes for distribution of public keys, (a) What is a pseudora...

(a) What is a pseudorandom generator? Give an example describing how it works. (b) Explain the key components of a wireless network and their purpose. (c) Describe the authen

What is an autonomous system, QUESTION 1: a) Differentiate between a r...

QUESTION 1: a) Differentiate between a routing protocol and a routed protocol. b) Describe any three design goals of Routing protocols. c) Lists some of the features shared

Log file monitors-information security, LOG FILE MONITORS Log file monit...

LOG FILE MONITORS Log file monitor (LFM) is similar to NIDS. It reviews log files generated by servers, network devices, and even other IDSs for patterns and signatures. Pattern

Threads and attacks-information security, THREADS AND ATTACKS Threat is ...

THREADS AND ATTACKS Threat is an object, person, or other entity which represents a constant danger to an asset. To make sound decisions about information security, management s

What is authentication? explain authentication protocols, What is Authentic...

What is Authentication/confirmation?  How it is different from  the Authorization/approval?  Explain in brief different authentication protocols along with their merits and demerit

Risk determination, Risk Determination For purpose of relative risk asse...

Risk Determination For purpose of relative risk assessment, risk equals probability of vulnerability occurrence TIMES value MINUS percentage risk already controlled PLUS an elem

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd