Abstract:
In an example embodiment, a mass reversal of documents in a convergent invoicing system may be accomplished by first receiving a first set of one or more reversal triggers, wherein each of the one or more task triggers corresponds to a document in the convergent invoicing system. Then a reversal task is received, wherein the reversal task corresponds to the first set of one or more reversal triggers. A second set of reversal triggers may then be automatically corresponded to reversal task, based upon documents corresponding to the one or more task triggers in the first set of ne or more reversal triggers. Once an indication that the reversal task has been released in received, for each reversal trigger corresponding to the reversal task, the reversal trigger is processed, causing a corresponding document to be reversed.
Abstract:
A service, system and method for an improved postal service that is inclusive of various needs of customers, utilizing electronic mail and hardcopy mail sending and delivering with economy to the postal service and advancing its operation to be suitable for modern times.
Abstract:
Method and apparatus for analyzing a proposed service feature in a communication network is described. In one example, a call flow for supporting the service feature in the communication network is created, where at least one network component supports the call flow. First cost data for internally developing the at least one network component is determined. Second cost data for procuring the at least one network component from third party entity is determined. The first cost data and the second cost data are processed to generate a recommendation for either internally developing or externally procuring the at least one network element.
Abstract:
The present invention relates to systems and methods for delivering telecommunications services to customers. The systems and methods allow for the rapid creation and deployment of new telecommunications services, and the bundling of multiple services into service packages that can be sold together as a single product. Based on the systems and methods, targeted service packages may be developed and marketed toward business customers in specific industries. The systems and method provide opportunities for new business arrangements between telecommunications service providers and smaller third party providers. The new business arrangements provide access to a much wider customer pool for the third
Abstract:
A mobile device operating system level routine obtains social network access parameters that allow access to one or more social network accounts of a user of the device. The access parameters are stored in operating system level memory of the mobile device. Through an operating system interface of the mobile device, a user can create a social network message to be communicated via the one or more social network accounts using the stored access parameters. A single social network message may be communicated via multiple social network accounts with multiple social network platforms. The uniform operating system interface allows a user to communicate messages via multiple social network accounts without using multiple user level applications.
Abstract:
An electronic business postal system collects, clears and delivers electronic business mail through a closed access, secure messaging system. A collection subsystem consists of access portals that are associated with secured system nodes. The access portals provide authenticated users access to the system to send and retrieve electronic business mail that includes postal system electronic delivery addresses, physical delivery addresses, or both. Secured message servers that are associated with the respective access portals process the electronic business mail into uniquely identified messages for delivery over the system nodes and also process received messages to provide the corresponding electronic business mail to the intended recipients through associated access portals. A delivery subsystem directs the messages through the system nodes associated with the senders' access portals to the system nodes associated with the recipients' access portals. A clearance subsystem confirms the integrity of both the messages and their delivery and ensures that each message is delivered once and intact.
Abstract:
Various methods for unwanted traffic control in a wireless network are provided. One example method may include detecting an occurrence of unwanted content as indicated by receipt of a complaint about a content item provided by a source device, wherein the complaint may be received from a remote mobile device or generated locally based on a local detection. The example method may further include determining a trust value for the source device based at least on the complaint, determining that the source device is a distrusted device based at least on a comparison between the trust value and a trust threshold value, and causing traffic from the source device to be controlled as unwanted traffic. Similar and related example methods, example apparatuses, and example computer program products are also provided.
Abstract:
The present invention relates to systems and methods for delivering telecommunications services to customers. The systems and methods allow for the rapid creation and deployment of new telecommunications services, and the bundling of multiple services into service packages that can be sold together as a single product. Based on the systems and methods, targeted service packages may be developed and marketed toward business customers in specific industries. The systems and method provide opportunities for new business arrangements between telecommunications service providers and smaller third party providers. The new business arrangements provide access to a much wider customer pool for the third party providers, and create new sources of revenue for telecoms.
Abstract:
Methods and systems disclosed herein are used to manage delivery of a package to an intermediate delivery location by an initial carrier for subsequent delivery to a user by a secondary carrier. The user may register with a secondary delivery service provider by providing a user delivery address prior to having the package shipped to the intermediate delivery location. The secondary delivery service provider may provide the user with a physical address the intermediate delivery location. The user may then provide the address of the intermediate delivery location to any sender as part of a shipping address. Once the package is received at the intermediate delivery location, staff at the intermediate delivery location may release the package to the secondary carrier and the secondary carrier may deliver the package to the user delivery address.
Abstract:
Techniques are described for automatically and dynamically determining how to handle items being returned from customers while the items are in transit. Various factors may be considered to determine appropriate item return handling, including by assessing current conditions at the time of the determination. In addition, the dynamic item return handling may include selecting one of various potential return destinations for each item being returned and one of various types of return routing for the return. In some situations, the item return handling is performed for an item being returned from a customer while the item is at an intermediate shipping location, such as a selected location to which the customer was directed to send the item. This abstract is provided to comply with rules requiring an abstract, and with the intention that it will not be used to interpret or limit the scope or meaning of the claims.