applications, and security and network devices that are involved in providing Provider Services. Logs must be kept for a minimum of 6 months or as long as legally required, whichever is longer. Logs must capture the access ID, the authorization granted or denied, the date and time, the relev...
a credit card number may be identified and obfuscated. Additionally, incorrect characters, such as control m characters and null characters may be rejected. The present disclosure also provides for Structured Query Language (SQL) transformations from a source data warehouse to a target data warehouse...
FIG. 8 is a screenshot of a user interface800for configuring the data comparison system of FIG. 1, or other data comparison systems. The user interface800may include a variant section810, a batch section820, an options section830, a tolerance section840, a download section850, and a field...
applications, and security and network devices that are involved in providing Provider Services. Logs must be kept for a minimum of 6 months or as long as legally required, whichever is longer. Logs must capture the access ID, the authorization granted or denied, the date and time, the relev...
“PARENT ID” and “NAME” are fields used to define variables which may be used in conjunction with the field “KIND” to determine information such as when the rule may be executed. “ARG PATH” and “PROPERTY” are fields that may be used to define properties or variables that rules ...
and security and network devices that are involved in providing Provider Services. Logs must be kept for a minimum of 6 months or as long as legally required, whichever is longer. Logs must capture the access ID, the authorization granted or denied, the date and time, the relevant activity,...
Therefore, at any point of a telephone call in the network, the associated NCID identifies the point and time of origin of the telephone call. Each switch through which the telephone call passes records the NCID in the call record associated with the call. The NCID is small enough to ...
The Architecture Object 200 provides a code manager, client profile, text manager, ID manager, registry manager, log manager, error manager, and a security manager. The codes manager reads codes from a local database on the client, marshals the codes into objects, and makes them available to...
The link between the content ID and the media ID may be dynamically changed through the controller. This may be advantageous, to provide for example, a Top 10 song card that has indicia thereon that may be a title “Top 10 Song Card” and a RFID tag thereon which can be used to ...