The document promotes kanzalooTM, a microbilling platform from ATLAS Interactive that combines premium SMS, web billing, and premium rate solutions. KanzalooTM allows users to make micropayments on mobile phones and online to purchase digital goods and services. It offers global coverage, easy integration, and guarantees payouts in most countries. KanzalooTM provides a convenient payment method for industries like gaming, social media, and publishing.
This document discusses software engineering processes. It describes a process framework that includes framework activities like communication, planning, modeling, and testing. It also includes umbrella activities like project management, quality assurance, and configuration management. The document states that the framework activities will always be applied to projects but the tasks may vary depending on the project type and characteristics. It also discusses process models like CMMI, process patterns, and process assessment and improvement methods. Finally, it covers personal and team software processes.
This document discusses number systems used in digital electronics and logic design. It covers the decimal, binary, octal, and hexadecimal number systems. Techniques for converting between these different number systems are presented, including dividing or multiplying by the base and grouping bits. Conversions can be done through binary, decimal, or other bases as intermediaries. Exercises are provided to practice number system conversions without using a calculator.
The document discusses several topics related to operating systems and software development models:
1) It describes the waterfall model of software development and its stages of requirements, design, implementation, testing, installation, and maintenance. It also discusses the strengths and weaknesses of this model.
2) It introduces the spiral model as an enhancement of the waterfall model that adds risk analysis and prototyping. The spiral model proceeds through four quadrants of planning, risk evaluation, development, and planning for the next iteration.
3) It covers the five generations of computers from the first generation using vacuum tubes through to the present fifth generation focusing on artificial intelligence. It highlights the technological advances between each generation.
4) It provides
This document discusses database management system (DBMS) languages including data definition language (DDL), data manipulation language (DML), and storage definition language (SDL). It states that DDL is used by database administrators and designers to define the database schema, DML is used to retrieve and update data, and SDL may be used separately from DDL to define storage structures. It provides examples of DDL commands in SQL like CREATE TABLE and ALTER TABLE.
The document promotes kanzalooTM, a microbilling platform from ATLAS Interactive that combines premium SMS, web billing, and premium rate solutions. KanzalooTM allows users to make micropayments on mobile phones and online to purchase digital goods and services. It offers global coverage, easy integration, and guarantees payouts in most countries. KanzalooTM provides a convenient payment method for industries like gaming, social media, and publishing.
This document discusses software engineering processes. It describes a process framework that includes framework activities like communication, planning, modeling, and testing. It also includes umbrella activities like project management, quality assurance, and configuration management. The document states that the framework activities will always be applied to projects but the tasks may vary depending on the project type and characteristics. It also discusses process models like CMMI, process patterns, and process assessment and improvement methods. Finally, it covers personal and team software processes.
This document discusses number systems used in digital electronics and logic design. It covers the decimal, binary, octal, and hexadecimal number systems. Techniques for converting between these different number systems are presented, including dividing or multiplying by the base and grouping bits. Conversions can be done through binary, decimal, or other bases as intermediaries. Exercises are provided to practice number system conversions without using a calculator.
The document discusses several topics related to operating systems and software development models:
1) It describes the waterfall model of software development and its stages of requirements, design, implementation, testing, installation, and maintenance. It also discusses the strengths and weaknesses of this model.
2) It introduces the spiral model as an enhancement of the waterfall model that adds risk analysis and prototyping. The spiral model proceeds through four quadrants of planning, risk evaluation, development, and planning for the next iteration.
3) It covers the five generations of computers from the first generation using vacuum tubes through to the present fifth generation focusing on artificial intelligence. It highlights the technological advances between each generation.
4) It provides
This document discusses database management system (DBMS) languages including data definition language (DDL), data manipulation language (DML), and storage definition language (SDL). It states that DDL is used by database administrators and designers to define the database schema, DML is used to retrieve and update data, and SDL may be used separately from DDL to define storage structures. It provides examples of DDL commands in SQL like CREATE TABLE and ALTER TABLE.
This document discusses different data models used to describe database structures, including the relational, entity-relationship, object-based, and semi-structured models. It focuses on explaining the entity-relationship model and its key concepts such as entities, attributes, relationships, cardinalities that define the number of relationships between entities, and participation constraints on entity involvement in relationships.
This document discusses relational algebra and relational calculus operations used in relational database systems. It describes basic relational algebra operations like selection, projection, union, set difference, and cartesian product. It also covers additional operations like natural join, outer join, division, and aggregate functions. Finally, it provides an overview of tuple relational calculus and the notations used, such as tuple variables, predicates, quantifiers, and logical connectives.
The document discusses various topics related to computer networks and the Internet. It begins by defining what a network is and provides examples of point-to-point and multipoint connections. It then covers different network topologies like mesh, star, bus, ring and hybrid. The next sections discuss local area networks (LANs), metropolitan area networks (MANs) and wide area networks (WANs). It also distinguishes between a network and the Internet. The document concludes by explaining important Internet concepts like HTTP, URLs, and IP addresses.
This document discusses Karnaugh maps, which are grids that allow finding the simplest algebraic expression for a truth table. It outlines the steps for Karnaugh mapping as sketching the grid, filling in the truth table values, circling groups of 1s starting with the largest, and writing an equation using the circles. Examples of mapping different functions are provided.
This document provides an overview of cyber-safety topics including common cyber threats like viruses, hackers, and identity theft. It outlines consequences of not taking cyber-safety actions, such as loss of access to computing networks or legal issues. The document recommends seven key cyber-safety actions: installing operating system and software updates, running anti-virus software, preventing identity theft, using personal firewalls, avoiding spyware/adware, protecting passwords, and backing up important files. It also provides cyber-safety tips for home, work, and campus computing resources and services available to the university community.
The document discusses database systems and Entity-Relationship (E-R) modeling. It defines various symbols and concepts in E-R diagramming such as entity types, attributes, relationships and cardinalities. It also outlines the process of designing a database schema including requirements analysis, conceptual design, logical design and physical design. Specialization, generalization and other enhanced E-R modeling features are presented with examples. Finally, it provides a brief history of database systems from the 1950s to the present.
The document discusses different types of keys in database systems including primary keys, super keys, candidate keys, and foreign keys. It defines each key type and provides examples. Primary keys uniquely identify records in a table, super keys can uniquely identify records but are not minimal, candidate keys are minimal super keys, and foreign keys reference primary keys in other tables. The document also discusses domains which define a range of valid values for attributes. Finally, it covers keys in relationship sets which are formed from the primary keys of the related tables plus any relationship attributes.
This document provides an overview of database systems and concepts. It defines key terms like data, information, database, database management system (DBMS), and discusses the advantages of database systems over file systems for storing and managing organizational data. It also covers database schemas and instances, different levels of data representation (physical, logical, view), and the importance of data independence between schemas for application flexibility. The goal of the document is to introduce foundational database concepts.
The document discusses digital logic design and Boolean algebra. It covers topics like logic gates, truth tables, Boolean expressions, simplifying expressions using identities like DeMorgan's laws, converting between sum of products and product of sums forms. Circuit examples are provided to illustrate converting circuits to truth tables. The dual principle and product terms are also introduced.
This document provides an overview of computer networks and the internet. It defines key network terms like LAN, WAN, topology, protocols, and internet connections. It describes different network topologies like star, bus, ring and their advantages. It explains internet services like www, ftp, telnet and email. It discusses how analog and digital data is transmitted over networks and the role of modems. The document is presented as part of a course on fundamental computer principles and programming.
Software engineering Questions and AnswersBala Ganesh
1. Risk management is the process of identifying, addressing, and eliminating potential problems that could threaten the success of a project before they cause damage. This includes issues that could impact cost, schedule, technical success, product quality, or team morale.
2. HIPO (Hierarchical Input Process Output) diagrams were developed at IBM as a design representation and documentation aid. They contain a visual table of contents, overview diagrams, and detailed diagrams.
3. Software maintenance is any work done to modify software after it is operational, such as fixing errors, adding capabilities, removing obsolete code, or optimizing performance. It aims to preserve the software's value over time as requirements, users, and technology change. M
This document discusses different data models used to describe database structures, including the relational, entity-relationship, object-based, and semi-structured models. It focuses on explaining the entity-relationship model and its key concepts such as entities, attributes, relationships, cardinalities that define the number of relationships between entities, and participation constraints on entity involvement in relationships.
This document discusses relational algebra and relational calculus operations used in relational database systems. It describes basic relational algebra operations like selection, projection, union, set difference, and cartesian product. It also covers additional operations like natural join, outer join, division, and aggregate functions. Finally, it provides an overview of tuple relational calculus and the notations used, such as tuple variables, predicates, quantifiers, and logical connectives.
The document discusses various topics related to computer networks and the Internet. It begins by defining what a network is and provides examples of point-to-point and multipoint connections. It then covers different network topologies like mesh, star, bus, ring and hybrid. The next sections discuss local area networks (LANs), metropolitan area networks (MANs) and wide area networks (WANs). It also distinguishes between a network and the Internet. The document concludes by explaining important Internet concepts like HTTP, URLs, and IP addresses.
This document discusses Karnaugh maps, which are grids that allow finding the simplest algebraic expression for a truth table. It outlines the steps for Karnaugh mapping as sketching the grid, filling in the truth table values, circling groups of 1s starting with the largest, and writing an equation using the circles. Examples of mapping different functions are provided.
This document provides an overview of cyber-safety topics including common cyber threats like viruses, hackers, and identity theft. It outlines consequences of not taking cyber-safety actions, such as loss of access to computing networks or legal issues. The document recommends seven key cyber-safety actions: installing operating system and software updates, running anti-virus software, preventing identity theft, using personal firewalls, avoiding spyware/adware, protecting passwords, and backing up important files. It also provides cyber-safety tips for home, work, and campus computing resources and services available to the university community.
The document discusses database systems and Entity-Relationship (E-R) modeling. It defines various symbols and concepts in E-R diagramming such as entity types, attributes, relationships and cardinalities. It also outlines the process of designing a database schema including requirements analysis, conceptual design, logical design and physical design. Specialization, generalization and other enhanced E-R modeling features are presented with examples. Finally, it provides a brief history of database systems from the 1950s to the present.
The document discusses different types of keys in database systems including primary keys, super keys, candidate keys, and foreign keys. It defines each key type and provides examples. Primary keys uniquely identify records in a table, super keys can uniquely identify records but are not minimal, candidate keys are minimal super keys, and foreign keys reference primary keys in other tables. The document also discusses domains which define a range of valid values for attributes. Finally, it covers keys in relationship sets which are formed from the primary keys of the related tables plus any relationship attributes.
This document provides an overview of database systems and concepts. It defines key terms like data, information, database, database management system (DBMS), and discusses the advantages of database systems over file systems for storing and managing organizational data. It also covers database schemas and instances, different levels of data representation (physical, logical, view), and the importance of data independence between schemas for application flexibility. The goal of the document is to introduce foundational database concepts.
The document discusses digital logic design and Boolean algebra. It covers topics like logic gates, truth tables, Boolean expressions, simplifying expressions using identities like DeMorgan's laws, converting between sum of products and product of sums forms. Circuit examples are provided to illustrate converting circuits to truth tables. The dual principle and product terms are also introduced.
This document provides an overview of computer networks and the internet. It defines key network terms like LAN, WAN, topology, protocols, and internet connections. It describes different network topologies like star, bus, ring and their advantages. It explains internet services like www, ftp, telnet and email. It discusses how analog and digital data is transmitted over networks and the role of modems. The document is presented as part of a course on fundamental computer principles and programming.
Software engineering Questions and AnswersBala Ganesh
1. Risk management is the process of identifying, addressing, and eliminating potential problems that could threaten the success of a project before they cause damage. This includes issues that could impact cost, schedule, technical success, product quality, or team morale.
2. HIPO (Hierarchical Input Process Output) diagrams were developed at IBM as a design representation and documentation aid. They contain a visual table of contents, overview diagrams, and detailed diagrams.
3. Software maintenance is any work done to modify software after it is operational, such as fixing errors, adding capabilities, removing obsolete code, or optimizing performance. It aims to preserve the software's value over time as requirements, users, and technology change. M
2. ATLAS GROUP OF COMPANIES
A Global Footprint
ATLAS GROUP
11%
๏ The ATLAS Group, through its main divisions, provides a range of added value solutions and innovative
services to its customers in over 70 countries.
๏ The Group is privately held and self funded since its foundation in 1994.
ATLAS INTERACTIVE
BUSINESS UNITS
๏ Brazil The German branch of ATLAS Interactive provides a unique portfolio of access
๏ Germany and billing solutions via premium SMS (wireless value added services), via
๏ USA Domestic Premium Rate Numbers and other international solutions for markets
๏ Lebanon around the globe.
๏ UK Additionally, we can offer a comprehensive portfolio of salient complementary
services and applications such as IVR inbound & outbound services, marketing
opportunities in various regions.
www.atlasinteractive.de
3. OVERVIEW
MICROPAYMENT MARKETING END-USER
SERVICES SUPPORT
๏ Premium SMS ๏ Vreach ๏ IVR
๏ Premium Rate ๏ Bulk SMS ๏ Call Center Support
๏ Webbilling ๏ Service Numbers
๏ Multi-lingual
MARKETING OTHER
PLATFORMS SERVICES
๏ MENA ๏ 0900 Guaranteed Payout
๏ tasalla.me ๏ Shopping Basket
๏ ATLAS Premium Brands ๏ Custom Billing Solutions
www.atlasinteractive.de
5. MICROPAYMENT SOLUTION
kanzaloo™
kanzaloo™ is the latest product from ATLAS Interactive. ATLAS Interactive is now bringing their most popular
premium billing solutions into one product with kanzaloo™.
kanzaloo™ combines Premium SMS, Web Billing, and Premium Rate Solutions to make a product that makes
it easier to understand and even easier to use. With a reputation of working with some of the largest companies in
the world and having the must have relationships with the top mobile carriers around, kanzaloo™ is able to not
only provide an all-in-one product, but the service and expertise clients of ATLAS Interactive expect and deserve.
Whether you are in the gaming industry, social networking business, publications, or any other industry selling
digital goods, you can take advantage of the premium billing solutions from kanzaloo™.
With more and more people owning mobile phones and even more ditching their credit cards, it only makes sense
to offer the easy to use payment method for your goods. kanzaloo™ is tailored with you in mind, and with the
knowledge and expertise from ATLAS Interactive, you can see your sales increase.
ATLAS Interactive has over 15 years experience in handling micro transactions.
www.atlasinteractive.de
6. MICROPAYMENT SOLUTION
kanzaloo™
SMS WEB BILLING Premium Rate
Pay Per Pay Per
MO MO/MT MT Minute Call
Billing Billing Billing
*MO Billing - Mobile Originated Billing
*MT Billing - Mobile Terminated Billing
**kanzaloo offers Premium SMS, Web Billing and Premium Rate Solutions on a global scale, however certain countries may have restrictions on any of the above mentioned services.
www.atlasinteractive.de
7. MICROPAYMENT TRANSACTIONS
with kanzaloo™
๏ Coverage of approximately 75+ countries for domestic billing solutions
๏ Technical resources with several SMS & IVR gateways, unique redundancy and
scalability features
๏ Advanced fraud protection and blacklisting/high spender policies
๏ kanzaloo™ provides an easy to integrate HTTP interface for all countries
๏ Delivery/billing receipts (DLR) are provided if supported by the operators
๏ Worldwide coverage through international long numbers
๏ Blacklisting API to be integrated in your customer care tools
๏ Guaranteed payouts in most of the countries
www.atlasinteractive.de
9. MARKETING SERVICES
Bulk SMS
KEY FACTS:
๏ State-of-art Messaging Delivery Platform
๏ High Performance: Direct delivery of SMS over direct gateway link
๏ Cost effective: Costs per message without setup or monthly fees
๏ Alpha-numeric originator support
๏ High throughputs per link
๏ SMPP/HTTP/UCP connectivity
๏ WAP push / Long Text capability
๏ Sending Bulk SMS over WEB and file upload
www.atlasinteractive.de
10. VREACH
Overview
With Vreach you are able to automatically send voice messages to your target group.
There are various possibilities to use Vreach. Your Advantages:
๏ standardized and automated calling process
๏ direct customer contact
๏ address of accurate target group
๏ individual implementation and analysis of your campaign
๏ simple monitoring of campaign success
๏ Billing- and IVR solutions from one source!
We design individualized IVR application that fit to the needs of our clients. Our in- and outbound IVR solutions will make
your services more appealing.
www.atlasinteractive.de
11. VREACH
In-Game Alerts
๏ You define your campaign requirements.
๏ ATLAS Interactive will prepare the system so it fits to your individual needs and leases the individual configured
system to you.
๏ You upload the voice files that the user shall hear into the system.
๏ Through a HTTP-Interface you manage the outbound system. This way you can control exactly at what time, which of
your users shall receive a certain voice message.
๏ At any time you have full control of your campaigns and you can design your individual voice interaction concept for
your games.
definition and feed of
technical self-contained monitoring of
customer data
preparation of the realization of success through
and campaign
project campaign statistics
details
www.atlasinteractive.de
13. SERVICE NUMBERS & IVR
Overview
IVR:
We provide a wide range of IVR services. Our IVR servers are state of the art, and we are able to attend to your
individual needs. There is a wide spectrum of solutions helping you to optimize your end user support hotlines
through IVR technology. Ask us for further details
PREMIUM RATE NUMBERS:
Generally Premium rate numbers are used for premium content like special applications and services. Therefore
customers have to pay higher calling rates. From the price the enduser pays for calling a premium rate number the
number owner will receive a payout. Numbers are flexibly billed to the end user. The calling party will be charged
per minute or per call depending on the business model for the service. Premium rate numbers are mostly used for
entertainment, chat service, content billing, competitions, voting's and etc.
FREEPHONE:
Freephone is a service number with no costs for the calling party. All expenses will be paid by the number using
company. In most countries these numbers begin with 0800. It is common to use freephone numbers for successful
acquisition of new customers by giving more information about products and services.
SHARED COST NUMBERS:
For shared cost service connecting fees will be splitted between the caller and the company which owns the
service number. The callers pay a small amount per minute. Costs vary form country to country. These numbers
are mostly used for services such as customer support and 24h hotlines.
MASS CALLING:
In some countries, special premium rate number ranges are used for applications with high volume of traffic during
limited time periods. This number range can mostly be found on TV for voting and competition applications.
www.atlasinteractive.de
15. MARKTING PLATFORMS
Overview
ATLAS PREMIUM BRANDS:
ATLAS Premium Brands has exclusive rights with some of the ATLAS Interactive Deutschland and its sister
worlds top Football Leagues, Real Madrid and others. With these company ATLAS Interactive Middle East are joining
rights, ATLAS Premium Brands is able to give exclusive content forces to launch the premier tasalla.me gaming
to its clients for use in games, online communities and much
more. portal. The tasalla.me gaming portal gives you the
opportunity to publish your games to a huge
With video clips, artwork, interviews, and more you will be able
to give the consumer content for some of the worlds leading audience in the Middle East with the help of ATLAS
Football Leagues. Interactive. The tasalla.me gaming portal will
include browser based games, chat features,
downloadable games, and mobile applications.
www.atlasinteractive.de
16. OUR USPS
ATLAS Interactive Deutschland GmbH
๏ Orientation on your individual demands, highest possible flexibility
๏ Internationality, wide know how and market knowledge
๏ Reliability, correct invoices, punctual payments to you
๏ Reasonable, market orientated conditions
๏ Customer orientation, best possible availability
๏ Wide range of products and services
๏ Fast decisions
๏ Informative, customer orientated web tools
๏ Praxis oriented process (e.g. order process, billing and statistic management)
www.atlasinteractive.de
17. SOME OF OUR REFERENCES
ATLAS Interactive Deutschland GmbH
GAMING
INDUSTRY
TELECOMMUNICATION
INDUSTRY
1
MEDIA
INDUSTRY
www.atlasinteractive.de
18. CONTACT INFORMATION
ATLAS Interactive Deutschland GmbH
ATLAS Interactive Deutschland GmbH
Tel. +49 40 41 33 00 185
Fax
+49 40 41 33 00 200
Email
sales@atlasinteractive.de
Web
www.atlasinteractive.de
Company Address
ATLAS Interactive Deutschland GmbH
Christoph-Probst-Weg 3
D-20251 Hamburg / Germany
IT Office
Engelbertstr. 38 A
D-50674 Köln / Germany
www.atlasinteractive.de