Here is how it works: the utility defines a system exception condition
with the analytics templates; next the utility decides which accounts to monitor for the exception condition
; then they decide who to alert when there is an exception and how (to-do list, email, SMS text, or system dashboard): ReadCenter Analytics continually monitors incoming system data for the exception condition
and then notifies the appropriate personnel when it occurs; utility personnel can then decide what action to take.
For example, when an agent falls out of schedule adherence, the agent's name and exception condition
is displayed on a screen after exceeding a pre-determined threshold.
ASFA does not prohibit the provision of reunification services when a reunification exception condition
The last exception condition
is handled by blocking garbage collection until the lock is cleared.
Connecting plants and warehouses also reduces problem resolution by e-mail, because exception conditions
are addressed before they escalate into problems.
McDermid, "Automated test-data generation for exception conditions
," Software: Practice and Experience, vol.
It can also be useful to have SAS/SATA traffic generators that allow the user to take full control over the protocol and verify that the host or device can handle various exception conditions
. The oscilloscope should preferably be a 4+ GHz real-time scope, but a repetitive sampling scope with 4+ GHz bandwidth can also be used.
MAINVIEW for IP provides proactive notification of exception conditions
, enabling customers to resolve problems before they become issues for their users, as well as real-time and historical reporting and monitoring on SLAs to ensure high quality of service.
The system alerts administrators to exception conditions
, tracking data entry errors, compliance issues and possible training deficiencies.
The SLA must identify potentially dangerous exception conditions
, like a router suddenly doubling its level of activity, or a particular server rapidly increasing its output of files onto the network--or alternatively, maybe that a user is conducting some unauthorized activity that needs to be nipped in the bud.
Verano's supply chain event management solution provides the capability to monitor alarms, exception conditions
and data acquisition in real time.