Depending on your background, you will want to understand how SolveXia works in different way. Below we have a couple of different ways of understanding what we do.
If you like ‘big picture’ metaphors…
Everyone is familiar with the idea of the robotic production line. A group of robots, each of which performs a specialised task, are lined up next to a conveyor belt. As items move along the conveyor belt – each robot takes its turn in doing its job on the product sitting on the conveyor belt.
Our solution implements a similar concept. We provide a virtual production line – with conveyor belts and robots – that clients can configure to automate their own processes.
Our robots work on packages of data, and our conveyor belt is moving clients’ files past each of these robots. We provide everything the client needs to put this production line together – the environment and the robots. Through a browser interface, our clients can quickly configure what their unique production line looks like. We offer more than 40 robots for working with data – and this number is growing every month. Some of our clients have highly specialised needs, and require “custom robots”. We can create these for them as well. We have created highly specialised “robots” for clients including those for running actuarial projection systems and processing airline flight data from IATA.
Our “factory” provides clients with immediate and accurate reports on their production lines at any point in time. These production lines offer a repeatable way of processing data. Other team members can review, start, stop and change the production line. A process is therefore no longer a “black box” that only a select few people in the organisation can understand and perform. As a result of automation, the production line can run much faster, through all hours of the night and without getting tired or making mistakes.
Clients typically setup several different production lines, each with 20 or more robots. Each production line represents a process within their business. One of the great advantages of this virtual production line over the traditional production line is that it can be reconfigured at any time – almost instantly and at no cost other than a little of the client’s time. As business needs change, clients can quickly and cheaply reconfigure their production line to suit the new circumstances.
This is the basic concept behind SolveXia’s process automator. In the section below, we go to the next level of detail and take a look at what the solution looks like in real life.
If you like technical details…
This explanation is for people who like to see the ‘internal nuts and bolts’ of how things work. The diagram below describes 7 points about how data travels through the service. The notes below the diagram provide further details about each step along the way.
- Data capture : Clients sign into the service using unique credentials. Once signed in – they can design or run processes. When running processes, they select which information is to be used as inputs to their process, and upload these in the form of Excel, Text, Access or CSV files using one of three supported browser platforms. Not everything has to be file based, processes can also take client supplied parameters that they can type in at the point in time of running the process. When designing process, the client is working with a graphical interface that allows them to specify a sequence of instructions for how data should be manipulated.
- Data Transport : Data is sent through an encrypted SSL conversation to our web servers. Our infrastructure does not support unencrypted traffic, so there is no option to communicate with our server using unprotected protocols over the web. Within these encrypted conversation, we also apply an additinoal layer of encryption sensitive information such as credentials.
- Data Storage : Data is stored in a secure and encrypted relational database that is dedicated for each client. We do not store data from different clients in the same database. These databases are the only points within the entire service where data is stored, as we do not permit data storage in cookies, or on the web servers.
- Data Backup : Periodically (hourly) backups are made of the data in the client databases. These are encrypted and securely transmitted to a separate secured disk array. Each client has their own backup sets – there is no interleaving of backup data.
- Data Processing : When the automated process runs, selected elements of data are taken from the database to a “processing engine” where they are processed. Once completed, the results are stored back into the relational database, and all data is deleted/removed from memory on the processing engine. These machines have no direct interaction with the “outside world”.
- Data Retrieval : When signed into the service – using their secured and unique credentials, clients can download files from their processes for review. These download requests are first vetted by the hardware firewall, then by the application security architecture. Once authorised, the requested file ( or file version ) is retrieved from the database and streamed to the client by the webserver inside an encrypted SSL conversation.
- Enterprise Firewall : A dedicated hardware firewall surrounds all the infrastructure. All communications with our infrastructure pass through a dedicated hardware firewall that has intrusion detection and prevention tools deployed.