主权项 |
1. A computerized-method of integrating workforce information data received from a plurality of business units, the method comprising:
receiving, by a computing device, encrypted workforce information and parameters from each of a plurality of business units; storing, by the computing device, the encrypted workforce information in a workforce information data repository; during a first clock cycle, a) retrieving, by the computing device, a first parameter of a particular business unit of the plurality of business units, b) determining, by the computing device, a first identifier and a first size of a first data block based on the retrieved first parameter and c) retrieving a decrypting, by the computing device, the first data block of the first size from the workforce information data repository; during a second clock cycle, a) retrieving, by the computing device, a second parameter of a particular business unit of the plurality of business units, b) determining, by the computing device, a second identifier and a second size of a second data block based on the retrieved second parameter c) retrieving and decrypting, by the computing device, the second data block of the second size from the workforce information data repository and d) determining, by the computing device, a first set of one or more rules based on the first identifier of the first data block and requirements of a first consuming application and e) creating, by the computing device, a first consuming application ready data block by applying the first set of one or more rules to the first data block; and during a third clock cycle, a) retrieving, by the computing device, a third parameter of a particular business unit of the plurality of business units, b) determining, by the computing device, a third identifier and a third size of a third data block based on the retrieved third parameter c) retrieving and decrypting, by the computing device, the third data block of the third size from the workforce information data repository, and, d) determining, by the computing device, a second set of one or more rules based on the second identifier and requirements of a second consuming application, and e) creating, by the computing device, a second consuming application ready data block, by applying the second set of one or more rules to the second data block, and f) transmitting, by the computing device, the first consuming application ready data block to the first consuming application. |