BPAL Administration components are provided through a secure user based access allowing an authorized user to perform Administrative and Management functions such as establishing Vendors, Products, Contracts, Payment types, Payment Rates, Bar coded cards, etc.

Incorporated BPAL Administrative Features: 

Master Tables

Feature, creation and maintenance of database tables for a host of parameters such as supplier ID, carrier ID, product types and their codes etc.

Purchase of Feedstock in bulk 


– creation of supplier/carrier contracts define standardized client specific parameters that are retrieved from the appropriate Master tables during the contract creation process.  Using the normalized Contract Format, specific client customization is based on a facility management’s precise business rules which become BPAL integrated methods that are then available for the contract creation process. Typical contract business rules allow for the selection of multiple rates for a mapped multiple period table, product profiles, quantity, unit of measure, chose of sampling methods each corresponding to a spaced frequency cycle that is explicitly defined.

Creation of Feedstock Delivery Transactions 


A delivery transaction is immediately created following the completion of the inbound vehicle weigh cycle process. This is then stored in the transaction database. Other associated data, which originate from multiple related transaction event sources, are then progressively posted to the transaction database.

Examples of transaction events include:

  • inbound/outbound weigh processing cycle generates a weight data element that is inserted within its corresponding transaction record all of which enables calculating the gross weight received by the facility. For this transaction event, the calculation that could take place would be inbound less outbound measured vehicle weights for bulk feedstock reception and the reverse for outbound external delivery of other stock
  • contaminant evaluation using extracted samples whose selection is derived using a delivery cycle method. Samples are examined in a lab using client selectable testing protocols to evaluate content amounts by percent for specifically defined contaminants. Results are then utilized by client specific business rules that govern payment calculations, and which had been established by product type
  • payment calculation by choice of period such as weekly, biweekly, monthly or any other period format. BPAL includes proprietary sampling algorithms which select samples for testing. This process is applied to each retrieved supplier group of samples and significantly reduces overall lab test cycles. Results derived from all targeted sample tests of each supplier are utilized to generate either simple, weighted or rolling averages. The supplier selected averaging method is used by a generic transaction calculator to determine payment for the supplier’s corresponding set of transactions.
  • transaction corrections can be invoked by an authorized user. Upon detection of a correction, BPAL automatically creates a credit note to cancel the original invoice and a debit as a new replacement invoice. This cycle continues indefinitely and seamlessly traversing payment periods. All is automated to reflect the current reality. All data from such events is logged so that audits can be carried out when necessary to examine cause and reason to understand result. 

Business Intelligence


-information is an asset. Its timely availability is an associated asset. BPAL treats both such considerations with significant thoroughness. Consequently, there are many information access features in BPAL. 

Examples of information access or transfer events include:

  • on-line information search access by authorized personnel using computer devices on the network of the facility and connected to BPAL’s Server. Such accesses show details in a precise format that corresponds to selected user input parameters derived by invoking one of many access methods incorporated in BPAL. 
  • information search access invoked by remote devises, and which can consist of mobile phones and remote laptops etc. all of which must be assigned to authorized personnel and all security protected by encryption techniques.
  • information transfer to external destinations all of which are inscribed under the security segment for this feature. Transfer of information is automatically executed based on date and time scheduling and is sent via email to specific and authorized staff and or external business entities as authorized. 
  • on-reports are available in real-time and can be accessed by authorized local remote users.
  • scheduler for information delivery to internal and or external recipients. Delivery of information utilizing the scheduler can be transferred different formats such as reports and or email. All such transfers are controlled by pre-set date and time assignments which are inserted by authorized personnel within the scheduler parameter profile. In addition, the scheduler is utilized to trigger a multitude of operational and or administrative functionalities to be performed at specified date and time settings all of which is controlled by authorized administrative personnel.  
  • connectivity to corporate systems utilizing WAN pathways permits user authorized information to be transferred to other remote corporate system