CS410 – Professional Workforce Development Orange Team Phone Solicitation Management System Feasibility Presentation, 6th March 2008 Presented by Benjamin Leyland
Benjamin Leyland Manager Presenter Finance March 6, 2008
Travis Burlock Hardware Webmaster March 6, 2008
Dionna Diggs Asst. Manager Legal Eagle March 6, 2008
Bob Larrick Software Marketing March 6, 2008
Josh Rode Documentation March 6, 2008
How we’re organized March 6, 2008
THE PROBLEM March 6, 2008
Unwanted phone solicitation still occurs. Even with current legislation and the Do-Not-Call-List. March 6, 2008
Effects of the Problem Annoying Interrupting Waste of time March 6, 2008
What is Phone Solicitation? A telephone call that acts as an advertisement. Estimated that 4 million "junk" telephone calls are made every day in the United States. Source 1: FCC (www.fcc.gov) Source 2: Strangefacts (www.strangefacts.com) March 6, 2008
Current FCC Regulations Phone solicitors are required to transmit or display: - Their contact phone number - The name of the soliciting company Source: FCC (http://www.fcc.gov/cgb/consumerfacts/tcpa.html) March 6, 2008
Source: FCC (www.fcc.gov) The Do Not Call List Numbers can be registered online or over the phone. The majority of solicitors are prohibited from calling those on the list. Source: FCC (www.fcc.gov) March 6, 2008
Source: FCC (www.fcc.gov) Who Can Still Call? Organizations that you have established a business relationship with Non-profit organizations Callers with prior permission Source: FCC (www.fcc.gov) March 6, 2008
Do Not Call List Statistics Makes up 76% registered 43% 33% 24% Source: Harris Interactive (www.harrisinteractive.com) March 6, 2008
Customer Potential customer = 46% of American adults 76% have placed their phone numbers on the NDNC registry. 61% of people on the registry still receive unsolicited calls. Source 1: FTC (www.ftc.gov) Source 2: Harris Interactive (www.harrisinteractive.com) March 6, 2008
Major Functional Components March 6, 2008
System Capabilities Blocking of calls System configuration Per call basis Area code Wild cards Those contained in the global database System configuration Configuration software (PC) Hardware connected to phone line March 6, 2008
Incoming Call Intercept Pass To Phone Answer March 6, 2008
Should It Be Blocked ? March 6, 2008 Intercept Check Local Settings Search DB Block Call Pass To Phone Answer March 6, 2008
Flagging an Unwanted Call Answer Manually Flag Add To Local DB Send To Global DB March 6, 2008
Inform Global Database Flagged Number Check for Other Notices Tolerance Exceeded Increment Record Add To DB March 6, 2008
Refresh Global Database DB Check Last Report No Longer In Service Remove From DB March 6, 2008
Request Database Update Compare Versions Prepare Update Send Up-To-Date Send Update Update Local DB March 6, 2008
Required Hardware Modem LCD Wireless adapter Memory Database server March 6, 2008
Specialty Hardware Call interception device will be a custom built unit It’s components are readily available OTS March 6, 2008
Required Software Configuration application Database management software Interception/screening software March 6, 2008
What’s In The Box Call interception device Configuration Software March 6, 2008
What’s Not In The Box Caller ID Subscription Computer Internet Connection Wireless Network March 6, 2008
Competition Matrix March 6, 2008
Risks Availability of wireless networks in homes Security Cost Accidental blocks Difficulty of use March 6, 2008
Risk Matrix March 6, 2008
Risk: Wireless Networks The Risk: Only 12% of US households have a wireless network The Mitigation: Different options of implementation which do not require a wireless network Source: Pew Internet Project (http://www.pewinternet.org/pdfs/PIP_Wireless.Use.pdf) March 6, 2008
Risk: Security The Risk: Hacking Spoofing Other sabotage of the online database or personal database The Mitigation: Standard security techniques March 6, 2008
Risk: Cost The Risk: The Mitigation: High cost Monthly fee Look for lower cost hardware Different options of implementation March 6, 2008
Risk: Accidental Blocks The Risk: Customers blocking numbers they don’t want to block Numbers being added to the online database who aren’t telemarketers The Mitigation: Fully customizable filters Set up a threshold for adding a number to the online database March 6, 2008
Risk: Difficulty of Use The Risk: The device is too difficult for people to set up or use The Mitigation: Make it easier Different options of implementation which allow for easier use March 6, 2008
Experts Needed Embedded Systems Engineer Online Database Administrator Security Expert March 6, 2008
Coordinating Communication Email Instant Messenger Group Chat March 6, 2008
Preliminary Cost Estimates Basic Caller ID boxes1: ~$15 Additional memory (~2GB)2: ~$12 Processor2: ~$8 Wireless components3: ~$15 Total: ~$50 Source 1: Google Shopping (http://www.google.com/products?hl=en&client=firefox-a&rls=org.mozilla:en-US:official& resnum=0&q=Caller+ID+Box+Prices&um=1&ie=UTF-8) Source 2: Engadget (http://www.engadget.com/2007/09/19/isuppli-new-ipod-nanos-cost-apple-just-59-and-83-in-component/) Source 3: iSuppli (http://www.isuppli.com/news/default.asp?id=7308) March 6, 2008
Cost for the Customer: ~$60 initial cost + ~$5 monthly fee Based On: Cold Call Blocker (http://www.coldcallblocker.com/faq/) March 6, 2008
Alternative Approach No wireless network Uses the modem to dial in to the database March 6, 2008
Benefits of this approach Larger market Cheaper to build Easier to install March 6, 2008
Problems with this approach Ties up phone line for updates Slow data transfer Have to provide dial-up numbers March 6, 2008
Conclusion Phone users are still affected by unsolicited calls. No current solution solves this problem. Our solution is feasible. Questions? March 6, 2008