CS410 – Professional Workforce Development Orange Team

Slides:



Advertisements
Similar presentations
National Database Templates for the Biosafety Clearing-House Application (NDT-nBCH) Overview of the US nBCH Applications.
Advertisements

CS 501: Software Engineering Fall 2000 Lecture 27 Software Engineering as Engineering.
Internet, Intranet and Extranets
WHAT… Myrket is a B2B online advertising agency focused on e-marketing services; Main Services: e-marketing strategies; website development; search engine.
Senior Design Project 2004/2005 Web Enabled Calling Number Delivery Daniel St. Clair Barron Shurn Professor Soules 10/28/2004.
I want my IPTV? By Yayati Khandeshi. What is IPTV?  IPTV does not mean that a person will log on to a webpage to watch their favorite TV shows over 
Sales Careers.  Personal Selling is any form of direct contact between a salesperson and a customer.  The key factor that sets it apart from other forms.
SMS Gateway OZEKI NG Document version: v Adding SMS functionality to SysAid.
Internet Business Strategies A strategic view of the various options and connectivity levels available to business through the Internet. Copyright 2011.
November 2009 Network Disaster Recovery October 2014.
User Services. Services Desktop Support Technical Support Help Desk User Services Customer Relationship Management.
1 CS410 – Professional Workforce Development Orange Team Telephone Management System Final Presentation, 6 th May 2008 Presented by Benjamin Leyland Final.
Term 2, 2011 Week 3. CONTENTS The physical design of a network Network diagrams People who develop and support networks Developing a network Supporting.
Programming and Application Packages
1 Electrical and Computer Engineering Dynamic Advertising System Preliminary Design Review – October 23, 2009 Team Zink Nicholas Cipriano, Ali Jameel,
Marketing Systems Group Southern California MRA Education Seminar Presentation September 17, 2005 Privacy and Current Issues.
Module 2: Adding Hardware to Windows XP Professional Clients.
Firewalls. Intro to Firewalls Basically a firewall is a __________to keep destructive forces away from your ________ ____________.
2006 SISO Executive Conference Legal Issues in Using Mailing Lists: The CAN-SPAM ACT The Junk Fax Prevention Act The National Do Not Call Registry.
14 December 2005Team Platinum1 Members: Andrew CherryJohn Gedville Ian McKayJoseph March Robert Pilkington Website:
1. Outlines Introduction What is Wi-Fi ? Wi-Fi Standards Hotspots Wi-Fi Network Elements How a Wi-Fi Network Works Advantages and Limitations of Wi-Fi.
West Virginia University Slide 1 Copyright © K.Goseva 2010 CS 736 Software Performance Engineering Comments on Homework #1  Please revise the solution.
NETWORKING COMPONENTS Buddy Steele Assignment 3, Part 1 CECS-5460: Summer 2014.
Apple Inc ISO. Organisation chosen Apple Store The company designs, manufactures and markets personal computers, portable digital.
Overview of Firewalls. Outline Objective Background Firewalls Software Firewall Hardware Firewall Demilitarized Zone (DMZ) Firewall Types Firewall Configuration.
Mobility productivity connectivity convenience security MOBILE PAYMENT SOLUTION ATSONIC installation run registration user guide Connect your PDA to the.
PAYWARE MOBILE API – APP TO APP INTEGRATION. PAYWARE MOBILE API OVERVIEW VeriFone’s PAYware Mobile API provides iPhone developers the ability to easily.
Personal System Administration CS5493. SA SA is a Systems Administrator The SA is responsible for maintaining the overall wellbeing of a computing system.
Planning for CCSAS: IT Infrastructure October 4, 2006.
ONLINE DETECTION AND PREVENTION PHISHING ATTACKS
Yahoo is the one of the topmost “internal portal” on the web that is used for  Homepage customization  Search s  Search as a World Wide Web 
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
How Sage ERP X3 Systems Can Benefit Businesses.  Sage X3 is an affordable and flexible ERP solution designed to help mid-sized companies manage business.
1.4 wired and wireless networks lesson 1
Lecture 6: Cloud Computing
Systems Analysis and Design in a Changing World, Fifth Edition
Chapter 7. Identifying Assets and Activities to Be Protected
Online Canon Printer Support & Customer Services
Office 365 is cloud-based productivity, hosted by Microsoft.
Internet, Intranet and Extranets
INTRODUCTION TO COMPUTER NETWORKS
Set up your own Cloud The search for a secure and acceptable means of gaining access to your files stored at the office from a remote location.
Get to know SQL Manager SQL Server administration done right 
Internet, Intranet and Extranets
GCSE Business Communication Systems Unit 2 – The Business Environment
Booklet365 Office 365 Outlook Add-In Makes Easy Work of Managing Schedules for Fitness Gyms, Sports Associations, Trainers, and Their Customers Partner.
Advisor(s): Dr. Mohammad Pourhomayoun
Full Exam Name: Microsoft Dynamics CRM 2016 Online Deployment
Advanced Security Architecture System Engineer Cisco: practice-questions.html.
Why Will You Need the McAfee Refund Support Number ? Despite the fact that McAfee antivirus has been touted to be the best antivirus software,
D-link Router tech support |Contact Experts now
Unit 9 Network Fundamentals
The “Internet”.
Internet, Intranet and Extranets
Resolve All Mozilla Firefox Errors with Best Mozilla Technical Support How to Fix Website Loading Issues after Updating Firefox?
Call AVG Antivirus Support | Fix Your PC
Get Office 2016 with Office 365 and get down to business
It’s About Time – ScheduleMe Outlook Add-In for Office 365 Enables Users to Schedule Meetings Easily with People Outside of Your Organization Partner Logo.
System And Application Software
Progress leisure OCR GCSE ICT.
Get Enterprise-Grade Call Handling and Control for Microsoft Office 365 and Skype for Business with the Bridge Boss-Admin Executive Console OFFICE 365.
What this activity will show you
INTRODUCTION TO COMPUTER NETWORKS
INTRODUCTION TO COMPUTER NETWORKS
software & cloud computing
CS385T Software Engineering Dr.Doaa Sami
PLANNING A SECURE BASELINE INSTALLATION
Electronic Communication and the Internet
The Internet links private PCs, public networks and business networks together using telephone lines to form one vast world-wide network. It allows computer.
COMPLETE BUSINESS TEXTING SOLUTION
Presentation transcript:

CS410 – Professional Workforce Development Orange Team Phone Solicitation Management System Feasibility Presentation, 6th March 2008 Presented by Benjamin Leyland

Benjamin Leyland Manager Presenter Finance March 6, 2008

Travis Burlock Hardware Webmaster March 6, 2008

Dionna Diggs Asst. Manager Legal Eagle March 6, 2008

Bob Larrick Software Marketing March 6, 2008

Josh Rode Documentation March 6, 2008

How we’re organized March 6, 2008

THE PROBLEM March 6, 2008

Unwanted phone solicitation still occurs. Even with current legislation and the Do-Not-Call-List. March 6, 2008

Effects of the Problem Annoying Interrupting Waste of time March 6, 2008

What is Phone Solicitation? A telephone call that acts as an advertisement. Estimated that 4 million "junk" telephone calls are made every day in the United States. Source 1: FCC (www.fcc.gov) Source 2: Strangefacts (www.strangefacts.com) March 6, 2008

Current FCC Regulations Phone solicitors are required to transmit or display: - Their contact phone number - The name of the soliciting company Source: FCC (http://www.fcc.gov/cgb/consumerfacts/tcpa.html) March 6, 2008

Source: FCC (www.fcc.gov) The Do Not Call List Numbers can be registered online or over the phone. The majority of solicitors are prohibited from calling those on the list. Source: FCC (www.fcc.gov) March 6, 2008

Source: FCC (www.fcc.gov) Who Can Still Call? Organizations that you have established a business relationship with Non-profit organizations Callers with prior permission Source: FCC (www.fcc.gov) March 6, 2008

Do Not Call List Statistics Makes up 76% registered 43% 33% 24% Source: Harris Interactive (www.harrisinteractive.com) March 6, 2008

Customer Potential customer = 46% of American adults 76% have placed their phone numbers on the NDNC registry. 61% of people on the registry still receive unsolicited calls. Source 1: FTC (www.ftc.gov) Source 2: Harris Interactive (www.harrisinteractive.com) March 6, 2008

Major Functional Components March 6, 2008

System Capabilities Blocking of calls System configuration Per call basis Area code Wild cards Those contained in the global database System configuration Configuration software (PC) Hardware connected to phone line March 6, 2008

Incoming Call Intercept Pass To Phone Answer March 6, 2008

Should It Be Blocked ? March 6, 2008 Intercept Check Local Settings Search DB Block Call Pass To Phone Answer March 6, 2008

Flagging an Unwanted Call Answer Manually Flag Add To Local DB Send To Global DB March 6, 2008

Inform Global Database Flagged Number Check for Other Notices Tolerance Exceeded Increment Record Add To DB March 6, 2008

Refresh Global Database DB Check Last Report No Longer In Service Remove From DB March 6, 2008

Request Database Update Compare Versions Prepare Update Send Up-To-Date Send Update Update Local DB March 6, 2008

Required Hardware Modem LCD Wireless adapter Memory Database server March 6, 2008

Specialty Hardware Call interception device will be a custom built unit It’s components are readily available OTS March 6, 2008

Required Software Configuration application Database management software Interception/screening software March 6, 2008

What’s In The Box Call interception device Configuration Software March 6, 2008

What’s Not In The Box Caller ID Subscription Computer Internet Connection Wireless Network March 6, 2008

Competition Matrix March 6, 2008

Risks Availability of wireless networks in homes Security Cost Accidental blocks Difficulty of use March 6, 2008

Risk Matrix March 6, 2008

Risk: Wireless Networks The Risk: Only 12% of US households have a wireless network The Mitigation: Different options of implementation which do not require a wireless network Source: Pew Internet Project (http://www.pewinternet.org/pdfs/PIP_Wireless.Use.pdf) March 6, 2008

Risk: Security The Risk: Hacking Spoofing Other sabotage of the online database or personal database The Mitigation: Standard security techniques March 6, 2008

Risk: Cost The Risk: The Mitigation: High cost Monthly fee Look for lower cost hardware Different options of implementation March 6, 2008

Risk: Accidental Blocks The Risk: Customers blocking numbers they don’t want to block Numbers being added to the online database who aren’t telemarketers The Mitigation: Fully customizable filters Set up a threshold for adding a number to the online database March 6, 2008

Risk: Difficulty of Use The Risk: The device is too difficult for people to set up or use The Mitigation: Make it easier Different options of implementation which allow for easier use March 6, 2008

Experts Needed Embedded Systems Engineer Online Database Administrator Security Expert March 6, 2008

Coordinating Communication Email Instant Messenger Group Chat March 6, 2008

Preliminary Cost Estimates Basic Caller ID boxes1: ~$15 Additional memory (~2GB)2: ~$12 Processor2: ~$8 Wireless components3: ~$15 Total: ~$50 Source 1: Google Shopping (http://www.google.com/products?hl=en&client=firefox-a&rls=org.mozilla:en-US:official& resnum=0&q=Caller+ID+Box+Prices&um=1&ie=UTF-8) Source 2: Engadget (http://www.engadget.com/2007/09/19/isuppli-new-ipod-nanos-cost-apple-just-59-and-83-in-component/) Source 3: iSuppli (http://www.isuppli.com/news/default.asp?id=7308) March 6, 2008

Cost for the Customer: ~$60 initial cost + ~$5 monthly fee Based On: Cold Call Blocker (http://www.coldcallblocker.com/faq/) March 6, 2008

Alternative Approach No wireless network Uses the modem to dial in to the database March 6, 2008

Benefits of this approach Larger market Cheaper to build Easier to install March 6, 2008

Problems with this approach Ties up phone line for updates Slow data transfer Have to provide dial-up numbers March 6, 2008

Conclusion Phone users are still affected by unsolicited calls. No current solution solves this problem. Our solution is feasible. Questions? March 6, 2008