Download presentation
Presentation is loading. Please wait.
Published byCathleen Lewis Modified over 7 years ago
1
CS410 – Professional Workforce Development Orange Team
Phone Solicitation Management System Feasibility Presentation, 6th March 2008 Presented by Benjamin Leyland
2
Benjamin Leyland Manager Presenter Finance March 6, 2008
3
Travis Burlock Hardware Webmaster March 6, 2008
4
Dionna Diggs Asst. Manager Legal Eagle March 6, 2008
5
Bob Larrick Software Marketing March 6, 2008
6
Josh Rode Documentation March 6, 2008
7
How we’re organized March 6, 2008
8
THE PROBLEM March 6, 2008
9
Unwanted phone solicitation still occurs.
Even with current legislation and the Do-Not-Call-List. March 6, 2008
10
Effects of the Problem Annoying Interrupting Waste of time
March 6, 2008
11
What is Phone Solicitation?
A telephone call that acts as an advertisement. Estimated that 4 million "junk" telephone calls are made every day in the United States. Source 1: FCC ( Source 2: Strangefacts ( March 6, 2008
12
Current FCC Regulations
Phone solicitors are required to transmit or display: - Their contact phone number - The name of the soliciting company Source: FCC ( March 6, 2008
13
Source: FCC (www.fcc.gov)
The Do Not Call List Numbers can be registered online or over the phone. The majority of solicitors are prohibited from calling those on the list. Source: FCC ( March 6, 2008
14
Source: FCC (www.fcc.gov)
Who Can Still Call? Organizations that you have established a business relationship with Non-profit organizations Callers with prior permission Source: FCC ( March 6, 2008
15
Do Not Call List Statistics
Makes up 76% registered 43% 33% 24% Source: Harris Interactive ( March 6, 2008
16
Customer Potential customer = 46% of American adults
76% have placed their phone numbers on the NDNC registry. 61% of people on the registry still receive unsolicited calls. Source 1: FTC ( Source 2: Harris Interactive ( March 6, 2008
17
Major Functional Components
March 6, 2008
18
System Capabilities Blocking of calls System configuration
Per call basis Area code Wild cards Those contained in the global database System configuration Configuration software (PC) Hardware connected to phone line March 6, 2008
19
Incoming Call Intercept Pass To Phone Answer March 6, 2008
20
Should It Be Blocked ? March 6, 2008 Intercept Check Local Settings
Search DB Block Call Pass To Phone Answer March 6, 2008
21
Flagging an Unwanted Call
Answer Manually Flag Add To Local DB Send To Global DB March 6, 2008
22
Inform Global Database
Flagged Number Check for Other Notices Tolerance Exceeded Increment Record Add To DB March 6, 2008
23
Refresh Global Database
DB Check Last Report No Longer In Service Remove From DB March 6, 2008
24
Request Database Update
Compare Versions Prepare Update Send Up-To-Date Send Update Update Local DB March 6, 2008
25
Required Hardware Modem LCD Wireless adapter Memory Database server
March 6, 2008
26
Specialty Hardware Call interception device will be a custom built unit It’s components are readily available OTS March 6, 2008
27
Required Software Configuration application
Database management software Interception/screening software March 6, 2008
28
What’s In The Box Call interception device Configuration Software
March 6, 2008
29
What’s Not In The Box Caller ID Subscription Computer
Internet Connection Wireless Network March 6, 2008
30
Competition Matrix March 6, 2008
31
Risks Availability of wireless networks in homes Security Cost
Accidental blocks Difficulty of use March 6, 2008
32
Risk Matrix March 6, 2008
33
Risk: Wireless Networks
The Risk: Only 12% of US households have a wireless network The Mitigation: Different options of implementation which do not require a wireless network Source: Pew Internet Project ( March 6, 2008
34
Risk: Security The Risk: Hacking Spoofing
Other sabotage of the online database or personal database The Mitigation: Standard security techniques March 6, 2008
35
Risk: Cost The Risk: The Mitigation: High cost Monthly fee
Look for lower cost hardware Different options of implementation March 6, 2008
36
Risk: Accidental Blocks
The Risk: Customers blocking numbers they don’t want to block Numbers being added to the online database who aren’t telemarketers The Mitigation: Fully customizable filters Set up a threshold for adding a number to the online database March 6, 2008
37
Risk: Difficulty of Use
The Risk: The device is too difficult for people to set up or use The Mitigation: Make it easier Different options of implementation which allow for easier use March 6, 2008
38
Experts Needed Embedded Systems Engineer Online Database Administrator
Security Expert March 6, 2008
39
Coordinating Communication
Instant Messenger Group Chat March 6, 2008
40
Preliminary Cost Estimates
Basic Caller ID boxes1: ~$15 Additional memory (~2GB)2: ~$12 Processor2: ~$8 Wireless components3: ~$15 Total: ~$50 Source 1: Google Shopping ( resnum=0&q=Caller+ID+Box+Prices&um=1&ie=UTF-8) Source 2: Engadget ( Source 3: iSuppli ( March 6, 2008
41
Cost for the Customer: ~$60 initial cost + ~$5 monthly fee
Based On: Cold Call Blocker ( March 6, 2008
42
Alternative Approach No wireless network
Uses the modem to dial in to the database March 6, 2008
43
Benefits of this approach
Larger market Cheaper to build Easier to install March 6, 2008
44
Problems with this approach
Ties up phone line for updates Slow data transfer Have to provide dial-up numbers March 6, 2008
45
Conclusion Phone users are still affected by unsolicited calls. No current solution solves this problem. Our solution is feasible. Questions? March 6, 2008
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.