Presentation is loading. Please wait.

Presentation is loading. Please wait.

CS410 – Professional Workforce Development Orange Team

Similar presentations


Presentation on theme: "CS410 – Professional Workforce Development Orange Team"— Presentation transcript:

1 CS410 – Professional Workforce Development Orange Team
Phone Solicitation Management System Feasibility Presentation, 6th March 2008 Presented by Benjamin Leyland

2 Benjamin Leyland Manager Presenter Finance March 6, 2008

3 Travis Burlock Hardware Webmaster March 6, 2008

4 Dionna Diggs Asst. Manager Legal Eagle March 6, 2008

5 Bob Larrick Software Marketing March 6, 2008

6 Josh Rode Documentation March 6, 2008

7 How we’re organized March 6, 2008

8 THE PROBLEM March 6, 2008

9 Unwanted phone solicitation still occurs.
Even with current legislation and the Do-Not-Call-List. March 6, 2008

10 Effects of the Problem Annoying Interrupting Waste of time
March 6, 2008

11 What is Phone Solicitation?
A telephone call that acts as an advertisement. Estimated that 4 million "junk" telephone calls are made every day in the United States. Source 1: FCC ( Source 2: Strangefacts ( March 6, 2008

12 Current FCC Regulations
Phone solicitors are required to transmit or display: - Their contact phone number - The name of the soliciting company Source: FCC ( March 6, 2008

13 Source: FCC (www.fcc.gov)
The Do Not Call List Numbers can be registered online or over the phone. The majority of solicitors are prohibited from calling those on the list. Source: FCC ( March 6, 2008

14 Source: FCC (www.fcc.gov)
Who Can Still Call? Organizations that you have established a business relationship with Non-profit organizations Callers with prior permission Source: FCC ( March 6, 2008

15 Do Not Call List Statistics
Makes up 76% registered 43% 33% 24% Source: Harris Interactive ( March 6, 2008

16 Customer Potential customer = 46% of American adults
76% have placed their phone numbers on the NDNC registry. 61% of people on the registry still receive unsolicited calls. Source 1: FTC ( Source 2: Harris Interactive ( March 6, 2008

17 Major Functional Components
March 6, 2008

18 System Capabilities Blocking of calls System configuration
Per call basis Area code Wild cards Those contained in the global database System configuration Configuration software (PC) Hardware connected to phone line March 6, 2008

19 Incoming Call Intercept Pass To Phone Answer March 6, 2008

20 Should It Be Blocked ? March 6, 2008 Intercept Check Local Settings
Search DB Block Call Pass To Phone Answer March 6, 2008

21 Flagging an Unwanted Call
Answer Manually Flag Add To Local DB Send To Global DB March 6, 2008

22 Inform Global Database
Flagged Number Check for Other Notices Tolerance Exceeded Increment Record Add To DB March 6, 2008

23 Refresh Global Database
DB Check Last Report No Longer In Service Remove From DB March 6, 2008

24 Request Database Update
Compare Versions Prepare Update Send Up-To-Date Send Update Update Local DB March 6, 2008

25 Required Hardware Modem LCD Wireless adapter Memory Database server
March 6, 2008

26 Specialty Hardware Call interception device will be a custom built unit It’s components are readily available OTS March 6, 2008

27 Required Software Configuration application
Database management software Interception/screening software March 6, 2008

28 What’s In The Box Call interception device Configuration Software
March 6, 2008

29 What’s Not In The Box Caller ID Subscription Computer
Internet Connection Wireless Network March 6, 2008

30 Competition Matrix March 6, 2008

31 Risks Availability of wireless networks in homes Security Cost
Accidental blocks Difficulty of use March 6, 2008

32 Risk Matrix March 6, 2008

33 Risk: Wireless Networks
The Risk: Only 12% of US households have a wireless network The Mitigation: Different options of implementation which do not require a wireless network Source: Pew Internet Project ( March 6, 2008

34 Risk: Security The Risk: Hacking Spoofing
Other sabotage of the online database or personal database The Mitigation: Standard security techniques March 6, 2008

35 Risk: Cost The Risk: The Mitigation: High cost Monthly fee
Look for lower cost hardware Different options of implementation March 6, 2008

36 Risk: Accidental Blocks
The Risk: Customers blocking numbers they don’t want to block Numbers being added to the online database who aren’t telemarketers The Mitigation: Fully customizable filters Set up a threshold for adding a number to the online database March 6, 2008

37 Risk: Difficulty of Use
The Risk: The device is too difficult for people to set up or use The Mitigation: Make it easier Different options of implementation which allow for easier use March 6, 2008

38 Experts Needed Embedded Systems Engineer Online Database Administrator
Security Expert March 6, 2008

39 Coordinating Communication
Instant Messenger Group Chat March 6, 2008

40 Preliminary Cost Estimates
Basic Caller ID boxes1: ~$15 Additional memory (~2GB)2: ~$12 Processor2: ~$8 Wireless components3: ~$15 Total: ~$50 Source 1: Google Shopping ( resnum=0&q=Caller+ID+Box+Prices&um=1&ie=UTF-8) Source 2: Engadget ( Source 3: iSuppli ( March 6, 2008

41 Cost for the Customer: ~$60 initial cost + ~$5 monthly fee
Based On: Cold Call Blocker ( March 6, 2008

42 Alternative Approach No wireless network
Uses the modem to dial in to the database March 6, 2008

43 Benefits of this approach
Larger market Cheaper to build Easier to install March 6, 2008

44 Problems with this approach
Ties up phone line for updates Slow data transfer Have to provide dial-up numbers March 6, 2008

45 Conclusion Phone users are still affected by unsolicited calls. No current solution solves this problem. Our solution is feasible. Questions? March 6, 2008


Download ppt "CS410 – Professional Workforce Development Orange Team"

Similar presentations


Ads by Google