CS410 – Professional Workforce Development Orange Team

Preview:

DESCRIPTION

CS410 – Professional Workforce Development Orange Team. Phone Solicitation Management System. Feasibility Presentation, 6 th March 2008 Presented by Benjamin Leyland. Benjamin Leyland. Manager Presenter Finance. Travis Burlock. Hardware Webmaster. Dionna Diggs. Asst. Manager - PowerPoint PPT Presentation

Citation preview

CS410 – Professional Workforce DevelopmentOrange Team

CS410 – Professional Workforce DevelopmentOrange Team

Phone Solicitation Management System

Phone Solicitation Management System

Feasibility Presentation, 6th March 2008

Presented by Benjamin Leyland

Feasibility Presentation, 6th March 2008

Presented by Benjamin Leyland

March 6, 2008 2

Benjamin Leyland

Manager Presenter Finance

March 6, 2008 3

Travis BurlockTravis Burlock

Hardware Webmaster

March 6, 2008 4

Dionna DiggsDionna Diggs

Asst. Manager Legal Eagle

March 6, 2008 5

Bob LarrickBob Larrick

Software Marketing

March 6, 2008 6

Josh RodeJosh Rode

Documentation

March 6, 2008 7

How we’re organizedHow we’re organized

March 6, 2008 8

THE PROBLEMTHE PROBLEM

March 6, 2008 9

Unwanted phone solicitation still occurs.

Unwanted phone solicitation still occurs.

Even with current legislation and the

Do-Not-Call-List.

Even with current legislation and the

Do-Not-Call-List.

March 6, 2008 10

Effects of the ProblemEffects of the Problem

Annoying

Interrupting

Waste of time

Annoying

Interrupting

Waste of time

March 6, 2008 11

What is Phone Solicitation?What is Phone Solicitation?

A telephone call that acts as an advertisement.

Estimated that 4 million "junk" telephone calls are made every day in the United States.

A telephone call that acts as an advertisement.

Estimated that 4 million "junk" telephone calls are made every day in the United States.

Source 1: FCC (www.fcc.gov)Source 2: Strangefacts (www.strangefacts.com)

March 6, 2008 12

Current FCC RegulationsCurrent FCC Regulations

Phone solicitors are required to transmit or display:

- Their contact phone number

- The name of the soliciting company

Phone solicitors are required to transmit or display:

- Their contact phone number

- The name of the soliciting company

Source: FCC (http://www.fcc.gov/cgb/consumerfacts/tcpa.html)

March 6, 2008 13

The Do Not Call ListThe Do Not Call List

Numbers can be registered online or over the

phone.

The majority of solicitors are prohibited from

calling those on the list.

Numbers can be registered online or over the

phone.

The majority of solicitors are prohibited from

calling those on the list.

Source: FCC (www.fcc.gov)

March 6, 2008 14

Who Can Still Call?Who Can Still Call?

Organizations that you have established a

business relationship with

Non-profit organizations

Callers with prior permission

Organizations that you have established a

business relationship with

Non-profit organizations

Callers with prior permission

Source: FCC (www.fcc.gov)

March 6, 2008 15

Do Not Call List StatisticsDo Not Call List Statistics

Registered

Registered andstill receivingcalls Not Registered

24%

43%

33%

Makes up 76% registered

Source: Harris Interactive (www.harrisinteractive.com)

March 6, 2008 16

CustomerCustomer

Potential customer = 46% of American adults

76% have placed their phone numbers on the NDNC registry.

61% of people on the registry still receive unsolicited calls.

Potential customer = 46% of American adults

76% have placed their phone numbers on the NDNC registry.

61% of people on the registry still receive unsolicited calls.

Source 1: FTC (www.ftc.gov)Source 2: Harris Interactive (www.harrisinteractive.com)

March 6, 2008 17

Major Functional Components

ComputerInternet

Multiple Phones

GlobalDatabase

Wireless Router

PSTN

Phone SolicitationManager

Buy SmartDraw!- purchased copies print this document without a watermark .

Visit www.smartdraw.com or call 1-800-768-3729.

March 6, 2008 18

System CapabilitiesSystem Capabilities

Blocking of calls Per call basis Area code Wild cards Those contained in the global database

System configuration Configuration software (PC) Hardware connected to phone line

Blocking of calls Per call basis Area code Wild cards Those contained in the global database

System configuration Configuration software (PC) Hardware connected to phone line

March 6, 2008 19

Intercept

Pass To Phone

Answer

Incoming Call

March 6, 2008 20

Intercept

Pass To Phone

Answer

Search DB

BlockCall

Should It Be Blocked ?

Check LocalSettings

March 6, 2008 21

Add To Local DB

ManuallyFlag

Send ToGlobal DB

Answer

Flagging an Unwanted Call

March 6, 2008 22

Check forOther Notices

Flagged Number

Add To DB

IncrementRecord

Tolerance Exceeded

Inform Global Database

March 6, 2008 23

Refresh Global DatabaseRefresh Global Database

NoLonger In

Service

Refresh DB

Remove From DB

Check Last Report

March 6, 2008 24

Compare Versions

Send Update

Send Up-To-Date

PrepareUpdate

Request Database Update

Update Local DB

Request Update

March 6, 2008 25

Required HardwareRequired Hardware Modem LCD Wireless adapter Memory Database server

Modem LCD Wireless adapter Memory Database server

March 6, 2008 26

Specialty HardwareSpecialty Hardware Call interception device will be a custom

built unit

It’s components are readily available OTS

Call interception device will be a custom built unit

It’s components are readily available OTS

March 6, 2008 27

Required SoftwareRequired Software

Configuration application Database management software Interception/screening software

Configuration application Database management software Interception/screening software

March 6, 2008 28

What’s In The BoxWhat’s In The Box

Call interception device

Configuration Software

Call interception device

Configuration Software

March 6, 2008 29

What’s Not In The BoxWhat’s Not In The Box

Caller ID Subscription Computer Internet Connection Wireless Network

Caller ID Subscription Computer Internet Connection Wireless Network

March 6, 2008 30

Competition MatrixCompetition Matrix

March 6, 2008 31

RisksRisks Availability of wireless networks in homes Security Cost Accidental blocks Difficulty of use

Availability of wireless networks in homes Security Cost Accidental blocks Difficulty of use

March 6, 2008 32

Risk MatrixRisk Matrix

March 6, 2008 33

Risk: Wireless NetworksRisk: Wireless Networks

The Risk: Only 12% of US households have a wireless

network

The Mitigation: Different options of implementation which do not

require a wireless network

The Risk: Only 12% of US households have a wireless

network

The Mitigation: Different options of implementation which do not

require a wireless network

Source: Pew Internet Project (http://www.pewinternet.org/pdfs/PIP_Wireless.Use.pdf)

March 6, 2008 34

Risk: SecurityRisk: SecurityThe Risk: Hacking Spoofing Other sabotage of the online database or personal

database

The Mitigation: Standard security techniques

The Risk: Hacking Spoofing Other sabotage of the online database or personal

database

The Mitigation: Standard security techniques

March 6, 2008 35

Risk: CostRisk: Cost

The Risk: High cost Monthly fee

The Mitigation: Look for lower cost hardware Different options of implementation

The Risk: High cost Monthly fee

The Mitigation: Look for lower cost hardware Different options of implementation

March 6, 2008 36

Risk: Accidental BlocksRisk: Accidental Blocks

The Risk: Customers blocking numbers they don’t want to

block Numbers being added to the online database who

aren’t telemarketers

The Mitigation: Fully customizable filters Set up a threshold for adding a number to the

online database

The Risk: Customers blocking numbers they don’t want to

block Numbers being added to the online database who

aren’t telemarketers

The Mitigation: Fully customizable filters Set up a threshold for adding a number to the

online database

March 6, 2008 37

Risk: Difficulty of UseRisk: Difficulty of Use

The Risk: The device is too difficult for people to set up or

use

The Mitigation: Make it easier Different options of implementation which allow

for easier use

The Risk: The device is too difficult for people to set up or

use

The Mitigation: Make it easier Different options of implementation which allow

for easier use

March 6, 2008 38

Experts NeededExperts Needed

Embedded Systems Engineer

Online Database Administrator

Security Expert

Embedded Systems Engineer

Online Database Administrator

Security Expert

March 6, 2008 39

Coordinating CommunicationCoordinating Communication

Email Instant Messenger Group Chat

Email Instant Messenger Group Chat

March 6, 2008 40

Preliminary Cost EstimatesPreliminary Cost Estimates Basic Caller ID boxes1: ~$15 Additional memory (~2GB)2: ~$12 Processor2: ~$8 Wireless components3: ~$15

Total: ~$50

Basic Caller ID boxes1: ~$15 Additional memory (~2GB)2: ~$12 Processor2: ~$8 Wireless components3: ~$15

Total: ~$50

Source 1: Google Shopping (http://www.google.com/products?hl=en&client=firefox-a&rls=org.mozilla:en-US:official&resnum=0&q=Caller+ID+Box+Prices&um=1&ie=UTF-8)Source 2: Engadget (http://www.engadget.com/2007/09/19/isuppli-new-ipod-nanos-cost-apple-just-59-and-83-in-component/) Source 3: iSuppli

(http://www.isuppli.com/news/default.asp?id=7308)

March 6, 2008 41

Cost for the Customer:Cost for the Customer:

~$60 initial cost

+

~$5 monthly fee

~$60 initial cost

+

~$5 monthly fee

Based On: Cold Call Blocker (http://www.coldcallblocker.com/faq/)

March 6, 2008 42

Alternative ApproachAlternative Approach

No wireless network

Uses the modem to dial in to the database

No wireless network

Uses the modem to dial in to the database

March 6, 2008 43

Benefits of this approachBenefits of this approach

Larger market Cheaper to build Easier to install

Larger market Cheaper to build Easier to install

March 6, 2008 44

Problems with this approachProblems with this approach

Ties up phone line for updates Slow data transfer Have to provide dial-up numbers

Ties up phone line for updates Slow data transfer Have to provide dial-up numbers

March 6, 2008 45

ConclusionConclusion

Phone users are still affected by unsolicited calls. No current solution solves this problem. Our solution is feasible.

Phone users are still affected by unsolicited calls. No current solution solves this problem. Our solution is feasible.

Questions?Questions?

Recommended