Upload
arwen
View
23
Download
0
Tags:
Embed Size (px)
DESCRIPTION
CS410 – Professional Workforce Development Orange Team. Phone Solicitation Management System. Feasibility Presentation, 6 th March 2008 Presented by Benjamin Leyland. Benjamin Leyland. Manager Presenter Finance. Travis Burlock. Hardware Webmaster. Dionna Diggs. Asst. Manager - PowerPoint PPT Presentation
Citation preview
CS410 – Professional Workforce DevelopmentOrange Team
CS410 – Professional Workforce DevelopmentOrange Team
Phone Solicitation Management System
Phone Solicitation Management System
Feasibility Presentation, 6th March 2008
Presented by Benjamin Leyland
Feasibility Presentation, 6th March 2008
Presented by Benjamin Leyland
March 6, 2008 2
Benjamin Leyland
Manager Presenter Finance
March 6, 2008 3
Travis BurlockTravis Burlock
Hardware Webmaster
March 6, 2008 4
Dionna DiggsDionna Diggs
Asst. Manager Legal Eagle
March 6, 2008 5
Bob LarrickBob Larrick
Software Marketing
March 6, 2008 6
Josh RodeJosh Rode
Documentation
March 6, 2008 7
How we’re organizedHow we’re organized
March 6, 2008 8
THE PROBLEMTHE PROBLEM
March 6, 2008 9
Unwanted phone solicitation still occurs.
Unwanted phone solicitation still occurs.
Even with current legislation and the
Do-Not-Call-List.
Even with current legislation and the
Do-Not-Call-List.
March 6, 2008 10
Effects of the ProblemEffects of the Problem
Annoying
Interrupting
Waste of time
Annoying
Interrupting
Waste of time
March 6, 2008 11
What is Phone Solicitation?What is Phone Solicitation?
A telephone call that acts as an advertisement.
Estimated that 4 million "junk" telephone calls are made every day in the United States.
A telephone call that acts as an advertisement.
Estimated that 4 million "junk" telephone calls are made every day in the United States.
Source 1: FCC (www.fcc.gov)Source 2: Strangefacts (www.strangefacts.com)
March 6, 2008 12
Current FCC RegulationsCurrent FCC Regulations
Phone solicitors are required to transmit or display:
- Their contact phone number
- The name of the soliciting company
Phone solicitors are required to transmit or display:
- Their contact phone number
- The name of the soliciting company
Source: FCC (http://www.fcc.gov/cgb/consumerfacts/tcpa.html)
March 6, 2008 13
The Do Not Call ListThe Do Not Call List
Numbers can be registered online or over the
phone.
The majority of solicitors are prohibited from
calling those on the list.
Numbers can be registered online or over the
phone.
The majority of solicitors are prohibited from
calling those on the list.
Source: FCC (www.fcc.gov)
March 6, 2008 14
Who Can Still Call?Who Can Still Call?
Organizations that you have established a
business relationship with
Non-profit organizations
Callers with prior permission
Organizations that you have established a
business relationship with
Non-profit organizations
Callers with prior permission
Source: FCC (www.fcc.gov)
March 6, 2008 15
Do Not Call List StatisticsDo Not Call List Statistics
Registered
Registered andstill receivingcalls Not Registered
24%
43%
33%
Makes up 76% registered
Source: Harris Interactive (www.harrisinteractive.com)
March 6, 2008 16
CustomerCustomer
Potential customer = 46% of American adults
76% have placed their phone numbers on the NDNC registry.
61% of people on the registry still receive unsolicited calls.
Potential customer = 46% of American adults
76% have placed their phone numbers on the NDNC registry.
61% of people on the registry still receive unsolicited calls.
Source 1: FTC (www.ftc.gov)Source 2: Harris Interactive (www.harrisinteractive.com)
March 6, 2008 17
Major Functional Components
ComputerInternet
Multiple Phones
GlobalDatabase
Wireless Router
PSTN
Phone SolicitationManager
Buy SmartDraw!- purchased copies print this document without a watermark .
Visit www.smartdraw.com or call 1-800-768-3729.
March 6, 2008 18
System CapabilitiesSystem Capabilities
Blocking of calls Per call basis Area code Wild cards Those contained in the global database
System configuration Configuration software (PC) Hardware connected to phone line
Blocking of calls Per call basis Area code Wild cards Those contained in the global database
System configuration Configuration software (PC) Hardware connected to phone line
March 6, 2008 19
Intercept
Pass To Phone
Answer
Incoming Call
March 6, 2008 20
Intercept
Pass To Phone
Answer
Search DB
BlockCall
Should It Be Blocked ?
Check LocalSettings
March 6, 2008 21
Add To Local DB
ManuallyFlag
Send ToGlobal DB
Answer
Flagging an Unwanted Call
March 6, 2008 22
Check forOther Notices
Flagged Number
Add To DB
IncrementRecord
Tolerance Exceeded
Inform Global Database
March 6, 2008 23
Refresh Global DatabaseRefresh Global Database
NoLonger In
Service
Refresh DB
Remove From DB
Check Last Report
March 6, 2008 24
Compare Versions
Send Update
Send Up-To-Date
PrepareUpdate
Request Database Update
Update Local DB
Request Update
March 6, 2008 25
Required HardwareRequired Hardware Modem LCD Wireless adapter Memory Database server
Modem LCD Wireless adapter Memory Database server
March 6, 2008 26
Specialty HardwareSpecialty Hardware Call interception device will be a custom
built unit
It’s components are readily available OTS
Call interception device will be a custom built unit
It’s components are readily available OTS
March 6, 2008 27
Required SoftwareRequired Software
Configuration application Database management software Interception/screening software
Configuration application Database management software Interception/screening software
March 6, 2008 28
What’s In The BoxWhat’s In The Box
Call interception device
Configuration Software
Call interception device
Configuration Software
March 6, 2008 29
What’s Not In The BoxWhat’s Not In The Box
Caller ID Subscription Computer Internet Connection Wireless Network
Caller ID Subscription Computer Internet Connection Wireless Network
March 6, 2008 30
Competition MatrixCompetition Matrix
March 6, 2008 31
RisksRisks Availability of wireless networks in homes Security Cost Accidental blocks Difficulty of use
Availability of wireless networks in homes Security Cost Accidental blocks Difficulty of use
March 6, 2008 32
Risk MatrixRisk Matrix
March 6, 2008 33
Risk: Wireless NetworksRisk: Wireless Networks
The Risk: Only 12% of US households have a wireless
network
The Mitigation: Different options of implementation which do not
require a wireless network
The Risk: Only 12% of US households have a wireless
network
The Mitigation: Different options of implementation which do not
require a wireless network
Source: Pew Internet Project (http://www.pewinternet.org/pdfs/PIP_Wireless.Use.pdf)
March 6, 2008 34
Risk: SecurityRisk: SecurityThe Risk: Hacking Spoofing Other sabotage of the online database or personal
database
The Mitigation: Standard security techniques
The Risk: Hacking Spoofing Other sabotage of the online database or personal
database
The Mitigation: Standard security techniques
March 6, 2008 35
Risk: CostRisk: Cost
The Risk: High cost Monthly fee
The Mitigation: Look for lower cost hardware Different options of implementation
The Risk: High cost Monthly fee
The Mitigation: Look for lower cost hardware Different options of implementation
March 6, 2008 36
Risk: Accidental BlocksRisk: Accidental Blocks
The Risk: Customers blocking numbers they don’t want to
block Numbers being added to the online database who
aren’t telemarketers
The Mitigation: Fully customizable filters Set up a threshold for adding a number to the
online database
The Risk: Customers blocking numbers they don’t want to
block Numbers being added to the online database who
aren’t telemarketers
The Mitigation: Fully customizable filters Set up a threshold for adding a number to the
online database
March 6, 2008 37
Risk: Difficulty of UseRisk: Difficulty of Use
The Risk: The device is too difficult for people to set up or
use
The Mitigation: Make it easier Different options of implementation which allow
for easier use
The Risk: The device is too difficult for people to set up or
use
The Mitigation: Make it easier Different options of implementation which allow
for easier use
March 6, 2008 38
Experts NeededExperts Needed
Embedded Systems Engineer
Online Database Administrator
Security Expert
Embedded Systems Engineer
Online Database Administrator
Security Expert
March 6, 2008 39
Coordinating CommunicationCoordinating Communication
Email Instant Messenger Group Chat
Email Instant Messenger Group Chat
March 6, 2008 40
Preliminary Cost EstimatesPreliminary Cost Estimates Basic Caller ID boxes1: ~$15 Additional memory (~2GB)2: ~$12 Processor2: ~$8 Wireless components3: ~$15
Total: ~$50
Basic Caller ID boxes1: ~$15 Additional memory (~2GB)2: ~$12 Processor2: ~$8 Wireless components3: ~$15
Total: ~$50
Source 1: Google Shopping (http://www.google.com/products?hl=en&client=firefox-a&rls=org.mozilla:en-US:official&resnum=0&q=Caller+ID+Box+Prices&um=1&ie=UTF-8)Source 2: Engadget (http://www.engadget.com/2007/09/19/isuppli-new-ipod-nanos-cost-apple-just-59-and-83-in-component/) Source 3: iSuppli
(http://www.isuppli.com/news/default.asp?id=7308)
March 6, 2008 41
Cost for the Customer:Cost for the Customer:
~$60 initial cost
+
~$5 monthly fee
~$60 initial cost
+
~$5 monthly fee
Based On: Cold Call Blocker (http://www.coldcallblocker.com/faq/)
March 6, 2008 42
Alternative ApproachAlternative Approach
No wireless network
Uses the modem to dial in to the database
No wireless network
Uses the modem to dial in to the database
March 6, 2008 43
Benefits of this approachBenefits of this approach
Larger market Cheaper to build Easier to install
Larger market Cheaper to build Easier to install
March 6, 2008 44
Problems with this approachProblems with this approach
Ties up phone line for updates Slow data transfer Have to provide dial-up numbers
Ties up phone line for updates Slow data transfer Have to provide dial-up numbers
March 6, 2008 45
ConclusionConclusion
Phone users are still affected by unsolicited calls. No current solution solves this problem. Our solution is feasible.
Phone users are still affected by unsolicited calls. No current solution solves this problem. Our solution is feasible.
Questions?Questions?