CS410 – Professional Workforce Development Orange Team Phone Solicitation Management System Feasibility Presentation, 6th March 2008 Presented by Benjamin Leyland Benjamin Leyland Manager Presenter Finance March 6, 2008 2 Travis Burlock Hardware Webmaster March 6, 2008 3 Dionna Diggs Asst. Manager Legal Eagle March 6, 2008 4 Bob Larrick Software Marketing March 6, 2008 5 Josh Rode Documentation March 6, 2008 6 How we’re organized March 6, 2008 7 THE PROBLEM March 6, 2008 8 Unwanted phone solicitation still occurs. Even with current legislation and the Do-Not-Call-List. March 6, 2008 9 Effects of the Problem Annoying Interrupting Waste of time March 6, 2008 10 What is Phone Solicitation? A telephone call that acts as an advertisement. Estimated that 4 million "junk" telephone calls are made every day in the United States. Source 1: FCC (www.fcc.gov) Source 2: Strangefacts (www.strangefacts.com) March 6, 2008 11 Current FCC Regulations Phone solicitors are required to transmit or display: - Their contact phone number - The name of the soliciting company Source: FCC (http://www.fcc.gov/cgb/consumerfacts/tcpa.html) March 6, 2008 12 The Do Not Call List Numbers can be registered online or over the phone. The majority of solicitors are prohibited from calling those on the list. Source: FCC (www.fcc.gov) March 6, 2008 13 Who Can Still Call? Organizations that you have established a business relationship with Non-profit organizations Callers with prior permission Source: FCC (www.fcc.gov) March 6, 2008 14 Do Not Call List Statistics Makes up 76% registered Registered Registered and still receiving calls Not Registered 43% 33% 24% Source: Harris Interactive (www.harrisinteractive.com) March 6, 2008 15 Customer Potential customer = 46% of American adults 76% have placed their phone numbers on the NDNC registry. 61% of people on the registry still receive unsolicited calls. Source 1: FTC (www.ftc.gov) Source 2: Harris Interactive (www.harrisinteractive.com) March 6, 2008 16 Major Functional Components March 6, 2008 17 System Capabilities Blocking of calls Per call basis Area code Wild cards Those contained in the global database System configuration Configuration software (PC) Hardware connected to phone line March 6, 2008 18 Incoming Call Intercept Pass To Phone Answer March 6, 2008 19 Should It Be Blocked ? Intercept Check Local Settings Search DB Block Call Pass To Phone Answer March 6, 2008 20 Flagging an Unwanted Call Answer Manually Flag Add To Local DB Send To Global DB March 6, 2008 21 Inform Global Database Flagged Number Check for Other Notices Tolerance Exceeded Increment Record Add To DB March 6, 2008 22 Refresh Global Database Refresh DB Check Last Report No Longer In Service Remove From DB March 6, 2008 23 Request Database Update Request Update Compare Versions Prepare Update Send Up-To-Date Send Update Update Local DB March 6, 2008 24 Required Hardware March 6, 2008 Modem LCD Wireless adapter Memory Database server 25 Specialty Hardware Call interception device will be a custom built unit It’s components are readily available OTS March 6, 2008 26 Required Software Configuration application Database management software Interception/screening software March 6, 2008 27 What’s In The Box Call interception device Configuration Software March 6, 2008 28 What’s Not In The Box March 6, 2008 Caller ID Subscription Computer Internet Connection Wireless Network 29 Competition Matrix March 6, 2008 30 Risks Availability of wireless networks in homes Security Cost Accidental blocks Difficulty of use March 6, 2008 31 Risk Matrix March 6, 2008 32 Risk: Wireless Networks The Risk: Only 12% of US households have a wireless network The Mitigation: Different options of implementation which do not require a wireless network Source: Pew Internet Project (http://www.pewinternet.org/pdfs/PIP_Wireless.Use.pdf) March 6, 2008 33 Risk: Security The Risk: Hacking Spoofing Other sabotage of the online database or personal database The Mitigation: Standard security techniques March 6, 2008 34 Risk: Cost The Risk: High cost Monthly fee The Mitigation: Look for lower cost hardware Different options of implementation March 6, 2008 35 Risk: Accidental Blocks The Risk: Customers blocking numbers they don’t want to block Numbers being added to the online database who aren’t telemarketers The Mitigation: Fully customizable filters Set up a threshold for adding a number to the online database March 6, 2008 36 Risk: Difficulty of Use The Risk: The device is too difficult for people to set up or use The Mitigation: Make it easier Different options of implementation which allow for easier use March 6, 2008 37 Experts Needed Embedded Systems Engineer Online Database Administrator Security Expert March 6, 2008 38 Coordinating Communication Email Instant Messenger Group Chat March 6, 2008 39 Preliminary Cost Estimates Basic Caller ID boxes1: Additional memory (~2GB)2: Processor2: Wireless components3: Total: ~$15 ~$12 ~$8 ~$15 ~$50 Source 1: Google Shopping (http://www.google.com/products?hl=en&client=firefox-a&rls=org.mozilla:en-US:official& resnum=0&q=Caller+ID+Box+Prices&um=1&ie=UTF-8) Source 2: Engadget (http://www.engadget.com/2007/09/19/isuppli-new-ipod-nanos-cost-apple-just-59-and-83-in-component/) Source 3: iSuppli (http://www.isuppli.com/news/default.asp?id=7308) March 6, 2008 40 Cost for the Customer: ~$60 initial cost + ~$5 monthly fee Based On: Cold Call Blocker (http://www.coldcallblocker.com/faq/) March 6, 2008 41 Alternative Approach No wireless network Uses the modem to dial in to the database March 6, 2008 42 Benefits of this approach Larger market Cheaper to build Easier to install March 6, 2008 43 Problems with this approach Ties up phone line for updates Slow data transfer Have to provide dial-up numbers March 6, 2008 44 Conclusion Phone users are still affected by unsolicited calls. No current solution solves this problem. Our solution is feasible. Questions? March 6, 2008 45