1 / 59

CS410 – Professional Workforce Development Orange Team

CS410 – Professional Workforce Development Orange Team. Telephone Management System. Final Presentation, 6 th May 2008 Presented by Benjamin Leyland. THE PROBLEM. The Problem. Unwanted phone solicitation still occurs. Even with current legislation and the

clyde
Download Presentation

CS410 – Professional Workforce Development Orange Team

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CS410 – Professional Workforce DevelopmentOrange Team Telephone Management System Final Presentation, 6th May 2008 Presented by Benjamin Leyland

  2. THE PROBLEM

  3. The Problem Unwanted phone solicitation still occurs. Even with current legislation and the Do-Not-Call-List

  4. Effects of the Problem -Annoying -Interrupting -Waste of time

  5. What is Phone Solicitation? A telephone call that acts as an advertisement. In 2007, over 5,000 complaints were received by the FCC. Estimated that 4 million "junk" telephone calls are made every day in the United States Source 1: FCC (www.fcc.gov/cgb/consumerfacts/tcpa.html) Source 2: FCC (www.hraunfoss.fcc.gov/edocs_public/attachmatch/DOC-279478A1.pdf)

  6. Current FCC Regulations Phone solicitors are required to transmit or display: - Their contact phone number - The name of the soliciting company Source: FCC (www.fcc.gov/cgb/consumerfacts/tcpa.html)

  7. The Do-Not-Call-List • Numbers can be registered online or over the phone. • The majority of solicitors are prohibited from calling those on the list. Source: FCC (www.fcc.gov/cgb/consumerfacts/tcpa.html)

  8. Ultimate Goal of TMS Reduce unwanted calls

  9. How? Develop a prototype and product to: -receive caller ID information -test against local database -transmit caller ID information to interactive device (if not blocked) -allow user to block calls and manipulate data -database updates

  10. The Solution • A device that blocks incoming calls based on information in a database. • Allows extra customization such as blocking numbers at specified times and blocking whole area codes.

  11. How our Solution is Set Up • An interception device outside the house that collects caller ID information and blocks calls • A control device inside the house that provides the database and controls for the user • Optional PC software to provide easier configuration

  12. Who Can Still Call? Organizations that you have established a business relationship with Non-profit organizations Callers with prior permission Source: (www.fcc.gov/cgb/consumerfacts/tcpa.html)

  13. Do-Not-Call List Statistics Makes up 76% registered Source: Harris Interactive (www.harrisinteractive.com)

  14. The Market • Potential customer = 46% of American adults • 76% have placed their phone numbers on the NDNC registry. • 61% of people on the registry still receive unsolicited calls. Source 1: FTC (www.ftc.gov) Source 2: Harris Interactive (www.harrisinteractive.com)

  15. What our solution will do • Allow user configured blocking of calls to all phones in the house • Allow redirection of calls to specific phones • Allow viewing of call history • Allow configuration of call block through the control device and PC based configuration software

  16. Major Functional Components

  17. System Capabilities • Blocking of calls • Per call basis • Area code • Wild cards • During specified times • To all phones • System configuration • Configuration software (PC) • Hardware connected to phone line

  18. Incoming Call Intercept Pass To Phone Answer

  19. Should It Be Blocked ? Intercept Check Local Settings Search Blocked List Block Call Pass To Phone Answer

  20. Flagging Unwanted Calls Answer Manually Flag Add To Blocked List

  21. Configuration PC Configuration Control Device Configuration Updates Interception Device

  22. Control Device GUI Prototype

  23. What’s In The Box • Interception Device • Control Device • Configuration Software • Mounting Hardware

  24. What’s Not In The Box • Caller ID Subscription • Computer • Internet Connection • Wireless Network (PC)

  25. What our solution won’t do • Completely eliminate unsolicited calls

  26. Competition Matrix

  27. Phase 0 Idea conceptualization Five team members Milestones (See Phase 0 Milestones) -PMS website -Final Presentation -SBIR Hard Work + $0 pay = An A?

  28. Phase 0 Organization

  29. Prototype MFCD

  30. Phase 1 Requirements: Initialization • Reassess the scope of the project. • Revise Phase 2 & 3 Milestones.

  31. Phase 1 Milestones: Prototype Production Compose requirements for, build and test: • PC Configuration Software • Control Device Software • Control Device GUI • Interception Software • Solicitation Generator (Test Harness) • Interfaces between Software Components

  32. Phase 1 Milestones: Documents • Prototype Test Plan • Prototype User Manuals • Help System for Prototype PC Software & Configuration Software

  33. Phase 1 Milestones: Presentations • Prototype Presentation • Final Presentation

  34. Phase 1 Milestones: Preparing for Phase 2 • Review Financial Documents • Revise Risks & Mitigation Plan • SBIR Grant Proposal II

  35. Staffing Resources • 5 Student Interns • Similar structure to current organization • All will assist with building & testing of software (See Staffing Plan)

  36. Phase 1 Organization

  37. Non-staffing Resources • Prototype is all software • 2 laptops required to run the prototype (See Resource Plan)

  38. Phase 1 Staffing Budget Staffing Budget: 5 Student Interns for 16 weeks: $38,360* 40% Overhead: $15,350 Total: $53,710 *Based on recommended salaries given by CEO ($25,000 per year). (See Staffing Budget)

  39. Phase 1 Non-Staffing Budget 2 Laptops: $2,000 Total: $2,000 Staffing Budget: $53,710 Total Phase 1 Budget: $55,710 (See Non-Staff Budget)

  40. Phase 1 Funding • Total Budget = $55,710 • Funded through NSF SBIR Program • Under maximum grant of $100,000 (See Funding Plan)

  41. Phase 1 Risks • Difficult to install • Fails to penetrate market • Land lines become obsolete • Product is too expensive • Difficult to connect to PC via wireless (See Risk Plan)

  42. Phase 1 Risk Matrix

  43. Evaluation of Phase 1 • All deliverables delivered on time • All prototype software meets requirements • Cost is within 5% of budget • SBIR Phase 2 funding secured (See Evaluation Plan)

  44. Phase 2 Milestones • Review Prototype • Revise Requirements • Build Test Hardware • Build Software • Revise/Create Documentation (See Phase 2 Milestones)

  45. Phase 2 Organization

  46. Non-staffing Resources • Components for producing hardware • 9 Computers for staff (See Resource Plan)

  47. Phase 2 Budget Total Staffing Budget: $319,910* 40% Overhead: $127,960 Total Staffing: $447,870 Development Computers: $18,000 Hardware Components: $1,000 Total Non-Staffing: $19,000 Total Budget: $466,870 *Based on recommended salaries given by CEO

  48. Evaluation of Phase 2 • All deliverables delivered on time • All final software meets requirements • Cost is within 10% of budget • Satisfies the market (based on surveys) (See Evaluation Plan)

  49. Phase 3 Milestones • Identify new team members • Beta test with potential customers • Begin advertising • Set up support staff • Contract hardware vendor • Construct final website • Initial rollout of product • Full rollout of product

  50. Phase 3 Organization

More Related