"Over the course of the next hour, several TIME reporters called her back, working to uncover the mystery of her bona fides. Her name, she said, was Samantha West, and she was definitely a robot, given the pitch perfect repetition of her answers. Her goal was to ask a series of questions about health coverage—'Are you on Medicare?' etc.—and then transfer the potential customer to a real person, who could close the sale."
"The user creates a setup text file (called a "hit list") that declares all of the Caller ID strings (numbers and/or names) he considers "annoying" and wants intercepted on the first ring. When a call on the users "hit list" arrives, the computer intercepts the call and picks up the extension. This feature alone is very valuable. It gives the ability to identify legitimate calls anywhere in the house by simply waiting to hear a second ring.
As if that feature wasn't enough, the TC2K then plays a wave file over the extension for the telemarketer to hear. The user can declare a list of wave files, in a specific order, that he wishes to be played to calls on his "hit list". The first wave file is played immediately after picking up the extension, the TC2K then waits for the telemarketer to respond, then the TC2K waits for silence (for the telemarketer to finish speaking), then plays the next wave file on the list. The cycle of play wave file, wait for response, wait for silence is repeated for each wave file the user has declared in his setup text file. This way the TC2K can carry on a "virtual" conversation with the telemarketer and the content of that conversation is completely up to the user. All the user needs to do is record his own set of wave files to be played and declare them in a setup file."
Bonus: this is the best example.
"'When you're growing the business initially, you have to do aggressive device subsidies to get people on the network,' he said. 'But as you approach 90 percent penetration, you move into maintenance mode. That means more device upgrades. And the model has to change. You can't afford to subsidize devices like that.'"
- Force Protection/Military
- Border Protection
- Port Security
- Consequence management
- Disaster response
- Crowd management and control
- Flight line protection and surveillance
- Parking lot surveillance and traffic management
- Crowd control
- Emergency response
- VIP/Dignitary protection
- High Level Security Arenas
- Long range surveillance"
"Only about 170 languages, or 2 percent, are vital or thriving online. Another 140 (1.7 percent) are borderline cases. The remaining 96 percent (over 6,000) are still or 'digitally dead.'"
This article available online at: