Deaftel is a phone service that allows deaf, hard of hearing, and speech impaired individuals to communicate with anyone over the phone by converting voice to text and vice versa using their smartphone app. The service originated as an entry for a Twilio programming contest but gained interest from emails from the deaf community about their communication challenges, and it quickly acquired over 500 users on the first day without any advertising.
Machine Learning and telecom are combined to change communication, as summarized in the document discussing the startup Deaftel, which allows deaf, hard of hearing, and those with speech impediments to talk to anyone over the phone by converting voice to text and vice versa using their smartphone application and an AI assistant. Deaftel began as an entry in a programming contest using Twilio but gained interest from the deaf community who needed an alternative to complex relay services.
Deaftel is a phone service that allows deaf, hard of hearing, and speech impaired individuals to communicate with anyone over the phone through text. It works by having a Deaftel user type messages on their smartphone which are then read aloud by a robot to the hearing caller, and the hearing caller's voice is transcribed to text for the Deaftel user. The service was originally created as an entry for a programming contest and gained over 500 users on the first day without any advertising due to requests from the deaf community for such a service.
The document describes the current problem of people who are deaf, hard of hearing, or have speech impediments not being able to communicate easily over the phone and outlines Deaftel as a proposed phone service that allows text-based communication between these users and anyone via a mobile app. It provides background on how Deaftel originated from an app development contest entry and gained interest from emails and signups from the deaf community, demonstrating a need for the service.
This document describes a proposed voice chat and social networking service for mobile subscribers. The service would allow subscribers to:
1) Create a profile with personal details and set preferences for contact.
2) Browse profiles of other subscribers and initiate voice conversations after verifying contact permissions.
3) Join or create persistent "chat rooms" to connect with friends and discuss topics of shared interest in real-time.
The service aims to bring the social connectivity of online platforms to mobile devices through an always-available voice network using the subscriber's mobile number as their identity. It is presented as a new potential revenue-generating service for telecom operators.
The document describes a voice chat and friend-finding service with the following key features:
1. It allows users to subscribe to a service to find and chat with friends by voice. 2. The service has options to search for friends by gender, find a friend by ID, or see recently added friends. 3. Users can create a profile, generate a chat ID, and bar calls from certain IDs. 4. The service also has group chat rooms and the ability to join a friend's chat room.
The document summarizes information from the Sherwood Forest bulletin board on various topics:
1. It discusses the recent raids by the Secret Service that shut down the Sherwood Forest II and III bulletin boards, likely due to credit card numbers being posted, and reprints an article from their archives.
2. It also reprints a guide from Sherwood Forest on exploiting vulnerabilities in the Israeli telephone system to make free calls.
3. Additional articles and guides from Sherwood Forest are promised to be reprinted in the future to spread their knowledge since their bulletin boards were shut down.
This document provides guidance on how to evaluate Voice over IP (VoIP) phone systems. It explains that VoIP vendors often exaggerate what their systems can do. The document aims to help businesses understand the technical jargon, options, and potential pitfalls of purchasing new VoIP solutions. It also notes that successfully deploying IP telephony requires cooperation between telephone and IT professionals due to the complex challenges of phones and computers sharing a common platform.
APIs and webhooks allow developers to integrate email functionality into their applications. APIs provide programmatic access to SendGrid's email delivery, analytics and other services via HTTP requests. Webhooks notify applications of email events through HTTP POST requests containing event data. Common events include spam reports, unsubscribes, bounces, opens and clicks. The document discusses several SendGrid APIs for SMTP, sub-users, marketing and resellers and provides an example of webhook event data containing timestamp, event type, email address and custom parameters. It notes how businesses and developers have built applications that leverage SendGrid's APIs and webhooks.
Machine Learning and telecom are combined to change communication, as summarized in the document discussing the startup Deaftel, which allows deaf, hard of hearing, and those with speech impediments to talk to anyone over the phone by converting voice to text and vice versa using their smartphone application and an AI assistant. Deaftel began as an entry in a programming contest using Twilio but gained interest from the deaf community who needed an alternative to complex relay services.
Deaftel is a phone service that allows deaf, hard of hearing, and speech impaired individuals to communicate with anyone over the phone through text. It works by having a Deaftel user type messages on their smartphone which are then read aloud by a robot to the hearing caller, and the hearing caller's voice is transcribed to text for the Deaftel user. The service was originally created as an entry for a programming contest and gained over 500 users on the first day without any advertising due to requests from the deaf community for such a service.
The document describes the current problem of people who are deaf, hard of hearing, or have speech impediments not being able to communicate easily over the phone and outlines Deaftel as a proposed phone service that allows text-based communication between these users and anyone via a mobile app. It provides background on how Deaftel originated from an app development contest entry and gained interest from emails and signups from the deaf community, demonstrating a need for the service.
This document describes a proposed voice chat and social networking service for mobile subscribers. The service would allow subscribers to:
1) Create a profile with personal details and set preferences for contact.
2) Browse profiles of other subscribers and initiate voice conversations after verifying contact permissions.
3) Join or create persistent "chat rooms" to connect with friends and discuss topics of shared interest in real-time.
The service aims to bring the social connectivity of online platforms to mobile devices through an always-available voice network using the subscriber's mobile number as their identity. It is presented as a new potential revenue-generating service for telecom operators.
The document describes a voice chat and friend-finding service with the following key features:
1. It allows users to subscribe to a service to find and chat with friends by voice. 2. The service has options to search for friends by gender, find a friend by ID, or see recently added friends. 3. Users can create a profile, generate a chat ID, and bar calls from certain IDs. 4. The service also has group chat rooms and the ability to join a friend's chat room.
The document summarizes information from the Sherwood Forest bulletin board on various topics:
1. It discusses the recent raids by the Secret Service that shut down the Sherwood Forest II and III bulletin boards, likely due to credit card numbers being posted, and reprints an article from their archives.
2. It also reprints a guide from Sherwood Forest on exploiting vulnerabilities in the Israeli telephone system to make free calls.
3. Additional articles and guides from Sherwood Forest are promised to be reprinted in the future to spread their knowledge since their bulletin boards were shut down.
This document provides guidance on how to evaluate Voice over IP (VoIP) phone systems. It explains that VoIP vendors often exaggerate what their systems can do. The document aims to help businesses understand the technical jargon, options, and potential pitfalls of purchasing new VoIP solutions. It also notes that successfully deploying IP telephony requires cooperation between telephone and IT professionals due to the complex challenges of phones and computers sharing a common platform.
APIs and webhooks allow developers to integrate email functionality into their applications. APIs provide programmatic access to SendGrid's email delivery, analytics and other services via HTTP requests. Webhooks notify applications of email events through HTTP POST requests containing event data. Common events include spam reports, unsubscribes, bounces, opens and clicks. The document discusses several SendGrid APIs for SMTP, sub-users, marketing and resellers and provides an example of webhook event data containing timestamp, event type, email address and custom parameters. It notes how businesses and developers have built applications that leverage SendGrid's APIs and webhooks.
The document discusses the concepts of presence and fame on social media. It describes how presence can provide contextual information like availability, activity, and reputation to help determine the best way to connect and communicate with others. It also gives examples of how explicit and tacit presence signals like status updates, call logs, and geolocation data can be used to make these decisions.
This document summarizes an article from the October 1985 issue of 2600 magazine. It discusses the experiences of two individuals who attempted to contract their hacking services to phone companies but were not compensated as promised. They provided information about vulnerabilities in phone systems to companies for a fee, but the companies denied agreements or obligations to pay once the information was received. The article warns that companies cannot be trusted and any agreements should be gotten in writing.
This document summarizes Martin Geddes' keynote presentation at Metaswitch Forum 2012. The presentation looked at the past, present and future of voice communications. In the past, voice was synonymous with telephony provided by telcos with a service-centric model. In the future, voice will join text and images on the web in a model driven by experiences across devices and services. Currently there is a collision between the telco and web models resulting in confusion. [/SUMMARY]
The document discusses designing an interactive voice response system for Somaliland to connect citizens and government. It begins with background on Somaliland's political system and context. It then discusses the original concept of a "C-SPAN for Somalia" to televise parliamentary sessions. However, due to low literacy and oral traditions, an IVR system using mobile phones is proposed instead. The document outlines challenges in deployment and lessons learned, such as the need for political will and usability testing.
The document discusses the concept of "Voice 2.0" services, which harness the internet and web functionality to deliver new phone services. It provides examples of current "Voice 2.0" players and how they incorporate characteristics of Web 2.0 like user-generated content, tagging, and network effects. The document argues that telecommunications companies could participate in this emerging space by exposing and adding value to the large amounts of customer data they hold, taking a more "Web 2.0" approach to developing new voice services.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...Jason Yip
The typical problem in product engineering is not bad strategy, so much as “no strategy”. This leads to confusion, lack of motivation, and incoherent action. The next time you look for a strategy and find an empty space, instead of waiting for it to be filled, I will show you how to fill it in yourself. If you’re wrong, it forces a correction. If you’re right, it helps create focus. I’ll share how I’ve approached this in the past, both what works and lessons for what didn’t work so well.
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
Digital Marketing Trends in 2024 | Guide for Staying AheadWask
https://www.wask.co/ebooks/digital-marketing-trends-in-2024
Feeling lost in the digital marketing whirlwind of 2024? Technology is changing, consumer habits are evolving, and staying ahead of the curve feels like a never-ending pursuit. This e-book is your compass. Dive into actionable insights to handle the complexities of modern marketing. From hyper-personalization to the power of user-generated content, learn how to build long-term relationships with your audience and unlock the secrets to success in the ever-shifting digital landscape.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
The document discusses the concepts of presence and fame on social media. It describes how presence can provide contextual information like availability, activity, and reputation to help determine the best way to connect and communicate with others. It also gives examples of how explicit and tacit presence signals like status updates, call logs, and geolocation data can be used to make these decisions.
This document summarizes an article from the October 1985 issue of 2600 magazine. It discusses the experiences of two individuals who attempted to contract their hacking services to phone companies but were not compensated as promised. They provided information about vulnerabilities in phone systems to companies for a fee, but the companies denied agreements or obligations to pay once the information was received. The article warns that companies cannot be trusted and any agreements should be gotten in writing.
This document summarizes Martin Geddes' keynote presentation at Metaswitch Forum 2012. The presentation looked at the past, present and future of voice communications. In the past, voice was synonymous with telephony provided by telcos with a service-centric model. In the future, voice will join text and images on the web in a model driven by experiences across devices and services. Currently there is a collision between the telco and web models resulting in confusion. [/SUMMARY]
The document discusses designing an interactive voice response system for Somaliland to connect citizens and government. It begins with background on Somaliland's political system and context. It then discusses the original concept of a "C-SPAN for Somalia" to televise parliamentary sessions. However, due to low literacy and oral traditions, an IVR system using mobile phones is proposed instead. The document outlines challenges in deployment and lessons learned, such as the need for political will and usability testing.
The document discusses the concept of "Voice 2.0" services, which harness the internet and web functionality to deliver new phone services. It provides examples of current "Voice 2.0" players and how they incorporate characteristics of Web 2.0 like user-generated content, tagging, and network effects. The document argues that telecommunications companies could participate in this emerging space by exposing and adding value to the large amounts of customer data they hold, taking a more "Web 2.0" approach to developing new voice services.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...Jason Yip
The typical problem in product engineering is not bad strategy, so much as “no strategy”. This leads to confusion, lack of motivation, and incoherent action. The next time you look for a strategy and find an empty space, instead of waiting for it to be filled, I will show you how to fill it in yourself. If you’re wrong, it forces a correction. If you’re right, it helps create focus. I’ll share how I’ve approached this in the past, both what works and lessons for what didn’t work so well.
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
Digital Marketing Trends in 2024 | Guide for Staying AheadWask
https://www.wask.co/ebooks/digital-marketing-trends-in-2024
Feeling lost in the digital marketing whirlwind of 2024? Technology is changing, consumer habits are evolving, and staying ahead of the curve feels like a never-ending pursuit. This e-book is your compass. Dive into actionable insights to handle the complexities of modern marketing. From hyper-personalization to the power of user-generated content, learn how to build long-term relationships with your audience and unlock the secrets to success in the ever-shifting digital landscape.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
"Choosing proper type of scaling", Olena SyrotaFwdays
Imagine an IoT processing system that is already quite mature and production-ready and for which client coverage is growing and scaling and performance aspects are life and death questions. The system has Redis, MongoDB, and stream processing based on ksqldb. In this talk, firstly, we will analyze scaling approaches and then select the proper ones for our system.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
GraphRAG for Life Science to increase LLM accuracy
General Machines Deck
1. We combine
Machine Learning
with telecom to
change communication.
Kunal Batra VahidHamidullah
CEO CTO
2.
3. 2
Current Problem
• Imagine calling a loved one, Doctor, Lawyer
• Can’t speak directly
• Complex Procedure (special code words)
• No privacy
4. Current Market
• According to John Hopkins Medicine, “Nearly a fifth of all
Americans 12 years or older have hearing loss so severe
that it may make communication difficult”
• 48 million people in the USA.
• 800 million worldwide.
5. 3
Current Calling Procedure
Step 2 Step 5 Step 6
Step 1 Caller provides the Step 3 Step 4 The Relay Operator
When the parties
Caller dials 7-1-1. A relay operator with The Relay Operator Both the caller and are ready to end
will type everything
Relay Operator will the number along dials that number, the called parties the call, the caller
they hear back to
answer the call by with other announces to the should use "GA" or or call recipient
the TTY user, and
saying "New York information such as called party that "Go Ahead" when uses "SK" or
voice everything
Relay," and his/her their name, the they are receiving a they are finished "Signing Off" to
the TTY user types
Operator ID #. person they are relay call. typing/talking. close the
to the called party.
calling, etc. conversation.
(Source: www.nyrelay.com)
6. 4
About Deaftel
Deaftel is a phone service that lets the Deaf, Hard of Hearing & those with
speech impediments talk to anyone over the phone.
Voice Text
Any Hearing User Deaftel Smartphone
Deaftel Robot User
7. History
How we went from a Social Network for Indians
to a Phone Service for the Deaf & Hard of Hearing.
?
8. History
Social Roots needed a way for Business Owners to verify their
business on our site. (Pictured on the left is my absolute favorite
Indian restaurant Utsav!)
I found out about Twilio through a Techcrunch article and it was
love at first api. Started to enter their programming contests in my
downtime.
I entered their anything goes contest with a random idea of creating
a java chat box where I converted voice to text and text back into voice.
I DIDN’T WIN THE CONTEST
9. History
Forgot about the programming contest and went back to trying
convince Indian Businesses why they need to pay me a lot of money
For the services Social Roots can offer their business.
They would listen to my pitch & then ask me to explain “What email is”
A week after the programming contest finished, the programmable web
made my Twilio entry their mashup of the day.
My inbox started to fill up with compelling emails from the Deaf
community on how they need my service.
10. 5
History of Deaftel
Contest Entry
Began as a contest entry for
“I am profoundly hearing impaired. I do not the “Anything Goes” Twilio
Programming Contest.
sign. …Many places like doctor's offices will not
use a relay/tty service to call me about
appointment changes. They just wait till I drive Emails
2 hours then tell me there that my While working on my
previous startup
appointment was changed…I am desperate!” Socialroots.com, I just kept
receiving emails from the
deaf community asking to
use this service.
-R
Deaftel Signup
By the end of the first day I
had a little over 500 users
signup showing their
interest. There was no
advertising other than
creating a Facebook and
Twitter page.
Hey guys my name is kunal batra and I am the founder of Deaftel, a new type of phone service for the deaf. Now I am going to go out on a limb here and say that either all of you or almost all of you will not be users of my product. So before I go on any further I just want you to imagine this scenario. Your calling your husband/wife/a loved one, a doctor or a lawyer. However instead of speaking with them directly, your talking to somebody at a call center( could be male or female). Whatever you say, they relay to the person your calling. And then the same applies in the other direction. Whatever your loved one says gets spoken to the person in the call center than this relay operator speaks the message back to you. This happens until the conversation is over. However the conversation is only over until you speak a certain special word that the relay operator recognizes and then will disconnect the call. There is no true sense of privacy. However privacy is not the only issue.
There is also a complexity with the system. If you wanted to call a deaf individual you can’t dial his or her number directly. You have to call the relay operator. So if you live in the state of new york you dial 711 which connects you with the relay operator service. Then you provide the relay operator with certain pieces of information such as the number of the deaf person you want to call, their name and your name. Also every time someone is done talking they have to either say “Go Ahead” or the deaf person has to type it if using text relay. And finally when the conversation is over either the deaf or hearing person has to say or type the words Signing Off.
So with Deaftel, I want to transform the current method of making phone calls to be as close as possible to how you or do it on a daily basis. A hearing user can directly dial the deaf users phone number. Deaftel converts the voice of the hearing user into text and sends that to the deaftel users smart phone. The text response of the Deaftel user is then converted into voice(male or female based on the gender of the deaftel user) and then played for the hearing user. No special codewords needed. The Deaftel user will be able just purchase a phone plan based on how many minutes he or she expects to use from our website just like a hearing person does from att, verizon or sprint and will be billed on a monthly basis. I use the image of the robot shown in the slide to emphasize the fact that there is no person sitting inbetween your phone call which makes for a more private conversation.
So before I go into the demo I just quickly want to go over why I created Deaftel since its always the first question I get asked. I am not deaf nor do I know anybody who is deaf. So while working on my previous Start Up Social Roots. I decided to enter Twilio’s holiday anything goes contest in december of last year. I created the first prototype of deaftel and called it hipfone. It was just javascript/php based. I didn’t win but became a runner up, so twilio wrote a short blurb on their blog. That somehow got picked up on a few other blogs. So starting from January of 2011 I started receiving these compelling emails from people in the deaf community asking me when they could use my service. I pasted one of the emails that really touched me on the slide. So around November and some hundred emails later I decided to work on this full time and see if there was a demand. So I created a landing page describing what the service does and a twitter account and started following the max number of people twitter would allow me which was 2000. I used it as as kind of a cheap way of advertising. Within the first 2 hours out of the 2000 people I followed 500 visited the website and left their email stating they were interested or other relay operators asking how my product worked and asking to meet up and discuss my solution in person.