Skip to main content

Automated calls ....

I've noticed in the last year or so an increase in the number of calls I receive where instead of being greeted by a living agent I am greeted by an automated one. Usually these calls start with an annoying 2 second gap where I say "hello" several times before the machine begins to play its recorded spiel. Today, I received another of many calls I've taken from a company that claims (through the robotic voice) to want to provide me with a better rate on my auto insurance. The only problem is that I don't have a car, and haven't had one since 2002. The automated message is interested as it goes something like this:

"If you wish to speak to an agent about our package please press 1. If you do not wish to take advantage of this offer and wish to be removed from our call list please press 2."

Unfortunately, the company in question is deceptive in both options. In the several times I've received this call (often at the most inopportune times) I've pressed both options. At first, I pressed option 2, thinking that I would not hear from the robot again....I was wrong, I did it 2 more times before realizing that option 2 is false, they are using a hard sell tactic to force you to speak to their agents. After being annoyed with the message yet another time, I decide to press 1 just to hear what the agent would say. During this call I must admit to having been quite upset at the call, and I am sure the agent heard the frustration in my voice when I told him "take me off this damned list." his response was immediate. "I'll go ahead and do that for you, good bye."

This worried me as it was too fast an answer. Sure enough a few days later the robot call was back, after composing myself I selected option 2 again, thinking maybe it didn't "take" the first few times (still holding out hope that it would work irrationally) ...a few weeks passed and I thought I was free of the scourge of the robot but today that joy was smashed by the call yet again. This time, I chose option 1 again composed myself and readied for the agent.

Agent: "Good morning , my name is Tasha , How are you doing today?"

Me: "Not very good Tasha."

Agent: "Click!"

Now, it maybe the case that she's received many such introductions but there was no reason for her to assume I was talking about the automated call I'd received but it seems she did. Likely caused by the many fire breathing calls she must take every day thanks to the slimy tactics of her company. However that is no excuse to hang up on a potential "customer" without saying a word. Here behavior is a reflection of the slimy tactics of the company she works for and it doesn't surprise me that she works there. Next time I plan on answering with absolute joy in my heart, to see what happens if I inquire about their plan. I'll tell them that I will be getting a car in the future but want information on their plans just to see what goes on.

stay tuned.

Update April 29, 2009

I received another call about 2 weeks ago and this time selected the option to speak to the representative again. I put on a joyful spirit and when connected with the representative expressed interest. I told them that I didn't have a car at the moment and the response was:

"You don't have a car?"


So he sure will get the customer service medal of the year. It seems clear that the company is not interested in even making the effort of treating anyone who they won't be able to extract money from as a human being.

This very day, a local radio station had a story about the calls and the fact that Verizon (my phone company thankfully) has fined and removed the companies from their system, finding the calls abusive. I sure hope I never have to answer another call from that or any similar service!


Popular posts from this blog

Engineers versus Programmers

I have found as more non formally trained people enter the coding space, the quality of code that results varies in an interesting way.

The formalities of learning to code in a structured course at University involve often strong focus on "correctness" and efficiency in the form of big O representations for the algorithms created.

Much less focus tends to be placed on what I'll call practical programming, which is the type of code that engineers (note I didn't use "programmers" on purpose) must learn to write.

Programmers are what Universities create, students that can take a defined development environment and within in write an algorithm for computing some sequence or traversing a tree or encoding and decoding a string. Efficiency and invariant rules are guiding development missions. Execution time for creating the solution is often a week or more depending on the professor and their style of teaching code and giving out problems. This type of coding is devo…

Highly targeted Cpg vaccine immunotherapy for a range of cancer


This will surely go down as a seminal advance in cancer therapy. It reads like magic:

So this new approach looks for the specific proteins that are associated with a given tumors resistance to attack by the body's T cells, it then adjusts those T cells to be hyper sensitive to the specific oncogenic proteins targeted. These cells become essentially The Terminator​ T cells in the specific tumor AND have the multiplied effect of traveling along the immune pathway of spreading that the cancer many have metastasized. This is huge squared because it means you can essentially use targeting one tumor to identify and eliminate distal tumors that you many not even realize exist.

This allows the therapy for treating cancer to, for the first time; end the "wack a mole" problem that has frustrated traditional shot gun methods of treatment involving radiation and chemotherapy ...which by their nature unfortunately damage parts of the body that are not cancer laden but …

AgilEntity Architecture: Action Oriented Workflow

Permissions, fine grained versus management headache
The usual method for determining which users can perform a given function on a given object in a managed system, employs providing those Users with specific access rights via the use of permissions. Often these permissions are also able to be granted to collections called Groups, to which Users are added. The combination of Permissions and Groups provides the ability to provide as atomic a dissemination of rights across the User space as possible. However, this granularity comes at the price of reduced efficiency for managing the created permissions and more importantly the Groups that collect Users designated to perform sets of actions. Essentially the Groups serve as access control lists in many systems, which for the variable and often changing environment of business applications means a need to constantly update the ACL’s (groups) in order to add or remove individuals based on their ability to perform certain actions. Also, the…