How to Solve the Problem of Lost Property


sizcache = "0" sizset = "63">

lost property is a huge problem. For example, in Chicago in 2005 over 85 000 phones, PDAs, and 21 000 4500 laptops were left in a taxi (PC World February 17, 2005). Just astounding. I think everyone will agree that the problem is huge, and statistically most people reading this will lose something at one time or another.

So how to solve the problem?

I know, I know, I can already hear him speak. "You put your name and phone number on it, a fool" . Yeah, it uses to work. Then again, the 50-we also do not have to lock our houses. Identity theft is the largest growth in crime in the world today. Current estimates in the Forbes article is that in 2009 alone cost American consumers jaw dropping $ 54 billion to a staggering six billion U.S. dollars in 2008. With the ubiquitous nature of these data on web sites such as 411.com, AnyWho.com, Whitepages.com, USAPhoneLookup.com, 123People.com. They allow users to reverse look (ie, enter information such as phone number and get details such as name and address) of all kinds of information. Yes, you will be able to find similar sites in their country.

Thus, it is very easy these days for someone who finds your keys with your name and number on them, to look your address! Not good if you have the keys to the front door. OK, so if you do not want to render our contact details on the item, what can we do? Well, the answer is simple. At least to start it.

instead of putting her contact details for the item, make contact third-party information on it. It protects you from any unscrupulous person / people who have actually discovered the May / stolen your item. This protection is provided by a third party was fantastic. However, there is one small advantage to have it waived. Response time! In some cases it is OK, time is not always crucial. However, in more common situations (such as loss of keys, phone or laptop) you want to get your stuff back ASAP . Original, off and on-line, lost asset recovery companies require the following application and registration:

  • You can contact the company;
  • They then send you some stickers and the like;
  • waiting for labels to come, and then put them all you want protected;
  • then usually have to inform them about what kind of labels are attached;
    • offline businesses will require you to fill out the form and send it back to them. At this point one will overwrite the data in their database.
    • on-line companies that process is provided with on-line "activation" of the sign, where you can enter data directly into the system.

It seems a little long winded and does not slow down? Well, to me. I think you just bought a new laptop, and want to protect now ! Right? If you're anything like me, if it does not protect immediately at the time to buy a laptop, then chances are you would never consider doing again, until it izgubiti.Zajedničke recovery process of these recovery of lost property goes something like this:

  • a person loses a laptop;
  • a person loses a laptop, ...
  • to confirm the recovery of the label owners and retrieves information;
  • recovery company will do one of two things at this point, depending on their business model.
    • They are or will be asked to explain that they are sending by courier to pick it up;
    • , or they will get the details requested, then contact the owner and pass on the information for the owner to follow up with a viewfinder.

Unfortunately, I believe that there are problems here with both models. In the first scenario, the required waiting courier. First, the finder should not really wait. Second, the owner must be courier anywhere they can find. It's hard to do if you are out shopping. Finally, the time it takes to organize and execute this method. I think you're talking h in at least .

The second scenario is the "old school", which has some merit, because in many cases it is much faster. However, there are still big gaps! In a world where personal data should be strictly guarded, this model requires the transfer of personal data. The owner of a protected right, but the hero, the Good Samaritan, who found the item and reported on, have their personal information distributed. I was trying to develop a solution to this problem. I thought it was completely set aside. That was until I started testing on humans. I was seduced by the potential recovery rate, "old school" solution in which the two sides talking to each other.

But it was not long before a young boy I tried to notice something that scared the hell out of me. He said, "wow, cool! This will be a great way to pick up chicks !". Turns out, when he saw that the job took him about 2 minutes he decided that he could drop a set of keys to the girl and the system would forward her details when informed that they had found. It blew me away on two fronts. First, that people think like this and much more valuable this information. It is imperative that both parties' personal information will remain just that. Personally.

I immediately stopped developing until I could solve the problem. It took me a few months, but I, and with only minimal loss in speed of recovery. At this point I am proud to say that there is only one company in the world that offers solutions to these problems. Select items as a quick and simple as generating ID code and print or write on. Then, recovering the subject is a breeze and super brzo.Finder sends SMS system. This is confirmed by the subject and creates a secure channel for contact between the two parties. Details of the channel then SMSed, and e-mail to the owner. Owner may, in his spare time, please call our secure system, enter the ID and channel finder was then kontaktirao.Dvije parties can talk to each other, and for additional security in the future, the call will be recorded. They can then arrange to return the item, for potential cut recovery time in most cases minutes .

What do you think is the most lost item?

What do you think is the most lost item?

...

0 comments:

Post a Comment