Sign Up

Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.

Have an account? Sign In

Have an account? Sign In Now

Sign In

Login to our social questions & Answers Engine to ask questions answer people’s questions & connect with other people.

Sign Up Here

Forgot Password?

Don't have account, Sign Up Here

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.

Have an account? Sign In Now

You must login to ask a question.

Forgot Password?

Need An Account, Sign Up Here

Please briefly explain why you feel this question should be reported.

Please briefly explain why you feel this answer should be reported.

Please briefly explain why you feel this user should be reported.

Sign InSign Up

The Archive Base

The Archive Base Logo The Archive Base Logo

The Archive Base Navigation

  • SEARCH
  • Home
  • About Us
  • Blog
  • Contact Us
Search
Ask A Question

Mobile menu

Close
Ask a Question
  • Home
  • Add group
  • Groups page
  • Feed
  • User Profile
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges
  • Buy Points
  • Users
  • Help
  • Buy Theme
  • SEARCH
Home/ Questions/Q 194385
In Process

The Archive Base Latest Questions

Editorial Team
  • 0
Editorial Team
Asked: May 11, 20262026-05-11T16:35:26+00:00 2026-05-11T16:35:26+00:00

I work for a software shop, which has an in house predictive dialer product,

  • 0

I work for a software shop, which has an in house predictive dialer product, and we need to implement a solution to obey to the DO-NOT-CALL lists.

Basically, I have a database with the customers/prospective customers that I need to call, and another database with the phone numbers I can’t call. As the system is a predictive dialer, based on the performance of the operation, time averages and stuff, it’ll dial more or less calls per logged system user. Usually this ‘magic’ number is around 3 – 4 calls per logged agent.

The phone number repository for the predictive dialer is a PostgreSQL database. The predictive dialer pick a bunch of numbers up from the database and send a command to the pbx to dial the bunch, and then the business logic goes on to transfer the valid calls to the call center clerks, and etc (this is irrelevant as my problem is before the call).

I need to implement the do-not-call list functionality. This do-not-call list will be provided to our company by a government agency, in a CSV file, on a daily basis. Every time I receive a new CSV file, I have to purge the old do-not-call-list, and put the new one in place.

My first thought to implement it was do a batch processing, cross-referencing the DO NOT CALL LIST with my current customer database. But I think that, depending on the size of both databases, the cross-referencing would be very performance intensive, and sometimes could not be finished overnight. I’ve had this kind of problems with batch processing before, and it’s not a nice thing to see.

My second idea came up when I thought about how large institutions handle high-performance and high-throughput authorization systems, such as credit card or user authentication/authorization. I thought that creating an authentication service for the DO NOT CALL LIST numbers, and changing the algorithm of my predictive dialer to check each number against this authorization service before dialing would be neat.

As I’m only confabulating here, I have no idea which idea is the best, or if I got it totally wrong and should look to another direction. So, my question is: what would be your recommendation? Store the DO NOT CALL CSV file in memory? use LDAP? use MySQL? PostgreSQL? Do the batch processing thing? Or am I definitely screwed?

I know I’m not the first person in the world to have this kind of problem, so please enlighten me.

  • 1 1 Answer
  • 0 Views
  • 0 Followers
  • 0
Share
  • Facebook
  • Report

Leave an answer
Cancel reply

You must login to add an answer.

Forgot Password?

Need An Account, Sign Up Here

1 Answer

  • Voted
  • Oldest
  • Recent
  • Random
  1. Editorial Team
    Editorial Team
    2026-05-11T16:35:27+00:00Added an answer on May 11, 2026 at 4:35 pm

    Your challenge, of finding a number of entries from within a vast space of possible entries, reminds me of DNS black/block lists.

    rbldnsd is a small and fast DNS
    daemon which is especially made to
    serve DNSBL zones. This daemon was
    inspired by Dan J. Bernstein’s rbldns
    program found in the djbdns package. More rbldnsd, from Google

    It has support for name-based zones, so you could convert the list of numbers to ENUM-style URIs – eg +1-555-4242 becomes 2.4.2.4.5.5.5.1.e164.arpa. This is then entered into the rbldnsd datafile, compiled into memory and accessed like any other blocklist. A default entry means can-call, or if the entry exists, it would be given a DoNotCall entry.

    You’ve still got the batch conversion problem though, although it would be a somewhat simpler script, quite possible to do with Perl or AWK. You might also be able to split the incoming CSV files to multiple files for parallel processing, and a final merge.

    • 0
    • Reply
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
      • Report

Sidebar

Related Questions

I work for a smallish software shop with a mix of internal products, and
I have the code for various versions of a software product I work on
One thing I've always wondered about is how software patches work. A lot of
I work a lot with network and serial communications software, so it is often
Suppose you work at a medium-to-large software company with many independently-developed projects (independent coders)
I currently work for a bespoke software agency. Does anyone have any experience of
I love to work on AI optimization software (Genetic Algorithms, Particle Swarm, Ant Colony,
I'm doing a little bit of work on a horrid piece of software built
We're experimenting with following an agile approach to software development where I work. It's
I work in an Oracle shop. There's a toolset that consists of roughly 1000

Explore

  • Home
  • Add group
  • Groups page
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges
  • Users
  • Help
  • SEARCH

Footer

© 2021 The Archive Base. All Rights Reserved
With Love by The Archive Base

Insert/edit link

Enter the destination URL

Or link to existing content

    No search term specified. Showing recent items. Search or use up and down arrow keys to select an item.