Call Center agent/supervisor features

Call Center agent/supervisor features

This section describes features and procedures for both the Call Center agent and the supervisor.

Agent Login

/

/

1.Press the Make Busy Key until the indi- cator turns on.

2.Press the In-CallsKey.

3.Dial your four-digit agent ID. You are automatically in the Not Ready state and in the current ACD queue.

/

Agent Login Enhancement

4.Press the Not Ready Key when you are ready to accept ACD calls. The LED for the Not Ready Key goes off.

Note: You must press the Headset Key the first time you log in, if using a direct connect headset.

This feature provides two new options to ensure that only assigned agents are able to log into an ACD group:

Partitioning of agent login identification numbers between customer groups

Agent login password option

Each time an agent enters an identification number, a check is made to determine if the set being used is associated with the same customer group as the identification number.

If this check is successful and the password option has been assigned, the agent receives a special dial tone. The agent must enter a four-digit password (a number in the range 0001 through 9999). When the password is accepted, the agent is logged into the ACD group. If a checks is unsuccessful, a reorder tone is given.

33

Page 33
Image 33
Nortel Networks SL-100 manual Call Center agent/supervisor features, Agent Login Enhancement

SL-100 specifications

Nortel Networks SL-100 is a sophisticated telecommunications platform renowned for its versatility and robust features. Introduced in the late 1990s, this digital switching system caters primarily to small and medium-sized enterprises (SMEs), providing them with advanced telephony capabilities that were once limited to larger organizations.

At the heart of the SL-100 is its ability to support both traditional circuit-switched telephony and emerging VoIP technologies. This dual capability allows businesses to transition seamlessly from legacy systems to modern communication frameworks, ensuring that they can leverage both existing infrastructure and new innovations. The platform is designed to scale, accommodating a range of up to 2,000 lines, making it an appropriate solution for companies anticipating growth.

One of the standout characteristics of the SL-100 is its modular architecture. This design enables organizations to customize their systems with various modules tailored to specific needs. Options such as voicemail, call center features, and enhanced reporting capabilities can be integrated without necessitating a complete system overhaul. As a result, businesses can implement only the features they require, optimizing cost and efficiency.

Nortel’s SL-100 employs a centralized management interface that simplifies administration and improves operational efficiency. This interface provides system administrators with real-time monitoring and the ability to manage user accounts and features from a single point. The platform also facilitates easier troubleshooting and maintenance, reducing downtime and operational disruption.

Security is another essential feature of the SL-100. It incorporates user authentication, call encryption, and network security measures to protect sensitive communications. As cyber threats become increasingly prevalent, the SL-100 positions itself as a reliable option for businesses concerned about maintaining secure communications.

Additionally, the Nortel SL-100 supports various standard protocols, enhancing interoperability with third-party applications and equipment. This crucial compatibility improves its attractiveness to organizations seeking to integrate their legacy systems with modern solutions like customer relationship management (CRM) and other enterprise applications.

Overall, Nortel Networks SL-100 stands out as a dynamic telecommunications solution, balancing advanced technology, flexibility, and security. As businesses navigate an ever-evolving communications landscape, the SL-100 offers a pathway for companies to modernize their communication infrastructure while maintaining the functionality and integrity of their existing systems.