SlideShare a Scribd company logo
1 of 14
Download to read offline
Getting started with
SaveOurScott
You require three things:
• 1. Browser interface
• 2. X-lite softphone program
• 3. Understanding of what
you’re doing!
1. Browser interface
• Open a new tab in Chrome
Ctrl-Click
this button
Quicklinks: 1. Browser Interface 2. X-Lite 3. Making the calls
1. Browser interface
• Sign in using your assigned volunteer number
Your username will be “pb_vol_act1” or
2 or 3…the number is written on the
yellow tape on your computer, inside a
square.
Quicklinks: 1. Browser Interface 2. X-Lite 3. Making the calls
1. Browser interface
• Click “phonebanking” on the top menu
Quicklinks: 1. Browser Interface 2. X-Lite 3. Making the calls
1. Browser interface
• Open your appropriate list
• The list to open is written on the yellow
tape on your computer: “tier2.list_xx”
• It will probably be on page 2
Quicklinks: 1. Browser Interface 2. X-Lite 3. Making the calls
2. Softphone
• Open “X-Lite”
• The logo on the
start menu looks
like below
Quicklinks: 1. Browser Interface 2. X-Lite 3. Making the calls
3. Process for each call
• Click on a grey number – this is a voter
who hasn’t yet been contacted.
• You will then see the following interface
(next page)
Quicklinks: 1. Browser Interface 2. X-Lite 3. Making the calls
3. Process for each call
Quicklinks: 1. Browser Interface 2. X-Lite 3. Making the calls
3. Process for each call
• Type (or copy-paste) the number into X-
lite and call away.
Quicklinks: 1. Browser Interface 2. X-Lite 3. Making the calls
3. Process for each call
Record Contact Status
1. A meaningful interaction
2. Couldn’t talk now
3. Doesn’t speak English
4. No answer OR answering
machine
5. Disconnected, no voter,
wrong number, etc
6. Do not call again
Quicklinks: 1. Browser Interface 2. X-Lite 3. Making the calls
3. Process for each call
If contact status was “answered”
record a Support Level
1. Unconditionally voting for
Scott
2. Conditionally supports scott
3. Undecided
4. Doesn’t support scott, open
to discussion.
5. Hates Scott, closed to
discussion.
Quicklinks: 1. Browser Interface 2. X-Lite 3. Making the calls
3. Process for each call
• Tick any issues and record any thing else
in “Notes”
• Click “Log contact” to end.
Quicklinks: 1. Browser Interface 2. X-Lite 3. Making the calls
3. Process for each call
• Time for your next call!
Quicklinks: 1. Browser Interface 2. X-Lite 3. Making the calls

More Related Content

What's hot

How to get rid of adware win32 open candy virus
How to get rid of adware win32 open candy virusHow to get rid of adware win32 open candy virus
How to get rid of adware win32 open candy virusFixPCyourself
 
Backdoor.darkmoon trojan removal guide
Backdoor.darkmoon trojan removal guideBackdoor.darkmoon trojan removal guide
Backdoor.darkmoon trojan removal guideFixPCyourself
 
Guide to get rid of unlockthenet hijacker virus
Guide to get rid of unlockthenet hijacker virusGuide to get rid of unlockthenet hijacker virus
Guide to get rid of unlockthenet hijacker virusFixPCyourself
 
How to get rid of live security platinum 3.6.1
How to get rid of live security platinum 3.6.1How to get rid of live security platinum 3.6.1
How to get rid of live security platinum 3.6.1FixPCyourself
 
Get rid of xp defender 2013 virus
Get rid of xp defender 2013 virusGet rid of xp defender 2013 virus
Get rid of xp defender 2013 virusFixPCyourself
 
Cridex trojan removal guide
Cridex trojan removal guideCridex trojan removal guide
Cridex trojan removal guideFixPCyourself
 
Guide to remove win 7 home security
Guide to remove win 7 home securityGuide to remove win 7 home security
Guide to remove win 7 home securityFixPCyourself
 
How to get rid of microsoft security essentials alert virus
How to get rid of microsoft security essentials alert virusHow to get rid of microsoft security essentials alert virus
How to get rid of microsoft security essentials alert virusFixPCyourself
 
How to get rid of windows proactive safety
How to get rid of windows proactive safetyHow to get rid of windows proactive safety
How to get rid of windows proactive safetyFixPCyourself
 
How to get rid of windows virtual security virus
How to get rid of windows virtual security virusHow to get rid of windows virtual security virus
How to get rid of windows virtual security virusFixPCyourself
 
How to get rid of windows profound security virus
How to get rid of windows profound security virusHow to get rid of windows profound security virus
How to get rid of windows profound security virusFixPCyourself
 
How to get rid of security shield 2012 virus
How to get rid of security shield 2012 virusHow to get rid of security shield 2012 virus
How to get rid of security shield 2012 virusFixPCyourself
 
How to delete windows safety toolkit
How to delete windows safety toolkitHow to delete windows safety toolkit
How to delete windows safety toolkitFixPCyourself
 
Delete runclips.com browser hijacker
Delete runclips.com browser hijackerDelete runclips.com browser hijacker
Delete runclips.com browser hijackerFixPCyourself
 
How to get rid of windows web commander virus
How to get rid of windows web commander virusHow to get rid of windows web commander virus
How to get rid of windows web commander virusFixPCyourself
 
How to get rid of windows home patron virus
How to get rid of windows home patron virusHow to get rid of windows home patron virus
How to get rid of windows home patron virusFixPCyourself
 
How to get rid of vista internet security 2013 virus
How to get rid of vista internet security 2013 virusHow to get rid of vista internet security 2013 virus
How to get rid of vista internet security 2013 virusFixPCyourself
 
How to get rid of xp internet security 2013 virus
How to get rid of xp internet security 2013 virusHow to get rid of xp internet security 2013 virus
How to get rid of xp internet security 2013 virusFixPCyourself
 
How to get rid of xp antispyware 2013 virus
How to get rid of xp antispyware 2013 virusHow to get rid of xp antispyware 2013 virus
How to get rid of xp antispyware 2013 virusFixPCyourself
 

What's hot (20)

V
VV
V
 
How to get rid of adware win32 open candy virus
How to get rid of adware win32 open candy virusHow to get rid of adware win32 open candy virus
How to get rid of adware win32 open candy virus
 
Backdoor.darkmoon trojan removal guide
Backdoor.darkmoon trojan removal guideBackdoor.darkmoon trojan removal guide
Backdoor.darkmoon trojan removal guide
 
Guide to get rid of unlockthenet hijacker virus
Guide to get rid of unlockthenet hijacker virusGuide to get rid of unlockthenet hijacker virus
Guide to get rid of unlockthenet hijacker virus
 
How to get rid of live security platinum 3.6.1
How to get rid of live security platinum 3.6.1How to get rid of live security platinum 3.6.1
How to get rid of live security platinum 3.6.1
 
Get rid of xp defender 2013 virus
Get rid of xp defender 2013 virusGet rid of xp defender 2013 virus
Get rid of xp defender 2013 virus
 
Cridex trojan removal guide
Cridex trojan removal guideCridex trojan removal guide
Cridex trojan removal guide
 
Guide to remove win 7 home security
Guide to remove win 7 home securityGuide to remove win 7 home security
Guide to remove win 7 home security
 
How to get rid of microsoft security essentials alert virus
How to get rid of microsoft security essentials alert virusHow to get rid of microsoft security essentials alert virus
How to get rid of microsoft security essentials alert virus
 
How to get rid of windows proactive safety
How to get rid of windows proactive safetyHow to get rid of windows proactive safety
How to get rid of windows proactive safety
 
How to get rid of windows virtual security virus
How to get rid of windows virtual security virusHow to get rid of windows virtual security virus
How to get rid of windows virtual security virus
 
How to get rid of windows profound security virus
How to get rid of windows profound security virusHow to get rid of windows profound security virus
How to get rid of windows profound security virus
 
How to get rid of security shield 2012 virus
How to get rid of security shield 2012 virusHow to get rid of security shield 2012 virus
How to get rid of security shield 2012 virus
 
How to delete windows safety toolkit
How to delete windows safety toolkitHow to delete windows safety toolkit
How to delete windows safety toolkit
 
Delete runclips.com browser hijacker
Delete runclips.com browser hijackerDelete runclips.com browser hijacker
Delete runclips.com browser hijacker
 
How to get rid of windows web commander virus
How to get rid of windows web commander virusHow to get rid of windows web commander virus
How to get rid of windows web commander virus
 
How to get rid of windows home patron virus
How to get rid of windows home patron virusHow to get rid of windows home patron virus
How to get rid of windows home patron virus
 
How to get rid of vista internet security 2013 virus
How to get rid of vista internet security 2013 virusHow to get rid of vista internet security 2013 virus
How to get rid of vista internet security 2013 virus
 
How to get rid of xp internet security 2013 virus
How to get rid of xp internet security 2013 virusHow to get rid of xp internet security 2013 virus
How to get rid of xp internet security 2013 virus
 
How to get rid of xp antispyware 2013 virus
How to get rid of xp antispyware 2013 virusHow to get rid of xp antispyware 2013 virus
How to get rid of xp antispyware 2013 virus
 

Similar to Getting started with saveourscott

ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKINGNAWAZ KHAN
 
Der computer ist für die verletzung der gesetze der republik österreich block...
Der computer ist für die verletzung der gesetze der republik österreich block...Der computer ist für die verletzung der gesetze der republik österreich block...
Der computer ist für die verletzung der gesetze der republik österreich block...FixPCyourself
 
How to delete canadian security intelligence service (csis ukash) virus
How to delete canadian security intelligence service (csis ukash) virusHow to delete canadian security intelligence service (csis ukash) virus
How to delete canadian security intelligence service (csis ukash) virusFixPCyourself
 
Isearch.claro search.com virus removal help
Isearch.claro search.com virus removal helpIsearch.claro search.com virus removal help
Isearch.claro search.com virus removal helpFixPCyourself
 
Fine@fbi.gov virus removal guide to unlock pc
Fine@fbi.gov virus removal guide to unlock pcFine@fbi.gov virus removal guide to unlock pc
Fine@fbi.gov virus removal guide to unlock pcFixPCyourself
 
How to get rid of stop online piracy automatic protection system virus
How to get rid of stop online piracy automatic protection system virusHow to get rid of stop online piracy automatic protection system virus
How to get rid of stop online piracy automatic protection system virusFixPCyourself
 
Delete infomash.com browser redirect virus
Delete infomash.com browser redirect virusDelete infomash.com browser redirect virus
Delete infomash.com browser redirect virusFixPCyourself
 
Guide to remove infomoneyservice.com redirect virus
Guide to remove infomoneyservice.com redirect virusGuide to remove infomoneyservice.com redirect virus
Guide to remove infomoneyservice.com redirect virusFixPCyourself
 
Delete boxore adware
Delete boxore adwareDelete boxore adware
Delete boxore adwareFixPCyourself
 
Ads not by this site virus removal help
Ads not by this site virus removal helpAds not by this site virus removal help
Ads not by this site virus removal helpFixPCyourself
 
File recovery virus removal guide
File recovery virus removal guideFile recovery virus removal guide
File recovery virus removal guideFixPCyourself
 
174.123.230.82 virus removal guide
174.123.230.82 virus removal guide174.123.230.82 virus removal guide
174.123.230.82 virus removal guideFixPCyourself
 
How to get rid of win32 viking g virus
How to get rid of win32 viking g virusHow to get rid of win32 viking g virus
How to get rid of win32 viking g virusFixPCyourself
 
Get rid of 90.84.59.147 connection virus
Get rid of 90.84.59.147 connection virusGet rid of 90.84.59.147 connection virus
Get rid of 90.84.59.147 connection virusFixPCyourself
 
Cybersecurity cyberlab1
Cybersecurity cyberlab1Cybersecurity cyberlab1
Cybersecurity cyberlab1rayborg
 
How to get rid of system progressive protection virus
How to get rid of system progressive protection virusHow to get rid of system progressive protection virus
How to get rid of system progressive protection virusFixPCyourself
 
How to get rid of polizia postale e delle virus
How to get rid of polizia postale e delle virusHow to get rid of polizia postale e delle virus
How to get rid of polizia postale e delle virusFixPCyourself
 
Lab-6 Sniffing Sniffing is an essential method of collec.docx
Lab-6 Sniffing        Sniffing is an essential method of collec.docxLab-6 Sniffing        Sniffing is an essential method of collec.docx
Lab-6 Sniffing Sniffing is an essential method of collec.docxLaticiaGrissomzz
 
Crackle.com redirect virus removal help
Crackle.com redirect virus removal helpCrackle.com redirect virus removal help
Crackle.com redirect virus removal helpFixPCyourself
 

Similar to Getting started with saveourscott (19)

ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKING
 
Der computer ist für die verletzung der gesetze der republik österreich block...
Der computer ist für die verletzung der gesetze der republik österreich block...Der computer ist für die verletzung der gesetze der republik österreich block...
Der computer ist für die verletzung der gesetze der republik österreich block...
 
How to delete canadian security intelligence service (csis ukash) virus
How to delete canadian security intelligence service (csis ukash) virusHow to delete canadian security intelligence service (csis ukash) virus
How to delete canadian security intelligence service (csis ukash) virus
 
Isearch.claro search.com virus removal help
Isearch.claro search.com virus removal helpIsearch.claro search.com virus removal help
Isearch.claro search.com virus removal help
 
Fine@fbi.gov virus removal guide to unlock pc
Fine@fbi.gov virus removal guide to unlock pcFine@fbi.gov virus removal guide to unlock pc
Fine@fbi.gov virus removal guide to unlock pc
 
How to get rid of stop online piracy automatic protection system virus
How to get rid of stop online piracy automatic protection system virusHow to get rid of stop online piracy automatic protection system virus
How to get rid of stop online piracy automatic protection system virus
 
Delete infomash.com browser redirect virus
Delete infomash.com browser redirect virusDelete infomash.com browser redirect virus
Delete infomash.com browser redirect virus
 
Guide to remove infomoneyservice.com redirect virus
Guide to remove infomoneyservice.com redirect virusGuide to remove infomoneyservice.com redirect virus
Guide to remove infomoneyservice.com redirect virus
 
Delete boxore adware
Delete boxore adwareDelete boxore adware
Delete boxore adware
 
Ads not by this site virus removal help
Ads not by this site virus removal helpAds not by this site virus removal help
Ads not by this site virus removal help
 
File recovery virus removal guide
File recovery virus removal guideFile recovery virus removal guide
File recovery virus removal guide
 
174.123.230.82 virus removal guide
174.123.230.82 virus removal guide174.123.230.82 virus removal guide
174.123.230.82 virus removal guide
 
How to get rid of win32 viking g virus
How to get rid of win32 viking g virusHow to get rid of win32 viking g virus
How to get rid of win32 viking g virus
 
Get rid of 90.84.59.147 connection virus
Get rid of 90.84.59.147 connection virusGet rid of 90.84.59.147 connection virus
Get rid of 90.84.59.147 connection virus
 
Cybersecurity cyberlab1
Cybersecurity cyberlab1Cybersecurity cyberlab1
Cybersecurity cyberlab1
 
How to get rid of system progressive protection virus
How to get rid of system progressive protection virusHow to get rid of system progressive protection virus
How to get rid of system progressive protection virus
 
How to get rid of polizia postale e delle virus
How to get rid of polizia postale e delle virusHow to get rid of polizia postale e delle virus
How to get rid of polizia postale e delle virus
 
Lab-6 Sniffing Sniffing is an essential method of collec.docx
Lab-6 Sniffing        Sniffing is an essential method of collec.docxLab-6 Sniffing        Sniffing is an essential method of collec.docx
Lab-6 Sniffing Sniffing is an essential method of collec.docx
 
Crackle.com redirect virus removal help
Crackle.com redirect virus removal helpCrackle.com redirect virus removal help
Crackle.com redirect virus removal help
 

Recently uploaded

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 

Recently uploaded (20)

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

Getting started with saveourscott

  • 2. You require three things: • 1. Browser interface • 2. X-lite softphone program • 3. Understanding of what you’re doing!
  • 3. 1. Browser interface • Open a new tab in Chrome Ctrl-Click this button Quicklinks: 1. Browser Interface 2. X-Lite 3. Making the calls
  • 4. 1. Browser interface • Sign in using your assigned volunteer number Your username will be “pb_vol_act1” or 2 or 3…the number is written on the yellow tape on your computer, inside a square. Quicklinks: 1. Browser Interface 2. X-Lite 3. Making the calls
  • 5. 1. Browser interface • Click “phonebanking” on the top menu Quicklinks: 1. Browser Interface 2. X-Lite 3. Making the calls
  • 6. 1. Browser interface • Open your appropriate list • The list to open is written on the yellow tape on your computer: “tier2.list_xx” • It will probably be on page 2 Quicklinks: 1. Browser Interface 2. X-Lite 3. Making the calls
  • 7. 2. Softphone • Open “X-Lite” • The logo on the start menu looks like below Quicklinks: 1. Browser Interface 2. X-Lite 3. Making the calls
  • 8. 3. Process for each call • Click on a grey number – this is a voter who hasn’t yet been contacted. • You will then see the following interface (next page) Quicklinks: 1. Browser Interface 2. X-Lite 3. Making the calls
  • 9. 3. Process for each call Quicklinks: 1. Browser Interface 2. X-Lite 3. Making the calls
  • 10. 3. Process for each call • Type (or copy-paste) the number into X- lite and call away. Quicklinks: 1. Browser Interface 2. X-Lite 3. Making the calls
  • 11. 3. Process for each call Record Contact Status 1. A meaningful interaction 2. Couldn’t talk now 3. Doesn’t speak English 4. No answer OR answering machine 5. Disconnected, no voter, wrong number, etc 6. Do not call again Quicklinks: 1. Browser Interface 2. X-Lite 3. Making the calls
  • 12. 3. Process for each call If contact status was “answered” record a Support Level 1. Unconditionally voting for Scott 2. Conditionally supports scott 3. Undecided 4. Doesn’t support scott, open to discussion. 5. Hates Scott, closed to discussion. Quicklinks: 1. Browser Interface 2. X-Lite 3. Making the calls
  • 13. 3. Process for each call • Tick any issues and record any thing else in “Notes” • Click “Log contact” to end. Quicklinks: 1. Browser Interface 2. X-Lite 3. Making the calls
  • 14. 3. Process for each call • Time for your next call! Quicklinks: 1. Browser Interface 2. X-Lite 3. Making the calls