The document provides instructions for using Votebuilder's virtual phone banking tool. It explains how to create user profiles, pull lists of targeted voters from 2012, set up a virtual phone bank with call scripts and sharing access, and make calls directly from the system while logging responses without data entry. Contact the Deputy Voterfile Director Jesse Presnell with any questions about using Votebuilder's phone banking features.
You've invested in a great product, now make it work for you. This refresher webinar is designed to offer you tips and tricks on how to be DNC compliant and it starts with getting a SAN. We'll show you step-by-step how to get it.
Develop Your Tech Skills to Improve Elections in Your JurisdictionWhitney May
CTCL's 90-minute presentation at the 2015 National Association of County Recorders, Election Officials, and Clerks (NACRC) annual conference in Houston, Texas.
7 Most Common Website Mistakes and How to Avoid ThemKelly Rice
Unfortunately, there are common mistakes that small businesses don’t realize they’re making, and these mistakes cause your website to perform poorly. This slide deck walks you though the mistakes and how to fix them.
You've invested in a great product, now make it work for you. This refresher webinar is designed to offer you tips and tricks on how to be DNC compliant and it starts with getting a SAN. We'll show you step-by-step how to get it.
Develop Your Tech Skills to Improve Elections in Your JurisdictionWhitney May
CTCL's 90-minute presentation at the 2015 National Association of County Recorders, Election Officials, and Clerks (NACRC) annual conference in Houston, Texas.
7 Most Common Website Mistakes and How to Avoid ThemKelly Rice
Unfortunately, there are common mistakes that small businesses don’t realize they’re making, and these mistakes cause your website to perform poorly. This slide deck walks you though the mistakes and how to fix them.
Good IVR Design is as much about caller behavior and human psychology as it is about technology. In this recorded session, Rebecca Gibson, Contact Center Solutions Consultant with Interactive Intelligence, will discuss 4 critical design principles and 17 best practices that will increase both business results and customer satisfaction with your IVR.
A quick run though on optimizing the marketing message for your local business for Mobile Devices.
St. Petersburg Web Designers and SEO, StudioHOF
http://www.studiohof.com
The 12 Minute Affiliate System - Hot Offer!BloggerNeeraj
Who Else Wants To Make 50% Monthly Recurring Commissions... And Up To $398.50 Per Sale! All While Promoting A Product That Actually Helps The People Who Buy It! 12 Minute Affiliate Is The Real Deal & The Hottest New Im/biz-opp Offer!
The Federal Trade Commission (FTC) requires all telemarketers to register for a Subscription Account Number (SAN) as part of the National Do Not Call Registry. In other words, if you’re telemarketing, you need a SAN to be in compliance. However, obtaining one is easy and free for up to five area codes.
In less than 20-minutes, we’ll show you how to have DNC List Scrubbing Success with Cole Information! We will also show you step-by-step how to sign up for a SAN.
It's Time to Start Thinking Beyond the Holidays: SlidesWhatCounts, Inc.
During the holidays, we spend so much time trying to acquire new subscribers and increase our send frequency, we lose sight of some of the key principles of email marketing. Let’s take a minute to think beyond the holidays to make sure we’re engaging and retaining our subscribers during and after the big holiday push.
In this webinar, you’ll learn:
How to engage with your customers using what you already know
How to retain your loyal customers
How to use social media and email together
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
More Related Content
Similar to NCDP Step by Step Guide to Virtual Phone Banking
Good IVR Design is as much about caller behavior and human psychology as it is about technology. In this recorded session, Rebecca Gibson, Contact Center Solutions Consultant with Interactive Intelligence, will discuss 4 critical design principles and 17 best practices that will increase both business results and customer satisfaction with your IVR.
A quick run though on optimizing the marketing message for your local business for Mobile Devices.
St. Petersburg Web Designers and SEO, StudioHOF
http://www.studiohof.com
The 12 Minute Affiliate System - Hot Offer!BloggerNeeraj
Who Else Wants To Make 50% Monthly Recurring Commissions... And Up To $398.50 Per Sale! All While Promoting A Product That Actually Helps The People Who Buy It! 12 Minute Affiliate Is The Real Deal & The Hottest New Im/biz-opp Offer!
The Federal Trade Commission (FTC) requires all telemarketers to register for a Subscription Account Number (SAN) as part of the National Do Not Call Registry. In other words, if you’re telemarketing, you need a SAN to be in compliance. However, obtaining one is easy and free for up to five area codes.
In less than 20-minutes, we’ll show you how to have DNC List Scrubbing Success with Cole Information! We will also show you step-by-step how to sign up for a SAN.
It's Time to Start Thinking Beyond the Holidays: SlidesWhatCounts, Inc.
During the holidays, we spend so much time trying to acquire new subscribers and increase our send frequency, we lose sight of some of the key principles of email marketing. Let’s take a minute to think beyond the holidays to make sure we’re engaging and retaining our subscribers during and after the big holiday push.
In this webinar, you’ll learn:
How to engage with your customers using what you already know
How to retain your loyal customers
How to use social media and email together
Similar to NCDP Step by Step Guide to Virtual Phone Banking (20)
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
NCDP Step by Step Guide to Virtual Phone Banking
1. A User’s Guide to Virtual
Phonebank
North Carolina Democratic Party
220 Hillsborough St.
Raleigh, NC 27603
919-821-2777
919-821-4778 (fax)
Jesse Presnell, Deputy Voterfile Director
(828) 310-5745
1
2. Virtual Phone Bank
•Virtual Phone Banks allow users to make phone calls
to voters or volunteers without having to print out
paper lists and having do to Data Entry.
•This program allows you to make phone calls from
anywhere you have a phone line and internet
connection.
•Virtual Phone Banks can be shared with multiple
Votebuilder users and can be accessed by multiple
users at the same time.
•User profiles can be created that allow the user to
only access a Virtual Phone Bank. These are great for
providing to Phone Banking Volunteers who don’t
need access to other permissions in Votebuilder.
2
3. Logging Into the System
Do you have a username? If not, contact your admin to setup your account.
If you do, type in your username and password at the login screen.
3
4. Creating a User
To create a new user select the “Users” tab on the left bottom section of the
Votebuilder main menu and then select “Users” once again in the drop down.
It’s only necessary to create new users for people who do not have access to
your committee, adding users to a VPB does not require creating a new user.
4
5. Creating a User Step 1
Click the Add New User button in the top right corner of the next menu you see.
On the next menu fill out the required information. Typical usernames are the first letter of the
first name and then the full last name. Set your users expiration date for the end of the election
cycle. You can reactivate as needed.
Be sure to select NCDP Party 1-VPB
on “My Voter Profile”
5
6. Creating a User Step 2
On the next step you will select the voters you want assigned to this users
accounts. Simply select county and check the county you want to give them
access to.
6
7. Creating a User Step 3
In the final step simply put your users e-mail address in and the system will
send an automated email to them so that they can set a password. This e-
mail has a 48-hour limitation so be sure the user follows the contained link
within that time limit.
7
8. Creating a Virtual Phone Bank
•In order to create a
Virtual Phone Bank, you
must first make a list of
people who you are
wanting to call.
•Click on “Create a New
List” and then choose
the options you wish to
use when creating your
new list.
•Make sure you choose
“Confirmed Phones
Only” when creating
your list. Otherwise, you
will have people appear
in the Virtual Phone bank
who we do not have
phone numbers on
record.
8
9. Pulling your 2012 Targets
To pull the list of 2012 targets in your area for virtual phone banking look
under the Targets section by clicking the Targets drop down menu
Under the Targets menu select 2012 NCDP: Dem Women
9
10. 2012 Targets Narrowing
Under the Locations drop down select your county
Once your county is selected a precinct drop down menu will be visible. It’s a
good idea to break your lists down into smaller precinct clusters of two or
three precincts at a time. Click the word “Precinct” to select multiple
precincts.
10
11. Checklist for Creating a List
Have you selected “Confirmed Phones Only”?
Have you selected the 2012: NCDP Targets?
Have you selected your desired county and/or precincts?
If you have done all of these things click “Search”
11
12. •After you have run
your list, you will
want to choose
“Calls” that appears
in the white action
bar at the top of the
page.
•Once you click on
“Calls,” choose the
button “Set up
Virtual Phone Bank
List” and click
“Next.”
12
13. •The next page has you choose
the items you need to appear in
your Virtual Phone Bank
•Name- This is the name of the
virtual phone bank and will Set the dates to dates that
appear anytime you are opening
the VPB. work for you. These are
•Description- Be as descriptive as for example only.
possible as to who you are calling
and why you are calling them.
•Script- Be sure to choose the
2012 NCDP: County Party Script
•Upper Display- Which of these
options would you like to appear
near the persons name whom
you are calling.
•Lower Display- What additional
information would you like to be
available to your Volunteer when
they are making calls.
•Start & End Date- What day do
you want this virtual phone bank
to start, and when should it
expire
•Daily Availability- Start your
calls at 9am and end them at
9pm.
•Progress Bar, Householding-
Additional information that can
be shown such as what Does this match your page?
percentage of your VPB you have
finished and whether to display
the names of people that live in
the household.
•Status- If you want to inactivate 13
this VPB, click the inactive button.
14. •Once you click next, you will pull up a
screen that looks like the one you just
came from except for two important
parts:
•VPB Code- Under the Name of your
Virtual Phone Bank, you will see “VPB
Code and some letters and numbers.
This code can be shared with anyone
who uses Votebuilder and allows them
to access this Virtual Phone Bank.
•User Access- At the bottom of the
page, the “User Access” allows you to
share other users in your committee to
access this Virtual Phone Bank. When
you share someone, they wont have to
enter the VPB Code, but instead can
choose this VPB when they log in. Find
the name of the person who you would
like to share under “Users Without
Access,” click on their name, and then
click “Add.” You should then see their
name appear under in the left hand
column under “Users with Access.”
•IMPORTANT! Even though you created
the Virtual Phone Bank, you must share
yourself if you are planning on
accessing it.
•Once you are finished, click “Save”
14
15. This page shows you the
stats of your Virtual Phone
Bank. It lets you see your
completion percentage
and total number of
attempts.
1. You can access this page
anytime you like from the
Main Menu by clicking on
“Phone Services” and then
“Virtual Phone Bank”
2. To access the Virtual
Phone Bank to make
phone calls, click on
“Virtual Phone Bank” in
the bottom right hand
corner of the Main Menu.
15
16. If you were shared
with access to a
particular Virtual
Phone Bank, that VPB
will appear as an
option for you to
choose.
If you have not been
shared with a
particular VPB, you
will need to enter the
VPB Code that we
discussed earlier.
16
17. •Once in the Virtual Phone
Bank, you will be shown the
name and phone number of the
voter you are asked to call.
•If you were unable to talk to
the person, you will mark the
reason why (in this case
Disconnected, Left
Message, Not
Home, Refused, Spanish, and
Wrong Number).
•If the voter is home, read the
script, ask the questions, and
record their responses.
•Once you have marked the
appropriate responses, click on
the “Save/Next” button in the
top right corner. This will pull
up a new voter with their
information.
•Once you have finished, you
can log out of Votebuilder and
you are finished. All responses
are automatically recorded in
Votebuilder and no Data Entry 17
is necessary.
18. -These steps are basic introductions to important and useful tools in Votebuilder.
-If you have any questions about how to use Votebuilder, please contact the Statewide
Deputy Voterfile Director, Jesse Presnell at JessePresnell@ncdp2012.org .
-If you are technical problems and are unable to accomplish your task due to a system
error, please use the “Contact the Admin” and be as descriptive as possible in your
explanation of the problem. Also, please provide your email and phone number so the
Administrator can contact you.
18