{"id":272,"date":"2010-06-01T00:00:00","date_gmt":"2010-06-01T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2010\/06\/01\/how-cloud-computing-is-affecting-call-centres\/"},"modified":"2021-12-30T11:36:53","modified_gmt":"2021-12-30T11:36:53","slug":"how-cloud-computing-is-affecting-call-centres","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2010\/06\/01\/how-cloud-computing-is-affecting-call-centres\/","title":{"rendered":"How cloud computing is affecting call centres"},"content":{"rendered":"<p>In the last ten years, cloud computing has been used by forward-thinking firms across the globe, looking to increase their productivity, revenue and customer satisfaction.  Up until now, cloud computing has largely been confined to consumer web space.  However, as contact centre customers are increasingly demanding a faster, more responsive service, so the industry is also embracing this type of new technology.  As applications are delivered over the internet or in &#8216;the cloud&#8217;, organisations can move away from complicated physical set-ups on-site.  These applications can be updated dynamically, meaning that agents always have the most up-to-date customer information to hand.  And because contact centre staff can access the cloud wherever they are in the world, this provides greater scope for home-working, as well as dealing with more unforeseen circumstances.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>During the snow earlier this year, workplace assessment solutions provider SHL Group, which uses NewVoiceMedia&#8217;s cloud-based telephony system, was able to quickly and easily reconfigure its services so that its staff could work from home or wherever they happened to find themselves.<\/p>\n<p>Says NewVoiceMedia CEO Jonathan Grant, &#8220;In traditional call centres, human beings went to the technology, now with the help of cloud computing, the technology goes to the people.&#8221;<br \/>\nMarketing Director Amanda Fennell adds, &#8220;Everybody wants that accessibility via the internet and the resilience that it also affords.&#8221;<\/p>\n<p>Running processes in the cloud means call centres can make significant cost savings, as they are able to reduce the amount they spend on maintenance and upgrades of traditional IT systems.  Cloud applications can also be rolled out quickly, a crucial benefit given the fast-paced nature of the call centre industry where speed is a key performance indicator.<\/p>\n<p>If payment is by subscription, firms only pay for what they use and there is no large upfront expenditure.<\/p>\n<p>Plus, as agents have secure access to all the information they require irrespective of the computer they are working on or where they are physically, relocation or expansion becomes more of a seamless experience.<\/p>\n<p>A case in point is when SHL Group moved its operation from Colorado to the UK, which it did without even having to contact NewVoiceMedia.  This has created the power of &#8220;crowd sourcing&#8221;, where enthusiasts rather than salaried staff proffer information online.<\/p>\n<p>A number of applications have emerged, such as Salesforce&#8217;s Service Cloud 2, where all channels of communication, including social media, are consolidated together.<\/p>\n<p>This means that you can highlight a customer complaint on Twitter in the same way as a telephone query.<\/p>\n<p>Utilising lower-cost interaction channels, such as email, plus chat, web self-service knowledge base, Twitter and Facebook, can result in significant cost savings.<\/p>\n<p>Hosted contact centres, delivered from the network, are one the quickest, most cost-efficient ways for a business to virtualise resources and improve service quality by connecting the best person with the right skill to the right enquiry every time, wherever they may be located.<\/p>\n<p>http:\/\/www.callcentrehelper.com\/how-cloud-computing-is-affecting-call-centres-10947.htm<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[],"class_list":["post-272","post","type-post","status-publish","format-standard","hentry","category-cloud"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/272","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=272"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/272\/revisions"}],"predecessor-version":[{"id":2759,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/272\/revisions\/2759"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=272"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=272"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=272"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}