Automatic Call Distribution Description

Total Page:16

File Type:pdf, Size:1020Kb

Automatic Call Distribution Description Title page Nortel Communication Server 1000 Nortel Communication Server 1000 Release 4.5 Automatic Call Distribution Description Document Number: 553-3001-351 Document Release: Standard 3.00 Date: August 2005 Year Publish FCC TM Copyright © Nortel Networks Limited 2005 All Rights Reserved Produced in Canada Information is subject to change without notice. Nortel Networks reserves the right to make changes in design or components as progress in engineering and manufacturing may warrant. Nortel, Nortel (Logo), the Globemark, This is the Way, This is Nortel (Design mark), SL-1, Meridian 1, and Succession are trademarks of Nortel Networks. 4 Page 3 of 572 Revision history August 2005 Standard 3.00. This document is up-issued for Communication Server Release 4.5. September 2004 Standard 2.00. This document is up-issued for Communication Server 1000 Release 4.0. October 2003 Standard 1.00. This document is a new NTP for Succession 3.0. It was created to support a restructuring of the Documentation Library, which resulted in the merging of multiple legacy NTPs. This new document consolidates information previously contained in the following legacy documents, now retired: • Automatic Call Distribution: Feature Description (553-2671-110) • Automatic Call Distribution: Management Commands and Reports (553-2671-112) • Network ACD: Description and Operation (553-3671-120) Automatic Call Distribution Description Page 4 of 572 Revision history 553-3001-351 Standard 3.00 August 2005 12 Page 5 of 572 Contents List of procedures . 13 About this document . 17 Subject .. 17 Applicable systems . 17 Intended audience . 19 Conventions .. 19 Related information .. 20 ACD description . 21 Contents .. 21 Introduction . 21 ACD agent telephone types .. 24 ACD packaging .. 29 ACD agent features . 35 Contents .. 35 Introduction . 36 ACD Calls on Hold . 36 ACD Threshold Visual Indication (Advanced) .. 38 Agent and supervisor communication (Advanced) .. 40 Call Source Identification (Basic) .. 41 Calls Waiting Indication key (AWC) (Basic) . 42 Calls Waiting Indication key (AWC) (Advanced) . 42 Automatic Call Distribution Description Page 6 of 572 Contents Directory Number key (Basic) . 43 Display Waiting Calls (DWC) key (Basic) .. 43 Display Waiting Calls (DWC) key (Advanced) . 44 Emergency key (Advanced) . 46 In-Calls key (Basic) . 48 Log In (Basic) . 49 Log Out (Basic) . 50 Make Set Busy key (Basic) .. 51 Night Mode (Basic) . 51 Not Ready key (Basic) . 52 Release key (Basic) .. 53 ACD supervisor features . 55 Contents . 55 Introduction .. 56 Agent key (Advanced) . 56 Agent lamp (Basic) . 56 Agent lamp (Advanced) . 57 Agent Observe (Advanced) . 57 Agent Observe Login (Advanced) . 63 Display Agents key (Basic) . 68 Display Waiting Calls (DWC) key (Basic) .. 68 Display Waiting Calls (DWC) key (Advanced) . 69 Interflow key (Advanced) .. 70 IP Call Recording . 72 Malicious Call Trace key . 83 Not Ready key (Advanced) .. 83 Observe Agent Security . 85 Supervisor and agent communication (Advanced) .. 94 Supervisor Control of Night Service (NSVC) (Advanced) . 95 553-3001-351 Standard 3.00 August 2005 Contents Page 7 of 572 ACD load management system . 101 Contents .. 101 Introduction . 101 Operational overview . 102 Accessing the command mode . 103 Enhanced ACD Routing (EAR) . 106 Customer Controlled Routing (CCR) . 109 Agent ID option .. 110 ACD telephone login .. 110 ACD telephone logout .. 111 Walkaway/Return . 112 Agents using DN keys .. 113 Alternate Call Answer .. 113 ACD load management commands . 115 Contents .. 115 Introduction . 116 Configure Controlled mode (CNTL) .. 116 Configure Default ACD DN (DFDN) .. 117 Query current options (POPT) . 118 Query current parameters (PPAR) . 119 Select Route and Trunk Assignment (SRTA) .. 119 Select trunk Priority Assignment (SPRI) . 120 Select Agent Position Assignment (SAPA) . 120 Select Agent to Supervisor Assignment (SATS) . 121 First RAN Route Assignment (FRRT) . 122 First RAN Route Time (FRTT) .. 123 Second RAN Route Assignment (SRRT) . 123 Second RAN Route Time Option (SRTO) . 124 Night RAN Route Assignment (NRRT) . 124 Automatic Call Distribution Description Page 8 of 572 Contents Night Forwarding number assignment (NITE) .. 125 Automatic Overflow Target DN (SQ01, SQ02, SQ03) . 126 Automatic Overflow thresholds (TLDA, TLDB, TLDC) .. 126 Time Overflow threshold (TLDD) . 127 Configure the Interflow DN (IFDN) .. 129 Telephone Service Factor time (TSF) .. 130 Configure Agent Priority (SAGP) . 130 List Agent Position Assignment (LAPA) . 131 List Agent Priority (LAGP) . 131 Enable Call Force (FORC) . 132 Enable Flexible Call Force (FCFT) . 133 Print CDN Parameters and Options (PCPO) . 133 Configure the Call Ceiling (CEIL) . 134 Display Routing Tables (DSPL) . 135 ACD management reporting . 137 Contents . ..
Recommended publications
  • Cisco Unified Communications Manager System Guide, Release 9.1(1) First Published: December 20, 2012 Last Modified: September 08, 2015
    Cisco Unified Communications Manager System Guide, Release 9.1(1) First Published: December 20, 2012 Last Modified: September 08, 2015 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 Text Part Number: OL-27946-01 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
    [Show full text]
  • Long Distance Voice Services Introduction
    LONG DISTANCE VOICE SERVICES 1. GENERAL 1.1 Service Definition 1.2 Platforms 1.3 Standard Service Features 1.4 Descriptions of Features and Feature Packages 2. AVAILABLE VERSIONS 2.1 Interstate Services 2.2 International Services 2.3 LD Virtual VoIP Service 2.4 Switched Digital Services 2.5 Intrastate Inbound and Outbound Service 3. SUPPLEMENTAL TERMS 4. FINANCIAL TERMS 5. DEFINITIONS 1. GENERAL 1.1 Service Definition. Long Distance Voice Services enable Customer to make telephone calls beyond their local calling area. Verizon offers several types of Long Distance Voice Services, including Interstate, International, LD Virtual VoIP, Switched Digital, and Intrastate. Customers choose one of four Feature Options, which defines the Base Features included with that option and optional features. Feature Option A (formerly Feature Option 1). Feature Option A (Option A) offers inbound and outbound service. Feature Option B (formerly Feature Option 2). Feature Option B (Option B) offers inbound and outbound service. Feature Option C-1 (formerly Feature Option 3A). Feature Option C-1 (Option C-1) offers outbound service only and is characterized by a private dialing plan. Feature Option C-2 (formerly Feature Option 3B). Feature Option C-2 (Option C-2) offers inbound toll free service only. 1.2 Platforms. These terms apply to non-Optimized Long Distance Voice Services only. 1.3 Standard Service Features. Customers receive the Base Features associated with the Feature Options Customer selects, as reflected in the Feature Availability Table below. Feature Options may be available either on a stand-alone basis or as part of a combined feature package.
    [Show full text]
  • ABSTRACT WHAT IF YOU're LONELY: JESSICA STORIES By
    ABSTRACT WHAT IF YOU’RE LONELY: JESSICA STORIES by Michael Stoneberg This novel-in-stories follows Jessica through the difficulties of her early twenties to her mid- thirties. During this period of her life she struggles with loneliness and depression, attempting to find some form of meaningful connection through digital technologies as much as face-to-face interaction, coming to grips with a non-normative sexuality, finding and losing her first love and dealing with the resultant constant pull of this person on her psyche, and finally trying to find who in fact she, Jessica, really is, what version of herself is at her core. The picture of her early adulthood is drawn impressionistically, through various modes and styles of narration and points of view, as well as through found texts, focusing on preludes and aftermaths and asking the reader to intuit and imagine the spaces between. WHAT IF YOU’RE LONELY: JESSICA STORIES A Thesis Submitted to the Faculty of Miami University in partial fulfillment of the requirements for the degree of Master of Arts Department of English by Michael Stoneberg Miami University Oxford, Ohio 2014 Advisor______________________ Margaret Luongo Reader_______________________ Joseph Bates Reader_______________________ Madelyn Detloff TABLE OF CONTENTS 1. Revision Page 1 2. Invoice for Therapy Services Page 11 3. Craigslist Page 12 4. Some Things that Make Us—Us Page 21 5. RE: Recent Account Activity Page 30 6. Sirens Page 31 7. Hand-Gun Page 44 8. Hugh Speaks Page 48 9. “The Depressed Person” Page 52 10. Happy Hour: Last Day/First Day Page 58 11.
    [Show full text]
  • Shavian Shakespeare: Shaw's Use and Transformation of Shakespearean Materials in His Dramas
    Louisiana State University LSU Digital Commons LSU Historical Dissertations and Theses Graduate School 1971 Shavian Shakespeare: Shaw's Use and Transformation of Shakespearean Materials in His Dramas. Lise Brandt Pedersen Louisiana State University and Agricultural & Mechanical College Follow this and additional works at: https://digitalcommons.lsu.edu/gradschool_disstheses Recommended Citation Pedersen, Lise Brandt, "Shavian Shakespeare: Shaw's Use and Transformation of Shakespearean Materials in His Dramas." (1971). LSU Historical Dissertations and Theses. 2159. https://digitalcommons.lsu.edu/gradschool_disstheses/2159 This Dissertation is brought to you for free and open access by the Graduate School at LSU Digital Commons. It has been accepted for inclusion in LSU Historical Dissertations and Theses by an authorized administrator of LSU Digital Commons. For more information, please contact [email protected]. I I 72- 17,797 PEDERSEN, Lise Brandt, 1926- SHAVIAN .SHAKESPEARE:' SHAW'S USE AND TRANSFORMATION OF SHAKESPEAREAN MATERIALS IN HIS DRAMAS. The Louisiana State University and Agricultural and Mechanical College, Ph.D., 1971 Language and Literature, modern University Microfilms, XEROXA Company, Ann Arbor, Michigan tT,TITn ^TnoT.r.a.A'TTAItf U4C PPPM MT PROPTT.MF'n FVAOTT.V AR RECEI VE D SHAVIAN SHAKESPEARE: SHAW'S USE AND TRANSFORMATION OF SHAKESPEAREAN MATERIALS IN HIS DRAMAS A Dissertation Submitted to the Graduate Faculty of the Louisiana State University and Agricultural and Mechanical College in partial fulfillment of the requirements for the degree of Doctor of Philosophy in The Department of English by Lise Brandt Pedersen B.A., Tulane University, 1952 M.A., Louisiana State University, 1963 December, 1971 ACKNOWLEDGMENT I wish to thank Dr.
    [Show full text]
  • The Great Telecom Meltdown for a Listing of Recent Titles in the Artech House Telecommunications Library, Turn to the Back of This Book
    The Great Telecom Meltdown For a listing of recent titles in the Artech House Telecommunications Library, turn to the back of this book. The Great Telecom Meltdown Fred R. Goldstein a r techhouse. com Library of Congress Cataloging-in-Publication Data A catalog record for this book is available from the U.S. Library of Congress. British Library Cataloguing in Publication Data Goldstein, Fred R. The great telecom meltdown.—(Artech House telecommunications Library) 1. Telecommunication—History 2. Telecommunciation—Technological innovations— History 3. Telecommunication—Finance—History I. Title 384’.09 ISBN 1-58053-939-4 Cover design by Leslie Genser © 2005 ARTECH HOUSE, INC. 685 Canton Street Norwood, MA 02062 All rights reserved. Printed and bound in the United States of America. No part of this book may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without permission in writing from the publisher. All terms mentioned in this book that are known to be trademarks or service marks have been appropriately capitalized. Artech House cannot attest to the accuracy of this information. Use of a term in this book should not be regarded as affecting the validity of any trademark or service mark. International Standard Book Number: 1-58053-939-4 10987654321 Contents ix Hybrid Fiber-Coax (HFC) Gave Cable Providers an Advantage on “Triple Play” 122 RBOCs Took the Threat Seriously 123 Hybrid Fiber-Coax Is Developed 123 Cable Modems
    [Show full text]
  • Telecommunications Infrastructure for Electronic Delivery 3
    Telecommunications Infrastructure for Electronic Delivery 3 SUMMARY The telecommunications infrastructure is vitally important to electronic delivery of Federal services because most of these services must, at some point, traverse the infrastructure. This infrastructure includes, among other components, the Federal Government’s long-distance telecommunications program (known as FTS2000 and operated under contract with commercial vendors), and computer networks such as the Internet. The tele- communications infrastructure can facilitate or inhibit many op- portunities in electronic service delivery. The role of the telecommunications infrastructure in electronic service delivery has not been defined, however. OTA identified four areas that warrant attention in clarifying the role of telecommunications. First, Congress and the administration could review and update the mission of FTS2000 and its follow-on contract in the context of electronic service delivery. The overall perform- ance of FTS2000 shows significant improvement over the pre- vious system, at least for basic telephone service. FTS2000 warrants continual review and monitoring, however, to assure that it is the best program to manage Federal telecommunications into the next century when electronic delivery of Federal services likely will be commonplace. Further studies and experiments are needed to properly evaluate the benefits and costs of FTS2000 follow-on options from the perspective of different sized agencies (small to large), diverse Federal programs and recipients, and the government as a whole. Planning for the follow-on contract to FTS2000 could consider new or revised contracting arrangements that were not feasible when FTS2000 was conceived. An “overlapping vendor” ap- proach to contracting, as one example, may provide a “win-win” 57 58 I Making Government Work situation for all parties and eliminate future de- national infrastructure will be much stronger if bates about mandatory use and service upgrades.
    [Show full text]
  • Twilight Zone Series 4: Science and Superstition Checklist
    Twilight Zone Series 4: Science and Superstition Checklist Base Cards # Card Title [ ] 217 The Last Night of a Jockey [ ] 218 The Last Night of a Jockey [ ] 219 The Last Night of a Jockey [ ] 220 The Last Night of a Jockey [ ] 221 The Last Night of a Jockey [ ] 222 The Last Night of a Jockey [ ] 223 Mr. Bevis [ ] 224 Mr. Bevis [ ] 225 Mr. Bevis [ ] 226 Mr. Bevis [ ] 227 Mr. Bevis [ ] 228 Mr. Bevis [ ] 229 The Bard [ ] 230 The Bard [ ] 231 The Bard [ ] 232 The Bard [ ] 233 The Bard [ ] 234 The Bard [ ] 235 The Passersby [ ] 236 The Passersby [ ] 237 The Passersby [ ] 238 The Passersby [ ] 239 The Passersby [ ] 240 The Passersby [ ] 241 Dead Man's Shoes [ ] 242 Dead Man's Shoes [ ] 243 Dead Man's Shoes [ ] 244 Dead Man's Shoes [ ] 245 Dead Man's Shoes [ ] 246 Dead Man's Shoes [ ] 247 Back There [ ] 248 Back There [ ] 249 Back There [ ] 250 Back There [ ] 251 Back There [ ] 252 Back There [ ] 253 The Purple Testament [ ] 254 The Purple Testament [ ] 255 The Purple Testament [ ] 256 The Purple Testament [ ] 257 The Purple Testament [ ] 258 The Purple Testament [ ] 259 A Piano in the House [ ] 260 A Piano in the House [ ] 261 A Piano in the House [ ] 262 A Piano in the House [ ] 263 A Piano in the House [ ] 264 A Piano in the House [ ] 265 Night Call [ ] 266 Night Call [ ] 267 Night Call [ ] 268 Night Call [ ] 269 Night Call [ ] 270 Night Call [ ] 271 A Hundred Yards Over the Rim [ ] 272 A Hundred Yards Over the Rim [ ] 273 A Hundred Yards Over the Rim [ ] 274 A Hundred Yards Over the Rim [ ] 275 A Hundred Yards Over the Rim [ ] 276 A Hundred
    [Show full text]
  • Program on Information Resources Policy
    INCIDENTAL PAPER Growing Up With the Information Age John C. B. LeGates April 2011 Program on Information Resources Policy Center for Information Policy Research Harvard University The Program on Information Resources Policy is jointly sponsored by Harvard University and the Center for Information Policy Research. Chairman Managing Director Anthony G. Oettinger John C. B. LeGates John LeGates began his career as an entrepreneur in the earliest days of computer communications and networking. He was the first to put computers in schools and later in hospitals. He built the first academic computer-resource-sharing network and was a member of the Arpanet NWG, the original Internet design team. Since 1973 he has been a member of the Harvard faculty, where he co-founded the Program on Information Resources Policy. Copyright © 2011 by the President and Fellows of Harvard College. Not to be reproduced in any form without written consent from the Program on Information Resources Policy, Harvard University, Maxwell Dworkin Bldg. 125, 33 Oxford St., Cambridge MA 02138. 617-495-4114 E-mail: [email protected] URL: http://www.pirp.harvard.edu ISBN 0-9798243-3-8 I-11-3 LeGates Life and Times DRAFT February 1, 1998 NOTES ON GROWING UP WITH THE INFORMATION AGE John C. B. LeGates WHAT IS THIS DOCUMENT? In 1997 I was approached by a writer for The New Yorker magazine, who asked if they could do a "life and times" article about me. It would be the feature article in one of their issues - a minimum of twenty pages. Alternatively it might be longer, and be serialized over several issues.
    [Show full text]
  • Ip Communications Solutions
    IP COMMUNICATIONS SOLUTIONS for Today’s Business Challenges Table of Contents IP Call to Action . .1 License to Communicate . .6 Calling on Innovation . .13 The Video Advantage . .19 Migrating to IP Telephony? . .24 Enhanced Communications with IP Telephony . .33 A Higher Standard of Service at Arizona State Savings & Credit Union . .40 IP Communications Made Easy . .47 Bend, Oregon Converges with IP Telephony . .50 Enterprise-wide IP telephony . .53 IP Telephony Management . .58 IP CALL TO ACTION BY GAIL MEREDITH OTTESON Enabling anytime, anywhere business communications To achieve success in life and in business, people need to understand one another. Every-one has wrestled with misunderstandings and differing interpretations. There is no way around it: interpersonal communication is challenging, and the globalization of business makes it more so. As project teams become more geo- graphically dispersed, they need technologies that facilitate effective collabora- tion. These technologies should break down distance barriers, overcoming tradi- tional limitations with new ways to share information and enhance discussions, ultimately leading to better decisions and business growth. That’s why business- es need IP communications. IP communications encompasses IP telephony, video telephony, unified messaging and voice mail, IP video- and audio-conferencing, customer contact solutions, voice gateways and applications, security solutions, and network management. It exemplifies the systemic approach inherent in intelligent networking. “Where the network has always provided con- nectivity, now it also solves business problems,” says Rob Redford, vice president of Product and Technology Marketing at Cisco. “With intelligent networking, the network, applica- tions, and other components interact in a systemic way—the right function finds the right place in the system.
    [Show full text]
  • Multifrequency Compelled Signaling Fundamentals Avaya Communication Server 1000
    Multifrequency Compelled Signaling Fundamentals Avaya Communication Server 1000 7.5 NN43001-284, 05.02 November 2011 © 2011 Avaya Inc. Copyright All Rights Reserved. Except where expressly stated otherwise, no use should be made of materials on this site, the Documentation, Software, or Hardware Notice provided by Avaya. All content on this site, the documentation and the Product provided by Avaya including the selection, arrangement and While reasonable efforts have been made to ensure that the design of the content is owned either by Avaya or its licensors and is information in this document is complete and accurate at the time of protected by copyright and other intellectual property laws including the printing, Avaya assumes no liability for any errors. Avaya reserves the sui generis rights relating to the protection of databases. You may not right to make changes and corrections to the information in this modify, copy, reproduce, republish, upload, post, transmit or distribute document without the obligation to notify any person or organization of in any way any content, in whole or in part, including any code and such changes. software unless expressly authorized by Avaya. Unauthorized reproduction, transmission, dissemination, storage, and or use without Documentation disclaimer the express written consent of Avaya can be a criminal, as well as a “Documentation” means information published by Avaya in varying civil offense under the applicable law. mediums which may include product information, operating instructions and performance specifications that Avaya generally makes available Third-party components to users of its products. Documentation does not include marketing Certain software programs or portions thereof included in the Product materials.
    [Show full text]
  • ONE NIGHT @ the CALL CENTER —CHETAN BHAGAT [Typeset By: Arun K Gupta]
    ONE NIGHT @ THE CALL CENTER —CHETAN BHAGAT [Typeset by: Arun K Gupta] This is someway my story. A great fun, inspirational One! Before you begin this book, I have a small request. Right here, note down three things. Write down something that i) you fear, ii) makes you angry and iii) you don’t like about yourself. Be honest, and write something that is meaningful to you. Do not think too much about why I am asking you to do this. Just do it. One thing I fear: __________________________________ One thing that makes me angry: __________________________________ One thing I do not like about myself: __________________________________ Okay, now forget about this exercise and enjoy the story. Have you done it? If not, please do. It will enrich your experience of reading this book. If yes, thanks Sorry for doubting you. Please forget about the exercise, my doubting you and enjoy the story. PROLOGUE _____________ The night train ride from Kanpur to Delhi was the most memorable journey of my life. For one, it gave me my second book. And two, it is not every day you sit in an empty compartment and a young, pretty girl walks in. Yes, you see it in the movies, you hear about it from friend’s friend but it never happens to you. When I was younger, I used to look at the reservation chart stuck outside my train bogie to check out all the female passengers near my seat (F-17 to F-25)is what I’d look for most). Yet, it never happened.
    [Show full text]
  • Fade In: Int. Art Gallery – Day
    FADE IN: INT. ART GALLERY – DAY Exhibition Guide FADE IN: INT. ART GALLERY – DAY March 03 – May 08, 2016 Works by Danai Anesiadou, Nairy Baghramian, Michael Bell-Smith, Dora Budor, Heman Chong, Mike Cooter, Brice Dellsperger, GALA Committee, Mathis Gasser, Jamian Juliano-Villani, Bertrand Lavier, William Leavitt, Christian Marclay, Rodrigo Matheus, Allan McCollum, Henrique Medina, Carissa Rodriguez, Cindy Sherman, Amie Siegel, Scott Stark, and Albert Whitlock; performances and public programs by Casey Jane Ellison, Mario García Torres, Alex Israel, Thirteen Black Cats, and more. Recasting the gallery as a set for dramatic scenes, FADE IN: INT. ART GALLERY – DAY explores the role that art plays in narrative film and television. FADE IN features the work of 25 artists and considers a history of art as seen in classic movies, soap operas, science fiction, pornography and musicals. These works have been sourced, reproduced and created in response to artworks that have been made to appear on-screen, whether as props, set dressings, plot devices, or character cues. The nature of the exhibition is such that sculptures, paintings and installations transition from prop to image to art object, staging an enquiry into whether these fictional depictions in mass media ultimately have greater influence in defining a collective understanding of art than art itself does. Certain preoccupations with artworks are established early on in cinematic history: the preciousness of art objects anchors their roles as plot drivers, and anxieties intensify regarding the vitality of artworks and their perceived abilities to wield power over viewers or to capture spirits. Such themes were famously explored in the 1945 film adaptation of Oscar Wilde’s The Picture of Dorian Gray, from which Cindy Sherman has sourced the original portrait painted for the production.
    [Show full text]