Home
>
Toshiba
>
Communications System
>
Toshiba Stratagy 4/6/24 Installation And Maintenance Manual
Toshiba Stratagy 4/6/24 Installation And Maintenance Manual
Have a look at the manual Toshiba Stratagy 4/6/24 Installation And Maintenance Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 566 Toshiba manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
STRATAGY 4/6/24 INSTALLATION AND MAINTENANCE MANUAL SEPTEMBER 1994 USERS FORM Copy as needed. User ID: Comment Extension: Dir Name 1: Dir Name 2: Basic Options Chains Maximum Rings: (default is 4) Done: Do Not Disturb: Lock: RNA: Screem Calls? Lock: Busy: Store Messages? Max: set Delay: Copy Messages To: Menus Message Volume: Guests: 1: Curent Greeting: Max: set 4: Busy Message? Max: set 7: ID Call? D/T? Name/Ext? Security Code: Read Only: Groups 1: 2: 3: 4: 2: 3: 5: 6: 8: 9: . 0: Does this User ID also have: AUTO FORM: YES - NO- NOTIFY FORM: YES - NO- GREETING SCRIPTS FORM: YES - NO- CUSTOMIZATION FORM-1
STRATAGY 4/6/24 INSTALLATION AND MAINTENANCE MANUAL SEPTEMBER 1994 AUTO (SCHEDULING) FORM Copy as needed. User ID Enabled Change On: At : Restrict To: MTWTFSS And Every:- month(s)- day(s) ------- hour(s) - minute(s) Next Change E Extension: Rings: Do Not Disturb: Call Screening: Greeting #: - Enabled Change On: At : Restrict To: MTWTFSS And Every:- month(s)- day(s) ------- hour(s) - minute(s) NexC Change : Extension: Rings: Do Not Disturb: Call Screening: Greeting .#:- Enabled Change On: At : Restrict To: MTWTFSS And Every:- month(s)- day(s) -----__ hour(s) - minute(s) Xext Change : Extension: Rings: Do Not Disturb: Call Screening: Greeting #: - Enabled Change On: At : Restrict To: MTWTFSS And Every:- month(s)- day(s) ------- hour(s) - minute(s) Next Change : Extension: Rings: Do Not Disturb: Call Screening: Greeting #:- Enabled Change On: At : Restrict To: MTWTFSS And Every:- month(s)- day(s) ------- hour(s) - minute(s) :lYexc Chaage : Extension: Rings: Do Not Disturb: Call Screening: Greeting #:- , CUSTOMIZATION FORM-2
STRATAGY 4/6/24 INSTALLATION AND MAINTENANCE MANUAL SEPTEMBER 1994 NOTIFY FORM User ID Copy as needed. Enabled M T W T F S s From To Notify After Continue Every Max Times ------_ - - min min Title: Type : Variable: Method: Enabled M T W T F S s From To Notify After Continue Every Max Times ------- - - min min Title: Type : Variable: Method: Enabled MTWTFSS From To Notify After Continue Every Max Times -----__ - - min min Title: Type : Variable: Method: Enabled M T W T F S S From To Notify After Continue Every Max Times ------- - - min min Title: Type : Variable: Method: Enabled MTWTFSS From To Notify After Continue Every Max Times ------_ - - min min Title: Type : Variable: Method: , CUSTOMIZATION FORM-3
STRATAGY 4/6/24 INSTALLATION AND MAINTENANCE MANUAL SEPTEMBER 1994 GREETING SCRIPTS FORM User ID Cogy as needed. Greeting 1 Greeting 2 Greeting 3 . Greeting 4 Greeting 5 Greeting 6 Greeting 7 . CUSTOMIZATION FORM-4
STRATAGY 4/6/24 INSTALLATION AND MAINTENANCE MANUAL SEPTEMBER 1994 Stratagykg PROGRAMMING SECTION Chapter 1 _ _ _ _ _ _ _ _ _ - Chapter 2 - _ _ - - - - - - - Chapter 3 _ _ _ _ _ _ - - - - Chapter 4 _ _ _ _ _ _ _ - - - Chapter 5 _ _ _ _ - - - - - - Chapter 6 >- - - - - - - - - - Chapter 7 _ _ _ _ _ _ - - - - Chapter 8 _ _ _ _ _ _ _ _ _ _ Chapter 9 _ _ _ _ _ - - - - - Appendix A - - - - - - - - - Appendix B _ _._ _ _ _ _ _ - Introduction How Stratagy Operates Accessing and Using Stratagy Customizing User ID Mailboxes Special Greeting User ID Mailboxes Token Programming Language Generating Reports Backup and Filecopy System Administrator’s User ID Customization Forms Customization Examples
STRATAGY 4/6/24 INSTALLATION AND MAINTENANCE MANUAL SEPTEMBER 1994 PROGRAMMING SECTION CHAPTER 1 INTRODUCTION
, STRATAGY 4/6/24 INSTALLATION AND MAINTENANCE MANUAL SEPTEMBER 1994 TABLE OF CONTENTS Chapter 1 - Introduction PARAGRAPH SUBjECT PAGE 1 Purpose ________________________________________----- _________________________________r______------------------------ 2 Organization _______________r_ ____________________------------------- ____________________---------------------------- 3 Reference Documentation ____________________---------------------------------- -------------------------------- 3.1 Sections of This Manual ____________________------------------------------------------------------------------ 3.2 Additional Reference Documentation ____________________------------------ ____________________----------- 4 About the System Administrator ______-_____________----------- ____________________--------------------------- 5 System Mnemonics/Terms ____________________------------------ -- ------ --------------------------------------- 6 Use of Notes, Cautions, and Warnings--------------------- ____________________----------------------------- l-1 l-1 1-I l-1 l-1 l-l l-2 l-2 l-i
STRATAGY 4/6/24 INSTALLATION AND MAINTENANCE MANUAL SEPTEMBER 1994 CHAPTER 1 INTRODUCTION 1 PURPOSE The Programming section of the Stratagy installation and Maintenance A.&W/ provides detailed instructions for operating, customizing, and administrating the Stratagy automated attendant and voice messaging systems. This chapter provides an overview of the organization of the Programming section; a list of reference documentation that supports the system; the functions of the System Administrator; a list of system mnemonics and terms; and the use of notes, cautions, and warnings. 2 ORGANIZATION This manual is organized in modular chapters for easy removal and replacement of updated materials. The chapters are as follows: Chapter 1 Chapter 2 Chapter 3 Chapter 4 Chapter 5 Chapter 6 Chapter 7 Chapter 8 Chapter 9 Appendix A Appendix B Introduction How Stratagy Operates Accessing and Using Stratagy Customizing User ID Mailboxes Special Greeting User ID Mailboxes Token Programming Language Generating Reports Backup and Filecopy System Administrator’s User ID Forms Customization Examples 3 REFERENCE DOCUMENTATION Reference documentation for the Programming section consists of the remaining sections of the installation and Maintenance Manual and additional Stratagy documentation. 3.1 SECTIONS OF THIS MANUAL The installation and Maintenance Manual consists of the following sections. General Description: Reference document that provides an overview of the Stratagy systems. Describes their hardware and features. Available as a stand-alone document. Installation: Designed for the installer, this section provides detailed step-by-step instructions for installing and configuring Stratagy systems. Programming: Provides detailed instructions for operating, customizing, and administrating Stratagy systems (this section). Fault Finding: Describes the procedures used to diagnose and correct faults. Maintenance and Upgrades: Provides instructions on maintaining and upgrading Stratagy systems. Operating Procedures: Consists of the User Guide reference document. Describes the telephone operating procedures for the telephone user. Incorporates the Quick Reference Guide, a concise guide for Stratagy users. Technical Bulletins: Provide important updates to the Stratagy documentation. 3.2 ADDITIONAL REFERENCE DOCUMENTATION In addition, the Stratagy systems are supported by the following complement of reference documentation. Feature Description: A brief description of the features of the Stratagy systems. User Guide: Describes the telephone operating procedures for the telephone user. Quick Reference Guide: A concise guide for Stratagy users. 4 ABOUT THE SYSTEM ADMINISTRATOR System Administrator functions may include: n Initial setup (assisting the Installer with defining your company’s configuration and customization requirements) n Customizing User ID mailboxes n Customizing special User ID mailboxes n Generating reports n Performing system shutdown and restart n Backing up the system * n Using Stratagy’s filecopy utility H Using the system User ID mailbox l-1
STRATAGY 4/6/24 INSTALLATION AND MAINTENANCE MANUAL SEPTEMBER 1994 Your company will assign all or some of these functions to an employee who knows your phone system, organizational structure, and the needs of your customers and employees. The Technical Service Representative will perform the remaining functions. 5 SYSTEM MNEMONICS/TERMS The following mnemonics and terms identify nomenclature used when operating, customizing, and administrating Stratagy. BPS: Bits Per Second - Unit of measure that refers to the transmission speed (baud rate) of electronic signals. Used when describing modem operation. Caller: Someone who calls into Stratagy. A caller often will obtain information, leave a message for someone, and/or provide information. Called Party: The telephone user the caller reached. See “User”. Chains: Stratagy control structure that allows for more complex programming. Program chains to tell Stratagy what to do when one of three conditions apply: Done (if caller remains on the line after leaving a message or listening to an announcement), RNA (Ring No Answer - there is no answer at the extension), or Busy (the extension is busy). CO: Central Office - Facility which houses switching equipment that provides telephone service (CO lines, Centrex lines, etc.) for the immediate geographical area. DTMF: Dual tone Multi-frequency - Push-button tone dialing. Groups: Stratagy control structure that allows for more complex programming. Groups control which User IDS a call may access. Each User ID mailbox user may be a member of up to four groups. To be able to access another User ID, the caller User ID must share at least one group number with the currently accessed User ID. Menus: Stratagy control structure that allows for more complex programming. Program menus to define the destination a caller will be sent when he presses one of ten possible single-digit menu options while listening to the greeting of this mailbox. Menus can accommodate an unlimited number of special applications. Modem: Modulator-Demodulator - Device used primarily for converting digital signals into quasi-analog signals for transmission, and reconverting upon reception. PBX: Private Branch Exchange - Industry-standard term which refers to a telephone switch, usually on- premises, which serves an individual company, and is connected to a public telephone exchange through the CO. Port: There are two types of ports: physical and logical. A physical port is an actual station circuit location; a logical port is the set of characteristics - features, station intercom number, etc. - assigned to the physical port. Logical ports are mobile; they can be moved from one physical port to another. IVR: Interactive Voice Response - An application that will prompt the user for input (using a custom prompt), wait for the user to enter a DTMF response, which will be stored into a variable, and then use that information to access a database to formulate a response. Databases may be on the hard disk of the Stratagy system, accessed remotely over a network, or accessed through the serial ports of the Stratagy system, possibly connecting to a mainframe or other data server. Once a response has been determined from the database, the Stratagy system may be programmed to play this data back to the caller in a number of different ways: as a date, time, monetary value (in dollars and cents), or simply as a number. The value may be combined with other custom-recorded prompts, so that the system could, for example, respond to a caller with the message “Your order for 6 items will be shipped on July 17, 1994.” The number six and the date in this example would be provided by the database, while the phrases “Your order for” and “items will be shipped on” would be recordings that the System Administrator would make. PC: Personal Computer. Token Programming Language: Stratagy control structure that allows for more complex programming. Stratagy’s programming language gives versatility to obtain additional features, such as fax on demand, message waiting light control, and confirming digits entered by a caller. A series of tokens instruct Stratagy what actions to perform. User: A telephone user is someone who has access to one or more User IDS in the system by knowing their security codes. Once a user accesses his User ID, he can play back messages which have been left for him, delete those messages, send them to other User IDS, etc. User ID/User ID Mailbox: Unique Stratagy record that provides call processing control - records messages from callers, provides information to callers, or controls the flow of a call. l-2
STRATAGY 4/6/24 INSTALLATION AND MAINTENANCE MANUAL SEPTEMBER 1994 6 USE OF NOTES, CAUTIONS, AND WARNINGS Notes: Elaborate specific items, or reference other information. Important Notes: Call attention to important instructions or other information. Cautions: Advise you that the equipment could be damaged if the instructions are not followed closely. Warnings: Alert you when the given tasks could cause the technician personal injury or death. l-3