Home > Toshiba > Communications System > Toshiba Stratagy 4/6/24 Installation And Maintenance Manual

Toshiba Stratagy 4/6/24 Installation And Maintenance Manual

    Download as PDF Print this page Share this page

    Have a look at the manual Toshiba Stratagy 4/6/24 Installation And Maintenance Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 566 Toshiba manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							STRATAGY 4/6/24 INSTALLATION AND MAINTENANCE MANUAL SEPTEMBER 1994 
    TOKEN 
    FUNCTION 1 
    Defined Tokens (continued) 
    DEFINITION 
    H( ) Hang-up process. Syntax: H&id) 
    Where: 
    uid Any valid User ID. 
    Description: Defines the specified uid as the uid that Stratagy 
    processes when it detects a hang-up condition. This is useful for 
    performing cleanup and/or exit routines when a caller hangs up. If the 
    User ID is omitted, Stratagy hangs up without processing the specified 
    User ID. 
    I( ) If conditional. Syntax: I(string,relationship,string,uid) 
    Where: 
    string Any quoted set of charaters, numbers, 
    and/or variables. 
    relationship Either >, 
    						
    							STRATAGY 4/6/24 INSTALLATION AND MAINTENANCE MANUAL SEPTEMBER 1994 
    TOKEN 
    FUNCTION ( 
    Defined Tokens (continued) 
    DEFINITION 
    J( ) Receive fax. Syntax: J(fi/e, “string”) 
    J (file, ” “, “tokens “) 
    Where: 
    file File name of the fax you want to receive. Any valid DOS 
    file name. Use two backslashes \ to signify one backslash 
    \. For example, to specify the file name 
    C:\STRATAGYINEW.TXT, use 
    C:\\STRATAGY\\NEW.TXT. If it consists of only numbers, 
    it is assumed to be a User ID and the received fax is 
    stored as a message. 
    “string” DTMF digits representing the telephone number that 
    should be dialed to connect to the fax device that will send 
    the transmission. If it is the empty,string, i.e., “‘I, then 
    Stratagy waits until a call rings into the appropriate fax 
    port. 
    ‘tokens” Actions Stratagy should take to properly connect the call 
    to the fax port. For more information, see the T( ) token. 
    Description: The J( ) token allows you to receive faxes as User ID 
    messages or for later transmission with the T( ) token. 
    Examples: 
    J(C:\\FAXES\\FAXl ,““) Causes Stratagy to set up one of the fax 
    modems to wait for a call and accept a fax called C:\FAXES\FAXI. 
    This is useful for loading a fax into Stratagy. 
    J(123, ““,“P(Gl)F-%FH”) Sets up a personal fax mail User ID that 
    allows for one-call fax transmission. 
    P(G1) Play “Start your fax machine at the tone” 
    F Hook-flash to put the call on hold 
    - Pause 
    %F Dial the extension of the fax port being used 
    H Hang-up (completes an unsupervised transfer) 
    L( ) Switch system Syntax: L(language-file) 
    language. 
    Where: 
    language-file File name in the Stratagy directory 
    that represents a Strataagy system 
    language file which has the DOS 
    suffix .IDX. 
    Description: Immediately changes the system prompts to use the 
    specified file (usually the specified file’s name indicates the language). All 
    system prompts change, including User mode prompts. 
    Examples: 
    L(ENGLISH) Uses the ENGLISH.IDX system prompt file in the 
    C:\STRATAGY directory. 
    L(SPANISH) Uses the SPANSIH.IDX system prompt file in the 
    C:\STRATAGY directory. 
    STRW.INST w-c 
    Table 6-2 
    Token Programming Language Tokens (continued) 
    6-6  
    						
    							STRATAGY 4/6/24 INSTALLATION AND MAINTENANCE MANUAL SEPTEMBER 1994 
    TOKEN 
    FUNCTION ( 
    Defined Tokens (continued) 
    DEFINITION 
    M( ) Audiotext menu. 
    Syntax: M(Gn,count,de/ay) 
    Where: 
    Gn User ID’s greeting number (range: 1 - 7). 
    count Number of times to play the greeting. 
    delay Time (in 1 Oths of seconds) to wait after each saying of 
    the greeting. 
    Description: The M( ) token allows you to specify fast single-digit entry 
    for audiotext menu selections. While Stratagy processes this token, it 
    plays (or says) the specified greeting while waiting for a single DTMF 
    digit to be pressed by the caller. As soon as the caller presses the single 
    DTMF digit, Stratagy looks up the menu selection that matches and 
    continues processing at the specified User ID. Therefore, this eliminates 
    the normal delay for determining completed DTMF entry. 
    Examples: 
    M(Gl,2,20) Plays greeting 1 up to 2 times with a 2 second delay 
    after each time the greeting plays, waiting for the caller to press 
    a DTMF. 
    n If the caller presses 
    5, Stratagy immediately continues 
    processing at the User ID specified in Menu field 5. .. 
    n If the caller makes no selection, Stratagy continues 
    processing at the next token. 
    H If the caller makes an invalid selection, Stratagy continues 
    processing at the Done chain. 
    0( ) Timed on-hook. Syntax: O(tenths) 
    Where: 
    tenths Time in tenths of seconds. 
    Description: An on-hook condition for the specified amount of time. 
    Depending upon the value of tenths, you can effect a flash, or even a 
    hang-up condition. This is useful for generating an intermediate hang-up 
    condition during token processing without terminating the actual 
    continued token processing. 
    Example: 
    O(60) Go on-hook for 6 seconds (60 + 10 = 6). 
    Table 6-2 
    Token Programming Language Tokens (continued) 
    6-7  
    						
    							STRATAGY 4 / 6 / 2 4 INSTALLATION AND MAINTENANCE MANUAL SEPTEMBER 1994 
    TOKEN 
    FUNCTION 1 DEFINITION 
    Defined Tokens (continued) 
    P( ) Play. 
    Syntax: Prepeaf(ifem) 
    Where: 
    repeat Number of times to play the item. If omitted, defaults to 1. 
    item Each item causes Stratagy to say specific information. 
    The items are defined as follows: 
    D Percentage of remaining disk space. 
    Gn Greeting n of the current User ID. 
    Gn, uid Greeting n of User ID uid. 
    M Total number of messages and number of new 
    messages for the current User ID. 
    M, uid Total number of messages and number of new 
    messages for the current User ID uid. 
    R DTMF digits entered by a caller who has 
    invoked relay paging (used only in the Notify 
    record Method field). 
    %Sn DTMF digits currently represented by the 
    variable %Sn, where n is a number from 0 to 9. 
    This is most effective for repeating the DTMF 
    entered by a caller for confirmation. 
    %Sn, N DTMF digits currently represented by the 
    variable %Sn as a number where the range is 
    assumed to be between 0 and 999 million. 
    %Sn, D DTMF digits currently represented by the 
    variable %Sn as a date, where the format is 
    assumed to be either mmddyy (which assumes 
    a year in the 1900s) or mmddyyyy. 
    %Sn, T DTMF digits currently represented by the 
    variable %Sn as a time of day, where the format 
    is assumed to be hhmm. 
    %Sn, $ DTMF digits currently represented by the 
    variable %Sn as a dollar amount, where the last 
    two digits are assumed to be cents. 
    %Sn, F The same as %Sn, $ except Stratagy uses 
    francs and centimes. 
    %Sn, P The same as %Sn, $ except Stratagy uses 
    pesos and centavos. 
    U “Name and extension” recording for the current 
    User ID. If there is no recoding, Stratagy says 
    the User ID digits. 
    U, uid “Name and extension” recording for the User ID 
    uid. If there is no recoding, Stratagy says the 
    User ID digits uid. 
    v Digits in the Notify record’s Variable field. 
    STRG”.,NST-Ne 
    Table 6-2 
    Token Programming Language Tokens (continued) 
    6-8  
    						
    							STRATAGY 4/6/24 INSTALLATION AND MAINTENANCE MANUAL SEPTEMBER 1994 
    TOKEN 
    1 FUNCTION 1 
    Defined Tokens (continued) 
    DEFINITION 
    P( 1 Play. 
    (continued) 
    Description: The P( ) token allows you to communicate information in a 
    variety of ways to a caller or to a user when used in a Notify record’s 
    Methodfield. While Stratagy is playing, the skip (*, #) and volume (8, 0) 
    keys on the telephone work. 
    Examples: 
    P(G1) Stratagy plays greeting 1 for the current User ID. This allows 
    you to record and play any prompt. 
    P(O6261994,D) Stratagy says “June twenty-sixth, nineteen ninety- 
    four.” 
    P(O6261994,$) Stratagy says “Sixty-two thousand six hundred 
    ninteen dollars and ninety-four cents.” 
    P(O6261994,N) Stratagy says “Six million two hundred sixty-one 
    thousand nine hundred ninety-four.” 
    Q( ) Question and 
    Syntax: Q(Gn...) 
    answer. 
    Where: 
    Gn Greeting number (range: 1 - 7). 
    . . . Additonal greetings to use. 
    Description: The Q( ) token allows you to ask a caller a series of 
    questions and store all the caller’s responses as a single message in the 
    current User ID. 
    Record each question as a greeting. Stratagy plays each 
    question/greeting with a tone, records a response, and then plays the 
    next queston/greeting until all the specified questions/greetings have 
    been played. 
    You can ask the caller up to 20 questions. To play more than 7 questions 
    (using greetings 1 to 7 for the current User ID), use questions from other 
    User IDS by specifying which User ID’s greeting to access with a # sign 
    followed by the uid. For example, G7#123 would use greeting 7 from 
    User ID 123. 
    Example: 
    Q(G1 ,G2 ,G3,G4,G5,G6,G7,G1#9000,G2,#9000) Stratagy asks 9 
    questions as recorded in the specified greetings, records 9 
    responses, and stores the responses as one message. 
    Table 6-2 
    Token Programming Language Tokens (continued) 
    6-9  
    						
    							STRATAGY 4/6/24 INSTALLATION AND MAINTENANCE MANUAL SEPTEMBER 1994 
    TOKEN 
    1 FUNCTION 1 
    Defined Tokens (continued) 
    DEFINITION 
    R( ) Read DTMF from Syntax: R(Gn,%Sm,de/ay) 
    a caller. 
    Where: 
    Gn Greeting number for the current User ID (range 1 - 7). 
    %Sm One of the %S storage variables (range: 0 - 9). 
    delay Time in tenths of seconds to wait for DTMF after 
    playing the greeting (range: 0 - 99). If omitted, 
    defaults to 0. 
    Description: The R( ) token allows you to obtain caller information 
    while prompting the caller with the specified recorded greeting. The token 
    plays the greeting specified for the current User ID and allows the caller 
    to make DTMF entry which is stored in the specified %S variable. 
    Stratagy interrupts the greeting as soon as the caller enters the first 
    DTMF tone. If there is no caller DTMF entry, Stratagy initializes the %S 
    variable to empty, i.e., “‘I. 
    Example: To prompt and have a caller enter a telephone number and 
    have Stratagy store that telephone number to be used later, you could: 
    n Record in greeting 1: “Enter your telephone number. Finish by 
    pressing the # sign.” 
    n Use R(GI ,%S6,20), which: 
    l Plays greeting 1. 
    l Stores the caller’s entry in variable %S6. 
    l Waits 2 seconds (20 + 10 = 2) for DTMF after playing the 
    greeting. 
    S( ) Serial port access. Syntax: S(port, “9, %Sn, “termination”,length, timeout) 
    Where: 
    port Logical serial port (1 or 2) mapped onto a physical 
    port number by the Setup Utility configuration option 
    serial-port1 for logical port 1 or serial-port2for logical 
    port 2 (Section 2, /nsta//ation). 
    “S” String sent out on the specified port. It may contain 
    any alphanumeric characters, %S variables, and the 
    following special characters: 
    \A Attention (bell sound), or Ctrl + G 
    \N Newline, or Ctrl + J 
    \R Return, or Ctrl + M 
    \T Tab, or Ctrl + I 
    \ Backslash, the actual  character 
    %Sn One of the %S storage variables (range: 0 - 9), which 
    stores any response from the serial port. If omitted, 
    Stratagy will not wait for a response. 
    “termination ” List of characters that defines when Stratagy should 
    stop reading from the serial port for storing in the 
    specified %Sn variable. If omitted, defaults to “IN\R” 
    as specified under “S’. The terminating character, if 
    any, will not be pat-t of %Sn. 
    *Tm”.tNSIzo 
    Table 6-2 
    Token Programming Language Tokens (continued) 
    6-l 0  
    						
    							STRATAGY 4/6/24 INSTALLATION AND MAINTENANCE MANUAL SEPTEMBER 1994 
    TOKEN 1 FUNCTION 1 
    Defined Tokens (continued) 
    DEFINITION 
    S( ) Serial port access. (continued) 
    length Maximum number of characters to expect as input on 
    the serial port. If the maximum number of characters is 
    received, processing continues immediately with 
    whatever characters that were received placed in the 
    %Sn variable. If this option is omitted, it defaults to the 
    maximum length of %Sn (128 characters). 
    timeout Maximum time (in 100 ms units) Stratagy waits for input 
    on the serial port when reading into the %Sn variable. 
    When the timeout expires, Stratagy continues 
    processing with the next token. Whatever characters, if 
    any, received up to that point are placed in the %Sn 
    variable. If this option is omitted, the default is the value 
    of the Setup Utility’s configuration option tmo-serial 
    (Section 2, Installation). 
    Description: The S( ) token gives Stratagy access to serial ports. By 
    communicating over serial ports, Stratagy can access other computers 
    and store and/or retrieve information from remote databases. 
    Once an S( ) token has been executed, the serial port is locked for 
    exclusive access by the current User ID. The lock is removed only when 
    Stratagy finishes executing the User ID’s Extension field. This allows for 
    several related S( ) tokens to be executed while the port is locked. 
    To properly use this token, the physical serial port must have certain 
    configuration parameters defined. These parameters are grouped together 
    in the Stratagy Configuration Utility’s System Configuration options 
    (Installation section, Chapter 5, “Configuring and Backing Up Stratagy”). 
    T( ) Transmit fax. Syntax: T( file, “string” ) 
    T( file, “tokens ” ) 
    Where: 
    file File name of the fax you want to transmit. Any valid 
    DOS file name. Use two backslashes \ to signify one 
    backslash \. For example, to specify the file name 
    C:\STRATAGY\NEW.TXT, use 
    C:\\STRATAGY\\NEW.TXT. 
    “string” DTMF digits representing the telephone number that 
    should be dialed to connect to the fax device that will 
    accept the transmission. It may contain %S storage 
    variables. If it is the empty string, i.e., “I’, then Stratagy 
    waits until a call rings into the fax port. 
    “tokens” Actions Stratagy should take to properly connect the call 
    to the fax port. Typically it would be P(GI)F-%FH, 
    which allows for one-call fax transmission. 
    P(G1) Say “Stat-t your fax machine at the tone.” 
    F Hook-flash to put the call on hold. 
    - Pause (0.5 second). 
    %F Dial the extension of the fax port being used. 
    H Hang up (completes an unsupervised transfer). 
    s,RO”.INST-m61121 
    Table 6-2 
    Token Programming Language Tokens (continued) 
    6-11  
    						
    							STRATAGY 4/6/24 INSTALLATION AND MAINTENANCE MANUAL SEPTEMBER 1994 
    ‘ 
    TOKEN 
    1 FUNCTION 1 
    Defined Tokens (continued) 
    DEFINITION 
    T( ) Transmit fax. (continued) 
    Description: Performs fax transmissions to either a specified telephone 
    number or to a connected call. For a two-call fax back, use the two 
    option syntax. For a one-call fax on demand, use the three option syntax. 
    If Stratagy has a free fax port available, transmission begins shortly on 
    that port. Otherwise, the request will be queued for transmission along 
    with any other such requests. Normally you will install your fax software so 
    that if a transmission fails (for instance, if the remote fax is busy), then the 
    request will be retried automatically at a later time, up to a maximum 
    number of retries. 
    Naturally, you must have installed and configured at least one fax/modem 
    on Stratagy. 
    Example: Suppose you obtained the caller’s fax number and stored it in 
    %Si. Then to fax the specified file to that user, you might use: 
    T(FAX.DCX,“S,%Sl”) 
    FAX.DCX name of the file to transmit 
    9 dial 9 for an outside line 
    pause2seconds 
    %S; dial the DTMF digits stored in %Si 
    V( ) Search for value. Syntax: V(file,field,item,field,%Sn) 
    Where: 
    file ASCII DOS file that is field comma-delimited and 
    record-return delimited. 
    field Number of the field in file (1 is the value of the field 
    before the comma). 
    item An alphanumeric string which may contain %S 
    variables. 
    %Sn One of the %S storage variables (range: 0 - 9). 
    Description: The V( ) token searches the specified file, in the specified 
    field, for the value given by item. If Stratagy finds the value, Stratagy 
    stores the contents of the second field into variable %Sn. If Stratagy does 
    not find the value, the token terminates and returns to the DONE state. 
    W( ) Wait or pause Syntax: W(n) 
    for event. 
    WhV 
    Wn,W 
    Wn,T) 
    Where: 
    n Wait (pause) for n tenths of a second. 
    n, P Wait up to n rings for a pager/beeper to answer. 
    n, V Wait up to n rings for a voice to answer. 
    n, T Wait up to n seconds to hear a dial tone. 
    Description: General wait token that allows Stratagy to wait for 
    confirmation of specific events. It is useful for confirming dial tone and for 
    notification to confirm that the appropriate answer has occurred. If the 
    event does not occur, Stratagy terminates all remaining token processing. 
    SIRCIINSTW 
    Table 6-2 
    Token Programming Language Tokens (continued) 
    6-l 2  
    						
    							, STRATAGY 4/6/24 
    INSTALLATION AND MAINTENANCE MANUAL SEPTEMBER 1994 
    TOKEN 1 FUNCTION 
    Defined Tokens (continued) 
    DEFINITION 
    W( ) Wait or pause (continued) 
    for event. 
    Example: 
    W(3,P) Wait up to 3 rings for a paging/beeping system to answer. You 
    can use this to confirm that the paging company answered 
    before playing DTMF to the paging company for pager 
    notification of messages. 
    +( 1 Addition. Syntax: +(%Sn,item) 
    Where: 
    =( ) Assignment. %Sn One of the %S storage variables (range: 0 - 9). 
    item Positive or negative value or another %S variable. 
    Description: Allows you to perform modifications to values for 
    calculation and control. Ideal for controlling limits and loops. 
    Syntax: =(%Sn,“item’? 
    =(%Sn, “item’,start,end) 
    Where: 
    %Sn One of the %S storage variables (range: 0 - 9). 
    item Any alphanumeric string. May contain %S variables. 
    start Starting character position for assigning a portion of 
    item. 
    end Ending character position to assign when used with 
    start. 
    Description: Gives the specified storage variable the value specified. 
    The value may be a sting or a numeric and should be quoted. The four- 
    option syntax allows for substring assignments. 
    Examples: 
    =(%Sl ,“FRENCH”) Gives %Sl the value of “FRENCH”. 
    =(%Sl ,“FREN CH”,3,5) Gives %Sl the value of ENC (E is the 
    start character and C is the end character). 
    =(%Sl ,%S2,1,3) where %S2 = 7530414 Extracts prefix of the 
    telephone number in %S2 (the first through third number) and 
    gives %Sl the value of 753. 
    Table 6-2 
    Token Programming language Tokens (continued) 
    6-13  
    						
    							STRATAGY 4/6/24 INSTALLATION AND MAINTENANCE MANUAL SEPTEMBER 1994 
    TOKEN 
    1 FUNCTION 
    Defined Tokens (continued) 
    ?( ) Exists in file. 
    Syntax: ?(ifem,fi/e,uid) 
    Where: 
    DEFINITION 
    item Any alphanumeric string. May also contain %S 
    variables. 
    file ASCII text file specified by a DOS file name. Use two 
    backslashes \ to signify one backslash \. For example, 
    to specify the file name C:\STRATAGY\NEW.TXT, 
    use C:\\STRATAGY\\NEW.TXT. 
    uid Valid User ID. 
    Description: Searches the specified file for the specified item. Stratagy 
    searches the file on a line-by-line basis and the item is found when it 
    matches an entire line within the file. If the item is found, processing 
    continues at the User ID specified; otherwise, processing continues with 
    the next token. 
    One use of this token is to control the use of a fax-on-demand feature. If 
    you find that someone is having a document faxed repeatedly to a phone 
    number (perhaps the phone number of someone who does not want your 
    fax), you can enter such numbers into a file, then program Stratagy to 
    check an entered fax number against those in the file and, if it’s found,‘ 
    branch to a User ID which plays a greeting saying that the entered phone 
    number is invalid and then hang up. If the entered number were not 
    found in the file, then processing would continue normally and the fax 
    would be sent to the requester. 
    c( ) Start incremental 
    fax. Syntax: C( ‘Wring’J 
    Where: 
    string DTMF digits representing the telephone number that 
    should be dialed. It may contain %S variables. If it is 
    the empty string, i.e., ” ‘I, then Stratagy waits until a 
    call rings into the fax port. 
    Description: Allows you to have a caller request multiple FAX 
    documents and then to transmit the requested documents with one call. 
    The ( ) token. To FAX multiple 
    documents, first initiate the process with this token and as the caller 
    requests faxes, add the requested document using the >( ) token. The 
    fax is sent automatically after the caller hangs up. 
    4 ) Add incremental 
    fax. Syntax: >( “fi/e’? 
    Where: 
    file DOS file name of the FAX you want to transmit. Any 
    valid DOS file name. Use two backslashes \ to signify 
    one backslash \. For example, to specify the file name 
    C:\STRATAGY\NEW.TXT, use 
    C:\\STRATAGY\\NEW.TXT. 
    Description: Allows you to transmit more than one requested 
    document with one call. Before using this token, you must first start 
    incremental faxing with the 
    						
    All Toshiba manuals Comments (0)

    Related Manuals for Toshiba Stratagy 4/6/24 Installation And Maintenance Manual