DEFINITY ProLogix Solutions Release 2 Overview 555-235-100
Issue 2 June 1999 iii
Copyright and legal notices
Copyright
1999, Lucent Technologies
All Rights Reserved
Printed in U.S.A.
Notice
Every effort was made to ensure that the information in this book was
complete and accurate at the time of printing. However, information is
subject to change.
Your Responsibility for Your System’s Security
Toll fraud is the unauthorized use of your telecommunications system by an
unauthorized party, for example, persons other than your company’s
employees, agents, subcontractors, or persons working on your company’s
behalf. Note that there may be a risk of toll fraud associated with your
telecommunications system and, if toll fraud occurs, it can result in
substantial additional charges for your telecommunications services.
You and your system manager are responsible for the security of your
system, such as programming and configuring your equipment to prevent
unauthorized use. The system manager is also responsible for reading all
installation, instruction, and system administration documents provided with
this product in order to fully understand the features that can introduce risk of
Summary of Contents for DEFINITY ProLogix Solutions
Page 1: ...DEFINITY ProLogix Solutions Release 2 0 Overview...
Page 2: ...Copyright 1997 1998 by Lucent Technologies All rights reserved...
Page 104: ...5 Automatic Call Distribution ACD Figure 2 A Basic Example of Automatic Call Distribution...
Page 122: ...6 Medium Range Mobility Solution Figure 3 TransTalk 9000...
Page 125: ...6 Long Range Mobility Solutions Figure 4 Long Range Mobility Solutions...
Page 130: ...6 Starter Application Package...
Page 228: ...B Telephones...