Installation
Stratagy DK
Stratagy DK I&P R2 November 1998
1-29
Refer to the Stratagy Library CD-Rom for more details.
Step 14: Application Programming
➤
Program the applications.
Note
See Chapter 10 – Token Programming
in the
Stratagy I&M Manual
for complete
details on all the Stratagy tokens.
Important!
Stratagy DK will not support the following tokens.
Some new tokens are available exclusively for the Stratagy DK. They are:
◆
KM
– Enables a portable/desktop computer’s modem to communicate with the
Stratagy DK internal modem (2400 baud) by sending the call to User ID 993.
Example:
@KM
◆
KT( )
– Directs calls to a designated User ID when DSS function is active (
dss_active
= true), the DSS port is assigned in the “answering” mailbox, and the Night Transfer on
the DSS console is ON.
Syntax:
@KT(XXX)G(YYY)
where:
XXX
Box number used when Night Transfer is ON.
Table 1-17
Defined Tokens Summary
J(file,string)
J(file,””,tokens)
Receive fax
S(port,S,%Sn,
termination,length,
timeout)
Serial port access
T(file,string)
T(file,””,tokens)
Transmit fax
V(file,field,item,field,
%Sn[,field,%Sn...])
Search for value
?(item,file,uid)
Exists in file
<(string)
Start incremental fax
>(file)
Add incremental fax
|(file)
Append variables to file
[(file)
Read %S variables state
](file)
Write %S variables state
{file}
Input file
H