This document provides instructions for using a voice broadcast application. It describes how to configure groups, IVR destinations, templates, broadcasts, and view reports. Key steps include:
1) Creating groups and adding contact information.
2) Setting up IVR destinations which provide response options and template configurations which define prompts and actions.
3) Scheduling and launching broadcasts which use templates and groups.
4) Viewing call detail and traffic reports to analyze broadcast performance.
This document provides instructions for using a voice broadcast application. It describes how to configure groups, IVR destinations, templates, broadcasts, and view reports. Key steps include:
1) Creating groups and adding contact information.
2) Setting up IVR destinations which provide response options and template configurations which define prompts and actions.
3) Scheduling and launching broadcasts which use templates and groups.
4) Viewing call detail and traffic reports to analyze broadcast performance.
Kevin Withnall VoIP In 5 Minutes with AsteriskICT Illawarra
The document provides an overview of VoIP (Voice over IP) technology, including what it is, some key concepts to understand, benefits and drawbacks. Specifically:
- VoIP allows voice calls over IP networks using protocols like SIP and codecs to compress audio into digital packets, replacing traditional phone systems.
- Benefits include lower call costs, flexible configurations for remote work and additional features. However, VoIP relies on network quality and has potential for jitter or voice quality issues.
- Implementing VoIP can significantly reduce phone expenses, especially on international calls. It also enables remote work and adds scalability compared to traditional phone systems.
Asterisk is an open source framework for building communications applications. This document provides step-by-step instructions for compiling, installing, and configuring Asterisk to make a test call between a SIP softphone and an IAX2 server. The instructions explain how to download and compile Asterisk from source, configure basic extensions and SIP/IAX2 settings, and place a test call to hear an IVR menu.
Asterisk security involves properly configuring files like SIP.conf and dial plans to prevent extension hopping and restrict access. It is also important to limit the default context, monitor the system, and use secure protocols to protect privacy. Hardening the system through practices like restricting ports and disallowing everything by default improves security.
Study: The Future of VR, AR and Self-Driving CarsLinkedIn
We asked LinkedIn members worldwide about their levels of interest in the latest wave of technology: whether they’re using wearables, and whether they intend to buy self-driving cars and VR headsets as they become available. We asked them too about their attitudes to technology and to the growing role of Artificial Intelligence (AI) in the devices that they use. The answers were fascinating – and in many cases, surprising.
This SlideShare explores the full results of this study, including detailed market-by-market breakdowns of intention levels for each technology – and how attitudes change with age, location and seniority level. If you’re marketing a tech brand – or planning to use VR and wearables to reach a professional audience – then these are insights you won’t want to miss.
The document describes the features of a voice calling client application including login, sending voice calls, IVR management, job reports, call reports, user profiles, and changing passwords. Key features allow sending voice calls to mobile numbers, using text-to-speech, recorded audio files, recording messages, and IVR interactions. The application provides reports on call history, details, and summaries to view job and call statuses and details.
MAF ICIMS™ Monitoring, Analytics & Reporting for Microsoft Teams and UC - rep...MAF InfoCom
MAF ICIMS™ is a reporting and analytics solution for Unified Communication and Collaboration (UC&C) platforms and other data sources such as Session Border Controllers (SBC’s), Gateways, Trading Platforms, Turrents & Dealer Boards. It allows you to gain valuable business and technical insights through its reports, daily dashboards and historical trend monitors. Its flexible, user defined nature means you tell the software what you want to see instead of the software dictating to you what you will see.
The document provides an overview of WhatsApp's end-to-end encryption system. It describes how encryption keys are generated and exchanged between clients to establish encrypted messaging sessions. It explains how message keys are derived to encrypt individual messages sent within a session using protocols that provide forward secrecy. It also covers how media attachments and group messages are encrypted within the system.
This document provides instructions for using a voice broadcast application. It describes how to configure groups, IVR destinations, templates, broadcasts, and view reports. Key steps include:
1) Creating groups and adding contact information.
2) Setting up IVR destinations which provide response options and template configurations which define prompts and actions.
3) Scheduling and launching broadcasts which use templates and groups.
4) Viewing call detail and traffic reports to analyze broadcast performance.
Kevin Withnall VoIP In 5 Minutes with AsteriskICT Illawarra
The document provides an overview of VoIP (Voice over IP) technology, including what it is, some key concepts to understand, benefits and drawbacks. Specifically:
- VoIP allows voice calls over IP networks using protocols like SIP and codecs to compress audio into digital packets, replacing traditional phone systems.
- Benefits include lower call costs, flexible configurations for remote work and additional features. However, VoIP relies on network quality and has potential for jitter or voice quality issues.
- Implementing VoIP can significantly reduce phone expenses, especially on international calls. It also enables remote work and adds scalability compared to traditional phone systems.
Asterisk is an open source framework for building communications applications. This document provides step-by-step instructions for compiling, installing, and configuring Asterisk to make a test call between a SIP softphone and an IAX2 server. The instructions explain how to download and compile Asterisk from source, configure basic extensions and SIP/IAX2 settings, and place a test call to hear an IVR menu.
Asterisk security involves properly configuring files like SIP.conf and dial plans to prevent extension hopping and restrict access. It is also important to limit the default context, monitor the system, and use secure protocols to protect privacy. Hardening the system through practices like restricting ports and disallowing everything by default improves security.
Study: The Future of VR, AR and Self-Driving CarsLinkedIn
We asked LinkedIn members worldwide about their levels of interest in the latest wave of technology: whether they’re using wearables, and whether they intend to buy self-driving cars and VR headsets as they become available. We asked them too about their attitudes to technology and to the growing role of Artificial Intelligence (AI) in the devices that they use. The answers were fascinating – and in many cases, surprising.
This SlideShare explores the full results of this study, including detailed market-by-market breakdowns of intention levels for each technology – and how attitudes change with age, location and seniority level. If you’re marketing a tech brand – or planning to use VR and wearables to reach a professional audience – then these are insights you won’t want to miss.
The document describes the features of a voice calling client application including login, sending voice calls, IVR management, job reports, call reports, user profiles, and changing passwords. Key features allow sending voice calls to mobile numbers, using text-to-speech, recorded audio files, recording messages, and IVR interactions. The application provides reports on call history, details, and summaries to view job and call statuses and details.
MAF ICIMS™ Monitoring, Analytics & Reporting for Microsoft Teams and UC - rep...MAF InfoCom
MAF ICIMS™ is a reporting and analytics solution for Unified Communication and Collaboration (UC&C) platforms and other data sources such as Session Border Controllers (SBC’s), Gateways, Trading Platforms, Turrents & Dealer Boards. It allows you to gain valuable business and technical insights through its reports, daily dashboards and historical trend monitors. Its flexible, user defined nature means you tell the software what you want to see instead of the software dictating to you what you will see.
The document provides an overview of WhatsApp's end-to-end encryption system. It describes how encryption keys are generated and exchanged between clients to establish encrypted messaging sessions. It explains how message keys are derived to encrypt individual messages sent within a session using protocols that provide forward secrecy. It also covers how media attachments and group messages are encrypted within the system.
This document provides an overview of WhatsApp's end-to-end encryption system. It describes how WhatsApp uses the Signal Protocol to establish encrypted sessions between users, securely exchange messages and media, and conduct encrypted voice and video calls. The encryption protects messages so only the sender and recipient can read them, and not even WhatsApp can access the plaintext. It also details how group messaging, key verification, and transport security are implemented in WhatsApp's encryption protocol.
Callision provides cloud-based call center solutions including queuing, interactive voice response, conferencing, and call monitoring capabilities. It allows users to make and receive calls from a web browser without additional hardware or software. The document provides instructions on setting up Callision accounts, groups, queues, conferences, and interactive voice response systems to route calls to the appropriate agents.
MAF ICIMS™ Monitoring, Analytics & Reporting for Microsoft Teams and UC - Das...MAF InfoCom
MAF ICIMS™ is a reporting and analytics solution for Unified Communication and Collaboration (UC&C) platforms and other data sources such as Session Border Controllers (SBC’s), Gateways, Trading Platforms, Turrents & Dealer Boards. It allows you to gain valuable business and technical insights through its reports, daily dashboards and historical trend monitors. Its flexible, user defined nature means you tell the software what you want to see instead of the software dictating to you what you will see
This document provides instructions for using various features of Polycom video conferencing equipment, including:
- Placing and answering video calls by entering a name or number, using recent calls lists, contacts lists, or directories.
- Adjusting camera controls like pan, tilt, zoom, and camera presets.
- Conducting multipoint calls using an internal or external MCU.
- Sharing content from laptops, document cameras, or video players during calls.
- Working with directories and address books to store contact information for easy calling.
- Basic troubleshooting tips and how to schedule calls using external MCUs.
This document describes a timesheet tool called Burnsheet Tool developed in VB with Excel. It allows users to select a project, view team member lists, and generate individual burnsheet templates to track hours worked. The tool includes sheets to generate burnsheets for each project and team member, and a report generation sheet to automatically check burnsheets, identify members who were non-compliant on hours, and email reports. It provides a way for supervisors to easily generate and manage timesheets and reporting.
This document provides an overview of WhatsApp's end-to-end encryption system. It describes how WhatsApp uses the Signal Protocol to establish encrypted sessions between users, including generating keys, setting up sessions, and exchanging encrypted messages and attachments. It also covers additional WhatsApp features like group messaging, calls, statuses and live location that are integrated with this end-to-end encryption system.
This document provides instructions on installing and configuring the Tryton Prestashop integration module. It describes downloading and installing the module from source code or PyPI. It also outlines configuring Prestashop settings like the API key in both Prestashop and Tryton. Finally, it explains how orders are imported from Prestashop to Tryton as sales orders and exported back with status updates.
This document discusses Ansoft HFSS simulation software. It provides an overview of HFSS's main features like automatic adaptive meshing and advanced finite element method technology. It also describes getting started with HFSS, provides an example of simulating a microstrip patch antenna, and lists advantages like high productivity for research and development. The document concludes that HFSS is well-suited for simulating planar antennas and designing complex RF components.
This document provides instructions for creating new patron records in a library system. It describes selecting the New Patron command from the File menu or toolbar button to begin the process. The user is then prompted to choose a patron record template, which contains fields like expiration date, patron codes for categories, and variable-length fields for contact information. The instructions emphasize entering data for each prompted field and using the Next button to move through the wizard until all required information is saved and the new record is complete.
The document is a template for a Master's dissertation submitted to the University of Stirling. It provides guidelines for formatting the dissertation, including styles for headings, text, figures, and references. It also includes placeholder text and sections for the introduction, literature review, technical chapters, conclusion, and appendices. The goal of the template is to help students structure their dissertation and apply styles consistently for editorial purposes.
[Bind DNS + Zimbra + SpamAssassin] Antispam Installation GuideMạnh Nguyễn Văn
This document provides an installation guide for an anti-spam system using Zimbra and SpamAssassin. It discusses setting up a DNS server using Bind, installing and configuring the Zimbra mail server, and integrating SpamAssassin with Zimbra to provide spam filtering. The guide walks through installing each component, configuring necessary settings, and testing functionality. It also evaluates what was achieved and additional improvements that could be made to the anti-spam system.
This document provides help and instructions for using the aSc TimeTables software for creating class schedules. It covers downloading and installing the software, entering basic data like schools, classes, teachers and subjects. It also explains how to generate a schedule and describes some optimization settings. The help is provided in an online tutorial format that can be viewed within the software or downloaded as a PDF manual.
The document provides instructions for using various features of the Business Productivity Online Suite (BPOS) offered by RoseBud Technologies. It describes how to set up and log into BPOS, and gives overviews of the main applications included: Outlook, Live Meeting, SharePoint, and Communicator. The document is authored by Greg Wartes of RoseBud Technologies and provides step-by-step guides to common tasks within each application such as sending emails, scheduling meetings, uploading documents, and changing view settings.
This document provides instructions for installing and configuring CIMtrek Discovery and Analysis (DNA) software. It explains that installation is simple and requires only a few mouse clicks. Configuration involves specifying an ignore list of standard Notes files and output file locations. The document also describes the discovery process, which interrogates Domino servers and Notes clients to compile a list of NSF files, analyzing each file's characteristics. Users can then view detailed information about forms, fields, scripts and more to understand applications before migration.
SSI Aeration System Specification Generator - SpecGenTomFrankel
Use this tool to write diffused aeration system specifications. Fine bubble diffusers and coarse bubble diffusers used in aeration systems at wastewater treatment plants are included.
The document outlines the steps to implement AODV routing protocols in a mobile ad hoc network (MANET) simulation. The steps include: 1) defining initial simulation parameters such as the network size and selecting AODV protocols; 2) configuring applications like FTP; 3) configuring node profiles and deploying traffic; 4) configuring node mobility using the random waypoint model; 5) collecting statistics on routing protocols; 6) duplicating scenarios to test different parameters; 7) running the simulation; and 8) viewing results by comparing scenarios.
SAP ABAP lsmw beginner lerning tutorial.pdfPhani Pavan
LSMW is a tool in SAP used to migrate legacy data into SAP. It has a recording tool to record transactions and fields to upload. This document outlines the 15 step process to use LSMW to upload vendor master data from a text file into SAP, including creating a project, recording the vendor creation transaction, mapping fields, creating an upload file, reading and converting the data, and running the batch input session to upload the records. Testing is done along the way to validate correct mapping and data conversion before uploading all records.
SAP ABAP lsmw beginner lerning tutorial.pdfPhani Pavan
LSMW is a tool in SAP used to migrate legacy data into SAP. It has a recording tool to record transactions and fields to upload. This document outlines the 15 step process to use LSMW to upload vendor master data from a text file into SAP, including creating a project, recording the vendor creation transaction, mapping fields, creating an upload file, reading and converting the data, and running the batch input session to upload the records. Testing is done along the way to validate correct mapping and data conversion before uploading all records.
This document provides instructions for various functions in Innovyze Infonet Version 14.5 including how to create nodes and manhole surveys, import data from files and CAD drawings, generate reports, print layouts, export data to different file formats, create zones, import CCTV survey data, and grade pipes based on CCTV surveys. It consists of 24 sections that explain step-by-step how to perform each task in the software.
This document provides an overview of wound healing, its functions, stages, mechanisms, factors affecting it, and complications.
A wound is a break in the integrity of the skin or tissues, which may be associated with disruption of the structure and function.
Healing is the body’s response to injury in an attempt to restore normal structure and functions.
Healing can occur in two ways: Regeneration and Repair
There are 4 phases of wound healing: hemostasis, inflammation, proliferation, and remodeling. This document also describes the mechanism of wound healing. Factors that affect healing include infection, uncontrolled diabetes, poor nutrition, age, anemia, the presence of foreign bodies, etc.
Complications of wound healing like infection, hyperpigmentation of scar, contractures, and keloid formation.
This document provides an overview of WhatsApp's end-to-end encryption system. It describes how WhatsApp uses the Signal Protocol to establish encrypted sessions between users, securely exchange messages and media, and conduct encrypted voice and video calls. The encryption protects messages so only the sender and recipient can read them, and not even WhatsApp can access the plaintext. It also details how group messaging, key verification, and transport security are implemented in WhatsApp's encryption protocol.
Callision provides cloud-based call center solutions including queuing, interactive voice response, conferencing, and call monitoring capabilities. It allows users to make and receive calls from a web browser without additional hardware or software. The document provides instructions on setting up Callision accounts, groups, queues, conferences, and interactive voice response systems to route calls to the appropriate agents.
MAF ICIMS™ Monitoring, Analytics & Reporting for Microsoft Teams and UC - Das...MAF InfoCom
MAF ICIMS™ is a reporting and analytics solution for Unified Communication and Collaboration (UC&C) platforms and other data sources such as Session Border Controllers (SBC’s), Gateways, Trading Platforms, Turrents & Dealer Boards. It allows you to gain valuable business and technical insights through its reports, daily dashboards and historical trend monitors. Its flexible, user defined nature means you tell the software what you want to see instead of the software dictating to you what you will see
This document provides instructions for using various features of Polycom video conferencing equipment, including:
- Placing and answering video calls by entering a name or number, using recent calls lists, contacts lists, or directories.
- Adjusting camera controls like pan, tilt, zoom, and camera presets.
- Conducting multipoint calls using an internal or external MCU.
- Sharing content from laptops, document cameras, or video players during calls.
- Working with directories and address books to store contact information for easy calling.
- Basic troubleshooting tips and how to schedule calls using external MCUs.
This document describes a timesheet tool called Burnsheet Tool developed in VB with Excel. It allows users to select a project, view team member lists, and generate individual burnsheet templates to track hours worked. The tool includes sheets to generate burnsheets for each project and team member, and a report generation sheet to automatically check burnsheets, identify members who were non-compliant on hours, and email reports. It provides a way for supervisors to easily generate and manage timesheets and reporting.
This document provides an overview of WhatsApp's end-to-end encryption system. It describes how WhatsApp uses the Signal Protocol to establish encrypted sessions between users, including generating keys, setting up sessions, and exchanging encrypted messages and attachments. It also covers additional WhatsApp features like group messaging, calls, statuses and live location that are integrated with this end-to-end encryption system.
This document provides instructions on installing and configuring the Tryton Prestashop integration module. It describes downloading and installing the module from source code or PyPI. It also outlines configuring Prestashop settings like the API key in both Prestashop and Tryton. Finally, it explains how orders are imported from Prestashop to Tryton as sales orders and exported back with status updates.
This document discusses Ansoft HFSS simulation software. It provides an overview of HFSS's main features like automatic adaptive meshing and advanced finite element method technology. It also describes getting started with HFSS, provides an example of simulating a microstrip patch antenna, and lists advantages like high productivity for research and development. The document concludes that HFSS is well-suited for simulating planar antennas and designing complex RF components.
This document provides instructions for creating new patron records in a library system. It describes selecting the New Patron command from the File menu or toolbar button to begin the process. The user is then prompted to choose a patron record template, which contains fields like expiration date, patron codes for categories, and variable-length fields for contact information. The instructions emphasize entering data for each prompted field and using the Next button to move through the wizard until all required information is saved and the new record is complete.
The document is a template for a Master's dissertation submitted to the University of Stirling. It provides guidelines for formatting the dissertation, including styles for headings, text, figures, and references. It also includes placeholder text and sections for the introduction, literature review, technical chapters, conclusion, and appendices. The goal of the template is to help students structure their dissertation and apply styles consistently for editorial purposes.
[Bind DNS + Zimbra + SpamAssassin] Antispam Installation GuideMạnh Nguyễn Văn
This document provides an installation guide for an anti-spam system using Zimbra and SpamAssassin. It discusses setting up a DNS server using Bind, installing and configuring the Zimbra mail server, and integrating SpamAssassin with Zimbra to provide spam filtering. The guide walks through installing each component, configuring necessary settings, and testing functionality. It also evaluates what was achieved and additional improvements that could be made to the anti-spam system.
This document provides help and instructions for using the aSc TimeTables software for creating class schedules. It covers downloading and installing the software, entering basic data like schools, classes, teachers and subjects. It also explains how to generate a schedule and describes some optimization settings. The help is provided in an online tutorial format that can be viewed within the software or downloaded as a PDF manual.
The document provides instructions for using various features of the Business Productivity Online Suite (BPOS) offered by RoseBud Technologies. It describes how to set up and log into BPOS, and gives overviews of the main applications included: Outlook, Live Meeting, SharePoint, and Communicator. The document is authored by Greg Wartes of RoseBud Technologies and provides step-by-step guides to common tasks within each application such as sending emails, scheduling meetings, uploading documents, and changing view settings.
This document provides instructions for installing and configuring CIMtrek Discovery and Analysis (DNA) software. It explains that installation is simple and requires only a few mouse clicks. Configuration involves specifying an ignore list of standard Notes files and output file locations. The document also describes the discovery process, which interrogates Domino servers and Notes clients to compile a list of NSF files, analyzing each file's characteristics. Users can then view detailed information about forms, fields, scripts and more to understand applications before migration.
SSI Aeration System Specification Generator - SpecGenTomFrankel
Use this tool to write diffused aeration system specifications. Fine bubble diffusers and coarse bubble diffusers used in aeration systems at wastewater treatment plants are included.
The document outlines the steps to implement AODV routing protocols in a mobile ad hoc network (MANET) simulation. The steps include: 1) defining initial simulation parameters such as the network size and selecting AODV protocols; 2) configuring applications like FTP; 3) configuring node profiles and deploying traffic; 4) configuring node mobility using the random waypoint model; 5) collecting statistics on routing protocols; 6) duplicating scenarios to test different parameters; 7) running the simulation; and 8) viewing results by comparing scenarios.
SAP ABAP lsmw beginner lerning tutorial.pdfPhani Pavan
LSMW is a tool in SAP used to migrate legacy data into SAP. It has a recording tool to record transactions and fields to upload. This document outlines the 15 step process to use LSMW to upload vendor master data from a text file into SAP, including creating a project, recording the vendor creation transaction, mapping fields, creating an upload file, reading and converting the data, and running the batch input session to upload the records. Testing is done along the way to validate correct mapping and data conversion before uploading all records.
SAP ABAP lsmw beginner lerning tutorial.pdfPhani Pavan
LSMW is a tool in SAP used to migrate legacy data into SAP. It has a recording tool to record transactions and fields to upload. This document outlines the 15 step process to use LSMW to upload vendor master data from a text file into SAP, including creating a project, recording the vendor creation transaction, mapping fields, creating an upload file, reading and converting the data, and running the batch input session to upload the records. Testing is done along the way to validate correct mapping and data conversion before uploading all records.
This document provides instructions for various functions in Innovyze Infonet Version 14.5 including how to create nodes and manhole surveys, import data from files and CAD drawings, generate reports, print layouts, export data to different file formats, create zones, import CCTV survey data, and grade pipes based on CCTV surveys. It consists of 24 sections that explain step-by-step how to perform each task in the software.
This document provides an overview of wound healing, its functions, stages, mechanisms, factors affecting it, and complications.
A wound is a break in the integrity of the skin or tissues, which may be associated with disruption of the structure and function.
Healing is the body’s response to injury in an attempt to restore normal structure and functions.
Healing can occur in two ways: Regeneration and Repair
There are 4 phases of wound healing: hemostasis, inflammation, proliferation, and remodeling. This document also describes the mechanism of wound healing. Factors that affect healing include infection, uncontrolled diabetes, poor nutrition, age, anemia, the presence of foreign bodies, etc.
Complications of wound healing like infection, hyperpigmentation of scar, contractures, and keloid formation.
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumMJDuyan
(𝐓𝐋𝐄 𝟏𝟎𝟎) (𝐋𝐞𝐬𝐬𝐨𝐧 𝟏)-𝐏𝐫𝐞𝐥𝐢𝐦𝐬
𝐃𝐢𝐬𝐜𝐮𝐬𝐬 𝐭𝐡𝐞 𝐄𝐏𝐏 𝐂𝐮𝐫𝐫𝐢𝐜𝐮𝐥𝐮𝐦 𝐢𝐧 𝐭𝐡𝐞 𝐏𝐡𝐢𝐥𝐢𝐩𝐩𝐢𝐧𝐞𝐬:
- Understand the goals and objectives of the Edukasyong Pantahanan at Pangkabuhayan (EPP) curriculum, recognizing its importance in fostering practical life skills and values among students. Students will also be able to identify the key components and subjects covered, such as agriculture, home economics, industrial arts, and information and communication technology.
𝐄𝐱𝐩𝐥𝐚𝐢𝐧 𝐭𝐡𝐞 𝐍𝐚𝐭𝐮𝐫𝐞 𝐚𝐧𝐝 𝐒𝐜𝐨𝐩𝐞 𝐨𝐟 𝐚𝐧 𝐄𝐧𝐭𝐫𝐞𝐩𝐫𝐞𝐧𝐞𝐮𝐫:
-Define entrepreneurship, distinguishing it from general business activities by emphasizing its focus on innovation, risk-taking, and value creation. Students will describe the characteristics and traits of successful entrepreneurs, including their roles and responsibilities, and discuss the broader economic and social impacts of entrepreneurial activities on both local and global scales.
How to Manage Reception Report in Odoo 17Celine George
A business may deal with both sales and purchases occasionally. They buy things from vendors and then sell them to their customers. Such dealings can be confusing at times. Because multiple clients may inquire about the same product at the same time, after purchasing those products, customers must be assigned to them. Odoo has a tool called Reception Report that can be used to complete this assignment. By enabling this, a reception report comes automatically after confirming a receipt, from which we can assign products to orders.
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...EduSkills OECD
Andreas Schleicher, Director of Education and Skills at the OECD presents at the launch of PISA 2022 Volume III - Creative Minds, Creative Schools on 18 June 2024.
2. ----------------------------- INDEX ------------------------------HOW BROADCAST WORKS?................................................................................................... 2
Configure new group:..............................................................................................................3
Add callees to the group:.........................................................................................................4
Step 2: TEMPLATES...................................................................................................................5
IVR Destination:.......................................................................................................................6
Template:.................................................................................................................................8
General Settings:.....................................................................................................................9
Broadcast...............................................................................................................................10
Reports.................................................................................................................................. 11
2
HOW BROADCAST WORKS?
This application can broadcast calls as well as faxes.
Process to create Vocieblast broadcast:
3. o Step 1: User has to create a group if it doesn't exist or if he/she wants to create new
group for different purpose and add name and number in the group.(See Groups for
detail)
o Step 2: Now user has to create IVR Destinations. (See IVR Destination for detail)
o Step 3: User needs to create template to broadcast call and calls will be proceed as
per the configured template once answered. (See Template for detail)
o Step 4: User has to create new broadcast and schedule it.(See Broadcast for detail)
Step 1: GROUPS
Whenever user clicks on ‘groups’ tab, the above screen will be displayed.
Configure new group:
User can create a new group by clicking the link “Click HERE to create New Group”.
4.
User has to enter the group name in this page and click “Save” button to create the new
group.
Add callees to the group:
To add callees in the group, user has to click the “Edit” button to open group edit page.
5.
After clicking the Edit button, user will find a form as shown above.
User can add callees using two different ways:
1) Add each entry manually by adding name and number (as shown
above)
2) Add multiple entries by uploading a CSV file with '|' as
separator. For example, Bob | 16314984160
Description of buttons in the above screenshot
■
■
■
■
■
■
Save: It saves information of the callees entered in the group.
Cancel: It cancels the edit event.
Clear: It clears/deletes all callee information from the group.
Import: After uploading CSV file, user has to press Import button to import the CSV file.
Reset: It resets the form.
Reset Group: It resets all callees of the group for next broadcast.
Step 2: TEMPLATES
6. Whenever user clicks on Template tab, following page will be opened.
Template tab has two options,
1. IVR Destination
2. Template
IVR Destination:
What is IVR Destination?
IVR Destination provides options for callees, prompting them to press any key.
How to create new IVR Destination?
User has to click the link “Click HERE to Create new IVR Destination” which will show a
form as below:
7. This form contains 2 fields:
1. Name: Name to identify the IVR Destination.
2. Value: Value can be any number to dial or any dialplan destination.
For example,
If Destination is a context then it should be as below:
Name: Voicemail
Value: voicemail_custom|s|1
If Destination is any number to dial then it should be like as below:
Name: Bob
Value: 1234567890
*Note: If user is going to add any context as IVR Destination than he/she needs to make sure that the context is
added in asterisk's extensions.conf file.
8.
Template:
What is a template?
Template contains the voice prompt file to play. It also contains the options and actions. So
that user can select which action to perform on which key press.
How to create a new template?
User has to click the link “Click HERE to Create New Template” link that will show the form
as below:
1. Template Name: Name to identify the template
2. Voice Message File: Message file to play as voice prompt to callees. The user needs to
upload the file in asterisk compatible wav or gsm format.
3. Answering Machine File: Message file to play as voice prompt to answering machine. The
user needs to upload the file in asterisk compatible wav or gsm format.
9. 4. IVR options: The user has to select the IVR Destination from the selection box for the
particular keys. For example, user has given voicemail IVR Destination for 0 key. Now if
caller presses 0 then voicemail IVR Destination will be executed.
5. Uploaded message files: While editing a template, the user can use already uploaded
message files as well as upload new file.
General Settings:
Reports Email to: User has to give email id where user wants to receive logs of broadcast.
Number of concurrent calls: The number of concurrent calls the system should perform.
Time between calls: Time difference between two different calls (in seconds)
Maximum number of retry: The maximum number of retries to reach the callee.
10.
Broadcast
Adding Broadcast
How to create a new Broadcast?
User has to click the link “Click HERE to create New Broadcast” which will open the
shown above.
form as
1. Template to use - It's the template to use for the broadcast. If user has selected call then &
only then user has to select template to use.
2. Groups to use - User can select multiple groups from the list whom user wants to do
3.
4.
5.
6.
broadcast.
Times to broadcast - Using this user can schedule the broadcast start & finish time. This
means, broadcast will be started in between scheduled start & finish time.
Ring timeout - Maximum ring duration in seconds
Answer timeout - Maximum Answer duration in seconds
Reset answer timeout - If you check this option , system will reset timeout when callee is
transferred to context or number given in template destination.
How to schedule timings of broadcast?
11. User needs to consider the following instructions for scheduling the broadcast:
1. Broadcast time should be considering the Time To Start and Time To Finish
2. Broadcast week day should be considering the Weekday Start and Weekday Finish
3. Broadcast month day should be considering the Month day of Start and Month day of
Finish.
4. Broadcast month should be considering the Month Start and Month Finish.
Reports
Report tab contains 5 different reports.
1. CDR Report: To get report in CDR(Call detail records) as per the search criteria.
2. Calls Compare: To get graphical comparison of calls as per given search criteria
3. Monthly Traffic: To get graphical comparison of monthly traffic
4. Daily Load: To get daily calls graph as per given search criteria
5. Real-Time: This report shows call report on real-time basis