Solved

How to send a Wave Sound Through A modem?

Posted on 1998-10-03
7
274 Views
Last Modified: 2013-12-27
I'm developing a telephony system using Visual Basic 4.0, where the modem will pick up an incoming call and plays a greeting message.. So my problem is I don't know how to send this Wave files to the Modem, I have issued AT#CLS=8 and AT#BDR=16 to the modem but I don't know how to convert the Wave file into a proper format to send it to the Modem so that the caller can hear the Wave file greetings... I hope someone could help me on this... Thank you...

Joe
E-mail : bocs@tm.net.my
0
Comment
Question by:bocs
7 Comments
 
LVL 7

Expert Comment

by:MATTCEI
ID: 1145050
Do you realley want to re-invent this wheel? This function is implemented in 'Voice' modems,which also come with the necessary software to turn the modem into an answering machine.This software (Cheyenne's Bitware,for one) allows you to play a stock wave file when the modem answers or one of your choice.
0
 

Author Comment

by:bocs
ID: 1145051
I know that there are such software around in market, but I'm trying to develope my own so that I could actually attach this software of mine with another telephony software that I had already developed for handling certain things that I might require. Thanks Anyway...
0
 
LVL 10

Expert Comment

by:MasseyM
ID: 1145052
Just a side note, Microsoft has speech engines (free) that can handle text-to-speech.  http://www.microsoft.com/iit/ They have examples there about how to send the stuff through the modem...
0
Netscaler Common Configuration How To guides

If you use NetScaler you will want to see these guides. The NetScaler How To Guides show administrators how to get NetScaler up and configured by providing instructions for common scenarios and some not so common ones.

 

Author Comment

by:bocs
ID: 1145053
Thank you MasseyM, you have been a great help, I'll check the web-site, thanks again.

Regards,
Joe.
0
 
LVL 10

Expert Comment

by:MasseyM
ID: 1145054
Would you like it posted as an answer?
0
 

Expert Comment

by:4info
ID: 1145055
I see that  MasseyM has already posted as a comment about the ms site I was going to refere you to, I think from the examples you see there, you will be able to come up with a way to accomplish what you want, the examples are pretty clear, I haven't been back there for a short time, and they have been makeing big changes, so if they moved it just email them for the new or archive url.....
0
 
LVL 10

Accepted Solution

by:
MasseyM earned 10 total points
ID: 1145056
See comments from me below.
0

Featured Post

Windows Server 2016: All you need to know

Learn about Hyper-V features that increase functionality and usability of Microsoft Windows Server 2016. Also, throughout this eBook, you’ll find some basic PowerShell examples that will help you leverage the scripts in your environments!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Suddenly lost internet connection on network 44 118
Adding switches as opposed to running cables 4 165
2960 and a VLAN id of 1237 2 61
using BGP Attributes 2 89
In this tutorial I will show you with short command examples how to obtain a packet footprint of all traffic flowing thru your Juniper device running ScreenOS. I do not know the exact firmware requirement, but I think the fprofile command is availab…
This article is a how to to configure a UCS Ethernet-uplink portchannel via the console. It is easy to do and can be done quite quickly. In certain versions of the UCS manager the portchannel has issues coming up and this is a workaround. I am…
This Micro Tutorial hows how you can integrate  Mac OSX to a Windows Active Directory Domain. Apple has made it easy to allow users to bind their macs to a windows domain with relative ease. The following video show how to bind OSX Mavericks to …
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

809 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question