Solved

Need the MsAgents Commands

Posted on 2001-08-26
6
189 Views
Last Modified: 2010-04-06
I have been looking evrywhere including Microsoft, I want the Documentation for the MsAgents Commands

Such as Speak, Whisper, talk fast and slow
if any one knows them or can help me with them i would like that very much




0
Comment
Question by:neopolis
  • 4
6 Comments
 
LVL 2

Expert Comment

by:RickHalle
ID: 6426749
This links to a downloadable doc:
http://www.microsoft.com/agent2/sdk/alldocs.exe
From:
http://www.microsoft.com/msagent/default.htm

The remainder are various links with additional docs:

http://msdn.microsoft.com/library/default.asp?url=/library/en-us/dnmind99/html/agent.asp

http://msdn.microsoft.com/library/default.asp?url=/library/en-us/msagent/hh/msagent/pacontrol_5bl6.asp

http://msdn.microsoft.com/library/default.asp?url=/library/en-us/msagent/hh/msagent/pacontrol_7qng.asp

http://msdn.microsoft.com/library/default.asp?url=/library/en-us/msagent/hh/msagent/intro_9ywk.asp

http://msdn.microsoft.com/library/default.asp?url=/library/en-us/dnvbdev00/html/vb00f7.asp

A lot of these are VB Samples but are usually converted to Delphi fairly easy.

The toughest I have run into is command/requestcomplete. Used to get the agent to do things on cue. Such as telling you that he will launch calculator and then actually doing it. (On Cue) Then moving over to it and explaining how to use it. I will post a working sample of some of this a little later. (Have to get Delphi installed first - Yearly Cleaning - New OS)

Rick Halle
0
 
LVL 2

Expert Comment

by:DidierD
ID: 6426948
Hi,

Goto http://www.undu.com/ and search for MS Agent. There you can find some articles and examples. In the book Delphi Com Programming are also some MS Agent Examples. You can download the source code of the book at http://www.newriders.com/books/title.cfm?isbn=1578702216. The MS Agent examples are in chapter 5.

Good luck,

Didier
0
 
LVL 2

Expert Comment

by:RickHalle
ID: 6427022
I have added a sample to my delphi sample site. If you have any specific commands let me know. Look for RequestAgent.zip at the link below:

http://home.ec.rr.com/rickhalle/

Rick Halle
0
Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

 
LVL 2

Accepted Solution

by:
RickHalle earned 20 total points
ID: 6427661
If you downloaded the requestagent.zip I posted above you may want to download it again. I made a couple changes to make it work in both D5 and D6.

Rick Halle
0
 

Author Comment

by:neopolis
ID: 6427752
Thanks Rick this should be good for me
BTW the mail is on the way... Smiles
0
 
LVL 2

Expert Comment

by:RickHalle
ID: 6427788
Glad to help.

Rick Halle
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Introduction The parallel port is a very commonly known port, it was widely used to connect a printer to the PC, if you look at the back of your computer, for those who don't have newer computers, there will be a port with 25 pins and a small print…
Have you ever had your Delphi form/application just hanging while waiting for data to load? This is the article to read if you want to learn some things about adding threads for data loading in the background. First, I'll setup a general applica…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
A company’s greatest vulnerability is their email. CEO fraud, ransomware and spear phishing attacks are the no1 threat to a company’s security. Cybercrime is responsible for the largest loss of money to companies today with losses projected to r…

919 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now