Solved

Sharing a voice line with a fax machine?

Posted on 2013-01-22
3
335 Views
Last Modified: 2013-02-05
I have a voice landline which I would like to receive incoming faxes on.  How can I avoid having that annoying tone pop up if I want to receive voice messages.
0
Comment
Question by:brothertruffle880
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 8

Expert Comment

by:R_Edwards
ID: 38806579
you can turn off auto answer, if it's a newer fax, it might have advanced options that waits for voice first before it starts data.
0
 
LVL 14

Expert Comment

by:JohnnyCanuck
ID: 38806594
Distinctive ring.  Your phone company will provide another number for the same line.  Each number on the line has its own ring pattern.  For example, your voice message line may use the normal ring and pickup as usual while the fax may have a ring pattern like 2 short, 1 long.  When the fax detects the distinctive ring it picks up the line while your voice service ignores the unusual ring.  Your fax manual will have instructions on how to setup distinctive ring for your machine.  This service from the phone company will not be free, but will be less than a normal line.
0
 
LVL 62

Accepted Solution

by:
☠ MASQ ☠ earned 500 total points
ID: 38807560
0

Featured Post

Save the day with this special offer from ATEN!

Save 30% on the CV211 using promo code EXPERTS30 now through April 30th. The ATEN CV211 connects a laptop directly to any server allowing you instant access to perform data maintenance and local operations, for quick troubleshooting, updating, service and repair.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Monitor input from a computer is usually nothing special.  In this instance it prevented anyone from using the computer.  This was a preconfiguration that didn't work.
A clone is a duplicate copy. Sheep have been cloned and maybe someday even people will be cloned, but disk cloning (performed by the hard drive cloning software) is a vital tool used to manage and protect data. Let’s look at what hard drive cloning …
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…

691 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question