Home

Thor VM1 Reference Guide (Windows CE 6.0 OS)

image

Contents

1. SaaS Settings Disable Saas O Scan Configure SaaS Manually Configure Saa Customer m Use to configure the Enabler to connect with Avalanche on Demand This is a Software as a Service version of Avalanche Using either of the SaaS configuration options below assumes the user has registered with Wavelink Disable SaaS No SaaS connection is used Scan Configure Scan bar codes printed from within the Avalanche Console to configure the Enabler for the SaaS con SaaS nection Manually Con Manually enter the SaaS connection information Enter the server address on the Connection tab and the figure SaaS customer ID in the Company textbox 5 20 Adapters Note Review the network settings configuration utilities and the default values before setting All Adapters to Enable in the Adapters applet Avalanche Update Settings Scan Config Shortcuts Saas Adapters Status All Adapters Manage Network Manage Wireless Current Adapter Summit 304G Series WLAN Adapter y Primary 0 Use Avalanche Network Profile 3 adapter Icon on V taskbar O Use Manual Settings Ir When enabled the Enabler will control the network settings This parameter cannot be configured from the Ava lanche Mobility Center Console and is enabled by default When enabled the Enabler will control the wireless settings This parameter cannot be configured from the Ava lanche M
2. JA nn a Bn ee eh eee 3 20 Accessing the BIOS Setup 0 2 cece cc ccccc cece cece ccc eeceeceeeeeeeceeteeteeeeeeeteetetententeeeneeteeteeeeeeeeeeees 3 20 BOGE hoc sees pals rt E TAR i es Be She Lok tate ht fo as 3 20 Exiting BIOS Setup ooo c cece cece cece cece cece cece cece eceececeeeeeeeeeeeeeeeeeees 3 20 Control Panel o sete ae a lao odio o Le ari 3 21 PADOUL nn E E eat yet aneee E E E ets ceceuunsseceeenbenseeecectee 3 23 Version Tab and the Registry 00 0 c cece cece cece cece cece cee cece e cece cece cece aaraa anainn 3 23 Languages eneee oe ass hee pase gi ets Scans es he estos se eres os ee cin de eee ee seee ee doe eet aces 3 23 Identifying Software Versions 00 00 0 2 eee eee eee cece cece cece ee aaaea aoar earann anana 3 24 MAC A ONES S so sree roo ee ae te ees ee acosa 3 24 Accessibility occ aa aa 0a aaoo EDEA DAADE EDAD D ALALE ELEA Ea aana r anann 3 25 Administration for AppLock 00 0202 2 2c cece cece cece coc 3 26 Factory Default Settings AppLock 22 2 2 e cece cece cece ccc aa eanan anaana 3 27 Setup a New DEVICE 2 fo co sce need dedecct ch cet cgeececussannecee ose ceagteeveiagbes oeoeseeecaueeeesedaedescddsdeateses 3 28 Administration Mode 2 2 2 2 2 2222 c cece cece cece cece cece cece cece cece cece cece ce cece ee eee eeeeeeeeeeeteteeeteeeeeeeees 3 28 End User Mode 2 22 222 ecco eee ee ee ee ee nano 3 29 PAS SW ONS ish es a ER aye ee eee ee ae et ae eR Ste at
3. 6 3 Main Tab Start gt Programs gt Summit gt Main tab Factory Default Settings Summit Client Utility Main Profile Status Diags Global A Active Profile Default y SUMMIT Status Associated DATA COMMUNICATIONS Radio Type ABG Auto Profile On off List Admin Login Reg Domain WorldWide Driver 3 03 09 Disable Radio SCU 43 03 09 About SCU The Main tab displays information about the wireless client device including e SCU Summit Client Utility version e Driver version e Radio Type ABG is an 802 11 a b g radio e Regulatory Domain e Copyright Information can be accessed by tapping the About SCU button e Active Config profile Active Profile name e Status of the client Down Associated Authenticated etc The Active Profile can be switched without logging in to Admin mode Selecting a different profile from the drop down list does not require logging in to Administrator mode The profile must already exist Profiles can be created or edited after the Admin login password has been entered and accepted When the profile named ThirdPartyConfig is chosen as the active profile the Summit Client Utility passes control to Windows Zero Config for configuration of all client and security settings for the network module The Disable Radio button can be used to disable the network card Once disabled the button label changes to Enable Radio By default the radio is ena
4. The Main Tab provides information admin login and active profile selection Profile specific parameters are found on the Profile Tab The parameters on this tab can be set to unique values for each profile The Status Tab contains information on the current connection The Diags Tab provides utilities to troubleshoot the radio Global parameters are found on the Global Tab The values for these parameters apply to all profiles Help Help is available by clicking the icon in the title bar on most SCU screens The SCU help may also be accessed by selecting Start gt Help and tapping the Summit Client Utility link The SCU does not have to be accessed to view the help information using this option Summit Tray Icon ii The Summit tray icon provides access to the SCU and is a visual indicator of radio status The Summit tray icon is displayed when e The Summit radio is installed and active e The Windows Zero Config utility is not active e The Tray Icon setting is On Click the icon to launch the SCU Use the tray icon to view the radio status l The radio is not currently associated or authenticated to an Access Point The signal strength for the currently associated authenticated Access Point is less than 90 dBm The signal strength for the currently associated authenticated Access Point is 51 dBm to 70 dBm The signal strength for the currently associated authenticated Access Point is greater than 50 dBm EW The signal
5. The tethered external scanner is powered by the external device power source Wireless external scanners use their own power source 3 78 COM2 Tab Start gt Settings gt Control Panel gt Data Collection gt COM2 Main com1 COM2 Data Options Processing About Baud Rate Data Bits O 115200 Os O 57600 7 38400 19200 Stop Bits 2600 4800 O 2400 1200 O Oz Power on pin 9 5w This panel sets communication parameters for any device connected to the external port Adjust the settings and click the OK button to save the changes Any changes take effect immediately This panel does not configure the connected device Please refer to the documentation for the external connected or wireless device for information on configuring the device Note COM default values are restored after a cold boot or operating system upgrade COM2 supports 5V switchable power on Pin 9 for tethered scanners Power on Pin 9 To configure the COM port to supply power to an external scanner tethered to the COM2 port check the checkbox for Power on Pin 9 5V The default is On enabled The tethered external scanner is powered by the external device power source Wireless external scanners use their own power source 3 79 Data Options Tab Start gt Settings gt Control Panel gt Data Collection gt Data Options tab Bar code manipulation parameter settings on this tab are a
6. e c2 Code C1 e c3 Code C0 24 character bar code is Code 128 e c4 Code C1 ID Code Clear All Custom symbology setup is assigned in the following manner e c1 min length 34 max length 34 strip leading 2 strip trailing 18 Code ID enabled Bar Code Data 01 e c2 min length 26 max length 26 strip leading 2 strip trailing 10 Code ID enabled Bar Code Data 01 e c3 min length 24 max length 24 strip leading 2 strip trailing 8 Code ID enabled Bar Code Data 01 e c4 min length 20 max length 20 strip leading 0 strip trailing 4 Code ID enabled Bar Code Data 00 Add the custom symbologies Refer to the previous section Symbology Settings for instruction 3 97 Symbology OK x Code ID custom y Symbology 1 y Enable Min fas Max fas Strip V Leading k Code ID Suffix Click the Bar Code Data button Click the Add button Add the data for the match codes Refer to the previous section Bar Code Data Match List for instruction Scan a bar code and examine the result 3 98 Hat Encoding Desired Hat Hat 0X01 pre o DCI XON oxu Q EM xs oy ESC oB gt AN o J Fu P PoulS lin gt g 12 un a a A bil Pe Do O P P P f C ll Y mo i pa HH S GA tla eo Oy mi mimm ea mim 3 100 Date Time Start gt Setting
7. Passwords A password must be configured If the password is not configured a new device switches into Administration mode without prompting for a password In addition to the hotkey press a mode switch occurs if inaccurate information has been configured or if mandatory information is missing in the configuration There are several situations that display a password prompt after a password has been configured If the configured hotkey is pressed the password prompt is displayed In this case the user has 30 seconds to enter a password If a valid password is not entered within 30 seconds the password prompt is dismissed and the device returns to end user mode All other situations that present the password prompt do not dismiss the prompt this is because the other situations result in invalid end user operation These conditions include e f inaccurate configuration information is entered by the administrator i e an application is specified that does not exist e Ifthe application name which is mandatory for end user mode is missing in the configuration e Invalid installation of AppLock e g missing DLLs e Corrupted registry settings To summarize if an error occurs that prevents AppLock from switching to user mode the password will not timeout and AppLock will wait until the correct password is entered Forgotten password See AppLock help 3 29 End User Switching Technique Note The touch screen must be enabl
8. Set the parameters for a Summit client 3 22 About Start gt Settings gt Control Panel gt About The data cannot be edited by the Thor VM1 user on these panels GUID Serial Number Windows CE Version OAL Version Compile Version and Lan Software Sooke f guage Language indicates localized version Hardware CPU Type Codec Type Display and DRAM memory Versions Revision level of software modules and NET Compact Framework Version Current network connection IP and MAC address Only the first 2 adapters are shown EMO usually radio and ActiveSync Bluetooth MAC address is shown Version window information is retrieved from the registry Version Tab and the Registry Modify the Registry using the Registry Editor Use caution when editing the Registry and make a backup copy of the registry before changes are made The registry settings for the Version tab are under HKEY_LOCAL_MACHINE Software 1 LXE Version in the registry To add a user application to the Version panel create a new string value under the HKLM Software LXE Version key The string name should be the Application name to appear in the Version window The data for the value should be the version number to appear in the Version window Version strings can be equal to or less than 254 characters Because the strings are displayed in a text box any number can be accommodated up to the 64K byte text box limitation Languages The Softwar
9. Tap the X button or ok button to close the dialog box Possible reasons for failure to reconnect Timeout expired without reconnecting attempted to pair with a device that is currently paired with another device attempted to pair with a known device that moved out of range or was turned off attempted to pair with a known device but the reason why reconnect failed is unknown This option is Disabled unchecked by default When enabled checked all previous paired information is deleted upon any reboot sequence and no devices are reconnected When enabled checked Auto Reconnect on Boot is automatically disabled dimmed This option is Enabled checked by default All previously paired devices are reconnected upon any reboot sequence When disabled unchecked no devices are reconnected upon any reboot sequence 3 62 This option is Enabled checked by default This option controls the overall mobile Bluetooth device reconnect behavior e When Auto Reconnect is disabled unchecked Auto Reconnect on Boot is automatically disabled and dimmed When Auto Reconnect is disabled unchecked no devices are reconnected in any situation The status of Auto Reconnect on Boot is ignored and no devices are reconnected on boot The status of Clear Pairing Table on Boot controls whether the airing table is populated on boot Auto Reconnect P a Pap When Auto Reconnect is enabled checked and Auto Reconnect on Boot is disabled un
10. Taskbar Execution Scan Config Shortcuts Saas _4 gt Update Window Display At startup Har Screen y On connect as is y Normal Jas is y Update Window Display The user interface for the Enabler can be configured to dynamically change based on the status of the Thor VM1 connection with the Mobile Device Server At startup Default is Half Screen Options are Half screen Hidden or Full screen On connect Default is As Is Options are As is Half screen or Full screen Normal Default is As Is Options are Half screen Hidden or As Is 5 15 Taskbar For best results use AppLock to manage the taskbar AppLock is resident on each mobile device Avalanche Update Settings OK E Taskbar Execution Scan Config Shortcuts SaaS Adapter Note These settings are only applied to the taskbar if the Enabler UI is active Display State Normal Locked Hidden Settings No Relevant Settings The Display State options control the appearance of the taskbar while using the Enabler interface e Normal taskbar is visible taskbar icons function normally e Hidden taskbar is not displayed e Locked taskbar is visible but most icons are hidden or for information only 5 16 Execution Note the dimmed options on this Thor VM1 panel This menu option is designed to manage downloaded applications for automatic execution upon startup Avalanche Update Settings OK E Exec
11. The text boxes accept string values only Note that executables and parameters are not checked for accuracy by the keyboard driver If the launch fails the Thor VM1 emits a single beep if the launch is successful the mobile device is silent Keypad Control E OK ES _KeyMap Launch pp RunCmd Cmdi The Run Cmd command is defined for use by system administrators These instructions call the ShellExecuteEx API which opens documents directly 1 Place the cursor in the text box next to the Cmd you wish to run e g Cmd1 Cmd2 2 Enable the file radio button and enter the name of the file 3 Enable the PARM radio button to add parameters for file exe execution in the same text box Tap the OK button when finished The changes take effect immediately 3 123 License Viewer Start gt Settings gt Control Panel gt License Viewer Use this option to view software license registration details and service contract length for a Thor VM1 Information on the License Viewer tabs is unique for each Thor VM1 Note Following image is a sample screen Your License Viewer control panel may show more tabs e g RFTerm depending on the number of software applications running on the Thor VM1 that require a license Contact Technical Assistance for software updates and releases as they become available WeaveLink Factory Enable Indicator Valid License TE WIB License Viewer ka OK Fa Date of Manufactur
12. Web form www hsmcontactsupport com You can contact our technical support team directly by filling out our online support form Enter your contact details and the description of the question problem Telephone www honeywellaidc com locations For our latest contact information please check our website at the link above Product Service and Repair Honeywell International Inc provides service for all of its products through service centers throughout the world To obtain warranty or non warranty service please visit www honeywellaidc com and select Support gt Contact Service and Repair to see your region s instructions on how to obtain a Return Material Authorization number RMA You should do this prior to returning the product Limited Warranty Honeywell International Inc HII warrants its products to be free from defects in materials and workmanship and to conform to HII s published specifications applicable to the products purchased at the time of shipment This warranty does not cover any HII product which is i improperly installed or used ii damaged by accident or negligence including failure to follow the proper maintenance service and cleaning schedule or iii damaged as a result of A modification or alteration by the purchaser or other party B excessive voltage or current supplied to or drawn from the interface connections C static electricity or electro static discharge D operation under conditions
13. to restart the application This message logs that the timer has expired and the PROCESSING processing is at the beginning of the timer function Enter Entering the function that switches the screen to non full screen mode and enable LOG_ TaskbarScreenMode the taskbar PROCESSING Enter ToAdmin Entering the function that handles a mode switch into admin mode Pe g i PROCESSING Enter ToUser Entering the function that handles the mode switch to user mode Lone 28 pine PROCESSING Enter verify password Entering the password verification processin es YP eee Monee Ing PROCESSING Exit AppLockEnumWindows Found Enter restart app timer There are two exit paths from the enumeration function This message denotes the LOG_ enumeration function found the application PROCESSING Exit AppLockEnumWindows Not found oa i p LOG_ Exit DecryptPwd Exiting password decryption processing PROCESSING Exit EncryptPwd Exiting password encryption processin LoG YP gp i R 9 PROCESSING Exit FullScreenMode Exiting the function that switches the screen to full screen oe g y PROCESSING Exit GetAop Info Processing is at the end of the function that retrieved the application information LOG_ PP from the registry PROCESSING Exit password dialo Exiting password prompt processin LOG bi did eal a id PROCESSING Exit password dialog re LOG_ Exiting password prompt w cancel PROCESSING Exit password dialog OK Exiting password prompt successfull poe P 9
14. External Connectors Optional external 802 11 GPS WWAN antenna connectors Additional connectors on Quick Mount Smart Dock see below Minimum loudness greater than 95dBm at 10 cm in front of unit Uninterruptible Power Supply Internal UPS battery field replaceable Backup Battery RCT Internal lithium Battery maintains Real Time Clock Display Technology 7 1 Quick Mount Smart Dock Two external RS 232 serial ports COM1 and COM2 with switchable power CANbus Audio connector supports either audio microphone via adapter cable or J 1939 Female and J1939 Male connectors via CANbus cable USB Client Port and USB Host Port via adapter cable 5 pin connector 10 60V DC input power External Connectors Power Switch Sealed power switch External Power Supply External power supply AC Adapter 120 240VAC to 12VDC DC Input Voltage 10 60 VDC Input Power Input Current 4 6 Amps Input Fuse 10A Time Delay Dimensions Thor VM1 1 7 4 3 cm to 2 6 6 6 cm at latch meg ELIT Quick Mount Smart Dock Note The RAM ball is not included in the following measurements CO ARTE COIN CES 5 Weight 3 2 Ib 1 2 kg 7 2 Environmental Specifications Thor VM1 and Quick Mount Smart Dock Standard 4 F to 122 F 20 C to 50 C non condensing Extended temperature 22 to 122 F 30 C to 50 C condensing Operating Temperature Storage Temperature Standard and Extended temperature 22 F to
15. If Strip Code ID is enabled the data should not include the Code ID since it has already been stripped 3 87 Add Prefix Suffix Control Start gt Settings gt Control Panel gt Data Collection gt Symbology button Use this option to specify a string of text hex values or hat encoded values to be added to the beginning prefix or the end suffix of the bar code data Add Prefix Suffix Up to 19 characters can be included in the string The string can include any character from the keyboard plus characters specified by hex equivalent or entering in hat encoding Please see Hat Encoding for a list of characters with their hex and hat encoded values Use the Escape function to enter literal hex and hat values To enable a prefix check the Prefix checkbox and enter the desired string in the textbox The default is disabled unchecked with a blank text string When bar code data is processed the Add Prefi Prefix string is sent to the output buffer before any other data refix Because all stripping operations have already occurred stripping settings do not affect the prefix The prefix is added to the output buffer for the Symbology selected from the pull down list If All is selected the prefix is added for any symbology that has not been specifically configured To enable a suffix check the Suffix checkbox and enter the desired string in the textbox The default is disabled unchecked with a
16. If a user password has been set the applet warns the user that the password will be erased and asks them to enter it before the reboot is allowed Load Fac tory Defaults When clicked the OS performs a registry save Active registry saved to Flash registry hive and then a warm boot The contents of RAM are preserved CAB files already loaded into RAM remain loaded When clicked the OS performs a registry save and then a restart OS and CAB files are reloaded Warmboot 3 145 Remove Programs Start gt Settings gt Control Panel gt Remove Programs Note Lists programs installed in RAM that have been marked for removal Select a program and tap Remove Follow the prompts on the screen to uninstall Thor VM1 user installed only programs The change takes effect immediately Files stored in the My Documents folder are not removed using this option Remove Programs ka OK Ed Remove Programs ey The listed software can be Programs Y automatically removed To EMS Technologies LXE remove a program select it e Bluetooth LXEZPAIRING v1 0 lc ue list and then LXE Data Collection Wedge select Remove LXE RFTerm LXE WWAN LXEGobICMCab SDC Summit WLAN Adapter Note Do not remove factory installed programs using this option Contact Technical Assistance if factory installed programs must be deleted 3 146 Screen Control Start gt Settings gt Control Panel gt Screen Control S
17. Remove the USB drive and boot the Thor VM1 again Exiting BIOS Setup To exit the BIOS setup select the Exit tab and select one of these options e Save Setting and Restart e Exit Setup without Saving Changes e Reload Factory Defaults and Restart 3 20 Control Panel Start gt Settings gt Control Panel or My Device gt Control Panel link Tap the button for Help when changing Thor VM1 Control Panel options Software hardware versions and network IP No user intervention allowed Aci Customize the way the keyboard audio display or mouse function for users with hear y ing or viewing difficulties Manage digital certificates used for secure communication Wedge utility for data collected from bar code scans Set data collection device data Data Collection Wedge stripping and prefix suffix options Assign baud rate parity stop bits and data bits for COM1 and COM2 ports Assign collected data manipulation parameters Date Time Set Date Time Time Zone and Daylight Savings Dialin Connection setup for modem attached to COM port or CompactFlash slot Com 9 pactFlash slot not available for modem use on Thor VM1 Displa Set background graphic and scheme Set touch screen and keypad backlight prop pay erties and timers Gobi Connection Manager Set parameters for the Wireless Wide Area Network client if installed Input Panel Select the current key data input method Select custom key maps Set General
18. The watch process could not be rae LOG_ERROR HotKeyMon initiated Ctrl after L or X Processing the backdoor entry LOG_EX Ctrl pressed The Ctrl key has been pressed and trapped by the HotKey processing LOG_EX Processing the hotkey and backdoor entry LOG_EX Decrypt acquire context Unable to decrypt password LOG_ERROR failure Ai acquired context Decryption process ok LOG_EX A Seale nash Unable to decrypt password LOG_ERROR 3 45 Message Explanation and or corrective action Level Encrypt acquire contex Unable to encrypt password LOG_ERROR failure Encrypt e encrypt Unable to encrypt password LOG_ERROR context failure Encrypt acquired encrypt context OK Encrypt password process successful LOG_EX a creare hash Unable to encrypt password LOG_ERROR Encrypt create key failure Unable to encrypt password LOG_ERROR Encrypt created encrypt hash OK Encrypt password process successful LOG_EX Encrypt export key failure Unable to encrypt password LOG_ERROR a key length Unable to encrypt password LOG_ERROR Encrypt exported key OK Encrypt password process successful LOG_EX Encrypt failure The password encryption failed LOG_ERROR Encrypt gen key failure Unable to encrypt password LOG_ERROR Encrypt generate key Unable to encrypt password LOG_ERROR failure ae y get user key Unable to encrypt password LOG_ERROR Encrypt get user key ok Encrypt password process successful LOG_EX Encrypt hash data failure Unable
19. for example for AUTOEXEC BAT use a FileCheck of dummy which will never be found forcing the item to execute For persist keys specifying EXE or BAT files the executing process is started and then Launch will continue leaving the loading process to run independently For other persist keys including CAB files Launch will wait for the loading process to complete before continuing This is important for example to ensure that a CAB file is installed before the EXE files from the CAB file are run Note that the auto launch process can also launch batch files BAT executable files EXE registry setting files REG or sound files WAV The mechanism is the same as listed above but the appropriate CE application is called depending on file type Registry entries may vary depending on software revision level and options ordered with the Thor VM1 LAUNCH EXE and Persistent Storage If any of the following directories are created in the System folder Launch automatically copies all of the files in these directories AppMgr Desktop Favorites Fonts Help 3 7 e Programs e Recent Note Files in the Startup folder are executed but only from System gt Startup They are not copied to another folder REGEDIT EXE Registry Editor Use caution when editing the Registry Make a backup copy of the registry before changes are made REGLOAD EXE Double tapping a registry settings file e g REG caus
20. gt Programs gt Summit gt Diags tab Summit Client Utility El OK ES main Profile Status Diags Global Profile Default RESET 74 IP Address 100 100 100 100 Start Ping 100 100 100 200 Release Renew Diagnostics Diagnostics Output Save To The Diags screen can be used for troubleshooting network traffic and radio connectivity issues Re connect Use this button to apply or reapply the current profile and attempt to associate or authenticate to the wireless LAN All activity is logged in the Diagnostic Output box on the lower part of the screen Release Renew Obtain a new IP address through release and renew All activity is logged in the Diagnostic Output box If a fixed IP address has been assigned to the radio this is also noted in the Diagnostic Output box Note that the current IP address is displayed above this button Start Ping Start a continuous ping to the IP address specified in the text box to the right of this button Once the button is clicked the ping begins and the button label changes to Stop Ping Clicking the button ends the ping The ping also ends when any other button on this screen is clicked or the user browses away from the Diags tab The results of the ping are displayed in the Diagnostic Output box Diagnostics Also attempts to re connect to the wireless LAN However this option provides more data in the Diagnostic Output box
21. on startup use the auxiliary antenna If the packet size in bytes exceeds the specified number of bytes set in the fragment threshold the packet is fragmented sent as several pieces instead Frag Thresh 2346 of as one block Use a low setting in areas where communication is poor or where there is a great deal of wireless interference This parameter cannot be changed If the packet size exceeds the specified number of bytes set in the Request to Send RTS threshold an RTS is sent before sending the packet A low RTS Thresh 2347 RTS threshold setting can be useful in areas where many client devices are associating with the Access Point This parameter cannot be changed The LED on the wireless card is not visible to the user when the wireless card is installed in a sealed mobile device El id Options are On Off This parameter cannot be changed n Determines if the Summit icon is displayed in the System tray Tray Icon Options are On Off When On the Summit Config Utility masks passwords characters on the f screen are displayed as an as they are typed and when they are viewed Hide Password O When Off password characters are not masked Options are On Off A string of up to 64 alphanumeric characters that must be entered when the SUMMIT Admin Login button is tapped If Hide Password is On the password is Admin Password masked when typed in the Admin Password Entry dialog box The password or Blank is case sensiti
22. remain in user mode attempts to enter a password was exceeded Read registry error hot The hotkey registry entry is missing or empty This is not considered an error The LOG ERROR key keyboard hook uses an embedded default if the value is not setin the registry Read registry failure app AppName registry value does not exist or is empty This constitutes a failure for pa aed LOG_ERROR name switching into user mode Read registry failure AppCommandLine registry entry is missing or empty This is not considered an error a aaa ade ad LOG_ERROR Cmd Line since command line information is not necessary to launch and lock the application Read registry failure The Internet registry entry is missing or empty This is not considered an error since ate LOG_ERROR Internet the Internet value is not necessary to launch and lock the application Registering Backdoor The AppLock system communicates with the keyboard hook via a user defined LOG MSG message Both AppLock exe and Kbdhook dll register the message at initialization PROCESSING Registering Hotkey MSG The AppLock system communicates with the keyboard hook via a user defined LOG_ 9 9 y message Both Applock exe and Kbdhook dll register the message at initialization PROCESSING The registry has to be read when entering user mode is the AppName is missing Registry read failure at This user mode entry is attempted at boot and after a hotkey switch when the ae La LOG_ERROR reenter
23. secen aad e a a era a a ea 2 10 Auto On Disabled cc 2000 ita pr a ee aa ere EEE ee Le ee ek 2 10 External Connectors 22 22 c cece cece cece cece cece cece eee e eee e eee eee eee eeteeeeeeetetetteeeenes 2 11 Serial Connector COM1 and COM 2 oo e cece ccc cece rr 2 12 PIQUE oso tae dan eae tees eae o 2 12 Screen Blanking 22 2 cn cnn nn 2 13 Sena Cable rate Me Oe ene Ee CTE cre esos site sc OEE 2 13 Screen Blanking Box 2 0 2 2 eee ec cece cece cece cece cece cecccccccceececeeeeeeeeeceeeeeteteeeettteeettntentneeneneeers 2 14 Screen Blanking with Switch 20000002222 ccc cece cece cece cece cece cece cece eee cnn 2 14 USB CONMCCIOR sc ssa fats de ete ae 2 oe Licks See alte Sale amin fe eh recinto 2 15 USB Dongle Cable ic 2 16 D9 Male Connector nc cnn cccccccccoss 2 16 USB Host Connector ccticueetarastrit terror psico ete vada 2 17 USB Client Connector 2 22 c cece cece cece cece cece cece cee eceeeceeeeeeeeeseteeeeeeenees 2 17 Power Supply Connector 0 0 2 2 cece cece cece cece cece cece cece cece cece cece cece cece ee Eaa aoaaa anan 2 18 CANbus Audio Connector 00 cece eee cece ns 2 19 Headset Adapter Cable cee cece cece cet e eee e cece eeeeee cece aLaaa a ornano an 2 20 D15 Female Connector oc e cece cece cece cece cece cece cece cece ee EE E Ea eaer 2 20 Quick Connect Headset Connector 2 2 0 ooo eee 2 21 CANDUS Cable ecitocoioiooecoindi cicatrices cta deadedanss 2 22 D15 Female Connector
24. 1 Quick Mount Smart DOCK occcccccccccc occ cece cece eee e cece cece cece cece cece eeeeeeeeetetteeteeeeees 7 2 DIMENSIONS a ace dna te te te eh ees eek eee feces deena ase dada ode anata tans ogg es 7 2 TOON tee es ose pana etn A hemos ate oa gent den paeinn A 7 2 Quick Mount Smart Dock 2 222222 oo cc ccc ce cece ccc cece cece cece eect ALEALEA ADAE aa ar aaraa naaa 7 2 Environmental Specifications 2 222 000 2222 c ccc e cece cece ee nn 7 3 Thor VM1 and Quick Mount Smart Dock 22 000 e cece cece ee eeeceeeececeeeeeees 7 3 Network Card Specifications _ 222 0000 ooo eee cece ccc eee cece ccc cece eee c cece ccceccececcecccccecececcecccceecrerececcecees 7 4 SUMMIT SO2Z A TADO 0000 ses a See eke ta coed Inia iaa 74 RA 7 4 Chapter 8 Key Maps 8 1 64 Key QWERTY Keypad Key Map 2 0 2 2 c cece cece cece eee c cece cee cece cece aa aoa aaraa onanan 8 1 12 Key Keypad Key Map 0 22 cee cece ccc cece cece cece cece cece cece eee ce cece APAAL A Ea aaraa aaan 8 6 IBM Terminal Emulation 0 0 02 c cece cece cece ccc e cece cece cccceccececeeeeeeeceeeeeeeeteeeeteeeeteeeententeteneeneneeeeeees 8 8 EA A E SN ee oe eR OC ee 8 8 BIS 250 soccer tt eee lo dt ce feel ere ot en ah eet a e io t 8 9 Chapter 9 Technical Assistance 9 1 xii Chapter 1 Introduction The Thor VM1 Vehicle Mount Computer VMC is a rugged vehicle mounted computer running a Microsoft Windows CE 6 operating system and capable of wireless da
25. 2nd plus F7 or 2nd plus F8 keypress sequences Any changes to brightness level using the keypresses are reflected in this section e If Automatic Brightness Control is enabled outdoor display only the value for LCD brightness depends on the current Ambient Light value and the values for the Automatic Brightness Control thresholds Automatic Brightness Control When the Thor VM1 is equipped with the outdoor display automatic brightness control can be enabled When enabled display brightness is based on ambient light detected by the ambient light sensor located near the top right of the display The default is disabled To enable check the Enable automatic brightness control checkbox and specify the thresholds for display backlight transition When enabled the thresholds can be entered for display brightness transitions e When alow level of ambient light is detected the display backlight is set to low level e When the ambient light exceeds the threshold specified in Low to medium light level the display backlight is automatically increased to a medium level e When the ambient light exceeds the threshold specified in Medium to high light level the display backlight is automatically increased to a high level e Likewise if the Thor VM1 is returned to a lower ambient light area the display backlight automatically transitions to the appropriate lower display backlight level By default the keypad backlight follows the display
26. 3 29 End User Switching Technique 00 0 0 coe c cece eee e cece cece cc ccccccceeeeeeeeeeeeeeceeteeeeeeetenteeenenneeteeeeees 3 30 Using a Stylus Tap oido cistitis id dace abodes 3 30 Using the Switch Key Sequence 2 200 000 222 o occ nn 3 30 Hotkey Activation hotkey 0 000 c cece cece cece cece cece cece cece cece cece cece eeeeeeeeeeeeeneees 3 31 Application Configuration nn non ncccccccccniss 3 32 Application Panel ns 3 33 Launch BUMOM 2 22 24 220i ite etidekt hi gev ee ile bite oia dei RR ES EEEn r EENES Enies 3 35 AUTO AT BOOUs 222 esata tee ee ek ee eet allen sete oe eee he he eee he 3 36 A A 3 37 Mantal Lalnch secre o iio aos ales ie 3 38 O O ee 3 38 End User Internet Explorer EVIE ooocccccccccccccccccccccccccccccccccnn non 3 39 SECUNILY A RN 3 40 Options Panels esc cra ro oso tia 3 41 Stats Ramen ta ias 3 42 MAA hte eke doe eget I ee tt bane Seatac dst toemetees E Sanne aad 3 42 Ero MIAE EEEE aa A OT OY GEER VEER EOE BATE SEER OE EEE NOE 3 43 EVES I EAEE east cet buted O A ahi ics 3 43 APpLock IF Gl Ds tot td Rt ee ee ee Reet ee eee 3 44 AppLock Error Messages 0 2000 00 occ ccc cece eee eee eee cece eee e eee e ee AAAA Iaa aooe raaraa rnaen 3 44 A A Eee ee eee eee eee eee ee 3 52 Bluetooth 2 00 2 eee cece cece cece ccc ccc cece eee e cece cece eee eee e este eens te eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeees 3 53 Bluetooth DEVICES osscar cessen eaea cages ob Boke yee ed ee away
27. Aggressive Scan If signal strength is less than this trigger value the client looks for a different Access Point with a stronger signal Options are 50 dBm 55 60 65 70 75 80 85 90 dBm or Custom The amount by which a different Access Point signal strength must exceed the current Access Point signal strength before roaming to the different Access Point is attempted Options are 5 dBm 10 15 20 25 30 35 dBm or Custom The amount of time after association or a roam scan with no roam that the radio collects Received Signal Strength Indication RSSI scan data before a roaming decision is made Options are 5 sec 10 15 20 25 30 35 40 45 50 55 60 seconds or Custom Defines the 2 4GHz channels to be scanned for an AP when the radio is contemplating roaming By specifying the channels to search roaming time may be reduced over scanning all channels Options are Full all channels 1 6 11 the most commonly used channels 1 7 13 for ETSI and TELEC radios only Custom Support for 5GHZ 802 11a channels where support for DFS is required Options are On Off Note Not supported always off in some releases ABG radio only The amount of time the radio will passively scan each DFS channel to see if it will receive a beacon Recommended value is 1 5 times that of the AP s beacon period Use this parameter when the Radio Mode profile parameter is set to Ad Hoc Specifies the channel to be us
28. Bluetooth address identifier label should remain protected from damage rips tears spills soiling erasure etc at all times It may be required when pairing connecting and disconnecting new Bluetooth bar code readers Thor VM1 with Label If the Thor VM1 has a Bluetooth address bar code label attached follow these steps 1 Scan the Bluetooth address bar code label attached to the Thor VM1 with the Bluetooth mobile scanner 2 If this is the first time the Bluetooth scanner has scanned the Thor VM1 Bluetooth label the devices are paired See section titled Bluetooth Beep and LED Indications If the devices do not pair successfully go to the next step Open the LXEZ Pair panel Start gt Settings gt Control Panel gt Bluetooth Tap Discover Locate the Bluetooth scanner in the Discovery panel Double tap the stylus on the Bluetooth scanner The right mouse click menu appears oa kw Select Pair as Scanner to pair the Thor VM1 with the Bluetooth mobile scanner The devices are paired The Bluetooth bar code reader responds with a series of beeps and an LED flashes Refer to the following section titled Bluetooth Beep and LED Indications Note After scanning the Thor VM1 Bluetooth label if there is no beep and no LED flash from the Bluetooth device the devices are currently paired 3 68 Thor VM1 without Label If the Thor VM1 Bluetooth address bar code label does not exist follow these steps to create a u
29. Boot M Auto Reconnect on Boot M Auto Reconnect Note These options can still be checked or unchecked whether Bluetooth connection is enabled or disabled 3 61 Options Report when connection lost Report when reconnected Report failure to reconnect Clear Pairing Table on Boot Auto Reconnect on Boot This option is Enabled checked by default There may be an audio or visual signal when a connection between a paired active device is lost A visual signal may be a dialog box placed on the display notifying the user the connection between one or all of the paired Bluetooth devices has stopped Tap the ok button to remove the dialog box from the screen This option is Disabled unchecked by default There may be an audio or visual signal when a connection between a paired active device is made A visual signal may be a dialog box placed on the display notifying the user the connection between one or all of the paired Bluetooth devices has resumed Tap the ok button to remove the dialog box from the screen This option is Enabled checked by default The default time delay is 30 minutes This value cannot be changed by the user There may be an audio or visual signal when a connection between a paired active device fails to re connect A visual signal may be a dialog box placed on the display notifying the user the connection between one or all of the previously paired Bluetooth devices has failed
30. CG Summit Wireless Network Configuration 000000000 coco ccc ccc ccc cnn 6 1 Important Notes ns 6 1 S mmit Client Utility a o a oia slo 6 2 AAA A de ee 6 2 Summit Tray Ia nc 6 2 Wireless Zero Config Utility and the Summit Radio 2 2 2 c cece ccc eececeeeeceeceeeeees 6 3 How To Use the Wireless Zero Config Utility 0002 e cece cece cece eeeeeeees 6 3 How to Switch Control to SCU oo ccc ccc ccc ccc cece cee cee eee eee eee nnnnnnnnnnnnnnoes 6 3 Main AAA cS RTA Nee SS 6 4 Auto Profile ocococcioo lili coco Se vesdhcebbacaddesdeceacccds do told se deudede cee desu dos te a Ea eE DSt 6 5 Admin Login 2 2 e cece cece cece cece eee eee cece cece cece ce eceeceeeeseeeeeeeeeeeeeeeeeees 6 5 Profile AD ross cede et bocaete a saan ce goes ne eka eee eee ec ee ead Pec pee nascent ease tees 6 7 A 6 8 Profile Parameters ocios si di TLE dd 6 9 AC A A Ae eed hes 6 11 DITO CA Ee o 6 12 Global MT e OEE IE EE EE EE ee ee ee A TE E RA A eae 6 13 Custom Parameter Optio 0000000000000000 ALDADILDI DaDa oaao 6 14 Global Parameters 2 222 200 eee 6 15 Sign On vs Stored Credentials 2 20000 e cece cece cece ccc Aaaa arenorna 6 19 How to Use Stored Credentials ooo eee 6 19 How to Use Sign On Screen 2 222222 cece ccc ccc cece cece eee eee ce cee eee cect ee eebeeeeeteeeeeeeererteerreees 6 19 Windows Certificate Store vs Certs Path 00 000000 c ccc c cece ccc ccc ccc cece cee cece cece eee
31. Disabled The data collection device laser scanner laser imager external or wireless Default Enabled When Send Key Messages WEDGE is checked any data collection scan is converted to keystrokes and sent to the active window When this checkbox is not checked the application will need to use the set of Scanner APIs to retrieve the data from the scanner driver Note that this latter method is significantly faster than using Wedge 3 77 COM1 Tab Start gt Settings gt Control Panel gt Data Collection gt COM1 Main COM1 coma Data Options Processing About Baud Rate Data Bits O 115200 Os O 57600 7 38400 19200 Stop Bits 2600 4800 O 2400 1200 O Oz Power on pin 9 5w This panel sets communication parameters for any device connected to the external port Adjust the settings and click the OK button to save the changes Any changes take effect immediately This panel does not configure the connected device Please refer to the documentation for the external connected or wireless device for information on configuring the device Note COM default values are restored after a cold boot or operating system upgrade COM1 supports 5V switchable power on Pin 9 for tethered scanners Power on Pin 9 To configure the COM port to supply power to an external scanner tethered to the COM1 port check the checkbox for Power on Pin 9 5V The default is On enabled
32. End User Mode End user mode locks the end user into the configured application or applications The end user can still reboot and respond to dialog boxes Each application is automatically launched and runs in full screen mode when the device boots up The user cannot unintentionally or intentionally exit the application nor can the end user execute any other applications Normal application exit or switching methods and all Microsoft defined Windows CE key combinations such as close X icon File Exit File Close Alt F4 Alt Tab etc are disabled The Windows CE desktop icons menu bars task bar and system trays are not visible or accessible Task Manager is not available If the end user selects File Exit or Close from the applications menu bar the menu is cleared and nothing else happens the application remains active Nothing happens when the end user clicks on the Close icon on the application s title bar and the application remains active Note A few applications do not follow normal procedures when closing AppLock cannot prevent this type of application from closing but is notified that the application has closed For these applications AppLock immediately restarts the application which causes the screen to flicker If this type of application is being locked the administrator should close all other applications before switching to end user mode to minimize the screen flicker Windows accelerator keys such as Alt F4 are disabled
33. Microsoft Certificate Services Advanced Certificate Request The policy of the CA determines the types of certificates you can request Click one of the following options to Create and submit a request to this CA Submit a certificate request by using a base 64 encoded CMC or PKCS 10 file or submit a renewal request by using a base 54 encoded PKCS 7 file Request a certificate for a smart card on behalf of another user by using the smart card certificate enrollment station Note You must have an enrollment agent certificate to submit a request on of another user Click on the Create and submit a request to this CA link 6 46 Microsoft Certificate Services Advanced Certificate Request Certificate Template User Y Key Options Create new key set O Use existing key set CSP Microsoft Enhanced Cryptographic Provider v1 0 Key Usage Exchange Min 384 A Key Size 1024 Max 10334 OMMON key sizes 512 1024 2048 4096 192 16384 Automatic key container name O User specified key Y Mark keys as exportable container name Export keys to file Full path name O Enable strong private key protection O Store certificate in the local computer certificate store Stores the certificate in the local computer store instead of in the user s certificate store Does not install the root CA s certificate You must be an administrator to generate or use a key in the local machi
34. Mobile Device Server are postponed until the Thor VM1 has User Idle Time been idle for the specified period of time The default is disabled Specify the length of time the device must be idle before a periodic update can run used when the Idle timeout A parameter above is enabled 5 12 Preferences For best results use AppLock to manage the taskbar AppLock is resident on each mobile device Avalanche Update Settings OK E Preferences Display Taskbar Execution Scan Config Sho_4 gt Application Startup Monitor for Updat y Administration Shutdown Monitor for Updat y Keep Activity Log E settings unlocked for Log Level No Activity Log w 10 min Display Level Basic Output y Administration By default Keep settings unlocked for 10 minutes is disabled checkbox is blank Application Behavior of the Enabler when the Thor VM1 boots up The default is Monitor for Updates e Do not Monitor When the device boots do not launch the Enabler application and do not attempt to connect to the Mobile Device Server e Monitor for Updates Attempt to connect to the Mobile Device Server and process any updates that are available Do not launch the Enabler application e Launch User Interface Attempt to connect to the Mobile Device Server and process any updates that are available Launch the Enabler application Behavior of the monitor when the Enabler is exited The defaul
35. Reset and Loss of Host Re connection 20 2 e cece cece cece cece cnn 4 4 Troubleshooting ActiveSync occ nn 4 5 Configuring the Thor VM1 with LXEConnect 2 cece cece eee cece ccc ccccccecceceececceeeeeeeeeeeteeeeeeeneenees 4 6 Install LXEConnect cc 4 6 Using LXECOMNCCU ce ag Pitta te Bett eal ue uhoe a ed oa Ove nears Bevel bee wether esse ee aE 4 7 Chapter 5 Enabler Installation and Configuration CCSCSC Introduction sc corria odeesssos colla dsc ses ii tit rta 5 1 Installation alo ee cea dto tee 5 1 Installing the Enabler on Mobile Devices 00 00 e cece eee eecceeeececeecescsceeeeees 5 1 Enabler Uninstall Process 2 2 22 20 2222 c cece cece cece cece cece cece ns 5 2 Stop the Enabler Service acota sls de std tido 5 2 Update Monitoring Overview oocccccccccccc ccoo cece eee c cece cece cece cece AA A E a aaraa rnrn 5 3 Mobile Device Wireless and Network Settings 00 0000222 o cee c cece e cece cece ce cece cece cece cece cece eeeeeeeeeeees 5 4 Preparing a Device for Remote Management 0 000002 c ccc ccc cece nn 5 5 Using Wavelink Avalanche to Upgrade System Baseline 2 00 2022 2 eee e cece cece cece cc cece cece cece eeeeeeees 5 6 Part 1 Bootstrapping the RMU 02 e cece cece oaoa cece ceececcececeeeeeees 5 6 Part 2 Installing Packages oococccccccccccccccccccccccccnccccnncnn eee eee e eee a aaaea raana naaa raoran nenn 5 6 Version
36. See Also Application Panel gt Launch gt Manual Launch and Allow Close Using the Switch Key Sequence One switch key sequence or hotkey is defined by the administrator for the end user to use when switching between locked applications This is known as the Activation key The Activation key is assigned by the Administrator using the Global Key parameter When the switch key sequence is pressed on the keypad the next application in the AppLock configuration is moved to the foreground and the previous application moves to the background The previous application continues to run in the background End user key presses affect the application in focus only See Also Start gt Settings gt Administration gt Application Panel gt Global Key 3 30 Hotkey Activation hotkey The default Hotkey Activation key is Ctrl Spc The key sequence switches the focus between one application and another Data entry affects the application running in the foreground only Note that the system administrator may have assigned a different key sequence to use when switching applications Note You must use an extemal keyboard with the 12 key version of the Thor VM1to use the Hotkey If an external keyboard is not attached use the Switchpad to switch between applications 3 31 Application Configuration Settings gt Control Panel gt Administration icon The default Administrator Hotkey sequence is Shift Ctrl A Administrator mode allows
37. Sound SoundSentry is disabled by default Tap the Use SoundSentry checkbox to enable this option Tap the Settings button to view or change parameters Displa High Contrast is disabled by default Tap the Use High Contrast checkbox to enable this option Tap the Settings pay button to view or change parameters Mouse MouseKeys is disabled by default Tap the Use MouseKeys checkbox to enable this option Tap the Settings but ton to view or change parameters Automatic reset is disabled by default Tap the Turn off accessibility features checkbox to enable this option and General use the dropdown option to assign a timer Notification is enabled by default Sounds are emitted when turning a feature on or off Accessibility E OK E Keyboard sound Display Mouse General StickyKeys Aag Use StickyKeys if you want to use Shift Ctrl e or Alt key by pressing one key at a time settings _ Use StickyKeys aa TOSS Use ToggleKeys if t to hear t h pas se ToggleKeys if you want to hear tones when tee pressing CapsLock NumLock and ScrollLock 7 Use ToggleKeys The following exceptions are due to a limitation in the Microsoft Windows CE operating system e Ifthe ToggleKeys option is selected please note that the ScrollLock key does not produce a sound as the CapsLock and NumLock keys do e Ifthe SoundSentry option is selected please note that ScrollLock does not produce a visual warning as the CapsLock and N
38. The client name may be passed to networking wireless devices e g Access Points Power save mode Power f Save CAM Options are Constantly Awake Mode CAM power save off Maximum power saving mode and Fast power saving mode When using power management use FAST for best throughput results Maximum setting regulates Tx power to the Max power setting for the current regulatory domain Tx Power Maximum f Options are Maximum 50mW 30mW 20mW 10mW 5mW or 1mW Setting the rate to Auto will allow the Access Point to automatically negotiate the bit rate with the Bit Rate Auto client device This parameter cannot be changed 802 11 authentication type used when associating with the Access Point Auth Type Open f Options are Open LEAP or Shared key Extensible Authentication Protocol EAP type used for 802 1x authentication to the Access Point Options are None LEAP EAP FAST PEAP MSCHAP PEAP GTC PEAP TLS EAP TTLS or EAP Type None EAP TLS Note EAP Type chosen determines whether the Credentials button is active and also determines the available entries in the Credentials pop up window Type of encryption to be used to protect transmitted data Available options may vary by SCU version Options are None WEP or Manual WEP WEP EAP or Auto WEP WPA PSK WPA TKIP Encryption None WPA CCKM WPA2 PSK WPA2 AES or WPA2 CCKM CKIP is not supported in the Thor VM1 Note The Encryption type chosen determines if t
39. The keyboard backlight can be disabled See Start gt Settings gt Control Panel gt Options gt Misc tab IBM 3270 Overlay gt a o i a E ef gt o e Gr E E E gt o ajs of 29 ala 000 F n E Malal alala alala alala 20 OO 0000 808 088 0068 008 2 26 IBM 5250 Overlay o J000 000 Hoe 2 27 12 Key Keyboard The 12 key keyboard is available on the Thor VM1 running Windows CE 6 0 Because the keyboard only has 12 keys all functions are not visible or printed on the keyboard Therefore the Thor VM1 keyboard supports what is called hidden keys keys that are accessible but not visible on the keyboard A key or combination of keys can be remapped to provide a single keypress a string of keypresses or to execute an application or command Key remapping is configured via the keyboard option in the Control Panel Start gt Settings gt Control Panel gt KeyPad Remapped keys persist across a warmboot or power cycle The keyboard does not have a NumLock indicator or key NumLock is always On The warmboot behavior of CapsLock can be set via the Misc tab in Start gt Settings gt Control Panel gt Options The Thor VM1 keyboard keys are backlit By default the keyboard backlight follows the display backlight When the display backlight is on the keyboard backlight is on If the display backlight brightness is increased or decreased th
40. Thor VM1 transitions to this mode from User Idle after the System Idle timeout period has passed without a primary event occurring Suspend mode D3 All devices that are not configured as wakeup events are powered off The status LED is blinking green if external power is connected and off if external power is not connected The Thor VM1 transitions to this mode from System Idle after the Suspend timeout period has passed without a primary event occurring Additionally the power button can be used to enter or exit Suspend mode e Ifthe Thor VM1 is On pressing the power button immediately transitions the unit to Suspend e Ifthe Thor VM1 is in Suspend mode pressing the power button transitions the unit to On Shutdown Off Mode D4 The Thor VM1 shuts down when the Thor VM1 is operating on power and the UPS battery becomes critically low regardless of the current power management state The Thor VM1 remains Off until external power is applied The Thor VM1 may restart automatically when external power is applied or may require the user to press the Power button depending on installation and configuration A Real Time Clock RTC powered by an internal battery maintains the date and time while the Thor VM1 is off 2 6 Primary Events The Primary Events described below are the default behavior Primary events can be modified using the LXEPowerMgrPrimaryEvents API Please refer to the CE API Programming Guide for API details User
41. a new password before attempting to validate the server Then enter the new password check the Validate Server checkbox and proceed with the certificate process below Password LXE A cert Full trusted store M Validate server Use MS store If using the Windows certificate store e Check the Use MS store checkbox The default is to use the Full Trusted Store e To select an individual certificate click on the Browse button e Uncheck the Use full trusted store checkbox e Select the desired certificate and click Select You are returned to the Credentials screen If using the Certs Path option e Leave the Use MS store box unchecked e Enter the certificate filename in the CA Cert textbox Click OK then click Commit The device should be authenticating the server certificate and using PEAP GTC for the user authentication Ensure the correct Active Profile is selected on the Main tab and warmboot The SCU Main tab shows the device is associated after the radio connects to the network Note The date must be properly set on the device to authenticate a certificate 6 30 WPA LEAP To use WPA LEAP make sure the following profile options are used e Enter the SSID of the Access Point assigned to this profile e Set EAP Type to LEAP e Set Encryption to WPA TKIP e Set Auth Type as follows e Ifthe Cisco CCX certified AP is configured for open authentication set the Auth Type radio parameter to Open e Ifthe AP i
42. access to all features on the device When the hotkey is pressed to switch into Administrator mode a password prompt is displayed if a password has been configured A password must be entered within 30 seconds and within three tries or the password prompt is removed and the device remains in end user mode with the focus returned to the locked application Without entry of a valid password the switch into Administrator mode will not occur The password prompt is displayed if a password has been configured When the valid password is entered the Administration Control panel is displayed When a valid password is not entered within 30 seconds the user is returned to the System Control Panel If a password has not been configured the Administrator Control panel is displayed 3 32 Application Panel Administrator Control Application Security Options Status Filename kal Icon val Title Order lo Arguments Internet Y Menu M Status Launch Clear lt gt Global Key ctrl Spa w Y Input Panel APLCKPNET2Cn Use the Application tab options to select the applications to launch when the device boots up in End user Mode If no application is specified when the Administrator Control Panel is closed the mobile device reboots into Administrator mode If a password has been set but an application has not been specified the user will be prompted for the password before
43. and 8 of the screen blanking cable on vehicle motion Please refer to the wiring instructions including appropriate cautions and warnings in the Thor VM1 Vehicle Mounting Reference Guide 2 14 USB Connector The USB connector is a D 9 female connector located on the back of the Quick Mount Smart Dock Power the Thor VM1 off before attaching a cable to any port serial USB Audio CAN etc a soa bein USBC_D USB client data signal e eno foomo Pa osem p uss rest sasra o usec veus Jus cient 8v ses tom tacos 2 15 USB Dongle Cable USB dongle cables have a Host port and a Client port D9 Male Connector PIN 1 PIN 5 PIN 6 PIN 9 in soa nein fe exo Conmenacns Pa use ao userei tomasa o ussc veus USS cen a aero atari D9 Connector USB Host Connector s USB Client Connector 2 16 USB Host Connector USB Client Connector Siena pepon V_USB PIN 1 PIN 4 Pn siga Deserpton 5V_USB USB Power Current Limited USB_H1_D USB D USB_H1 D USB D USB Power Return Shell CGND Chassis Ground 2 17 Power Supply Connector 1 Power Connector 2 Power Switch Power is supplied to the Thor VM1 through the power connector Additionally this assembly provides a connection point for the vehicle s chassis ground to be connected internally to the conductive chassis of the computer The Thor VM1 internal power supply can accept DC
44. backlight If the display backlight is on the keypad backlight is on 3 149 Stylus Start gt Settings gt Control Panel gt Stylus Use this control panel option to set stylus double tap sensitivity properties and calibrate the Thor VM1 touch panel when needed Stylus Properties Ea OK E Double Tap Calibration Double tap this grid to set the double tap sensitivity for both the speed and physical distance between taps Double tap this icon to test your double tap settings If this icon doesn t change adjust your settings using the grid above Stylus Properties ka OK x Double Tap Calibration If your Windows CE device is not responding properly to your taps you may need to recalibrate your screen Recalibration involves tapping the center of a target If you miss the center keep the stylus on the screen slide it over the target s center and then lift the stylus To start tap Recalibrate Recalibrate Double Tap Follow the instructions on the screen and tap the OK button to save any double tap changes Calibration Calibration involves tapping the center of a target If you miss the center keep the stylus on the screen slide it over the target s center and then lift the stylus To begin tap the Recalibrate button on the screen with the stylus Press and hold the stylus on the center of the target as it moves around the screen Press the Enter key to keep the new calibration s
45. be prompted for the Username and Password when connecting to the network 6 33 Credentials fia El Password PAC Filename PAC Password To use Sign On credentials e Do not enter a User and Password as the user will be prompted for the Username and Password when connecting to the network To use Stored Credentials e Enter the Domain Username if the Domain is required otherwise enter the Username e Enter the password To use Automatic PAC Provisioning e No additional entries are required To use manual PAC Provisioning e Enter the PAC Filename and PAC Password e The PAC file must be copied to the directory specified in the Certs Path global variable The PAC file must not be read only Ensure the correct Active Profile is selected on the Main tab and warmboot The SCU Main tab shows the device is associated after the radio connects to the network Note When using Automatic PAC Provisioning once authenticated there is a file stored in the System directory with the PAC credentials If the username is changed that file must be deleted The filename is autoP 00 pac EAP TLS To use EAP TLS make sure the following profile options are used e Enter the SSID of the Access Point assigned to this profile e Set EAP Type to EAP TLS e Set Encryption to WPA TKIP e Set Auth Type to Open To use another encryption type select WPA CCKM WPA2 AES or WPA2 CCKM for encryption and complete other entries as det
46. blank text string When bar code data is processed the Asu Suffix string is sent to the output buffer after the bar code data uffix Because all stripping operations have already occurred stripping settings do not affect the suffix The suffix is added to the output buffer for the Symbology selected from the pull down list If All is selected the suffix is added for any symbology that has not been specifically configured Note Non ASCII equivalent keys in Key Message mode are unavailable in this option Non ASCI equivalent keys include the function keys e g F1 arrow keys Page up Page down Home and End Symbologies The Thor VM1 supports only Custom IDs 3 88 Ctrl Char Mapping The Ctrl Char Mapping button Control Character Mapping activates a dialog to define the operations the Data Collection Wedge performs on control characters values less than 0x20 embedded in bar codes Control Character OK a 7 Translate All Control Character Replacement ACKnowledge Ignore drop Carriage Return 0x0D End of Text AM Character Form Feed y Replacement fignore drop Assign Delete Control characters can be replaced with user defined text which can include hat encoded or hex encoded values In key message mode control characters can also be translated to their control code equivalent key sequences Translate All When Translate All is checked unprintable ASCII charac
47. blinks once for a very short time every 2 seconds when paired and connected It blinks every second when in discovery The LED is off when the Bluetooth client is off 2 33 Keyboard LEDs The keyboard LEDs are located near the specified key 2nd LED LED Behavior Be S e Indicates the 2nd modifier key is active 2nd mode is invoked for the next keypress Solid Green only e Pressing the 2nd key a second time exits this modifier mode and turns off the LED Shift LEDs For the 64 key keyboard there is one LED next to each Shift key Both LEDs indicate the status of Shift mode and Caps Lock mode For the 12 key keyboard there is a single Shift key and a single LED LED Behavior Poe Indicates the keypad is in Shift mode Shift mode is invoked for one keypress Blinking Green Pressing the Shift key places the system in Shift mode To exit Shift mode press the Shift key again When solid Green indicates the keypad is in Caps Lock mode Caps Lock mode is invoked until canceled Solid Green Pressing the 2nd key followed by the Shift key places the system in Caps Lock mode To exit Caps Lock mode press 2nd Shift again CAS Neither Shift or Caps Lock mode is invoked Ctrl LED The Ctrl key is not present on the 12 key keypad e Indicates the Ctrl modifier key is active Ctrl mode is invoked for the next keypress Solid Green only e Pressing the Ctrl key a second time exits this modifier mode and turns o
48. cece cece cece cece cece eee AAAA cece cece cece cece cece eeeeeeeeeeteeneees 2 22 9 Pin J1939 Deutsch Connectors occ eee eee eee cece cece e cece cecceeeeeeeeeeeeeeeeeees 2 23 Antenna Connections a 00 00222 o cece cece cece ccc cece cece eee cee eee cece eee e EDADE DELEA Ea aa nananana 2 24 Antenna Connector oo eee cece eee e ccc ceccceceeccccccccaccececceccecceceececeeeceeeeeeeeeeeeeeeeteeeeeteeeenees 2 24 Internal WiFi Antenna occ eee eee eee eee cece eee e cece cece cece eee Ee edd E EERE 2 24 Vehicle Remote Antenna 22 22 2222 2 eee eee cece cece ns 2 24 Keyboard Options 000000000000000000 000000 aoaaa aoaaa aaa 0a aa AAAA D EA EDEDED A EPLL EEDD EADE aaan a annann 2 25 64 Key QWERTY Keyboard oooccccccccccccccccccccccccccc 2 25 IBM 3270 OVENAY cc fooler isa 2 26 IBM 5250 Overlay 00 0000000000000000000000000000 00000000000 a ieai o aaora naa aa 2an aaaea naana anaana annaran anon nn nnee 2 27 12 Key Keyboard 00 0000000000000000a00 0000000000 0a 00a oaaao a 0a AA AA E AADEL AEDADE DDAL DEE AE Ea oaaao nnne 2 28 Keyboard LEDS ne 2 29 NM A A E ee ee tee ne 2 29 Secondary Keys LED 0 02 22 cece ccc ee cece cece e cece cece e ccc cece cece cece cee ceeceeeeeeeeeetereeeeeeees 2 29 Ciad Alt Key LEDS 0000 to icaciis sb ii a e A a iaa a aN 2 29 ED IFUNCUONS 22 2 cece eee A ii A cla E E 2 30 System LEDS 2 220224 cael skid iaa 2 31 SYS System Status LED 2 2 c cece cece cece cece ccc e cece eee eee
49. e Set EAP Type to None e Set Encryption to None e Set Auth Type to Open Summit Client Utility 7 HOKE x Main Profile status Diags Global lo Encryption EAP type None v None y WEP keys PSKs Credentials Once configured click the Commit button Ensure the correct Active Profile is selected on the Main tab and warmboot The SCU Main tab shows the device is associated after the radio connects to the network 6 24 WEP To connect using WEP make sure the following profile options are used e Enter the SSID of the Access Point assigned to this profile e Set EAP Type to None e Set Encryption to WEP or Manual WEP depending on SCU version e Set Auth Type to Open Summit Client Utility 7 foki x Main Profile status Diags Global lo Encryption EAP type Manual WEP 7 None gt WEP keys PSKs Credentials Click the WEP keys PSKs button WEP Key Entry lx Enter 10 or 26 Hex digits A F 0 9 OR enter 5 or 13 ASCII characters Tx Key ozf Os Os Valid keys are 10 hexadecimal or 5 ASCII characters for 40 bit encryption or 26 hexadecimal or 13 ASCII characters for 128 bit encryption Enter the key s and click OK Once configured click the Commit button Ensure the correct Active Profile is selected on the Main tab and warmboot The SCU Main tab shows the device is associated after the radio connects to the networ
50. entering administration mode The password prompt remains on the display until a valid password is entered Default is blank Move the cursor to the Filename text box and either type the application path or tap Filename the Browse button the button The standard Windows CE Browse dialog is displayed After selecting the application from the Browse dialog tap OK Default is blank Enter the Title to be associated with the application The assumption is that mul Title tiple copies of the same application may need unique titles in order to differentiate them in the Switchpad Default is blank Enter the command line parameters for the application in the Arguments text box Order Default is 1 Enter the Order in which the application is to be loaded or presented to the end user Applications are launched in lowest to highest number order and do not need to be sequential Default is Disabled Enable the Internet checkbox to use the End user Internet Explorer Internet EUIE EXE When the checkbox is enabled the Internet Menu and Internet Status are available See the section titled End user Internet Explorer EUIE for more details See following section titled Launch Button Launch Button Note AppLock Administrator Control panel file Launch option does not inter relate with similarly named options contained in other Control Panels Default is Ctrl Spc Select the Global Key key sequence the end user is to press when switching Global Key be
51. file to the Thor VM1 System folder 3 Install the User Certificate and Private Key file 4 After installation perform a Suspend Resume 5 Verify installation 6 38 Generating a Root CA Certificate Note Itis important that all dates are correct on the Thor VM1 and host computers when using any type of certificate Certificates are date sensitive and if the date is not correct authentication will fail The easiest way to get the root CA certificate is to use a browser on a PC to navigate to the Certificate Authority To request the root CA certificate open a browser to http lt CA IP address gt certsrv Sign into the CA with any valid username and password Connect to 10 1 2 204 Connecting to 100 100 100 100 User name Us Password C Remember my password 6 39 Microsoft Certificate Services Welcome Use this Web site to request a certificate for your Web browser e mail client or other program By using a certificate you can verify your identity to people you communicate with over the Web sign and encrypt messages and depending upon the type of certificate you request perform other security tasks You can also use this Web site to download a certificate authority CA certificate certificate chain or certificate revocation list CRL orto view the status of a pending request For more information about Certificate Services see Certificate Services Documentation Se
52. information and upgrade availability Enter the IP Address or host name of the Mobile Device Server Set the order in which serial ports or RF connections are used to check for the presence of the Mobile Device Server Server Contact Setup synchronization scheduled Mobile Device Server contact suspend and reboot settings Data Control when data is transferred between the device and the Mobile Device Server Preferences Set options for Enabler startup or shutdown and logging Set up the Windows display at startup on connect and during normal mode The settings can be adjusted by the user Taskbar Set options for Taskbar Connection Display the Avalanche MC Console Scan Config not currently supported Enable or disable network and wireless settings Select an adapter and switch between the Ava Adapters lanche Network Profile and manual settings View the current adapter signal strength and quality IP address MAC address SSID BSSID and Status Link speed The user cannot edit this information Connection Avalanche Update Settings OK E Connection Server Contact Data Preferences Display Ta gt Avalanche Server Address ene Check serial connection Disable ActiveSync Restrict Adapter Link Speed Min Link Speed 10000 kbs KE Enter the IP Address or host name of the Mobile Device Server assigned to the Thor VM1 Server Address Check Serial Indicates whether th
53. input voltages in the range of 10 to 60 Volts DC Pin Siena Descriptor Chassis ground 6 Ignition 0V to 60V to start terminal 2 18 CANbus Audio Connector The CANbus Audio connector is a D 15 male connector located on the back of the Quick Mount Smart Dock The connector supports a headset adapter cable or a CANbus cable The Thor VM1 does not support connecting audio and CANbus simultaneously pio 000 ens PIN 6 4 O PIN 10 a O O7 PI s CAN reserved enn O moran TON o gt eawrsenes N es a 8 EN Em Ka Headset Adapter Cable The headset cable attaches to the CANbus Audio connector and provides a quick connect connection for a headset D15 Female Connector PINS PIN 1 PIN 10 PIN 6 PIN 15 PIN 11 Pin signal Despi O eses Pisos EJE TN CITI EE o ream ea rta mein Meron mp 2 mr Pope reum pol we ses tes JN CIEN CIT 2 20 Quick Connect Headset Connector sinai Description 2 21 CANbus Cable J The CANbus interface is a virtual COM9 port This port can be accessed using standard Windows API calls D15 Female Connector PINS PIN1 PIN 10 e PIN 6 PERS PIN15 PIN 11 AN_H_ CAN_H bus line dominant high N O O Ea En Ed EM 2 22 9 Pin J1939 Deutsch Connectors Receptacle Socket J1939 Female J1939 Male signal peseto EE
54. may take several minutes the Remote Management Utility RMU is launched The RMU processes all the downloaded packages If the radio package was downloaded the Wireless Configuration Application WCA is launched to process the new radio settings After the RMU finishes installing all the packages the device is automatically coldbooted assuming the Reboot setting was set to Auto in Step 3 After the Device completes the coldboot the RMU is autoinstalled by the OS and the previously downloaded packages are restored Assuming at least one package has registry settings that were restored and that package was set to reboot either auto or prompt the RMU then performs an automatic warmboot 7 After the warmboot the device is configured If the device will no longer be monitored by Wavelink Avalanche you may remove the Enabler to eliminate boot up delays if desired Even if the Enabler is removed the installed packages and their configurations continue to be restored with every reboot by the RMU Version Information on Mobile Devices The VersionInfo EXE file is included in the Remote Management Utility package downloaded to the Thor VM1 It is stored in the Program Files RMU folder When VersionInfo EXE is opened a dialog box is presented to the Thor VM1 user displaying e Remote Management Utility RMU version e Wireless Configuration Application WCA version VersionInfo displays the version for each utility only after that ut
55. must be the actual executable not a shortcut because shortcuts are not parsed by Launch Saving Changes to the Registry The Thor VM1 saves the registry when you e Warmboot either from the Registry control panel the warmboot command or the reboot keypress sequence e Restart from the Registry control panel e Suspend Resume Either user initiated or upon Suspend timer expiration e Shutdown The registry is saved during a controlled shutdown such as when the UPS charge reaches a critically low level and external power is not available The registry save process takes 0 3 seconds If nothing has been changed nothing is saved e g O seconds 34 Software Load The software loaded on the Thor VM1 consists of Microsoft Windows Embedded CE 6 OS hardware specific OEM Adaptation Layer device drivers Internet Explorer 6 0 for Windows CE browser and utilities The software supported is summarized below e Full Operating System License Includes all operating system components including Microsoft Windows Embedded CE 6 kernel file system communications connectivity for remote APIs device drivers events and messaging graphics keyboard and touch screen input window management and common controls e Network and Device Drivers e Bluetooth Note Please contact Honeywell Technical Assistance for software updates and CAB files as they are released by Honeywell Software Applications The following ap
56. naiona rarnana nnna 6 21 User CerniniCates 222 0222 2252 2nht seein ddaet tote fied See italia til ee 6 21 Root CA Certificates 0 00 22 con 6 21 How To Use the Certs Path 22000020 c cece cece cece ccc cc cece cece cece ec ceceeeeeeeeeeteeeeeeees 6 21 How To Use Windows Certificate Store 2 2 2 cece cece cece cece eee raara raaraa nanena 6 21 Configuring the Profile nes 6 23 No Security 20 ns 6 24 WER ee at ears eet de eee tg era ee te See ee eta see eee 6 25 xi KEAP a cle gts See essen eat aac toca dr o ala 6 26 PEAPAMS CA os eee eto orton cere econ 6 27 PEARCE ist is oia 6 29 WPA AR Due atroces rar NN o let ir RN ea o NIN e a eee eae 6 31 EA PARAS reece sete ed Sonnanstine REAR INI ie nw tte aie SERSERAAES 6 33 EAP TES eae i O ote aide 6 35 WRAPS cee ee ne ee ee Re ets e ol do 6 37 GOMIMNCALCS lt 3 ta oi ees oes ete es Sa wee cios ais 6 38 Generating a Root CA Certificate 000 ccc cece cece cece ccc ccc cecccccececcececeeeeeeeeeeeeeteeeeteneennes 6 39 Installing a Root CA Certificate 200 0 2 2 cnc nn 6 42 Generating a User Certificate 2 2 000000 e cnn rrarena 6 44 Installing a User Certificate 0 2 c cece cece cece cece ce cece cece cece cnn cnn cnn 6 50 Verify Installation 2 2 0 0 e eee e cece ee eeeeeeeeeeeeccecceccecuacccccecececeeececceceeceeeeeceeeeeeeeeeeees 6 52 Chapter 7 Technical Specifications__ gt 7 MR ahaa ootece doh aed 5 ata bolted oacect Seabee Oil Sides ek eeGhetess cess 7
57. no effect When a match between the first characters of the bar code and a string from the list is found that string is stripped from the bar code data Processing the list terminates when a match is found or when the end of the list is reached If the wildcard is not specified the string is assumed to strip from the beginning of the bar code data The string ABC strips off the prefix ABC The string X YZ will strip off the suffix XYZ The string ABC XYZ will strip both prefix and suffix together More than one in a configuration string is not allowed The User Interface will not prevent it but results would not be as expected as only the first is used in parsing to match the string The question mark wildcard may be used to match any single character in the incoming data For example the data AB D will match ABCD ABcD or ABOD but not ABDE The data collected is saved per symbology configured The Symbology selected in the Symbologies dialog defines the symbology for which the data is being configured Note that the Code ID if any are configured is ignored by this dialog regardless of the setting of Strip Code ID in the Symbologies dialog According to the sequence of events specified above the Code ID must not be included in the bar code data being matched because when the matching test occurs the Code ID has already been stripped If Strip Code ID is disabled then the bar code data to match must include the Code ID
58. o INESIS INSI TI INES IEA TI INICIO IET INES IT 2 23 Antenna Connections The Thor VM1 is equipped with an 802 11 radio and can be ordered with internal antennas or external remote mount antennas When the Thor VM1 is ordered with internal antennas the external antenna connectors are not used GPS and WWAN are optional on the Thor VM1 and require external remote mount antennas WI FI MAIN Red label 802 11 Main External Antenna Connector WI FI AUX Yellow label 802 11 Auxiliary External Antenna Connector GPS Green label GPS Antenna Connector MOBILE NET Blue label WWAN Antenna Connector PON gt Antenna Connector When the Thor VM1 is ordered with the intemal antenna option the 802 11 antenna connectors on the back are not connected to the 802 11 radio Instead the internal antenna is connected to the 802 11 radio Remove the rubber cap if present from the antenna connector before connecting an external antenna Internal WiFi Antenna If the internal WiFi antenna option is ordered an antenna is mounted inside the Thor VM1 The internal antenna is not user accessible Vehicle Remote Antenna The external antennas can be remotely mounted on the vehicle See the Thor VM1 Vehicle Mounting Reference Guide for instruction External antenna kits are available for the 802 11 WiFi radio GPS and WWAN 2 24 Keyboard Options The 2nd ALT CTRL and Shift keys when present are sticky keys The k
59. oes id iii be 3 5 ACUVES YING ens cos ca teats teen ts sa aa thet ne sade PMNS Ne Se rr ponte As a OMEN GR he Ja 3 5 Bluetooth 2 00 c cece cece cece cece ccc cceeceeeeeeeeeeeeeeeeeeeeeeeeetneeeteneeneneenenneeeeeecscccccuccceeeeeseceeeee 3 5 LXE RFTerm Optional 0 00000000 coco c cece ccc nc 3 6 Avalanchese ocios eons Sect Se Seg dd cn o At a Oi ere 3 6 Software Development nas 3 6 MR E Ae oie hts be eet hoe nied Sia eee eet Bt ee 3 6 LAUNCHLEX Becca ne cic soc desce nucle a tica 3 6 LAUNCH EXE and Persistent Storage 2 0 e cece cece e eee ccc ceceeceeeeeeeeees 3 7 REGED EX Beaches aes gt et ne ee a ee ae Ae a 3 8 REGLOAD EXE 0 e dd 3 8 REGDUMPIEXE coi ee ene dotados tal 3 8 WARMBOOT EXE cocos rt ii net acts 3 8 WAV PLATENE nr an ctu sia 3 8 Thor VM1 Command line Utilities oo cece cece cece cece ec cececcecceccececceceeeeeeeeeeeeeeeteeeenes 3 8 PM OCM EXE A cients O RECO O 3 8 DESKIOD oes te sree set oss oe sys ot ee a tient Se See ee 3 9 Desktop Las ns 3 9 E E eee eceatan 3 10 My Device Folders 2 2 2 coc ns 3 10 Wavelink Avalanche Enabler Optional 2 2 2 2 2 2 e eee c eee ececeeccccccccceccccseeeeees 3 11 Intemet Explorer ce o a a ten e de les o e e od es 3 11 Start Menu Program Options Loc nn n cnn ccnnncnnnnnnnns 3 12 Communication 2 2 22 2 222 c cece cece cece cece cece eee cece cece cece ee teeeeeeeeeeeeeeeeeeeereeeeeeeeees 3 12 NA 3 12 Connect and LXEConnect 2 2 22 eee 3 13 St
60. processing will return a zero byte data packet which will be rejected The operation of each type of stripping is defined below Leading This strips the number of characters specified from the beginning of the collected data not including Code ID The data is stripped unconditionally This action is disabled by default Trailing This strips the number of characters specified from the end of the collected data not including Code ID The data is stripped unconditionally This action is disabled by default Code ID Strips the Code ID based on the type code ID specified in the Enable Code ID field in the Data Options tab By default Code ID stripping is enabled for every symbology meaning code IDs will be stripped unless specifically configured otherwise 3 85 Bar Code Data Match List Bar Code Data Panel This panel is used to strip data that matches the entry in the Match list from the bar code Enter the data to be stripped in the text box and tap the Insert or Add button The entry is added to the Match list 12 x FP Add Clear Al To remove an entry from the Match list highlight the entry in the list and click the Remove button Click the OK button to store any additions deletions or changes Bar Code Data Match Edit Buttons Add Entering data into the text entry box enables the Add button Click the Add button and the data is added to the next empty location in the Custom ID list mee Click on
61. refer to the Bluetooth scanner manufacturer s User Guide it may be available on the manufacturer s web site Contact Technical Assistance for Bluetooth product assistance Several different types of bar code readers are supported This section describes the interaction and setup for a mobile Bluetooth laser scanner or laser imager connected to the Thor VM1 using Bluetooth functions Prerequisites e The Thor VM1 has the Bluetooth hardware and software installed An operating system upgrade may be required Contact Technical Assistance for details e Ifthe Thor VM1 has a Bluetooth address identifier bar code label affixed then Bluetooth hardware and software is installed e The mobile Bluetooth laser scanner laser imager battery is fully charged e The Thor VM1 is connected to AC or DC vehicle power e Important The bar code numbering examples in this segment are not real and should not be created nor scanned with a Bluetooth scanner e Toopen the LXEZ Pair program tap Start gt Settings gt Control Panel gt Bluetooth or tap the Bluetooth icon on the desktop or tap the Bluetooth icon in the taskbar LnkB00440fd01020 Sample Locate the bar code label similar to the one shown above attached to the Thor VM1 The label is the Bluetooth address identifier for the Thor VM1 The mobile Bluetooth scanner imager requires this information before discovering pairing connecting or disconnecting can occur Important The Thor VM1
62. supplied loosen the screws and then remove the tethered access panel with the SIM label This panel is on the right hand side when the Thor VM1 is face down with the top away from the user 5 Locate the SIM card installation slot 2 41 oo xo PN Slide the SIM card into the slot Reattach the access panel torquing the screws to 4 5 inch pounds If removed reinstall the Thor VM1 in the Dock Resume the Thor VM1 from suspend 2 42 Field Replaceable Front Panel Equipment Required User Supplied e Torquing tool capable of measuring inch pounds e 2 Philips screwdriver bit Caution A Before replacing the Thor VM1 front panel the internal UPS battery must be disconnected The front panel of the Thor VM1 is field replaceable The front panel assembly contains the keyboard touch screen and optional defroster Should any of these components fail the front panel assembly can easily be replaced to reduce downtime The replacement front panel is available in several configurations e 64 key ANSI keyboard with standard touch screen or cold storage touch screen e 64 key 3270 keyboard with standard touch screen or cold storage touch screen e 64 key 5250 keyboard with standard touch screen or cold storage touch screen e 12 key keyboard with standard touch screen or cold storage touch screen Replace Front Panel Place the Thor VM1 on a clean well lit surface before performing the front panel replacement P
63. the Discover button to locate all discoverable Bluetooth devices in the vicinity The Discovery process also queries for the unique identifier of each device discovered LXEZ Pairing Bluetooth Devices Settings Reconnect About Bluetooth Address Discovering Bluetooth devices El ii A Stop Button Tap Stop at any time to end the Discover and Query for Unique Identifier functions Devices not paired are not shown after any reboot sequence Note When an active paired device enters Suspend Mode is turned Off or leaves the Thor VM1 Bluetooth scanning range the Bluetooth connection between the paired device and the Thor VM1 is lost There may be audible or visual signals as paired devices disconnect from the Thor VM1 3 55 Bluetooth Device List LXEZ Pairing OK E Bluetooth Devices Settings Reconnect About Name Bluetooth Address r L53578 61 DA 00 15 70 44 61 D4 Fi LXE Scanner 00 85 0D 00 80 25 9F 85 0D Kit s Deskjet 36 10 00 04 76 BB 36 10 gt Clear Discover The discovered paired devices may or may not be identified with an icon Discovered devices without an icon can be paired as a Scanner or a Printer The Bluetooth panel assigns an icon to the device name An icon with a red background indicates the device s Bluetooth connection is inactive An icon with a white background indicates the device is connected t
64. the SCU without tapping the Admin Logout button Admin Login To login to Administrator mode tap the Admin Login button Once logged in the button label changes to Admin Logout The admin is automatically logged out when the SCU is exited The Admin can either tap the Admin Logout button orthe OK button to logout Admin Password Entry Enter Admin Password a Enter the Admin password the default password is SUMMIT and is case sensitive and tap OK If the password is incorrect an error message is displayed The Administrator default password can be changed on the Global tab The end user can Turn the radio on or off on the Main tab Select an active Profile on the Main tab View the current parameter settings for the profiles on the Profile tab View the global parameter settings on the Global tab View the current connection details on the Status tab View radio status software versions and regulatory domain on the Main tab Access additional troubleshooting features on the Diags tab After Admin Login the end user can also Create edit rename and delete profiles on the Profile tab Edit global parameters on the Global tab Enable disable the Summit tray icon in the taskbar Profile Tab Start gt Programs gt Summit gt Profile tab Note Tap the Commit button to save changes before leaving this panel or the SCU If the panel is exited before tapping the Commit button changes are n
65. the Start menu ALT Underlined letter in a menu name Display the corresponding menu Underlined letter in a command name on an Carry out the corresponding command open menu Cancel the current task The touch screen provides equivalent functionality to a mouse e A touch on the touch screen is equivalent to a left mouse click e Many items can be moved by the drag and drop method touching the desired item moving the stylus across the screen and releasing the stylus in the desired location e A double stylus tap is equivalent to a double click e A touch and hold is equivalent to a right mouse click1 e Devices with Shift and Ctrl Keys The Shift and Ctrl keys can be used with the touch screen for multiple selection of items e Toselect disconnected items press the Ctrl key and then touch each item to be selected in the set Press the Ctrl key again to terminate this mode e To select a connected set of items press the Shift key then touch the first item in the series Touch the last item in the series Press the Shift key again to terminate the selection mode 1Some applications may not support this right click method Please review documentation for the application to see if it pro vides for right mouse click configuration 3 2 Rebooting the Thor VM1 If a USB drive such as a thumb drive is attached to the Thor VM1 the device attempts to boot from the USB drive e Ifthe USB drive contains a bootable sector
66. the Thor VM1 boots e if the ignition input is not connected the Thor VM1 only boots when the power button is pressed The default is disabled 3 134 Status Popup Options on this tab configure the Status Popup window When the Status popup window is displayed it is placed on top of the window in focus and hides any data beneath it It is closed by pressing the assigned Status User or Status Admin key sequence Options kd OK E Communication Misc Status Popup 5 Second Timeout Admin User RFTerm SecID s M Admin V User AJC Power V Admin V User CapsLock Y Admin V User ActiveSync Y Admin V User Network Status M Admin V User WLAN Radio Y Admin V User Battery Meter V Admin V User Bluetooth Status V Admin V User Using the key mapping control panel the System Administrator must first assign a Status User key sequence for the end user when they want to toggle the Status Popup Window on or off The System Administrator must also assign a Status Admin key sequence to perform the same function Status popup window display options taskbar icons are assigned on the Status Popup tab E g AC Power ActiveSync WLAN radio CapsLock Network status Bluetooth status etc The default for the User and Admin status popup windows is to show all status information The 5 second timeout to remove the status popup from the display is disabled by default for the User and Ad
67. the Thor VM1 boots from the USB drive e Ifthe USB drive does not contain a bootable sector the Thor VM1 does not boot Remove the USB drive and boot the Thor VM1 again Warmboot A warmboot reboots the Thor VM1 without erasing any registry data Configuration settings and data in RAM are preserved during a warmboot Network sessions are lost and any data in running applications that has not been previously saved may be lost CAB files already installed remain installed There are several warmboot methods available e Using the Registry select Start gt Settings gt Control Panel gt Registry and tap the Warmboot button The Thor VM1 immediately warmboots e Using the Start menu select Start gt Run and type WARMBOOT in the text box Press Enter The Thor VM1 immediately warmboots The WARMBOOT text command is not case sensitive e For the 64 key kepad use the Ctrl Alt Del keypress sequence to reboot the Thor VM1 The keys may be pressed in sequence they do not need to be held down simultaneously e Forthe 12 key kepad use the 2nd F5 Shift keypress sequence to reboot the Thor VM1 The keys may be pressed in sequence they do not need to be held down simultaneously This reboot sequence also works on the 64 key keypad Restart A restart reboots the Thor VM1 without erasing any registry data Configuration settings are preserved during a restart Network sessions are lost and any data in running applications that has no
68. therefore the Thor VM1 must be actively communicating with the network for this method to succeed If a Mobile Device Server is found the Enabler automatically attempts to apply all wireless and network settings from the active profile The Enabler also automatically downloads and processes all available packages If the Enabler does not automatically detect the Mobile Device Server the IP address of the Mobile Device Server can be entered on the Connect tab of the Enabler setup Please see Enabler Configuration for details Mobile Device Wireless and Network Settings Once the connection to the Mobile Device Server is established the Thor VM1 Enabler attempts to apply all network and wireless settings contained in the active profile The success of the application of settings is dependent upon the local configuration of control parameters for the Enabler These local parameters cannot be overridden from the Avalanche MC Console The default Enabler adapter control settings are e Manage network settings enabled e Use Avalanche network profile enabled e Manage wireless settings disabled To configure the Avalanche Enabler management of the network and wireless settings 1 Open the Enabler Settings Panels by tapping the Enabler icon on the desktop Select File gt Settings Select the Adapters tab Choose settings for the Use Manual Settings parameter Choose settings for Manage Network Settings Manage Wireless Settings an
69. this file is loaded By default the PCMCIA slots are off on powerup to prevent the Unidentified PCMCIA Slot dialog from appearing Once the drivers are loaded the slot can be turned on The value in the PCMCIA field is a DWORD representing the number of seconds to wait after installing the CAB file but before activating the slot alatency to allow the thread loading the driver to finish installation The default value of 0 means the slot is not powered on The default values for the default radio drivers listed below is 1 meaning one second elapses between the CAB file loading and the slot powering up The auto launch process proceeds as follows Note The launch utility opens the registry database and reads the list of CAB files to auto launch First it looks for FileName to see if the CAB file is present If not the registry entry is ignored If it is present and the Installed flag is not set auto launch makes a copy of the CAB file since it gets deleted by installation and runs the Microsoft utility WCELOAD to install it If the Installed flag is set auto launch looks for the FileCheck file If it is present the CAB file is installed and that registry entry is complete If the FileCheck file is not present memory has been lost and the utility calls WCELOAD to reinstall the CAB file Then the whole process repeats for the next entry in the registry until all registry entries are analyzed To force execution every time
70. to change the input panel state Use this panel to make the Input Panel on screen keyboard or the physical keypad primarily available when entering data on any screen Selecting Keyboard enables both Tap the Options button to set the size of the keys displayed on screen and whether Transcriber gestures are enabled or disabled Transcriber When choosing Transcriber as the Current Input Method first tap the Keyboard icon in the status bar Select Transcriber from the pop up menu Then open the Input control panel and tap the Options button Transcriber Options Start gt Settings gt Control Panel gt Input Panel are available only when Transcriber is selected as the active input method Tap the button or the Help button to access Transcriber Help Note Contact Technical Assistance for language packs as they become available 3 113 Internet Options Start gt Settings gt Control Panel gt Internet Options Set options for Thor VM1 Internet connectivity Select a tab Tap the button for help using Windows CE Help installed in your mobile device Adjust the settings and tap the OK button The changes take effect immediately Factory Default Settings General tab Connection tab Use LAN Disabled Autodial Name USB Client Proxy Server Disabled Bypass Proxy Disabled Security tab Internet Default site See Note Privacy tab Note Security Tab Use the Settings button to set ActiveX control scr
71. to generate and install the user certificate See Windows Certificate Store vs Certs Path for more information on CA certificate storage Check the Validate server checkbox User User Cert CA Cert Full trusted store Validate server Use MS store If using the Windows certificate store e Check the Use MS store checkbox The default is to use the Full Trusted Store e To select an individual certificate click on the Browse button e Uncheck the Use full trusted store checkbox e Select the desired certificate and click Select You are returned to the Credentials screen If using the Certs Path option e Leave the Use MS store box unchecked e Enter the certificate filename in the CA Cert textbox Click OK then click Commit The Thor VM1 should be authenticating the server certificate and using EAP TLS for the user authentication Ensure the correct Active Profile is selected on the Main tab and warmboot The SCU Main tab shows the device is associated after the radio connects to the network See Certificates for information on generating a Root CA certificate or a User certificate Note The date must be properly set on the device to authenticate a certificate 6 36 WPA PSK To connect using WPA PSK make sure the following profile options are used e Enter the SSID of the Access Point assigned to this profile e Set EAP Type to None e Set Encryption to WPA PSK or WPA2 PSK e Set Auth Type to
72. to make a temporary test connection to validate the carrier account Entries identified with an asterisk are used to configure the test connection Tap the Save Connection Data button to save the connection parameters 3 109 UTMS Use the UTMS tab to configure the session parameters Gobi Connection Manager OK Fa Home coma UMTS Gps About Autoconnect REA 7 Enable User Name Disconnected Password Authentication IP Address rap _ cHap Primary DNS Secondary DNS Data Connection Test connect Disconnect Primary NetBIOS Name Server Os Secondary NetBIOS Name Server Data Connection test only Save Connection Data Autoconnect When checked Autoconnect is enabled The Connection Manager automatically connect when necessary such as when Internet Explorer is launched Data Connection Test Tap the Connect button to make a temporary test connection to validate the carrier account Entries identified with an asterisk are used to configure the test connection Tap the Save Connection Data button to save the connection parameters GPS This tab displays the information available from the GPS built into the Gobi radio 3 110 Gobi Connection Manager OK X Home coma umts GPS about Operation Standalone Timeout sec 64 Interwal ms 1000 Accuracy m 50 Status Enabled Tracking Inactive Lat 33 963545 Lon 84 21907
73. use another encryption type select WPA CCKM WPA2 AES or WPA2 CCKM for encryption and complete other entries as detailed in this section The SCU supports EAP FAST with automatic or manual PAC provisioning With automatic PAC provisioning the user credentials whether entered on the saved credentials screen or the sign on screen are sent to the RADIUS server The RADIUS server must have auto provisioning enabled to send the PAC provisioning credentials to the Thor VM1 Summit Client Utility fa OK A Main Profile status Diags Global Profile Default y New Rename Delete Scan ke io Encryption EAP type wpa TKIP z EAP FAST y WEP keys PSKs Credentials Save Changes Commit For automatic PAC provisioning once a username password is authenticated the PAC information is stored on the Thor VM1 The same username password must be used to authenticate each time See the note below for more details For manual PAC provisioning the PAC filename and Password must be entered See Sign On vs Stored Credentials for information on entering credentials The entries on the Credentials screen are determined by the type of credentials stored or sign on and the type of PAC provisioning automatic or manual Click on the Credentials button To use Stored Credentials click on the Credentials button No entries are necessary for Sign On Credentials with automatic PAC provisioning as the user will
74. user mode administrator has closed the application being locked or has changed the application name or command line The registry has to be read when switching into user mode This is because the Registry read failure at administrator can change the settings during administration mode The read of the LOG ERROR reenter user mode registry failed which means the Administration key was not found or the AppName value was missing or empty The registry read failed The registry information read when this message is logged is the application information It the Administration key cannot be opened or if the Registry read failure AppName value is missing or empty this error is logged The other application LOG_ERROR information is not required If the AppName value is not available AppLock cannot switch into user mode BesetsvstemWorkare The system work area is adjusted when in user mode to cover the taskbar area The a y system work area has to be adjusted to exclude the taskbar area in administration LOG_ERROR failure h mode AppLock was unable to adjust this area Shift pressed The Shift key has been pressed and trapped by the HotKey processing LOG_EX Processing the hotkey and backdoor entry LOG_EX f o LOG_ Show taskbar The taskbar is now being made visible and enabled PROCESSING 3 49 Message Explanation and or corrective action Level Switching to admin backdoor Switching to admin hotkey press Switching to a
75. with 128 MB may only report 99 MB memory since 29 MB is used by the operating system This is actual DRAM memory and does not include internal flash used for storage 3 151 Memory Tab System Properties ka OK R General Memory Device Name Copyrights Move slider to the left for more memory to run programs Move slider to the right for more storage room Only unused RAM can be adjusted Storage LEO IE EE O ET ATEU EITIC COU RIOGAIN Program Memory Eo A M Memory Allocated 98304KB Allocated 373196KB In Use 6092KB In Use 66120KB Move the slider to allocate more memory for programs or storage If there isn t enough space for a file increase the amount of storage memory If the mobile device is running slowly try increasing the amount of program memory Device Name Tab System Properties E OK E General Memory Device Name copyrights These settings are used to identify your Windows CE device to ho other computers gt gt Please type a name without any spaces and a short description Device name THOR Device description Honeywell_vM1 The device name and description can be changed by the user Enter the name and description using either the keypad or the Input Panel and tap OK to save the changes This information is used to identify the Thor VM1 to other computers and devices 3 152 Copyrights Tab System Properties General Memory Device Name Copyrights e
76. with another 2nd key press For example Press 2nd and F1 to generate F11 Ctrl and Alt Key LEDs Note Ctrl and Alt keys and the associated LEDs are not present on the 12 key version When the modifier keys Ctrl or Alt are active the LED located next to the key is illuminated The modifier key remains active until e The modifier key is pressed again or e A non modifier key is pressed USB Keyboard Mouse A standard USB keyboard or mouse can be attached to the Thor VM1 using the appropriate dongle cable The dongle cable attaches to the Thor VM1 and provides a USB connector Please refer to documentation provided with the USB keyboard or mouse for more information on their operation 2 29 LED Functions System LEDs Connection LEDs 2nd LED Shift CapsLock LED Shift CapsLock LED Ctrl LED Alt LED NO oO FP WD 64 key keyboards only 2 30 System LEDs 1 SYS System Status LED O UPS 2 UPS Uninterruptible Power Supply LED 3 SSD Solid State Drive LED SYS System Status LED LED Behavior System State e On Solid Green e On but Backlight Off e On but Display Off Green blinking very slowly External power present e Suspend 1 2 sec on 4 1 2 sec off Off e Off External power not present e Suspend Green blinking slowly External power present 1 2 sec on 1 1 2 sec off CPU temperature less than 20 C Heater warming CPU for 30 seconds Green blinkin
77. 0 100 100 200 MAC 00 02 2d 00 00 00 This screen provides information on the radio e The profile being used Channel 6 Bit Rate 48 Mbps SOC Tx Power 63 mW Beacon Period 102 DTIM 1 MSionalstfenath 57 dem Signal Quality 83 e The status of the radio card down associated authenticated etc e Client information including device name IP address and MAC address e Information about the Access Point AP maintaining the connection to the network including AP name IP address and MAC address e Channel currently being used for wireless traffic e Bit rate in Mbit e Current transmit power in mW e Beacon period the time between AP beacons in kilomicroseconds one kilomicrosecond 1 024 microseconds e DTIM interval A multiple of the beacon period that specifies how often the beacon contains a delivery traffic indication message DTIM The DTIM tells power saving devices a packet is waiting for them For example if DTIM 3 then every third beacon contains a DTIM e Signal strength RSSI displayed in dBm and graphically e Signal quality a measure of the clarity of the signal displayed in percentage and graphically There are no user entries on this screen Note After completing radio configuration it is a good idea to review this screen to verify the radio has associated no encryption WEP or authenticated LEAP any WPA as indicated above 6 11 Diags Tab Start
78. 0 0 2 ccc cee ee eee ee ee ee ar cnn nn cnn nn 3 86 Bar Code Data Match Edit Buttons 2 222 220 0020 3 86 Match List Rules 2 2 22 e cece c cece cece cece cece cece ce eeeceeeeeeeeeeeeeeees 3 87 Add Prefix Suffix Control 00 00000002 c cece cece cece ccc ccc cc ns 3 88 S111 90 016 ooccccccccc cnn ronronner onnon n rnnr nnno aroaro a eran neron o rror e rnrn rnern 3 88 Ctrl Chan Mapping s2 3 scscco ce ecadaeeeces a nea a aa de a loo a dae ii beat 3 89 Translate Allo st e a dee eee 3 89 Paramotor esee E O e ei NSE 3 89 Translate All earns a econ te a ce sot a e doo E 3 89 Character a eee 3 90 RREDIAG CMO IMs a 5 oe one acess e E E 3 90 LISTBOX gos tee Sets fsa ace te eet ae Sea a E A ts ots deta eesti eile oa ese as 3 90 ASSIGN BUON 2 3 265 lt 0 cnc cise dec vie tie anand ad donde onaecasagcseesascsbacacace secacack bate seceenaetdeesneuaheteceedeeane ds 3 90 Delete BUON ne 3 90 Custom Identitiers o 3 91 PP Naa ok Eas feo a eee ano Seen 3 91 A toate erate ae EE eee te een cae EE eeeu eco aera 3 92 Control Code Replacement Examples 2 2 2 222222 ccccc cece cece cece cee cee ce ccc cceeeeececeeeeceeteeeeees 3 93 Bar Code Processing Examples 2 02202 2 222 ccc cece cece cece cece cece cece eee cece cece cece cece ee ceeeeeeeeeseeeenes 3 94 Processing Ta ness 3 95 SN A A te tee ea E s gokecadeee donee cate teceteae 3 96 Length Based Bar Code Stripping 00 00020 e cece eee e cece cece
79. 000000000000 Pee R Service not activated Authentication pap cHap pS Data Connection Test Service Programming Code Validate SPC Connect System Identification Number User Name Mobile Directory Number Password Data Connection test only Mobile Indentification Number Save Connection Data Disconnect Activation Type There are two activation methods Automatic and Manual Automatic Activation 1 Select the Automatic radio button for Activation Type 2 Automatic activation requires an Activation Code Enter the Activation Code in the Activation Code text box and tap Activate 3 All other text boxes are grayed out as no additional entries are required for automatic activation 4 Verify the activation process is successful by reviewing the message below the Activation Type group Manual Activation 1 Select the Manual radio button for Activation Type 2 Enter the Service Programming Code System Identification number Mobile Directory number and Mobile Identification Number in the appropriate text boxes 3 The Activation Code text box is not used 3 108 4 Tap Activate 5 Verify the activation process is successful by reviewing the message below the Activation Type group Autoconnect When checked Autoconnect is enabled The Connection Manager automatically connect when necessary such as when Internet Explorer is launched Data Connection Test Tap the Connect button
80. 1 Signal Quality GPS SPS Mode fix valid Elv 343 3000 Automatic Fix 3D Speed 0 0000 15 59 34 6364 Reset All Data Tap the Start button to initiate a scan for GPS data The information on this tab is updated every 3 seconds Tap the Reset All Data button to clear all GPS data from the Gobi radio You must confirm that you want to rest the data Use this button with caution as it takes a longer time for the GPS to establish a valid fix after the data is cleared After the GPS establishes a coordinate fix the Where am button is active Tapping this button activates Internet Explore to display a Google map of the current location The GPS time and NMEA National Maritime Electronics Association string count are displayed at the bottom of this tab 3 111 About This tab displays information on the Gobi 2000 radio installed in the Thor VM1 Gobi Connection Manager 3 112 Input Panel Start gt Settings gt Control Panel gt Input Panel Set the current Thor VM1 keys and data input method Factory Default Settings Input Panel tab Input Method Keyboard Allow applications to change input panel state Enabled Options button Keys Small keys Use gestures Disabled Input Panel Properties E OK x Input Panel Current input method To quickly switch input methods B tap the Input Panel arrow and then tap the desired method from the Key board menu that appears Allow applications
81. 140 F 30 C to 60 C non condensing ESD 8 KV air 4kV direct contact Standard Up to 90 non condensing at 104 F 40 C Extended temperature 100 Operating Humidity Network Card Specifications Summit 802 11a b g Bus Interface 32 bit SDIO Secure Digital I O varies by regulatory domain 5 15 to 5 82 GHz IEEE 802 11a DSSS OFDM FCC 1 11 36 40 44 48 149 153 157 161 Channels ETSI 1 13 36 40 44 48 Bluetooth Bus Interface CompactFlash Enhanced Data Rate Up to 3 0 Mbit s over the air Connection Noless than 32 80 feet 10 meters line of sight Bluetooth Version 2 0 EDR Operating Frequency 2 402 2 480 GHz B013455 7 4 Chapter 8 Key Maps 64 Key QWERTY Keypad Key Map YW A a n 0 o E E E e a daa Because the keyboard only has 64 keys all functions are not visible or printed on the keyboard Therefore the Thor VM1 keyboard supports what is called hidden keys keys that are accessible but not visible on the keyboard A key or combination of keys can be remapped to provide a single keypress a string of keypresses or to execute an application or command Key remapping is configured via the KeyPad option in the Control Panel Start gt Settings gt Control Panel gt KeyPad Remapped keys persist across a warmboot or power cycle The keyboard does not have a NumLock indicator or key NumLock is always On The warmboot behavior of CapsLo
82. A CCKM WPA2 AES or WPA2 CCKM for encryption and complete other entries as detailed in this section Summit Client Utility 7 foki x Main Profile status Diags Global Profile Default y New Rename Delete Scan E C Radio Encryption EAP type ap wea TKIP peap GTC y WEP keys PSKs Credentials Save Changes Commit See Sign On vs Stored Credentials for information on entering credentials Click the Credentials button e No entries except the CA Certificate Filename are necessary for Sign On Credentials as the user will be prompted for the User Name and Password when connecting to the network Enter these items as directed below Credentials A E User Password fo CA cert a E Validate server 7 Use MS store Enter the Domain Username if the Domain is required otherwise enter the Username Enter the password Leave the CA Certificate File Name blank for now Click OK then click Commit Ensure the correct Active Profile is selected on the Main Tab See Windows Certificate Store vs Certs Path for more information on certificate storage 6 29 Once successfully authenticated import the CA certificate into the Windows certificate store Return to the Credentials screen and check the Validate server checkbox Note Some servers may be configured to allow only a single use of the password for PEAP GTC In this case wait for the token to update with
83. B select Start gt Settings gt Control Panel gt PC Connection Tap the Change button From the popup list choose USB Client This will set up the mobile device to use the USB port Tap OK and ensure the check box for Allow connection with desktop computer when device is attached is checked Tap OK to return to the Control Panel If desired any control panel windows may be closed Connect the USB cable to the PC the host and the mobile device the client as detailed below USB will start automatically when the USB cable is connected not requiring you to select Connect from the start menu When the Thor VM1 loses connection e g enters Suspend Mode etc the connection to ActiveSync will be lost When the Thor VM1 resumes the ActiveSync session will automatically re connect Cable for USB ActiveSync Connection VM1052CABLE Thor VM1 Dongle cable provides USB type A connector e D9connector labeled as 1 below connects to the USB port on the Thor VM1 dock e The USB type A connector labeled as 3 below on cable connects to a USB port on a PC or laptop e The USB host port 2 connector on the dongle cable does not need to be connected 4 2 Explore From the ActiveSync Dialog on the Desktop PC tap the Explore button which allows you to explore the mobile device from the PC side with some limitations You can copy files to or from the mobile device by drag and drop You will not be allowed to delete fi
84. Blanking Box or user supplied switch e Acable from the serial port to the box or switch A Do not enable Screen Blanking until the cable is properly connected to the specified COM port Screen blanking allows the Thor VM1 display to automatically be turned off whenever the vehicle is in motion When the Thor VM1 display is off due to vehicle motion the integrated keypad backlight remains on Screen blanking requires a user supplied cable properly connected as shown below To enable blanking check the Enable screen blanking checkbox The default is disabled Use the Screen on delay to specify the period of time in ms milliseconds between when the vehicle stops and the Thor VM1 screen turns on For example use the delay if the switch end of the cable is attached to the vehicle s accelerator pedal Release of the accelerator may mean the truck is coasting to a stop rather than stationary Configure the delay to allow time for the vehicle to coast to a stop The default value is 1000 ms Specify the COM Port to which the screen blanking cable is attached either COM1 or COM2 If a COM port is in use by another application such as DC Wedge that COM port is grayed out and cannot be selected for screen blanking To disable screen blanking uncheck the Enable screen blanking checkbox Current Level LCD brightness displays the current LCD brightness level The default brightness is 100 e LCD brightness can be manually adjusted using the
85. Connection Security Privacy Advanced and Popups options for Internet Internet Options ee connectivity Select a Key Map or font Set key repeat delay and key repeat rate phone software and microphone Network and Dial Up Options Set network driver properties and network access properties Network Capture Set network logging options Set various device specific configuration options Set the mobile device owner details name phone etc Enter notes Enable disable Owner Owner display parameters Enter Network ID for the device user name password domain Password Set OS access password properties for signon and or screen saver 3 21 PC Connection Peripherals Power Regional Settings Registry Remove Programs Screen Control Stylus System Terminal Server Client Licenses Volume and Sounds WiFi Control the connection between the mobile device and a local desktop or laptop com puter Enable or disable defroster if installed Set Power scheme properties Review device status and properties Set appearance of numbers currency time and date based on country region and lan guage settings Review System and Computer data and revision levels Adjust Storage and Program memory settings Enter device name and description Review copyright notices Select a server client license from a drop down list Enable disable volume and sounds Set volume parameters and assign sound WAV files to events
86. Encryption is based on the length of the user s passcode Bluetooth simultaneously supports one printer as a slave Bluetooth device and one scanner either as a slave or as a master Bluetooth device e TheLED onthe Bluetooth scanner illuminates during a scanning operation e Barcode data captured by the Bluetooth scanner is manipulated by the settings in the Thor VM1 Data Collection control panel applet e Multiple beeps may be heard during a bar code scan using a mobile Bluetooth scanner beeps from the mobile Bluetooth scanner as the bar code data is accepted rejected and other beeps from the Thor VM1 during final bar code data manipulation WWAN WWAN Wireless Wide Area Networking is available on the Thor VM1 A slot is provided for a SIM card GPS GPS Global Positioning System is available on the Thor VM1 Power Vehicle DC Power Supply Vehicle power input for the Thor VM1 dock is 10V to 60V DC and is accepted without the need to perform any manual operation within the Thor VM1 dock The dock provides a conditioned power output for the Thor VM1 By using a specified DC to DC adapter input voltage of 72 144V DC nominal can be accepted If 10 to 60V DC power is not available for example in an office environment an optional external Universal Input Power Supply can be used to convert AC wall power to an appropriate DC level Power input is fused for protection and the fuse is externally accessible External AC Po
87. F WN SF Oo g Select the modifier key from the Modifier Mode options Select the key to be remapped from the Key pulldown list Select Launch App1 4 from the remapped key from the Remapped Key pulldown list Click on the LaunchApp tab Make sure the EXE radio button is selected Inthe text box App1 4 corresponding to the number selected for Launch App1 4 enter the application to launch If any parameters are needed for the application click on the OPT radio button This clears the text box though the application name is saved Enter the desired parameters in the appropriate text box Click OK to save the result and close the control panel If the KeyMap tab is accessed again the application plus any specified parameters is displayed in the Key Sequence text box when the remapped key is again selected 3 120 Remap a Command Select the modifier key from the Modifier Mode options Select the key to be remapped from the Key pulldown list Select RunCmd 1 4 from the remapped key from the Remapped Key pulldown list Click on the RunCmd tab Make sure the FILE radio button is selected In the text box Cmd1 4 corresponding to the number selected for RunCmd1 4 enter the desired command NO oF WN gt If any parameters are needed for the command click on the PARM radio button This clears the text box though the command is saved Enter the desired parameters in the appropriate text box co Click OK to save the re
88. Honeywell Thor VM1 Vehicle Mounted Computer Microsoft Windows Embedded CE 6 Operating System Reference Guide Disclaimer Honeywell International Inc HII reserves the right to make changes in specifications and other information contained in this document without prior notice and the reader should in all cases consult HII to determine whether any such changes have been made The information in this publication does not represent a commitment on the part of HII HII shall not be liable for technical or editorial errors or omissions contained herein nor for incidental or consequential damages resulting from the furnishing performance or use of this material This document contains proprietary information that is protected by copyright All rights are reserved No part of this document may be photocopied reproduced or translated into another language without the prior written consent of HII 2011 2012 Honeywell International Inc All rights reserved Web Address www honeywellaidc com RFTerm is a trademark or registered trademark of EMS Technologies Inc in the United States and or other countries Microsoft Windows ActiveSync MSN Outlook Windows Mobile the Windows logo and Windows Media are registered trademarks or trademarks of Microsoft Corporation Intel and Atom are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries Summ
89. Information on Mobile Devices 2 22 2 cece cece cece eee e cece eccceececccceeceeees 5 6 User Interface 02 22 eee 5 7 Enabler Configuration ii aaea Aaaa AAAA AA E AADEL A DEE oaao a oraraa 5 7 File Menu Option 00 e a 5 8 Avalanche Update using File gt Settings 0 2020002222 c cece cece ccc ccc daradara c eee eeeeeeteeeeeeeees 5 9 Menu Option seo Sieh rca e tector sats seh Gdah UU thle sey coe Sade DN Meds 5 9 Connection cc a ee ee ee ee ee eve eben ee 5 10 server Contact 2 vege see seek eke ee lees E ed eb sd See ee ed oa eb Sedo ee ee eee laden adsl eee 5 11 De eS ee ero ee eer et 5 12 AECE AAA se so ee gat se ee St E E dee Se yee i A 5 13 DiSplay 335 ss oteeth eet ee sores seen es States dd arden td ii oh o 5 15 NAS KDA ote Sass E eee nse A Ae eae decisis ot oe a 5 16 Execution utero tr eee tee eet 5 17 SCAN CONG ee ea ee a ade Seas ee te eel de oad Ae Moe eee do gall bees ee eed cee desl sees 5 18 MMOMGUIS 22252 22 252 Sark Sod eet idol 5 19 Adapters saa eset A ete tigen eosin A ote el E 5 21 Sn A eee fen ee eae 5 24 NIC pe ae cee A A A stearate A sss 5 25 Using Remote Management nn 5 25 Using express Scan oo e cece cece ce ceececccececceccccceccecceceececceceececeeceeeeeeeeeeeeeeeeeeeeeeeteneennes 5 26 step Create Bar Codes 2 20 12 conten deed ed esos 5 26 Step 2 Scan Bar COS ii e 5 26 Step 3 Process Completion 2 222 000 00ccceeeee 5 28 Chapter 6 Wireless Network Connections__
90. O EVENT SHALL ANY LIABILITY OF HII ARISING IN CONNECTION WITH ANY PRODUCT SOLD HEREUNDER WHETHER SUCH LIABILITY ARISES FROM A CLAIM BASED ON CONTRACT WARRANTY TORT OR OTHERWISE EXCEED THE ACTUAL AMOUNT PAID TO HII FOR THE PRODUCT THESE LIMITATIONS ON LIABILITY SHALL REMAIN IN FULL FORCE AND EFFECT EVEN WHEN HII MAY HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH INJURIES LOSSES OR DAMAGES SOME STATES PROVINCES OR COUNTRIES DO NOT ALLOW THE EXCLUSION OR LIMITATIONS OF INCIDENTAL OR CONSEQUENTIAL DAMAGES SO THE ABOVE LIMITATION OR EXCLUSION MAY NOT APPLY TO YOU All provisions of this Limited Warranty are separate and severable which means that if any provision is held invalid and unenforceable such determination shall not affect the validity of enforceability of the other provisions hereof Use of any peripherals not provided by the manufacturer may result in damage not covered by this warranty This includes but is not limited to cables power supplies cradles and docking stations HII extends these warranties only to the first end users of the products These warranties are non transferable The duration of the limited warranty for the Thor VM1 is 1 year The duration of the limited warranty for the Thor VM1 Quick Mount Smart Dock is 1 year The duration of the limited warranty for the Thor VM1 Vehicle Mount Assembly is 1 year The duration of the limited warranty for the Thor VM1 internal UPS battery is 1 year The duration of the lim
91. Open Summit Client Utility 7 foki x Main Profile status Diags Global lo Encryption EAP type wea PSK None gt WEP keys PSKs Credentials Click the WEP keys PSKs button For Passphrase enter 8 63 chars For PSK enter 64 Hex chars A This value can be 64 hex characters or an 8 to 63 byte ASCII value Enter the key and click OK Once configured click the Commit button Ensure the correct Active Profile is selected on the Main tab and warmboot The SCU Main tab shows the device is associated after the radio connects to the network 6 37 Certificates Note Please refer to the Security Primer to prepare the Authentication Server and Access Point for communication Note Itis important that all dates are correct on the Thor VM1 and host computers when using any type of certificate Certificates are date sensitive and if the date is not correct authentication will fail Quick Start Root Certificates are necessary for EAP TLS PEAP GTC and PEAP MSCHAP 1 Generate a Root CA Certificate and download it toa PC 2 Connect the Thor VM1 to the desktop PC using ActiveSync and copy the certificate to the Thor VM1 System folder 3 Install the Root CA Certificate User Certificates are necessary for EAP TLS 1 Generate a User Certificate and Private Key file and download it to a PC 2 Connect the Thor VM1 to the desktop PC using ActiveSync and copy the certificate and private key
92. Primary Certification Authority Class 3 Public Primary Certification Authority Entrust net Certification Authority 2048 Entrust net Secure Server Certification Authorit Equifax Secure Certificate Authority GlobalSign Root CA ly Import View Remove Lists the certificates trusted by you Tap the Import button Import Certificate or Key OK Fl From a File O From a Smart Card Make sure From a File is selected and tap OK Select a Certificate File J My Documents Shortcut to Office Templates EE z Name Type Certificates y 6 42 Using the explorer buttons browse to the location where you copied the certificate select the certificate desired and tap OK Root Certificate Store Do you want to ADD the following certificate to the Root Store Subject doe SUPPORT LOCAL Issuer mickey LOCAL Time Validity Thursday July 01 2004 through Tuesday July 01 2014 Serial Number 12345678 SOABCDEF 12345678 9DABCDEF Tap Yes to import the certificate Once the certificate is installed retum to the proper authentication section earlier in this manual 6 43 Generating a User Certificate The easiest way to get the user certificate is to use a browser on a PC to navigate to the Certificate Authority To request the user certificate open a browser to http lt CA IP address gt certsrv Sign into the CA with the usemame and password of the
93. Primary Events A User Primary Event transitions the Thor VM1 to DO On mode When no user event happens for the specified time period the Thor VM1 transitions to D1 User Idle then D2 System Idle and then D3 Suspend Timeout periods are set via the Schemes tab in the Power control panel User primary events include e Any key press on the keypad e Touchon the touch screen e USB data entry from a USB keyboard or mouse System Primary Events A System Primary Event allows the Thor VM1 to transition to D2 System Idle but the Thor VM1 does not enter D3 Suspend as long the system event occurs System primary events include e Serial data transfer e USB data transfer Wake Source Events These events wake the Thor VM1 from suspend e Power button e Touchon the touch screen e Any keypress on the keyboard e USB connect disconnect e Truck power on or off i e ignition key e RTC e Bluetooth connection e External power connection e Serial port CTS control line e Headset connection this is not enabled by default but can be configured to wake the Thor VM1 Events generated by these actions are not processed For example the key press or touch screen tap that wakes the Thor VM1 is ignored The following events DO NOT wake the Thor VM1 from suspend e Bluetooth keyboard or mouse e USB host data unless enabled via API e USB host connection 2 7 e SDIO interrupt e Serial data e 802 11 radio e External power disconn
94. Properties El OK Fa PC Connection mo These settings control the connection between your Windows J CE device and desktop computer Warning Adjusting these Qe settings may result in an inability to connect with your desktop computer Allow connection with desktop computer when device is attached Connect using USB Client Tap the Change button to change the direct connect setting Tap the drop down box to view a list of pre configured connection settings 3 139 Peripherals Start gt Settings gt Control Panel gt Peripherals This panel is used to enable and disable the touch screen defroster Factory Default Settings Defroster Enabled if installed Defroster Trip Point 40 C 104 F Note Settings have no effect if the defroster is not installed Peripherals fa OK A Defroster is not installed Defroster is OFF Defroster O Enabled Disabled Test Defroster trip point 40 y degrees C The screen displays the information about the defroster e If the defroster is installed e The current state of the defroster ON or OFF e Ifthe defroster is Enabled or Disabled e The defroster trip point Tap the Test button to determine the presence of the defroster Use this button when the front panel of the Thor VM1 has been swapped For example if the Thor VM1 did not contain a defroster but a new front panel with a defroster is installed tap the Test button to update the defrost
95. Settings Notifications Volume One level below Loud Key click Disabled Screen tap Disabled Scheme LOUD Good Scan and Bad Scan Sounds Volume amp Sounds Properties E OK E Volume Sounds a Loud Enable sounds for M Events warnings beeps and system events M Applications program specific and all other sounds Notifications alarms appointments and reminders Enable clicks and taps for 7 Key clicks O loud Soft 7 Screen taps lod Soft n a 3 155 Volume amp Sounds Properties El OK E volume Sounds Event A indows CE GIS Asterisk Close Program gt Critical Stop Default Sound Empty Recycle Bin g Exclamation The volume setting is stored in the registry and is recalled at power on Note Rejected bar codes generate a bad scan beep In some cases the receipt of data from the scanner triggers a good scan beep from a tethered scanner and then the rejection of scanned bar code data by the bar code processing causes a bad scan beep from the mobile device on the same data Good Scan and Bad Scan Sounds Good scan and bad scan sounds are stored in the Windows directory as SCANGOOD WAV and SCANBAD WAV These are unprotected WAV files and can be replaced by a WAV file of the user s choice By default a good scan sound on the Thor VM1 is a single beep and a bad scan sound is a double beep 3 156 WiFi Control Panel Start gt S
96. Technical Assistance for upgrade details 3 132 Communication Options on this tab configure communication options for the Thor VM1 Options El OK Eg Communication Misc Status Popup Enable TCP IP Version 6 7 Allow Remote Desktop Autologon Note RDP file must be saved in System Folder Autolaunch TimeSync Enable TCP IP Version 6 By default IPv6 is disabled on the Thor VM1 Check this checkbox to enable Pv6 Allow Remote Desktop Autologon By default Remote Desktop Autologon is disabled Check this checkbox to enable Remote Desktop Autologon Note The RDP file must be saved in the System folder When prompted use the Save As button to save the RDP file is the System directory If the RDP file is saved in the default root folder location the RDP file will not persist across a warmboot Autolaunch TimeSync By default TimeSync does not automatically run on the Thor VM1 To enable TimeSync to run automatically on the Thor VM1 check this checkbox Synchronize with a Local Time Server By default GrabTime synchronizes via an Internet connection To synchronize with a local time server 1 Use ActiveSync to copy GrabTime ini from the My Device gt Windows folder on the mobile device to the host PC 2 Edit the copy of GrabTime ini on the host PC Add the local time servers domain name to the beginning of the list of servers You can optionally delete the remainder of the l
97. VM1 e Ifthe UPS battery is not charged before the timeout expires the fault LED is lit e Ifthe UPS battery cannot be charged due to a temperature extreme the fault LED is lit Move the Thor VM1 toa different location to charge the UPS battery 2 4 When external power is removed the UPS automatically powers the Thor VM1 with no user intervention When running on UPS power the power management timeouts may be different than when vehicle power is applied The UPS allows the Thor VM1 to continue operation when not mounted in a dock or when the vehicle battery is being swapped The UPS battery is designed to power the Thor VM1 for a minimum of 30 minutes at temperatures of 20 C 4 F or greater For the extended temperature version of the Thor VM1 the UPS provides a minimum of 10 minutes of operation below 20 C 4 F up to 30 C 22 F If operating on UPS power and the UPS battery becomes critically low the Thor VM1 performs a controlled shutdown If there is no external power available there must be 10 or greater power in the UPS battery or the Thor VM1 does not power on The UPS status LED and the Battery Control Panel can be used to monitor the state of the UPS battery The UPS battery can be replaced by the user Backup Battery The Thor VM1 has a permanent Lithium battery installed to maintain time date and CMOS setup information for a minimum of 90 days The lithium battery is not user serviceable and should last
98. a hotkey press by the administrator PROCESSING Taskbar Hoole aie unable to control the taskbar to prevent the locked application from re LOG_ERROR Taskbar hook OK AppLock successfully installed control of the taskbar LOG_EX Timeout looking for app window ToUser after admin not at boot ToUser after admin app still open ToUser after admin no app or cmd line change Unable to move desktop Unable to move taskbar failure Unhook wndproc failure Unhooking taskbar After the application is launched AppLock must wait until the application has initialized itself before proceeding The application did not start successfully and LOG_ERROR AppLock has timed out The user mode switch is attempted when the device boots and after the administrator presses the hotkey The mode switch is being attempted after a hotkey LOG_EX press The switch to user mode is being made via a hotkey press and the administrator has ee LOG_EX left the application open and has not made any changes in the configuration If user mode is being entered via a hotkey press the administrator may have left the configured application open If so AppLock does not launch the application again E NENA LOG_EX unless a new application or command line has been specified otherwise it just locks it The desktop is moved when switching into user mode This prevents them from being visible ifthe application is exited and restarted by the timer This erro
99. ailed in this section Summit Client Utility 7 foki x Main Profile status Diags Global Profile Default y New Rename Delete Scan E Cc Radio Encryption EAP type ap wea TKIP JEAP TLS y WEP keys PSKs Credentials Save Changes Commit See Sign On vs Stored Credentials for information on entering credentials Click the Credentials button e No entries except the User Certificate Filename and the CA Certificate Filename are necessary for Sign On Credentials as the user will be prompted for the User Name when connecting to the network e For Stored Credentials User Certificate Filename and the CA Certificate Filename must be entered Enter these items as directed below Credentials E x User User Cert fl CA cert E _ Validate server Use MS store Enter the Domain Username if the Domain is required otherwise enter the Username Select a user certificate from the Windows certificate store Use the Browse button to locate the User Cert from the certificate store Highlight the desired certificate and press the Select button The name of the certificate is displayed in the User Cert box 6 35 Some versions of the SCU require a User Cert password If this entry field is present enter the password for the user certificate in the User Cert pwd box If there are no user certificates in the Windows certificate store follow these instructions
100. ails on creating barcodes Step 2 Scan Bar Codes For each mobile device to be configured please follow these instructions Start eXpress Scan on the Thor VM1 by double clicking the eXpress Scan icon Enter the bar code password if any eXpress Scan passcode _ Enter Passcode Press Start before scanning the first barcode Click Start Bar code 1 must be scanned first The scanned data is displayed in the Data text box The password if any entered above is compared to the password entered when the bar codes were created 5 26 eXpress Scan Scan Barcode 1 into Data field If the passwords match the bar code data is processed and the screen is updated to reflect the number of bar codes included in the set If the passwords do not match an error message is displayed The current screen can be closed using the X box in the upper right corner The password can be re entered and Bar Code 1 scanned again eXpress Scan Scan next barcode into Data field The remaining bar codes may be scanned in any order After a bar code is scanned that bar code is removed from the Remaining list and placed in the Scanned list 5 27 Step 3 Process Completion After the last bar code is scanned the settings are automatically applied Configuring settings Please Wait Once configured the Thor VM1 is warmbooted Once connected to the wireless network and the Mobile Device Serv
101. alled the touch screen Select the desktop background image and appearance scheme for the Thor VM1 Using the options on the Backlight tab set the display backlight and keypad backlight timers when running on battery or external power Adjust the settings and tap the OK button to save the changes Saved changes take effect immediately Factory Default Settings Background tab Image Windows CE Image on background Disabled Appearance tab Schemes Windows Standard Backlight tab Background Display Properties Fs Windows Embedded CE 6 0 Image Windowsce y J Tile image on background There is very little change from general desktop PC Display Properties Background options Select an image from the dropdown list or tap the Browse button to select an image from another folder to display on the Desktop and then tap the OK button to save the change The change takes effect immediately 3 103 Appearance Display Properties Background Appearance Backlight Scheme SE 2 X iindows standard e Item Desktop y There is very little change from general desktop PC Appearance options Select a scheme from the dropdown list and make changes to the parameters The default is High Contrast White for monochrome displays and Windows Standard for color displays Tap the Save button to save any changes renaming the scheme if desired Tap the Delete button to delete schemes Tap the Apply button to apply t
102. ameters on the Main tab and the COM tab s apply to this device only Bar code manipulation parameter settings on the Data Options tab are applied to the incoming data resulting from successful bar code scans received by the Thor VM1 for processing The successful bar code scan data may be sent by e awireless Bluetooth Handheld Scanner e oratethered serial scanner 3 73 Bar Code Readers The Thor VM1 can use the following external bar code readers e Tethered hand held scanners are tethered to a serial port or a USB host port on the Thor VM1 and are configured by scanning the engine specific bar codes in the scanner manufacturer s programming guide The manufacturer s guides are usually shipped with the bar code reader e Wireless hand held Bluetooth scanners are configured by scanning the engine specific bar codes in the scanner manufacturer s programming guide The manufacturer s guides are usually shipped with the bar code reader e The body worn Bluetooth Ring Scanner module may be using a Symbol 4400 Ring Imager or a Symbol 955 Ring Scanner The BTRS module is configured by scanning the bar codes in the Bluetooth Ring Scanner Guide Return to Factory Default Settings After scanning the engine specific bar code to return the scanner imager to factory default settings the next step is to open the bar code wedge panel on the mobile device collecting the scanned data Click the OK button to close the panel This action will synchro
103. an empty line in the Custom ID list The Add button changes to Insert Enter data into both Insert the Name and ID Code fields and click the Insert button The data is added to the selected line in the Custom IDs list Edit Double click on the item to edit Its values are copied to the text boxes for editing The Add button changes to Replace When Replace is clicked the values for the current item in the list are updated Clear All When no item in the Custom IDs list is selected clicking the Clear All button clears the Custom ID list and any text written and not yet added or inserted in the Name and ID Code text boxes The Clear All button changes to a Remove button when an item in the Custom IDs list is selected Remove Click the desired line item and then click the Remove button to delete it Line items are Removed one at atime Contents of the text box fields are cleared at the same time Notes 3 86 Prefix and Suffix data is always added on after stripping is complete and is not affected by any stripping settings If the stripping configuration results in a 0 length bar code a good beep will still be emitted since bar code data was read from the scanner Match List Rules The data in the match list is processed by the rules listed below Strings in the list will be searched in the order they appear in the list If the list contains ABC and AB in that order incoming data with ABC will match first and the AB will have
104. anaiona nannan 3 97 AAA coed abe seis clea Sess cate oe hae A 3 99 Date Time 2 00 e cece cence cece cece cece cecccececcceeeceeeeeeeeeeeenteeens 3 101 DM atico cid 3 102 A A ee gs cee een ee ete an ne eee ee 3 103 Backgro nd ss ee ee a eee ac Sen es eee Se et ae 3 103 APPearance cosido stats See se ee es Sea co ack eke a da le Cod es De o Shas o S 3 104 vii A E cotasauce 3 104 Gobi Connection Manager 2 2 2 eee cee cece cece cece cece cece cece eee ce cece cece AEDA Anaa naonana 3 105 Witla Sis see goa es at ee fe Bote seca gba oat A EE AA 3 105 SIM Card Installation 2 2 2 0 0 20222 c ccc cece cece ccc ccc ccc cece cece cece ee cece aaraa aaraa eaaa aaraa 3 105 PACUIV NC asta oes act eee ae es nel cee A 3 106 HOME cn aX oa ta aa jose tie tenn ot tee eet tee ote ce tae terete tes 3 107 COMA acc rt tia a it TOD RE Or EST 3 108 Activation Type cnn 3 108 AUMOCONMEGCL S524 o tdo ld lil alas 3 109 Data Connection Test cusscraslocesitrtacr ir cis caia hoe 3 109 A a ee eee ee ne sete 3 110 AUTOCOMMECL Scare 35 fa ee rs celta a ett eet ee ee Ae oe oe aka oe 3 110 Data Connection TeSt 2 0 cece cece cece cece cece ec eeeeeeeeeeneeeeneeeenneneeneeecencsccsceecuaceeeeeceeeeceaees 3 110 AA E A EOE O II ee IR PAD A ae eee 3 110 A OT AE E OTE A RR OTe 3 112 A AAA sie tet tnt seu O et aie ee tee oo teh tata SF 3 113 Transcriber a eee eee eee cece cece eeeeeeeceeccecacuccceceeceececceeecceececcececeeeeeeeeeeeeeeeee
105. and AppLock Help 3 40 Options Panel AppLock contains several types of delays and timeouts to accommodate different applications Please note that the delays specified on the Launch panel are delays before AppLock attempts to start the specified application s The timeouts specified on this panel are delays after AppLock has attempted to launch the application Administrator Control fit OK ES Application Security Options Status Launch timeout e0000 Replace timeout 20000 Restart timeout 20000 Launch timeout This timeout specifies the period of time for AppLock to wait for the application to initially launch after the application has been called For example if the application takes time to launch and then initialize before a display window is created use this delay to specify the delay period Replace timeout This timeout specifies the period of time for AppLock to wait after an initial screen like a password prompt screen is replaced by another application window Restart timeout This specifies the period of time for AppLock to wait for an application to restart If the application fails to restart automatically AppLock then proceeds according to the options selected when the application was configured on the Application and Launch panels 3 41 Status Panel Use the Status panel to view the log of previous AppLock operations and to configure which messages are to be recorded du
106. arameters if desired Install accessories Tap Start gt Settings gt Control Panel gt Administration icon Assign applications on the Control single application or Application dual application tab screen Assign a password on the Security tab screen Select a view level on the Status tab screen if desired Tap OK Press the hotkey sequence to launch AppLock and lock the configured application s eo AN oa FON The device is now in end user mode Administration Mode Administration mode gives full access to the mobile device hardware and software configuration options The administrator must enter a valid password when a password has already been assigned before access to Administration mode and configuration options are allowed The administrator can configure the following options e Create change the keystroke sequence to activate administrator access e Create change the password for administrator access e Assign the name of the application or applications to lock e Select the command line of the application to lock In addition to these configuration options the administrator can view and manage the status logs of AppLock sessions Administrator default values for this device Administrator Hotkey Shift Ctri A Note You must use an extemal keyboard with the 12 key version of the Thor VM1 to enter the Administrator Hotkey Password none Application path and name none Application command line none 3 28
107. art FTP Server Stop FTP Server o oo eee cece cece cece ccc cece ccccecceccececcecceeeeeeeeeeeeeeeeeteeeenes 3 13 UNM Se 2 haz oe css ed le hele A A canbe Ls nuit ead ere 3 13 AA gee ee te ee a ee Nee de ei ieee 3 13 Command Prompt 2 222 2222 cece ccc cece cece cece cece cece cece cece ee ee cece cece eee eeeeeeeeeeeeeeeeeeeeseseeeeeees 3 14 EAPO S SCAM este etc oe ieee cere RN 3 14 Intemet EXplorer teo te ee ete i ee el ee es 3 14 Media Player o ccoountooecincio dat lt ld ia si iii 3 14 File ViewerS cc nn cnn 3 15 Microsoft WordPad o ooscrseniicunrt eers ieun IEEE RUPEAA AE AEST ELENAK ENEAN EANES EE RENAS REUNIR eeeeeeeenees 3 15 Remote Desktop Connection names 3 15 ULI NS ace hen ee Se ca eee et eee ene 3 15 cl AAA A A A A EN 3 15 A A seed alee eee ae a cee ee 3 17 ME AA sect eee tae ea RR A nage ae tee ot eda nae Sees aban Eat ae 3 17 AOVanced Tab fick once adas anne Stake ee aaa E Reset e toda tee 3 17 Expand Control Panel 0 ccc cccccc cece ccc c cece eee ceeceeeeeeetteeenteeenteeenneneceeeeecseeccecccceeceeueeeeeee 3 17 Clear Contents of Document Folder ooo 3 18 Taskbar ICONE ttc e cats A ameritan tao Sous ot ten dd tl eos tte a E 3 18 Thor VM1 OS Upgrade 2 2 e cece cece AA cece cece cece eee cee cece E aa aa aae aaen 3 19 IUOGUGUON 24 scott eat est ee tees o kan nda o ee lt Stk 3 19 Preparatoria tt eaten 3 19 POCEOUTO eorura ee OL ae ta es rang etal oes ot ese BI He ee 3 19
108. assword or e Enter and confirm your desired password then click OK 6 48 Microsoft Certificate Services Certificate Issued The certificate you requested was issued to you DER encoded or Base 64 encoded pss Download certificate Download certificate chain Click the Download certificate link File Download Security Warning Ed Do you want to open or save this file Name certnew cer Type Security Certificate 1 46 KB From 100 100 100 100 Open Save Cancel potentially harm your computer If you do not trust the source do not Y While files from the Internet can be useful this file type can open or save this software What s the risk Click Save to download and store the user certificate to the PC Make sure to keep track of the name and location of the certificate The private key file is also downloaded and saved during this process Be sure use the same name for the certificate file as was used for the private key file For example it the private key was saved as AAAUSER PVK then the certificate file created must be given the same name for example AAAUSER CER Install the user certificate 6 49 Installing a User Certificate Copy the certificate and private key files to the Thor VM1 Import the certificate by navigating to Start gt Control Panel gt Certificates P Certificates Select My Certificates from the pull down list Certificates El OK E Stores ny Ce
109. at the conclusion of each reboot e f installed and enabled AppLock runs automatically at the conclusion of each reboot e Thewireless client connects automatically during each reboot e Bluetooth re connects to nearby paired devices automatically at the conclusion of each reboot e If installed and pre configured Wavelink Avalanche connects remotely and downloads updates automatically during each reboot Communication Start gt Programs gt Communication ActiveSync ActiveSync is pre loaded on the Thor VM1 Using Microsoft ActiveSync you can copy files from your Thor VM1 to your desktop computer and vice versa 3 12 Once an ActiveSync relationship partnership has been established with Connect on a desktop computer ActiveSync will synchronize using USB on the Thor VM1 Connect and LXEConnect Upon cabling your Thor VM1 to the desktop laptop and ActiveSync on the desktop laptop opens if the Connect or LXEConnect installation does not open on your host PC Contact Technical Assistance Start FTP Server Stop FTP Server Start gt Programs gt Communication gt Start or Stop FTP Server These shortcuts call the Services Manager to start and stop the FTP server The server defaults to Off for security unless it is explicitly turned on from the menu Summit Start gt Settings gt Control Panel gt Summit Use this option to set up radio client profiles The Summit Control Panel can also be access
110. ations eliminating the need to communicate with the ACS server Standard PMK is used when there are no controllers The reauthentication information is cached on the original AP The client and the AP use the cached information to perform the four way handshake to exchange keys Opportunistic PMK OPMK is used when there are controllers The reauthentication information cached on the PMK Caching Standard controllers The client and the controller behind the AP use the cached information to perform the four way handshake to exchange keys If the selected PMK caching method is not supported by the network infrastructure every roam requires full 802 11X authentication including interaction with the ACS server If the active profile is using WPA2 CCKM the global PMK Caching setting is ignored and the client attempts to use CCKM Options are Standard OPMK WAPI Default is Off and dimmed cannot be changed How to handle antenna diversity when transmitting packets to the Access Point TX Diversity ABG On i Options are Main only use the main antenna only Aux only use the auxiliary antenna only or On use diversity or both antennas 6 16 How to handle antenna diversity when receiving packets from the Access Point ABG On Start RX Diversity on Main Options are Main Only use the main antenna only Aux Only use the auxiliary antenna only On start on Main on startup use the main antenna or On start on Aux
111. ator is familiar with the pairing function of the Bluetooth devices Bluetooth Devices Display Before Discovering Devices LXEZ Pairing Bluetooth Devices Settings Reconnect About Bluetooth Address Clear Discover Note When Filtered Mode is enabled only Bluetooth printers or Bluetooth scanners imagers are recognized and displayed in the Bluetooth panel All other Bluetooth devices are ignored Initial Configuration 1 Select Start gt Settings gt Control Panel gt Bluetooth or tap the Bluetooth icon in the taskbar or on the desktop 2 Tapthe Settings Tab Change the Computer Friendly Name at the bottom of the Settings display The Bluetooth Thor VM1 default name is determined by the factory installed software version A unique name up to 32 characters should be assigned to every Thor VM1 before Bluetooth Discovery is initiated Check or uncheck the Thor VM1 Bluetooth options on the Settings and Reconnect tabs 5 Tap the OK button to save your changes or the X button to discard any changes 3 65 Subsequent Use Note wo o No A 10 11 Taskbar and Bluetooth device Icon states change as Bluetooth devices are discovered paired connected and disconnected A taskbar Bluetooth icon with a red background indicates Bluetooth is active and not paired with any device A device icon with a red background indicates a disconnected paired device Tap the Bluetooth i
112. aye eld yd eee eee wud ig Wye eee skew hls 3 54 DS COV O e a a i TE N E E E ola ee A 3 55 P PURO E E E eta aes 3 55 Bluetooth Device List erroe ada 3 56 AAA II A ETa E shpallen de 3 56 Bluetooth Device Menu 2 2 22 000000000000 a000 1000001 cece cece Aaaa AAAA a naaraana naana 3 57 Right Click Menu Options 0 22 2 e cece cece cece cceccecceccececceceececceceeeeeeeeeeeeeeeeeees 3 57 Bluetooth Device Properties 22 2 20222222 c cece cnn 3 58 CUEING Slots es 5 lia lidia 3 59 Tum Off Bluetooth 22 225002 22 foes eae coseebee el coed EENE a REAVER ENAERE AR RREA EEE EEE aA ENAERE 3 59 A nee eect eee et ee ee ee eee eee 3 60 AAA 3 61 OPIO ase pots e e loto ee ate eat See oie ees 3 62 POU p sete cia ce eas ee es Sete sl gece et ass pays eek ee Se ee 3 64 Using BIUCtOOIN iseer aaa a a aa Eea a Aa rita 3 65 Initial Configuration 2 000 daaa cece cece cece cece cece cece cece ee ceeceeeeeeeeeeeeeeees 3 65 Subsequent Use nes 3 66 Bluetooth Indicators o ooocccccccccccccccccccccc cece cece eee ee eee eee cece ee eeeeeeeeeeeeereteeereeeees 3 67 Bluetooth Bar Code Reader Setup 0 2 2 occ eee eee cece cnn 3 68 Thor VMT With Label ciendo oscila Soest ad eee uscanhdeld cna ioaudadse denise ss tedehieate eines 3 68 Thor VM1 without Label 22 2 2 c cece cece cece cece cnn cnn conc 3 69 Bluetooth Beep and LED Indications 2 2 2 0 222 2c eee eee eee cece cece ccc cceeeeeceeeeeeeeeees 3 70 Blue
113. ayed and Navigation functions are unavailable When the Status checkbox is enabled the status bar displayed by EUIE gives feedback to the end user when they are navigating the Internet If the standard Internet Explorer that is shipped with the mobile device is desired it should be treated like any other application This means that IEXPLORER EXE should be specified in the Application text box and the internet application should be entered in the command line In this case do not check the Internet checkbox 3 39 Security Panel Administrator Control fr oK E Application Security Options status Hot Key mooo Password pet 22 Confirm Password pu mmm Hotkey Specify the hotkey sequence that triggers AppLock to switch between administrator and user modes and the password required to enter Administrator mode The default hotkey sequence is Shift Ctrl A A 2 d key keypress is an invalid keypress for a hotkey sequence Move the cursor to the Hot Key text box Enter the new hot key sequence by first pressing the Shift state key followed by a normal key The hotkey selected must be a key sequence that the application being locked does not use The hotkey sequence is intercepted by AppLock and is not passed to the application Input from the keyboard or Input Panel is accepted with the restriction that the normal key must be pressed from the keyboard when switching modes The hotkey sequence is displ
114. ayed in the Hot key text box with Shift Alt and Ctrl text strings representing the shift state keys The normal keyboard key completes the hotkey sequence The hotkey must be entered via the keypad Some hotkeys cannot be entered via the Input Panel Also hotkeys entered via the SIP are not guaranteed to work properly when switching operational modes For example if the Ctrl key is pressed followed by A Ctrl A is entered in the text box If another key is pressed after a normal key press the hotkey sequence is cleared and a new hotkey sequence is started A normal key is required for the hotkey sequence and is unlike pressing the normal key during a mode switch this key can be entered from the SIP when configuring the key However when the hotkey is pressed to switch modes the normal key must be entered from the keypad it cannot be entered from the SIP Password Move the cursor to the Password text box The passwords entered in the Password and Confirm Password fields must match Passwords are case sensitive When the user exits the Administrator Control panel the two passwords are compared to verify that they match If they do not match a dialog box is displayed notifying the user of the error After the user closes the dialog box the Security Panel is displayed and the password can then be entered and confirmed again If the passwords match the password is encrypted and saved See Also Passwords
115. bar icon the current signal level and radio interface are displayed Note The similar Summit wifi icon in the task bar uses red yellow and green bars EN There is no WWAN connection present EN 105 dbm to 86 dbm signal strength EN 85 dbm to 66 dbm signal strength 65 dbm to 46 dbm signal strength 45 dbm or higher signal strength Initial Use Some carriers such as AT amp T and T Mobile require a SIM card for use on their networks Other carriers such as Verizon use a CDMA network and must be activated Please refer to the sections below for more details SIM Card Installation Depending on the carrier a SIM card may be necessary for WWAN connection To install a SIM card 1 Place the Thor VM1 in Suspend 2 Remove the Thor VM1 from the Quick Mount Vehicle Dock 3 Place the Thor VM1 face down on a stable surface 4 Use a Phillips screwdriver not supplied loosen the screws and then remove the tethered access panel with the SIM label This panel is on the right hand side when the Thor VM1 is face down with the top away from the user Install the SIM card in the slot 6 Reattach the access panel torquing the screws to 4 to 5 inch pounds a 3 105 7 Reinstall the Thor VM1 in the Dock 8 Resume the Thor VM1 from suspend Activate To activate service fora CDMA carrier such as Verizon complete the necessary entries on the CDMA tab 3 106 Home Use the Home tab to update firmware and view the statu
116. beyond the specified operating parameters or E repair or service of the product by anyone other than HII or its authorized representatives This warranty shall extend from the time of shipment for the duration published by HII for the product at the time of purchase Warranty Period Any defective product must be returned at purchaser s expense during the Warranty Period to HII factory or authorized service center for inspection No product will be accepted by HII without a Return Materials Authorization which may be obtained by contacting HII In the event that the product is returned to HII or its authorized service center within the Warranty Period and HII determines to its satisfaction that the product is defective due to defects in materials or workmanship HII at its sole option will either repair or replace the product without charge except for return shipping to HII EXCEPT AS MAY BE OTHERWISE PROVIDED BY APPLICABLE LAW THE FOREGOING WARRANTY IS IN LIEU OF ALL OTHER COVENANTS OR WARRANTIES EITHER EXPRESSED OR IMPLIED ORAL OR WRITTEN INCLUDING WITHOUT LIMITATION ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE OR NON INFRINGEMENT HIPS RESPONSIBILITY AND PURCHASER S EXCLUSIVE REMEDY UNDER THIS WARRANTY IS LIMITED TO THE REPAIR OR REPLACEMENT OF THE DEFECTIVE PRODUCT WITH NEW OR REFURBISHED PARTS IN NO EVENT 9 1 SHALL HII BE LIABLE FOR INDIRECT INCIDENTAL OR CONSEQUENTIAL DAMAGES AND IN N
117. bled The Admin Login button provides access to editing wireless parameters Profile and Global may only be edited after entering the Admin Login password The password is case sensitive 6 4 Auto Profile If the Auto Profile selection is not present on the Main tab an SCU upgrade is necessary to support this feature on the Thor VM1 Auto Profile allows the user to configure a list of profiles that the SCU can search when a radio connection is lost After using the Profile tab to create any desired profiles return to the Main tab To specify which profiles are to be included in Auto Profile click the List button SSIDO3 SSIDO4 The Auto Profile selection screen displays all currently configured profiles Click on the checkbox for any profiles that are to be included in Auto Profile selection then click ok to save To enable Auto Profile click the On button on the Main tab When Auto Profile is On if the radio goes out of range from the currently selected profile the radio then begins to attempt to connect to the profiles listed under Auto Profile The search continues until e the SCU connects to and if necessary authenticates with one of the specified profiles or e the Off button is clicked to tum off Auto Profile Note Do not include any profiles with an Ad Hoc Radio Mode in this listing Once logged in the button label changes to Admin Logout To logout either tap the Admin Logout button or exit
118. bled unchecked or the discovery result displays Bluetooth Filtered Mode scanners and printers only Filtered Mode is enabled checked When Filtered Mode is disabled the Thor VM1 can pair with up to four Bluetooth devices A Warmboot is required every time Filtered Mode is toggled on and off This option is Disabled by default Printer Port COM7 This option assigns Bluetooth printer connection to COM7 instead of COM19 To enable this option Filtered Mode must be enabled This option is Disabled by default When logging is enabled the Thor VM1 creates bt_log txt and stores it in the System folder Bluetooth activity logging is added to the text file as activity progresses A bt_log_bak txt file Logging contains the data stored by bt_log txt prior to reboot During a reboot process the Thor VM1 renames bt_log txt to bt_log_bak txt If a file already exists with that name the existing file is deleted the new bt_log_bak txt file is added and a new bt_log txt is created Default Computer System Name System Panel gt Device Name tab Computer Friendly Name The name or identifier entered in this space by the System Administrator is used exclusively by Bluetooth devices and during Bluetooth communication 3 60 Reconnect LXEZ Pairing OK E Bluetooth Devices Settings Reconnect about M Report when connection lost 7 Report when reconnected M Report failure to reconnect Clear Pairing Table on
119. ce ce ceeeceeeeeeeeeeeeeeteeeees 3 149 Current A A A A 3 149 Automatic Brightness Control 0 000000 e cece cece ee ceceeeeeeceeecccceseeeeees 3 149 VIS ore eases ot rae oe nd apes oe eee eet ee eee ee te ee 3 150 DOUDIC apie occ aos a io o Seas ahs te foe 3 150 CAMA ic sable emameadelesecanads 3 150 VSCOM tt tas a EN he iS E toate etd e At ao A AI Ss Soa oe LS tes 3 151 General TaD comprvotostnontes oe LSS Cao A 8 total aser Uo he Deo ot ica 3 151 Memor Vabii c2 cute cis asocia te raise st toscana 3 152 Device Name Tabo 3 152 Copyrights Wabi 220 s2 52 82s ti sitet nen ia A ir 3 153 Terminal Server Client Licenses 000000000 cece cece cece cece cece cece eaaa aa aa aaraa nanana 3 154 Volume and Sounds 2 2 22 2 2 eee 3 155 Good Scan and Bad Scan Sounds 0 0 ns 3 156 WiFi Control Panel ne 3 157 Chapter 4 ActiveSync 4 1 limtrOGUCIONG 22 22 cv ee oie A bey a eed e ee td eee de ee 4 1 MESA A 4 2 Connect AYT HOES cece cece cc ccc cece cece ccc cece cece cece cece cece cece eeeceeeeeeeeeeeeeeteeteeeeeeneenees 4 2 Cable for USB ActiveSync Connection 2 0022 e cece cece eceeececeeeeeceeeeeeees 4 2 Backup Data Files using ActiveSync ooooocccccccccccccccccccccccccconn nro 4 3 Prerequisites 2 25 EE EA EE e ei a rd de o e seats ae tons 4 3 COTM GC Esc es as sh a NY A AN 4 3 DOCM 0i nn nn cn nnccananies 4 4 Thor VM1 with a Disabled Touch Screen 0 2 22 cece cece cece cocos 4 4
120. cess ahead of Ping Timeout ms the ping timeout Options are Any number between 0 and 30000 ms The amount of time in milliseconds between each ping after a Start Ping Ping Delay ms 1000 button tap Options are Any number between 0 and 30000 ms Note Tap the Commit button to save changes If this panel is closed before tapping the Commit button changes are not saved 6 18 Sign On vs Stored Credentials When using wireless security that requires a user name and password to be entered the Summit Client Utility offers these choices e The Username and Password may be entered on the Credentials screen If this method is selected anyone using the device can access the network e The Username and Password are left blank on the Credentials screen When the device attempts to connect to the network a sign on screen is displayed The user must enter the Username and Password at that time to authenticate How to Use Stored Credentials oa FF WON SB After completing the other entries in the profile click on the Credentials button Enter the Username and Password on the Credentials screen and click the OK button Click the Commit button For LEAP and WPA LEAP configuration is complete For PEAP MSCHAP and PEAP GTC importing the CA certificate into the Windows certificate store is optional For EAP TLS import the CA certificate into the Windows certificate store Also import the User Certificate into the Windows c
121. checked devices are not reconnected on boot but are reconnected in other situations example return from out of range When Auto Reconnect is enabled checked and Clear Pairing Table on Boot is enabled checked devices are not reconnected on boot but are reconnected in other situations example return from out of range The pairing table is cleared on boot The status of Auto Reconnect on Boot is ignored and the option is automatically disabled unchecked and dimmed 3 63 About LXEZ Pairing OK El Bluetooth Devices Settings Reconnect About com Friendly Name i Bluetooth Address 00 40 FD 02 03 04 BTC version 1 0 BTDRPX361Jw Bluetooth Stack Revision 2 1 Bluetooth Radio HCI 4 4839 Copyright 2006 2011 LXE Inc This panel lists the assigned Computer Friendly Name that other devices may discover during their Discovery and Query process the Bluetooth MAC address and software version levels The data cannot be edited by the user Using Bluetooth Start gt Settings gt Control Panel gt Bluetooth or Bluetooth icon in taskbar or Bluetooth icon on desktop Q 3 Bluetooth taskbar icon The Thor VM1 default Bluetooth setting is Enabled The Thor VM1 Bluetooth module is designed to Discover and pair with nearby Bluetooth devices Prerequisite The Bluetooth devices have been setup to allow them to be Discovered and Connected Paired The System Administr
122. ck can be set via the Misc tab in Start gt Settings gt Control Panel gt Options The Thor VM1 keyboard keys are backlit By default the keyboard backlight follows the display backlight When the display backlight is on the keyboard backlight is on If the display backlight brightness is increased or decreased the keyboard backlight brightness is increased or decreased The keyboard backlight and the display share the same timer which is configured in Start gt Settings gt Control Panel gt Power The keyboard backlight can be disabled See Start gt Settings gt Control Panel gt Options gt Misc tab 8 1 Note To get this Key Function Press These Keys in this Order Power On Suspend Power Fo nd nd nd nd aooo i E SC nd d d Ctrl C Esc E Shift t ECC E COTOS CAMA AI A CEC CN BkSp Back Tab 2nd Tab os o o Fase F1 F10 F1 F10 When automatic brightness control is enabled for a Thor VM1 with an Outdoor display the manual display brightness controls in the table below have no effect 8 2 f a R E TARA po py A JE po A ee Ed oo E IE C e a AAA AAA AO BEAN gt OOOO CI COS IE ARA AA ESOS ARANA ME CO CCOO IES AAA a AAA HA Y EOI ae NES AAA AAA AAA AAA AAA AA AAA E PA rs EAN CAES AAA EA oe ETA a AAA A AAA AAA 8 3 a N oa VK_PERIOD ii a N Qa 8 4 8 5 12 Key Keypad Key Map T
123. combinations are validated When RF Term is installed on the mobile device and an RFTerm restricted key sequence is specified as a hotkey sequence by the Administrator the following error message is displayed in a message box Selected hotkey is not allowed Please reenter When RFTerm is not installed on the mobile device the RFTerm keys are not restricted from use Can t locate the password that has been set by the administrator Contact Technical Assistance for password help AppLock Error Messages Any messages whose first word is an ing word is output prior to the action described in the message For example Switching to admin hotkey press is logged after the administrator has pressed the hotkey but prior to starting the switch process For all operations that can result in an error an Error level message is displayed when a failure occurs These messages contain the word failure These messages have a partner Extended level message that is logged which contains the word OK if the action completed successfully rather than with an error For processing level messages Enter is logged at the beginning of the function specified in the message and Exit is logged at the end just before the return of the function specified in the message Explanation and or corrective action Error reading hotkey The hotkey is read but not required by AppLock LOG_EX Error reading hotkey A hotkey is requir
124. con in the taskbar or on the desktop to open the Bluetooth LXEZ Pair application Tap the Bluetooth Devices tab Tap the Discover button When the Bluetooth module begins searching for in range Bluetooth devices the button name changes to Stop Tap the Stop button to cancel the Discover function at any time The discovered devices are listed in the Bluetooth Devices window Highlight a Bluetooth device in the Discovered window and double tap to open the device properties menu Tap Pair as Scanner to set up the Thor VM1 to receive scanner data Tap Pair as Printer to set up the Thor VM1 to send data to the printer Tap Serial Device when Filtered mode is disabled to set up the Thor VM1 to communicate with a Bluetooth serial device Tap Disconnect to stop pairing with the device Once disconnected tap Delete to remove the device name and data from the Thor VM1 Bluetooth Devices list The device is deleted from the list after the OK button is clicked Upon successful pairing the selected device may react to indicate a successful connection The reaction may be an audio signal from the device flashing LED on the device or a dialog box is placed on the Thor VM1 display Whenever the Thor VM1 is turned On all previously paired live Bluetooth devices in the vicinity are paired one at a time with the Thor VM1 If the devices cannot connect to the Thor VM1 before the re connect timeout time period expires default is approximately 20 seconds f
125. cted to an external power source such as based on a docking event Contact Periodically Allows the administrator to configure the Enabler to contact the Mobile Device Server and query for Periodic Update updates at a regular interval beginning at a specific time Wakeup device if sus If the time interval for periodic contact with the Mobile Device Server occurs a mobile device that is pended in Suspend Mode can wakeup and process updates Reboot before attempt Reboot mobile device before attempting to contact Mobile Device Server Require external power Only connect when the mobile device has external power 5 11 Data Avalanche Update Settings OK Data Preferences Display Taskbar Execution Scan Confic_4 gt Real time Statistics Network LAN wifi Report ho hour s y After Server Retransmit Contact Restrict Bandwidth to User Idle Time Idle Timeout F minute y The Data tab controls when data is transferred between the Thor VM1 and the Mobile Device Server Network When checked the LAN WiFi network is enabled to transfer statistics Report Specifies the Report Interval how frequently the Enabler reports statistics to the Mobile Device Server Retransmit After Specifies if the device sends statistics to the Mobile Device Server immediately following a con Server Contact nection to the server Restrict Bandwidth to When enabled periodic updates from the
126. d x 3 51 Battery Start gt Settings gt Control Panel gt Battery This panel is used to view the status and percentage of power remaining in the Thor VM1 UPS battery The battery gas gauge icon resides in the system tray and shows four levels of charge 100 75 50 25 At a point below 25 the system status LED will turn red and the gas gauge icon will turn red indicating the bat 100 tery is low The battery gauge icon is enabled by default but can be disabled on the Thor VM1 Battery control panel Jacked is shown in the Status box when the UPS battery is receiving external power 7 fox x Status UPS 12 500 Y JACKED UPS Power remaining 100 Battery Toolbar Icon 3 52 Bluetooth Start gt Settings gt Control Panel gt Bluetooth Note Contact Technical Assistance for upgrade availability if your Bluetooth control panel is not the same as the control panels presented in this section Discover and manage pairing with nearby Bluetooth devices Factory Default Settings Discovered Devices None Turn Off Bluetooth Enabled Prompt if devices request to pair f Disabled unchecked by default in both Filtered and Non Fil PAE ae tered Modes The option is dimmed in Non Filtered Mode Report failure to reconnect Clear Pairing Table on boot 3 53 Bluetooth taskbar Icon state and Bluetooth device Icon states change as Bluetooth devices are discovered paired connect
127. d PEAP GTC importing the CA certificate into the Windows certificate store is optional For EAP TLS import the CA certificate into the Windows certificate store Also import the User Certificate into the Windows certificate store 4 Access the Credentials screen again Make sure the Validate server and Use MS store checkboxes are checked 5 The default is to use the entire certificate store for the CA certificate Alternatively use the Browse button next to the CA Cert CA Certificate Filename on the Credentials screen to select an individual certificate 6 19 6 ForEAP TLS also enter the User Cert User Certificate filename on the credentials screen by using the Browse button 7 Click the OK button then the Commit button 8 When the device attempts to connect to the network a sign on screen is displayed 9 Enter the Username and Password Click the OK button Summit Credentials A User Password 10 Verify the device is authenticated by reviewing the Status tab When the device is property configured the Status Tab indicates the device is Authenticated and the method used 11 The sign on screen is displayed after a reboot Note See Configuring the Profile for more details If a user enters invalid credentials and clicks OK the device associates but does not authenticate The user is again prompted to enter credentials If the user clicks the Cancel button the device does not associate The use
128. d Use Avalanche Network Profile Click the OK button to save the changes NQOaF ON Reboot the device 5 4 Preparing a Device for Remote Management Two additional utilities are necessary for remote management e The Remote Management Utility RMU must be installed on all mobile devices first then you can control mobile device reboot storage RAM adjustment real time updates and Avalanche Enabler properties If the RMU is not already installed on the Thor VM1 see Using Wavelink Avalanche to Upgrade System Baseline If in doubt verify RMU CE CAB exists in the System folder If the RMU CE CAB file is present when the Enabler is installed the RMU is also installed Important If the OS package includes double byte Asian fonts the storage RAM property of the RMU must be higher than the default value 40MB If the amount of storage RAM is too low the Enabler returns a Mobile unit out of resources error e Use the Wireless Configuration Application WCA when you want to remotely manage the Summit client device This utility is downloaded and installed in addition to the Remote Management Utility The WCA is included when the Summit radio driver software is updated The WCA is automatically installed when the radio driver is updated If the Remote Management Utility RMU is not present on the Thor VM1 see Using Wavelink Avalanche to Upgrade System Baseline 5 5 Using Wavelink Avalanche to Upgrade System Baselin
129. d the printer are currently paired 3 70 Easy Pairing and Auto Reconnect The Bluetooth module can establish relationships with new devices after the user taps the Discover button It can auto reconnect to devices previously known but which have gone out of range and then returned within range See Also Reconnect Note Configuration elements are persistent and stored in the registry Setup the Bluetooth module to establish how the user is notified by easy pairing and auto reconnect events AppLock if installed does not stop the end user from using the Bluetooth application nor does it stop other Bluetooth enabled devices from pairing with the Thor VM1 while AppLock is in control 3 71 Certificates Start gt Settings gt Control Panel gt Certificates Manage digital certificates used for secure communication Note Digital certificates are date sensitive If the date on the Thor VM1 is incorrect wireless authentication will fail Certificates ka OK Ed Stores Cl Class 3 Public Primary Certification Authority Entrust net Certification Authority 2048 Entrust net Secure Server Certification Authorit Equifax Secure Certificate Authority GlobalSign Root CA ly The Certificates stores tab lists the certificates trusted by the Thor VM1 user Lists the certificates trusted by you These values may change based on the type of network security resident in the client access point or the host
130. dmin kbdhook dll not found Switching to admin keyboard hook initialization failure Switching to admin registry read failure The system is currently in user mode and is now switching to admin mode The LOG_ switch occurred because of the backdoor key presses were entered by the PROCESSING administrator The system is currently in user mode and is now switching to admin mode The LOG_ switch occurred because of a hotkey press by the administrator PROCESSING The keyboard hook load failed so AppLock switches to admin mode If a password is specified the password promptis displayed and remains until a valid password is LOG a ee ld ii i i ap S PROCESSING If the keyboard hook initialization fails AppLock switches to admin mode If a password is specified the password prompt is displayed and remains until a valid password is entered LOG_ PROCESSING See the explanation of the Registry read failure above AppLock is switching into Admin mode If a password has been configured the prompt will be displayed and will not be dismissed until a valid password is entered LOG_ PROCESSING Switching to In administration mode the taskbar is visible and enabled LOG EX TaskbarScreenMode Sassi The registry was successfully read and AppLock is starting the process to switch to LOG_ Switching to user hotkey The system is currently in admin mode and is now switching to user mode The LOG_ press switch occurred because of
131. driver bit Caution A Before replacing the Thor VM1 UPS battery the internal UPS battery must be disconnected The UPS battery in the Thor VM1 is field replaceable Should the UPS battery fail it can easily be replaced to minimize downtime Replace UPS Battery Place the Thor VM1 on a clean well lit surface before performing the UPS battery replacement Place the Thor VM1 in Suspend by pressing the Power button Remove the Thor VM1 from the Quick Mount Smart Dock Disconnect the UPS Loosen the fourteen 14 captive M3 screws holding the front panel Use a 2 Philips bit a FF OUN 2 45 5 10 11 Carefully lift the front panel away from the device i a o i o A Wiring Connector C I B UPS Battery i i Ji C Foam Pads 4 ER _ Y D Release Tab on D Wiring Connector Note the orientation of the UPS battery Lift the UPS battery out of the battery well and place it outside the well Do not pull on the wires attaching the battery to the Thor VM1 while lifting the battery Locate the retaining tab on the wiring connector forthe UPS battery Press on the tab and gently disconnect the UPS battery wiring from the Thor VM1 Remove the old battery and set it aside Inspect the battery well to verify the two foam pads are still in place Align the wiring connector on the new UPS battery with the connector on the Thor VM1 Gently press the connector
132. e This procedure assumes the Avalanche Enabler is already installed on the Thor VM1 and is already in communication with the Avalanche MC Console Part 1 Bootstrapping the RMU 1 oa kw Install the RMUC Ebt package into the Avalanche MC Console Do NOT include the Reboot option as part of the configuration i e the Reboot button in the Reboot Options branch must be unbolded Enable ONLY the RMUCEbt package in the Avalanche MC Console and update the devices The RMU is downloaded and automatically installed Disable the RMUCEbt package in the Avalanche MC Console For each device double click on the device to open the Client Controls dialog box Check the Delete Orphaned Packages checkbox and click the Update Now button After the sync completes uncheck Delete Orphaned Packages and close the dialog box Part 2 Installing Packages Enable the RMUCE package in the Avalanche MC Console Enable all remaining packages and send them down It is important that you include the new OS package in this group be sure to include the Enabler If the radio is to be managed remotely it is important to include the radio package in this group so that after the reboot the radio can automatically associate If the radio package is not sent the device loses connection to the network and manual configuration of the radio parameters is required Set the Reboot setting for the OS package to Auto After all packages are downloaded this
133. e memory resource issues requiring an end user response etc Also at the administrators discretion these types of applications can be started manually see Manual Launch by the end user 3 38 End User Internet Explorer EUIE AppLock supports applications that utilize Internet Explorer such as HTML pages and JAVA applications The end user can run an application by entering the application name and path in Internet Explorer s address bar To prevent the end user from executing an application using this method the address bar and Options settings dialog are restricted in Internet Explorer This is accomplished by creating an Internet Explorer that is used in end user mode End user Internet Explorer EUIE EXE The EVIE executes the Internet Explorer application in full screen mode which removes the address bar and status bar The Options Dialog is also removed so the end user cannot re enable the address bar The administrator specifies the EUIE by checking the Internet checkbox in the Application tab of the Administrator applet The internet application should then be entered in the Application text box When the Internet checkbox is enabled the Menu and Status check boxes are available Enabling the Menu checkbox displays the EUIE menu which contains navigation functions like Back Forward Home Refresh etc functions that are familiar to most Internet Explorer users When the Menu checkbox is blank the EUIE menu is not displ
134. e 7 14 2010 Service Contract Indicator 48 Months SIN GUID 7B5C011F 5DD9 79C4 5504 462E0906447C Software and driver version information is located in the About control panel Copyright information is located in the System control panel 3 124 Mixer Start gt Settings gt Control Panel gt Mixer The Thor VM1 has two speakers located at the bottom front of the unit and one microphone located at the top front of the unit Use the settings on these panels to adjust the master volume record gain and sidetone Factory Default Settings Master Volume 15dB oe 0 0 dB Output Panel Mixer Foxy x Output Input Master Yolume 15 dB a gt Tap and hold the Master Volume slider and move either left or right or tap the left and right arrows to adjust Speaker volume decibel level Tap the Test button to play a sample sound at the selected volume 3 125 Input Panel Output Input Record Gain 0 0 dB Sidetone 0 0 dB K Ata EE O Enabled 8 Disabled rra rra Use the radio buttons to enable or disable the sidetone Tap and hold the Record Gain or Sidetone sliders and move either left or right or tap the left and right arrows to adjust the levels 3 126 Mouse Start gt Settings gt Control Panel gt Mouse Use this option to set the double tap sensitivity for stylus taps on the Thor VM1 touch screen Mouse Propertie
135. e 3 128 Network Capture 00 eee eee cece cee ec cece cceccccceccececcecceccceeececeeceececeeceeeeeeeeeeeeeeeteteetenees 3 129 ING OOP coat aie ete ee Se et hd eee eee ee ea ca ene inst A 3 129 PAS 3 131 A A st ed 3 132 Enable TCP IP Version 6 1 2 2 22 222 c cece e cece cece cece cece ns 3 133 Allow Remote Desktop Autologon 0 000000 c cece ccc ccc ccc cece cece cece cece cece cee eeeteeeeeeeeeeeeeeerees 3 133 Autolaunch TimeSync 2 eee eee cee ccc e cece cece cece e cece cece cece cece cece eeeeeeeeeeeeeeeteees 3 133 A A cee ah cena a tee aden naemncancee sees 3 134 A AA ae ee ee a a sot e eS cclee A e tho d 3 134 Touch Screen Disable e occorre rannen aK eee 3 134 Enable Keypad Backlight 2 00 02 222022 c ccc e eee e cece cnn 3 134 Enable Alto tao o ct 3 134 Status POPUP a tia 3 135 A ne A apo EE ace ae ne rete eee 3 136 Poc SWOON aa ac eat hk a ke ees Se 3 138 TA Aa eee O eae a eget n eess ce 3 139 Penpheral S merae koe ok a a ta e ee ate cs ala ht ee sel a ne et a 3 140 POW Cle os oie ts cs cea as A aa gan teers ete one Adee cia 3 141 Regional and Language Settings oococccccccccccccccccccccccnnnnnn e cece cece cece Aaaa oa rairaon aranna 3 143 ReGISHY 200 eee cece cece cece cece cece cece ce ececcecceccececceceeeeeceeeeeeeeeeeteestetteteeeettetettnettttnetnenseees 3 145 Remove Program Sis voccuonosrecccnin cana lectiva ee 3 146 Sic 3 147 Screen Blanking ooo cece cece cece cece ce cece cece cece ce
136. e Clear button to remove dear AS the contents of the Documents Menu Expand Control Panel Expand Control Panel Tap the checkbox to have the Control Panel folders appear in drop down menu format from the Settings gt Control Panel menu option 3 17 Clear Contents of Document Folder Tap the Clear button to remove the contents of the Document folder Taskbar Icons As Thor VM1 devices and applications open and change state icons are placed in the Taskbar In most cases tapping the icon in the Taskbar opens the related application Refer to Start gt Help for an explanation of standard Windows CE taskbar icons Following are a few of the Thor VM1 taskbar icons that may appear in the Taskbar These icons are in addition to the Windows CE taskbar icons Wireless Zero Config Inactive Connected Not Connected Clicking on the icon opens the Wireless Zero Config utility Bluetooth connected disconnected Clicking the icon opens the Bluetooth control panel se ActiveSync Connection Cerdisp connected displayed when LXEConnect is connected Summit Client signal indicator no signal excellent signal Clicking on the icon opens the Sum mit Client Utility Gobi Connection Manager WWAN signal indicator no signal excellent signal Clicking on the icon opens the Gobi Connection Manager UPS battery charge indicator Percent of battery charge is indicated External power connected connected and UPS batte
137. e Enabler should first check for serial port connection to the Mobile Device Server Connection before checking for a wireless connection to the Mobile Device Server a AE Disable ActiveSync connection with the Mobile Device Server Restict Default is disabled Minimum Link Speed dimmed When enabled the Enabler only allows a connection to Adapter Link the server if the detected link speed is greater than or equal to the specified value Speed 5 10 Server Contact Avalanche Update Settings OK E server Contact Data Preferences Display Taskbar Execu_4 gt Y Sync clock Contact periodically Y Contact on startup every i PTE Contact on resume Contact on IP change re a E it M Wakeup device if suspended E Reboot before attempt L Require external power O Use relative offset Note Your Thor VM1 screen display may not be exactly as shown above Contact Technical Assistance for upgrade availability and version information Sync Clock Reset the time on the Thor VM1 based on the time on the Mobile Device Server host PC On Startup Connect to the Mobile Device Server when the Enabler is accessed On Resume Connect to the Mobile Device Server when resuming from Suspend mode Contact On IP Change Connect to the Mobile Device Server when the IP address of the Thor VM1 changes On Ext Power Initiate connection to the Mobile Device Server when the device is conne
138. e Profile Use the instructions in this section to complete the entries on the Profile tab according to the type of wireless security used by your network The instructions that follow are the minimum required to successfully connect to a network Your system may require more parameters than are listed in these instructions Please see your system administrator for complete information about your network and its wireless security requirements To begin the configuration process e Onthe Main Tab click the Admin Login button and enter the password e f using a single profile edit the default profile with the parameters for your network Select the Default profile from the pull down menu e Make any desired parameter changes as described in the applicable following section determined by network security type and click the Commit button to save the changes IMPORTANT Remember to click the Commit button after making changes to ensure the changes are saved Many versions of the SCU display a reminder if the Commit button is not clicked before an attempt is made to close or browse away from the tab in focus if there are unsaved changes If changes are made to the stored credentials click Commit to save those changes first before making any additional changes 6 23 No Security To connect to a wireless network with no security make sure the following profile options are used e Enter the SSID of the Access Point assigned to this profile
139. e default BIOS parameters are configured at that time In most cases it is unnecessary to modify the BIOS parameters Generally it is only necessary to enter the BIOS setup to change the boot order of the drives This section is not intended to detail all features of the BIOS instead it is intended to cover the most commonly used setup options Be very careful when using this utility to modify BIOS Setup parameters The Thor VM1 may generate unexpected results when incorrect or conflicting parameter values are entered Selecting incorrect or invalid options may require the Thor VM1 to be returned for repairs The parameters should only be modified by Information Services personnel or the system administrator Accessing the BIOS Setup When the Embedded BIOS screen Phoenix Technologies is displayed press the Del key to enter BIOS setup Use the arrow keys to move around the screen To access and modify the BIOS on the Thor VM1 with 12 key keyboard an external keyboard must be attached Boot Order To view or edit the boot order select the Boot tab By default the first device in the boot orderis USB Hard Drive The second device is the Windows CE Image If a USB drive such as a thumb drive is attached to the Thor VM1 the device attempts to boot from the USB drive e lf the USB drive contains a bootable sector the Thor VM1 boots from the USB drive e Ifthe USB drive does not contain a bootable sector the Thor VM1 does not boot
140. e keyboard backlight brightness is increased or decreased The keyboard backlight and the display share the same timer which is configured in Start gt Settings gt Control Panel gt Power The keyboard backlight can be disabled See Start gt Settings gt Control Panel gt Options gt Misc tab The integrated keypad contains five programmable keys a blue modifier key and an orange modifier key 2 28 Keyboard LEDs Shift LEDs Note The 64 keyThor VM1 has two Shift keys with an LED beside each key The 12 key Thor VM1 has a single Shift key and LED The Shift LEDs indicate the state of the keyboard Shift mode If Shift is enabled the Shift LEDs beside both Shift keys 64 key only blink green When CapsLock is enabled both Shift LEDs 64 key only are lit solid green When Shift and CapsLock are both off the LEDs are off Press either Shift key to toggle Shift On and Off press 2nd plus either Shift key to toggle CapsLock On or Off Secondary Keys LED The Thor VM1 keyboard is equipped with several secondary keys These keys are identified by the superscript text found on the keyboard keys The secondary keys are accessible by using two 2 keystrokes the 2nd key followed by the superscript key Once the 2nd state is enabled by pressing the 2nd key the Secondary Mode LED is illuminated and the 2nd state is enabled until another key is pressed The 2nd key is toggled on with a 2nd key press and then immediately off
141. e tab displays the localized language version of the OS image e English only No additional languages are built into the OS e Japanese e Simplified Chinese e Traditional Chinese e Korean e Spanish e French e German e Thai The above listed Asian languages are ordered separately and built in to the OS image Built in languages are added to registry entries and are available immediately upon startup Thai Hebrew Arabic and Cyrillic Russian languages are available in the English only default extended fonts 3 23 Identifying Software Versions The Versions tab displays the versions of many of the software programs installed Not all installed software is included in this list and the list varies depending on the applications loaded on the Thor VM1 The Image line displays the revision of the system software installed Refer to the last three digits to determine the revision level MAC Address The Network IP tab displays the MAC address of the network card 3 24 Accessibility Start gt Settings gt Control Panel gt Accessibility Customize the way the Thor VM1 keyboard sound display mouse automatic reset and notification sounds function There are a few changes from general Windows desktop Accessibility options Sticky Keys Disabled cannot be enabled Keyboard ToggleKeys Disabled by default Tap the Use ToggleKeys checkbox to enable this option Tap the Settings but ton to view or change parameters
142. eceeeeeeeeeeeeeeees 2 31 UPS Status LED 2 02 ccc ccc cece cece ccc eecccecceeeecccceeeececccceeeeeteeecceceeeeeeccceceeteececceeeeeteecees 2 32 External Power Present 0 000000000000 cnc 2 32 External Power Not Present 000 000000002 ccc c cece cc ccc nn 2 32 SSD Solid State Drive LED 0000000 000 e ce cece cece cece ee eeeeeeeeeeeeeeeeeeeeeeeeeees 2 32 Connection LED Si ts ld ocd o lero ati bl e dt 2 33 WWAN LED separ ett it its 2 33 MA A ee a ee gee ge tee IA 2 33 Bluetooth PEDO oo asia es aero ce ee oe eee ss Se 2 33 Keyboard LEDS 0 ccc cccecc cece cece cece cee nono nncnccnncccces 2 34 UNA Ba isi ot ais oido das 2 34 P LE D Lt ae ae lah sh ae ae ae ha Srl ace ath Sel op ys ta ates ase Tes ere alae 2 34 acetate seas et ee ene ae ee ae ate td Set et Malate tat 2 34 TANI ns 2 35 DUS Axa ees eee ec ce tee A at Ea eeee ee 2 36 TOUCH S Cree e cece ok eos oles Sete ae ie seek ao te ese oe nie ane Mane see ds oia 2 36 Touch Screen Defroster cc 2 36 Screen Blanking 2 2 eee eee cece cece cece cece cece cece cece ec cececceccececceecccceeeeeeeeeeeeeeeeeteeeeteteeeees 2 36 Display Backlight Control 000 0000000 nn nc cccnncccio 2 36 Disconnect UPS Battery ooo e cece cece cece cece cece cece ceeeeeeceeeeeeeeeeeeeees 2 37 InstalllSD Gard 0 si o ti io sa gets dint eae ee allele Soe oes ape ge see eee es 2 39 Install SIM Gare co ooi ocd oho cok a EE 2 41 Field Replaceable Front Pa
143. ecommended o Transcend 2GB Industrial SD card 80X Speed TS2GSD80I o ATP 4GB Industrial Grade SDHC card AF4GSDI For convenience the Thor VM1 can be removed from the Quick Mount Vehicle Dock though it is not necessary Place the Thor VM1 in Suspend by pressing the Power button Place the Thor VM1 face down on a stable surface FON gt Using a Phillips screwdriver not supplied loosen the screws and then remove the tethered access panel with the SSD and SD label This panel is on the left hand side when the Thor VM1 is face down with the top away from the user 5 Locate the SD card installation slot 2 39 6 7 8 9 Slide the SD card into the slot The label side front of the SD card faces toward the back of the Thor VM1 Reattach the access panel torquing the screws to 4 5 inch pounds If removed reinstall the Thor VM1 in the Dock Resume the Thor VM1 from suspend When using Windows explorer to view My Device the SD card is identified as SD Card Some versions may label it Storage Card instead 2 40 Install SIM Card Equipment Required User Supplied e Torquing tool capable of measuring inch pounds e 2 Philips screwdriver bit For convenience the Thor VM1 can be removed from the Quick Mount Vehicle Dock though it is not necessary Place the Thor VM1 in Suspend by pressing the Power button Place the Thor VM1 face down on a stable surface FON Using a Phillips screwdriver not
144. ecrease backlight brightness 2 36 Disconnect UPS Battery Equipment Required User Supplied e Torquing tool capable of measuring inch pounds e 2 Philips screwdriver bit Caution The UPS battery must be disconnected before shipping the Thor VM1 replacing the UPS battery or replacing the front panel For convenience the Thor VM1 can be removed from the Quick Mount Vehicle Dock though it is not necessary If the Thor VM1 remains in the Dock disconnect the power cable from the Dock Place the Thor VM1 in Suspend Place the Thor VM1 face down on a stable surface ak N gt Using a 2 Philips bit loosen the M3 screws and then remove the tethered access panel with the SIM label This panel is on the right hand side when the Thor VM1 is face down with the top away from the user 6 Locate the small push button located just below the SIM card installation slot 2 37 Press the push button to disconnect the UPS The UPS battery maintains its charge but is disconnected from the power circuitry of the Thor VM1 Reattach the access panel torquing the M3 screws to 4 5 inch pounds using a 2 Philips bit 9 When the Thor VM1 is attached to extemal power the UPS battery is automatically reconnected 2 38 Install SD Card Equipment Required User Supplied e Torquing tool capable of measuring inch pounds e 2 Philips screwdriver bit e SD card The following commercially available SD cards are r
145. ect 2 8 Power Controls Power Switch After all cables are connected the Thor VM1 can be powered on There is a power switch located on the back of the Quick Mount Smart Dock The power switch is a rocker switch The power switch has a raised bump to identify the switch position even when it is hidden from view When the side of the switch with the raised bump is pressed the power switch is On If the Dock is connected to external power the Dock delivers power to the Thor VM1 Thor VM1 Power Button The power button is located at the bottom left of the Thor VM1 If the Thor VM1 is Off pressing the power button starts the power up sequence Note This assumes that the Thor VM1 is docked in a powered Quick Mount Smart Dock or that the intemal UPS battery has a sufficient charge to power the Thor VM1 If no external power is available and the UPS battery does not have a charge pressing the power button causes no action If the Thor VM1 is On pressing the power button places the unit in Suspend 2 9 Vehicle Ignition Monitoring When Auto On is disabled see below and the ignition input wire is connected the Thor VM1 monitors the ignition input signal and adjusts modes as described below Auto On Behavior The Thor VM1 can be configured for Auto On using the Options control panel For information on the Ignition input signal please see the power cable instructions in the Th
146. ed Keyboard Y RFTerm EXE Y pword exe A checkmark indicates applications currently active or available for Launching by the user When Keyboard is selected the Thor VM1 default input method Input Panel Transcriber or custom input method is activated The check to the left of the application name indicates that the application is active If the application is listed but does not have a checkmark to the left of the application name this means the application is configured in AppLock and can be manually launched by clicking on the application name in the list Using a Stylus Tap When the mobile device enters end user mode a Switchpad icon it looks like three tiny windows one above the other is displayed in the lower right corner of the display The Switchpad is always visible on top of the application in focus However if only one application is configured in AppLock and the Input Panel is disabled the Switchpad is not visible a When the user taps the Switchpad icon a menu is displayed showing the applications available to the user The user can tap an application name in the popup menu and the selected application is brought to the foreground The previous application continues to run in the background Stylus taps affect the application in focus only When the user needs to use the Input Panel they tap the Keyboard option Input Panel taps affect the application in focus only Keyboard v RFTerm EXE Y pword exe
147. ed If there is a failure reading the hotkey the internal factory LOG_ERROR using default default is used App Command Line E do LOG_ eComma d lines Command line of the application being locked PROCESSING App lt Application E LOG_ Mames Name ofthe application being locked PROCESSING dwProcessID lt gt Device ID of the application being locked LOG_EX lid key len Size of encrypt export key LOG_EX Encrypt password length lt gt The length of the encrypted password LOG _EX Encrypted data len lt gt Length of the encrypted password LOG_EX hProcess lt gt Handle of the application being locked LOG_EX Key pressed lt gt A key has been pressed and trapped by the hotkey processing LOG_EX 3 44 Message Explanation and or corrective action Level A EEEN The status information is being saved to a file and the file has been opened LOG_EX successfully E AppLock found the kbdhook dll but was unable to get the address of the initialization procedure For some reason the dll is corrupted Look in the Windows directory for kodhook dll If it exists delete it Also delete AppLock exe from the LOG_ERROR Windows directory and reboot the unit Deleting AppLock exe triggers the AppLock system to reload Address of keyboard AppLock successfully retrieved the address of the keyboard filter initialization LOG_EX hook procedure OK procedure Alt pressed The Alt key has been pressed and trapped by the HotKey
148. ed and disconnected There may be audible or visual signals as paired devices re connect with the Thor VM1 The default Bluetooth setting is On The Thor VM1 cannot be discovered by other Bluetooth devices when the Computer is discoverable option is disabled unchecked on the Settings panel Other Bluetooth devices cannot be discovered if they have been set up to be Non Discoverable or Invisible When Filtered Mode is enabled the Thor VM1 can pair with one Bluetooth scanner and one Bluetooth printer When Filtered Mode is disabled the Thor VM1 can pair with up to four Bluetooth devices It is not necessary to disconnect a paired scanner and printer before a different scanner or printer is paired with the Thor VM1 The target Bluetooth device should be as close as possible up to 32 8 ft 10 meters Line of Sight to the Thor VM1 during the pairing process Assumption The System Administrator has Discovered and Paired targeted Bluetooth devices for the Thor VM1 The Thor VM1 operating system has been upgraded to the revision level required for Bluetooth client operation An application or API is available that will accept data from serial Bluetooth devices Bluetooth Devices The Bluetooth Devices tab displays any device previously discovered and paired with the Thor VM1 LXEZ Pairing Bluetooth Devices Settings Reconnect About Bluetooth Address Clear Discover Discover Tap
149. ed by double tapping the Summit icon in the taskbar or on the desktop Certs The Certs option displays a readme file containing details on how the Summit Configuration Utility SCU handles certificates for WPA authentication 3 13 Command Prompt Start gt Programs gt Command Prompt File Edit Help Pocket CMD v 6 0 gt Type help cmd at the command prompt to view valid Pocket PC Console commands Exit the command prompt by typing exit at the command prompt or tap File gt Close eXpress Scan The eXpress Scan utility allows an administrator to scan bar codes to provide the initial network and Avalanche Mobile Device Server address configuration This eliminates the need to edit radio parameters manually on the Thor VM1 eXpress Scan uses bar codes created with eXpress Config Internet Explorer Start gt Programs gt Internet Explorer This option requires a WLAN or WWAN card and an Internet Service Provider There are a few changes in the Windows CE version of Internet Explorer as it relates to the general desktop Windows PC Internet Explorer options Tap the button to access Internet Explorer Help Media Player Start gt Programs gt Media Player There are few changes in the Windows CE version of Media Player as it relates to the general desktop Windows PC Microsoft Media Player options After the Media Player application is running click the button to access Media Player Help 3 14 Fi
150. ed for an Ad Hoc connection to another client device If a channel is selected that is not supported by the by the radio the default value is used Options are 1 through 14 the 2 4GHz channels 36 40 44 48 the UNII 1 channels When set to On and the current connection to an AP weakens the radio aggressively scans for available APs Aggressive scanning works with standard scanning set through Roam Trigger Roam Delta and Roam Period Aggressive scanning should be set to On unless there is significant co channel interference due to overlapping APs on the same channel Use of Cisco Compatible Extensions CCX radio management and AP CCX or CCX Features ABG i specified maximum transmit power features This parameter cannot be changed Use of Wi Fi Multimedia extensions WMM off Options are On Off Devices running Windows XP can change the default value Devices running all other OS cannot change the default value Specifies the type of authentication server Auth Server Type 1 Options are Type 1 ACS server and Type 2 non ACS server Authentication method used within the secure tunnel created by EAP TTLS Options are AUTO EAP Any available EAP method TTLS Inner Method Auto EAP Ne MSCHAP PAP CHAP EAP MSCHAPV2 Type of Pairwise Master Key PMK caching to use when WPA2 is in use PMK caching is designed to speed up roaming between APs by allowing the client and the AP to cache the results of 802 1X authentic
151. ed records are displayed all others are not displayed 3 42 Log Note If a level higher than Error is selected the status should be cleared frequently by the administrator In addition to the three view levels the administrator can select that all status information be logged or turn off all status information logging completely The system default is None however to reduce registry use the administrator may want to select None after verifying the configuration Tap the Clear button to clear the status information from the registry None Error Processing Extended All Save As When the Save As button is selected a standard Save As dialog screen is displayed Specify the path and filename If the filename exists the user is prompted whether the file should be overwritten If the file does not exist it is created See Also Error Messages 3 43 AppLock Help The mobile device won t switch from Administration mode to end user mode e Ifthe configuration is valid for one application but not the other the switch to end user mode fails AppLock stays in Administration mode and is stopped until the Administrator password is entered The hotkey sequence needed is not allowed What does this mean When the Administrator is selecting a hotkey sequence to use when switching user modes they are not allowed to enter key combinations that are reserved by installed software applications Only RFTerm key
152. eetetetenees 3 113 ILENMET ODORS ereire ce en ace eden te Aree ene tested ches cue tea eee nobe as Heaton ee Samoa Dares see oct ais 3 114 ICY DOGG sca es eee hs ce io da to gt ee hada 3 117 OY PAG aise he ae lt ado 3 118 Key Map Tab cacon ese aei ch oe eten do o a a a Eea 3 119 Remap a Single Key 0 0 00 nc 3 119 Remap a Key to a Unicode Value ooooooccccccccccccccccccccccccccccccccccnncnnn cnn nro 3 119 Remap a Key Sequence oo cece cece cece ns 3 120 Remap a Key to a Sequence of Unicode Values 21 eee cece cece ce ececcecccccccceccccecceceeeeeees 3 120 Remap an Application 2222 00 22 cece c cece cece cece cece cece cece ccc e eee e cece ce eeeeeeeeeeeeeeeeeeeeees 3 120 Remap a Command 2 222 ccc cece cece ccc cece cece cece cece cece cece cece eeeeee eee eeeeeeeeeeeeceeeeeeeeeees 3 121 LaunchApp Labs voca sce dusduleeaceceeesseusadeededs cise ceeyguGlecdcsuusneiedudckgeSes ededadietencsex 3 122 Runcma TAD 6s ct tee Pe ce ected te ane Pec ee eye teen eee sana 3 123 License VIS WO noticias di li dit ibi 3 124 MIX ups os a A lo lt acto te 3 125 Output Panel ns 3 125 Input Panel 2 0 0 eee eee e eee e eee ee ce eee e ee ceeceececeeeeeeeneneenenecnscncencccecceccecccceccccecccccccesccseececeeeee 3 126 AAA er st ae A er ee O eee 3 127 Network and Dialup Options 2 2 2 22222222 c cece eee ccc cece cece cece cee e cece cece eee eeeeeeeeeceeeeeeeeeeeeees 3 128 Create a New Connection 2 222220 2 0 ee
153. efault is 5 seconds Tap OK 8 TCP IP Settings should not need to change from defaults Tap the Finish button to create the new connection 10 11 12 13 14 Close the Remote Networking window To activate the new connection select Start gt Settings gt Control Panel gt PC Connection and tap the Change Connection button Select the new connection Tap OK twice Close the Control Panel window Connect the desktop PC to the mobile device with the appropriate cable Click the desktop Connect icon to test the new connection You can activate the connection by double tapping on the specific connection icon in the Remote Networking window but this will only start an RAS Remote Access Services session and does not start ActiveSync properly 3 128 Network Capture Start gt Settings gt Control Panel gt Network Capture Note Verify the date and time before using the logging utilities to ensure meaningful data The Network Capture panels provide configuration options for logging utilities Two types of logging are configurable Netlog is a Windows CE utility that monitors network traffic Netlog creates a CAP file that can be read using Microsoft Windows Network Monitor or any compatible tool that supports CAP files NDISLog monitors the NDIS interface between the Summit radio and the NDIS driver This utility creates a TXT log file Factory Default Settings Netlog tab Command options pkt_size in byt
154. ei 2 4 Vehicle DC Power Supply nc 2 4 External AC Power Supply 2 002000 cece ec ccc cece k ee ccc e e e ccc ceceeceeeeeeseeeeeeeeeteneenees 2 4 Uninterruptible Power Supply 22 22 20 c cece cece cece cece ce cece cece cece cece ce eeeeeeeteeeeeneees 2 4 Backup Battery a aiei 0 aa aaa 2na aaea a a E Aa aa Laa aaan are raaraa reann enon 2 5 IT BG oe ate A A E a boc r a A AR EA 2 5 Power Management Modes 2 2 2 2 eee eee cece cece cece cece cece cece cece ccc EAA A E earar earrannan 2 6 ON Mode DO 1 0300 de dt SE Dg Re eee EE OE ee tas ds 26 User Idle Backlight Off Mode D 1 oooooocccccccccccccccccccccnccnncnnnnn cnn nnnnn nono oraaa rarnana 2 6 System Idle Display Off Mode D2 22 0000 e cece cece eee cecececcceceeceeeeeeees 2 6 Suspend mode DB e cece cece cece cece eee AA EDADA ADAADA EALE DLEE DEE aana anonn 2 6 Shutdown Off Mode D4 00 cece cece cece cece cece cece cece cece cece eee e cece cece cece eeeeeeeeeteteeeneees 2 6 Prima Events 5 652 eto sence ye as tai det rias 2 7 User Primary Events 255052 soc ilatina 2 7 System Primary Events nc 2 7 Wake Source Events eee e ec eee ene cence ence DEDALA DDADL LDL Daana 2 7 Power Switch 0 0202 2 cece eee ccc cnn 2 9 Thor VM1 Power Button 00 00000000 cc cece ccc cnc 2 9 Vehicle Ignition Monitoring 2222 22 22 cece eee cece cece cece cece cece cece cece cece cece cece eeeeeeeeeeeeeeeees 2 10 Auto On Behavior 2 10 Auto On Enabled
155. en the Thor VM1 and the highlighted paired Bluetooth device Remove an unpaired device from the Bluetooth device list The highlighted device name and iden tifier is removed from the Thor VM1 Bluetooth Devices panel after the user taps OK Properties More information on the highlighted Bluetooth device Delete 3 57 Bluetooth Device Properties Bluetooth Properties E Name AE Bluetooth Address 00 20 E0 00 12 34 COD oxe006 14 Subclass COM port Status not pared Data on the Bluetooth Properties panel cannot be changed by the user The data displayed is the result of the device Query performed during the Discovery process The Status dialog box reflects the current state of the highlighted device 3 58 Settings LXEZ Pairing OK x Bluetooth Devices Settings Reconnect About V Computer is connectable Turn OFF Bluetooth Computer is discoverable v Prompt if devices request to pair 7 Continuous search M Filtered Mode 7 Printer Port COM Computer Friendly Name 7 Logging Note These options can still be checked or unchecked whether Bluetooth connection is enabled or disabled Turn Off Bluetooth Tap the button to toggle the Bluetooth client On or Off The button title changes from Turn Off Bluetooth to Turn On Bluetooth Default The default value is Bluetooth On 3 59 Options l This option is Enabled by default Comp
156. er any software updates and additional configuration data are downloaded 5 28 Chapter 6 Wireless Network Connections Summit Wireless Network Configuration The Summit client device is a Summit 802 11a b g radio capable of 802 11a 802 11b and 802 11g data rates The radio can be configured for no encryption WEP encryption or WPA security Security Options Supported are None WEP LEAP WPA PSK WPA LEAP PEAP MSCHAP PEAP GTC EAP TLS EAP FAST Important Notes It is important that all dates are correct on the Thor VM1 and host computers when using any type of certificate Certificates are date sensitive and if the date is not correct authentication will fail It may be necessary to upgrade radio software in order to use certain Summit Client Utility SCU features Contact Technical Assistance for details When using the 802 11a radio the U NII 1 band is the preferred band for indoor operation For regulatory domains in which the U NII 3 band is allowed the following channels are supported 149 153 157 and 161 The AP must be configured accordingly After making any changes to the wireless configuration warmboot the Thor VM1 6 1 Summit Client Utility Note When making changes to profile or global parameters the device should be warmbooted afterwards Start gt Programs gt Summit gt SCU or SCU Icon on Desktop or Summit Tray Icon if present or Wi FI Icon in the Windows Control Panel if present
157. er presence status on this tab If a defroster is installed the defroster can be switched between the Enabled and Disabled states using the radio buttons on this tab The default is Enabled Specify the Defroster trip point The default trip point is 40 C 104 F 3 140 Power Start gt Settings gt Control Panel gt Power The Thor VM1 power mode timers are cumulative The System Idle timer begins the countdown after the User Idle timer has expired and the Suspend timer begins the countdown after the System Idle timer has expired When the User Idle timer is set to Never the power scheme timers never place the device in User Idle System Idle or Suspend modes even when the device is idle The Display gt Backlight setting is synchronized with the User Idle setting in the Schemes tab in the Power control panel Factory Default Settings Battery tab No user interaction Schemes tab Power Scheme Battery Power AC Power User Idle Timeout 2 minutes System Idle Timeout 2 minutes Suspend Timeout 8 hours Power Properties Ed OK E Battery Schemes Device Status Status External Good Percentage of power left in UPS 90 3 141 Power Properties Battery Schemes Device Status Power Scheme Jac Power y _S Switch state to User Idle after 2 minutes y Switch state to System Idle after 2 minutes y Switch state to Suspend after 5 minutes y Power Propertie
158. er should not be installed on the mobile device s The following features are supported by the Wavelink Avalanche Enabler when used in conjunction with the Avalanche Manager After configuration Enabler files are installed upon initial bootup and after a hard reset Network parameter configuration is supported for e P address DHCP or static IP e RF network SSID e DNS hosts primary secondary tertiary e Subnet mask e Enabler update Related Manual Using Wavelink Avalanche The Thor VM1 has the Avalanche Enabler installation files loaded but not installed on the mobile device when it is shipped The installation files are located in the System folder on CE devices The installation application must be run manually the first time Avalanche is used After the installation application is manually run a reboot is necessary for the Enabler to begin normal performance Following this reboot the Enabler will by default be an auto launch application This behavior can be modified by accessing the Avalanche Update Settings panel through the Enabler Interface The designation of the mobile device to the Avalanche CE Manager is LXE_THOR Internet Explorer Start gt Programs gt Internet Explorer This option requires a radio card and an Internet Service Provider There are a few changes in the Windows CE version of Internet Explorer as it relates to the general desktop Windows PC Internet Explorer options Tap the button to acces
159. erence guide has been developed for a Thor VM1 with a Microsoft Windows Embedded CE 6 operating system 1 1 End User License Agreement EULA When a new Thor VM1 starts up a EULA is displayed on the touch screen It remains on the screen until the Accept or Decline button is tapped with a stylus Tap the Accept button to accept the EULA terms and the Thor VM1 continues the startup process The EULA is not presented to the user again Tap the Decline button to decline the EULA and the Thor VM1 will reboot It will continue to reboot until the Accept button is tapped with the stylus Note The EULA will be presented after any operating system upgrade or re installation including language specific operating systems 1 2 Components Front View A OU N Power Button Speakers Microphone Ambient Light Sensor Back View with Quick Mount Smart Dock BAAR AAA AAG on 19 9 ox I ill hve ed oxi LM F TN EO Access Panels 1 Antenna Connectors on Thor VM1 N NQF Q 10 11 12 13 14 15 SIM card Access Panel on Thor VM1 COM1 Connector on Dock COM2 Connector on Dock USB Connector on Dock CAN Audio Connector on Dock Quick Release Handle On Thor VM1 Provision for Padlock on Thor VM1 Provision for Laptop Security Cable on Thor VM1 Power Switch on Dock Power Connector on Dock Fuse on Dock SD Card Access Pane
160. ertificate store 7 Access the Credentials screen again Make sure the Validate server and Use MS store checkboxes are checked 8 The default is to use the entire certificate store for the CA certificate Alternatively use the Browse button next to the 10 11 12 13 Note Note CA Cert CA Certificate Filename on the Credentials screen to select an individual certificate For EAP TLS also enter the User Cert User Certificate filename on the credentials screen by using the Browse button If using EAP FAST and manual PAC provisioning input the PAC filename and password Click the OK button then the Commit button If changes are made to the stored credentials click Commit to save those changes before making any additional changes to the profile or global parameters Verify the device is authenticated by reviewing the Status tab When the device is property configured the Status tab indicates the device is Authenticated and the method used See Configuring the Profile for more details If invalid credentials are entered into the stored credentials the authentication will fail No error message is displayed The user may or may not be prompted to enter valid credentials How to Use Sign On Screen 1 After completing the other entries in the profile click on the Credentials button Leave the Username and Password blank No entries are necessary on the Credentials screen for LEAP or LEAP WPA For PEAP MSCHAP an
161. es 5000 cap_size in bytes 500000 cap file netlog Promiscuous Mode Disabled NDISLog tab i ndislog txt Netlog Use this control panel to configure the Netlog utility By configuring Netlog using the control panel Netlog remains running across a warmboot However please note that e Netlog first stores data to a file named netlog0 cap then netlog1 cap Any time the current file reaches maximum size Netlog switches to the other file e Ifthe log file is stored in the root directory any previous data is lost and a new log file started after the warmboot e Ifthe log file is stored in System all previous data is saved across the warmboot e If Netlog is enabled across the warmboot a series of brief popups may be displayed during the boot cycle No user interaction is required 3 129 Network Capture El OK E Netlog NOISLog Command Options load O unload sono pkt_size in bytes O options O start O stop sooo cap_size in bytes cap file Promiscuous Mode 7 Enabled IfName SDCSD30AG1 isysteminetiog ready to run command Command Command Specifies the option to perform See the table below for the option parameters and values CON Options pkt_sizein Specifies the maximum packet size captured in bytes This option should only be run after you have called load bytes and stop Default is 5000 cap_size in Specifies the maximum size of Netlog0 cap or Netlog1 cap in by
162. es RegLoad to open the file and make the indicated settings in the registry REGDUMP EXE Registry dump Saves a copy of the registry as a text file The file REG TXT is located in the root folder The Thor VM1 includes a Load User Defaults option in the Registry control panel This is the preferred method for saving a backup of the registry Save the registry file to the System folder on the Reference Guide persistent storage or copy the file to aPC WARMBOOT EXE Double click this file to warm boot the computer i e all RAM is preserved It automatically saves the registry before rebooting which means configuration changes are not lost WAVPLAY EXE Double tapping a sound file e g WAV causes WavPlay to open the file and run it in the background Thor VM1 Command line Utilities Command line utilities can be executed by Start gt Run gt program name PrtScrn EXE Command line utility which performs a screen print and saves the file in BMP format in the System folder Tap Start gt Run and type prtscrn and tap OK or press Enter There is a 10 second delay before the screen print is made The device beeps and the screen captured file scrnnnnn bmp is placed in the System folder The numeric filename is incremented by 1 each time the PrtScm function is activated The command is not case sensitive 3 8 Desktop Note For general use instruction please refer to commercially available Windows CE user s guides
163. et screen properties for the Thor VM1 Factory Default Settings Screen Blanking Blackout Enable screen blanking Disabled Screen on delay ms 1000 COM Port none selected Current Level LCD Brightness 100 see note Ambient Light see note Automatic Brightness Control Automatic brightness control is only available on a Thor VM1 with an outdoor display Enable automatic brightness Disabled control Low to medium light level 25 Medium to high light level 75 Note If Automatic Brightness Control is enabled for an outdoor display the value for LCD Brightness depends on the Ambient Light Otherwise the display defaults to 100 brightness Note There is no default value for Ambient Light as it varies depending on the level of light where the Thor VM1 is located If the Thor VM1 has an indoor display it does not have an ambient light sensor and the Ambient Light is always 0 3 147 Screen Control v0 2 Screen Blanking Blackout 7 Enable screen blanking Screen on delay ms 1000 COM Port Current Level LCD Brightness foo Ambient Light 9 fo Automatic Brightness Control for outdoor display only Enable automatic brightness control Low to medium light level Medium to high light level Note Touch screen defroster controls are located on the Peripherals tab 3 148 Screen Blanking Screen blanking requires the following hardware e A Screen
164. etting or press the Esc key to revert to the previous calibration settings Note Ifthe touch screen looses calibration on a Thor VM1 with the 12 key keypad you must use a USB mouse or keyboard attached to the Thor VM1 to access this tab to recalibrate the touch screen 3 150 System Start gt Settings gt Control Panel gt System Use these Thor VM1 panels to e Review System and mobile device data and revision levels e Adjust Storage and Program memory settings e Assign a device name and device descriptor Factory Default Settings 1 4 storage 3 4 program memory Unique to equipment type Device Description Unique to equipment type General Tab System Properties E OK x General memory Device Name Copyrights System Computer Microsoft Windows CE Processor Type intel Corp x86 Intel Version 6 00 Expansion Slots z Memory 352564 KB RAM 0 2006 Microsoft Corp All rights reserved This computer program is protected by U S and international copyright laws Registered to System This screen is presented for information only The System parameters cannot be changed by the user Computer The processor type is listed The type cannot be changed by the user Total computer memory and the identification of the registered user is listed and cannot be changed by the user Memory sizes given do not include memory used up by the operating system For example a system
165. ettings gt Control Panel gt WiFi or click the Summit Client Utility icon Use this option to set parameters and manage profiles for the wireless client pre loaded on your Thor VM1 See the Summit Client Utility for information and instruction 3 157 3 158 Chapter 4 ActiveSync Introduction Requirement ActiveSync version 4 5 or higher for Windows XP desktop laptop computers must be resident on the host desktop laptop computer Windows Mobile Device Center version 6 1 or higher is required fora Windows Vista Windows 7 desktop laptop computer ActiveSync and Windows Mobile Device Center for the PC is available from the Microsoft website Follow their instructions to locate download and install ActiveSync or Windows Mobile Device Center on your desktop computer Note For readability in this section ActiveSync will be used in instructions and explanations If you have a Windows Vista or Windows 7 operating system on your desktop laptop replace ActiveSync with Windows Mobile Device Center Using Microsoft ActiveSync you can synchronize information on your desktop computer with the Thor VM1 and vice versa Synchronization compares the data on your mobile device with your desktop computer and updates both with the most recent data For example you can e Back up and restore your device data e Copy rather than synchronize files between your device and desktop computer e Control when synchronization occurs by selecting a synchro
166. eventing the locked application from exiting AppLock must also prevent the application from enabling the taskbar and resizing the application s LOG_EX window This message traps a change in the window position and corrects it gt T ee LOG_ AppLock is calling the keyboard hook initialization PROCESSING The keyboard filter initialization failed LOG_ERROR The keyboard hook dll exists and loaded successfully LOG_EX Processing the backdoor entry LOG_EX When AppLock first loads itloads a dll that contains the keyboard hook processing LOG_ This message is logged prior to the load attempt PROCESSING 3 48 Message Explanation and or corrective action a The status information is being saved to a file and the file open has failed This Open failure could occur if the file is write protected If the file does not exist it is created POG ERROR If the Administration registry key does not exist the switch to user mode fails Open registry failure because the AppName value in the Administration key is not available LOG ERROR Opened status file The status information is being saved to a file and the file has been opened LOG EX successfully DuLonme many Ior Not enough memory to encrypt the password LOG_ERROR encrypted pwd 9 Y yp P pReal TaskbarnindProc The taskbar control has already been installed LOG_EX already set Pwd cancelled or invalid The password prompt was cancelled by the user or the maximum number of failed LOG EX
167. eyboard LED behavior identifies the active sticky modifier mode state of the keyboard 64 Key QWERTY Keyboard EJ E E hd Es The Thor VM1 has a QWERTY keyboard available with a standard overlay an IBM 3270 overlay or an IBM 5250 overlay e Because the keyboard only has 64 keys all functions are not visible or printed on the keyboard Therefore the Thor VM1 keyboard supports what is called hidden keys keys that are accessible but not visible on the keyboard A key or combination of keys can be remapped to provide a single keypress a string of keypresses or to execute an application or command Key remapping is configured via the KeyPad option in the Control Panel Start gt Settings gt Control Panel gt KeyPad e Remapped keys persist across a warmboot or power cycle e The keyboard does not have a NumLock indicator or key NumLock is always On e The warmboot behavior of CapsLock can be set via the Misc tab in Start gt Settings gt Control Panel gt Options The Thor VM1 keyboard keys are backlit e By default the keyboard backlight follows the display backlight When the display backlight is on the keyboard backlight is on e Ifthe display backlight brightness is increased or decreased the keyboard backlight brightness is increased or decreased 2 25 e The keyboard backlight and the display share the same timer which is configured in Start gt Settings gt Control Panel gt Power e
168. ff the LED 2 34 Alt LED The Alt key is not present on the 12 key keypad e Indicates the Alt modifier key is active Alt mode is invoked for the next keypress Solid Green only e Pressing the Alt key a second time exits this modifier mode and turns off the LED 2 35 Display The display is a thin film transistor display capable of supporting WVGA graphics modes Display size is 800 x 480 pixels The display covering is designed to resist stains The touch screen allows signature capture and touch input The display supports screen blanking to eliminate driver distraction when the vehicle is in motion Touch Screen The touch screen is a Resistive Panel with a scratch resistant finish that can detect touches by a stylus and translate them into computer commands In effect it simulates a computer mouse Only Delrin or plastic styluses should be used A right mouse click is simulated by touching and holding the screen for the appropriate time interval Always use the point of the stylus for tapping or making strokes on the display Never use an actual pen pencil sharp or abrasive object to write on the touch screen An extra or replacement stylus may be ordered A replaceable touch screen protective film is available when the Thor VM1 is used in an abrasive environment Contact Technical Assistance for availability Note Ifthe touch screen is disabled or looses calibration on a Thor VM1 with the 12 key keypad you
169. five years with normal use before it requires replacement Note The backup battery should only be changed by authorized service personnel Fuse The Thor VM1 uses an 8A time delay slow blow fuse that is externally accessible and user replaceable The fuse is located on the back of the Quick Mount Smart Dock The fuse is accessed by unscrewing the cap as indicated below Should it need replacement replace with same size rating and type of fuse Littelfuse 0215008 MXP or equivalent Fuse has voltage on it even when power is off Always disconnect input power before changing the fuse Power Management Modes The Thor VM1 supports the standard Microsoft Windows CE power management modes On DO Backlight Off D1 Display Off D2 and Suspend D3 On Mode D0 When the Thor VM1 is attached to either vehicle power or an external power supply or is operating from the UPS battery and the power button is pressed the Thor VM1 is in the On mode In this mode the keypad touch screen and any attached peripherals such as a scanner function normally The display remains on until the backlight timer if enabled expires User Idle Backlight Off Mode D1 Backlight is dimmed but display is readable The Thor VM1 transitions to this mode from On after the User Idle timeout period has passed without a primary even occurring System Idle Display Off Mode D2 Backlight and display are off The status LED is solid green The
170. g slowly External power not present 1 2 sec on 1 1 2 sec off CPU temperature less than 20 C Need to move unit to warmer environment 2 31 UPS Status LED The behavior of the UPS LED depends if external power is connected or not External Power Present LED LEDBehavior EF UPS charging e UPS charged Solid Green UPS charging e Any charging fault e Out of charging temperature range e NoUPS present e Charge timeout Solid Amber External Power Not Present LED LEDBehavior q A e UPS not present Solid Amber UPS supplying power and discharging Solid Red Approximately 2 minutes runtime until shutdown SSD Solid State Drive LED Flashing Green SSD read or write activity No SSD read or write activity 2 32 Connection LEDs eum 1 WWAN LED 2 WiFi LED 3 Bluetooth LED WWAN LED Solid Green Indicates a WWAN connection to a network Indicates no WWAN connection WiFi LED Solid Green Indicates a connection with an IP address to an Access Point Indicates no connection to an Access Point Bluetooth LED Blue Blinking Slowly Bluetooth is paired but not connected to a device Blue Blinking Medium Bluetooth is paired and connected to a device Blue Blinking Fast Bluetooth is discovering Bluetooth devices Bluetooth hardware has been turned off The Bluetooth LED blinks once every 6 seconds when the Bluetooth client is paired but not connected It
171. gP promp y PROCESSING LOG_ PROCESSING F a LOG_ Exit restart app timer Processing is at the end of the timer function PROCESSING z Exiting the function that switches the screen mode back to normal operation for the LOG_ Exit ToAdmin Exiting the function that handles the mode switch into admin mode LOG g PROCESSING Exit ToUser Exiting the user mode switch function eae me di PROCESSING 3 47 There are two exit paths from the enumeration function This message denotes the LOG_ enumeration function did not find the application PROCESSING Exit password timeout Exiting password timeout processing Message Explanation and or corrective action Level Exit ToUser Registry read failure er LOG_ The AppName value does not existin the registry so user mode cannot be entered PROCESSING Exit verify password no Eds i LOG_ Exiting password verification PROCESSING Exit verify password Exiting password verification LOG response from dialog gp i PROCESSING Found taskbar The handle to the taskbar has been found so that AppLock can disable itin user LOG_ mode PROCESSING Getting address of keyboard hook init procedure Getting configuration from registry a ae LOG_ AppLock is retrieving the address of the keyboard hook PROCESSING The AppLock configuration is being read from the registry This occurs at initialization and also at entry into user mode The registry must be re read atentry LOG_ into user mode in case
172. he 12 key keyboard is available on the Thor VM1 running Windows CE 6 0 Because the keyboard only has 12 keys all functions are not visible or printed on the keyboard Therefore the Thor VM1 keyboard supports what is called hidden keys keys that are accessible but not visible on the keyboard A key or combination of keys can be remapped to provide a single keypress a string of keypresses or to execute an application or command Key remapping is configured via the keyboard option in the Control Panel Start gt Settings gt Control Panel gt KeyPad Remapped keys persist across a warmboot or power cycle The keyboard does not have a NumLock indicator or key NumLock is always On The warmboot behavior of CapsLock can be set via the Misc tab in Start gt Settings gt Control Panel gt Options The Thor VM1 keyboard keys are backlit Note By default the keyboard backlight follows the display backlight When the display backlight is on the keyboard backlight is on If the display backlight brightness is increased or decreased the keyboard backlight brightness is increased or decreased The keyboard backlight and the display share the same timer which is configured in Start gt Settings gt Control Panel gt Power The keyboard backlight can be disabled See Start gt Settings gt Control Panel gt Options gt Misc tab When automatic brightness control is enabled for a Thor VM1 with an Outdoor display the manual disp
173. he WEP Keys PSK Keys button is active and also determines the available entries in the WEP or PSK pop up window Specify 802 11a 802 11b and or 802 11g rates when communicating with the AP The options displayed for this parameter depend on the type of radio installed in the mobile device Options B rates only 1 2 5 5 and 11 Mbps BG Rates Full All B and G rates G rates only 6 9 12 18 24 36 48 and 54 Mbps BG optimized or BG subset 1 2 5 5 6 11 24 36 and 54 Mbps A rates only 6 9 12 18 24 36 48 and 54 Mbps ABG Rates Full All A rates and all B and G rates with A rates preferred BGA Rates Full All B and G rates and all A rates with B and G rates preferred Ad Hoc when connecting to another client device instead of an AP Default BGA Rates Full for 802 11a b g radio It is important the Radio Mode parameter correspond to the AP to which the device is to connect For example if this parameter is set to G rates only the Thor VM1 may only connect to APs set for G rates and not those set for B and G rates Contact Technical Assistance if you have questions about the antenna s installed on your Thor VM1 6 10 Status Tab Start gt Programs gt Summit gt Status tab Summit Client Utility Main Profle Status Diags Global ok lt Profile Default Status Associated Device Name Unnamed IP 100 100 100 100 MAC 00 17 23 00 00 00 AP Name Unknown IP 10
174. he persistent storage virtual drive Then information is added to the registry if desired to make the CAB file auto launch at startup The registry information needed is under the key HKEY_LOCAL_MACHINE Software LXE Persist as follows The main subkey is any text and is a description of the file Then four mandatory values are added FileName is the name of the CAB file with the path usually System Installed is a DWORD value of 0 which changes to 1 once auto launch installs the file 3 6 FileCheck is the name of a file to look for to determine if the CAB file is installed This will be the name of one of the files with path installed by the CAB file Since the CAB file installs into DRAM when memory is lost this file is lost and the CAB file must be reinstalled Order is used to force a sequence of events Order 0 is first and Order 99 is last Order must be greater than 4 for the Thor VM1 Two items which have the same order will be installed in the same pass but not ina predictable sequence There are two optional fields that may be added 1 Delay is used to add a delay after the item is loaded before the next is loaded The delay is given in seconds and defaults to 0 if not specified If the install fails or the file to be installed is not found the delay does not occur PCMCIA is used to indicate that the file usually a CAB file being loaded is a radio driver and the PCMCIA slots should be started after
175. he selected scheme to the display Backlight Display Properties Background Appearance Backlight To save battery life you can adjust when the backlight automatically shuts off Automatically turn off backlight while on battery power Turn off after 30 seconds y of continuous idle time Automatically turn off backlight while on external power Turn off after 2 minutes y of continuous idle time When the backlight timer expires the touch screen backlight is dimmed not turned off When both checkboxes are unchecked the backlight never turns off or dims The default values are 2 minutes for external power and 30 seconds when operating on the internal UPS battery 3 104 Gobi Connection Manager Start gt Settings gt Control Panel gt Gobi Connection Manager or Tap the Gobi Connection Manager Desktop Icon or Tap the Gobi Connection Manager icon in the system tray or Tap Start gt Programs gt GobiCM gt GobiCMExe Note Earlier versions may be labeled LKEGobiCM gt LXEGobiCMExe Set parameters for optional internal WWAN module View connection status and select firmware CDMA Use this tab to activate a CDMA carrier such as Verizon UMTS Use this tab to test and save connection parameters View GPS statistics View information on the WWAN card The Gobi Connection Manager tray icon indicates the status of the connection in dark blue bars If you hover the mouse pointer over the Connection Manager Task
176. hen an application name is tapped by the end user the application is launched if inactive and brought to the foreground Applications set up with Manual Launch enabled may or may not be launched at bootup This function is based on the application s Auto At Boot setting The applications have been listed as approved applications for end user manual launch using the Switchpad menu structure The approved applications are listed on the Switchpad A checkmark indicates the applications active status When Manual Launch is disabled for an application and Allow Close is enabled for the application when the end user closes the specific application it is no longer available shown on the Switchpad When Auto At Boot and Manual Launch are both disabled for a specific application the application is 1 not placed on the list of approved applications for end user manual launch and 2 never launched and 3 not displayed on the Switchpad Allow Close Application Launch Options Launch Y Auto At Boot Retries fo Delay fro Y Auto Re launch Retries fo Delay fo Manual T low Close Default is Disabled When enabled the associated application can be closed by the end user This option allows the administrator to configure applications that consume system resources to be terminated if an error condition occurs or at the end user s request Error conditions may generate a topmost popup requiring an end user respons
177. his password protection or perform a Load Factory Defaults contact Customer Support Factory Default Settings Password Settings Password Password Confirm password Enable Password Protection _ At Power On e The password and password settings are saved during a warm boot and a restart e The screensaver password affects the Remote Desktop screensaver only e After a password is assigned and saved each time a Settings gt Control Panel option is selected the user will be required to enter the password before the Control Panel will open e The screensaver password is the same as the power on password They are not set independently e Ascreensaver password cannot be created without first enabling the Enable password protection at power on checkbox e The screensaver password is not automatically enabled when the power on checkbox is enabled Enter the password in the Password text box then press Tab and type the password again to confirm it Enable the power on checkbox and if desired the screensaver checkbox A changed saved password is in effect immediately 3 138 PC Connection Start gt Settings gt Control Panel gt PC Connection Use these options to control a cabled connection USB serial between the Thor VM1 and a nearby desktop laptop computer Factory Default Settings Enable direct connection Enabled Connect using USB Client PC Connection
178. id VK code key is output e Otherwise key is ignored not output If key output is disabled a windows message is broadcast to notify listening applications that data is available The manipulated data is ready to be read by applications 3 75 Factory Default Settings Main Tab Device 1 Device 2 Device 3 Send Key Message WEDGE COM1 Tab External serial port Baud Rate Stop Bits Parity Data Bits Power on Pin 9 COM2 Tab External serial port Baud Rate Stop Bits Parity Data Bits Power on Pin 9 Data Options Tab Enable Code ID Symbology Settings Control Character Translate All Custom IDs Processing Tab Enable buffered key output Same buffer limit Delay between buffers Disabled Disabled Disabled Enabled Enabled Enabled None A Disabled Name blank Enabled 3 76 Main Tab Start gt Settings gt Control Panel gt Data Collection gt Main tab The parameters shown on these panels are only those that apply to the specific mobile device Parameter Device 1 2 3 Send Key Messages WEDGE Data Collection Main coma come Data Options Processing About Device 1 Device 2 Device 3 disabled disabled disabled O comi O comi O comi O comz O comz O coma O Bluetooth ul Output Enable hal Output Enable C Output Enable Send Key Messages WEDGE 1 Default is Disabled 2 Default is Disabled 3 Default is
179. igured the entire set of parameters from that symbologies screen are in effect for that symbology In other words either the settings for the configured symbology will be used or the default settings are used not a combination of the two If asymbology has not been configured does not have an next to it the settings for All are used which is not necessarily the default Clear Button Clicking this button will erase any programmed overrides returning to the default settings for the selected symbology If Clear is pressed when All is selected as the symbology a confirmation dialog appears then all symbologies are reset to their factory defaults and all star indications are removed from the list of Symbologies Click the Yes button or the No button 3 83 Enable Min Max Enable This checkbox enables checked or disables unchecked the symbology field The scanner driver searches the beginning of the bar code data for the type of ID specified in the Data Options tab Enable Code ID field plus any custom identifiers When a code ID match is found as the scanner driver processes incoming bar code data if the symbology is disabled the bar code is rejected Otherwise the other settings in the dialog are applied and the bar code is processed If the symbology is disabled all other fields on this dialog are dimmed If there are customized settings uncheck the Enable checkbox for the All symbology This
180. ility has been executed at least once User Interface The Enabler can be configured and controlled manually through the user interface on the Thor VM1 This section details the functionality that can be controlled by the user or system administrator Parameters and Screen Displays Screen displays shown in this section are designed to present the end user with information graphically Placement of information on the screen displays may be split between one or many tabbed panels Standard Avalanche Enabler parameters that are not supported by Honeywell may be missing or dimmed visible but unable to be edited on the tabbed panels or screen displays Enabler Configuration Depending on the version of the Enabler running on the Thor VM1 the desktop Enabler icon may look like one of the following N The available configuration options and tabs may vary by Enabler version The examples shown in this section assume the latest version of the Enabler is installed on the Thor VM1 The Enabler user interface application is launched by clicking either the Enabler icon on the desktop or Taskbar or by selecting Avalanche Enabler from the Programs menu The opening screen presents the Thor VM1 user with the connection status and a navigation menu File View Help Update Complete Update complete Note Some parameters and features described in this section may not be available if you are not running the latest version of the Enab
181. installation please substitute the appropriate directory 6 LXEConnect is now installed on the host PC and ready to use Using LXEConnect 1 Power up the Thor VM1 2 Connect the Thor VM1 to the host PC using the USB connection cable Once connected the ActiveSync dialog box appears and the ActiveSync connection is automatically established 3 Select No for partnership when prompted Dismiss any ActiveSync dialog boxes warning a partnership is not set up It is not necessary to establish a partnership to use LXEConnect However if a partnership is desired for other reasons one may be established now Double click the LXEConnect icon that was created on the PC desktop LXEConnect launches About CERDisp 6 Click the OK button to dismiss the About CERDisp dialog box see Example LXEConnect Notice image above on the Thor VM1 desktop by clicking the OK button in the LXEConnect window on the PC desktop The dialog box automatically times out and disappears after approximately 20 seconds 7 The Thor VM1 can now be configured from the LXE Connect window Input from the PC s mouse and keyboard are recognized as if they were attached to the Thor VM1 8 When the remote session is completed terminate the LXEConnect program by selecting File gt Exit or clicking on the X in the upper right hand comer to close the application then disconnect the ActiveSync cable 4 7 4 8 Chapter 5 Enabler Installation and Configura
182. into place until the retaining tab snaps into place Place the UPS battery into the well Note the orientation of the battery in the illustration below The flat surface of the battery points toward the bottom of the Thor VM1 Make sure all wires are inside the battery well so they are not pinched when the front panel is reinstalled 2 46 12 13 14 15 16 17 A Slot on Thor VM1 body B Wiring connector on Thor VM1 body C Wiring connector on front panel D Tab on front panel Position the front panel so the tab on the back of the front D in figure above panel lines up with the slot A in figure above on the Thor VM1 Be sure the two wiring connectors B and C in figures above are also aligned Gently press the front panel into place Tighten the fourteen 14 captive M3 screws In the order shown in the top figure above use a 2 Philips bit and torque the screws to 6 7 inch pounds Reinstall the Thor VM1 in the Quick Mount Smart Dock When the Thor VM1 is placed in the powered dock the UPS battery automatically reconnects The UPS battery automatically begins charging from the powered dock Restart the Thor VM1 2 47 2 48 Chapter 3 Software Introduction There are several different aspects to the setup configuration and operation of the Thor VM1 Many of the setup and configuration settings are dependent upon the optional features such as hardware and software installed on the unit The e
183. ion when this option is enabled Note If Allow Close is enabled and both Auto Re launch and Manual Launch are disabled the application cannot be restarted for the end user or by the end user after the application terminates Retries Default is 0 tries Retries is the number of times AppLock will try to re launch the application The retry count is reset after an application is successfully launched and controlled by AppLock Valid values are between 0 no tries and 99 tries or 1 for infinite Infinite tries ends when the application successfully launches Delay Default is 0 seconds no delay Delay is the amount of time AppLock waits prior to re launching an application that has terminated The delay is specified in seconds Valid values are between 0 no delay and 99 seconds AppLock must also be configured to automatically re launch an application To AppLock application termination by the end user is indistinguishable from application termination for any other reason 3 37 Manual Launch Application Launch Options Launch V Auto At Boot Retries fo Delay fro Auto Re launch Retries fo Delay fo 7 Allow Close Default is Disabled Enabling this option allows the end user to launch the specified application s Upon bootup completion an application with Manual enabled is listed on the Switchpad accompanied by a checkmark that indicates the application is currently active or available for Launching W
184. ipting and plug in behavior for each zone Internet Local intranet Trusted Sites Restricted Sites Use the Site button to add sites to each zone 3 114 Internet Options General Security Start Page nttp jinawi msn com Search Page http search msn com User Agent requires browser restart Windows CE Cache Size in KB 512 Delete Browsing History Internet Options General Connection 7 Use LAN no autodial Autocial name USE Client y Settings 7 Use configuration script Address 7 Use a proxy server DO Bypass for local addresses Address Port fo Internet Options General Security Internet Local Trusted sites Restricted _ Settings intranet sites Internet This zone contains all Web sites you haven t placed in other zones 3 115 Internet Options General Connection Security Privacy Cookies First party Cookies Third party Cookies Accept Accept Block Block Prompt O Prompt Always allow session cookies Internet Options General Advanced Accessibility Always expand ALT text for images Anchors navigate on access key Browsing Always send URLs as UTF 8 A Display a notification about every script error Enable stylesheets Enahla nana transitinns Internet Options General Connection Security Privacy Advanced Popups Popup Windows 7 Block popups Display notification when a popup has been blocked 7 Open
185. ist 3 Copy the modified GrabTime ini file to the My Device gt System folder on the mobile device The System GrabTime ini file takes precedence over the Windows GrabTime ini file System Grabtime ini also persists after a coldboot Windows Grabtime ini does not persist 3 133 Misc Options on this tab configure device specific options Note that options not available on the Thor VM1are dimmed or grayed out Options al OK E Communication Misc Status Popup CapsLock Touch Screen Disable Y Enable Keypad Backlight Enable Auto On CapsLock By default CapsLock is disabled after a warmboot To enable CapsLock after a warmboot click this checkbox Touch Screen Disable By default the Thor VM1 touch screen is enabled To disable the touch screen after a warmboot click this checkbox Note Ifthe touch screen is disabled on a Thor VM1 with the 12 key keypad you must use a USB mouse or keyboard attached to the Thor VM1 to access this tab to re enable the touch screen Enable Keypad Backlight By default the keypad backlight default setting is to follow the display backlight setting until it is changed by the user Click the checkbox to disable the keypad backlight Enable Auto On When Auto On is enabled the Thor VM1 boots when external power is applied When Auto On is disabled e if the ignition input signal is connected when ignition changes from Inactive to Active
186. it Data Communications the Laird Technologies Logo the Summit logo and Connected No Matter What are trademarks of Laird Technologies Inc The Bluetooth word mark and logos are owned by the Bluetooth SIG Inc Symbol is a registered trademark of Symbol Technologies MOTOROLA MOTO MOTOROLA SOLUTIONS and the Stylized M Logo are trademarks or registered trademarks of Motorola Trademark Holdings LLC and are used under license Wavelink the Wavelink logo and tagline Wavelink Studio Avalanche Management Console Mobile Manager and Mobile Manager Enterprise are trademarks of Wavelink Corporation Kirkland RAM and RAM Mount are both trademarks of National Products Inc 1205 S Orr Street Seattle WA 98108 Qualcomm is a registered trademark of Qualcomm Incorporated Gobi is a trademark of Qualcomm Incorporated Verizon is a registered trademark of Verizon Trademark Services LLC T MOBILE is a registered trademark of Deutsche Telekom AG AT amp T is a registered trademark of AT amp T Intellectual Property Acrobat Reader 2012 with express permission from Adobe Systems Incorporated Other product names or marks mentioned in this document may be trademarks or registered trademarks of other companies and are the property of their respective owners Patents For patent information please refer to www honeywellaidc com patents Limited Warranty Refer to www honeywellaidc com warranty_ information for yo
187. ited warranty for the Thor VM1 AC power supply and cables is 1 year The duration of the limited warranty for the Thor VM1 DC DC Converter is 1 year The duration of the limited warranty for the Thor VM1 cables USB Serial Communication Power is 1 year 9 2 9 3 Honeywell Scanning amp Mobility 9680 Old Bailes Road Fort Mill SC 29707 www honeywellaidc com E EQ VM1CERG Rev D 10 12
188. k 6 25 LEAP To use LEAP without WPA make sure the following profile options are used e Enter the SSID of the Access Point assigned to this profile e Set EAP Type to LEAP e Set Encryption to WEP EAP or Auto WEP depending on SCU version e Set Auth Type as follows e Ifthe Cisco CCX certified AP is configured for open authentication set the Auth Type radio parameter to Open e Ifthe AP is configured to use shared key or passphrase set the Auth Type radio parameter to Shared e Ifthe AP is configured for network EAP only set the Auth Type radio parameter to LEAP Summit Client Utility B OK E Main Profile status Diags Global Profile Default y New Rename Delete Scan Ke Radio Encryption EAP type api Auto WEP 7 LEAP 7 WEP keys PSKs Credentials Save Changes Commit See Sign On vs Stored Credentials for information on entering credentials To use Stored Credentials click on the Credentials button No entries are necessary for Sign On Credentials as the user will be prompted for the Username and Password when connecting to the network Credentials H A User Password Enter the Domain Username if the Domain is required otherwise enter the Username Enter the password Click OK then click Commit Ensure the correct Active Profile is selected on the Main tab and warmboot The SCU Main tab shows the device is associated after the radio connects to
189. l On Thor VM1 Strain Relief Clamps on Dock RAM Ball on Dock Access Panel Door is labeled with SSD and SD Access Panel Door is labeled with SIM 1 CompactFlash Hard Drive 1 SIM card slot for WWAN radio 2 SD Secure Digital Memory Card Slot 2 UPS battery disconnect 1 4 Chapter 2 Hardware System Hardware Antenna Connectors 802 11a b g Wireless Client The Thor VM1 has an 802 11a b g network card that supports diversity with two internal or external antennas Power management for the network card is configured with the Summit Client Utility Central Processing Unit The CPU is a 1 6 GHz Intel Atom processor The operating system is Microsoft CE 6 0 The OS image is stored on an internal CompactFlash card and is loaded into DRAM for execution 2 1 Input Output Components The Thor VM1 supports the following I O components of the core logic e Two 9 pin RS 232 serial ports configured as COM1 and COM2 e One slot for SD memory card e CompactFlash CF drive e Integrated keyboard e Ports available via dongle cable o USB Host port o USB Client port o CANbus o Audio System Memory Main system memory is 1GB SDRAM Video Subsystem The Thor VM1 video subsystem consists of a color TFT display The video subsystem complies with the VESA VL bus standard The resolution of this display is 800 x 480 pixels This resolution complies with the WVGA graphics industry standard The display supp
190. lace the Thor VM1 in Suspend by pressing the Power button Remove the Thor VM1 from the Quick Mount Smart Dock Disconnect the UPS Loosen the fourteen 14 captive M3 screws holding the front panel Use a 2 Philips bit a FF woON SB 2 43 5 Carefully lift the front panel away from the device A Slot on Thor VM1 body B Wiring connector on Thor VM1 body C Wiring connector on front panel D Tab on front panel Position the replacement front panel so the tab on the back of the front D in figure above panel lines up with the slot A in figure above on the Thor VM1 Be sure the two wiring connectors B and C in figures above are also aligned 7 Gently press the front panel into place 8 Tighten the fourteen 14 captive M3 screws In the order shown in the top figure above use a 2 Philips bit and torque 10 11 12 13 the screws to 6 7 inch pounds Reinstall the Thor VM1 in the Quick Mount Smart Dock When the Thor VM1 is placed in the powered dock the UPS battery automatically reconnects Restart the Thor VM1 When restarted the Thor VM1 automatically recognizes the keyboard type 12 or 64 keys If the defroster configuration has changed use the Test button on the Peripherals control panel to update the Thor VM1 defroster configuration 2 44 Field Replaceable UPS Battery Requirements User Supplied e Torquing tool capable of measuring inch pounds e 2 Philips screw
191. lay brightness controls in the table below have no effect 8 6 To get this Key Function Power On Suspend Power Brightness Up 2nd F7 see note above Brightness Down 2nd Volume Up 2nd Volume Down 2nd F10 IBM Terminal Emulation The Thor VM1IBM 3270 and IBM 5250 Terminal Emulator keypads are designed to allow the user to enter terminal emulator commands when running the RFTerm program When running RFTerm on the Thor VM1 please refer to the RFTerm Reference Guide for equivalent keys and keypress sequences IBM 3270 j i a T gt amp OG OO 0068 000 Cir Ctrl C Ins Ctrl PA Ctrl F1 PA2 P Ctrl F2 PA3 P Ctrl F3 Rst Ctrl R 8 8 IBM 5250 pa foa fomo 8 9 8 10 Chapter 9 Technical Assistance If you need assistance installing or troubleshooting your device please contact us by using one of the methods below Knowledge Base www hsmknowledgebase com Our Knowledge Base provides thousands of immediate solutions If the Knowledge Base cannot help our Technical Support Portal see below provides an easy way to report your problem or ask your question Technical Support Portal www hsmsupportportal com The Technical Support Portal not only allows you to report your problem but it also provides immediate solutions to your technical issues by searching our Knowledge Base With the Portal you can submit and track your questions online and send and receive attachments
192. le Viewers The following applications are included e JETCET PDF Viewer e Office 2003 Excel Viewer e Office 2003 PowerPoint Viewer e Office 2003 Word Viewer Note The viewer applications allow viewing documents but not editing them Microsoft WordPad Start gt Programs gt Microsoft WordPad Create and edit documents and templates in WordPad using buttons and menu commands that are similar to those used in the desktop PC version of Microsoft WordPad By default WordPad files are saved as PWD files Documents can be saved in other formats e g RTF or DOC Tap the button to access WordPad Help Remote Desktop Connection Start gt Programs gt Remote Desktop There are few changes in the Windows CE version of Remote Desktop as it relates to the general desktop Windows PC Microsoft Remote Desktop options If installed Remote Desktop on the Thor VM1 can be accessed by Start gt Programs gt Remote Desktop Select a computer from the drop down list or enter a host name and tap the Connect button Tap the Options gt gt button to access the General Display Local Resources Programs and Experience tabs Tap the button to access Remote Desktop Connection Help Settings Start gt Settings The Settings menu option may include the following Control Panel All control panels Network and Dialup Con Shortcut to control panel Connect to a network create a new connection and adjust parameters for nections client con
193. le cable is attached to the Thor VM1 Disconnect and reconnect the cable from the PC Check that the correct connection is selected USB Client See Also Cold Boot and Loss of Host Reconnection ActiveSync indicator on the host disc in the toolbar tray turns green and spins as soon as you connect the cable before tapping the Connect icon or REPLLOG EXE in the Windows directory One or more control lines are tied together incorrectly This is usually a cable problem ActiveSync indicator on the host turns green and spins but connection never occurs Check that the correct connection is selected USB Client Or Incorrect or broken data lines in cable ActiveSync indicator on the host remains gray Solution 1 ActiveSync icon on the PC does not turn green after connecting USB cable from Thor VM1 1 Disconnect Thor VM1 USB cable from PC 2 Suspend Resume or Restart the Thor VM1 3 In ActiveSync gt File gt Connection Settings on PC disable Allow USB Connections and click OK 4 Re enable Allow USB Connections on the PC and click OK 5 Reconnect USB cable from Thor VM1 to PC Solution 2 The host doesn t know you are trying to connect May mean a bad cable with no control lines connected or an incompatible baud rate Try the connection again with a known good cable 4 5 Configuring the Thor VM1 with LXEConnect LXEConnect allows a user to view the Thor VM1 screen remotely from a PC using an ActiveSync co
194. lect a task Request a certificate View the status of a pending certificate request Download a CA certificate certificate chain or CRL Click the Download a CA certificate certificate chain or CRL link Make sure the correct root CA certificate is selected in the list box 6 40 Microsoft Certificate Services Download a CA Certificate Certificate Chain or CRL To trust certificates issued from this certification authority install this CA certificate chain To download a CA certificate certificate chain or CRL select the certificate and encoding method CA certificate Encoding method DER C Base 64 Download CA certificate Download CA certificate chain Download latest base CRL Download latest delta CRL Click the DER button To download the CA certificate click on the Download CA certificate link File Download Security Warning Click the Save button and save the certificate Make sure to keep track of the name and location of the certificate Install the certificate on the Thor VM1 6 41 Installing a Root CA Certificate Note This section is only if the Windows certificate store is used If the certificate store is not used copy the certificate to the System folder or other path specified in the Summit Certs global parameter Copy the certificate file to the Thor VM1 Import the certificate by navigating to Start gt Control Panel gt Certificates Cl Public
195. ler Contact Technical Assistance for upgrades File Menu Options The Connect option under the File menu allows the user to initiate a manual connection to the Mobile Device Connect Server The connection methods by default are wireless and COM connections Any updates available will be applied to the Thor VM1 immediately upon a successful connection The Scan Configuration feature is not supported The Scan Config option under the File menu allows the user to configure Enabler settings using a special bar code that can be created using the Avalanche MC Console utilities Refer to the Wavelink Avalanche Mobility Center User Guide for details The Settings option under the File menu allows the Thor VM1 user to access the control panel to locally configure the Enabler settings The Enabler control panel is by default password protected Input Settings Password E The default Settings password is system The password is not case sensitive Avalanche Update using File gt Settings Use these menu options to setup the Avalanche Enabler on the Thor VM1 Change the settings and save them by rebooting before connecting to the network Alternatively the Mobile Device Server can be disabled until needed refer to the Wavelink Avalanche Mobility Center User s Guide for details Menu Options Note Your Thor VM1 screen display may not be exactly as shown in the following menu options Contact Technical Assistance for version
196. les or copy files out of the Windows folder on the mobile device Technically the only files you cannot delete or copy are ones marked as system files in the original build of the Windows image This however includes most of the files in the Windows folder Backup Data Files using ActiveSync Use the following information to backup data files from the mobile device to a desktop or laptop PC using the appropriate cable and Microsoft s ActiveSync Prerequisites A partnership between the mobile device and ActiveSync has been established e Adesktop or laptop PC with an available USB port and a mobile device with a USB port The desktop or laptop PC must be running Windows XP or greater e Use the specific USB cable as listed in Connect Via USB Connect Connect the USB cable to the PC the host and the mobile device the client The Get Connected wizard on the host PC checks COM ports to establish a connection for the first time Note USB synchronization will start automatically when the cable is connected 43 Disconnect e Disconnect the cable from the Thor VM1 e Open the status bar icon in the lower right hand corner of the status bar Then tap the Disconnect button When the Thor VM1 loses connection e g enters Suspend Mode etc the connection to ActiveSync will be lost When the Thor VM1 resumes the ActiveSync session will automatically re connect Thor VM1 with a Disabled Touch Screen An Thor VM1 touch
197. location chosen for certificate storage should persist after a reboot 3 When completing the Credentials screen for the desired authentication do not check the Use MS store checkbox after checking the Validate server checkbox Enter the certificate name in the CA Cert textbox 5 Click OK to exit the Credentials screen and then Commit to save the profile changes How To Use Windows Certificate Store 1 See Generating a Root CA Certificate and follow the instructions to download the Root Certificate to a PC 2 Toimport the certificate into the Windows store See Installing a Root CA Certificate 3 When completing the Credentials screen for the desired authentication be sure to check the Use MS store checkbox after checking the Validate server checkbox 4 The default is to use all certificates in the store If this is OK skip to the last step 5 Otherwise to select a specific certificate click on the Browse button 6 21 Choose certificate 7 Use full trusted store Issued By Thawte Server CA Thawte Premium Server CA Secure Server Certification Authority GTE CyberTrust Root FO GTE CyberTrust Global Root 6 Uncheck the Use full trusted store checkbox 7 Select the desired certificate and click the Select button to return the selected certificate to the CA Cert textbox 8 Click OK to exit the Credentials screen and then Commit to save the profile changes 6 22 Configuring th
198. ly the first time Avalanche is used Following installation the Wavelink Avalanche Enabler will be an auto launch application This behavior can be modified by accessing the Avalanche Update Settings panel through the Enabler Interface Software Development See Also CE API Programming Guide The CE API Programming Guide documents Honeywell specific API calls for the Thor VM1 It is intended as an addition to Microsoft Windows CE API documentation A Software Developers Kit SDK and additional information about software development can be found on the Developer Portal Please Contact Technical Assistance for more information Thor VM1 Utilities The following files are pre loaded LAUNCH EXE Launch works in coordination with registry settings to allow drivers or applications to be loaded automatically into DRAM at system startup Registry settings control what gets launched see the App Note for information on these settings For examples you can look at the registry key HKEY_LOCAL_MACHINE 1 Software LXE Persist Launch will execute CAB files BAT files or EXE files App Note All applications to be installed into persistent memory must be in the form of Windows CE CAB files These CAB files exist as separate files from the main installation image and are copied to the CE device using ActiveSync or using a Compact Flash ATA card The CAB files are copied from ATA or using ActiveSync Explore into the folder System which is t
199. matically The installation application must be run manually the first time Avalanche is used After installation the Enabler runs as a background application monitoring for updates This behavior can be modified by accessing the Avalanche Update Settings panel through the Enabler interface This behavior can be modified by accessing the Avalanche Update Settings panel through the Enabler Interface The RMU CE CAB file is placed on the device during manufacturing in the System RMU folder During the Enabler installation process the Enabler checks for the RMU CE CAB file in the System folder e If present it assumes the RMU CE CAB file is already installed and continues e Ifthe file RMU CE CAB file is not present it looks for the file in the System RMU folder e If present the Enabler copies the file to the System folder and installs it At this point the OS will automatically install the Remote Management Utility RMU after the Thor VM1 reboots Enabler Uninstall Process To remove the Avalanche Enabler from the Thor VM1 e Delete the Avalanche folder located in the System directory e Warm boot the Thor VM1 The Avalanche folder cannot be deleted while the Enabler is running See Stop the Enabler Service If sharing errors occur while attempting to delete the Avalanche folder warm boot the Thor VM1 immediately delete the Avalanche folder and then perform another warm boot Stop the Enabler Service To stop the Enabler from
200. min status popup windows 3 135 Owner Start gt Settings gt Control Panel gt Owner Set the Thor VM1 owner details The Network ID is used when logging into a remote network Factory Default Settings Identification tab Name Blank Company Blank Address Blank Telephones Blank Display owner ID at power on Disabled Notes tab Notes Blank Display notes at power on Disabled Network ID tab Owner Properties E OK E Identification Notes Network ID At Power On Name 7 Display owner identification Company Area code Phone Address Work Home fo 3 136 Owner Properties Identification Use the Notes field to add any additional information not included in the Identification tab _ Display owner notes at power on Owner Properties Identification Notes Network ID Windows CE uses this User name information to gain access to network resources Enter the Password user name password and domain provided by your Domain network administrator Enter user name password and domain to be used when logging into network resources 3 137 Password Start gt Settings gt Control Panel gt Password Use this panel to set Thor VM1 user access to control panels and power up password properties Important This password must be entered before performing a Load Factory Defaults If entering a power on or screen saver password does not allow you to disable t
201. monitoring for updates from the Mobility Center Console 1 NDOJA WON Open the Enabler Settings Panels by tapping the Enabler icon on the Thor VM1 desktop Select File gt Settings Select the Preferences tab Select Do not monitor to prevent automatic monitoring upon Startup Select Exit Application for an immediate shutdown of all Enabler update functionality upon exiting the user interface Click the OK button to save the changes Reboot the Thor VM1 if necessary 5 2 Update Monitoring Overview There are three methods by which the Enabler on the Thor VM1 can communicate with the Mobile Device Server running on the host machine e Wired via a serial cable between the Mobile Device Server PC and the Thor VM1 e Wired via a USB connection using ActiveSync between the Mobile Device Server PC and the Thor VM1 e Wirelessly via the Thor VM1 2 4GHz radio and an access point After installing the Enabler on the Thor VM1 the Enabler searches for a Mobile Device Server first by polling all available serial ports and then over the wireless network The Enabler running on the Thor VM1 will attempt to access COM1 COM2 and COM3 Agent not found will be reported if the Mobile Device Server is not located or a serial port is not present or available COM port settings can be verified using the bar code wedge panels on the Thor VM1 The wireless connection is made using the default wireless radio interface on the mobile device
202. must use a USB mouse or keyboard attached to the Thor VM1 to access the control panel to re enable or recalibrate the touch screen Touch Screen Defroster Extended temperature versions of the Thor VM1 contain a touch screen defroster The touch screen defroster can be disabled when not needed Start gt Settings gt Control Panel gt Peripherals The defroster trip point is configurable The defroster is always disabled when the device is operating from UPS battery power Screen Blanking Screen blanking blackout can be enabled when the vehicle is in motion A serial cable must be attached to the Thor VM1 and the Thor VM1 must be configured to enable screen blanking Start gt Settings gt Control Panel gt Screen Control Once screen blanking is enabled the display is blanked out any time when the cable sends the signal the vehicle is in motion If the cable is removed screen blanking is disabled and the display remains on Display Backlight Control The display brightness on a Thor VM1 equipped with an outdoor display can be configured to automatically adjust depending on the ambient light level Start gt Settings gt Control Panel gt Screen Control Note When automatic brightness control is enabled the manual display brightness controls described below have no effect The display brightness can be adjusted manually via the keypad e Use the 2nd F7 keypress to increase backlight brightness and the 2nd F8 keypress to d
203. nal emulation program When RFTerm is installed this icon is displayed on the desktop LXE RFTerm f A Remote A shortcut to the Remote Desktop Connection utility Desktop Connection mn Avalanche shortcut Wavelink Avalanche Mobility Center Avalanche MC is a remote client management AS system that is designed to distribute software and configuration updates to monitored devices The enabler for Wavelink Avalanche is loaded on the Thor VM1 but not installed When the enabler is installed the Avalanche Avalanche icon is displayed on the desktop wa The demo version of Wavelink Telnet CE is installed on all devices Please Contact Technical Assistance for Al licensing information When installed license details are maintained in the Wavelink tab in the License Viewer TelnetCE control panel FU Start Start button Access programs select from the Favorites listing documents last worked on change view set tings for the control panel or taskbar on line help or run programs Taskbar Sa 9 01PM 2 The number and type of icons displayed are based on the device type installed options and configuration of the Thor VM1 My Device Folders Storage Card or SD Card Additional optional storage space Temp Location for temporary files Windows Operating System in Secure Storage 3 10 Wavelink Avalanche Enabler Optional Note Ifthe useris NOT using Wavelink Avalanche to manage their mobile device the Enabl
204. nd F5 generates the remapped key However if the next key press is Shift the Thor VM1 reboots The remapped keypress DOES NOT affect the 2nd F5 Shift reboot key sequence Keypad Control Ed OK E KeyMap LaunchApp RunCmd Modifier Mode None shift Function Key Remapped Key Key Sequence SS Escape TE Assign settings by clicking radio buttons and selecting keys from the drop down boxes Tap the OK button when finished The changes take effect immediately Remap a Single Key Select the modifier key from the Modifier Mode options Select the key to be remapped from the Key pulldown list Select the value from the remapped key from the Remapped Key pulldown list FON gt Click OK to save the result and close the control panel Remap a Key to a Unicode Value Select the modifier key from the Modifier Mode options Select the key to be remapped from the Key pulldown list Select Unicode from the Remapped Key pulldown list FON gt There are two Unicode text boxes located on the lower part of this tab Enter the Unicode value in the left textbox and the Unicode character is displayed in the right textbox 5 Click OK to save the result and close the control panel 3 119 Remap a Key Sequence Up to 16 keys may be specified for the key sequence The sequence can consist of keys and Unicode values 1 oa FF ON Select the modifier key from the Modifier Mode o
205. nding upon which components you are running your product may ontain the following third party technologies ortions of this software are based on NCSA Mosaic NCSA Mosaic was veloped by the National Center for Supercomputing Applications at the University of Illinois at Urbana Champaign Distributed under a icensing agreement with Spyglass Inc ly This screen is presented for information only The Copyrights information cannot be changed by the user 3 153 Terminal Server Client Licenses Start gt Settings gt Control Panel gt Terminal Server Client Licenses Terminal Server Client Licenses Stored Licenses aaa No Licenses found Any licenses stored on the Thor VM1 appear in the drop down list Select a license and tap the Close button The license is available for use immediately 3 154 Volume and Sounds Start gt Settings gt Control Panel gt Volume amp Sounds Note An application may override the control of the speaker volume Tuming off sounds saves power and prolongs battery life Set volume parameters and assign sound WAV files to CE events using these options You can also select deselect sounds for key clicks and screen taps and whether each is loud or soft As the volume scrollbar is moved between Loud and Soft the Thor VM1 emits a tone each time the volume increases or decreases Volume must be enabled when you want to adjust volume settings using keypad keys Factory Default
206. ne store Additional Options Request Format CMC OPKCS10 Hash Algorithm SHA 1 vw Only used to sign request O Save request to a file Attributes Friendly Name For the Certificate Template select User Check the Mark keys as exportable and the Export keys to file checkboxes Type the full path on the local PC where the private key is to be copied Also specify the private key filename 6 47 Be sure to note the name used for the private key file for example AAAUSER PVK The certificate file created later in this process must be given the same name for example AAAUSER CER DO NOT check to use strong private key protection Make any other desired changes and click the Submit button Potential Scripting Yiolation This Web site is requesting a new certificate on your behalf You should allow only trusted Web sites to request a certificate for you Do you want to request a certificate now Yes No Potential Scripting Yiolation Saving a file into your local system could potentially violate scripting safety Do you want to create a private key user1key pwk Yes No If any script notifications occur click the Yes button to continue the certificate request Create Private Key Password x Key userlkey pyk Password Confirm Password When prompted for the private key password None Cancel e Click None if you do not wish to use a p
207. nections Taskbar Set Taskbar parameters Transcriber To make changes to the Transcriber application tap the keyboard icon in the status bar Select Transcriber from the pop up menu Then open the Input control panel and tap the Options button Transcriber Options Start gt Settings gt Control Panel gt 3 15 Input Panel are available only when Transcriber is selected as the active input method Tap the button or the Help button to access Transcriber Help Windows Explorer Start gt Programs gt Windows Explorer There are a few changes in the Windows CE version of Windows Explorer as it relates to the general desktop PC Windows Explorer options Tap the button to access Windows Explorer Help 3 16 Taskbar Start gt Settings gt Taskbar There are a few changes in the Windows CE version of Taskbar as it relates to the general desktop PC Windows Taskbar options When the taskbar is auto hidden press the Ctrl key then the Esc key to make the Start button appear Clicking the Taskbar option on the Settings menu displays the Taskbar General tab and the Taskbar Advanced tab See Also Taskbar Icons General Tab Factory Default Settings Always on Top Enabled Auto hide Disabled Show Clock Enabled Taskbar and Start Menu Properties Always on top 7 Auto hide Show Clock Advanced Tab Taskbar and Start Menu Properties Genera Advanced DARS e Tap th
208. nel 2222 222 2c cee cece ccc cc cece cece cece cece cece cece cece eeeeeeecceeeeeeeeeeesseeeees 2 43 Replace Front Panel 2 2 0 222 c cece nana 2 43 Field Replaceable UPS Battery 22 2220222222 c cece eee ccc ccc cece cece cece ee aaaea Aa eeeeeeeeeeeeeereeeeneees 2 45 Replace UPS Battery 2 0 cece cece cece ccc cece eee ececeeeececeeceeteecettetetttetentneeneeeeenececeeeceeees 2 45 Chapter 3 Software_ 8 Introduction seeen the cee ie eae ea tee ae eh otto saute emit e e seen c eae 3 1 Operating System 22 c cece cece cece cee ce cece secececececececeeeceeeeseeeeeeeeeeeeees 3 1 Windows CE Operating System oo e cece eee e cece eee AEDA EEA A Ea aa arnan ann 3 1 General Windows CE Keyboard Shortcuts 00 00000000 o coco ec cee ce eee eee cece ee eeeeeeeeeeeeeeeeeeees 3 2 Rebooting the Thor VM1 0 2 2 2 eee eee cece eee cece cece cece cc cece cee cece ee eee cece eee ee ce eeeeeeeeeeeeeeceeeeereseeeeees 3 3 AE A 3 3 A ee ol ee oo es es A 3 3 Clearing Persistent Storage Reset to Default Settings 00 000000002 c occ c cece ccc ccc ccc ccc eee c eee eeeeeeees 3 3 Folders Copied at Startup 2 2 22 2 00 cc coc nn 3 3 Saving Changes to the Registry 2 0 0 0 ccc cccc cece eccccceececcccccceceecccccceeeececuceeeeeececceeeeeeesecceeeneeeees 3 4 Sofware Load orcos st lage eee re eyed se Llc ate OSL ig ee eee eee dd 3 5 SoftWare Applications s o oecon dons Sod Sec
209. new pages in the current window 3 116 Keyboard Start gt Settings gt Control Panel gt Keyboard Set keypad key map keypad key repeat delay and key repeat rate Factory Default Settings Repeat character Repeat Delay Repeat Rate Keyboard Properties E OK El Repeat Enable character repeat oN Repeat delay Repeat rate Long Short Slow Fast E A ea ce ES 3 Tap here and hold down a key to test o 3 117 KeyPad Start gt Settings gt Control Panel gt KeyPad Use this control panel option to assign key functions to mappable keys available on your Thor VM1 determine application launch sequences and program command Run sequences Factory Default Settings KeyMap Modifier Mode None LaunchApp Empty App2 App3 App4 RunCmd Cmd1 Empty Cmd2 Empty Cmd3 Empty Cmd4 Empty File Parm FILE The KeyPad panels can be used to perform the following functions e Remap a key to any single key e Remap a key toa Unicode value e Remap a key toa string of up to 16 keys or Unicode values in any combination e Remap a key to launch a user selected application e Remap a key to run a command Note KeyPad Control Panel options LaunchApp and RunCmd do not inter relate with similarly named options contained in other Control Panel applets For example the AppLock Administrator Control panel file Launch option 3 118 KeyMap Tab If 2nd F5 is remapped to another key pressing 2
210. ngs gt Control Panel gt Data Collection gt About tab This tab displays the Data Collection Wedge driver version installed in the Thor VM1 The version number shown in the image below is used only as an example your version number will be different Data Collection main com Come Data Options Processing About DCWedge Version DCWPCEX1Ay 3 96 Length Based Bar Code Stripping Use this procedure to create symbology rules for two bar codes with the same symbology but with different discrete lengths This procedure is not applicable for bar codes with variable lengths falling between a maximum value and a minimum value Example For the purposes of this example the following sample bar code parameters will be used EAN 128 and Code 128 bar codes Some of the bar codes start with 00 and some start with 01 The bar codes are different lengths e 34 character length with first two characters 01 strip first 2 and last 18 e 26 character length with first two characters 01 strip first 2 and last 10 e 24 character length with first two characters 01 strip first 2 and last 8 This 24 character bar code is Code 128 e 20 character length with first two characters 00 strip first O no characters and last 4 On the Data Options tab set Enable Code ID to Custom Create four custom IDs using 1 for EAN 128 bar code and 0 for Code 128 bar code e c1 Code C1
211. nique Bluetooth address bar code for the Thor VM1 First locate the Thor VM1 Bluetooth address by tapping Start gt Settings gt Control Panel gt Bluetooth gt About tab LXEZ Pairing OK E Bluetooth Devices Settings Reconnect About Computer Friendly Name Bluetooth Address 00 40 FD 02 03 04 BTC version 1 0 BTDRPX861Jw Bluetooth Stack Revision 2 1 Copyright 2006 2011 LXE Inc Next create a Bluetooth address bar code label for the Thor VM1 The format for the bar code label is as follows e Barcode type must be Code 128 e FNC3 character followed by string Uppercase L lowercase n lowercase k uppercase B and then the Bluetooth address 12 hex digits no colons For example LnkB0400fd002031 Create and print the label Scan the Thor VM1 Bluetooth address bar code label with the Bluetooth bar code reader The devices are paired The Bluetooth bar code reader responds with a series of beeps and LED flashes Note After scanning the Thor VM1 Bluetooth label if there is no beep and no LED flash from the Bluetooth bar code reader the devices are currently paired See Also Bluetooth Beep and LED Indications 1Free bar code creation software is available for download on the World Wide Web Search using the keywords bar code create 3 69 Bluetooth Beep and LED Indications Acknowledge label 1 beep Label rejected 2 beeps at low frequency Transmission error Beep will
212. nization mode For example you can synchronize continually while connected to your desktop computer or only when you choose the synchronize command By default ActiveSync does not automatically synchronize all types of information Use ActiveSync Options to specify the types of information you want to synchronize The synchronization process makes the data in the information types you select identical on both your desktop computer and your device When installation of ActiveSync is complete on your desktop computer the ActiveSync Setup Wizard begins and starts the following processes e connect your device to your desktop computer e set up a partnership so you can synchronize information between your device and your desktop computer and e customize your synchronization settings Because ActiveSync is already installed on your device your first synchronization process begins automatically when you finish setting up your desktop computer in the ActiveSync wizard For more information about using ActiveSync on your desktop computer open ActiveSync then open ActiveSync Help Initial Setup The initial setup of ActiveSync must be made via a USB connection When there is a Connect icon on the desktop this section can be bypassed Partnerships can only be created using USB cable connection Connect via USB The default connection type is USB Client This is the only connection option supported on the Thor VM1 To verify it is set to US
213. nize all scanner formats for your device 3 74 Data Processing Overview Bar code data processing involves several steps Some steps may be skipped during the processing depending on user selections on the Data Options control panels The steps are presented below in the order they are performed on the scanned data 1 o MANOA F WN mb A N 2 09 13 Scanned data is tested for a code ID and length Min Max If it matches it is processed per the rules in place for that symbology If the scan does not meet the criteria for that symbology it is processed based on the settings for All If a code ID is not found the bar code data is processed based on the settings for All If the symbology is disabled the scan is rejected Strip leading data bytes unconditionally Strip trailing data bytes unconditionally Parse for and strip if found Data Options strings Replace any control characters with string as configured Add prefix string to output buffer If Code ID is not stripped add saved code ID from above to output buffer Add processed data string from above to output buffer Add suffix string to output buffer Add a terminating NUL to the output buffer in case the data is processed as a string If key output is enabled start the process to output keys If control characters are encountered e If Translate All is set key is translated to CTRL char and output e If Translate All is not set and key has a val
214. nnection Requirements ActiveSync version 4 5 or higher must be resident on a Windows XP desktop laptop host computer Windows Mobile Device Center version 6 1 or higher is required for a Windows Vista Windows 7 desktop laptop computer ActiveSync is already installed on the Thor VM1 The Thor VM1 is preconfigured to establish a USB ActiveSync connection to a host PC when the USB cable is attached to the Thor VM1 and the host PC Install LXEConnect 1 Contact Technical Assistance for the LXEConnect files 2 Download the files to a location on your host PC hard drive 3 Execute the setup exe file that was copied to the host PC This setup program installs the LXEConnect utility fi LXEConnect BBE Welcome to the LXEConnect Setup Wizard a Ex The installer will guide you through the steps required to install LXE Connect on your computer WARNING This computer program is protected by copyright law and international treaties Unauthorized duplication or distribution of this program or any portion of it may result in severe civil or criminal penalties and will be prosecuted to the maximum extent possible under the law Cancel Back Next gt Follow the on screen installation prompts The default installation directory is C Program Files LXE LXEConnect 5 When the installation is complete create a desktop shortcut to the LXEConnect exe file located in the directory above If a different directory was selected during
215. o the Thor VM1 and the device s Bluetooth connection is active Double tap a device in the list to open the device properties menu The target device does not need to be active Clear Button Deletes all devices from the Device table that are not currently paired A dialog box is presented Delete all disconnected devices Yes No Tap the Yes button to remove disconnected or deleted devices from the device table The devices are removed from the Device table after any reboot sequence or after closing and reopening the Bluetooth panels Tap the No button to make no changes See Clear Pairing Table on Boot 3 56 Bluetooth Device Menu Pre requisite The Discover button has been clicked and there are Bluetooth devices listed Click on a device in the list to highlight it Double click the highlighted device to display the Bluetooth Device right click menu The Bluetooth device does not need to be active Pair as Scanner Pair as Scanner Pair as Printer Pair as Printer Pair as Serial Device Delete Properties Delete Properties Filtered Mode Enabled Filtered Mode Disabled Right Click Menu Options Pair as Scanner Receive data from the highlighted Bluetooth scanner or Bluetooth imager Pair as Printer Send data to the highlighted Bluetooth printer Communicate with the highlighted serial Bluetooth device This option is available when Filtered Pair as Serial Device Vode is disabled Disconnect Stop the connection betwe
216. obility Center Console and is disabled by default For Summit clients Manage Wireless Settings should not be checked as configuration packages provide more radio configuration options Cue Lists all network adapters currently installed on the Thor VM1 Adapter Primary Indicates if the Enabler is to attempt to configure the primary adapter active only if there are multiple network Adapter adapters Icon on Places the Avalanche icon in the Avalanche taskbar that may optionally override the standard Windows task taskbar bar The Enabler will apply all network settings sent to it by the Mobile Device Server 5 21 Selecting the Avalanche Icon will access the Avalanche Network Profile tab which will display current network settings Avalanche Avalanche Network Profile Properties OK E Icon Profile varies by Enabler Property version ManageNet no ManageWWire no When enabled the Enabler will ignore any network or wireless settings coming from the Avalanche MC Console and use only the network settings on the Thor VM1 Properties Selecting the Properties icon displays the Manual Settings Properties dialog applet From here the user can con figure Network DNS and Wireless parameters using the displays shown below Note A reboot may be required after enabling or disabling these options Network DNS Manual Settings Properties OK A Network ons Authentication Wireless Manage network
217. ode that acts as an identifier the actual Code ID Both Name and ID Code must be specified in order to add a custom Code ID to the Custom IDs list 3 91 Buttons Add Entering data into both the Name and ID Code fields enables the Add button Click the Add button and the data is added to the next empty location in the Custom ID list Insert Click on an empty line in the Custom ID list The Add button changes to Insert Enter data into both the Name and ID Code fields and click the Insert button The data is added to the selected line in the Custom IDs list Edit Double click on the item to edit Its values are copied to the text boxes for editing The Add button changes to Replace When Replace is clicked the values for the current item in the list are updated Clear All When no item in the Custom IDs list is selected clicking the Clear All button clears the Custom ID list and any text written and not yet added or inserted in the Name and ID Code text boxes Remove The Clear All button text changes to a Remove button when an item in the Custom IDs list is selected Click the desired line item and then click the Remove button to delete it Line items are Removed one at a time Contents of the text box fields are cleared at the same time 3 92 Control Code Replacement Examples Gopngutation Translation Sombie Con epee Translated Data Data trol Character figuration Ignore drop The control character is discarded f
218. on PIN 1 PIN 6 PIN 5 PIN 9 Pinout Siora Descipion 6 DSR Data Set Ready Input Request to Send Output 8 CTS Clear to Send Input 5VDC Bar Code Scanner Power 500mA max or or RI Ring Indicator Input Shell CGND_ Chassis Ground Screen Blanking The screen blanking signal can be provided either by a Honeywell Screen Blanking Box or a user supplied switch or relay e A screen blanking box can be used on a vehicle that provides voltage on vehicle motion Voltage must be within the range specified on the screen blanking box label e A switch or relay can be used when an electrical signal is not available or is outside the acceptable range of the screen blanking box A serial cable must be used to connect the screen blanking device e Anoptional Screen Blanking Box Cable is available from Honeywell or e A user supplied serial cable can be used The cable must provide wires from pins 7 and 8 of the connector No other wires are used Do not enable Screen Blanking until the cable is properly connected to the specified COM port Serial Cable Optional Honeywell Screen Blanking Box Cable part number VM1080CABLE or customer built cable with the following specifications PIN 5 PIN 1 re AE rt am with Screen Blanking Box Honeywell Cable o E ae LA AE A ETA A AS EE ME AA 2 13 DB9 Female Function Wire color from with Screen Blanking Box Honeywell Cable NotUsed Used N
219. oot delay is associated for each application it will be either a value specified by the Administrator or it will be the delay default value At startup when a delay has been assigned for each application AppLock waits for the delay associated with the first application to expire before launching the first application then AppLock waits for the delay associated with the second application to expire before launching the second application AppLock continues in this manner until all applications are launched Note A Global Delay can be accomplished by setting a timed delay for the first application to be launched by lowest Order number and no delay 0 seconds for all other applications Note Launch order is determined by the Order specified in the Application tab The Order value does not have to be sequential 3 36 Auto Re Launch Application Launch Options Launch V Auto At Boot Retries fo Delay fro M Retries fo Delay fo Manual 7 Allow Close Auto Re Launch Default is Enabled When enabled for a specific application automatically re launches it subject to the specified Auto Re Launch Delay in seconds after it terminates This option allows the Administrator to disable the re launch operation AppLock cannot prevent all applications from closing When an application that AppLock cannot prevent from closing terminates perhaps because of an error condition AppLock re launches the applicat
220. or VM1 e Maintain an uninterrupted AC DC power source to the Thor VM1 throughout this process e The CF card with the OS and systems files must be present for the Thor VM1 to boot Removal or installation of SD or CF cards should be performed on a clean well lit surface e Always perform OS updates when the Thor VM1 has a dependable external power source connected to the Thor VM1 Procedure Verify a dependable power source is applied to the Thor VM1 and will stay connected during the upgrade procedure Warmboot the Thor VM1 before beginning the update process Establish an ActiveSync connection between the Thor VM1 and a desktop laptop computer Download the OS files from the desktop laptop to the Thor VM1 s System folder During the file copy process to the Thor VM1 System folder when asked Overwrite select Yes to All Review the files that were downloaded to the System folder Restart the Thor VM1 Disconnect from ActiveSync o AN OA F WN When the OS finishes loading check the OS update version by selecting Start gt Settings gt Control Panel gt About gt Software tab The touch screen may require calibration however most Windows OS versions save the calibration data eliminating the need to calibrate If the Thor VM1 won t boot up after the upgrade is finished Contact Technical Assistance for re imaging options 3 19 BIOS The Microsoft Windows CE operating system is installed before shipping Th
221. or VM1 Vehicle Mounting Reference Guide Auto On Enabled When Auto On is enabled the Ignition Input signal if connected via the Thor VM1 vehicle power supply cable is ignored When Auto On is enabled the Thor VM1 boots when external power is applied such as when e The Thor VM1 is placed in a powered Smart Dock with the dock s power switch set to On e The Thor VM1 is ina Smart Dock and truck power is applied to the dock e The Thor VM1 is in a powered Smart Dock and the dock s power switch is turned from Off to On If the Thor VM1 is already on and one of the above events occurs the Thor VM1 continues to run however the power management scheme may change based on the connection to extemal power Auto On Disabled When Auto On is disabled the Ignition Input signal if connected via the Thor VM1 vehicle power supply cable is monitored When the Ignition Input wire is connected e Ifthe Thor VM1 is Off and Ignition Input is Inactive the Thor VM1 remains Off e Ifthe Thor VM1 is Off and Ignition Input changes from Inactive to Active the Thor VM1 boots e Ifthe Thor VM1 is On and Ignition Input changes from Inactive to Active the Thor VM1 remains On If for example a Thor VM1 is running on the UPS and is placed into a Dock connected to a truck when the truck ignition is On the power management scheme may change based on the availability of external power e Ifthe Thor VM1 is On and Ignition Input changes from Active to Inactive
222. or each paired device there is no indication of the continuing disconnect state if Report Failure to Reconnect is disabled 3 66 Bluetooth Indicators There may be audible or visual signals as paired devices re connect with the Thor VM1 Only printers or scanners are recognized and displayed in the Bluetooth panel All other Bluetooth devices are ignored Thor VM1 is connected to one or more of the targeted Bluetooth device s Thor VM1 is not connected to any Bluetooth device Thor VM1 is ready to connect with any Bluetooth device Thor VM1 is out of range of all paired Bluetooth device s Connection is inactive Note When an active paired device enters Suspend Mode is turned Off or leaves the Thor VM1 Bluetooth scan range the Bluetooth connection between the paired device and the Thor VM1 is lost There may be audible or visual signals as paired devices disconnect from the Thor VM1 160 Blue blinking slowly Bluetooth is active but not connected to a device Blue blinking medium Bluetooth is paired and connected to a device Blue blinking fast Bluetooth is discovering other Bluetooth devices Bluetooth hardware has been turned off or does not exist in the Thor VM1 AppLock if installed does not stop the end user from using Bluetooth applications nor does it stop authorized Bluetooth enabled devices from pairing with the Thor VM1 while AppLock is in control 3 67 Bluetooth Bar Code Reader Setup Please
223. or the Windows on line Help application installed in the mobile device The Thor VM1 Desktop appearance is similar to that of a desktop PC running a Windows operating system At the bottom of the screen is the Start button Tapping the Start Button causes the Start Menu to pop up It contains the standard Windows menu options Programs Favorites Documents Settings Help and Run Desktop Icons At a minimum the desktop displays icons for My Device Internet Explorer and the Recycle Bin Following are a few of the other icons that may be on the Thor VM1 Desktop Please Contact Technical Assistance about the latest updates and upgrades for your operating system B Access files and programs My Device lt a zy Storage for files that are to be deleted Recycle Bin Discover and then pair with nearby discoverable Bluetooth devices Blu E etooth g My Storage for downloaded files applications Documents E Internet Explorer A Summit Client Utility Connect to the Internet intranet Used for accessing the appropriate wireless configuration SCU Summit Client Utility ba The eXpress Scan utility allows an administrator to scan bar codes to provide the initial network and Ava 2 lanche Mobile Device Server address configuration This eliminates the need to edit radio parameters man express ually on the Thor VM1 eXpress Scan uses bar codes created with eXpress Config Scan RF Term is an optional termi
224. orts screen blanking to eliminate driver distraction when the vehicle is in motion Audio Interface Speakers are located on the bottom front of the Thor VM1 An headset adapter cable provides a connection for headset operation When a headset is plugged into the adapter cable the main speakers are disabled A microphone is located at the upper right of the Thor VM1 display near the Thor VM1 emblem When a headset is plugged into the adapter cable the intemal microphone is disabled Card Slots CompactFlash CF Slot The CF ATA slot is not hot swappable The Thor VM1 must be powered down to insert or remove an ATA card Since the operating system is stored on the CF ATA card the Thor VM1 cannot operate without the ATA card Secure Digital SD Slot The SD slot accepts an SD memory card The SD card is hot swappable 2 2 Bluetooth LXEZ Pair The Thor VM1 contains Bluetooth version 2 0 with Enhanced Data Rate EDR up to 3 0 Mbit s over the air Bluetooth device connection or pairing can occur at distances up to 32 8 ft 10 meters Line of Sight The wireless client retains wireless connectivity while Bluetooth is active The user cannot select PIN authentication or encryption on connections from the Thor VM1 However the Thor VM1 supports authentication requests from pairing devices If a pairing device requests authentication or encryption the Thor VM1 displays a prompt for the PIN or passcode Maximum encryption is 128 bit
225. ot Used A sf to Screen a Box Connected to Switch Black see note 8 Connected to Screen Blanking Box Connected to Switch Gray see note Note Wire colors only apply to optional Honeywell Screen Blanking Box Cable VM1080CABLE Wire colors may vary in a user supplied cable Proper COM port settings to support screen blanking are located in Start gt Settings gt Control Panel gt Screen Control Screen Blanking Box Caution AN Please refer to the label on the screen blanking box for allowable input voltage range The Screen Blanking Box is designed to monitor a connection to a vehicle motion sensing circuit When motion is detected the Screen Blanking Box opens the connection between the output feeds which are connected to Pins 7 and 8 of the Thor VM1 and the display on the Thor VM1 is blanked When motion is no longer detected the Screen Blanking Box provides a connection between the output feeds After the configured Screen On delay if any the Thor VM1 screen is displayed Please refer to the wiring instructions including appropriate cautions and warnings in the Thor VM1 Vehicle Mounting Reference Guide Screen Blanking with Switch In applications where it is impractical to use the screen blanking box due to vehicle voltage or lack of a motion sensing signal screen blanking can be controlled via a user supplied switch or relay that provides an electrical conductive connection between the wires connected to Pins 7
226. ot saved Factory Default Settings SSID Blank Summit Client Utility foki x Main Prafile Status Diags Global Profile Defaut y New Rename Delete Scan 4 lo Encryption EAP ca Pt None 7 WEP E Credentials Save Changes Commit When logged in as an Admin see Admin Login use the Profile tab to manage profiles When not logged in as an Admin the parameters can be viewed and cannot be changed The buttons on this tab are dimmed if the user is not logged in as Admin The Profile tab was previously labeled Config 6 7 Buttons on an OSO Commit Saves the profile settings made on this screen Settings are saved in the profile Allows entry of a username and password certificate names and other information required to authenticate with the access point The information required depends on the EAP type Delete Deletes the profile The current active profile cannot be deleted and an error message is displayed if a delete is attempted Creates a new profile with the default settings see Profile Parameters and prompts for a unique name If the name is not unique an error message is displayed and the new profile is not created Credentials New Assigns a new unique name If the new name is not unique an error message is displayed and the profile is not Rename renamed Opens a window that lists access points that are broadcasting their SSIDs Tap the Refresh button
227. own box Note the availability of the Windows standard Refresh button When the Windows Refresh button is tapped the signal strength signal quality and link speed are refreshed for the currently selected adapter It also searches for new adapters and may cause a slight delay to refresh the contents of the drop down menu Avalanche Update Settings Scan Config Shortcuts SaaS Adapters Status Summit 304G Series WLAN Adapter y 3 Signal Strenath Signal Quality SSID AP2 IP 100 100 100 200 MAC 00 1d 45 01 02 03 Speed 54 0 Mbps BSSID 00 1d 45 ae fc DO Link speed indicates the speed at which the signal is being sent from the adapter to the Thor VM1 Speed is dependent on signal strength 5 24 Exit The Exit option is password protected The default password is leave The password is not case sensitive Input Exit Password E Note Do you want to O Continue monitoring O Stop monitoring The icon on the screen above may differ based on the version of the Enabler installed on the Thor VM1 Change the option if desired Tap the X button to cancel Exit Tap the OK button to exit the Avalanche applet Using Remote Management 1 Configure the radio to connect to the network running the Mobile Device Server After the Thor VM1 is connected proceed to step 2 If it is desired to configure the radio using the Summit package add the configured package to
228. password for the certificate if appropriate Verify Installation Tap on View to see the certificate details again Certificate Details Friendly Mame Field Private Key y Present a The private key should now say present If it does not there is a problem Possible items to check e Make sure the certificate was generated with a separate private key file as shown earlier in this section If the certificate was not generated with a separate private key file generate a new certificate and follow the import process again e Make sure the certificate and private key file have the same name for example AAAuser cer for the certificate and AAAuser pvk for the private key file If the file names are not the same rename the private key file and import it again 6 52 Chapter 7 Technical Specifications Thor VM1 802 11 a b g radio Bluetooth penne Optional GPS WWAN Scanner Options No integrated scanner p Optional serial USB or Bluetooth scanners Controller WVGA compatible controller Active matrix TFT Resolution 800 x 480 pixels 400 NIT indoor or 900 NIT outdoor brightness 8 measured horizontally display Transmissive with LED backlight Automatic brightness control on outdoor display Vehicle motion screen blanking available Impact resistive Touch Screen Signature capture capability Optional defroster Field replaceable front panel including touch screen and optional defroster
229. person who will be logging into the mobile device Connect to 10 1 2 204 Connecting to 100 100 100 100 User name sl Password C Remember my password This process saves a user certificate and a separate private key file Windows CE equipped devices such as the Thor VM1 require the private key to be saved as a separate file rather than including the private key in the user certificate 6 44 Microsoft Certificate Services Welcome Use this Web site to request a certificate for your Web browser e mail client or other program By using a certificate you can verify your identity to people you communicate with over the Web sign and encrypt messages and depending upon the type of certificate you request perform other security tasks You can also use this Web site to download a certificate authority CA certificate certificate chain or certificate revocation list CRL orto view the status of a pending request For more information about Certificate Services see Certificate Services Documentation Selecta task Request a certificate View the status of a pending certificate request Download a CA certificate certificate chain or CRL Click the Request a certificate link Microsoft Certificate Services Request a Certificate Select the certificate type User Certificate Or submit an advanced certificate request Click on the advanced certificate request link 6 45
230. plications are included e WordPad e Data Collection Wedge bar code result manipulation e ActiveSync e Transcriber e Internet Explorer e Word Viewer e Excel Viewer e PDF Viewer e PowerPoint Viewer Note that the viewer applications allow viewing documents but not editing them ActiveSync ActiveSync is pre loaded Using Microsoft ActiveSync you can copy files from your Thor VM1 to your desktop laptop and vice versa After an ActiveSync relationship partnership has been established with a desktop laptop ActiveSync will automatically startup each time the Thor VM1 is cabled to the desktop laptop Bluetooth Start gt Settings gt Control Panel gt Bluetooth Only installed on a Bluetooth equipped Thor VM1 The System Administrator can Discover and Pair targeted Bluetooth devices for each Thor VM1 The System Administrator can enable disable Bluetooth settings and assign a Computer Friendly name for each Thor VM1 The Bluetooth control panel can also be accessed by double tapping the Bluetooth icon in the taskbar or on the desktop LXE RFTerm Optional Start gt Programs gt LXE RFTerm RF Term is pre loaded when ordered The application can also be accessed by double clicking the RFTerm desktop icon Avalanche The Wavelink Avalanche Enabler installation file is loaded on the Thor VM1 however the device is not configured to launch the installation file automatically The installation application must be run manual
231. pplied to the incoming data resulting from successful bar code scans sent to the Thor VM1 for processing Note The Data Options tab contains only those options available for one type of decoding engine The Data Options tab contains several options to control bar code processing Options include e Defining custom Code IDs e Disable processing of specified bar code symbologies e Rejecting bar code data that is too short or too long e Stripping characters including Code ID leading or trailing characters and specified bar code data strings e Replacing control characters e Adding a prefix and a suffix Main Com1 com2 Data Options Processing About Enable Code ID None y Symbology Settings Ctrl Char Mapping Custom Identifiers Enable Code ID Choose an option in the Enable Code ID drop down box Disables transmission of a Code ID The only entry in the Symbology combo box is All Does not change the scanner s Code ID transmission setting The combo box in the Symbology con Custom ID i trol panel is populated with any configured Custom code IDs 3 80 Buttons Symbology Settings Ctrl Char Mapping Custom Identifiers See Also Data Processing Overview Individually enable or disable a bar code from being scanned set the mini mum and maximum size bar code to accept strip Code ID strip data from the beginning or end of a bar code or based on configurable Ba
232. processing LOG_EX Processing the hotkey and backdoor entry LOG_EX Applicaton handie The application being locked did not complete initialization LOG_ERROR search failure Application handle The application initialized itself successfully LOG_ERROR search OK Application load failure The application could not be launched by AppLock the application could not be LOG ERROR found or is corrupted The backdoor keys have been pressed The backdoor hotkeys provide a method for a e LOG customer service to get a user back into their system without editing the registry or E PROCESSING reloading the device The load of the keyboard filter failed This occurs when the dll is missing or is corrupted Look in the Windows directory for kbdhook dll If it exists delete it Also cannotind kodhook dii delete AppLock exe from the Windows directory and reboot the unit Deleting LOGTERROR Address of keyboard hook procedure failure Backdoor message received AppLock exe triggers the AppLock system to reload Converted Pwd Converted password from wide to mbs LOG_EX Could not create event The keyboard filter uses this event atthe Administrator Control panel The event LOG ERROR EVT_HOTKEYCHG could not be created Could not hook keyboard Ifthe keyboard cannot be controlled AppLock cannot process the hotkey This LOG ERROR failure prevents a mode switch into user mode a Could not start thread The keyboard filter must watch for hot key changes
233. ptions Select the key to be remapped from the Key pulldown list Select Key Sequence from the Remapped Key pulldown list Select the first key for the multiple key sequence from the pulldown list Press the Add button to add the key to the multiple key sequence shown in the Key Sequence box Repeat this steps 4 and 5 until all desired keys have been added to the key sequence If necessary use the Clear button to erase all entries in the Key Sequence box Click OK to save the result and close the control panel Remap a Key to a Sequence of Unicode Values Up to 16 Unicode values may be specified for the key sequence The sequence can consist of keys and Unicode values 1 ak wn D Select the modifier key from the Modifier Mode options Select the key to be remapped from the Key pulldown list Select Key Sequence from the Remapped Key pulldown list Select Unicode from the Key Sequence pulldown list There are two Unicode text boxes located on the lower part of this tab Enter the Unicode value in the left textbox and the Unicode character is displayed in the right textbox Press the Add button to add the key to the multiple key sequence shown in the Key Sequence box Repeat this steps 4 through 7 until all desired characters have been added to the key sequence If necessary use the Clear button to erase all entries in the Key Sequence box Click OK to save the result and close the control panel Remap an Application NO a
234. r Code Data add a prefix or suffix to a bar code before transmission Define the operations the Wedge performs on control characters values less than 0x20 embedded in bar codes Defines an identifier that is at the beginning of bar code data which acts as a Code ID After a Custom Identifier is defined Symbology Settings can be defined for the identifier just like standard Code IDs 3 81 Data Options Symbology Settings Start gt Settings gt Control Panel gt Data Collection gt Data Options gt Symbology Settings button The Symbology selected in the Symbology drop down list defines the symbology for which the data is being configured The features available on the Symbology panel include the ability to e individually enable or disable a bar code from scanning e set the minimum and maximum size bar code to accept e strip Code ID e strip data from the beginning or end of a bar code e or based on configurable Bar Code Data add a prefix or suffix to a bar code The Code ID drop down box only filters the available symbologies in the Symbology drop down box by the selected Code ID This Code ID box does not enable or disable the Code ID as that function is controlled by the Enable Code ID box on the Data Options tab The Symbology drop down box contains all symbologies supported based on the Code ID selected above An asterisk appears in front of symbologies that have already been configured or have been modified from
235. r does LOG_ERROR not affect the screen mode switch processing continues The taskbar is moved when switching into user mode This prevents them from being visible ifthe application is exited and restarted by the timer This error does LOG_ERROR not affect the screen mode switch processing continues Unhook taskbar wndproc AppLock could not remove its control of the taskbar This error does not affect LOG_ERROR AppLock processing AppLock could not remove the hook that allows monitoring of the application LOG_ERROR In administration mode the taskbar should return to normal operation so AppLock s LOG_EX control of the taskbar should be removed 3 50 Message Explanation and or corrective action Level When the administrator leaves user mode the device is fully operational therefore AppLock must stop monitoring the locked application WM_SIZE adjusted This message denotes that AppLock has readjusted the window size LOG_EX X after Ctrl L Processing the backdoor entry LOG_EX Unhooking wndproc Ret from password lt gt __ Return value from password dialog LOG_EX Decrypt data len lt gt Length of decrypted password LOG_EX The window handle that is passed to the enumeration function This message can be used by engineering with other development tools to trouble shoot application lock failures Window handle to enumwindows x a o Output the window size after it has been adjusted by AppLock LOG_EX adjuste
236. r is not prompted again for credentials until e the device is rebooted e the radio is disabled then enabled e the Reconnect button on the Diags Tab is clicked or e the profile is modified and the Commit button is clicked 6 20 Windows Certificate Store vs Certs Path Note Itis important that all dates are correct on the Thor VM1 and host computers when using any type of certificate Certificates are date sensitive and if the date is not correct authentication will fail User Certificates EAP TLS authentication requires a user certificate The user certificate must be stored in the Windows certificate store e To generate the user certificate see Generating a User Certificate e Toimport the user certificate into the Windows certificate store see Installing a User Certificate e A Root CA certificate is also needed Refer to the section below Root CA Certificates Root CA certificates are required for EAP TLS PEAP GTC and PEAP MSCHAP Two options are offered for storing these certificates They may be imported into the Windows certificate store or copied into the Certs Path directory How To Use the Certs Path 1 See Generating a Root CA Certificate and follow the instructions to download the Root Certificate to a PC 2 Copy the certificate to specified directory on the mobile device The default location for Certs Path is System A different location may be specified by using the Certs Path global variable Please note the
237. receipt of data from the scanner triggers a good scan beep from the external scanner and then the rejection of scanned bar code data by the processing causes a bad scan beep on the same data 3 94 Processing Tab Start gt Settings gt Control Panel gt Data Collection gt Processing tab The Processing tab contains a user configurable key delay that applies to scanned bar codes as they are input when Remote Desktop is the application with the input focus Factory Default Settings Enable buffered key output Enabled Same buffer limit characters Delay between key buffers Note Settings on this panel have no effect when RFTerm is the application with the input focus Main com1 com2 Data Options Processing about Buffered Key Output Enable buffered key output Same buffer limit laz Delay between buffers rs ms Enable buffered key output Default is enabled checked Click the checkbox to turn off buffered key output Same buffer limit Default is 32 ms Raise or lower this value as desired Delay between key buffers Specifies the number of milliseconds to delay after each character in the scanned bar code is processed as a keystroke This value may need to be adjusted depending on the network traffic in the environment The default value is 75 ms Valid value is from 0 to 9999 A zero value is No Delay between characters 3 95 About Tab Start gt Setti
238. results in disabling all symbologies except the customized ones Min This field specifies the minimum length that the bar code data not including Code ID must meet to be processed Any bar code scanned that is less than the number of characters specified in the Min field is rejected The default for this field is 1 Max This field specifies the maximum length that the bar code data not including Code ID can be processed Any bar code scanned that has more characters than specified in the Max field is rejected The default for this field is All 9999 If the value entered is greater than the maximum value allowed for that symbology the maximum valid length is used instead Strip Leading Trailing Control Start gt Settings gt Control Panel gt Data Collection gt Data Options tab gt Symbology button This group of controls determines what data is removed from the collected data before the data is buffered for the application When all values are set Code ID takes precedence over Leading and Trailing Bar Code Data stripping is performed last Stripping occurs before the Prefix and Suffix are added so does not affect them Strip 7 Leading bp 7 code 1D Trailing p Barcode Data If the total number of characters being stripped is greater than the number of characters in the collected data it becomes a zero byte data string If in addition Strip Code ID is enabled and no prefix or suffix is configured the
239. rface Language The option will determine the language used for the menus dialogs Engish United States 7 and alerts Regional and Language Settings Regional Settings User Interface Language Input Language Default Input language Select the input language to f use when ihe ae ee device Engish United States US y Installed Input Languages Select input languages you plan to use 3 144 Registry Start gt Settings gt Control Panel gt Registry Choose options for managing the registry and rebooting the Thor VM1 Registry E OK x Registry Load User Defaults Warmboot Save User Defaults Restart Load Factory Defaults When clicked a standard load file dialog is opened to allow the user to pick a Registry Save RSG file The applet then copies the specified User registry file to the Active registry The user is asked to verify a reboot and then the applet does a warmboot to activate the new registry Load User Defaults When clicked a standard Save File dialog is opened to allow the user to name the Registry Save RSG file The applet then copies the Active registry to the specified User registry file and reboots the device The applet copies the Factory Default registry from the OS to the Active registry by deleting the current registry The user is asked to verify a reboot and then the applet performs a restart to activate the factory default registry
240. ring AppLock operation Status information is stored in a specific location on the storage device and in a specific logfile specified by the Administrator For this reason the administrator can configure the type of status information that is logged as well as clear the status information Administrator Control Application Security Options Status Filename System applock txt me View Log Level None y Level None y Clear Save As Move the cursor to the Filename text box and either type the logfile path or tap the Browse button the button The standard Windows CE Browse dialog is displayed After selecting the logfile from the Browse dialog tap OK Note If your Status Panel does not look like the figure shown above you may have the Single Application version which does not have as many options View Error Error status messages are logged when an error occurs and is intended to be used by the administrator to deter mine why the specified application cannot be locked Processing status shows the flow control of AppLock components and is mainly intended for Customer Service Process a A when helping users troubleshoot problems with their AppLock program Extended Extended status provides more detailed information than that logged by Process Logging All messages are displayed Tap the Refresh button after changing from one view level to another The filter
241. rom ESCape Ignore drop 0x1B in the bar code is dis 9 p the bar code data prefix and suffix p 9 p carded 0x02 in a bar code is con Printable text Text is substituted for Control Character Start of Text STX verted to the text STX Hat encoded The hat encoded text is translated to the Value OxOd in a bar code is Carriage Return M text equivalent hex value converted to the value Ox0d Escaped hat The hat encoding to pass through to the Value 0x09 in a bar code is ae Horizontal Tab WI encoded text application converted to the text l Hex encoded The hex encoded text is translated to the Value OxOD in a bar code is q Carriage Return Ox0A text equivalent hex value converted to a value Ox0A Escaped hex The hex encoding to pass through to the Vertical Tab Ox0A or O x0A Value Ox0C is a bar code is encoded text application converted to text Ox0A See Also Hat Encoding 3 93 Bar Code Processing Examples The following table shows examples of stripping and prefix suffix configurations Provided that the wedge is configured with the above table below are examples of scanned bar code data and results of these manipulations Bar Code Symbology Raw Scanner Data Resulting Data Suffix Eats gt 12 5 104444567890987654321 lt rejected gt too long woo LI Code Code 39 A4 lt rejected gt too short Note Rejected bar codes generate a bad scan beep In some cases the
242. rtificates y Lists your personal digital certificates y Import view Remove Tap the Import button Import Certificate or Key OK E From a File O From a Smart Card Reader y Card Absent Make sure From a File is selected and tap OK 6 50 Select a Certificate File ger OJ My Documents Shortcut to Office Templates Name Type Certificates y Using the explorer buttons browse to the location where you copied the certificate select the certificate desired and tap OK The certificate is now shown in the list Certificates ka OK E ny Certificates y Lists your personal digital certificates y Import View Remove With the certificate you just imported highlighted tap View From the Field pull down menu select Private Key Certificate Details Friendly Name Field Private Key y Not Present B e Ifthe private key is present the process is complete e Ifthe private key is not present import the private key To import the private key tap OK to return to the Certificates screen Tap import Select a Certificate File QJ My Documents Shortcut to Office Templates Name Type Private Keys y Using the explorer buttons browse to the location where you copied the private key file change the Type pull down list to Private Keys select the certificate desired and tap OK Enter the
243. ry charging 3 18 Thor VM1 OS Upgrade Introduction Depending on the size of the operating system the total time required for a successful upgrade may require several minutes The OS upgrade files are unique to your Thor VM1 physical configuration and date of manufacture OS upgrade files designed for one device configuration should not be used on a different device configuration When upgrading the OS or firmware on a Thor VM1 with a 12 key keyboard it is best to perform the upgrade using either Wavelink Avalanche or with an external USB keyboard attached There may be firmware and BIOS upgrades available for the Thor VM1 Contact Technical Assistance for upgrade information and instructions In some cases it may be necessary to upgrade firmware before upgrading the operating system Caution The Thor VM1 must be connected to external power before upgrading the BIOS firmware or operating systems If the Thor VM1 is operating on UPS battery power the upgrade process does not initiate and the Thor VM1 is not upgraded Preparation e Please Contact Technical Assistance to get the OS upgrade files e Honeywell Technical Assistance may advise you that additional upgrades such as BIOS or firmware are required before upgrading the OS Please follow any additional upgrade instructions provided by Technical Assistance e Use ActiveSync to back up Thor VM1 user files and store them elsewhere before beginning an upgrade on the Th
244. s Double Click Double click this grid to set the double click sensitivity for both the speed and physical distance between clicks Double click this icon to test your double click settings If this icon doesn t change adjust your settings using the grid above 3 127 Network and Dialup Options Start gt Settings gt Control Panel gt Network and Dialup Connections Set Thor VM1 network driver properties and network access properties Select a connection to use or create a new connection File Edit View Advanced X fe 7 3 a gt Y Sl Th Make New USB Client SDCSD30 Connection Create a New Connection 1 On the mobile device select Start gt Settings gt Control Panel gt Network and Dialup Connections A window is displayed showing the existing connections 2 Assuming the connection you want does not exist double tap Make New Connection Give the new connection an appropriate name My Connection 9600 etc Tap the Direct Connection radio button Tap the Next button From the popup menu choose the port you want to connect to Only the available ports are shown 5 Tap the Configure button Under the Port Settings tab choose the appropriate baud rate Data bits parity and stop bits remain at 8 none and 1 respectively Under the Call Options tab be sure to turn off Wait for dial tone since a direct connection will not have a dial tone Set the timeout parameter d
245. s Battery Schemes Device Status Device Name Power Level BKL1 High DO DSK1 High DO NDSO High SBS1 High SDCSD304G1 High SEC1 High Because of the cumulative effect if the Battery Power Scheme timers are set to 3 seconds 15 seconds and 5 minutes e The backlight turns off after 3 seconds of no activity e The display turns off after 18 seconds of no activity 15 sec 3 sec e And the Thor VM1 enters Suspend after 5 minutes and 18 seconds of no activity e Ifthe User Idle timer is set to Never the power scheme timers never place the Thor VM1 in User Idle System Idle or Suspend modes 3 142 Regional and Language Settings Start gt Settings gt Control Panel gt Regional Settings Set the appearance of numbers currency time and date based on regional and language settings Set the Thor VM1 user interface language and the default input language Factory Default Settings Date M d yy short dddd MMMM dd yyyy long User Interface English United States Language English United States US Installed English United States US Regional and Language Settings ka oK x Regional Settings User Interface Language Input Language Your locale The locale option affects how some programs format numbers currency time and dates Engish United States y 3 143 Regional and Language Settings fra OK E Regional Settings User Interface Language Input Language El User Inte
246. s Internet Explorer Help 3 11 Start Menu Program Options The following list represents the factory default program installation Your system may contain different items from those shown below based on the software and hardware options purchased Communication Connect Start or Stop FTP Server Command Prompt eXpress Scan Internet Explorer File Viewers JETCET PDF Viewer Office 2003 Excel Viewer Office 2003 PowerPoint Viewer Office 2003 Word Viewer Microsoft WordPad Remote Desktop Connection LXE RFTerm Settings Summit Transcriber Wavelink Avalanche Windows Explorer Stores Network communication options Run this command after setting up a connection Begin end connection to FTP server The command line interface in a separate window Option Requires Wavelink Avalanche option eXpress Config Access web pages on the Intemet Intranet View Adobe PDF Documents View Excel 2003 and compatible documents View PowerPoint 2003 and compatible documents View Word 2003 and compatible documents Opens an ASCII notepad Log on to a Windows Terminal Server Option Terminal emulation application Access to all Control Panels a shortcut to the Network and Dialup Control Panel and access to Taskbar options Set Summit radio network parameters Enter data using the stylus on the touch screen Option Remote management for networked devices File management program e Ifinstalled RFTerm runs automatically
247. s gt Control Panel gt Date Time or Time in Desktop Taskbar Use this Thor VM1 panel to set Date Time Time Zone and assign a Daylight Savings location Factory Default Settings Midnight GMT 05 00 Enabled March 2011 y EII SMTITWT F Si o 27 28 1 2 3 4 5 Time Zone 6 7 8 9 10 11 12 GMT 08 00 Pacific Time US amp Canada y 13 14 15 16 17 18 19 GMT 08 00 Pacific Time US amp Canada 20 21 22 23 24 25 2 Automatically adjust clock for daylight saving 27 28 29 31 1 2 There is very little functional change from general desktop or laptop Date Time Properties options Double tapping the time displayed in the Desktop Taskbar causes the Date Time Properties screen to appear The Sync button if available activates a utility that will set the clock using a network time server 3 101 Dialing Start gt Settings gt Control Panel gt Dialing Set dialup properties for internal modems not supplied or supported on the Thor VM1 Factory Default Settings Tone Dialing Enabled Disable Call Waiting Disabled blank Dialing Properties Ez OK Ed When dialing from work y New Remove Local settings are Dialing Patterns The local area code is 425 The local country region code is fi Dial using Tone O Pulse 7 Disable call waiting by dialing 3 102 Display Start gt Settings gt Control Panel gt Display The display might also c
248. s configured to use shared key or passphrase set the Auth Type radio parameter to Shared e Ifthe AP is configured for network EAP only set the Auth Type radio parameter to LEAP To use another encryption type select WPA CCKM WPA2 AES or WPA2 CCKM for encryption and complete other entries as detailed in this section Summit Client Utility ka OK E Main Profile status Diags Global Profile Default y New Rename Delete Scan E lo Encryption EAP type wpa TKIP 7 lear gt WEP keys PSKs Credentials Save Changes Commit See Sign On vs Stored Credentials for information on entering credentials To use Stored Credentials click on the Credentials button No entries are necessary for Sign On Credentials as the user will be prompted for the Username and Password when connecting to the network Credentials A E User Password Enter the Domain Username if the Domain is required otherwise enter the Username Enter the password Click OK then click the Commit button 6 31 Ensure the correct Active Profile is selected on the Main tab and warmboot The SCU Main tab shows the device is associated after the radio connects to the network 6 32 EAP FAST To use EAP FAST make sure the following profile options are used e Enter the SSID of the Access Point assigned to this profile e Set EAP Type to EAP FAST e Set Encryption to WPA TKIP e Set Auth Type to Open To
249. s of the connection Gobi Connection Manager OK x Home coma umTS GPs About RSSI 108dBm UMTS Home Network Status Disconnected Firmware Selection Update Firmy Generic y TepWindowSize 128K Roaming Status Operator Defined Power Online Gobi 2000 Radio found To update firmware 1 Select the firmware for the desired carrier from the Firmware Selection pull down list 2 If no firmware files are found an error message is displayed Contact Technical Assistance for information 3 Tap the Update Firmware button 4 The update process may take a minute or so to complete The status of the Gobi 2000 radio is displayed in the lower left corner of this tab An error message is displayed in this location if the firmware selected requires a SIM card and no SIM card is installed in the Thor VM1 Connection status is at the top of this tab 3 107 CDMA Use the CDMA tab to activate the Thor VM1 for use with a CDMA carrier such as Verizon This step is not necessary for carriers using a SIM card The Serial Number IMEI International Mobile Equipment Identity and MEID Mobile Equipment ID numbers are displayed on this tab as the carrier may request this information when setting up an account Gobi Connection Manager OK A Home CDMA umTS GPS About SIN B03EB555 Activation Type Autoconnect Q Automatic O Manual Enable IMEI 980030000000000 Disconnected MEID 41
250. screen can be disabled using the Options control panel Misc tab In these cases it may be easier to configure the Thor VM1 using ActiveSync and LXEConnect rather than using the Thor VM1 keypad only Reset and Loss of Host Re connection ActiveSync assigns a partnership between a client and a host computer A partnership is defined by two objects a unique computer name and a random number generated when the partnership is first created An ActiveSync partnership between a unique client can be established to two hosts When the mobile device is reset retum to default settings the random number is deleted and the partnership with the last one of the two hosts is also deleted The host retains the random numbers and unique names of all devices having a partnership with it Two clients cannot have a partnership with the same host if they have the same name Control Panel gt System gt Device Name If the reset mobile device tries to reestablish the partnership with the same host PC anew random number is generated for the mobile device and ActiveSync will insist the unique name of the mobile device be changed If the mobile device is associated with a second host changing the name will destroy that partnership as well This can cause some confusion when re establishing partnerships with hosts 44 Troubleshooting ActiveSync ActiveSync on the host says that a device is trying to connect but it cannot identify it Verify the dong
251. settings Manual Settings Properties OK E Network DNS Authentication Wireless Manage network settings O Use server assigned IP address O Use the Following IP address IP Subnet Gateway assigned if DHCP is enabled DNS 1 DNS 2 DNS 3 _ lt lt s Domain Sa Authentication Wireless 5 22 Manual Settings Properties OK El Network DNS Authentication L Manage wireless settings Type None Inner i one y Manual Settings Properties OK A Network DNS Authentication Wireless Manage wireless settings SSID Encryption Open System Note The Authentication tab may not be present in all versions of the Enabler It is not recommend to enable Manage Wireless Settings for Summit Client devices Troubleshooting When you download a profile that is configured to manage network and wireless settings the Enabler will not apply the manage network and wireless settings to the adapter unless the global Manage wireless settings and Manage network settings options are enabled on the Adapters panel see Figure titled Adapters Options Network earlier in this section Until these options are enabled the network and wireless settings are controlled by the third party software associated with these settings 5 23 Status The Status panel displays the current status of the Thor VM1 network adapter selected in the drop d
252. sound high low high low Link successful Beep will sound low medium high Link unsuccessful Beep will sound high low high low Yellow LED blinks at 2 Hz Linking in progress Off Disconnected or unlinked Yellow LED blinks at 50 Hz Bluetooth transmission in progress Yellow LED blinks at the same rate as the paging beep 1 Hz Paging Green LED blinks once a second Disabled indication Upon startup if the scanner sounds a long tone this means the scanner has not passed its automatic Selftest and has entered isolation mode If the scanner is reset the sequence is repeated Contact Technical Assistance for assistance Bluetooth Printer Setup The Bluetooth managed device should be as close as possible in direct line of sight with the Thor VM1 during the pairing process 1 Open the LXEZ Pair Panel 2 Tap Discover Locate the Bluetooth printer in the Discovery panel 3 Tap and hold the stylus or double tap on the Bluetooth printer ID until the right mouse click menu appears 4 Select Pair as Printer to pair the Thor VM1 with the Bluetooth managed printer The devices are paired The Bluetooth managed printer may respond with a series of beeps or LED flashes Please refer to the Bluetooth managed printer manufacturer s User Guide it may be available on the manufacturer s web site Contact Technical Assistance for Bluetooth product assistance Note If there is no beep or no LED flash from the Bluetooth managed printer the Thor VM1 an
253. strength for the currently associated authenticated Access Point is 71 dBm to 90 dBm Wireless Zero Config Utility and the Summit Radio x e The WZC utility has an icon in the toolbar that looks like a networked computer with a red X beside it indicating that Wireless Zero Config application is enabled but the connection is inactive at this time the device is not connected to a network The WZC icon may not be visible until control is passed to the WZC utility as described below e Youcan use either the Wireless Zero Configuration Utility or the Summit Client Utility to connect to your network The Summit Client Utility is recommended because the Wireless Zero Configuration Utility cannot control the complete set of security features of the radio How To Use the Wireless Zero Config Utility 1 Select ThirdPartyC onfig in the Active Profile drop down list as the active profile see Main Tab 2 Warmboot the device The Summit Client Utility passes control to Wireless Zero Config and the WZC Wireless Information control panel Using the options in the Wireless Zero Config panels setup radio and security settings There may be a slight delay before the Wireless Zero Config icon indicates the status of the connection How to Switch Control to SCU 1 To switch back to SCU control select any other profile in the SCU Active Config drop down list except ThirdPartyC onfig 2 Warmboot the device Radio control is passed to the SCU
254. sult and close the control panel If the KeyMap tab is accessed again the command plus any specified parameters is displayed in the Key Sequence text box when the remapped key is again selected 3 121 LaunchApp Tab The default for all text boxes is Null or The text boxes accept string values only Note that executables and parameters are not checked for accuracy by the keyboard driver If the launch fails the Thor VM1 emits a single beep if the launch is successful it is silent Keypad Control E OK E KeyMap LaunchApp RunCmd Appi The Launch App command is defined for use by system administrators These instructions are parsed and executed directly by the keyboard driver 1 Place the cursor in the text box next to the App you wish to run e g App1 App2 2 Enable the EXE radio button if the application is an EXE file 3 Enter the name of the executable file 4 Enable the OPT radio button to add options or parameters for the executable file in the same text box Switching from EXE to OPT clears the text box but the information previously entered is stored allowing parameter entry Tap the OK button when finished The changes take effect immediately The result of the application exe and options opt entries are displayed on the KeyMap tab in the Key Sequence box when the key mapped to the LauchApp is selected 3 122 RunCmd Tab The default for all text boxes is Empty Null or
255. system Tap the Import button to import a digital certificate file Tap the View button to view a highlighted digital certificate Tap the Remove button to remove highlighted certificate files Tap the button and follow the instructions in the Windows CE Help file when working with trusted authorities and digital certificates 3 72 Data Collection Wedge Introduction Start gt Settings gt Control Panel gt Data Collection This software component is the interface between data collection devices such as bar code scanners or imagers externally connected to a COM port on the Thor VM1 or bar code scanners wirelessly connected via Bluetooth to your Thor VM1 This software component collects the data from the varied sources and presents it to applications on your Thor VM1 in a transparent manner Note When a HID enabled USB scanner is connected to the Thor VM1 the scanned data is transmitted to the active window as keystroke messages The data bypasses the data collection wedge Any data handling to be applied to the scanned data for example strip leading or trailing characters must be programmed into the scan engine via configuration bar codes or handled by the application accepting the data Use the options on the control panels to set Thor VM1 data collection keyboard wedge parameters enable or disable allowed symbologies and assign scan key settings Assign baud rate parity stop bits and data bits for available COM ports Par
256. t been previously saved may be lost The contents of RAM are erased and the operating system and CAB files are reloaded To initiate a restart e Using the Registry select Start gt Settings gt Control Panel gt Registry and tap the Restart button The Thor VM1 immediately restarts e Using the Start menu select Start gt Run and type RESTART in the text box Press Enter The Thor VM1 immediately restarts The RESTART text command is not case sensitive Clearing Persistent Storage Reset to Default Settings Use the Registry control panel Load Factory Defaults button to set the Thor VM1 registry back to factory defaults No other clearing is available or necessary Folders Copied at Startup If any of the following folders are created in the System folder they are copied at startup System Desktop copied to Windows Desktop System Favorites copied to Windows Favorites System Fonts copied to Windows Fonts System Help copied to System Programs copied to AppMgr copied to Recent copied to This function copies only the folder contents no sub folders Windows Help Windows Programs Windows AppMgr Windows Recent The Windows Startup folder is not copied on startup because copying this folder has no effect on the system or an incorrect effect Files in the Startup folder are executed but only from System Startup Windows Startup is parsed too early in the boot process soit has no effect Executables in System Startup
257. t is Monitor for Updates e Monitor for Updates Attempt to connect to the Mobile Device Server and process any updates that are Shutdown available Do not launch the Enabler application e Exit Application Terminates the monitor requires successful password entry if a password has been configured 5 13 Activity Log Use this option to control the level of detail recorded in the log file The default is No Activity Log No Activity Log No log file is written Critical Only critical errors written to the log files Error Communication or configuration problems are written to the log file along with critical Log Level messages Warning Possible operation problems are written to the log file along with critical and error messages Info Operational information is written to the log file Debug The most detailed log file Use this option to control the level of detail shown on the main Enabler screen The default is Basic Output Basic Output General information is displayed Critical Critical errors are displayed in addition to those above Display Level Error Communication or configuration problems are displayed in addition to those above Warning Possible operation problems are displayed in addition to those above Info Operational information is displayed in addition to those above Debug The most detailed list is displayed 5 14 Display Avalanche Update Settings OK E Display
258. t to be ignored Once the user types any character into the Replacement edit control reselecting the character from the Character drop down box redisplays the default Ignore drop in the Replacement edit control Replacement The edit control where the user types the characters to be assigned as the replacement of the control character Replacements for a control character are assigned by selecting the appropriate character from the Character drop down box typing the replacement in the Replacement edit control according to the formats defined above and then clicking the button The assigned replacement is then added to the list box above the Assign button For example if Carriage Return is replaced by Line Feed by specifying J or Ox0A in the configuration the value Ox0d received in any scanned bar code or defined in the prefix or suffix will be replaced with the value Ox0a The Wedge then sends Ctrl J to the receiving application rather than Ctrl M List Box The list box shows all user defined control characters and their assigned replacements All replacements are enclosed in single quotes to delimit white space that has been assigned Assign Button Click this button when you want to assign the characters in the Replacement text box to the character in the Character drop down box Delete Button This button is grayed unless an entry in the list box is highlighted When an entry or entries is highlighted and the Dele
259. ta communications from a fork lift truck or any properly configured vehicle Wireless communications are supported over a 802 11 WLAN network and optionally over a WWAN network The optional Bluetooth module supports Bluetooth printers and scanners Caution A Before shipping the Thor VM1 the internal UPS battery must be disconnected The Thor VM1 is designed for use with a vehicle Quick Mount Smart Dock The dock installs in the vehicle and connects to vehicle power The dock provides conditioned input power for the Thor VM1 Peripheral connections are on the dock The Thor VM1 is designed to easily be removed from the dock with a latch on the lower rear of the Thor VM1 housing Since the dock remains attached to the vehicle the Thor VM1 computer can easily be moved from one vehicle equipped with a Quick Mount Smart Dock to another vehicle equipped with a Quick Mount Smart Dock The Thor VM1 contains a UPS battery which when fully charged can power the Thor VM1 for a minimum of 30 minutes This can be when the Thor VM1 is not attached to a Quick Mount Smart Dock or when the Thor VM1 is attached to a dock but the vehicle power is interrupted such as when the vehicle battery is being changed Contact Technical Assistance for information on the latest upgrades for your Thor VM1 About this Guide This Thor VM1 Reference Guide provides instruction for the system administrator to follow when configuring a Thor VM1 This ref
260. te button is clicked the highlighted material is deleted from the list box 3 90 Custom Identifiers Code IDs are defined by the user for external bar code scanners These are called custom Code IDs and are included in the Symbology drop down box in the Symbology dialog unless Enable Code ID is set to None When the custom Code ID is found in a bar code the configuration specified for the custom Code ID is applied to the bar code data When Enable Code ID is set to None custom code IDs are ignored Note When Strip Code ID is enabled the entire custom Code ID string is stripped i e treated as a Code ID The dialog box shown below allows the custom Code IDs to be configured When incoming data is checked for a custom ID code the list is compared in the order displayed in this dialog box Name Add ID Code Clear All After adding changing and removing items from the Custom IDs list click the OK button to save changes and return to the Bar Code panel Parameters Name text box Name is the descriptor that is used to identify the custom Code ID Names must be unique from each other however the Name and ID Code may have the same value Name is used in the Symbology drop down box to identify the custom Code ID in a user friendly manner Both Name and ID Code must be specified in order to add a custom Code ID to the Custom IDs list ID Code text box ID Code defines the data at the beginning of a bar c
261. ters characters below 20H in scanned bar codes are assigned to their appropriate CTRL code sequence when the bar codes are sent in Character mode The wedge provides a one to one mapping of control characters to their equivalent control character sequence of keystrokes If control characters are translated the translation is performed on the bar code data prefix and suffix before the keystrokes are simulated Parameters Translate All This option is grayed unless the user has Send Key Messages WEDGE on the Main tab selected In Key Message mode when this option is enabled control characters embedded in a scanned bar code are translated to their equivalent control key keystroke sequence 13 0x0d is translated to Control M keystrokes as if the user pressed the CTRL SHIFT and m keys on the keypad Additionally when Translate All is disabled any control code which has a keystroke equivalent enter tab escape backspace etc is output as a keystroke Any control code without a keystroke equivalent is dropped 3 89 Character This is a drop down combo box that contains the control character name Refer to the Character drop down box for the list of control characters and their names When a character name is selected from the drop down box the default text Ignore drop is shown and highlighted in the Replacement edit control Ignore drop is highlighted so the user can type a replacement if the control character is no
262. tes This option should only be run after you bytes have called load and stop Default is 500 000 Specifies the name of the file to which network traffic information is saved This option should only be run after illes you have called load and stop Default is netlog Run cmd Performs the command selected For example to run Netlog and modify the packet size do the following Select load from the Commands list and click the Run cmd button Select stop from the Commands list and click the Run cmd button Select options from the Commands list enter the new packet size in the Options list and click the Run cmd button 3 130 NDISLog NDISLog creates a TXT file that can be viewed with any text editor program that supports TXT files Network Capture E OK E Netlog NDISLog Command start stop indislog txt File ready to run command Command command Pemcion Starts logging the network traffic Stops logging network traffic file Specifies the name of the file to which NDISLog information is stored Save File Stores the file name Run cmd Performs the selected start or stop command 3 131 Options Start gt Settings gt Control Panel gt Options It may be necessary to warmboot the Thor VM1 after making desired changes A pop up window indicates if a warmboot is required Note _ If there is no icon corresponding to this item in the Control Panel contact your Contact
263. than the Re connect option This data dump includes radio state profile settings global settings and a list of broadcast SSID APs Save To Use this to save the results of the diagnostics to a text file Use the explorer window to specify the name and location for the diagnostic file The text file can viewed using an application such as WordPad 6 12 Global Tab Start gt Programs gt Summit gt Global tab The parameters on this panel can only be changed when an Admin is logged in with a password The current values for the parameters can be viewed by the general user without requiring a password Note Tap the Commit button to save changes If the panel is exited before tapping the Commit button changes are not saved Factory Default Settings Faye CON CO A Summit Client Utility kid OK A Main Profile Status Diags Global Property Value a DFS Channels Save Changes Custom Parameter Option The parameter value is displayed as Custom when the operating system registry has been edited to set the Summit parameter to a value that is not available from the parameter s drop down list Selecting Custom from the drop down list has no effect Selecting any other value from the drop down list will overwrite the custom value in the registry 6 14 Global Parameters Roam Trigger 65 dBm DO o BG Channel Set DFS Channels DFS Scan Time Ad Hoc Channel
264. the Wavelink Avalanche MC Console and enable it Verify RMU CE CAB exists in the System RMU folder Double click the Thor VM1 enabler CAB file in the System folder The enabler automatically launches after installation and contacts the Mobile Device Server The Avalanche MC Console connected to that Mobile Device Server identifies the remote device and performs a sync This downloads any available packages available for the Thor VM1 5 25 Using eXpress Scan Oil eXpress Scan Desktop Icon express scan If the Thor VM1 has an eXpress Scan icon on the desktop eXpress Scan may be used for the initial configuration of the device If the eXpress Scan icon is not present on the desktop install the Enabler If the icon is still not present the Enabler must be updated If the eXpress Scan icon is present follow these steps to configure the Thor VM1 to connect with the wireless network and the Mobile Device Server Step 1 Create Bar Codes Bar codes are created with the eXpress Config utility on the desktop laptop computer not the mobile device Depending on the bar code length and the number of parameters selected eXpress Config generates one or more bar codes for device configuration The bar codes contain configuration parameters for the wireless client in the mobile device and may also specify the address of the Mobile Device Server Bar codes should be printed at a minimum of 600 dpi Please see Using Wavelink Avalanche for det
265. the administration changed the settings of the application PROCESSING being controlled Eon encrypt pwd The length of the encrypted password is being calculated LOG_EX Hook wndproc failure AppLock is unable to lock the application This could happen if the application being locked encountered an error after performing its initialization and shut itself down LOG_ERROR prior to being locked by AppLock Hook wndprog ofopen The application is open but AppLock cannot lock it LOG_ERROR app failure ca evenEctedton The Admin applet is unable to create the hotkey notification LOG_ERROR Hot key pressed Processing the hotkey and backdoor entry LOG_EX Hot key pressed Hot key set event failure Hotkey press message received In app hook WM_ SIZE In app hook WM __ WINDOWPOSCHANGED Initializing keyboard hook procedure Keyboard hook initialization failure Keyboard hook loaded OK L after Ctrl Loading keyboard hook Processing the hotkey and backdoor entry LOG_EX When the administrator changes the hotkey configuration the hotkey controller must LOG ERROR be notified This notification failed The user just pressed the configured hotke LOG at g y PROCESSING In addition to preventing the locked application from exiting AppLock must also prevent the application from enabling the taskbar and resizing the application s LOG_EX window This message traps a change in the window size and corrects it In addition to pr
266. the default value Each time a Symbology is changed the settings are saved as soon as the ok button is tapped Settings are also saved whena new Symbology is selected from the Symbology drop down list None Symbology arenes Enable Min Max fal Strip Leading F T Code ID _ Trailing F Barcode Data Add Prefix Suffix The order in which these settings are processed are e Min Max e Code ID e Leading Trailing e Bar Code Data e Prefix Suffix Note When Enable Code ID is set to None on the Data Options tab and when All is selected in the Symbology field Enable and Strip Code ID on the Symbology panel are grayed and the user is not allowed to change them to prevent deactivating the scanner completely 3 82 When All is selected in the Symbology field and the settings are changed the settings in this dialog become the defaults used unless overwritten by the settings for individual symbologies This is also true for Custom IDs where the code IDs to be stripped are specified by the user Note In Custom mode on the Data Options tab any Code IDs not specified by the user will not be stripped because they will not be recognized as Code IDs If aspecific symbology s settings have been configured a star will appear next to it in the Symbology drop down box so the user can tell which symbologies have been modified from their defaults If a particular symbology has been conf
267. the network 6 26 PEAP MSCHAP To use PEAP MSCHAP make sure the following profile options are used e Enter the SSID of the Access Point assigned to this profile e Set EAP Type to PEAP MSCHAP e Set Encryption to WPA TKIP e Set Auth Type to Open To use another encryption type select WPA CCKM WPA2 AES or WPA2 CCKM for encryption and complete other entries as detailed in this section Summit Client Utility 7 foki x Main Profile status Diags Global Profile Default y New Rename Delete Scan Y Cc Radio Encryption EAP type ap wea TKIP PEAP MSCHat y WEP keys PSKs Credentials Save Changes Commit See Sign On vs Stored Credentials for information on entering credentials Click the Credentials button e No entries except the CA Certificate Filename are necessary for Sign On Credentials as the user will be prompted for the User Name and Password when connecting to the network e For Stored Credentials User Password and the CA Certificate Filename must be entered Enter these items as directed below Credentials E x Password CA cert a _ Validate server Use MS store Enter the Domain Username if the Domain is required otherwise enter the Username Enter the password Leave the CA Certificate File Name blank for now Click OK then click Commit Ensure the correct Active profile is selected on the Main Tab 6 27 See Windows Cer
268. this event is treated the same as a Power button press which places the Thor VM1 in Suspend If the Ignition Input wire is not connected the Thor VM1 only powers on when the Power button is pressed 2 10 External Connectors Power the Thor VM1 off before attaching a cable to any port serial USB Audio CAN etc Most external connectors for the Thor VM1 are located on the Quick Mount Smart Dock e COM1 connects to a serial bar code scanner screen blanking cable serial printer or PC e COM2 connects to a serial bar code scanner screen blanking cable serial printer or PC e USB accepts a dongle cable with a USB Host port and a USB Client port e CANbus Audio accepts a cable with connections for a mono headset microphone or a cable with CANbus adapters The power connector is on the dock Antenna connectors are located on the rear of the Thor VM1 2 11 Serial Connector COM1 and COM2 The COM1 and COM2 connectors are D 9 male connectors located on the back of the Quick Mount Smart Dock Power the Thor VM1 off before attaching a cable to any port serial USB Audio CAN etc The serial connectors are industry standard RS 232 PC AT standard 9 pin D male connector By default Pin 9 is configured to provide 5V for an external bar code scanner Pin 9 of COM1 or COM2 may also be configured to provide RI If aCOM port is not being used for a scanner it can be used for screen blanking when the vehicle is in moti
269. tificate Store vs Certs Path for more information on certificate storage Once successfully authenticated import the CA certificate into the Windows certificate store Return to the Credentials screen and check the Validate server checkbox User Password LXE CA cert Full trusted store Validate server Use MS store If using the Windows certificate store e Check the Use MS store checkbox The default is to use the Full Trusted Store e To select an individual certificate click on the Browse button e Uncheck the Use full trusted store checkbox e Select the desired certificate and click Select You are returned to the Credentials screen If using the Certs Path option e Leavethe Use MS store box unchecked e Enter the certificate filename in the CA Cert textbox Click OK then click Commit The device should be authenticating the server certificate and using PEAP MSCHAP for the user authentication Ensure the correct Active Profile is selected on the Main tab and warmboot The SCU Main tab shows the device is associated after the radio connects to the network Note The date must be properly set on the device to authenticate a certificate 6 28 PEAP GTC To use PEAP GTC make sure the following profile options are used e Enter the SSID of the Access Point assigned to this profile e Set EAP Type to PEAP GTC e Set Encryption to WPA TKIP e Set Auth Type to Open To use another encryption type select WP
270. tion Introduction This section discusses Honeywell supported features with Wavelink Avalanche Mobile Device Servers This section is split into three basic areas e Installation e User Interface e Enabler Configuration Installation To use the Wavelink Avalanche MC System the following items are required e Adesktop or laptop PC on which to install the Avalanche MC Console e Adesktop or laptop PC on which to install the Avalanche Mobile Device Server this can be the same PC where the Avalanche MC Console is installed e Wavelink Avalanche MC Console 4 2 or later e A Wavelink Device License for each client device To use Avalanche Remote Control the follow additional items are required e Wavelink Remote Control plug in 2 0 or later e A Wavelink Remote Control License for each client device Installing the Enabler on Mobile Devices Supported devices have the Avalanche Enabler installation files loaded but not installed on the mobile device when it is shipped The installation files are located in the System folder on Windows devices Note Important If the user is NOT using Wavelink Avalanche to manage their mobile device s the Enabler should not be installed on the mobile device s Doing so results in unnecessary delays when booting the device The Avalanche Enabler installation file LXE_ENABLER CAB is loaded on the Thor VM1 by Honeywell however the device is not configured to launch the Enabler installation file auto
271. tion panel Application Launch Options Launch V Auto At Boot Retries fo Delay fio Y Auto Re launch Retries fo Delay fo 7 Manual 7 Allow Close Note Launch order is determined by the Order specified in the Application tab The Order value does not have to be sequential 3 35 Auto At Boot Application Launch Options Launch V Auto At Boot Retries fo Delay fro V Auto Re launch Retries 0 Delay fo Manual 7 Allow Close Default is Enabled Auto At Boot When enabled automatically launches subject to the specified Delay in seconds the application after the unit is rebooted If a Delay in seconds is specified AppLock waits for the specified period of time to expire before launching the application The Delay default value is 10 seconds valid values are between 0 no delay and a maximum of 999 seconds Retries This is the number of times the application launch will be retried if a failure occurs when the application is automatically launched at bootup Valid values are between 0 no tries and 99 tries or 1 for infinite Infinite tries ends when the application successfully launches The default is O retries Delay This timer is the time that AppLock waits prior to the initial launch of the selected application when it is automatically launched at bootup Delay default is 10 seconds Valid values are between 0 seconds no delay and 999 seconds The Auto At B
272. to encrypt password LOG_ERROR oe darn Encrypt password process successful LOG_EX Encrypt length failure Unable to encrypt password LOG_ERROR dl Sonar Unable to encrypt password LOG_ERROR Encrypted data OK The password has been successfully encrypted LOG_EX In order for AppLock to control the application being locked so it can prevent the Enter application from exiting AppLock launches the application and has to wait until it AppLockEnumWindows has created and initialized its main window This message is logged when the function that waits for the application initialization is entered F F LOG_ Enter DecryptPwd Entering the password decryption process PROCESSING Enter EncryptPwd Entering the password encryption processin LOG YP ey ee 9 PROCESSING Enter FullScreenMode Entering the function that switches the screen mode In full screen mode the taskbar LOG_ is hidden and disabled PROCESSING Processing is at the beginning of the function that retrieves the application LOG_ ENIT SEVAppINIO information from the registry PROCESSING Enter password dialo Entering the password dialog processin roc P g i gp a PROCESSING 3 46 LOG_EX Message Explanation and or corrective action Level Enter password timeout Entering the password timeout processing ie Some application shut down before AppLock can stop it In these cases AppLock gets notification of the exit When the notification is received AppLock starts a timer LOG_
273. to view an updated list of APs Each AP s SSID its received signal strength indication RSSI and whether or not data encryption is in use true or false Sort the list by tapping on the column headers If the scan finds more than one AP with the same SSID the list displays the AP with the strongest RSSI and the least security nereh If you are logged in as an Admin tap an SSID in the list and tap the Configure button you return to the Profile window to recreate a profile for that SSID with the profile name being the same as the SSID or the SSID with a suffix such as _1 if a profile with the SSID as its name exists already Allows entry of WEP keys or pass phrase as required by the type of encryption Note Unsaved Changes The SCU will display a reminder if the Commit button is not clicked before an attempt is made to close or browse away from this tab Important The settings for Auth Type EAP Type and Encryption depend on the security type chosen Profile Parameters A string of 1 to 32 alphanumeric characters establishes the name of the Profile Edit Profile Default Options are Default or ThirdPartyConfig A string of up to 32 alphanumeric characters Establishes the Service Set Identifier SSID of the SSID Blank WLAN to which the client connects A string of up to 16 characters The client name is assigned to the network card and the device using Client i a Name Blank the network card
274. tooth Printer Setup 02 eee cece cece eee c cece cc cece ccccccccecceccececceceececcecceeeeeeeeeeeteeeeers 3 70 Easy Pairing and Auto Reconnect 2 22222 c eee cece cece cece ccc e cece ee ceeeeeeeeeteees 3 71 Certificates cocoossitt ca el EAEE O eed Bede 3 72 Data Collection Wedge Introduction 0 000000 02 coe cc cece ccc cee cece cronos 3 73 Bar Code Readers x icono rica siii des 3 74 Return to Factory Default Settings 0000 000000 e cece aniraa rnaar nrnna 3 74 Data Processing Overview 2 02222 cece eee c ccc cece ns 3 75 Factory Default Settings 2 2 caciones oat Mk 3 76 vi Man Tanto ie era ets ead oa sia Vertes ata etude tate 3 77 COMET D ecclesia te A gk a er N 3 78 POWOPOMN PIM 262002 fo pede ir ti diia 3 78 AA A oh ite op A A Man eee se gees Pe ES 3 79 Poweron Pin ii nn cnccnccoes 3 79 Data Options Vabic csi eos steers ie tee a ett Oe SIS ae eae rue o eel 3 80 Enable Code ID a 53 case 34 coma dl ee ey lo ets ee EES e ES Satna tt E 3 80 AAA eae see tie ie este e a gabe a geet E see ees 3 81 Data Options Symbology Settings 0 cece eee c cece ccc cc ccc ecccececceccececcecceeeeeeeeeeeeeeeeees 3 82 ARTO A A i cela A ee ds ee 3 83 Enable Min Max cicsseccecescnieel eset a Yad etd Gedo eed Sack Gola CLS ee aes alg ee ee 3 84 Strip Leading Trailing Control 000000020 occ c ccc ccc ccc ccc cece cece ee aandaa aaraa araona nannan 3 85 Bar Code Data Match List 0
275. tween applications The Global Key default key sequence must be defined by the AppLock Admin istrator The Global key is presented to the end user as the Activation key Default is 10 seconds Enter the number of seconds that Applications must wait before starting to run after reboot Global Delay Note Delay Global may not be available in all versions of AppLock You can simulate a Global Delay function by setting a delay for the first application lowest Order launched and setting the delay to O for all other applications See Boot Options 3 33 Default is Disabled Enable check to show the Keyboard option on the Switchpad menu When Input Panel enabled the input panel cannot be enabled or disabled for each individual application and is avail able to the user for all configured applications Tap the Clear button to clear all currently displayed Filename or Application information The Global Clear Button A settings are not cleared Use the left and right scroll buttons to move from application setup screen to application setup Scroll Buttons screen The left and right buttons update the information on the screen with the previous or next con figured application respectively Launch Button Note The Launch button may not be available in all versions of Multi AppLock Contact Technical Assistance for and AppLock update availability When clicked displays the Launch options panel for the Filename selected on the Administra
276. type of application is being locked the administrator should close all other applications before switching to end user mode to minimize the screen flicker AppLock is updated periodically as new options become available Contact Technical Assistance for update availability 3 26 Factory Default Settings AppLock gt Le 3 r Oo gt v o gt o Filename Title Arguments Order Internet Global Key Global Delay Disabled Ctrl Spc 10 sec Disabled Input Panel Launch Button Panel Enabled 10 sec Enabled Auto Re launch Retries Auto Re launch Delay 0 sec Disabled Disabled Manual Launch Security Panel Hotkey Activation key Shift Ctl A Password Blank Options Panel Launch timeout 60000 20000 20000 Replace timeout Restart timeout Status Panel Filename System applock txt 3 27 Setup a New Device Devices with the AppLock feature are shipped to boot in Administration mode with no default password thus when the Thor VM1 is first booted the user has full access to the device and no password prompt is displayed After the administrator specifies the applications to lock a password is assigned and the device is rebooted or the hotkey is pressed the device switches to end user mode Briefly the process to configure a new device is as follows 1 Connect an external power source to the device and press the Power button Adjust screen display audio volume and other p
277. umLock keys do 3 25 Administration for AppLock Start gt Settings gt Control Panel gt Administration AppLock is designed to be run on certain certified Windows CE based devices only The AppLock program is installed as part of the default software load Configuration parameters are specified by the AppLock Administrator for the Thor VM1 end user AppLock is password protected by the Administrator End user mode locks the end user into the configured application or applications The end user can still reboot the mobile device and respond to dialog boxes The administrator specified applications are automatically launched in the specified order and run in full screen mode when the device boots up When the mobile device is reset to factory default values for example after a cold reset the Administrator may need to reconfigure the AppLock parameters The assumption in this section is that the first user to power up a new mobile device is the system administrator Note AppLock Administrator Control panel file Launch option does not inter relate with similarly named options contained in other Thor VM1 Control Panels Note A few applications do not follow normal procedures when closing AppLock cannot prevent this type of application from closing but is notified that the application has closed For these applications AppLock immediately restarts the application see Auto Re Launch which causes the screen to flicker If this
278. ur product s warranty information Table of Contents Chapter 1 Introduction IIA 4 About this Guide o cnn 1 1 End User License Agreement EULA o occccccccccccccc cc 1 2 COMPONEN S Se e Ida 1 3 MON VICW lt atada 1 3 Back View with Quick Mount Smart Dock 2 22222 e ccc e eee c cece cece cece cece ceceeeeeeeeeees 14 Access Panels 22 22 2 2cc2esec che cede cece eee eee cee EAE S EE eee eee ece cede ceeee seen NEEE 1 4 Chapter 2 Hardware_ S 2 System Hardware 2 2 eee eee cee cece e cece cece cece cece cece cece cece cece DAADAA EAE E arrana 2 1 802 11a b g Wireless Client 200 2 c cece cece cece cece ccc cece ccc e cece cece cece eeeeeeeeeeeeeeereees 2 1 Central Processing Unit nn 2 1 Input Output Components ninos 2 2 System Memory ns 2 2 Video Subsystem 0 0000000000000 00 0000000000000000 cece cece eee cece eee e cece cece cece eeeeeeeeeeeeeeeeeeeetereeseeeees 2 2 Audio Interface 00 cece cece cece cece cece cece cece cece cece cece cece ce ccccceceeceeeeeeeeeeeeteteeteeeeeeeees 2 2 Card SIOUS ote ee a tc ee re ee eee et 2 2 CompactFlash CF Slot 2 22 22 occ cece eee ccc cc ccc cc cece nn 2 2 Secure Digital SD Slot 00 0000 cee cee ee eee eee eee e cece eee e cece cee eeeeeeceseaaseeeesesee 2 2 Bluetooth EXEZ Palit 2 oct gnc k essen n a lio loci 2 3 MIN AA II E eda PN Rede 2 3 GPS ei tet A EENI AAEN etek AN ee aun a ute el dane etait edhe 2 3 OW E et re er ea See eet ee AEE h
279. uter is connectable l ote ete neha Disable this option to inhibit Thor VM1 connection initiated by a Bluetooth scanner ot This option is Disabled by default Computer is discoverable i i Enable this option to ensure other devices can discover the Thor VM1 This option is Enabled by default A dialog box appears on the Thor VM1 screen notifying the user a Bluetooth device requests to pair with the Thor VM1 The requesting Bluetooth device does not need to have been Discovered by the Thor VM1 Prompt eso before the pairing request is received pair Tap the Accept button or the Decline button to remove the dialog box from the screen Note In some cases if a Bluetooth device is already paired this setting cannot be changed If this is the case an error message is displayed and the option is not changed The Bluetooth device must be disconnected before changing this setting This option is Disabled by default When enabled the Bluetooth connection never stops searching for a device it has paired with Continuous Search when the connection is broken such as the paired device entering Suspend mode going out of range or being turned off When disabled after being enabled the Thor VM1 stops searching after 30 minutes This option draws power from the Main Battery This option is Enabled by default Determines whether the Bluetooth client discovers and displays all serial Bluetooth devices in the vicinity Filtered Mode is disa
280. ution scan Config Shortcuts SaaS Adapters Status_ 4 gt L Auto Execute selection Select Auto Execution App 7 Delay before execution seconds Auto Execute Selec An application that has been installed with the Avalanche Management system can be run auto tion matically following each boot Select Auto The drop down box provides a list of applications that have been installed with the Avalanche Man Execute App agement System Pelay PoS Time delay before launching Auto Execute application execution 5 17 Scan Config For best results use eXpress Config and eXpress Scan for this function eXpress Scan is included with the updated Thor VM1 enablers Avalanche Update Settings Scan Config functionality is a standard option of the Wavelink Avalanche MC system but is not currently supported on the Thor VM1 5 18 Shortcuts For best results use AppLock for this function AppLock is resident on each mobile device Avalanche Update Settings OK E Scan Config Shortcuts saas Adapters Status Add Edit Delete Configure shortcuts to other applications on the Thor VM1 Shortcuts are viewed and activated in the Programs panel This limits the user s access to certain applications when the Enabler is controlling the mobile device display 5 19 SaaS Avalanche Update Settings Scan Config Shortcuts SaaS Adapters Status
281. ve This value is masked when the Admin is logged out Options are none Specifies the number of seconds the Summit software waits for an EAP authentication request to succeed or fail If the authentication credentials are stored in the active profile and the authentication times out the association fails No error message or Auth Timeout 8 seconds prompting for corrected credentials is displayed If the authentication credentials are not stored in the active profile and the authentication times out the user is again prompted to enter the credentials Options are An integer from 3 to 60 6 17 A valid directory path of up to 64 characters where WPA Certificate Authority and User Certificates are stored on the mobile device when not using the Windows certificates store Ensure the Windows folder path exists before assigning the path in this parameter See Certificates for instructions on obtaining CA and User Certificates This value is masked when the Certs Path System Admin is logged out Options are none For example when the valid certificate is stored as My Computer System MYCERTIFICATE CER enter System in the Certs Path text box as the Windows folder path Maximum amount of data to be transmitted on a ping Ping Payload 32 bytes Options are 32 bytes 64 128 256 512 or 1024 bytes The amount of time in milliseconds that a device will be continuously pinged The Stop Ping button can be tapped to end the ping pro
282. wer Supply AC to DC power input for the Thor VM1 is delivered to the Quick Mount Smart Dock via an optional external power supply and adapter cable One end of the adapter cable attaches to the dock and the other end is a barrel connector for the output cable from the adapter O _ AC Input Cable US only J 7 ELA AF DC Output Cable o N To DC Output Cable see above CM 4 To Thor VM1 In North America this unit is intended for use with a UL Listed ITE power supply with output rated 12 48 VDC minimum 15 W Outside North America this unit is intended for use with an IEC certified ITE power supply with output rated 12 48 VDC minimum 15 W The external power supply may be connected to either a 120V 60Hz supply or outside North America to a 230V 50Hz supply using the appropriate detachable cordset In all cases connect the external AC supply to a properly grounded source of supply provided with maximum 15 Amp overcurrent protection 10 Amp for 230V circuits Please refer to the wiring instructions including appropriate cautions and warnings in the Thor VM1 User Guide Uninterruptible Power Supply The Thor VM1 contains an internal UPS battery The UPS battery is automatically charged when the Thor VM1 is placed in a powered dock e A fully discharged UPS battery recharges in under 4 hours when the Thor VM1 is in a powered dock e Charging of the UPS battery continues during power management of the Thor
283. xamples found in this section are to be used as examples only the configuration of your specific Thor VM1 computer may vary The following sections provide a general reference for the configuration of the Thor VM1 and some of its optional features Operating System Your Thor VM1 operating system is Microsoft Windows Embedded CE 6 The Thor VM1 operating system revision is displayed on the Desktop This is the default setting for the Desktop Display Background Windows CE Operating System Note For general use instruction please refer to commercially available Windows CE user s guides or the Windows CE on line Help application installed with the Thor VM1 operating system This segment assumes the system administrator is familiar with Microsoft Windows options and capabilities loaded on most standard Windows computers Therefore the sections that follow describe only those Windows capabilities that are unique to the Thor VM1 and its Windows CE environment General Windows CE Keyboard Shortcuts Use the keyboard shortcuts in the chart below to navigate with the Thor VM1 keyboard These are standard keyboard shortcuts for Windows CE applications CTRL C Copy CTRL X Cut CTRL V Paste CTRL Z Undo DELETE Delete Select more than one item in a window or on the desktop or select text SHIFT with any of the arrow keys within a document CTRL A Select all ALT ESC Cycle through items in the order they were opened CTRL ESC Display

Download Pdf Manuals

image

Related Search

Related Contents

  Bedienungsanleitung  Philips 717053348 Data Sheet  取扱説明書 - Bose  NANO-6060 User`s Manual  Télécharger la notice    HQ W7-51864/ NV  Guide de l`utilisateur/Dépannage Guida dell`utente/Soluzione dei  104L / 107L / 107B Coupe-herbe / Débroussailleuse  

Copyright © All rights reserved.
Failed to retrieve file