Home
        Thor VM1 Reference Guide (Windows CE 6.0 OS)
         Contents
1.               SaaS Settings       Disable Saas  O Scan Configure SaaS     Manually Configure Saa     Customer    m          Use to configure the Enabler to connect with Avalanche on Demand  This is a Software as a Service version of Avalanche   Using either of the SaaS configuration options below assumes the user has registered with Wavelink     Disable SaaS No SaaS connection is used     Scan Configure   Scan bar codes printed from within the Avalanche Console to configure the Enabler for the SaaS con   SaaS nection        Manually Con  Manually enter the SaaS connection information  Enter the server address on the Connection tab and the  figure SaaS customer ID in the Company textbox     5 20       Adapters    Note  Review the network settings configuration utilities and the default values before setting All Adapters to Enable in the  Adapters applet        Avalanche Update Settings      Scan Config   Shortcuts   Saas   Adapters   Status      All Adapters   Manage Network    Manage Wireless                   Current Adapter      Summit 304G Series WLAN Adapter y     Primary      0   Use Avalanche Network Profile  3     adapter    Icon on   V  taskbar O Use Manual Settings Ir           When enabled  the Enabler will control the network settings  This parameter cannot be configured from the Ava   lanche Mobility Center Console and is enabled by default     When enabled  the Enabler will control the wireless settings  This parameter cannot be configured from the Ava   lanche M
2.      JA nn a Bn ee eh eee 3 20  Accessing the BIOS Setup          0 2    cece cc ccccc cece cece ccc eeceeceeeeeeeceeteeteeeeeeeteetetententeeeneeteeteeeeeeeeeeees 3 20   BOGE hoc  sees pals rt E TAR i es Be She Lok tate ht fo as 3 20  Exiting BIOS Setup  ooo c cece cece cece cece cece cece cece eceececeeeeeeeeeeeeeeeeeees 3 20   Control Panel o sete ae a lao odio o Le ari 3 21   PADOUL nn E E eat yet aneee E E E ets ceceuunsseceeenbenseeecectee 3 23  Version Tab and the Registry      00 0    c cece cece cece cece cece cee cece e cece cece cece aaraa anainn 3 23  Languages eneee oe ass hee pase gi ets Scans es he estos se eres os ee cin de eee ee seee ee doe eet aces 3 23  Identifying Software Versions               00 00 0 2 eee eee eee cece cece cece ee aaaea aoar earann anana 3 24  MAC A ONES S so sree roo ee ae te ees ee acosa 3 24   Accessibility    occ aa aa 0a aaoo EDEA DAADE EDAD D ALALE ELEA Ea aana r anann 3 25   Administration  for AppLock             00 0202 2 2c cece cece cece coc 3 26  Factory Default Settings   AppLock          22 2 2 e cece cece cece ccc aa eanan anaana 3 27  Setup a New DEVICE 2 fo  co sce need dedecct ch cet cgeececussannecee ose ceagteeveiagbes oeoeseeecaueeeesedaedescddsdeateses 3 28  Administration Mode      2 2 2 2  2 2222 c cece cece cece cece cece cece cece cece cece cece ce cece ee eee eeeeeeeeeeeteteeeteeeeeeeees 3 28  End User Mode    2 22    222 ecco eee ee ee ee ee nano 3 29  PAS SW ONS ish es a ER aye ee eee ee ae et ae eR Ste at
3.     6 3       Main Tab    Start  gt  Programs  gt  Summit  gt  Main tab    Factory Default Settings    Summit Client Utility  Main   Profile   Status   Diags   Global               A Active Profile   Default y      SUMMIT Status  Associated  DATA COMMUNICATIONS Radio Type  ABG    Auto Profile     On   off List    Admin Login   Reg  Domain  WorldWide  Driver    3 03 09  Disable Radio   SCU  43 03 09 About SCU                The Main tab displays information about the wireless client device including   e SCU  Summit Client Utility  version  e Driver version  e Radio Type  ABG is an 802 11 a b g radio    e Regulatory Domain  e Copyright Information can be accessed by tapping the About SCU button  e Active Config profile   Active Profile name  e Status of the client  Down  Associated  Authenticated  etc       The Active Profile can be switched without logging in to Admin mode  Selecting a different profile from the drop down list does  not require logging in to Administrator mode  The profile must already exist  Profiles can be created or edited after the Admin  login password has been entered and accepted     When the profile named    ThirdPartyConfig    is chosen as the active profile  the Summit Client Utility passes control to  Windows Zero Config for configuration of all client and security settings for the network module     The Disable Radio button can be used to disable the network card  Once disabled  the button label changes to Enable Radio   By default the radio is ena
4.     The Main Tab provides information  admin login and active profile selection    Profile specific parameters are found on the Profile Tab  The parameters on this tab can be set to unique values for each profile   The Status Tab contains information on the current connection    The Diags Tab provides utilities to troubleshoot the radio    Global parameters are found on the Global Tab  The values for these parameters apply to all profiles     Help    Help is available by clicking the   icon in the title bar on most SCU screens     The SCU help may also be accessed by selecting Start  gt  Help and tapping the Summit Client Utility link  The SCU does not  have to be accessed to view the help information using this option     Summit Tray Icon    ii  The Summit tray icon provides access to the SCU and is a visual indicator of radio status     The Summit tray icon is displayed when   e The Summit radio is installed and active  e The Windows Zero Config utility is not active  e The Tray Icon setting is On  Click the icon to launch the SCU  Use the tray icon to view the radio status         l   The radio is not currently associated or authenticated to an Access Point    The signal strength for the currently associated authenticated Access Point is less than  90 dBm    The signal strength for the currently associated authenticated Access Point is  51 dBm to  70 dBm    The signal strength for the currently associated authenticated Access Point is greater than  50 dBm    EW The signal 
5.     The tethered external scanner is powered by the external device power source     Wireless external scanners use their own power source     3 78       COM2 Tab    Start  gt  Settings  gt  Control Panel  gt  Data Collection  gt  COM2             Main   com1   COM2   Data Options   Processing   About               Baud Rate Data Bits  O 115200 Os  O 57600 7     38400     19200 Stop Bits         2600     4800  O 2400     1200    O   Oz       Power on pin 9   5w           This panel sets communication parameters for any device connected to the external port   Adjust the settings and click the OK button to save the changes  Any changes take effect immediately     This panel does not configure the connected device  Please refer to the documentation for the external connected or wireless  device for information on configuring the device     Note  COM default values are restored after a cold boot or operating system upgrade  COM2 supports 5V switchable power  on Pin 9 for tethered scanners     Power on Pin 9    To configure the COM port to supply power to an external scanner tethered to the COM2 port  check the checkbox for Power  on Pin 9   5V   The default is On  enabled    The tethered external scanner is powered by the external device power source     Wireless external scanners use their own power source     3 79       Data Options Tab    Start  gt  Settings  gt  Control Panel  gt Data Collection  gt  Data Options tab  Bar code manipulation parameter settings on this tab are a
6.     e c2 Code   C1   e c3   Code       C0   24 character bar code is Code 128   e c4 Code     C1                ID Code    Clear All         Custom symbology setup is assigned in the following manner   e c1 min length   34  max length   34  strip leading 2  strip trailing 18  Code ID enabled  Bar Code Data      01     e c2 min length   26  max length   26  strip leading 2  strip trailing 10  Code ID enabled  Bar Code Data      01     e c3 min length   24  max length   24  strip leading 2  strip trailing 8  Code ID enabled  Bar Code Data      01     e c4 min length   20  max length   20  strip leading 0  strip trailing 4  Code ID enabled  Bar Code Data      00     Add the custom symbologies  Refer to the previous section Symbology Settings for instruction     3 97          Symbology OK x  Code ID   custom  y    Symbology  1  y   Enable Min  fas Max  fas    Strip     V  Leading k Code ID             Suffix            Click the Bar Code Data button   Click the Add button   Add the data for the match codes              Refer to the previous section Bar Code Data Match List for instruction   Scan a bar code and examine the result           3 98       Hat Encoding    Desired Hat Hat    0X01    pre o     DCI XON    oxu    Q       EM   xs   oy       ESC   oB    gt      AN   o    J  Fu    P PoulS lin   gt    g  12 un     a   a A    bil Pe Do   O  P  P P  f       C    ll Y  mo i  pa  HH                  S GA tla  eo Oy   mi mimm ea mim      3 100       Date   Time    Start  gt  Setting
7.    Passwords    A password must be configured  If the password is not configured  a new device switches into Administration mode without  prompting for a password  In addition to the hotkey press  a mode switch occurs if inaccurate information has been configured  or if mandatory information is missing in the configuration     There are several situations that display a password prompt after a password has been configured     If the configured hotkey is pressed  the password prompt is displayed  In this case the user has 30 seconds to enter a  password  If a valid password is not entered within 30 seconds  the password prompt is dismissed and the device returns to  end user mode     All other situations that present the password prompt do not dismiss the prompt   this is because the other situations result in  invalid end user operation     These conditions include   e  f inaccurate configuration information is entered by the administrator  i e  an application is specified that does not exist   e Ifthe application name  which is mandatory for end user mode  is missing in the configuration   e Invalid installation of AppLock  e g  missing DLLs    e Corrupted registry settings     To summarize  if an error occurs that prevents AppLock from switching to user mode  the password will not timeout and  AppLock will wait until the correct password is entered     Forgotten password     See  AppLock help    3 29       End User Switching Technique    Note  The touch screen must be enabl
8.    Set the parameters for a Summit client        3 22       About    Start  gt  Settings  gt  Control Panel  gt  About    The data cannot be edited by the Thor VM1 user on these panels     GUID  Serial Number  Windows CE Version  OAL Version  Compile Version  and Lan     Software Sooke   f  guage  Language indicates localized version     Hardware CPU Type  Codec Type  Display  and DRAM memory  Versions Revision level of software modules and  NET Compact Framework Version     Current network connection IP and MAC address  Only the first 2 adapters are shown    EMO  usually radio and ActiveSync   Bluetooth MAC address is shown        Version window information is retrieved from the registry     Version Tab and the Registry    Modify the Registry using the Registry Editor  Use caution when editing the Registry and make a backup copy of the registry  before changes are made     The registry settings for the Version tab are under HKEY_LOCAL_MACHINE   Software 1 LXE   Version in the registry     To add a user application to the Version panel  create a new string value under the HKLM Software LXE Version key  The  string name should be the Application name to appear in the Version window  The data for the value should be the version  number to appear in the Version window     Version strings can be equal to or less than 254 characters  Because the strings are displayed in a text box  any number can be  accommodated  up to the 64K byte text box limitation     Languages    The Softwar
9.    Tap the X button or ok button to close the dialog box     Possible reasons for failure to reconnect  Timeout expired without reconnecting  attempted to  pair with a device that is currently paired with another device  attempted to pair with a known  device that moved out of range or was turned off  attempted to pair with a known device but the  reason why reconnect failed is unknown     This option is Disabled  unchecked  by default   When enabled  checked   all previous paired information is deleted upon any reboot sequence  and no devices are reconnected     When enabled  checked   Auto Reconnect on Boot  is automatically disabled  dimmed      This option is Enabled  checked  by default  All previously paired devices are reconnected  upon any reboot sequence        When disabled  unchecked   no devices are reconnected upon any reboot sequence     3 62    This option is Enabled  checked  by default  This option controls the overall mobile Bluetooth  device reconnect behavior   e When Auto Reconnect is disabled  unchecked   Auto Reconnect on Boot is  automatically disabled and dimmed     When Auto Reconnect is disabled  unchecked   no devices are reconnected in any  situation  The status of Auto Reconnect on Boot is ignored and no devices are  reconnected on boot  The status of Clear Pairing Table on Boot controls whether the    airing table is populated on boot   Auto Reconnect P a Pap    When Auto Reconnect is enabled  checked  and Auto Reconnect on Boot is disabled   un
10.    Taskbar   Execution   Scan Config   Shortcuts   Saas  _4   gt   Update Window Display     At startup   Har Screen   y   On connect   as is y  Normal  Jas is   y           Update Window Display    The user interface for the Enabler can be configured to dynamically change based on the status of the Thor VM1 connection  with the Mobile Device Server     At startup Default is Half Screen  Options are Half screen  Hidden or Full screen   On connect Default is As Is  Options are As is  Half screen  or Full screen     Normal Default is As Is  Options are Half screen  Hidden or As Is        5 15       Taskbar    For best results  use AppLock to manage the taskbar  AppLock is resident on each mobile device        Avalanche Update Settings OK E    Taskbar   Execution   Scan Config   Shortcuts   SaaS   Adapter    Note  These settings are only applied to the taskbar if the  Enabler UI is active           Display State     Normal    Locked     Hidden  Settings   No Relevant Settings          The Display State options control the appearance of the taskbar while using the Enabler interface   e Normal   taskbar is visible  taskbar icons function normally   e Hidden   taskbar is not displayed  e Locked   taskbar is visible  but most icons are hidden or for information only     5 16       Execution    Note the dimmed options on this Thor VM1 panel  This menu option is designed to manage downloaded applications for  automatic execution upon startup        Avalanche Update Settings OK E  Exec
11.    The text boxes accept string values only     Note that executables and parameters are not checked for accuracy by the keyboard driver  If the launch fails  the Thor VM1  emits a single beep  if the launch is successful  the mobile device is silent     Keypad Control E OK ES    _KeyMap   Launch  pp   RunCmd    Cmdi                     The Run Cmd command is defined for use by system administrators  These instructions call the ShellExecuteEx API  which  opens documents directly     1  Place the cursor in the text box next to the Cmd you wish to run  e g   Cmd1  Cmd2    2  Enable the file radio button and enter the name of the file    3  Enable the PARM radio button to add parameters for file exe execution in the same text box   Tap the OK button when finished  The changes take effect immediately     3 123       License Viewer    Start  gt  Settings  gt  Control Panel  gt  License Viewer    Use this option to view software license registration details  and service contract length for a Thor VM1  Information on the  License Viewer tabs is unique for each Thor VM1     Note  Following image is a sample screen     Your License Viewer control panel may show more tabs  e g   RFTerm  depending on the number of software applications  running on the Thor VM1 that require a license  Contact Technical Assistance for software updates and releases as they  become available        WeaveLink    Factory Enable Indicator Valid License  TE   WIB    License Viewer ka OK Fa    Date of Manufactur
12.    Web form  www hsmcontactsupport com    You can contact our technical support team directly by filling out our online support form  Enter your contact details and the  description of the question problem     Telephone  www honeywellaidc com locations    For our latest contact information  please check our website at the link above     Product Service and Repair    Honeywell International Inc  provides service for all of its products through service centers throughout the world  To obtain  warranty or non warranty service  please visit www honeywellaidc com and select Support  gt  Contact Service and Repair  to see your region   s instructions on how to obtain a Return Material Authorization number  RMA     You should do this prior to  returning the product     Limited Warranty    Honeywell International Inc    HII   warrants its products to be free from defects in materials and workmanship and to conform  to HII   s published specifications applicable to the products purchased at the time of shipment  This warranty does not cover  any HII product which is  i  improperly installed or used   ii  damaged by accident or negligence  including failure to follow the  proper maintenance  service  and cleaning schedule  or  iii  damaged as a result of  A  modification or alteration by the  purchaser or other party   B  excessive voltage or current supplied to or drawn from the interface connections   C  static  electricity or electro static discharge   D  operation under conditions 
13.    to restart the application  This message logs that the timer has expired and the PROCESSING  processing is at the beginning of the timer function     Enter Entering the function that switches the screen to non full screen mode and enable LOG_  TaskbarScreenMode the taskbar  PROCESSING   Enter ToAdmin Entering the function that handles a mode switch into admin mode Pe  g i PROCESSING   Enter ToUser Entering the function that handles the mode switch to user mode Lone  28 pine PROCESSING   Enter verify password Entering the password verification processin es  YP eee Monee Ing  PROCESSING    Exit  AppLockEnumWindows   Found    Enter restart app timer    There are two exit paths from the enumeration function  This message denotes the  LOG_  enumeration function found the application  PROCESSING    Exit  AppLockEnumWindows   Not found      oa i p LOG_  Exit DecryptPwd Exiting password decryption processing  PROCESSING   Exit EncryptPwd Exiting password encryption processin LoG   YP gp i R 9  PROCESSING   Exit FullScreenMode Exiting the function that switches the screen to full screen oe  g y PROCESSING   Exit GetAop Info Processing is at the end of the function that retrieved the application information LOG_  PP from the registry  PROCESSING   Exit password dialo Exiting password prompt processin LOG   bi did eal a id PROCESSING   Exit password dialog  re LOG_  Exiting password prompt w cancel  PROCESSING   Exit password dialog OK   Exiting password prompt successfull poe   P 9 
14.   External Connectors Optional external 802 11   GPS   WWAN antenna connectors  Additional connectors on Quick Mount Smart Dock  see below   Minimum loudness greater than 95dBm at 10 cm in front of unit    Uninterruptible Power Supply Internal UPS battery  field replaceable  Backup Battery  RCT  Internal lithium Battery maintains Real Time Clock    Display Technology       7 1       Quick Mount Smart Dock    Two external RS 232 serial ports  COM1 and COM2  with switchable power  CANbus Audio connector supports either audio microphone via adapter cable or J 1939  Female and J1939 Male connectors via CANbus cable   USB Client Port and USB Host Port via adapter cable    5 pin connector  10 60V DC input power    External Connectors    Power Switch Sealed power switch  External Power Supply External power supply  AC Adapter  120 240VAC to 12VDC    DC Input Voltage  10 60 VDC  Input Power Input Current  4 6 Amps  Input Fuse  10A Time Delay    Dimensions       Thor VM1    1 7     4 3 cm  to 2 6   6 6 cm   at latch   meg ELIT    Quick Mount Smart Dock       Note  The RAM ball is not included in the following measurements     CO ARTE  COIN CES  5         Weight 3 2 Ib   1 2 kg        7 2       Environmental Specifications    Thor VM1 and Quick Mount Smart Dock    Standard   4  F to 122  F   20  C to 50  C   non condensing   Extended temperature   22   to 122   F   30  C to 50  C   condensing     Operating Temperature    Storage Temperature Standard and Extended temperature   22  F to 
15.   If Strip Code ID is enabled  the data  should not include the Code ID since it has already been stripped     3 87       Add Prefix Suffix Control    Start  gt  Settings  gt  Control Panel  gt  Data Collection  gt  Symbology button    Use this option to specify a string of text  hex values or hat encoded values to be added to the beginning  prefix  or the end   suffix  of the bar code data     Add        Prefix            Suffix      Up to 19 characters can be included in the string  The string can include any character from the keyboard plus characters  specified by hex equivalent or entering in hat encoding  Please see Hat Encoding for a list of characters with their hex and hat   encoded values     Use the Escape function to enter literal hex and hat values     To enable a prefix  check the Prefix checkbox and enter the desired string in the textbox     The default is disabled  unchecked  with a blank text string  When bar code data is processed  the    Add Prefi Prefix string is sent to the output buffer before any other data   refix  Because all stripping operations have already occurred  stripping settings do not affect the prefix     The prefix is added to the output buffer for the Symbology selected from the pull down list   If    All    is selected  the prefix is added for any symbology that has not been specifically configured     To enable a suffix  check the Suffix checkbox and enter the desired string in the textbox     The default is disabled  unchecked  with a
16.   If a user password has been set  the applet warns the user that the password will be erased  and asks them to  enter it before the reboot is allowed     Load Fac     tory  Defaults    When clicked  the OS performs a registry save  Active registry saved to Flash registry hive   and then a warm   boot  The contents of RAM are preserved  CAB files already loaded into RAM remain loaded     When clicked  the OS performs a registry save  and then a restart  OS and CAB files are reloaded     Warmboot       3 145       Remove Programs    Start  gt  Settings  gt  Control Panel  gt  Remove Programs    Note  Lists programs installed in RAM that have been marked for removal     Select a program and tap Remove  Follow the prompts on the screen to uninstall Thor VM1 user installed only programs  The  change takes effect immediately     Files stored in the My Documents folder are not removed using this option     Remove Programs ka OK Ed    Remove Programs                  ey The listed software can be Programs   Y automatically removed  To EMS Technologies LXE    remove a program  select it  e Bluetooth LXEZPAIRING v1 0    lc ue list and then LXE Data Collection Wedge  select Remove  LXE RFTerm    LXE WWAN LXEGobICMCab    SDC Summit WLAN Adapter    Note  Do not remove factory installed programs using this option  Contact Technical Assistance if factory installed  programs must be deleted           3 146       Screen Control    Start  gt  Settings  gt  Control Panel  gt  Screen Control  S
17.   Remove the USB drive and  boot the Thor VM1 again        Exiting BIOS Setup    To exit the BIOS setup  select the Exit tab and select one of these options   e Save Setting and Restart  e Exit Setup without Saving Changes  e Reload Factory Defaults and Restart    3 20       Control Panel    Start  gt  Settings  gt  Control Panel or My Device  gt  Control Panel link    Tap the   button for Help when changing Thor VM1 Control Panel options     Software  hardware  versions and network IP  No user intervention allowed     Aci Customize the way the keyboard  audio  display or mouse function for users with hear   y ing or viewing difficulties     Manage digital certificates used for secure communication     Wedge utility for data collected from bar code scans  Set data collection device  data  Data Collection  Wedge  stripping  and prefix suffix options  Assign baud rate  parity  stop bits and data bits for  COM1 and COM2 ports  Assign collected data manipulation parameters     Date Time Set Date  Time  Time Zone  and Daylight Savings   Dialin Connection setup for modem attached to COM port or CompactFlash slot    Com   9 pactFlash slot not available for modem use on Thor VM1   Displa Set background graphic and scheme  Set touch screen and keypad backlight prop   pay erties and timers     Gobi Connection Manager Set parameters for the Wireless Wide Area Network client  if installed   Input Panel Select the current key   data input method  Select custom key maps       Set General  
18.   The watch process could not be  rae LOG_ERROR  HotKeyMon initiated       Ctrl after L or X Processing the backdoor entry LOG_EX  Ctrl pressed The Ctrl key has been pressed and trapped by the HotKey processing LOG_EX  Processing the hotkey and backdoor entry LOG_EX    Decrypt acquire context Unable to decrypt password LOG_ERROR  failure   Ai acquired context Decryption process ok  LOG_EX  A Seale nash Unable to decrypt password  LOG_ERROR    3 45       Message Explanation and or corrective action Level    Encrypt acquire contex Unable to encrypt password  LOG_ERROR  failure   Encrypt e encrypt Unable to encrypt password  LOG_ERROR  context failure   Encrypt acquired encrypt   context OK Encrypt password process successful  LOG_EX  a creare hash Unable to encrypt password  LOG_ERROR    Encrypt create key failure   Unable to encrypt password  LOG_ERROR    Encrypt created encrypt  hash OK Encrypt password process successful  LOG_EX    Encrypt export key failure   Unable to encrypt password  LOG_ERROR    a key length Unable to encrypt password  LOG_ERROR    Encrypt exported key OK   Encrypt password process successful  LOG_EX  Encrypt failure The password encryption failed  LOG_ERROR  Encrypt gen key failure Unable to encrypt password  LOG_ERROR    Encrypt generate key Unable to encrypt password  LOG_ERROR  failure  ae y get user key Unable to encrypt password  LOG_ERROR    Encrypt get user key ok   Encrypt password process successful  LOG_EX  Encrypt hash data failure   Unable 
19.   for example  for AUTOEXEC BAT   use a FileCheck of    dummy     which will never be  found  forcing the item to execute    For persist keys specifying  EXE or  BAT files  the executing process is started  and then Launch will continue  leaving  the loading process to run independently  For other persist keys  including  CAB files   Launch will wait for the loading    process to complete before continuing  This is important  for example  to ensure that a  CAB file is installed before the   EXE files from the  CAB file are run     Note that the auto launch process can also launch batch files    BAT   executable files    EXE   registry setting files     REG   or sound files     WAV   The mechanism is the same as listed above  but the appropriate CE application is  called  depending on file type     Registry entries may vary depending on software revision level and options ordered with the Thor VM1     LAUNCH EXE and Persistent Storage    If any of the following directories are created in the System folder  Launch automatically copies all of the files in these  directories     AppMgr  Desktop  Favorites  Fonts  Help    3 7       e Programs  e Recent  Note  Files in the Startup folder are executed  but only from System  gt  Startup  They are not copied to another folder     REGEDIT EXE    Registry Editor     Use caution when editing the Registry  Make a backup copy of the registry before changes are made     REGLOAD EXE    Double tapping a registry settings file  e g   REG  caus
20.   gt  Programs  gt  Summit  gt  Diags tab       Summit Client Utility El OK ES      main   Profile   Status   Diags   Global      Profile  Default RESET   74  IP Address  100 100 100 100  Start Ping    100 100 100 200 Release Renew      Diagnostics       Diagnostics Output      Save To                                       The Diags screen can be used for troubleshooting network traffic and radio connectivity issues      Re connect     Use this button to apply  or reapply  the current profile and attempt to associate or authenticate to the  wireless LAN  All activity is logged in the Diagnostic Output box on the lower part of the screen     Release Renew     Obtain a new IP address through release and renew  All activity is logged in the Diagnostic Output  box  If a fixed IP address has been assigned to the radio  this is also noted in the Diagnostic Output box  Note that the  current IP address is displayed above this button     Start Ping     Start a continuous ping to the IP address specified in the text box to the right of this button  Once the  button is clicked  the ping begins and the button label changes to Stop Ping  Clicking the button ends the ping  The ping  also ends when any other button on this screen is clicked or the user browses away from the Diags tab  The results of  the ping are displayed in the Diagnostic Output box     Diagnostics     Also attempts to  re connect to the wireless LAN  However  this option provides more data in the  Diagnostic Output box 
21.   on startup  use the auxiliary antenna     If the packet size  in bytes  exceeds the specified number of bytes set in the  fragment threshold  the packet is fragmented  sent as several pieces instead   Frag Thresh 2346 of as one block   Use a low setting in areas where communication is poor or  where there is a great deal of wireless interference    This parameter cannot be changed   If the packet size exceeds the specified number of bytes set in the Request  to Send  RTS  threshold  an RTS is sent before sending the packet  A low   RTS Thresh 2347 RTS threshold setting can be useful in areas where many client devices are  associating with the Access Point    This parameter cannot be changed   The LED on the wireless card is not visible to the user when the wireless  card is installed in a sealed mobile device    El id Options are  On  Off    This parameter cannot be changed   n    Determines if the Summit icon is displayed in the System tray   Tray Icon    Options are  On  Off    When On  the Summit Config Utility masks passwords  characters on the  f screen are displayed as an    as they are typed and when they are viewed   Hide Password O When Off  password characters are not masked   Options are  On  Off     A string of up to 64 alphanumeric characters that must be entered when the  SUMMIT Admin Login button is tapped  If Hide Password is On  the password is  Admin Password masked when typed in the Admin Password Entry dialog box  The password   or Blank  is case sensiti
22.   remain in user mode attempts to enter a password was exceeded     Read registry error hot The hotkey registry entry is missing or empty  This is not considered an error  The LOG ERROR  key keyboard hook uses an embedded default if the value is not setin the registry     Read registry failure app   AppName registry value does not exist or is empty  This constitutes a failure for  pa aed LOG_ERROR  name switching into user mode     Read registry failure  AppCommandLine registry entry is missing or empty  This is not considered an error  a   aaa ade ad LOG_ERROR  Cmd Line since command line information is not necessary to launch and lock the application     Read registry failure  The Internet registry entry is missing or empty  This is not considered an error since    ate LOG_ERROR  Internet the Internet value is not necessary to launch and lock the application       Registering Backdoor The AppLock system communicates with the keyboard hook via a user defined LOG    MSG message  Both AppLock exe and Kbdhook dll register the message at initialization    PROCESSING  Registering Hotkey MSG The AppLock system communicates with the keyboard hook via a user defined LOG_  9 9 y message  Both Applock exe and Kbdhook dll register the message at initialization    PROCESSING    The registry has to be read when entering user mode is the AppName is missing    Registry read failure at This user mode entry is attempted at boot and after a hotkey switch when the   ae La   LOG_ERROR   reenter
23.   secen aad e a a era a a ea 2 10  Auto On Disabled    cc 2000 ita pr a ee aa ere EEE ee Le ee ek 2 10  External Connectors      22 22    c cece cece cece cece cece cece eee e eee e eee eee eee eeteeeeeeetetetteeeenes 2 11  Serial Connector  COM1 and COM 2     oo    e cece ccc cece rr 2 12  PIQUE oso tae dan eae tees eae o 2 12  Screen Blanking    22 2    cn cnn nn 2 13  Sena Cable  rate Me Oe ene Ee CTE cre esos site sc OEE  2 13  Screen Blanking Box  2 0 2 2    eee ec cece cece cece cece cece cecccccccceececeeeeeeeeeceeeeeteteeeettteeettntentneeneneeers 2 14  Screen Blanking with Switch  20000002222 ccc cece cece cece cece cece cece cece eee cnn 2 14  USB CONMCCIOR sc ssa fats de ete ae 2 oe Licks See alte Sale amin fe eh recinto 2 15  USB Dongle Cable ic 2 16  D9 Male Connector  nc cnn cccccccccoss 2 16  USB Host Connector    ccticueetarastrit terror psico ete vada 2 17  USB Client Connector  2 22    c cece cece cece cece cece cece cee eceeeceeeeeeeeeseteeeeeeenees 2 17  Power Supply Connector  0 0 2 2    cece cece cece cece cece cece cece cece cece cece cece cece ee Eaa aoaaa anan 2 18  CANbus   Audio Connector           00  cece eee cece ns 2 19  Headset Adapter Cable    cee cece cece cet e eee e cece eeeeee cece aLaaa a ornano an 2 20  D15 Female Connector  oc e cece cece cece cece cece cece cece cece ee EE E Ea eaer 2 20  Quick Connect Headset Connector       2 2 0    ooo eee 2 21  CANDUS Cable   ecitocoioiooecoindi cicatrices cta deadedanss  2 22  D15 Female Connector
24.  1  Quick Mount Smart DOCK  occcccccccccc occ cece cece eee e cece cece cece cece cece eeeeeeeeetetteeteeeeees 7 2  DIMENSIONS  a ace dna te te te eh ees eek eee feces deena ase dada ode anata tans ogg es 7 2  TOON tee es ose pana etn A hemos ate oa gent den paeinn A 7 2  Quick Mount Smart Dock  2 222222    oo cc ccc ce cece ccc cece cece cece eect ALEALEA ADAE aa ar aaraa naaa 7 2  Environmental Specifications             2 222 000 2222 c ccc e cece cece ee nn 7 3  Thor VM1 and Quick Mount Smart Dock             22 000 e cece cece ee eeeceeeececeeeeeees 7 3  Network Card Specifications    _    222 0000  ooo eee cece ccc eee cece ccc cece eee c cece ccceccececcecccccecececcecccceecrerececcecees 7 4  SUMMIT SO2Z A TADO 0000 ses  a See eke ta coed Inia iaa 74    RA 7 4  Chapter 8  Key Maps 8 1  64 Key QWERTY Keypad Key Map       2 0 2 2 c cece cece cece eee c cece cee cece cece aa aoa aaraa onanan 8 1  12 Key Keypad Key Map    0 22    cee cece ccc cece cece cece cece cece cece eee ce cece APAAL A Ea aaraa aaan 8 6  IBM Terminal Emulation      0 0 02    c cece cece cece ccc e cece cece cccceccececeeeeeeeceeeeeeeeteeeeteeeeteeeententeteneeneneeeeeees 8 8  EA A E SN ee oe eR OC ee 8 8  BIS 250 soccer tt eee lo dt ce feel ere ot en ah eet a e io t 8 9  Chapter 9  Technical Assistance 9 1    xii    Chapter 1  Introduction    The Thor VM1 Vehicle Mount Computer  VMC  is a rugged  vehicle mounted computer running a Microsoft   Windows  CE 6  operating system and capable of wireless da
25.  2nd plus F7 or 2nd plus F8 keypress sequences  Any changes to  brightness level using the keypresses are reflected in this section     e If Automatic Brightness Control is enabled  outdoor display only   the value for LCD brightness depends on the current  Ambient Light value and the values for the Automatic Brightness Control thresholds     Automatic Brightness Control    When the Thor VM1 is equipped with the outdoor display  automatic brightness control can be enabled  When enabled  display  brightness is based on ambient light detected by the ambient light sensor  located near the top right of the display  The default  is disabled  To enable  check the Enable automatic brightness control checkbox and specify the thresholds for display  backlight transition     When enabled  the thresholds can be entered for display brightness transitions   e When alow level of ambient light is detected  the display backlight is set to low level     e When the ambient light exceeds the threshold specified in Low to medium light level      the display backlight is  automatically increased to a medium level     e When the ambient light exceeds the threshold specified in Medium to high light level      the display backlight is  automatically increased to a high level     e Likewise if the Thor VM1 is returned to a lower ambient light area  the display backlight automatically transitions to the  appropriate lower display backlight level     By default  the keypad backlight follows the display
26.  3 29  End User Switching Technique        00 0 0    coe c cece eee e cece cece cc ccccccceeeeeeeeeeeeeeceeteeeeeeetenteeenenneeteeeeees 3 30   Using a  Stylus  Tap oido cistitis id dace abodes 3 30  Using the Switch Key Sequence           2 200 000 222 o occ nn 3 30  Hotkey  Activation hotkey     0 000    c cece cece cece cece cece cece cece cece cece cece eeeeeeeeeeeeeneees 3 31  Application Configuration  nn non ncccccccccniss 3 32  Application Panel ns 3 33  Launch BUMOM 2 22 24 220i ite etidekt hi gev ee ile bite oia dei RR ES EEEn r   EENES Enies 3 35  AUTO AT BOOUs 222  esata tee ee ek ee eet allen sete oe eee he he eee he 3 36  A A 3 37  Mantal Lalnch  secre o iio aos ales ie 3 38  O O ee 3 38    End User Internet Explorer  EVIE       ooocccccccccccccccccccccccccccccccccnn non 3 39       SECUNILY A RN 3 40    Options Panels esc cra ro oso tia 3 41  Stats Ramen ta ias  3 42  MAA hte eke doe eget I ee tt bane Seatac dst toemetees E Sanne aad 3 42  Ero MIAE EEEE aa A OT OY GEER VEER    EOE BATE SEER OE EEE NOE 3 43  EVES I EAEE east cet buted O A ahi ics 3 43  APpLock IF Gl Ds   tot td Rt ee ee ee Reet ee eee 3 44  AppLock Error Messages             0 2000  00 occ ccc cece eee eee eee cece eee e eee e ee AAAA Iaa aooe raaraa rnaen 3 44  A A Eee ee eee eee eee eee ee 3 52  Bluetooth    2 00 2    eee cece cece cece ccc ccc cece eee e cece cece eee eee e este eens te eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeees 3 53  Bluetooth DEVICES osscar cessen eaea cages ob Boke yee ed ee away 
27.  Aggressive Scan    If signal strength is less than this trigger value  the client looks for a different  Access Point with a stronger signal     Options are   50 dBm   55   60   65   70   75   80   85   90 dBm or Custom   The amount by which a different Access Point signal strength must exceed    the current Access Point signal strength before roaming to the different  Access Point is attempted     Options are  5 dBm  10  15  20  25  30  35 dBm or Custom   The amount of time  after association or a roam scan with no roam  that the    radio collects Received Signal Strength Indication  RSSI  scan data before a  roaming decision is made     Options are  5 sec  10  15  20  25  30  35  40  45  50  55  60 seconds or  Custom     Defines the 2 4GHz channels to be scanned for an AP when the radio is  contemplating roaming  By specifying the channels to search  roaming time  may be reduced over scanning all channels     Options are    Full  all channels    1 6 11  the most commonly used channels   1 7 13  for ETSI and TELEC radios only   Custom     Support for 5GHZ 802 11a channels where support for DFS is required   Options are  On  Off    Note  Not supported  always off  in some releases    ABG radio only  The amount of time the radio will passively scan each DFS  channel to see if it will receive a beacon     Recommended value is 1 5 times that of the AP s beacon period     Use this parameter when the Radio Mode profile parameter is set to Ad Hoc     Specifies the channel to be us
28.  Bluetooth address identifier label should remain protected from damage  rips  tears  spills  soiling   erasure  etc   at all times  It may be required when pairing  connecting  and disconnecting new Bluetooth bar code readers     Thor VM1 with Label    If the Thor VM1 has a Bluetooth address bar code label attached  follow these steps   1  Scan the Bluetooth address bar code label  attached to the Thor VM1  with the Bluetooth mobile scanner     2  If this is the first time the Bluetooth scanner has scanned the Thor VM1 Bluetooth label  the devices are paired  See  section titled    Bluetooth Beep and LED Indications     If the devices do not pair successfully  go to the next step     Open the LXEZ Pair panel  Start  gt  Settings  gt  Control Panel  gt  Bluetooth    Tap Discover  Locate the Bluetooth scanner in the Discovery panel   Double tap the stylus on the Bluetooth scanner  The right mouse click menu appears     oa kw    Select Pair as Scanner to pair the Thor VM1 with the Bluetooth mobile scanner     The devices are paired  The Bluetooth bar code reader responds with a series of beeps and an LED flashes  Refer to the  following section titled    Bluetooth Beep and LED Indications        Note  After scanning the Thor VM1 Bluetooth label  if there is no beep and no LED flash from the Bluetooth device  the  devices are currently paired     3 68       Thor VM1 without Label    If the Thor VM1 Bluetooth address bar code label does not exist  follow these steps to create a u
29.  Boot  M Auto Reconnect on Boot   M Auto Reconnect             Note  These options can still be checked or unchecked whether Bluetooth connection is enabled or disabled     3 61       Options    Report when connection  lost    Report when reconnected    Report failure to reconnect    Clear Pairing Table on Boot    Auto Reconnect on Boot    This option is Enabled  checked  by default     There may be an audio or visual signal when a connection between a paired  active device is  lost     A visual signal may be a dialog box placed on the display notifying the user the connection  between one  or all  of the paired Bluetooth devices has stopped  Tap the ok button to remove  the dialog box from the screen     This option is Disabled  unchecked  by default     There may be an audio or visual signal when a connection between a paired  active device is  made     A visual signal may be a dialog box placed on the display notifying the user the connection  between one  or all  of the paired Bluetooth devices has resumed  Tap the ok button to remove  the dialog box from the screen     This option is Enabled  checked  by default   The default time delay is 30 minutes  This value cannot be changed by the user     There may be an audio or visual signal when a connection between a paired  active device fails  to re connect  A visual signal may be a dialog box placed on the display notifying the user the  connection between one  or all  of the previously paired Bluetooth devices has failed  
30.  CG  Summit Wireless Network Configuration                 000000000 coco ccc ccc ccc cnn 6 1  Important Notes  ns 6 1  S  mmit Client Utility a o a oia slo 6 2  AAA A de ee 6 2  Summit Tray Ia nc 6 2  Wireless Zero Config Utility and the Summit Radio        2 2 2    c cece ccc eececeeeeceeceeeeees 6 3  How To  Use the Wireless Zero Config Utility    0002 e cece cece cece eeeeeeees 6 3  How to  Switch Control to SCU   oo    ccc ccc ccc ccc cece cee cee eee eee eee nnnnnnnnnnnnnnoes 6 3  Main AAA cS RTA Nee SS 6 4  Auto Profile  ocococcioo lili coco Se vesdhcebbacaddesdeceacccds do told se deudede cee desu dos te a Ea eE DSt 6 5  Admin Login            2 2    e cece cece cece cece eee eee cece cece cece ce eceeceeeeseeeeeeeeeeeeeeeeeees 6 5  Profile AD ross  cede et bocaete a saan ce goes ne eka eee eee ec ee ead Pec pee nascent ease tees 6 7    A 6 8  Profile Parameters  ocios si di TLE dd 6 9  AC A A Ae eed hes 6 11  DITO CA Ee o 6 12   Global MT e OEE IE EE EE EE ee ee ee A TE E RA A eae 6 13  Custom Parameter Optio 0000000000000000 ALDADILDI DaDa oaao 6 14  Global Parameters        2 222 200  eee 6 15  Sign On vs  Stored Credentials              2 20000 e cece cece cece ccc Aaaa arenorna 6 19  How to  Use Stored Credentials  ooo eee 6 19  How to  Use Sign On Screen         2 222222 cece ccc ccc cece cece eee eee ce cee eee cect ee eebeeeeeteeeeeeeererteerreees 6 19  Windows Certificate Store vs  Certs Path           00 000000 c ccc c cece ccc ccc ccc cece cee cece cece eee
31.  Disabled   The data collection device  laser scanner  laser imager  external  or wireless    Default  Enabled     When Send Key Messages  WEDGE  is checked any data collection scan is converted to  keystrokes and sent to the active window  When this checkbox is not checked  the application will  need to use the set of Scanner APIs to retrieve the data from the scanner driver  Note that this latter  method is significantly faster than using Wedge        3 77       COM1 Tab    Start  gt  Settings  gt  Control Panel  gt  Data Collection  gt  COM1          Main   COM1  coma   Data Options   Processing   About                  Baud Rate Data Bits  O 115200 Os  O 57600 7     38400     19200 Stop Bits         2600     4800  O 2400     1200    O   Oz       Power on pin 9   5w           This panel sets communication parameters for any device connected to the external port   Adjust the settings and click the OK button to save the changes  Any changes take effect immediately     This panel does not configure the connected device  Please refer to the documentation for the external connected or wireless  device for information on configuring the device     Note  COM default values are restored after a cold boot or operating system upgrade  COM1 supports 5V switchable power  on Pin 9 for tethered scanners     Power on Pin 9    To configure the COM port to supply power to an external scanner tethered to the COM1 port  check the checkbox for Power  on Pin 9   5V   The default is On  enabled
32.  End User Mode    End user mode locks the end user into the configured application or applications  The end user can still reboot and respond to  dialog boxes  Each application is automatically launched and runs in full screen mode when the device boots up     The user cannot unintentionally or intentionally exit the application nor can the end user execute any other applications  Normal  application exit or switching methods and all Microsoft defined Windows CE key combinations  such as close  X  icon  File  Exit  File Close  Alt F4  Alt Tab  etc  are disabled  The Windows CE desktop icons  menu bars  task bar and system trays are  not visible or accessible  Task Manager is not available     If the end user selects File Exit or Close from the applications menu bar  the menu is cleared and nothing else happens  the  application remains active  Nothing happens when the end user clicks on the Close icon on the application   s title bar and the  application remains active     Note  A few applications do not follow normal procedures when closing  AppLock cannot prevent this type of application  from closing  but is notified that the application has closed  For these applications  AppLock immediately restarts the  application which causes the screen to flicker  If this type of application is being locked  the administrator should close  all other applications before switching to end user mode to minimize the screen flicker     Windows accelerator keys such as Alt F4 are disabled  
33.  Microsoft Certificate Services    Advanced Certificate Request    The policy of the CA determines the types of certificates you can  request  Click one of the following options to     Create and submit a request to this CA     Submit a certificate request by using a base 64 encoded CMC or      PKCS  10 file  or submit a renewal request by using a  base 54 encoded PKCS  7 file     Request a certificate for a smart card on behalf of another user by  using the smart card certificate enrollment station     Note  You must have an enrollment agent certificate to submit a request on  of another user     Click on the Create and submit a request to this CA link     6 46    Microsoft Certificate Services       Advanced Certificate Request    Certificate Template       User Y    Key Options        Create new key set O Use existing key set  CSP    Microsoft Enhanced Cryptographic Provider v1 0                      Key Usage  Exchange              Min  384 A  Key Size   1024 Max 10334  OMMON key sizes  512 1024 2048 4096  192 16384              Automatic key container name O User specified key   Y  Mark keys as exportable container name  Export keys to file  Full path name   O Enable strong private key protection    O Store certificate in the local computer certificate store  Stores the certificate in the local computer store  instead of in the user s certificate store  Does not  install the root CA s certificate  You must be an  administrator to generate or use a key in the local  machi
34.  Mobile Device Server are postponed until the Thor VM1 has  User Idle Time been idle for the specified period of time  The default is disabled       Specify the length of time the device must be idle before a periodic update can run  used when the  Idle timeout A  parameter above is enabled        5 12       Preferences    For best results  use AppLock to manage the taskbar  AppLock is resident on each mobile device        Avalanche Update Settings OK E          Preferences   Display   Taskbar   Execution   Scan Config   Sho_4    gt   Application     Startup   Monitor for Updat y   Administration   Shutdown   Monitor for Updat y   Keep    Activity Log  E settings    unlocked for  Log Level   No Activity Log  w   10 min   Display Level   Basic Output y                 Administration  By default  Keep settings unlocked for 10 minutes is disabled  checkbox is blank      Application    Behavior of the Enabler when the Thor VM1 boots up  The default is Monitor for Updates   e Do not Monitor   When the device boots  do not launch the Enabler application and do not attempt to  connect to the Mobile Device Server     e Monitor for Updates   Attempt to connect to the Mobile Device Server and process any updates that are  available  Do not launch the Enabler application     e Launch User Interface   Attempt to connect to the Mobile Device Server and process any updates that are  available  Launch the Enabler application     Behavior of the monitor when the Enabler is exited  The defaul
35.  Reset and Loss of Host Re connection      20 2    e cece cece cece cece cnn 4 4   Troubleshooting ActiveSync  occ nn 4 5   Configuring the Thor VM1 with LXEConnect      2    cece cece eee cece ccc ccccccecceceececceeeeeeeeeeeteeeeeeeneenees 4 6  Install LXEConnect  cc 4 6  Using LXECOMNCCU ce ag Pitta te Bett eal ue uhoe a ed oa Ove nears Bevel bee wether esse ee aE 4 7   Chapter 5  Enabler Installation and Configuration        CCSCSC        Introduction  sc  corria odeesssos colla dsc ses ii tit rta 5 1   Installation  alo ee cea dto tee 5 1  Installing the Enabler on Mobile Devices                    00 00 e cece eee eecceeeececeecescsceeeeees 5 1  Enabler Uninstall Process  2 2 22    20 2222 c cece cece cece cece cece cece ns 5 2  Stop the Enabler Service    acota sls de std tido 5 2  Update Monitoring Overview    oocccccccccccc ccoo cece eee c cece cece cece cece AA A E a aaraa rnrn 5 3  Mobile Device Wireless and Network Settings            00 0000222 o cee c cece e cece cece ce cece cece cece cece cece eeeeeeeeeeees 5 4  Preparing a Device for Remote Management                  0 000002 c ccc ccc cece nn 5 5   Using Wavelink Avalanche to Upgrade System Baseline             2 00 2022 2 eee e cece cece cece cc cece cece cece eeeeeeees 5 6  Part 1   Bootstrapping the RMU               02  e cece cece oaoa cece ceececcececeeeeeees 5 6  Part 2     Installing Packages           oococccccccccccccccccccccccccnccccnncnn eee eee e eee a aaaea raana naaa raoran nenn 5 6  Version 
36.  See Also  Application Panel  gt  Launch  gt  Manual  Launch  and Allow Close    Using the Switch Key Sequence    One switch key sequence  or hotkey  is defined by the administrator for the end user to use when switching between locked  applications  This is known as the Activation key  The Activation key is assigned by the Administrator using the Global Key  parameter  When the switch key sequence is pressed on the keypad  the next application in the AppLock configuration is  moved to the foreground and the previous application moves to the background  The previous application continues to run in  the background  End user key presses affect the application in focus only     See Also  Start  gt  Settings  gt  Administration  gt  Application Panel  gt  Global Key    3 30       Hotkey  Activation hotkey     The default Hotkey  Activation key  is Ctrl Spc  The key sequence switches the focus between one application and another   Data entry affects the application running in the foreground only  Note that the system administrator may have assigned a  different key sequence to use when switching applications     Note  You must use an extemal keyboard with the 12 key version of the Thor VM1to use the Hotkey  If an external keyboard  is not attached  use the Switchpad to switch between applications     3 31       Application Configuration    Settings  gt  Control Panel  gt  Administration icon    The default Administrator Hotkey sequence is Shift Ctrl A     Administrator mode allows
37.  Sound SoundSentry is disabled by default  Tap the Use SoundSentry checkbox to enable this option  Tap the Settings  button to view or change parameters   Displa High Contrast is disabled by default  Tap the Use High Contrast checkbox to enable this option  Tap the Settings  pay button to view or change parameters     Mouse MouseKeys is disabled by default  Tap the Use MouseKeys checkbox to enable this option  Tap the Settings but   ton to view or change parameters   Automatic reset is disabled by default  Tap the Turn off accessibility features checkbox to enable this option and  General use the dropdown option to assign a timer     Notification is enabled by default  Sounds are emitted when turning a feature on or off        Accessibility E OK E    Keyboard   sound   Display   Mouse   General    StickyKeys          Aag Use StickyKeys if you want to use Shift  Ctrl   e or Alt key by pressing one key at a time   settings       _  Use StickyKeys aa          TOSS Use ToggleKeys if t to hear t h  pas se ToggleKeys if you want to hear tones when  tee pressing CapsLock  NumLock  and ScrollLock      7 Use ToggleKeys          The following exceptions are due to a limitation in the Microsoft Windows CE operating system     e Ifthe ToggleKeys option is selected  please note that the ScrollLock key does not produce a sound as the CapsLock  and NumLock keys do     e Ifthe SoundSentry option is selected  please note that ScrollLock does not produce a visual warning as the CapsLock  and N
38.  The client name may be passed to networking wireless devices  e g  Access  Points   Power save mode   Power   f    Save CAM Options are  Constantly Awake Mode  CAM  power save off  Maximum  power saving mode  and  Fast  power saving mode   When using power management  use FAST for best throughput results     Maximum setting regulates Tx power to the Max power setting for the current regulatory domain   Tx Power   Maximum   f  Options are  Maximum  50mW  30mW  20mW  10mW  5mW  or 1mW     Setting the rate to Auto will allow the Access Point to automatically negotiate the bit rate with the  Bit Rate Auto client device    This parameter cannot be changed    802 11 authentication type used when associating with the Access Point   Auth Type   Open f   Options are  Open  LEAP  or Shared key     Extensible Authentication Protocol  EAP  type used for 802  1x authentication to the Access Point   Options are  None  LEAP  EAP FAST  PEAP MSCHAP  PEAP GTC  PEAP TLS  EAP TTLS  or  EAP Type   None EAP TLS   Note  EAP Type chosen determines whether the Credentials button is active and also determines  the available entries in the Credentials pop up window     Type of encryption to be used to protect transmitted data  Available options may vary by SCU  version   Options are  None  WEP  or Manual WEP   WEP EAP  or Auto WEP   WPA PSK  WPA TKIP   Encryption   None WPA CCKM  WPA2 PSK  WPA2 AES  or WPA2 CCKM   CKIP is not supported in the Thor VM1   Note  The Encryption type chosen determines if t
39.  The keyboard backlight can be disabled  See Start  gt  Settings  gt  Control Panel  gt  Options  gt  Misc tab     IBM 3270 Overlay        gt    a   o     i    a  E ef   gt       o    e      Gr  E   E      E      gt   o       ajs  of  29  ala  000  F  n  E  Malal    alala  alala  alala  20   OO  0000  808  088  0068  008       2 26    IBM 5250 Overlay            o     J000  000  Hoe    2 27       12 Key Keyboard    The 12 key keyboard is available on the Thor VM1 running Windows CE 6 0        Because the keyboard only has 12 keys  all functions are not visible  or printed on the keyboard   Therefore the Thor  VM1 keyboard supports what is called hidden keys     keys that are accessible but not visible on the keyboard     A key or combination of keys can be remapped to provide a single keypress  a string of keypresses or to execute an  application or command  Key remapping is configured via the keyboard option in the Control Panel  Start  gt  Settings  gt   Control Panel  gt  KeyPad      Remapped keys persist across a warmboot or power cycle   The keyboard does not have a NumLock indicator or key  NumLock is always On   The warmboot behavior of CapsLock can be set via the Misc tab in Start  gt  Settings  gt  Control Panel  gt  Options     The Thor VM1 keyboard keys are backlit     By default  the keyboard backlight follows the display backlight  When the display backlight is on  the keyboard  backlight is on    If the display backlight brightness is increased  or decreased  th
40.  Thor VM1 transitions to this mode from User Idle after the  System Idle timeout period has passed without a primary event occurring     Suspend mode  D3     All devices that are not configured as wakeup events are powered off  The status LED is blinking green if external power is  connected and off if external power is not connected  The Thor VM1 transitions to this mode from System Idle after the  Suspend timeout period has passed without a primary event occurring     Additionally the power button can be used to enter or exit Suspend mode   e Ifthe Thor VM1 is On  pressing the power button immediately transitions the unit to Suspend   e Ifthe Thor VM1 is in Suspend mode  pressing the power button transitions the unit to On     Shutdown   Off Mode  D4     The Thor VM1 shuts down when the Thor VM1 is operating on power and the UPS battery becomes critically low regardless of  the current power management state  The Thor VM1 remains Off until external power is applied  The Thor VM1 may restart  automatically when external power is applied or may require the user to press the Power button depending on installation and  configuration     A Real Time Clock  RTC  powered by an internal battery maintains the date and time while the Thor VM1 is off     2 6       Primary Events    The Primary Events described below are the default behavior  Primary events can be modified using the  LXEPowerMgrPrimaryEvents API     Please refer to the CE API Programming Guide for API details     User 
41.  a new password before attempting to validate the server  Then enter the new password  check  the Validate Server checkbox and proceed with the certificate process below     Password   LXE    A  cert         Full trusted store      M  Validate server Use MS store          If using the Windows certificate store   e Check the Use MS store checkbox  The default is to use the Full Trusted Store   e To select an individual certificate  click on the Browse button   e Uncheck the Use full trusted store checkbox   e Select the desired certificate and click Select  You are returned to the Credentials screen   If using the Certs Path option   e Leave the Use MS store box unchecked   e Enter the certificate filename in the CA Cert textbox   Click OK then click Commit   The device should be authenticating the server certificate and using PEAP GTC for the user authentication     Ensure the correct Active Profile is selected on the Main tab and warmboot  The SCU Main tab shows the device is associated  after the radio connects to the network     Note  The date must be properly set on the device to authenticate a certificate     6 30       WPA LEAP    To use WPA LEAP  make sure the following profile options are used   e Enter the SSID of the Access Point assigned to this profile  e Set EAP Type to LEAP  e Set Encryption to WPA TKIP  e Set Auth Type as follows     e Ifthe Cisco CCX certified AP is configured for open authentication  set the Auth Type radio parameter to  Open     e Ifthe AP i
42.  access to all features on the device  When the hotkey is pressed to switch into Administrator mode   a password prompt is displayed  if a password has been configured   A password must be entered within 30 seconds  and  within three tries  or the password prompt is removed and the device remains in end user mode with the focus returned to the  locked application  Without entry of a valid password  the switch into Administrator mode will not occur     The password prompt is displayed if a password has been configured  When the valid password is entered  the Administration  Control panel is displayed  When a valid password is not entered within 30 seconds  the user is returned to the System Control  Panel     If a password has not been configured  the Administrator Control panel is displayed     3 32       Application Panel       Administrator Control       Application   Security   Options   Status         Filename    kal Icon  val  Title    Order  lo    Arguments         Internet  Y  Menu  M  Status   Launch        Clear    lt   gt      Global    Key   ctrl Spa  w   Y Input Panel   APLCKPNET2Cn                      Use the Application tab options to select the applications to launch when the device boots up in End user Mode     If no application is specified when the Administrator Control Panel is closed  the mobile device reboots into Administrator  mode  If a password has been set  but an application has not been specified  the user will be prompted for the password before 
43.  and 8 of the screen blanking cable on vehicle motion     Please refer to the wiring instructions  including appropriate cautions and warnings  in the Thor VM1 Vehicle Mounting  Reference Guide     2 14       USB Connector    The USB connector is a D 9 female connector located on the back of the Quick Mount Smart Dock   Power the Thor VM1 off before attaching a cable to any port  serial  USB  Audio CAN  etc       a soa  bein  USBC_D   USB client data signal    e  eno foomo  Pa  osem p  uss rest sasra     o  usec veus Jus cient 8v ses tom tacos       2 15       USB Dongle Cable    USB dongle cables have a Host port and a Client port        D9 Male Connector    PIN 1 PIN 5       PIN 6 PIN 9    in  soa   nein      fe  exo  Conmenacns  Pa  use ao  userei tomasa     o ussc veus  USS cen a aero atari       D9 Connector  USB Host  Connector s     USB Client  Connector    2 16       USB Host Connector    USB Client Connector     Siena   pepon  V_USB       PIN 1    PIN 4     Pn   siga   Deserpton    5V_USB  USB Power  Current Limited  USB_H1_D   USB D     USB_H1 D    USB D   USB Power Return  Shell CGND Chassis Ground       2 17       Power Supply Connector    1  Power  Connector    2  Power  Switch                Power is supplied to the Thor VM1 through the power connector  Additionally this assembly provides a connection point for the  vehicle   s chassis ground to be connected internally to the conductive chassis of the computer     The Thor VM1 internal power supply can accept DC
44.  backlight  If the display backlight is on  the keypad backlight is on     3 149       Stylus    Start  gt  Settings  gt  Control Panel  gt  Stylus    Use this control panel option to set stylus double tap sensitivity properties and calibrate the Thor VM1 touch panel when  needed        Stylus Properties Ea    OK E  Double Tap   Calibration    Double tap this grid to set the double tap sensitivity for both  the speed and physical distance between taps        Double tap this icon to test your double tap settings  If this icon  doesn t change  adjust your settings using the grid above        Stylus Properties ka OK x  Double Tap  Calibration      If your Windows CE device is not responding properly to your taps  you       may need to recalibrate your screen     Recalibration involves tapping the center of a target  If you miss the  center  keep the stylus on the screen  slide it over the target s center   and then lift the stylus  To start  tap Recalibrate     Recalibrate               Double Tap    Follow the instructions on the screen and tap the OK button to save any double tap changes     Calibration    Calibration involves tapping the center of a target  If you miss the center  keep the stylus on the screen  slide it over the  target s center  and then lift the stylus     To begin  tap the Recalibrate button on the screen with the stylus  Press and hold the stylus on the center of the target as it   moves around the screen  Press the Enter key to keep the new calibration s
45.  be prompted for the Username and Password when connecting to the network     6 33          Credentials fia El    Password     PAC Filename     PAC Password             To use Sign On credentials     e Do not enter a User and Password as the user will be prompted for the Username and Password when connecting to the  network     To use Stored Credentials   e Enter the Domain Username  if the Domain is required   otherwise enter the Username   e Enter the password   To use Automatic PAC Provisioning   e No additional entries are required   To use manual PAC Provisioning   e Enter the PAC Filename and PAC Password     e The PAC file must be copied to the directory specified in the Certs Path global variable  The PAC file must not be read  only     Ensure the correct Active Profile is selected on the Main tab and warmboot  The SCU Main tab shows the device is associated  after the radio connects to the network     Note  When using Automatic PAC Provisioning  once authenticated  there is a file stored in the  System directory with the  PAC credentials  If the username is changed  that file must be deleted  The filename is autoP 00 pac        EAP TLS    To use EAP TLS  make sure the following profile options are used   e Enter the SSID of the Access Point assigned to this profile  e Set EAP Type to EAP TLS  e Set Encryption to WPA TKIP  e Set Auth Type to Open    To use another encryption type  select WPA CCKM  WPA2 AES or WPA2 CCKM for encryption and complete other entries as  det
46.  blank text string  When bar code data is processed  the    Asu Suffix string is sent to the output buffer after the bar code data   uffix  Because all stripping operations have already occurred  stripping settings do not affect the suffix     The suffix is added to the output buffer for the Symbology selected from the pull down list        If    All    is selected  the suffix is added for any symbology that has not been specifically configured     Note  Non ASCII equivalent keys in Key Message mode are unavailable in this option  Non ASCI  equivalent keys include  the function keys  e g  F1   arrow keys  Page up  Page down  Home  and End     Symbologies    The Thor VM1 supports only Custom IDs     3 88       Ctrl Char Mapping    The Ctrl Char Mapping button  Control Character Mapping  activates a dialog to define the operations the Data Collection  Wedge performs on control characters  values less than 0x20  embedded in bar codes        Control Character OK  a     7 Translate All       Control Character   Replacement       ACKnowledge Ignore  drop   Carriage Return  0x0D   End of Text    AM     Character   Form Feed y   Replacement  fignore  drop     Assign   Delete      Control characters can be replaced with user defined text which can include hat encoded or hex encoded values              In key message mode  control characters can also be translated to their control code equivalent key sequences     Translate All    When Translate All is checked  unprintable ASCII charac
47.  blinks once for a very    short time every 2 seconds when paired and connected  It blinks every second when in discovery  The LED is off when the    Bluetooth client is off     2 33       Keyboard LEDs    The keyboard LEDs are located near the specified key     2nd LED    LED Behavior Be S    e Indicates the 2nd modifier key is active  2nd mode is invoked for the next keypress  Solid Green only     e Pressing the 2nd key a second time exits this modifier mode and turns off the LED     Shift LEDs       For the 64 key keyboard  there is one LED next to each Shift key  Both LEDs indicate the status of Shift mode and Caps Lock  mode     For the 12 key keyboard  there is a single Shift key and a single LED     LED Behavior Poe    Indicates the keypad is in Shift mode  Shift mode is invoked for one keypress   Blinking Green Pressing the Shift key places the system in Shift mode   To exit Shift mode  press the Shift key again     When solid Green  indicates the keypad is in Caps Lock mode  Caps Lock mode is  invoked until canceled     Solid Green Pressing the 2nd key followed by the Shift key places the system in Caps Lock  mode     To exit Caps Lock mode  press 2nd   Shift again     CAS Neither Shift or Caps Lock mode is invoked     Ctrl LED       The Ctrl key is not present on the 12 key keypad     e Indicates the Ctrl modifier key is active  Ctrl mode is invoked for the next keypress  Solid Green only     e Pressing the Ctrl key a second time exits this modifier mode and turns o
48.  cece cece cece cece cece eee AAAA cece cece cece cece cece eeeeeeeeeeteeneees 2 22  9 Pin J1939  Deutsch  Connectors  occ eee eee eee cece cece e cece cecceeeeeeeeeeeeeeeeeees 2 23  Antenna Connections          a 00 00222 o cece cece cece ccc cece cece eee cee eee cece eee e EDADE DELEA Ea aa nananana 2 24  Antenna Connector      oo    eee cece eee e ccc ceccceceeccccccccaccececceccecceceececeeeceeeeeeeeeeeeeeeeteeeeeteeeenees 2 24  Internal WiFi Antenna  occ eee eee eee eee cece eee e cece cece cece eee Ee edd E EERE 2 24  Vehicle Remote Antenna        22 22 2222 2 eee eee cece cece ns 2 24  Keyboard Options          000000000000000000 000000 aoaaa aoaaa aaa 0a aa AAAA D EA EDEDED A EPLL EEDD EADE aaan a annann 2 25  64 Key QWERTY Keyboard  oooccccccccccccccccccccccccccc 2 25  IBM 3270 OVENAY cc fooler isa 2 26  IBM 5250 Overlay         00 0000000000000000000000000000 00000000000 a ieai o aaora naa aa 2an aaaea naana anaana annaran anon nn nnee 2 27  12 Key Keyboard         00 0000000000000000a00 0000000000 0a 00a oaaao a 0a AA AA E AADEL AEDADE DDAL DEE AE Ea oaaao nnne 2 28  Keyboard LEDS  ne 2 29  NM A A E ee ee tee ne 2 29  Secondary Keys LED 0 02 22 cece ccc ee cece cece e cece cece e ccc cece cece cece cee ceeceeeeeeeeeetereeeeeeees 2 29  Ciad Alt Key LEDS  0000 to icaciis sb ii a e A a iaa a aN 2 29       ED IFUNCUONS 22 2 cece eee A ii A cla E E 2 30  System LEDS  2 220224 cael skid iaa 2 31  SYS  System Status  LED    2 2    c cece cece cece cece ccc e cece eee eee
49.  e Set EAP Type to None  e Set Encryption to None  e Set Auth Type to Open    Summit Client Utility 7 HOKE x      Main   Profile   status   Diags   Global    lo  Encryption  EAP type       None v    None y     WEP keys PSKs  Credentials                        Once configured  click the Commit button     Ensure the correct Active Profile is selected on the Main tab and warmboot  The SCU Main tab shows the device is associated  after the radio connects to the network     6 24       WEP    To connect using WEP  make sure the following profile options are used   e Enter the SSID of the Access Point assigned to this profile  e Set EAP Type to None  e Set Encryption to WEP or Manual WEP  depending on SCU version   e Set Auth Type to Open    Summit Client Utility 7  foki x     Main   Profile   status   Diags   Global    lo  Encryption  EAP type      Manual WEP 7   None  gt    WEP keys PSKs  Credentials                        Click the WEP keys PSKs button        WEP Key Entry   lx    Enter 10 or 26 Hex digits  A F  0 9   OR enter 5 or 13 ASCII characters     Tx Key          ozf      Os    Os      Valid keys are 10 hexadecimal or 5 ASCII characters  for 40 bit encryption  or 26 hexadecimal or 13 ASCII characters  for 128   bit encryption   Enter the key s  and click OK           Once configured  click the Commit button     Ensure the correct Active Profile is selected on the Main tab and warmboot  The SCU Main tab shows the device is associated  after the radio connects to the networ
50.  entering administration mode  The password prompt remains on the display until a valid password is entered     Default is blank  Move the cursor to the Filename text box and either type the application path or tap  Filename the Browse button  the     button   The standard Windows CE Browse dialog is displayed  After  selecting the application from the Browse dialog  tap OK     Default is blank  Enter the Title to be associated with the application  The assumption is that mul   Title tiple copies of the same application may need unique titles in order to differentiate them in the  Switchpad   Default is blank  Enter the command line parameters for the application in the Arguments text box     Order Default is 1  Enter the Order in which the application is to be loaded or presented to the end user   Applications are launched in lowest to highest number order and do not need to be sequential     Default is Disabled  Enable the Internet checkbox to use the End user Internet Explorer  Internet  EUIE EXE   When the checkbox is enabled  the Internet Menu and Internet Status are available   See the section titled End user Internet Explorer  EUIE  for more details     See following section titled Launch Button   Launch Button Note  AppLock Administrator Control panel file Launch option does not inter relate with similarly   named options contained in other Control Panels     Default is Ctrl Spc  Select the Global Key key sequence the end user is to press when switching  Global Key be
51.  file to the Thor VM1   System folder     3  Install the User Certificate and Private Key file   4  After installation  perform a Suspend Resume   5  Verify installation     6 38       Generating a Root CA Certificate  Note  Itis important that all dates are correct on the Thor VM1 and host computers when using any type of certificate     Certificates are date sensitive and if the date is not correct authentication will fail     The easiest way to get the root CA certificate is to use a browser on a PC to navigate to the Certificate Authority  To request  the root CA certificate  open a browser to    http    lt CA IP address gt  certsrv   Sign into the CA with any valid username and password     Connect to 10 1 2 204    Connecting to 100 100 100 100       User name    Us             Password          C  Remember my password       6 39       Microsoft Certificate Services    Welcome    Use this Web site to request a certificate for your Web browser  e mail  client  or other program  By using a certificate  you can verify your  identity to people you communicate with over the Web  sign and encrypt  messages  and  depending upon the type of certificate you request   perform other security tasks     You can also use this Web site to download a certificate authority  CA   certificate  certificate chain  or certificate revocation list  CRL   orto  view the status of a pending request     For more information about Certificate Services  see  Certificate Services Documentation     Se
52.  information and upgrade availability     Enter the IP Address or host name of the Mobile Device Server  Set the order in which serial ports or  RF connections are used to check for the presence of the Mobile Device Server     Server Contact Setup synchronization  scheduled Mobile Device Server contact  suspend and reboot settings   Data Control when data is transferred between the device and the Mobile Device Server   Preferences Set options for Enabler startup or shutdown and logging     Set up the Windows display at startup  on connect and during normal mode  The settings can be  adjusted by the user     Taskbar Set options for Taskbar     Connection    Display    the Avalanche MC Console  Scan Config not currently supported     Enable or disable network and wireless settings  Select an adapter and switch between the Ava   Adapters      lanche Network Profile and manual settings     View the current adapter signal strength and quality  IP address  MAC address  SSID  BSSID and    Status Link speed  The user cannot edit this information           Connection       Avalanche Update Settings OK E       Connection   Server Contact   Data   Preferences   Display   Ta     gt   Avalanche Server Address     ene       Check serial connection       Disable ActiveSync           Restrict Adapter Link Speed    Min  Link Speed   10000 kbs          KE Enter the IP Address or host name of the Mobile Device Server assigned to the Thor VM1    Server Address   Check Serial Indicates whether th
53.  input voltages in the range of 10 to 60 Volts DC     Pin  Siena  Descriptor           Chassis ground    6   Ignition    0V to 60V to start terminal       2 18       CANbus   Audio Connector    The CANbus Audio connector is a D 15 male connector located on the back of the Quick Mount Smart Dock   The connector supports a headset adapter cable or a CANbus cable  The Thor VM1 does not support connecting audio and    CANbus simultaneously   pio 000 ens    PIN 6   4           O      PIN 10    a O          O7    PI s             CAN reserved     enn  O  moran    TON   o   gt   eawrsenes           N    es  a  8  EN  Em  Ka          Headset Adapter Cable    The headset cable attaches to the CANbus   Audio connector and provides a quick connect connection for a headset           D15 Female Connector    PINS PIN 1    PIN 10 PIN 6       PIN 15 PIN 11    Pin  signal   Despi    O eses  Pisos  EJE TN  CITI  EE  o  ream ea rta     mein  Meron mp   2   mr Pope reum   pol    we  ses   tes  JN  CIEN  CIT       2 20       Quick Connect Headset Connector    sinai   Description       2 21       CANbus Cable    J         The CANbus interface is a virtual COM9 port  This port can be accessed using standard Windows API calls     D15 Female Connector    PINS PIN1    PIN 10  e PIN 6   PERS     PIN15     PIN 11    AN_H_  CAN_H bus line dominant high    N  O    O       Ea   En  Ed  EM    2 22       9 Pin J1939  Deutsch  Connectors       Receptacle Socket  J1939 Female J1939 Male    signal  peseto    EE
54.  may take several minutes  the Remote Management Utility  RMU  is launched     The RMU processes all the downloaded packages  If the radio package was downloaded  the Wireless Configuration  Application  WCA  is launched to process the new radio settings    After the RMU finishes installing all the packages  the device is automatically coldbooted  assuming the Reboot setting  was set to Auto in Step 3      After the Device completes the coldboot  the RMU is autoinstalled by the OS and the previously downloaded packages  are restored  Assuming at least one package has registry settings that were restored  and that package was set to  reboot  either auto or prompt   the RMU then performs an automatic warmboot     7  After the warmboot  the device is configured     If the device will no longer be monitored by Wavelink Avalanche  you may remove the Enabler to eliminate boot up  delays  if desired  Even if the Enabler is removed  the installed packages and their configurations continue to be  restored with every reboot by the RMU     Version Information on Mobile Devices    The VersionInfo EXE file is included in the Remote Management Utility package downloaded to the Thor VM1  It is stored in  the Program Files RMU folder  When VersionInfo EXE is opened  a dialog box is presented to the Thor VM1 user displaying     e Remote Management Utility  RMU  version    e Wireless Configuration Application  WCA  version    VersionInfo displays the version for each utility only after that ut
55.  must be the actual executable  not a shortcut  because shortcuts are not parsed by Launch     Saving Changes to the Registry    The Thor VM1 saves the registry when you     e Warmboot   either from the Registry control panel  the warmboot command or the reboot keypress sequence     e Restart   from the Registry control panel    e Suspend Resume   Either user initiated or upon Suspend timer expiration     e Shutdown   The registry is saved during a controlled shutdown  such as when the UPS charge reaches a critically low    level and external power is not available     The registry save process takes 0     3 seconds  If nothing has been changed  nothing is saved  e g   O seconds      34       Software Load    The software loaded on the Thor VM1 consists of Microsoft   Windows   Embedded CE 6 OS  hardware specific OEM  Adaptation Layer  device drivers  Internet Explorer 6 0 for Windows CE browser and utilities  The software supported is  summarized below     e Full Operating System License  Includes all operating system components  including Microsoft   Windows    Embedded CE 6 kernel  file system  communications  connectivity  for remote APIs   device drivers  events and  messaging  graphics  keyboard and touch screen input  window management  and common controls     e Network and Device Drivers  e Bluetooth    Note  Please contact Honeywell Technical Assistance for software updates and CAB files as they are released by  Honeywell     Software Applications    The following ap
56.  naiona rarnana nnna 6 21  User CerniniCates    222 0222 2252 2nht seein ddaet tote fied See italia til ee 6 21  Root CA Certificates    0 00 22  con 6 21  How To  Use the Certs Path  22000020 c cece cece cece ccc cc cece cece cece ec ceceeeeeeeeeeteeeeeeees 6 21  How To  Use Windows Certificate Store     2 2 2    cece cece cece cece eee raara raaraa nanena 6 21  Configuring the Profile    nes 6 23  No Security  20  ns 6 24  WER ee at ears eet de eee tg era ee te See ee eta see eee 6 25    xi       KEAP a cle gts See essen eat aac  toca dr o ala 6 26  PEAPAMS CA os eee eto  orton cere econ 6 27  PEARCE  ist is oia 6 29  WPA AR Due atroces rar NN o let ir RN ea o NIN e a eee eae 6 31  EA PARAS reece sete ed Sonnanstine REAR INI ie nw tte aie SERSERAAES 6 33  EAP TES eae i O ote aide 6 35  WRAPS cee ee ne ee ee Re ets e ol do 6 37  GOMIMNCALCS  lt 3  ta oi ees oes ete es Sa wee cios ais 6 38  Generating a Root CA Certificate  000  ccc cece cece cece ccc ccc cecccccececcececeeeeeeeeeeeeeteeeeteneennes 6 39  Installing a Root CA Certificate  200 0    2 2 cnc nn 6 42  Generating a User Certificate    2 2    000000  e cnn rrarena 6 44  Installing a User Certificate    0 2    c cece cece cece cece ce cece cece cece cnn cnn cnn 6 50  Verify Installation  2 2 0 0    e eee e cece ee eeeeeeeeeeeeccecceccecuacccccecececeeececceceeceeeeeceeeeeeeeeeeees 6 52  Chapter 7  Technical Specifications__        gt  7  MR ahaa ootece doh aed 5  ata bolted oacect Seabee Oil Sides ek eeGhetess cess 7
57.  no effect     When a match between the first characters of the bar code and a string from the list is found  that string is stripped from  the bar code data    Processing the list terminates when a match is found or when the end of the list is reached    If the wildcard  is not specified  the string is assumed to strip from the beginning of the bar code data  The string ABC   strips off the prefix ABC  The string  X YZ will strip off the suffix XYZ  The string ABC XYZ will strip both prefix and    suffix together  More than one   in a configuration string is not allowed   The User Interface will not prevent it  but results  would not be as expected  as only the first   is used in parsing to match the string         The question mark wildcard   may be used to match any single character in the incoming data  For example  the data  AB D will match ABCD  ABcD  or ABOD  but not ABDE     The data collected is saved per symbology configured  The Symbology selected in the Symbologies dialog defines the  symbology for which the data is being configured     Note that the Code ID  if any are configured  is ignored by this dialog  regardless of the setting of Strip  Code ID in the  Symbologies dialog  According to the sequence of events  specified above   the Code ID must not be included in the bar  code data being matched  because when the matching test occurs  the Code ID has already been stripped  If Strip  Code ID is disabled  then the bar code data to match must include the Code ID
58.  o  INESIS INSI TI  INES IEA TI  INICIO IET  INES IT       2 23       Antenna Connections    The Thor VM1 is equipped with an 802 11 radio and can be ordered with internal antennas or external remote mount antennas   When the Thor VM1 is ordered with internal antennas  the external antenna connectors are not used  GPS and WWAN are  optional on the Thor VM1 and require external remote mount antennas                    WI FI  MAIN   Red label  802 11 Main External Antenna Connector  WI FI  AUX   Yellow label  802 11 Auxiliary External Antenna Connector  GPS  Green label  GPS Antenna Connector   MOBILE NET  Blue label  WWAN Antenna Connector    PON  gt     Antenna Connector    When the Thor VM1 is ordered with the intemal antenna option  the 802 11 antenna connectors on the back are not connected  to the 802 11 radio  Instead the internal antenna is connected to the 802 11 radio     Remove the rubber cap  if present  from the antenna connector before connecting an external antenna     Internal WiFi Antenna    If the internal WiFi antenna option is ordered  an antenna is mounted inside the Thor VM1  The internal antenna is not user  accessible     Vehicle Remote Antenna    The external antennas can be remotely mounted on the vehicle  See the Thor VM1 Vehicle Mounting Reference Guide for  instruction  External antenna kits are available for the 802 11 WiFi radio  GPS and WWAN     2 24       Keyboard Options    The 2nd  ALT  CTRL and Shift keys  when present  are sticky keys  The k
59.  oes id iii be 3 5  ACUVES YING ens cos ca teats teen ts sa aa thet ne sade PMNS Ne Se rr ponte As a OMEN GR he Ja 3 5  Bluetooth  2 00  c cece cece cece cece ccc cceeceeeeeeeeeeeeeeeeeeeeeeeeetneeeteneeneneenenneeeeeecscccccuccceeeeeseceeeee 3 5  LXE RFTerm  Optional             0  00000000 coco c cece ccc nc 3 6  Avalanchese ocios eons Sect Se Seg dd cn o At a Oi ere 3 6   Software Development  nas 3 6   MR E Ae oie hts be eet hoe nied Sia eee eet Bt ee  3 6  LAUNCHLEX Becca ne cic soc desce nucle a tica 3 6  LAUNCH EXE and Persistent Storage             2 0  e cece cece e eee ccc ceceeceeeeeeeeees 3 7  REGED EX Beaches aes gt et ne ee a ee ae Ae a 3 8  REGLOAD EXE 0 e dd 3 8  REGDUMPIEXE  coi ee ene dotados tal 3 8  WARMBOOT EXE cocos rt ii net acts 3 8  WAV PLATENE nr an ctu sia 3 8  Thor VM1 Command line Utilities  oo  cece cece cece cece ec cececcecceccececceceeeeeeeeeeeeeeeteeeenes 3 8   PM OCM EXE A cients O RECO O 3 8   DESKIOD oes te sree set oss oe sys ot ee a tient Se See ee 3 9   Desktop Las ns 3 9   E E eee eceatan 3 10  My Device Folders      2 2 2    coc ns 3 10  Wavelink Avalanche Enabler  Optional       2 2 2 2    2 2 e eee c eee ececeeccccccccceccccseeeeees 3 11  Intemet Explorer ce o a a ten e de les o e e od es 3 11   Start Menu Program Options  Loc nn n cnn ccnnncnnnnnnnns 3 12   Communication  2 2 22    2 222 c cece cece cece cece cece eee cece cece cece ee teeeeeeeeeeeeeeeeeeeereeeeeeeeees 3 12  NA 3 12  Connect and LXEConnect      2 2 22  eee 3 13  St
60.  processing will return a zero byte data packet   which will be rejected     The operation of each type of stripping is defined below   Leading    This strips the number of characters specified from the beginning of the collected data  not including Code ID   The data is  stripped unconditionally  This action is disabled by default     Trailing    This strips the number of characters specified from the end of the collected data  not including Code ID   The data is stripped  unconditionally  This action is disabled by default     Code ID    Strips the Code ID based on the type code ID specified in the Enable Code ID field in the Data Options tab  By default  Code  ID stripping is enabled for every symbology  meaning code IDs will be stripped  unless specifically configured otherwise      3 85       Bar Code Data Match List    Bar Code Data Panel    This panel is used to strip data that matches the entry in the Match list from the bar code  Enter the data to be stripped in the  text box and tap the Insert or Add button  The entry is added to the Match list           12  x   FP Add   Clear Al            To remove an entry from the Match list  highlight the entry in the list and click the Remove button   Click the OK button to store any additions  deletions or changes     Bar Code Data Match Edit Buttons    Add Entering data into the text entry box enables the Add button  Click the Add button and the data is  added to the next empty location in the Custom ID list    mee Click on 
61.  refer to the Bluetooth scanner manufacturer s User Guide  it may be available on the manufacturer s web site  Contact  Technical Assistance for Bluetooth product assistance     Several different types of bar code readers are supported  This section describes the interaction and setup for a mobile  Bluetooth laser scanner or laser imager connected to the Thor VM1 using Bluetooth functions     Prerequisites    e The Thor VM1 has the Bluetooth hardware and software installed  An operating system upgrade may be required   Contact Technical Assistance for details     e Ifthe Thor VM1 has a Bluetooth address identifier bar code label affixed  then Bluetooth hardware and software is  installed     e The mobile Bluetooth laser scanner   laser imager battery is fully charged   e The Thor VM1 is connected to AC or DC  vehicle  power     e Important  The bar code numbering examples in this segment are not real and should not be created nor scanned with a  Bluetooth scanner     e Toopen the LXEZ Pair program  tap Start  gt  Settings  gt  Control Panel  gt  Bluetooth or tap the Bluetooth icon on the  desktop or tap the Bluetooth icon in the taskbar     LnkB00440fd01020   Sample    Locate the bar code label  similar to the one shown above  attached to the Thor VM1  The label is the Bluetooth address  identifier for the Thor VM1     The mobile Bluetooth scanner   imager requires this information before discovering  pairing  connecting or disconnecting can  occur     Important  The Thor VM1
62.  supplied  loosen the screws and then remove the tethered access panel with the SIM  label  This panel is on the right hand side when the Thor VM1 is face down with the top away from the user              5  Locate the SIM card installation slot     2 41    oo xo    PN    Slide the SIM card into the slot     Reattach the access panel  torquing the screws to 4 5 inch pounds     If removed  reinstall the Thor VM1 in the Dock   Resume the Thor VM1 from suspend           2 42       Field Replaceable Front Panel    Equipment Required   User Supplied     e Torquing tool capable of measuring inch pounds  e  2 Philips screwdriver bit    Caution  A Before replacing the Thor VM1 front panel  the internal UPS battery must be disconnected        The front panel of the Thor VM1 is field replaceable  The front panel assembly contains the keyboard  touch screen and  optional defroster  Should any of these components fail  the front panel assembly can easily be replaced to reduce downtime   The replacement front panel is available in several configurations     e 64 key ANSI keyboard with standard touch screen or cold storage touch screen  e 64 key 3270 keyboard with standard touch screen or cold storage touch screen   e 64 key 5250 keyboard with standard touch screen or cold storage touch screen   e 12 key keyboard with standard touch screen or cold storage touch screen    Replace Front Panel    Place the Thor VM1 on a clean  well lit surface before performing the front panel replacement   P
63.  the Discover button to locate all discoverable Bluetooth devices in the vicinity  The Discovery process also queries for the  unique identifier of each device discovered               LXEZ Pairing                  Bluetooth Devices   Settings   Reconnect   About    Bluetooth Address          Discovering Bluetooth devices       El ii  A       Stop Button    Tap Stop at any time to end the Discover and Query for Unique Identifier functions  Devices not paired are not shown after any  reboot sequence     Note  When an active paired device enters Suspend Mode  is turned Off or leaves the Thor VM1 Bluetooth scanning range   the Bluetooth connection between the paired device and the Thor VM1 is lost  There may be audible or visual signals  as paired devices disconnect from the Thor VM1     3 55       Bluetooth Device List       LXEZ Pairing   OK E          Bluetooth Devices   Settings   Reconnect   About                   Name Bluetooth Address    r L53578 61 DA 00 15 70 44 61 D4   Fi LXE Scanner   00    85 0D 00 80 25 9F 85 0D      Kit s Deskjet 36 10 00 04 76 BB 36 10     gt                  Clear   Discover            The discovered paired devices may or may not be identified with an icon  Discovered devices without an icon can be paired as  a Scanner or a Printer  The Bluetooth panel assigns an icon to the device name     An icon with a red background indicates the device s Bluetooth connection is inactive     An icon with a white background indicates the device is connected t
64.  the SCU  without tapping the Admin Logout button     Admin Login    To login to Administrator mode  tap the Admin Login button     Once logged in  the button label changes to Admin Logout  The admin is automatically logged out when the SCU is exited  The  Admin can either tap the Admin Logout button  orthe OK button to logout              Admin Password Entry       Enter Admin Password     a          Enter the Admin password  the default password is SUMMIT and is case sensitive  and tap OK  If the password is incorrect   an error message is displayed     The Administrator default password can be changed on the Global tab     The end user can     Turn the radio on or off on the Main tab    Select an active Profile on the Main tab    View the current parameter settings for the profiles on the Profile tab    View the global parameter settings on the Global tab    View the current connection details on the Status tab    View radio status  software versions and regulatory domain on the Main tab   Access additional troubleshooting features on the Diags tab     After Admin Login  the end user can also     Create  edit  rename and delete profiles on the Profile tab   Edit global parameters on the Global tab   Enable disable the Summit tray icon in the taskbar        Profile Tab    Start  gt  Programs  gt  Summit  gt  Profile tab    Note  Tap the Commit button to save changes before leaving this panel or the SCU  If the panel is exited before tapping the  Commit button  changes are n
65.  the Start menu     ALT Underlined letter in a menu name Display the corresponding menu     Underlined letter in a command name on an    Carry out the corresponding command   open menu    Cancel the current task        The touch screen provides equivalent functionality to a mouse   e A touch on the touch screen is equivalent to a left mouse click     e Many items can be moved by the    drag and drop    method  touching the desired item  moving the stylus across the  screen and releasing the stylus in the desired location     e A double stylus tap is equivalent to a double click   e A touch and hold is equivalent to a right mouse click1     e Devices with Shift and Ctrl Keys The Shift and Ctrl keys can be used with the touch screen for multiple selection of  items   e Toselect disconnected items  press the Ctrl key and then touch each item to be selected in the set  Press the  Ctrl key again to terminate this mode     e To select a connected set of items  press the Shift key  then touch the first item in the series  Touch the last item  in the series  Press the Shift key again to terminate the selection mode     1Some applications may not support this right click method  Please review documentation for the application to see if it pro   vides for right mouse click configuration     3 2       Rebooting the Thor VM1    If a USB drive  such as a thumb drive is attached to the Thor VM1  the device attempts to boot from the USB  drive   e Ifthe USB drive contains a bootable sector 
66.  the Thor VM1 boots   e if the ignition input is not connected  the Thor VM1 only boots when the power button is pressed    The default is disabled     3 134       Status Popup    Options on this tab configure the Status Popup window  When the Status popup window is displayed  it is placed on top of the  window in focus and hides any data beneath it  It is closed by pressing the assigned Status User or Status Admin key  sequence        Options kd OK E    Communication   Misc   Status Popup                         5 Second Timeout    Admin    User  RFTerm SecID s  M  Admin  V  User  AJC Power  V  Admin  V  User  CapsLock  Y  Admin  V  User  ActiveSync  Y  Admin  V  User  Network Status  M  Admin  V  User  WLAN Radio  Y  Admin  V  User  Battery Meter  V  Admin  V  User  Bluetooth Status  V  Admin  V  User                Using the key mapping control panel  the System Administrator must first assign a Status User key sequence for the end user  when they want to toggle the Status Popup Window on or off     The System Administrator must also assign a Status Admin key sequence to perform the same function  Status popup  window display options  taskbar icons  are assigned on the Status Popup tab  E g  AC Power  ActiveSync  WLAN radio   CapsLock  Network status  Bluetooth status  etc     The default for the User and Admin status popup windows is to show all status information  The 5 second timeout to remove  the status popup from the display is disabled by default for the User and Ad
67.  the Thor VM1 boots from the USB drive     e Ifthe USB drive does not contain a bootable sector  the Thor VM1 does not boot  Remove the USB drive  and boot the Thor VM1 again        Warmboot    A warmboot reboots the Thor VM1 without erasing any registry data  Configuration settings and data in RAM are preserved  during a warmboot  Network sessions are lost and any data in running applications that has not been previously saved may be  lost  CAB files already installed remain installed     There are several warmboot methods available     e Using the Registry  select Start  gt  Settings  gt  Control Panel  gt  Registry and tap the Warmboot button  The Thor VM1  immediately warmboots     e Using the Start menu  select Start  gt  Run and type WARMBOOT in the text box  Press Enter  The Thor VM1  immediately warmboots  The WARMBOOT text command is not case sensitive     e For the 64 key kepad  use the Ctrl   Alt   Del keypress sequence to reboot the Thor VM1  The keys may be pressed in  sequence  they do not need to be held down simultaneously     e Forthe 12 key kepad  use the 2nd   F5   Shift keypress sequence to reboot the Thor VM1  The keys may be pressed  in sequence  they do not need to be held down simultaneously  This reboot sequence also works on the 64 key keypad     Restart    A restart reboots the Thor VM1 without erasing any registry data  Configuration settings are preserved during a restart   Network sessions are lost and any data in running applications that has no
68.  therefore the Thor VM1 must  be actively communicating with the network for this method to succeed     If a Mobile Device Server is found  the Enabler automatically attempts to apply all wireless and network settings from the  active profile  The Enabler also automatically downloads and processes all available packages     If the Enabler does not automatically detect the Mobile Device Server  the IP address of the Mobile Device Server can be  entered on the Connect tab of the Enabler setup  Please see Enabler Configuration for details        Mobile Device Wireless and Network Settings    Once the connection to the Mobile Device Server is established  the Thor VM1 Enabler attempts to apply all network and  wireless settings contained in the active profile     The success of the application of settings is dependent upon the local configuration of control parameters for the Enabler   These local parameters cannot be overridden from the Avalanche MC Console   The default Enabler adapter control settings are    e Manage network settings     enabled   e Use Avalanche network profile     enabled   e Manage wireless settings     disabled  To configure the Avalanche Enabler management of the network and wireless settings    1  Open the Enabler Settings Panels by tapping the Enabler icon on the desktop    Select File  gt  Settings   Select the Adapters tab   Choose settings for the Use Manual Settings parameter   Choose settings for Manage Network Settings  Manage Wireless Settings an
69.  this file is loaded  By default  the PCMCIA slots are off on powerup  to prevent the    Unidentified  PCMCIA Slot    dialog from appearing  Once the drivers are loaded  the slot can be turned on  The value in the PCMCIA  field is a DWORD  representing the number of seconds to wait after installing the CAB file  but before activating the slot   alatency to allow the thread loading the driver to finish installation   The default value of 0 means the slot is not  powered on  The default values for the default radio drivers  listed below  is 1  meaning one second elapses between the  CAB file loading and the slot powering up     The auto launch process proceeds as follows     Note     The launch utility opens the registry database and reads the list of CAB files to auto launch     First it looks for FileName to see if the CAB file is present  If not  the registry entry is ignored  If it is present  and the  Installed flag is not set  auto launch makes a copy of the CAB file  since it gets deleted by installation   and runs the  Microsoft utility WCELOAD to install it     If the Installed flag is set  auto launch looks for the FileCheck file  If it is present  the CAB file is installed  and that  registry entry is complete  If the FileCheck file is not present  memory has been lost  and the utility calls WCELOAD to  reinstall the CAB file    Then  the whole process repeats for the next entry in the registry  until all registry entries are analyzed    To force execution every time
70.  to change the  input panel state             Use this panel to make the Input Panel  on screen keyboard  or the physical keypad primarily available when entering data on  any screen  Selecting Keyboard enables both     Tap the Options button to set the size of the keys displayed on screen and whether Transcriber gestures are enabled or  disabled     Transcriber    When choosing Transcriber as the Current Input Method  first tap the Keyboard icon in the status bar  Select Transcriber from  the pop up menu  Then open the Input control panel and tap the Options button  Transcriber Options  Start  gt  Settings  gt   Control Panel  gt  Input Panel  are available only when Transcriber is selected as the active input method  Tap the         button or  the Help button to access Transcriber Help     Note  Contact Technical Assistance for language packs as they become available     3 113       Internet Options    Start  gt  Settings  gt  Control Panel  gt  Internet Options    Set options for Thor VM1 Internet connectivity     Select a tab  Tap the   button for help using Windows CE Help installed in your mobile device  Adjust the settings and tap the  OK button  The changes take effect immediately     Factory Default Settings    General tab    Connection tab   Use LAN Disabled  Autodial Name USB Client  Proxy Server Disabled  Bypass Proxy Disabled  Security tab    Internet Default site  See Note     Privacy tab    Note  Security Tab  Use the Settings button to set ActiveX control  scr
71.  to generate and install the user  certificate     See Windows Certificate Store vs  Certs Path for more information on CA certificate storage   Check the Validate server checkbox              User     User Cert             CA Cert         Full trusted store     Validate server Use MS store          If using the Windows certificate store   e Check the Use MS store checkbox  The default is to use the Full Trusted Store   e To select an individual certificate  click on the Browse button   e Uncheck the Use full trusted store checkbox   e Select the desired certificate and click Select  You are returned to the Credentials screen   If using the Certs Path option   e Leave the Use MS store box unchecked   e Enter the certificate filename in the CA Cert textbox   Click OK then click Commit   The Thor VM1 should be authenticating the server certificate and using EAP TLS for the user authentication     Ensure the correct Active Profile is selected on the Main tab and warmboot  The SCU Main tab shows the device is associated  after the radio connects to the network     See Certificates for information on generating a Root CA certificate or a User certificate   Note  The date must be properly set on the device to authenticate a certificate     6 36       WPA PSK    To connect using WPA PSK  make sure the following profile options are used   e Enter the SSID of the Access Point assigned to this profile  e Set EAP Type to None  e Set Encryption to WPA PSK or WPA2 PSK  e Set Auth Type to 
72.  to make a temporary test connection to validate the carrier account   Entries identified with an asterisk     are used to configure the test connection   Tap the Save Connection Data button to save the connection parameters     3 109       UTMS    Use the UTMS tab to configure the session parameters        Gobi Connection Manager OK Fa       Home   coma   UMTS   Gps   About    Autoconnect  REA    7 Enable    User Name   Disconnected  Password    Authentication  IP Address     rap   _  cHap    Primary DNS    Secondary DNS   Data Connection Test      connect   Disconnect  Primary NetBIOS Name Server   Os    Secondary NetBIOS Name Server          Data Connection test only Save Connection Data                         Autoconnect    When checked  Autoconnect is enabled  The Connection Manager automatically connect when necessary  such as when  Internet Explorer is launched     Data Connection Test    Tap the Connect button to make a temporary test connection to validate the carrier account   Entries identified with an asterisk     are used to configure the test connection   Tap the Save Connection Data button to save the connection parameters     GPS    This tab displays the information available from the GPS built into the Gobi radio     3 110          Gobi Connection Manager OK X       Home   coma   umts   GPS   about         Operation  Standalone  Timeout  sec   64  Interwal  ms   1000  Accuracy m   50  Status  Enabled    Tracking  Inactive       Lat  33 963545  Lon   84 21907
73.  use another encryption type  select WPA CCKM  WPA2 AES or WPA2 CCKM for encryption and complete other entries as  detailed in this section     The SCU supports EAP FAST with automatic or manual PAC provisioning  With automatic PAC provisioning  the user  credentials  whether entered on the saved credentials screen or the sign on screen  are sent to the RADIUS server  The  RADIUS server must have auto provisioning enabled to send the PAC provisioning credentials to the Thor VM1     Summit Client Utility fa OK A  Main   Profile   status   Diags   Global    Profile   Default y  New   Rename  Delete   Scan ke  io  Encryption  EAP type      wpa TKIP z   EAP FAST y   WEP keys PSKs  Credentials    Save Changes  Commit                                       For automatic PAC provisioning  once a username password is authenticated  the PAC information is stored on the Thor VM1   The same username password must be used to authenticate each time  See the note below for more details     For manual PAC provisioning  the PAC filename and Password must be entered   See Sign On vs  Stored Credentials for information on entering credentials     The entries on the Credentials screen are determined by the type of credentials  stored or sign on  and the type of PAC  provisioning  automatic or manual      Click on the Credentials button     To use Stored Credentials  click on the Credentials button  No entries are necessary for Sign On Credentials with automatic  PAC provisioning as the user will
74.  user mode administrator has closed the application being locked or has changed the  application name or command line     The registry has to be read when switching into user mode  This is because the  Registry read failure at administrator can change the settings during administration mode  The read of the LOG ERROR  reenter user mode registry failed which means the Administration key was not found or the AppName      value was missing or empty     The registry read failed  The registry information read when this message is logged  is the application information  It the Administration key cannot be opened or if the   Registry read failure AppName value is missing or empty  this error is logged  The other application LOG_ERROR  information is not required  If the AppName value is not available  AppLock cannot    switch into user mode     BesetsvstemWorkare   The system work area is adjusted when in user mode to cover the taskbar area  The  a y system work area has to be adjusted to exclude the taskbar area in administration LOG_ERROR  failure   h   mode  AppLock was unable to adjust this area     Shift pressed The Shift key has been pressed and trapped by the HotKey processing  LOG_EX  Processing the hotkey and backdoor entry LOG_EX      f o  LOG_  Show taskbar The taskbar is now being made visible and enabled  PROCESSING       3 49    Message Explanation and or corrective action   Level      Switching to admin   backdoor    Switching to admin   hotkey press    Switching to a
75.  with 128 MB may only  report 99 MB memory  since 29 MB is used by the operating system  This is actual DRAM memory  and does not include  internal flash used for storage     3 151       Memory Tab       System Properties ka OK R  General   Memory   Device Name   Copyrights      Move slider to the left for more memory to run programs  Move slider to  the right for more storage room  Only unused RAM can be adjusted        Storage LEO IE EE O ET ATEU EITIC COU RIOGAIN Program    Memory Eo A M Memory  Allocated 98304KB Allocated 373196KB  In Use 6092KB In Use 66120KB          Move the slider to allocate more memory for programs or storage  If there isn   t enough space for a file  increase the amount of  storage memory  If the mobile device is running slowly  try increasing the amount of program memory     Device Name Tab            System Properties E OK  E    General   Memory Device Name   copyrights      These settings are used to identify your Windows CE device to    ho other computers    gt   gt  Please type a name  without any spaces  and a short description     Device name   THOR  Device description   Honeywell_vM1             The device name and description can be changed by the user  Enter the name and description using either the keypad or the  Input Panel and tap OK to save the changes  This information is used to identify the Thor VM1 to other computers and devices     3 152       Copyrights Tab    System Properties    General   Memory   Device Name   Copyrights    e
76.  with another 2nd key press     For example     Press 2nd and F1 to generate F11     Ctrl and Alt Key LEDs    Note  Ctrl and Alt keys and the associated LEDs are not present on the 12 key version     When the modifier keys  Ctrl or Alt  are active  the LED located next to the key is illuminated  The modifier key remains active  until     e The modifier key is pressed again  or  e A non modifier key is pressed     USB Keyboard   Mouse    A standard USB keyboard or mouse can be attached to the Thor VM1 using the appropriate dongle cable     The dongle cable attaches to the Thor VM1 and provides a USB connector  Please refer to documentation provided with the  USB keyboard or mouse for more information on their operation     2 29    LED Functions      System LEDs     Connection LEDs     2nd LED     Shift CapsLock LED     Shift CapsLock LED      Ctrl LED       Alt LED      NO oO FP WD           64 key keyboards only       2 30       System LEDs    1  SYS  System Status  LED  O UPS 2  UPS  Uninterruptible Power Supply  LED  3  SSD  Solid State Drive  LED    SYS  System Status  LED    LED Behavior System State    e On  Solid Green e On but Backlight Off  e On but Display Off  Green blinking very slowly  External power present e Suspend   1 2 sec  on  4 1 2 sec  off     Off e Off  External power not present e Suspend    Green blinking slowly  External power present   1 2 sec  on  1 1 2 sec  off     CPU temperature less than  20  C   Heater warming CPU for 30 seconds    Green blinkin
77. 0  100  100 200  MAC  00 02 2d 00 00 00       This screen provides information on the radio     e The profile being used     Channel  6  Bit Rate  48 Mbps SOC  Tx Power  63 mW  Beacon Period  102  DTIM  1    MSionalstfenath   57 dem        Signal Quality  83        e The status of the radio card  down  associated  authenticated  etc       e Client information including device name  IP address and MAC address     e Information about the Access Point  AP  maintaining the connection to the network including AP name  IP address and    MAC address   e Channel currently being used for wireless traffic   e Bit rate in Mbit     e Current transmit power in mW     e Beacon period     the time between AP beacons in kilomicroseconds   one kilomicrosecond   1 024 microseconds      e DTIM interval     A multiple of the beacon period that specifies how often the beacon contains a delivery traffic indication  message  DTIM   The DTIM tells power saving devices a packet is waiting for them  For example  if DTIM   3  then    every third beacon contains a DTIM     e Signal strength  RSSI  displayed in dBm and graphically     e Signal quality  a measure of the clarity of the signal displayed in percentage and graphically     There are no user entries on this screen   Note     After completing radio configuration  it is a good idea to review this screen to verify the radio has associated  no    encryption  WEP  or authenticated  LEAP  any WPA   as indicated above     6 11       Diags Tab    Start
78. 0 0 2    ccc cee ee eee ee ee ee ar cnn nn cnn nn 3 86   Bar Code Data Match Edit Buttons      2 222 220 0020 3 86  Match List Rules       2 2 22    e cece c cece cece cece cece cece ce eeeceeeeeeeeeeeeeeees 3 87   Add Prefix Suffix Control          00 00000002 c cece cece cece ccc ccc cc ns 3 88  S111  90   016   ooccccccccc cnn ronronner onnon n rnnr nnno aroaro a eran neron o rror e rnrn rnern 3 88  Ctrl Chan Mapping s2 3  scscco ce ecadaeeeces a nea a aa de a loo a dae ii beat 3 89  Translate Allo st e a dee eee 3 89  Paramotor esee E O e ei NSE 3 89  Translate All earns a econ te a ce sot a e doo E 3 89  Character a eee 3 90  RREDIAG CMO IMs a  5 oe one acess e E E 3 90  LISTBOX gos tee Sets fsa ace te eet ae Sea a E A ts ots deta eesti eile oa ese as 3 90  ASSIGN BUON 2 3 265  lt 0 cnc cise dec vie tie anand ad donde onaecasagcseesascsbacacace secacack bate seceenaetdeesneuaheteceedeeane ds 3 90  Delete BUON    ne 3 90  Custom Identitiers  o 3 91  PP Naa ok Eas feo a eee ano Seen 3 91  A toate erate ae EE eee te een cae EE eeeu eco aera 3 92  Control Code Replacement Examples               2 2     2 222222  ccccc cece cece cece cee cee ce ccc cceeeeececeeeeceeteeeeees 3 93  Bar Code Processing Examples        2 02202  2 222 ccc cece cece cece cece cece cece eee cece cece cece cece ee ceeeeeeeeeseeeenes 3 94  Processing Ta ness 3 95  SN A A te tee ea E s gokecadeee donee cate teceteae    3 96  Length Based Bar Code Stripping               00 00020 e cece eee e cece cece 
79. 000000000000  Pee R  Service not activated Authentication   pap    cHap  pS Data Connection Test    Service Programming Code   Validate SPC Connect    System Identification Number   User Name      Mobile Directory Number   Password          Data Connection test only  Mobile Indentification Number      Save Connection Data                  Disconnect             Activation Type  There are two activation methods  Automatic and Manual   Automatic Activation    1  Select the Automatic radio button for Activation Type     2  Automatic activation requires an Activation Code  Enter the Activation Code in the Activation Code text box and tap  Activate     3  All other text boxes are grayed out as no additional entries are required for automatic activation   4  Verify the activation process is successful by reviewing the message below the Activation Type group     Manual Activation    1  Select the Manual radio button for Activation Type     2  Enter the Service Programming Code  System Identification number  Mobile Directory number and Mobile Identification  Number in the appropriate text boxes     3  The Activation Code text box is not used     3 108       4  Tap Activate   5  Verify the activation process is successful by reviewing the message below the Activation Type group   Autoconnect    When checked  Autoconnect is enabled  The Connection Manager automatically connect when necessary  such as when  Internet Explorer is launched     Data Connection Test    Tap the Connect button
80. 1 Signal Quality  GPS SPS Mode  fix valid  Elv  343 3000 Automatic Fix  3D    Speed   0 0000 15 59 34 6364 Reset All Data       Tap the Start button to initiate a scan for GPS data  The information on this tab is updated every 3 seconds     Tap the Reset All Data button to clear all GPS data from the Gobi radio  You must confirm that you want to rest the data  Use  this button with caution as it takes a longer time for the GPS to establish a valid fix after the data is cleared     After the GPS establishes a coordinate fix  the Where am   button is active  Tapping this button activates Internet Explore to  display a Google map of the current location     The GPS time and NMEA  National Maritime Electronics Association  string count are displayed at the bottom of this tab     3 111       About    This tab displays information on the Gobi 2000 radio installed in the Thor VM1     Gobi Connection Manager       3 112       Input Panel    Start  gt  Settings  gt  Control Panel  gt  Input Panel  Set the current Thor VM1 keys and data input method     Factory Default Settings    Input Panel tab    Input Method Keyboard    Allow applications to change input panel state Enabled  Options button  Keys Small keys    Use gestures Disabled    Input Panel Properties E OK x  Input Panel      Current input method              To quickly switch input methods     B      tap the Input Panel arrow and then  tap the desired method from the       Key board    menu that appears     Allow applications
81. 140  F   30  C to 60  C   non condensing     ESD 8 KV air  4kV direct contact    Standard  Up to 90  non condensing at 104  F  40  C   Extended temperature  100     Operating Humidity          Network Card Specifications    Summit 802 11a b g  Bus Interface 32 bit SDIO  Secure Digital I O    varies by regulatory domain  5 15 to 5 82 GHz IEEE 802 11a DSSS OFDM    FCC  1 11  36  40  44  48  149  153  157  161    Channels ETSI  1 13  36  40  44 48    Bluetooth       Bus Interface CompactFlash  Enhanced Data Rate Up to 3 0 Mbit s over the air    Connection Noless than 32 80 feet  10 meters  line of sight    Bluetooth Version 2 0 EDR    Operating Frequency 2 402   2 480 GHz    B013455       7 4    Chapter 8  Key Maps    64 Key QWERTY Keypad Key Map    YW       A         a    n          0  o     E   E   E    e  a    daa       Because the keyboard only has 64 keys  all functions are not visible  or printed on the keyboard   Therefore the Thor  VM1 keyboard supports what is called hidden keys     keys that are accessible but not visible on the keyboard     A key or combination of keys can be remapped to provide a single keypress  a string of keypresses or to execute an  application or command  Key remapping is configured via the KeyPad option in the Control Panel  Start  gt  Settings  gt   Control Panel  gt  KeyPad      Remapped keys persist across a warmboot or power cycle   The keyboard does not have a NumLock indicator or key  NumLock is always On   The warmboot behavior of CapsLo
82. A CCKM  WPA2 AES or WPA2 CCKM for encryption and complete other entries as  detailed in this section     Summit Client Utility 7  foki x     Main   Profile   status   Diags   Global      Profile   Default y    New   Rename  Delete   Scan E   C  Radio  Encryption  EAP type       ap  wea TKIP     peap GTC y   WEP keys PSKs  Credentials     Save Changes  Commit                                 See Sign On vs  Stored Credentials for information on entering credentials   Click the Credentials button     e No entries except the CA Certificate Filename are necessary for Sign On Credentials as the user will be prompted for  the User Name and Password when connecting to the network     Enter these items as directed below     Credentials A E    User     Password  fo  CA cert   a E        Validate server  7  Use MS store    Enter the Domain Username  if the Domain is required   otherwise enter the Username   Enter the password           Leave the CA Certificate File Name blank for now   Click OK then click Commit  Ensure the correct Active Profile is selected on the Main Tab   See Windows Certificate Store vs  Certs Path for more information on certificate storage     6 29       Once successfully authenticated  import the CA certificate into the Windows certificate store  Return to the Credentials screen  and check the Validate server checkbox     Note  Some servers may be configured to allow only a single use of the password for PEAP GTC  In this case  wait for the  token to update with
83. B  select   Start  gt  Settings  gt  Control Panel  gt  PC Connection   Tap the Change button  From the popup list  choose   USB Client    This will set up the mobile device to use the USB port  Tap OK and ensure the check box for    Allow connection with desktop  computer when device is attached    is checked     Tap OK to return to the Control Panel  If desired  any control panel windows may be closed     Connect the USB cable to the PC  the host  and the mobile device  the client  as detailed below  USB will start automatically  when the USB cable is connected  not requiring you to select    Connect    from the start menu     When the Thor VM1 loses connection  e g  enters Suspend Mode  etc   the connection to ActiveSync will be lost  When the  Thor VM1 resumes  the ActiveSync session will automatically re connect     Cable for USB ActiveSync Connection     VM1052CABLE   Thor VM1 Dongle cable provides USB type A connector   e D9connector  labeled as  1 below  connects to the USB port on the Thor VM1 dock   e The USB type A connector  labeled as  3 below  on cable connects to a USB port on a PC or laptop   e The USB host  port  2  connector on the dongle cable does not need to be connected        4 2       Explore    From the ActiveSync Dialog on the Desktop PC  tap the Explore button  which allows you to explore the mobile device from  the PC side  with some limitations  You can copy files to or from the mobile device by drag and drop  You will not be allowed to  delete fi
84. Blanking Box or user supplied switch  e Acable from the serial port to the box or switch     A Do not enable Screen Blanking until the cable is properly connected to the specified COM port        Screen blanking allows the Thor VM1 display to automatically be turned off whenever the vehicle is in motion  When the Thor  VM1 display is off due to vehicle motion  the integrated keypad backlight remains on     Screen blanking requires a user supplied cable properly connected as shown below  To enable blanking  check the Enable  screen blanking checkbox  The default is disabled     Use the Screen on delay to specify the period of time in ms  milliseconds  between when the vehicle stops and the Thor VM1  screen turns on  For example  use the delay if the switch end of the cable is attached to the vehicle   s accelerator pedal   Release of the accelerator may mean the truck is coasting to a stop rather than stationary  Configure the delay to allow time for  the vehicle to coast to a stop  The default value is 1000 ms     Specify the COM Port to which the screen blanking cable is attached  either COM1 or COM2  If a COM port is in use by  another application  such as DC Wedge   that COM port is grayed out and cannot be selected for screen blanking     To disable screen blanking  uncheck the Enable screen blanking checkbox     Current Level    LCD brightness displays the current LCD brightness level  The default brightness is 100      e LCD brightness can be manually adjusted using the
85. Connection  Security  Privacy  Advanced and Popups options for Internet  Internet Options ee  connectivity     Select a Key Map  or font   Set key repeat delay and key repeat rate   phone  software and microphone     Network and Dial Up Options Set network driver properties and network access properties  Network Capture Set network logging options     Set various device specific configuration options    Set the mobile device owner details  name  phone  etc    Enter notes  Enable   disable  Owner Owner display parameters  Enter Network ID for the device     user name  password   domain     Password Set OS access password properties for signon and or screen saver        3 21    PC Connection    Peripherals    Power  Regional Settings    Registry  Remove Programs    Screen Control    Stylus    System  Terminal Server Client Licenses  Volume and Sounds    WiFi    Control the connection between the mobile device and a local desktop or laptop com   puter     Enable or disable defroster  if installed   Set Power scheme properties  Review device status and properties     Set appearance of numbers  currency  time and date based on country region and lan   guage settings     Review System and Computer data and revision levels  Adjust Storage and Program  memory settings  Enter device name and description  Review copyright notices     Select a server client license from a drop down list     Enable   disable volume and sounds  Set volume parameters and assign sound WAV  files to events  
86. Encryption is based on the length of the user s passcode     Bluetooth simultaneously supports one printer as a slave Bluetooth device and one scanner  either as a slave or as a master  Bluetooth device     e TheLED onthe Bluetooth scanner illuminates during a scanning operation     e Barcode data captured by the Bluetooth scanner is manipulated by the settings in the Thor VM1 Data Collection control  panel applet     e Multiple beeps may be heard during a bar code scan using a mobile Bluetooth scanner  beeps from the mobile Bluetooth  scanner as the bar code data is accepted rejected  and other beeps from the Thor VM1 during final bar code data  manipulation     WWAN    WWAN  Wireless Wide Area Networking  is available on the Thor VM1  A slot is provided for a SIM card     GPS    GPS  Global Positioning System  is available on the Thor VM1        Power    Vehicle DC Power Supply    Vehicle power input for the Thor VM1 dock is 10V to 60V DC and is accepted without the need to perform any manual operation  within the Thor VM1 dock  The dock provides a conditioned power output for the Thor VM1  By using a specified DC to DC  adapter  input voltage of 72 144V DC nominal can be accepted     If 10 to 60V DC power is not available     for example  in an office environment     an optional external Universal Input Power  Supply can be used to convert AC wall power to an appropriate DC level     Power input is fused for protection and the fuse is externally accessible   External AC Po
87. F WN SF    Oo g    Select the modifier key from the Modifier Mode options    Select the key to be remapped from the Key pulldown list    Select Launch App1 4 from the remapped key from the Remapped Key pulldown list    Click on the LaunchApp tab    Make sure the EXE radio button is selected    Inthe text box  App1 4  corresponding to the number selected for Launch App1 4  enter the application to launch     If any parameters are needed for the application  click on the OPT radio button  This clears the text box  though the  application name is saved   Enter the desired parameters in the appropriate text box     Click OK to save the result and close the control panel     If the KeyMap tab is accessed again  the application plus any specified parameters is displayed in the Key Sequence  text box when the remapped key is again selected     3 120       Remap a Command    Select the modifier key from the Modifier Mode options    Select the key to be remapped from the Key pulldown list    Select RunCmd 1 4 from the remapped key from the Remapped Key pulldown list    Click on the RunCmd tab    Make sure the FILE radio button is selected    In the text box  Cmd1 4  corresponding to the number selected for RunCmd1 4  enter the desired command     NO oF WN  gt     If any parameters are needed for the command  click on the PARM radio button  This clears the text box  though the  command is saved   Enter the desired parameters in the appropriate text box     co    Click OK to save the re
88. Honeywell    Thor    VM1    Vehicle Mounted Computer  Microsoft   Windows   Embedded CE 6 Operating System    Reference Guide       Disclaimer    Honeywell International Inc      HII     reserves the right to make changes in specifications and other information contained in this  document without prior notice  and the reader should in all cases consult HII to determine whether any such changes have  been made  The information in this publication does not represent a commitment on the part of HII     HII shall not be liable for technical or editorial errors or omissions contained herein  nor for incidental or consequential damages  resulting from the furnishing  performance  or use of this material     This document contains proprietary information that is protected by copyright  All rights are reserved  No part of this document  may be photocopied  reproduced  or translated into another language without the prior written consent of HII        2011 2012 Honeywell International Inc  All rights reserved   Web Address  www honeywellaidc com  RFTerm is a trademark or registered trademark of EMS Technologies  Inc  in the United States and or other countries     Microsoft   Windows  ActiveSync    MSN  Outlook    Windows Mobile    the Windows logo  and Windows Media are  registered trademarks or trademarks of Microsoft Corporation     Intel   and Atom    are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and  other countries     Summ
89. Information on Mobile Devices       2 22 2    cece cece cece eee e cece eccceececccceeceeees 5 6   User Interface    02 22 eee 5 7   Enabler Configuration  ii aaea Aaaa AAAA AA E AADEL A DEE oaao a oraraa 5 7  File Menu Option  00    e a 5 8  Avalanche Update using File  gt  Settings     0 2020002222 c cece cece ccc ccc daradara c eee eeeeeeteeeeeeeees 5 9   Menu Option  seo  Sieh rca e tector sats seh Gdah UU thle sey coe Sade DN Meds 5 9  Connection  cc a ee ee ee ee ee eve eben ee 5 10  server Contact 2    vege see seek eke ee lees E ed eb sd See ee ed oa eb Sedo ee ee eee laden adsl eee 5 11   De eS ee ero ee eer et 5 12   AECE AAA se so ee gat se ee St E E dee Se yee i A 5 13   DiSplay 335  ss oteeth eet ee sores seen es States dd arden td ii oh o 5 15   NAS KDA ote Sass E eee nse A Ae eae decisis ot oe a 5 16   Execution utero tr eee tee eet 5 17   SCAN CONG ee ea ee a ade Seas ee te eel de oad Ae Moe eee do gall bees ee eed cee desl sees 5 18   MMOMGUIS 22252  22 252 Sark Sod eet idol 5 19       Adapters saa eset  A ete tigen eosin A ote el E 5 21    Sn A eee fen ee eae 5 24   NIC pe ae cee A A A stearate A sss 5 25  Using Remote Management nn 5 25  Using express Scan  oo    e cece cece ce ceececccececceccccceccecceceececceceececeeceeeeeeeeeeeeeeeeeeeeeeeteneennes 5 26  step  Create Bar Codes  2 20 12 conten deed ed esos 5 26  Step  2 Scan Bar COS ii e 5 26  Step 3  Process Completion           2 222 000  00ccceeeee 5 28  Chapter 6  Wireless Network Connections__      
90. O EVENT  SHALL  ANY LIABILITY OF HII ARISING IN CONNECTION WITH ANY PRODUCT SOLD HEREUNDER  WHETHER SUCH  LIABILITY ARISES FROM A CLAIM BASED ON CONTRACT  WARRANTY  TORT  OR OTHERWISE  EXCEED THE  ACTUAL AMOUNT PAID TO HII FOR THE PRODUCT  THESE LIMITATIONS ON LIABILITY SHALL REMAIN IN FULL  FORCE AND EFFECT EVEN WHEN HII MAY HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH INJURIES   LOSSES  OR DAMAGES  SOME STATES  PROVINCES  OR COUNTRIES DO NOT ALLOW THE EXCLUSION OR  LIMITATIONS OF INCIDENTAL OR CONSEQUENTIAL DAMAGES  SO THE ABOVE LIMITATION OR EXCLUSION MAY  NOT APPLY TO YOU     All provisions of this Limited Warranty are separate and severable  which means that if any provision is held invalid and  unenforceable  such determination shall not affect the validity of enforceability of the other provisions hereof  Use of any  peripherals not provided by the manufacturer may result in damage not covered by this warranty  This includes but is not  limited to  cables  power supplies  cradles  and docking stations  HII extends these warranties only to the first end users of the  products  These warranties are non transferable     The duration of the limited warranty for the Thor VM1 is 1 year    The duration of the limited warranty for the Thor VM1 Quick Mount Smart Dock is 1 year    The duration of the limited warranty for the Thor VM1 Vehicle Mount Assembly is 1 year    The duration of the limited warranty for the Thor VM1 internal UPS battery is 1 year    The duration of the lim
91. Open    Summit Client Utility 7  foki x     Main   Profile   status   Diags   Global    lo  Encryption  EAP type      wea PSK     None  gt    WEP keys PSKs  Credentials                        Click the WEP keys PSKs button          For Passphrase  enter 8 63 chars  For PSK  enter 64 Hex chars    A    This value can be 64 hex characters or an 8 to 63 byte ASCII value  Enter the key and click OK           Once configured  click the Commit button     Ensure the correct Active Profile is selected on the Main tab and warmboot  The SCU Main tab shows the device is associated  after the radio connects to the network     6 37       Certificates    Note  Please refer to the Security Primer to prepare the Authentication Server and Access Point for communication    Note  Itis important that all dates are correct on the Thor VM1 and host computers when using any type of certificate   Certificates are date sensitive and if the date is not correct authentication will fail    Quick Start    Root Certificates are necessary for EAP TLS  PEAP GTC and PEAP MSCHAP   1  Generate a Root CA Certificate and download it toa PC   2  Connect the Thor VM1 to the desktop PC using ActiveSync and copy the certificate to the Thor VM1  System folder   3  Install the Root CA Certificate   User Certificates are necessary for EAP TLS  1  Generate a User Certificate and Private Key file and download it to a PC     2  Connect the Thor VM1 to the desktop PC using ActiveSync and copy the certificate and private key
92. Primary Certification Authority  Class 3 Public Primary Certification Authority  Entrust net Certification Authority  2048   Entrust net Secure Server Certification Authorit  Equifax Secure Certificate Authority   GlobalSign Root CA ly     Import     View     Remove            Lists the certificates  trusted by you          Tap the Import button        Import Certificate or Key OK Fl      From a File    O From a Smart Card          Make sure From a File is selected and tap OK        Select a Certificate File  J  My Documents   Shortcut to Office Templates       EE  z        Name    Type   Certificates y           6 42       Using the explorer buttons  browse to the location where you copied the certificate  select the certificate desired and tap OK              Root Certificate Store  Do you want to ADD the following certificate to the Root Store     Subject   doe  SUPPORT  LOCAL  Issuer   mickey  LOCAL   Time Validity   Thursday  July 01  2004 through Tuesday  July 01  2014  Serial Number   12345678 SOABCDEF 12345678 9DABCDEF          Tap Yes to import the certificate   Once the certificate is installed  retum to the proper authentication section  earlier in this manual     6 43       Generating a User Certificate    The easiest way to get the user certificate is to use a browser on a PC to navigate to the Certificate Authority  To request the  user certificate  open a browser to    http    lt CA IP address gt  certsrv   Sign into the CA with the usemame and password of the 
93. Primary Events    A User Primary Event transitions the Thor VM1 to DO  On  mode  When no user event happens for the specified time period   the Thor VM1 transitions to D1  User Idle   then D2  System Idle  and then D3  Suspend   Timeout periods are set via the  Schemes tab in the Power control panel     User primary events include   e Any key press on the keypad  e Touchon the touch screen  e USB data entry  from a USB keyboard or mouse     System Primary Events    A System Primary Event allows the Thor VM1 to transition to D2  System Idle  but the Thor VM1 does not enter D3  Suspend   as long the system event occurs     System primary events include   e Serial data transfer  e USB data transfer    Wake Source Events    These events wake the Thor VM1 from suspend   e Power button  e Touchon the touch screen  e Any keypress on the keyboard  e USB connect   disconnect  e Truck power on or off  i e  ignition key   e RTC  e Bluetooth connection  e External power connection  e Serial port CTS control line  e Headset connection  this is not enabled by default  but can be configured to wake the Thor VM1     Events generated by these actions are not processed  For example  the key press or touch screen tap that wakes the Thor  VM1 is ignored     The following events DO NOT wake the Thor VM1 from suspend   e Bluetooth keyboard or mouse  e USB host data  unless enabled via API   e USB host connection    2 7    e SDIO interrupt   e Serial data   e 802 11 radio   e External power disconn
94. Properties El OK Fa  PC Connection      mo These settings control the connection between your Windows  J CE device and desktop computer  Warning  Adjusting these  Qe settings may result in an inability to connect with your desktop  computer     Allow connection with desktop computer when device is attached       Connect using     USB Client             Tap the Change button to change the direct connect setting   Tap the drop down box to view a list of pre configured connection settings     3 139       Peripherals    Start  gt  Settings  gt  Control Panel  gt  Peripherals  This panel is used to enable and disable the touch screen defroster     Factory Default Settings    Defroster Enabled  if installed        Defroster Trip Point 40   C   104   F    Note  Settings have no effect if the defroster is not installed        Peripherals fa OK A    Defroster is not installed  Defroster is OFF    Defroster  O Enabled    Disabled Test    Defroster trip point  40 y  degrees C                    The screen displays the information about the defroster   e If the defroster is installed  e The current state of the defroster  ON or OFF  e Ifthe defroster is Enabled or Disabled  e The defroster trip point     Tap the Test button to determine the presence of the defroster  Use this button when the front panel of the Thor VM1 has been  swapped  For example  if the Thor VM1 did not contain a defroster but a new front panel with a defroster is installed  tap the  Test button to update the defrost
95. Settings    Notifications    Volume One level below Loud  Key click Disabled   Screen tap Disabled   Scheme LOUD     Good Scan and Bad Scan Sounds          Volume  amp  Sounds Properties E OK E    Volume   Sounds       a  Loud Enable sounds for    M  Events  warnings  beeps and system events      M  Applications  program specific and all other sounds   Notifications  alarms  appointments and reminders           Enable clicks and taps for    7 Key clicks  O loud    Soft   7 Screen taps   lod    Soft    n   a                3 155          Volume  amp  Sounds Properties El OK E    volume   Sounds      Event  A indows CE  GIS Asterisk  Close Program   gt  Critical Stop     Default Sound  Empty Recycle Bin  g  Exclamation                     The volume setting is stored in the registry and is recalled at power on     Note  Rejected bar codes generate a bad scan beep  In some cases  the receipt of data from the scanner triggers a good  scan beep from a tethered scanner  and then the rejection of scanned bar code data by the bar code processing  causes a bad scan beep from the mobile device on the same data     Good Scan and Bad Scan Sounds    Good scan and bad scan sounds are stored in the Windows directory  as SCANGOOD WAV and SCANBAD WAV  These are  unprotected WAV files and can be replaced by a WAV file of the user   s choice     By default a good scan sound on the Thor VM1 is a single beep  and a bad scan sound is a double beep     3 156       WiFi Control Panel    Start  gt  S
96. Technical Assistance for  upgrade details     3 132       Communication    Options on this tab configure communication options for the Thor VM1     Options El OK Eg    Communication   Misc   Status Popup                   Enable TCP IP Version 6     7 Allow Remote Desktop Autologon  Note   RDP file must be  saved in  System Folder       Autolaunch TimeSync                Enable TCP IP Version 6    By default  IPv6 is disabled on the Thor VM1  Check this checkbox to enable  Pv6     Allow Remote Desktop Autologon    By default  Remote Desktop Autologon is disabled  Check this checkbox to enable Remote Desktop Autologon     Note  The RDP file must be saved in the  System folder  When prompted  use the Save As button to save the  RDP file is  the  System directory  If the  RDP file is saved in the default root folder location  the  RDP file will not persist across a  warmboot     Autolaunch TimeSync    By default  TimeSync does not automatically run on the Thor VM1  To enable TimeSync to run automatically on the Thor VM1   check this checkbox     Synchronize with a Local Time Server    By default  GrabTime synchronizes via an Internet connection  To synchronize with a local time server   1  Use ActiveSync to copy GrabTime  ini from the My Device  gt  Windows folder on the mobile device to the host PC     2  Edit the copy of GrabTime ini on the host PC  Add the local time servers domain name to the beginning of the list of  servers  You can optionally delete the remainder of the l
97. VM1   e Ifthe UPS battery is not charged before the timeout expires  the fault LED is lit     e Ifthe UPS battery cannot be charged due to a temperature extreme  the fault LED is lit  Move the Thor VM1 toa  different location to charge the UPS battery     2 4       When external power is removed  the UPS automatically powers the Thor VM1 with no user intervention  When running on  UPS power  the power management timeouts may be different than when vehicle power is applied     The UPS allows the Thor VM1 to continue operation when not mounted in a dock or when the vehicle battery is being swapped   The UPS battery is designed to power the Thor VM1 for a minimum of 30 minutes at temperatures of  20  C   4  F  or greater   For the extended temperature version of the Thor VM1  the UPS provides a minimum of 10 minutes of operation below  20  C     4  F   up to  30  C   22  F     If operating on UPS power and the UPS battery becomes critically low  the Thor VM1 performs a controlled shutdown     If there is no external power available  there must be 10  or greater power in the UPS battery or the Thor VM1 does not power  on     The UPS status LED and the Battery Control Panel can be used to monitor the state of the UPS battery   The UPS battery can be replaced by the user     Backup Battery    The Thor VM1 has a permanent Lithium battery installed to maintain time  date and CMOS setup information for a minimum of  90 days  The lithium battery is not user serviceable and should last 
98. a hotkey press by the administrator  PROCESSING  Taskbar Hoole   aie unable to control the taskbar to prevent the locked application from re  LOG_ERROR    Taskbar hook OK AppLock successfully installed control of the taskbar  LOG_EX    Timeout looking for app  window    ToUser after admin  not  at boot    ToUser after admin app  still open    ToUser after admin no    app or cmd line change    Unable to move desktop    Unable to move taskbar    failure    Unhook wndproc failure    Unhooking taskbar    After the application is launched  AppLock must wait until the application has  initialized itself before proceeding  The application did not start successfully and LOG_ERROR  AppLock has timed out   The user mode switch is attempted when the device boots and after the  administrator presses the hotkey  The mode switch is being attempted after a hotkey   LOG_EX  press   The switch to user mode is being made via a hotkey press and the administrator has   ee     LOG_EX  left the application open and has not made any changes in the configuration     If user mode is being entered via a hotkey press  the administrator may have left the  configured application open  If so  AppLock does not launch the application again   E     NENA LOG_EX   unless a new application or command line has been specified  otherwise  it just    locks it   The desktop is moved when switching into user mode  This prevents them from  being visible ifthe application is exited and restarted by the timer  This erro
99. ailed in this section     Summit Client Utility 7  foki x     Main   Profile   status   Diags   Global      Profile   Default y    New   Rename  Delete   Scan E Cc  Radio  Encryption  EAP type       ap  wea TKIP    JEAP TLS y   WEP keys PSKs  Credentials     Save Changes  Commit                                 See Sign On vs  Stored Credentials for information on entering credentials   Click the Credentials button     e No entries except the User Certificate Filename and the CA Certificate Filename are necessary for Sign On Credentials  as the user will be prompted for the User Name when connecting to the network     e For Stored Credentials  User Certificate Filename and the CA Certificate Filename must be entered   Enter these items as directed below        Credentials E x    User     User Cert    fl  CA cert       E     _  Validate server     Use MS store    Enter the Domain Username  if the Domain is required   otherwise enter the Username     Select a user certificate from the Windows certificate store  Use the Browse button to locate the User Cert from the certificate  store  Highlight the desired certificate and press the Select button  The name of the certificate is displayed in the User Cert  box           6 35       Some versions of the SCU require a User Cert password  If this entry field is present  enter the password for the user  certificate in the User Cert pwd box     If there are no user certificates in the Windows certificate store  follow these instructions
100. ails on creating barcodes     Step 2  Scan Bar Codes    For each mobile device to be configured  please follow these instructions   Start eXpress Scan on the Thor VM1 by double clicking the eXpress Scan icon   Enter the bar code password  if any     eXpress Scan    passcode   _    Enter Passcode     Press Start before scanning the  first barcode        Click Start     Bar code 1 must be scanned first  The scanned data is displayed in the    Data    text box  The password  if any  entered above is  compared to the password entered when the bar codes were created     5 26    eXpress Scan       Scan Barcode 1 into Data field     If the passwords match  the bar code data is processed and the screen is updated to reflect the number of bar codes included  in the set     If the passwords do not match  an error message is displayed  The current screen can be closed using the X box in the upper  right corner  The password can be re entered and Bar Code 1 scanned again     eXpress Scan       Scan next barcode into Data field     The remaining bar codes may be scanned in any order  After a bar code is scanned  that bar code is removed from the     Remaining     list and placed in the    Scanned     list     5 27       Step 3  Process Completion    After the last bar code is scanned  the settings are automatically applied           Configuring settings       Please Wait          Once configured  the Thor VM1 is warmbooted  Once connected to the wireless network and the Mobile Device Serv
101. alled the touch screen     Select the desktop background image and appearance scheme for the Thor VM1  Using the options on the Backlight tab  set  the display backlight and keypad backlight timers when running on battery or external power     Adjust the settings and tap the OK button to save the changes  Saved changes take effect immediately     Factory Default Settings    Background tab    Image Windows CE    Image on background   Disabled  Appearance tab  Schemes Windows Standard    Backlight tab    Background       Display Properties    Fs Windows Embedded CE 6 0    Image   Windowsce y   J Tile image on background       There is very little change from general desktop PC Display Properties   Background options  Select an image from the  dropdown list  or tap the Browse button to select an image from another folder  to display on the Desktop  and then tap the OK  button to save the change  The change takes effect immediately     3 103       Appearance    Display Properties  Background   Appearance   Backlight    Scheme     SE    2  X   iindows standard e     Item      Desktop y        There is very little change from general desktop PC Appearance options  Select a scheme from the dropdown list and make  changes to the parameters  The default is High Contrast White for monochrome displays and Windows Standard for color  displays  Tap the Save button to save any changes  renaming the scheme if desired  Tap the Delete button to delete schemes   Tap the Apply button to apply t
102. ameters on the Main tab and the COM tab s  apply to this device only     Bar code manipulation parameter settings on the Data Options tab are applied to the incoming data resulting from successful  bar code scans received by the Thor VM1 for processing  The successful bar code scan data may be sent by    e awireless Bluetooth Handheld Scanner     e oratethered serial scanner     3 73       Bar Code Readers    The Thor VM1 can use the following external bar code readers     e Tethered hand held scanners are tethered to a serial port or a USB host port on the Thor VM1 and are configured by  scanning the engine specific bar codes in the scanner manufacturer s programming guide  The manufacturer s guides  are usually shipped with the bar code reader     e Wireless hand held Bluetooth scanners are configured by scanning the engine specific bar codes in the scanner  manufacturer s programming guide  The manufacturer s guides are usually shipped with the bar code reader     e The body worn Bluetooth Ring Scanner module may be using a Symbol 4400 Ring Imager or a Symbol 955 Ring  Scanner  The BTRS module is configured by scanning the bar codes in the Bluetooth Ring Scanner Guide     Return to Factory Default Settings  After scanning the engine specific bar code to return the scanner imager to factory default settings  the next step is to open the    bar code wedge panel on the mobile device collecting the scanned data  Click the OK button to close the panel  This action will  synchro
103. an empty line in the Custom ID list  The Add button changes to Insert  Enter data into both   Insert    the Name and ID Code fields and click the Insert button  The data is added to the selected line in the  Custom IDs list     Edit Double click on the item to edit  Its values are copied to the text boxes for editing  The Add button  changes to Replace  When Replace is clicked  the values for the current item in the list are updated     Clear All When no item in the Custom IDs list is selected  clicking the Clear All button clears the Custom ID  list and any text written  and not yet added or inserted  in the Name and ID Code text boxes     The Clear All button changes to a Remove button when an item in the Custom IDs list is selected   Remove Click the desired line item and then click the Remove button to delete it  Line items are Removed  one at atime  Contents of the text box fields are cleared at the same time     Notes       3 86       Prefix and Suffix data is always added on after stripping is complete  and is not affected by any stripping settings     If the stripping configuration results in a 0 length bar code  a good beep will still be emitted  since bar code data was read  from the scanner     Match List Rules    The data in the match list is processed by the rules listed below     Strings in the list will be searched in the order they appear in the list  If the list contains ABC and AB  in that order   incoming data with ABC will match first  and the AB will have
104. anaiona nannan 3 97  AAA coed abe seis clea Sess cate oe hae A 3 99  Date   Time         2 00 e cece cence cece cece cece cecccececcceeeceeeeeeeeeeeenteeens 3 101  DM atico cid 3 102  A A ee gs cee een ee ete an ne eee ee 3 103  Backgro  nd ss ee ee a eee ac Sen es eee Se et ae 3 103  APPearance   cosido stats See se ee es Sea co ack eke a da le Cod es De o Shas o S 3 104    vii       A E cotasauce 3 104    Gobi Connection Manager       2 2 2    eee cee cece cece cece cece cece cece eee ce cece cece AEDA Anaa naonana 3 105  Witla Sis see goa es at ee fe  Bote seca gba oat A EE AA 3 105  SIM Card Installation    2 2 2 0 0 20222 c ccc cece cece ccc ccc ccc cece cece cece ee cece aaraa aaraa eaaa aaraa 3 105  PACUIV NC asta oes act eee ae es nel cee A 3 106  HOME cn aX oa ta aa jose tie tenn ot tee eet tee ote ce tae terete tes 3 107  COMA  acc rt tia a it TOD RE Or EST 3 108  Activation Type cnn 3 108  AUMOCONMEGCL   S524 o tdo ld lil alas 3 109  Data Connection Test  cusscraslocesitrtacr ir cis caia hoe 3 109  A a ee eee ee ne sete 3 110  AUTOCOMMECL Scare 35 fa ee rs celta a ett eet ee ee Ae oe oe aka oe 3 110  Data Connection TeSt    2        0  cece cece cece cece cece ec eeeeeeeeeeneeeeneeeenneneeneeecencsccsceecuaceeeeeceeeeceaees 3 110    AA E A EOE O II ee IR PAD A ae eee 3 110  A OT AE E OTE A RR OTe 3 112  A AAA sie tet tnt seu O et aie ee tee oo teh tata SF 3 113  Transcriber    a   eee eee eee cece cece eeeeeeeceeccecacuccceceeceececceeecceececcececeeeeeeeeeeeeeeeee
105. and AppLock Help    3 40       Options Panel    AppLock contains several types of delays and timeouts to accommodate different applications  Please note that the delays  specified on the Launch panel are delays before AppLock attempts to start the specified application s   The timeouts specified  on this panel are delays after AppLock has attempted to launch the application        Administrator Control fit OK ES    Application   Security Options Status                Launch timeout   e0000  Replace timeout   20000  Restart timeout   20000                Launch timeout    This timeout specifies the period of time for AppLock to wait for the application to initially launch after the application has been  called  For example  if the application takes time to launch and then initialize before a display window is created  use this delay  to specify the delay period     Replace timeout    This timeout specifies the period of time for AppLock to wait after an initial screen  like a password prompt screen  is replaced  by another application window     Restart timeout    This specifies the period of time for AppLock to wait for an application to restart  If the application fails to restart automatically   AppLock then proceeds according to the options selected when the application was configured on the Application and Launch  panels     3 41       Status Panel    Use the Status panel to view the log of previous AppLock operations and to configure which messages are to be recorded  du
106. arameters if desired  Install accessories   Tap Start  gt  Settings  gt  Control Panel  gt  Administration icon   Assign applications on the Control  single application  or Application  dual application  tab screen   Assign a password on the Security tab screen   Select a view level on the Status tab screen  if desired   Tap OK  Press the hotkey sequence to launch AppLock and lock the configured application s     eo AN oa FON    The device is now in end user mode     Administration Mode    Administration mode gives full access to the mobile device  hardware and software configuration options     The administrator must enter a valid password  when a password has already been assigned  before access to Administration  mode and configuration options are allowed  The administrator can configure the following options     e Create change the keystroke sequence to activate administrator access    e Create change the password for administrator access    e Assign the name of the application  or applications  to lock    e Select the command line of the application to lock   In addition to these configuration options  the administrator can view and manage the status logs of AppLock sessions   Administrator default values for this device     Administrator Hotkey    Shift Ctri A    Note  You must use an extemal keyboard with the 12 key version of the Thor VM1 to enter the Administrator Hotkey   Password  none  Application path and name  none  Application command line    none    3 28      
107. art FTP Server  Stop FTP Server    o oo    eee cece cece cece ccc cece ccccecceccececcecceeeeeeeeeeeeeeeeeteeeenes 3 13   UNM Se 2 haz oe css ed le hele A A canbe Ls nuit ead ere 3 13  AA gee ee te ee a ee Nee de ei ieee 3 13   Command Prompt              2 222    2222 cece ccc cece cece cece cece cece cece cece ee ee cece cece eee eeeeeeeeeeeeeeeeeeeeseseeeeeees 3 14   EAPO S SCAM este  etc oe ieee cere RN 3 14   Intemet EXplorer   teo te ee ete i ee el ee es 3 14   Media Player o ccoountooecincio dat lt ld ia si iii 3 14   File ViewerS  cc nn cnn 3 15   Microsoft WordPad  o ooscrseniicunrt eers ieun IEEE RUPEAA AE AEST ELENAK ENEAN EANES EE RENAS REUNIR eeeeeeeenees 3 15   Remote Desktop Connection  names 3 15   ULI NS ace hen ee Se ca eee et eee ene 3 15    cl AAA A A A A EN 3 15       A A seed alee eee ae a  cee ee 3 17  ME AA sect eee tae ea RR A nage ae tee ot eda nae Sees aban Eat ae 3 17  AOVanced Tab  fick once adas anne Stake ee aaa E Reset e toda tee 3 17   Expand Control Panel                 0  ccc cccccc cece ccc c cece eee ceeceeeeeeetteeenteeenteeenneneceeeeecseeccecccceeceeueeeeeee 3 17  Clear Contents of Document Folder  ooo 3 18  Taskbar ICONE ttc e cats A ameritan tao Sous ot ten dd tl eos tte a E 3 18   Thor VM1 OS Upgrade        2 2    e cece cece AA cece cece cece eee cee cece E aa aa aae aaen 3 19  IUOGUGUON 24 scott eat est ee tees o kan nda o ee lt Stk 3 19  Preparatoria tt eaten 3 19  POCEOUTO eorura ee OL ae ta es rang etal oes ot ese BI He ee 3 19
108. assword  or  e Enter and confirm your desired password then click OK     6 48    Microsoft Certificate Services       Certificate Issued    The certificate you requested was issued to you       DER encoded or    Base 64 encoded    pss Download certificate  Download certificate chain    Click the Download certificate link     File Download   Security Warning Ed    Do you want to open or save this file     Name  certnew cer  Type  Security Certificate  1 46 KB    From  100 100 100 100    Open   Save   Cancel      potentially harm your computer  If you do not trust the source  do not    Y While files from the Internet can be useful  this file type can  open or save this software  What s the risk        Click Save to download and store the user certificate to the PC  Make sure to keep track of the name and location of the  certificate  The private key file is also downloaded and saved during this process     Be sure use the same name for the certificate file as was used for the private key file  For example  it the private key was    saved as AAAUSER PVK then the certificate file created must be given the same name  for example  AAAUSER CER        Install the user certificate     6 49       Installing a User Certificate    Copy the certificate and private key files to the Thor VM1  Import the certificate by navigating to Start  gt  Control Panel  gt   Certificates     P    Certificates    Select My Certificates from the pull down list      Certificates El OK E    Stores     ny Ce
109. at the conclusion of each reboot     e  f installed and enabled  AppLock runs automatically at the conclusion of each reboot     e Thewireless client connects automatically during each reboot     e Bluetooth re connects to nearby paired devices automatically at the conclusion of each reboot     e If installed and pre configured  Wavelink Avalanche connects remotely and downloads updates automatically during    each reboot     Communication    Start  gt  Programs  gt  Communication    ActiveSync    ActiveSync is pre loaded on the Thor VM1     Using Microsoft ActiveSync you can copy files from your Thor VM1 to your desktop computer  and vice versa     3 12       Once an ActiveSync relationship  partnership  has been established with Connect  on a desktop computer   ActiveSync will  synchronize using USB on the Thor VM1     Connect and LXEConnect    Upon cabling your Thor VM1 to the desktop laptop  and ActiveSync on the desktop laptop opens  if the Connect or  LXEConnect installation does not open on your host PC  Contact Technical Assistance     Start FTP Server   Stop FTP Server    Start  gt  Programs  gt  Communication  gt  Start  or Stop  FTP Server    These shortcuts call the Services Manager to start and stop the FTP server  The server defaults to Off  for security  unless it is  explicitly turned on from the menu     Summit    Start  gt  Settings  gt  Control Panel  gt  Summit    Use this option to set up radio client profiles   The Summit Control Panel can also be access
110. ations  eliminating  the need to communicate with the ACS server  Standard PMK is used when  there are no controllers  The reauthentication information is cached on the  original AP  The client and the AP use the cached information to perform the  four way handshake to exchange keys  Opportunistic PMK  OPMK  is used  when there are controllers  The reauthentication information cached on the  PMK Caching Standard controllers  The client and the controller behind the AP use the cached   information to perform the four way handshake to exchange keys     If the selected PMK caching method is not supported by the network  infrastructure  every roam requires full 802 11X authentication  including  interaction with the ACS server     If the active profile is using WPA2 CCKM  the global PMK Caching setting is  ignored and the client attempts to use CCKM     Options are  Standard  OPMK    WAPI Default is Off and dimmed  cannot be changed    How to handle antenna diversity when transmitting packets to the Access    Point   TX Diversity ABG  On i      Options are  Main only  use the main antenna only   Aux only  use the  auxiliary antenna only   or On  use diversity or both antennas      6 16       How to handle antenna diversity when receiving packets from the Access  Point     ABG  On Start         RX Diversity on Main Options are  Main Only  use the main antenna only   Aux Only  use the  auxiliary antenna only   On start on Main  on startup  use the main antenna    or On start on Aux
111. ator is familiar with the pairing function of the Bluetooth devices     Bluetooth Devices Display   Before Discovering Devices               LXEZ Pairing            Bluetooth Devices   Settings   Reconnect   About    Bluetooth Address                   Clear   Discover            Note  When Filtered Mode is enabled  only Bluetooth printers or Bluetooth scanners imagers are recognized and displayed  in the Bluetooth panel  All other Bluetooth devices are ignored     Initial Configuration    1  Select Start  gt  Settings  gt  Control Panel  gt  Bluetooth or tap the Bluetooth icon in the taskbar or on the desktop   2  Tapthe Settings Tab     Change the Computer Friendly Name at the bottom of the Settings display  The Bluetooth Thor VM1 default name is  determined by the factory installed software version  A unique name  up to 32 characters  should be assigned to every  Thor VM1 before Bluetooth Discovery is initiated     Check or uncheck the Thor VM1 Bluetooth options on the Settings and Reconnect tabs   5  Tap the OK button to save your changes or the X button to discard any changes     3 65       Subsequent Use    Note     wo    o No A    10     11     Taskbar and Bluetooth device Icon states change as Bluetooth devices are discovered  paired  connected and  disconnected  A taskbar Bluetooth icon with a red background indicates Bluetooth is active and not paired with any  device  A device icon with a red background indicates a disconnected paired device     Tap the Bluetooth i
112. aye eld yd eee eee wud ig Wye eee skew hls 3 54  DS COV O e a a i TE N E E E ola ee A 3 55  P PURO E E E eta aes 3 55  Bluetooth Device List  erroe ada 3 56  AAA II A ETa E shpallen de 3 56  Bluetooth Device Menu         2 2 22    000000000000 a000 1000001 cece cece Aaaa AAAA a naaraana naana 3 57  Right Click Menu Options    0  22 2    e cece cece cece cceccecceccececceceececceceeeeeeeeeeeeeeeeeees 3 57  Bluetooth Device Properties            22 2    20222222 c cece cnn 3 58  CUEING Slots es 5 lia lidia 3 59  Tum Off Bluetooth       22  225002  22 foes eae coseebee el coed EENE a REAVER ENAERE AR RREA EEE EEE aA ENAERE 3 59  A nee eect eee et ee ee ee eee eee 3 60    AAA 3 61  OPIO ase pots e e loto ee ate eat See oie ees 3 62  POU  p sete cia ce eas ee es Sete sl gece et ass pays eek ee Se ee 3 64  Using BIUCtOOIN  iseer aaa a a aa Eea a Aa rita 3 65  Initial Configuration             2 000 daaa cece cece cece cece cece cece cece ee ceeceeeeeeeeeeeeeeees 3 65  Subsequent Use nes 3 66  Bluetooth Indicators  o  ooocccccccccccccccccccccc cece cece eee ee eee eee cece ee eeeeeeeeeeeeereteeereeeees 3 67  Bluetooth Bar Code Reader Setup        0 2 2    occ eee eee cece cnn 3 68  Thor VMT With Label  ciendo oscila Soest ad eee uscanhdeld cna ioaudadse denise ss tedehieate eines 3 68   Thor VM1 without Label    22 2 2    c cece cece cece cece cnn cnn conc 3 69  Bluetooth Beep and LED Indications               2 2 2 0  222 2c eee eee eee cece cece ccc cceeeeeceeeeeeeeeees 3 70  Blue
113. ayed and Navigation functions are unavailable     When the Status checkbox is enabled  the status bar displayed by EUIE gives feedback to the end user when they are  navigating the Internet     If the standard Internet Explorer that is shipped with the mobile device is desired  it should be treated like any other application   This means that IEXPLORER EXE should be specified in the Application text box and the internet application should be  entered in the command line  In this case  do not check the Internet checkbox     3 39       Security Panel       Administrator Control fr oK E  Application   Security   Options   status      Hot Key     mooo          Password     pet 22    Confirm Password     pu mmm             Hotkey    Specify the hotkey sequence that triggers AppLock to switch between administrator and user modes and the password  required to enter Administrator mode  The default hotkey sequence is Shift Ctrl A     A 2 d key keypress is an invalid keypress for a hotkey sequence     Move the cursor to the Hot Key text box  Enter the new hot key sequence by first pressing the Shift state key followed by a  normal key  The hotkey selected must be a key sequence that the application being locked does not use  The hotkey sequence  is intercepted by AppLock and is not passed to the application     Input from the keyboard or Input Panel is accepted with the restriction that the normal key must be pressed from the keyboard  when switching modes  The hotkey sequence is displ
114. ayed in the Hot key text box with    Shift        Alt     and    Ctrl    text strings  representing the shift state keys  The normal keyboard key completes the hotkey sequence  The hotkey must be entered via  the keypad  Some hotkeys cannot be entered via the Input Panel  Also  hotkeys entered via the SIP are not guaranteed to work  properly when switching operational modes     For example  if the    Ctrl    key is pressed followed by    A        Ctrl A    is entered in the text box  If another key is pressed after a  normal key press  the hotkey sequence is cleared and a new hotkey sequence is started     A normal key is required for the hotkey sequence and is unlike pressing the normal key during a mode switch  this key can be  entered from the SIP when configuring the key  However  when the hotkey is pressed to switch modes  the normal key must  be entered from the keypad  it cannot be entered from the SIP     Password    Move the cursor to the Password text box  The passwords entered in the Password and Confirm Password fields must match   Passwords are case sensitive     When the user exits the Administrator Control panel  the two passwords are compared to verify that they match  If they do not  match  a dialog box is displayed notifying the user of the error  After the user closes the dialog box  the Security Panel is  displayed and the password can then be entered and confirmed again  If the passwords match  the password is encrypted and  saved     See Also  Passwords 
115. bar icon  the current signal level and radio interface are displayed        Note  The similar Summit wifi icon in the task bar uses red  yellow and green bars     EN There is no WWAN connection present   EN  105 dbm to  86 dbm signal strength  EN  85 dbm to  66 dbm signal strength     65 dbm to  46 dbm signal strength   45 dbm or higher signal strength    Initial Use       Some carriers such as AT amp T and T Mobile require a SIM card for use on their networks  Other carriers such as Verizon use a  CDMA network and must be activated  Please refer to the sections below for more details     SIM Card Installation    Depending on the carrier  a SIM card may be necessary for WWAN connection  To install a SIM card   1  Place the Thor VM1 in Suspend   2  Remove the Thor VM1 from the Quick Mount Vehicle Dock   3  Place the Thor VM1 face down on a stable surface   4    Use a Phillips screwdriver  not supplied  loosen the screws and then remove the tethered access panel with the SIM  label  This panel is on the right hand side when the Thor VM1 is face down with the top away from the user     Install the SIM card in the slot   6  Reattach the access panel  torquing the screws to 4 to 5 inch pounds     a    3 105       7  Reinstall the Thor VM1 in the Dock   8  Resume the Thor VM1 from suspend     Activate    To activate service fora CDMA carrier such as Verizon  complete the necessary entries on the CDMA tab     3 106       Home    Use the Home tab to update firmware and view the statu
116. beyond the specified operating parameters  or  E  repair or  service of the product by anyone other than HII or its authorized representatives     This warranty shall extend from the time of shipment for the duration published by HII for the product at the time of purchase    Warranty Period    Any defective product must be returned  at purchaser   s expense  during the Warranty Period to HII factory  or authorized service center for inspection  No product will be accepted by HII without a Return Materials Authorization  which  may be obtained by contacting HII  In the event that the product is returned to HII or its authorized service center within the  Warranty Period and HII determines to its satisfaction that the product is defective due to defects in materials or workmanship   HII  at its sole option  will either repair or replace the product without charge  except for return shipping to HII    EXCEPT AS MAY BE OTHERWISE PROVIDED BY APPLICABLE LAW  THE FOREGOING WARRANTY IS IN LIEU OF  ALL OTHER COVENANTS OR WARRANTIES  EITHER EXPRESSED OR IMPLIED  ORAL OR WRITTEN  INCLUDING   WITHOUT LIMITATION  ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR  PURPOSE  OR NON INFRINGEMENT    HIPS RESPONSIBILITY AND PURCHASER   S EXCLUSIVE REMEDY UNDER THIS WARRANTY IS LIMITED TO THE  REPAIR OR REPLACEMENT OF THE DEFECTIVE PRODUCT WITH NEW OR REFURBISHED PARTS  IN NO EVENT    9 1       SHALL HII BE LIABLE FOR INDIRECT  INCIDENTAL  OR CONSEQUENTIAL DAMAGES  AND  IN N
117. bled     The Admin Login button provides access to editing wireless parameters  Profile and Global may only be edited after entering  the Admin Login password     The password is case sensitive     6 4       Auto Profile    If the Auto Profile selection is not present on the Main tab  an SCU upgrade is necessary to support this feature on the Thor  VM1     Auto Profile allows the user to configure a list of profiles that the SCU can search when a radio connection is lost  After using  the Profile tab to create any desired profiles  return to the Main tab  To specify which profiles are to be included in Auto Profile   click the List button                  SSIDO3     SSIDO4       The Auto Profile selection screen displays all currently configured profiles  Click on the checkbox for any profiles that are to be  included in Auto Profile selection then click ok to save     To enable Auto Profile  click the On button on the Main tab     When Auto Profile is On  if the radio goes out of range from the currently selected profile  the radio then begins to attempt to  connect to the profiles listed under Auto Profile     The search continues until   e the SCU connects to and  if necessary  authenticates with  one of the specified profiles or  e the Off button is clicked to tum off Auto Profile    Note  Do not include any profiles with an Ad Hoc Radio Mode in this listing     Once logged in  the button label changes to Admin Logout  To logout  either tap the Admin Logout button or exit
118. bled unchecked  or the discovery result displays Bluetooth    Filtered Mode scanners and printers only  Filtered Mode is enabled checked    When Filtered Mode is disabled  the Thor VM1 can pair with up to four Bluetooth devices     A Warmboot is required every time Filtered Mode is toggled on and off     This option is Disabled by default    Printer Port   COM7 This option assigns Bluetooth printer connection to COM7 instead of COM19  To enable this  option  Filtered Mode must be enabled   This option is Disabled by default     When logging is enabled  the Thor VM1 creates bt_log txt and stores it in the  System folder   Bluetooth activity logging is added to the text file as activity progresses  A bt_log_bak txt file  Logging contains the data stored by bt_log txt prior to reboot     During a reboot process  the Thor VM1 renames bt_log txt to bt_log_bak txt  If a file already  exists with that name  the existing file is deleted  the new bt_log_bak txt file is added and a  new bt_log txt is created     Default  Computer System Name  System Panel  gt  Device Name tab      Computer Friendly Name   The name  or identifier  entered in this space by the System Administrator is used exclusively  by Bluetooth devices and during Bluetooth communication        3 60       Reconnect       LXEZ Pairing   OK E      Bluetooth Devices   Settings   Reconnect   about           M  Report when connection lost   7 Report when reconnected  M Report failure to reconnect      Clear Pairing Table on
119. ce ce ceeeceeeeeeeeeeeeeeteeeees 3 149  Current A A A A 3 149  Automatic Brightness Control               0 000000 e cece cece ee ceceeeeeeceeecccceseeeeees 3 149  VIS ore eases ot rae oe nd apes oe eee eet ee eee ee te ee 3 150  DOUDIC   apie  occ aos a io o Seas ahs te foe 3 150  CAMA ic sable emameadelesecanads 3 150  VSCOM tt tas a EN he iS E toate etd e At ao A AI Ss Soa oe LS tes 3 151  General TaD  comprvotostnontes oe LSS Cao A 8 total aser Uo he Deo ot ica 3 151  Memor Vabii c2 cute  cis asocia te raise st toscana  3 152  Device Name Tabo 3 152  Copyrights Wabi    220  s2  52 82s ti sitet nen ia A ir 3 153  Terminal Server Client Licenses               000000000 cece cece cece cece cece cece eaaa aa aa aaraa nanana 3 154  Volume and Sounds       2 2 22  2 2 eee 3 155  Good Scan and Bad Scan Sounds       0 0    ns 3 156  WiFi Control Panel ne 3 157  Chapter 4  ActiveSync 4 1  limtrOGUCIONG    22 22 cv ee oie A bey a eed e ee td eee de ee 4 1  MESA A 4 2  Connect AYT  HOES  cece cece cc ccc cece cece ccc cece cece cece cece cece cece eeeceeeeeeeeeeeeeeteeteeeeeeneenees 4 2  Cable for USB ActiveSync Connection             2 0022 e cece cece eceeececeeeeeceeeeeeees 4 2          Backup Data Files using ActiveSync      ooooocccccccccccccccccccccccccconn nro 4 3  Prerequisites  2 25 EE EA EE e ei a rd de o e seats ae tons 4 3  COTM GC Esc es as sh a NY A AN 4 3   DOCM 0i nn nn cn nnccananies 4 4   Thor VM1 with a Disabled Touch Screen    0 2 22    cece cece cece cocos 4 4  
120. cess ahead of    Ping Timeout ms the ping timeout     Options are  Any number between 0 and 30000 ms     The amount of time  in milliseconds  between each ping after a Start Ping  Ping Delay ms 1000 button tap   Options are  Any number between 0 and 30000 ms     Note  Tap the Commit button to save changes  If this panel is closed before tapping the Commit button  changes are not  saved        6 18       Sign On vs  Stored Credentials    When using wireless security that requires a user name and password to be entered  the Summit Client Utility offers these  choices     e The Username and Password may be entered on the Credentials screen  If this method is selected  anyone using the    device can access the network     e The Username and Password are left blank on the Credentials screen  When the device attempts to connect to the    network  a sign on screen is displayed  The user must enter the Username and Password at that time to authenticate     How to  Use Stored Credentials    oa FF WON SB    After completing the other entries in the profile  click on the Credentials button    Enter the Username and Password on the Credentials screen and click the OK button    Click the Commit button    For LEAP and WPA LEAP  configuration is complete    For PEAP MSCHAP and PEAP GTC  importing the CA certificate into the Windows certificate store is optional     For EAP TLS  import the CA certificate into the Windows certificate store  Also import the User Certificate into the  Windows c
121. checked   devices are not reconnected on boot  but are reconnected in other  situations  example  return from out of range      When Auto Reconnect is enabled  checked  and Clear Pairing Table on Boot is enabled   checked   devices are not reconnected on boot  but are reconnected in other situations   example  return from out of range   The pairing table is cleared on boot  The status of  Auto Reconnect on Boot is ignored and the option is automatically disabled  unchecked   and dimmed        3 63       About       LXEZ Pairing   OK El      Bluetooth Devices   Settings   Reconnect   About          com Friendly Name i   Bluetooth Address     00 40 FD 02 03 04             BTC version 1 0 BTDRPX361Jw  Bluetooth Stack Revision  2 1  Bluetooth Radio HCI 4 4839        Copyright 2006 2011 LXE Inc             This panel lists the assigned Computer Friendly Name  that other devices may discover during their Discovery and Query  process   the Bluetooth MAC address  and software version levels  The data cannot be edited by the user        Using Bluetooth    Start  gt  Settings  gt  Control Panel  gt  Bluetooth or Bluetooth icon in taskbar or Bluetooth icon on desktop    Q    3 Bluetooth taskbar icon    The Thor VM1 default Bluetooth setting is Enabled    The Thor VM1 Bluetooth   module is designed to Discover and pair with nearby Bluetooth devices    Prerequisite  The Bluetooth devices have been setup to allow them to be    Discovered    and    Connected Paired     The System  Administr
122. ck can be set via the Misc tab in Start  gt  Settings  gt  Control Panel  gt  Options     The Thor VM1 keyboard keys are backlit     By default  the keyboard backlight follows the display backlight  When the display backlight is on  the keyboard  backlight is on     If the display backlight brightness is increased  or decreased  the keyboard backlight brightness is increased  or  decreased      The keyboard backlight and the display share the same timer  which is configured in Start  gt  Settings  gt  Control Panel  gt     Power   The keyboard backlight can be disabled  See Start  gt  Settings  gt  Control Panel  gt  Options  gt  Misc tab     8 1       Note     To get this Key   Function Press These Keys in this Order    Power On Suspend Power    Fo    nd  nd  nd  nd  aooo i E  SC  nd  d  d       Ctrl C  Esc E    Shift    t  ECC E  COTOS CAMA  AI A  CEC CN    BkSp    Back Tab 2nd Tab    os o o  Fase    F1 F10 F1 F10       When automatic brightness control is enabled for a Thor VM1 with an Outdoor display  the manual display brightness  controls in the table below have no effect     8 2    f    a R  E TARA  po py    A JE po     A ee Ed  oo E IE  C e a AAA  AAA  AO  BEAN   gt  OOOO  CI COS IE  ARA  AA  ESOS  ARANA ME  CO CCOO IES  AAA  a       AAA HA  Y      EOI   ae NES  AAA  AAA AAA  AAA AAA  AA  AAA E   PA  rs EAN  CAES  AAA EA  oe  ETA a  AAA A  AAA AAA       8 3      a    N     oa       VK_PERIOD     ii     a    N     Qa       8 4       8 5       12 Key Keypad Key Map    T
123. combinations are validated     When RF Term is installed on the mobile device and an RFTerm restricted key sequence is specified as a hotkey sequence by  the Administrator  the following error message is displayed in a message box     Selected hotkey is not allowed  Please reenter        When RFTerm is not installed on the mobile device  the RFTerm keys are not restricted from use   Can   t locate the password that has been set by the administrator     Contact Technical Assistance for password help     AppLock Error Messages    Any messages whose first word is an    ing    word is output prior to the action described in the message  For example     Switching  to admin hotkey press    is logged after the administrator has pressed the hotkey but prior to starting the switch process     For all operations that can result in an error  an Error level message is displayed when a failure occurs  These messages  contain the word    failure     These messages have a partner Extended level message that is logged which contains the word     OK    if the action completed successfully rather than with an error     For processing level messages     Enter       is logged at the beginning of the function specified in the message and    Exit       is  logged at the end  just before the return  of the function specified in the message     Explanation and or corrective action  Error reading hotkey The hotkey is read but not required by AppLock  LOG_EX    Error reading hotkey  A hotkey is requir
124. con in the taskbar or on the desktop to open the Bluetooth LXEZ Pair application   Tap the Bluetooth Devices tab     Tap the Discover button  When the Bluetooth module begins searching for in range Bluetooth devices  the button name  changes to Stop  Tap the Stop button to cancel the Discover function at any time     The discovered devices are listed in the Bluetooth Devices window    Highlight a Bluetooth device in the Discovered window and double tap to open the device properties menu   Tap Pair as Scanner to set up the Thor VM1 to receive scanner data    Tap Pair as Printer to set up the Thor VM1 to send data to the printer     Tap Serial Device  when Filtered mode is disabled  to set up the Thor VM1 to communicate with a Bluetooth serial  device     Tap Disconnect to stop pairing with the device  Once disconnected  tap Delete to remove the device name and data  from the Thor VM1 Bluetooth Devices list  The device is deleted from the list after the OK button is clicked     Upon successful pairing  the selected device may react to indicate a successful connection  The reaction may be an  audio signal from the device  flashing LED on the device  or a dialog box is placed on the Thor VM1 display     Whenever the Thor VM1 is turned On  all previously paired  live  Bluetooth devices in the vicinity are paired  one at a  time  with the Thor VM1  If the devices cannot connect to the Thor VM1 before the re connect timeout time period  expires  default is approximately 20 seconds f
125. cted to an  external power source  such as based on a docking event     Contact Periodically     Allows the administrator to configure the Enabler to contact the Mobile Device Server and query for  Periodic Update updates at a regular interval beginning at a specific time     Wakeup device if sus    If the time interval for periodic contact with the Mobile Device Server occurs  a mobile device that is  pended in Suspend Mode can wakeup and process updates     Reboot before attempt   Reboot mobile device before attempting to contact Mobile Device Server   Require external power   Only connect when the mobile device has external power        5 11       Data       Avalanche Update Settings OK          Data   Preferences   Display   Taskbar   Execution   Scan Confic_4   gt   Real time Statistics   Network LAN   wifi    Report ho  hour s  y      After Server     Retransmit  Contact         Restrict Bandwidth to User Idle Time    Idle Timeout  F  minute  y                 The Data tab controls when data is transferred between the Thor VM1 and the Mobile Device Server     Network When checked  the LAN WiFi network is enabled to transfer statistics     Report Specifies the Report Interval  how frequently the Enabler reports statistics to the Mobile Device  Server     Retransmit After Specifies if the device sends statistics to the Mobile Device Server immediately following a con   Server Contact nection to the server     Restrict Bandwidth to   When enabled  periodic updates from the
126. d  x    3 51       Battery    Start  gt  Settings  gt  Control Panel  gt  Battery    This panel is used to view the status and percentage of power remaining in the Thor VM1 UPS battery     The battery gas gauge icon resides in the system tray and shows four levels of charge     100   75   50   25    At a point below 25   the system status LED will turn red and the gas gauge icon will turn red indicating the bat   100 tery is low     The battery gauge icon is enabled by default  but can be disabled on the Thor VM1 Battery control panel   Jacked is shown in the Status box when the UPS battery is receiving external power        7 fox x       Status     UPS  12 500 Y JACKED  UPS  Power remaining  100     Battery Toolbar Icon                3 52       Bluetooth    Start  gt  Settings  gt  Control Panel  gt  Bluetooth    Note  Contact Technical Assistance for upgrade availability if your Bluetooth control panel is not the same as the control    panels presented in this section     Discover and manage pairing with nearby Bluetooth devices     Factory Default Settings    Discovered Devices None    Turn Off Bluetooth Enabled    Prompt if devices request to pair    f Disabled  unchecked  by default in both Filtered and Non Fil   PAE ae tered Modes  The option is dimmed in Non Filtered Mode     Report failure to reconnect  Clear Pairing Table on boot       3 53       Bluetooth taskbar Icon state and Bluetooth device Icon states change as Bluetooth devices are discovered  paired  connect
127. d PEAP GTC  importing the CA certificate into the Windows certificate store is optional     For EAP TLS  import the CA certificate into the Windows certificate store  Also import the User Certificate into the  Windows certificate store     4  Access the Credentials screen again  Make sure the Validate server and Use MS store checkboxes are checked     5  The default is to use the entire certificate store for the CA certificate  Alternatively  use the Browse button next to the    CA Cert  CA Certificate Filename  on the Credentials screen to select an individual certificate     6 19       6  ForEAP TLS  also enter the User Cert  User Certificate filename  on the credentials screen by using the Browse  button     7  Click the OK button then the Commit button   8  When the device attempts to connect to the network  a sign on screen is displayed   9  Enter the Username and Password  Click the OK button              Summit Credentials A    User     Password          10  Verify the device is authenticated by reviewing the Status tab  When the device is property configured  the Status Tab  indicates the device is Authenticated and the method used     11  The sign on screen is displayed after a reboot   Note  See Configuring the Profile for more details     If a user enters invalid credentials and clicks OK  the device associates but does not authenticate  The user is again prompted  to enter credentials     If the user clicks the Cancel button  the device does not associate  The use
128. d Use Avalanche Network Profile   Click the OK button to save the changes     NQOaF ON    Reboot the device     5 4       Preparing a Device for Remote Management    Two additional utilities are necessary for remote management   e The Remote Management Utility  RMU  must be installed on all mobile devices first     then you can control mobile  device reboot  storage RAM adjustment  real time updates and Avalanche Enabler properties  If the RMU is not already    installed on the Thor VM1  see Using Wavelink Avalanche to Upgrade System Baseline   If in doubt  verify RMU CE CAB exists in the  System folder  If the RMU CE CAB file is present when the Enabler is    installed  the RMU is also installed     Important  If the OS package includes double byte Asian fonts  the storage RAM property of the RMU must be higher  than the default value  40MB      If the amount of storage RAM is too low  the Enabler returns a    Mobile unit out of resources    error     e Use the Wireless Configuration Application  WCA  when you want to remotely manage the Summit client device   This utility is downloaded and installed in addition to the Remote Management Utility  The WCA is included when the  Summit radio driver software is updated  The WCA is automatically installed when the radio driver is updated     If the Remote Management Utility  RMU  is not present on the Thor VM1  see Using Wavelink Avalanche to Upgrade System  Baseline     5 5       Using Wavelink Avalanche to Upgrade System Baselin
129. d the printer are currently  paired     3 70       Easy Pairing and Auto Reconnect    The Bluetooth module can establish relationships with new devices after the user taps the Discover button  It can auto   reconnect to devices previously known but which have gone out of range and then returned within range  See Also    Reconnect     Note  Configuration elements are persistent and stored in the registry   Setup the Bluetooth module to establish how the user is notified by easy pairing and auto reconnect events     AppLock  if installed  does not stop the end user from using the Bluetooth application  nor does it stop other Bluetooth enabled  devices from pairing with the Thor VM1 while AppLock is in control     3 71       Certificates    Start  gt  Settings  gt  Control Panel  gt  Certificates    Manage digital certificates used for secure communication   Note  Digital certificates are date sensitive  If the date on the Thor VM1 is incorrect  wireless authentication will fail     Certificates ka OK Ed    Stores             Cl   Class 3 Public Primary Certification Authority  Entrust net Certification Authority  2048   Entrust net Secure Server Certification Authorit  Equifax Secure Certificate Authority   GlobalSign Root CA ly     The Certificates stores tab lists the certificates trusted by the Thor VM1 user           Lists the certificates  trusted by you          These values may change based on the type of network security resident in the client  access point or the host 
130. dmin   kbdhook dll not found    Switching to admin   keyboard hook  initialization failure    Switching to admin   registry read failure    The system is currently in user mode and is now switching to admin mode  The       LOG_  switch occurred because of the backdoor key presses were entered by the PROCESSING  administrator     The system is currently in user mode and is now switching to admin mode  The LOG_  switch occurred because of a hotkey press by the administrator  PROCESSING    The keyboard hook load failed  so AppLock switches to admin mode  If a password  is specified  the password promptis displayed and remains until a valid password is LOG  a ee ld ii i i ap  S   PROCESSING    If the keyboard hook initialization fails  AppLock switches to admin mode  If a  password is specified  the password prompt is displayed and remains until a valid  password is entered     LOG_  PROCESSING    See the explanation of the    Registry read failure    above  AppLock is switching into  Admin mode  If a password has been configured  the prompt will be displayed and  will not be dismissed until a valid password is entered     LOG_  PROCESSING    Switching to In administration mode  the taskbar is visible and enabled  LOG EX  TaskbarScreenMode     Sassi The registry was successfully read and AppLock is starting the process to switch to  LOG_  Switching to user hotkey   The system is currently in admin mode and is now switching to user mode  The LOG_  press switch occurred because of 
131. driver bit    Caution  A Before replacing the Thor VM1 UPS battery  the internal UPS battery must be disconnected        The UPS battery in the Thor VM1 is field replaceable  Should the UPS battery fail  it can easily be replaced to minimize  downtime     Replace UPS Battery    Place the Thor VM1 on a clean  well lit surface before performing the UPS battery replacement   Place the Thor VM1 in Suspend by pressing the Power button    Remove the Thor VM1 from the Quick Mount Smart Dock    Disconnect the UPS    Loosen the fourteen  14  captive M3 screws holding the front panel  Use a  2 Philips bit     a FF OUN                      2 45       5     10     11     Carefully lift the front panel away from the device                 i a  o i o  A  Wiring Connector  C   I B  UPS Battery  i i  Ji     C  Foam Pads                      4       ER _   Y        D  Release Tab on    D Wiring Connector    Note the orientation of the UPS battery  Lift the UPS battery out of the battery well and place it outside the well  Do not  pull on the wires attaching the battery to the Thor VM1 while lifting the battery     Locate the retaining tab on the wiring connector forthe UPS battery  Press on the tab and gently disconnect the UPS  battery wiring from the Thor VM1     Remove the old battery and set it aside   Inspect the battery well to verify the two foam pads are still in place     Align the wiring connector on the new UPS battery with the connector on the Thor VM1  Gently press the connector 
132. e    This procedure assumes the Avalanche Enabler is already installed on the Thor VM1 and is already in communication with the  Avalanche MC Console     Part 1   Bootstrapping the RMU    1     oa kw    Install the RMUC Ebt package into the Avalanche MC Console  Do NOT include the Reboot option as part of the  configuration  i e  the Reboot button in the    Reboot Options    branch must be unbolded      Enable ONLY the RMUCEbt package in the Avalanche MC Console and update the devices  The RMU is downloaded  and automatically installed     Disable the RMUCEbt package in the Avalanche MC Console    For each device  double click on the device to open the Client Controls dialog box   Check the Delete Orphaned Packages checkbox and click the Update Now button   After the sync completes  uncheck Delete Orphaned Packages and close the dialog box     Part 2     Installing Packages    Enable the RMUCE package in the Avalanche MC Console     Enable all remaining packages and send them down  It is important that you include the new OS package in this group   be sure to include the Enabler   If the radio is to be managed remotely  it is important to include the radio package in this  group so that after the reboot the radio can automatically associate  If the radio package is not sent  the device loses  connection to the network and manual configuration of the radio parameters is required     Set the Reboot setting for the OS package to Auto       After all packages are downloaded  this
133. e   memory resource issues requiring an end user response  etc  Also at the administrators discretion  these types of applications  can be started manually  see Manual  Launch   by the end user     3 38       End User Internet Explorer  EUIE     AppLock supports applications that utilize Internet Explorer  such as  HTML pages and JAVA applications  The end user can  run an application by entering the application name and path in Internet Explorer   s address bar     To prevent the end user from executing an application using this method  the address bar and Options settings dialog are  restricted in Internet Explorer  This is accomplished by creating an Internet Explorer that is used in end user mode  End user  Internet Explorer  EUIE EXE   The EVIE executes the Internet Explorer application in full screen mode which removes the  address bar and status bar  The Options Dialog is also removed so the end user cannot re enable the address bar     The administrator specifies the EUIE by checking the Internet checkbox in the Application tab of the Administrator applet  The  internet application should then be entered in the Application text box     When the Internet checkbox is enabled  the Menu and Status check boxes are available     Enabling the Menu checkbox displays the EUIE menu which contains navigation functions like Back  Forward  Home   Refresh  etc   functions that are familiar to most Internet Explorer users  When the Menu checkbox is blank  the EUIE menu is  not displ
134. e  7   14  2010    Service Contract Indicator  48 Months    SIN  GUID 7B5C011F 5DD9 79C4 5504 462E0906447C             Software and driver version information is located in the About control panel  Copyright information is located in the System  control panel     3 124       Mixer    Start  gt  Settings  gt  Control Panel  gt  Mixer    The Thor VM1 has two speakers  located at the bottom front of the unit  and one microphone  located at the top front of the  unit      Use the settings on these panels to adjust the master volume  record gain and sidetone     Factory Default Settings    Master Volume  15dB    oe  0 0 dB    Output Panel          Mixer   Foxy x    Output   Input           Master Yolume    15 dB     a          gt               Tap and hold the Master Volume slider and move either left or right  or tap the left and right arrows  to adjust Speaker volume  decibel level     Tap the Test button to play a sample sound at the selected volume     3 125       Input Panel       Output   Input  Record Gain   0 0 dB Sidetone   0 0 dB    K    Ata EE    O Enabled  8  Disabled    rra rra          Use the radio buttons to enable or disable the sidetone     Tap and hold the Record Gain or Sidetone sliders and move either left or right  or tap the left and right arrows  to adjust the  levels     3 126       Mouse    Start  gt  Settings  gt  Control Panel  gt  Mouse    Use this option to set the double tap sensitivity for stylus taps on the Thor VM1 touch screen     Mouse Propertie
135. e 3 128  Network Capture  00    eee eee cece cee ec cece cceccccceccececcecceccceeececeeceececeeceeeeeeeeeeeeeeeteteetenees 3 129  ING OOP  coat aie ete ee Se et hd eee eee ee ea ca ene inst A 3 129  PAS 3 131  A A st ed 3 132    Enable TCP IP Version 6 1 2 2    22 222 c cece e cece cece cece cece ns 3 133   Allow Remote Desktop Autologon                0  000000 c cece ccc ccc ccc cece cece cece cece cece cee eeeteeeeeeeeeeeeeeerees 3 133  Autolaunch TimeSync    2    eee eee cee ccc e cece cece cece e cece cece cece cece cece eeeeeeeeeeeeeeeteees 3 133  A A cee ah cena a tee aden naemncancee sees 3 134    A AA ae ee ee a a sot e eS cclee A e tho d 3 134   Touch Screen Disable  e occorre rannen aK eee 3 134  Enable Keypad Backlight        2 00 02 222022 c ccc e eee e cece cnn 3 134  Enable Alto  tao o ct 3 134  Status POPUP a tia 3 135  A ne A apo EE ace ae ne rete eee 3 136  Poc SWOON aa ac eat hk a ke ees Se 3 138  TA Aa eee O eae a eget n eess ce 3 139  Penpheral S merae koe ok a a ta e ee ate cs ala ht ee sel a ne et a 3 140  POW Cle os oie ts cs cea as A aa gan teers ete one Adee cia 3 141  Regional and Language Settings           oococccccccccccccccccccccccnnnnnn e cece cece cece Aaaa oa rairaon aranna 3 143  ReGISHY  200  eee cece cece cece cece cece cece ce ececcecceccececceceeeeeceeeeeeeeeeeteestetteteeeettetettnettttnetnenseees 3 145  Remove Program Sis  voccuonosrecccnin cana lectiva ee 3 146  Sic 3 147  Screen Blanking  ooo cece cece cece cece ce cece cece cece ce
136. e Clear button to remove  dear    AS the contents of the Documents    Menu                  Expand Control Panel    Expand Control Panel    Tap the checkbox to have the Control Panel folders appear in drop down menu format from the Settings  gt  Control Panel menu  option     3 17       Clear Contents of Document Folder    Tap the Clear button to remove the contents of the Document folder     Taskbar Icons    As Thor VM1 devices and applications open and change state  icons are placed in the Taskbar  In most cases  tapping the icon  in the Taskbar opens the related application     Refer to Start  gt  Help for an explanation of standard Windows CE taskbar icons   Following are a few of the Thor VM1 taskbar icons that may appear in the Taskbar  These icons are in addition to the Windows  CE taskbar icons     Wireless Zero Config Inactive   Connected   Not Connected  Clicking on the icon opens the Wireless Zero Config utility    Bluetooth connected   disconnected  Clicking the icon opens the Bluetooth control panel      se ActiveSync Connection  Cerdisp connected  displayed when LXEConnect is connected     Summit Client signal indicator no signal   excellent signal  Clicking on the icon opens the Sum   mit Client Utility     Gobi Connection Manager  WWAN  signal indicator no signal   excellent signal  Clicking on the  icon opens the Gobi Connection Manager     UPS battery charge indicator  Percent of battery charge is indicated  External power connected   connected and UPS batte
137. e Enabler should first check for serial port connection to the Mobile Device Server  Connection before checking for a wireless connection to the Mobile Device Server     a AE Disable ActiveSync connection with the Mobile Device Server     Restict   Default is disabled  Minimum Link Speed dimmed  When enabled  the Enabler only allows a connection to  Adapter Link    the server if the detected link speed is greater than or equal to the specified value     Speed       5 10       Server Contact       Avalanche Update Settings OK E          server Contact   Data   Preferences   Display   Taskbar   Execu_4   gt    Y Sync clock     Contact periodically      Y Contact on startup  every  i PTE       Contact on resume                Contact on IP change re  a E it M Wakeup device if suspended    E Reboot before attempt   L  Require external power  O Use relative offset          Note  Your Thor VM1 screen display may not be exactly as shown above  Contact Technical Assistance for upgrade  availability and version information     Sync Clock Reset the time on the Thor VM1 based on the time on the Mobile Device Server host PC   On Startup     Connect to the Mobile Device Server when the Enabler is accessed   On Resume     Connect to the Mobile Device Server when resuming from Suspend mode     Contact On IP Change     Connect to the Mobile Device Server when the IP address of the Thor VM1  changes     On Ext  Power     Initiate connection to the Mobile Device Server when the device is conne
138. e Profile    Use the instructions in this section to complete the entries on the Profile tab according to the type of wireless security used by  your network  The instructions that follow are the minimum required to successfully connect to a network  Your system may  require more parameters than are listed in these instructions  Please see your system administrator for complete information  about your network and its wireless security requirements     To begin the configuration process   e Onthe Main Tab  click the Admin Login button and enter the password     e  f using a single profile  edit the default profile with the parameters for your network  Select the Default profile from the  pull down menu     e Make any desired parameter changes as described in the applicable following section determined by network security  type and click the Commit button to save the changes     IMPORTANT     Remember to click the Commit button after making changes to ensure the changes are saved  Many versions  of the SCU display a reminder if the Commit button is not clicked before an attempt is made to close or browse away from the  tab in focus if there are unsaved changes     If changes are made to the stored credentials  click Commit to save those changes first before making any additional changes     6 23       No Security    To connect to a wireless network with no security  make sure the following profile options are used   e Enter the SSID of the Access Point assigned to this profile 
139. e default BIOS parameters are configured at that  time  In most cases  it is unnecessary to modify the BIOS parameters     Generally  it is only necessary to enter the BIOS setup to change the boot order of the drives     This section is not intended to detail all features of the BIOS  instead it is intended to cover the most commonly used setup  options     Be very careful when using this utility to modify BIOS Setup parameters  The Thor VM1 may generate unexpected  results when incorrect or conflicting parameter values are entered  Selecting incorrect or invalid options may    require the Thor VM1 to be returned for repairs   The parameters should only be modified by Information Services personnel or the system administrator        Accessing the BIOS Setup    When the Embedded BIOS screen  Phoenix Technologies  is displayed press the Del key to enter BIOS setup   Use the arrow keys to move around the screen   To access and modify the BIOS on the Thor VM1 with 12 key keyboard  an external keyboard must be attached     Boot Order    To view or edit the boot order  select the Boot tab   By default  the first device in the boot orderis USB Hard Drive   The second device is the Windows CE Image     If a USB drive  such as a thumb drive is attached to the Thor VM1  the device attempts to boot from the USB drive   e lf the USB drive contains a bootable sector  the Thor VM1 boots from the USB drive     e Ifthe USB drive does not contain a bootable sector  the Thor VM1 does not boot
140. e keyboard backlight brightness is increased  or  decreased     The keyboard backlight and the display share the same timer  which is configured in Start  gt  Settings  gt  Control Panel  gt   Power    The keyboard backlight can be disabled  See Start  gt  Settings  gt  Control Panel  gt  Options  gt  Misc tab     The integrated keypad contains five programmable keys  a blue modifier key and an orange modifier key     2 28       Keyboard LEDs    Shift LEDs    Note  The 64 keyThor VM1 has two Shift keys with an LED beside each key  The 12 key Thor VM1 has a single Shift key  and LED     The Shift LEDs indicate the state of the keyboard Shift mode  If Shift is enabled the Shift LEDs beside both Shift keys  64 key  only  blink green  When CapsLock is enabled  both Shift LEDs  64 key only  are lit solid green  When Shift and CapsLock are  both off  the LEDs are off     Press either Shift key to toggle Shift On and Off  press 2nd plus either Shift key to toggle CapsLock On or Off     Secondary Keys LED    The Thor VM1 keyboard is equipped with several secondary keys  These keys are identified by the superscript text found on  the keyboard keys     The secondary keys are accessible by using two  2  keystrokes  the 2nd key followed by the superscript key     Once the 2nd state is enabled  by pressing the 2nd key  the Secondary Mode LED is illuminated and the 2nd state is enabled  until another key is pressed     The 2nd key is toggled on with a 2nd key press and then immediately off
141. e tab displays the localized language version of the OS image   e English only     No additional languages are built into the OS  e Japanese  e Simplified Chinese  e Traditional Chinese  e Korean  e Spanish  e French  e German  e Thai    The above listed Asian languages are ordered separately and built in to the OS image  Built in languages are added to registry  entries and are available immediately upon startup  Thai  Hebrew  Arabic and Cyrillic Russian languages are available in the   English only  default  extended  fonts     3 23       Identifying Software Versions  The Versions tab displays the versions of many of the software programs installed  Not all installed software is included in this    list and the list varies depending on the applications loaded on the Thor VM1  The Image line displays the revision of the  system software installed  Refer to the last three digits to determine the revision level     MAC Address    The Network IP tab displays the MAC address of the network card     3 24       Accessibility    Start  gt  Settings  gt  Control Panel  gt  Accessibility    Customize the way the Thor VM1 keyboard  sound  display  mouse  automatic reset and notification sounds function  There  are a few changes from general Windows desktop Accessibility options     Sticky Keys   Disabled  cannot be enabled    Keyboard    ToggleKeys   Disabled by default  Tap the Use ToggleKeys checkbox to enable this option  Tap the Settings but   ton to view or change parameters    
142. eceeeeeeeeeeeeeeees 2 31  UPS Status LED    2 02    ccc ccc cece cece ccc eecccecceeeecccceeeececccceeeeeteeecceceeeeeeccceceeteececceeeeeteecees 2 32  External Power Present            0 000000000000 cnc 2 32  External Power Not Present            000 000000002 ccc c cece cc ccc nn 2 32   SSD  Solid State Drive  LED          0000000 000 e ce cece cece cece ee eeeeeeeeeeeeeeeeeeeeeeeeeees 2 32  Connection LED Si  ts ld ocd o lero ati bl e dt 2 33  WWAN LED separ ett it its 2 33  MA A ee a ee gee ge tee IA 2 33  Bluetooth PEDO   oo asia es aero ce ee oe eee ss Se 2 33  Keyboard LEDS               0  ccc cccecc cece cece cece cee nono nncnccnncccces 2 34  UNA Ba isi ot ais oido das 2 34  P LE D Lt ae ae lah sh ae ae ae ha Srl ace ath Sel op ys ta ates ase Tes ere alae 2 34  acetate seas et ee ene ae ee ae ate td Set et Malate tat 2 34   TANI ns 2 35   DUS Axa ees eee ec ce tee A at Ea eeee ee  2 36  TOUCH  S Cree e cece ok eos oles Sete ae ie seek ao te ese oe nie ane Mane see ds oia 2 36  Touch Screen Defroster  cc 2 36  Screen Blanking    2 2    eee eee cece cece cece cece cece cece cece ec cececceccececceecccceeeeeeeeeeeeeeeeeteeeeteteeeees 2 36  Display Backlight Control             000 0000000 nn nc cccnncccio 2 36  Disconnect UPS Battery  ooo e cece cece cece cece cece cece ceeeeeeceeeeeeeeeeeeeees 2 37  InstalllSD Gard   0 si o ti io sa gets dint eae ee allele Soe oes ape ge see eee es 2 39  Install  SIM Gare    co    ooi ocd oho cok a EE 2 41  Field Replaceable Front Pa
143. ecommended   o Transcend   2GB Industrial SD card  80X Speed    TS2GSD80I    o ATP 4GB Industrial Grade SDHC card   AF4GSDI  For convenience  the Thor VM1 can be removed from the Quick Mount Vehicle Dock  though it is not necessary   Place the Thor VM1 in Suspend by pressing the Power button   Place the Thor VM1 face down on a stable surface     FON  gt     Using a Phillips screwdriver  not supplied  loosen the screws and then remove the tethered access panel with the SSD  and SD label  This panel is on the left hand side when the Thor VM1 is face down with the top away from the user              5  Locate the SD card installation slot     2 39    6   7   8   9        Slide the SD card into the slot  The label side  front  of the SD card faces toward the back of the Thor VM1   Reattach the access panel  torquing the screws to 4 5 inch pounds    If removed  reinstall the Thor VM1 in the Dock    Resume the Thor VM1 from suspend     When using Windows explorer to view My Device  the SD card is identified as SD Card  Some versions may label it  Storage Card instead     2 40       Install SIM Card    Equipment Required   User Supplied     e Torquing tool capable of measuring inch pounds   e  2 Philips screwdriver bit   For convenience  the Thor VM1 can be removed from the Quick Mount Vehicle Dock  though it is not necessary   Place the Thor VM1 in Suspend by pressing the Power button    Place the Thor VM1 face down on a stable surface     FON      Using a Phillips screwdriver  not
144. ecrease backlight  brightness     2 36       Disconnect UPS Battery    Equipment Required  User Supplied     e Torquing tool capable of measuring inch pounds  e  2 Philips screwdriver bit    Caution  The UPS battery must be disconnected before shipping the Thor VM1  replacing the UPS battery or replacing the    front panel        For convenience  the Thor VM1 can be removed from the Quick Mount Vehicle Dock  though it is not necessary   If the Thor VM1 remains in the Dock  disconnect the power cable from the Dock    Place the Thor VM1 in Suspend    Place the Thor VM1 face down on a stable surface     ak N gt     Using a 2 Philips bit loosen the M3 screws and then remove the tethered access panel with the SIM label  This panel is  on the right hand side when the Thor VM1 is face down with the top away from the user                    6  Locate the small push button located just below the SIM card installation slot     2 37       Press the push button to disconnect the UPS  The UPS battery maintains its charge but is disconnected from the power  circuitry of the Thor VM1      Reattach the access panel  torquing the M3 screws to 4 5 inch pounds using a  2 Philips bit    9  When the Thor VM1 is attached to extemal power  the UPS battery is automatically reconnected     2 38       Install SD Card    Equipment Required   User Supplied     e Torquing tool capable of measuring inch pounds  e  2 Philips screwdriver bit    e SD card   The following commercially available SD cards are r
145. ect       2 8       Power Controls    Power Switch    After all cables are connected  the Thor VM1 can be powered on     There is a power switch located on the back of the Quick Mount Smart Dock  The power  switch is a rocker switch     The power switch has a raised bump to identify the switch position even when it is hidden  from view  When the side of the switch with the raised bump is pressed  the power switch is  On  If the Dock is connected to external power  the Dock delivers power to the Thor VM1                 Thor VM1 Power Button          The power button is located at the bottom left of the  Thor VM1     If the Thor VM1 is Off  pressing the power button  starts the power up sequence     Note  This assumes that the Thor VM1 is docked  in a powered Quick Mount Smart Dock or  that the intemal UPS battery has a sufficient  charge to power the Thor VM1  If no external  power is available and the UPS battery does  not have a charge  pressing the power button  causes no action           If the Thor VM1 is On  pressing the power button  places the unit in Suspend              2 9       Vehicle Ignition Monitoring    When Auto On is disabled  see below  and the ignition input wire is connected  the Thor VM1 monitors the ignition input signal  and adjusts modes as described below     Auto On Behavior    The Thor VM1 can be configured for Auto On using the Options control panel     For information on the Ignition input signal please see the power cable instructions in the Th
146. ed     Keyboard    Y RFTerm EXE    Y pword exe       A checkmark indicates applications currently active or available for Launching by the user  When Keyboard is selected  the  Thor VM1 default input method  Input Panel  Transcriber  or custom input method  is activated     The check to the left of the application name indicates that the application is active     If the application is listed but does not have a checkmark to the left of the application name  this means the application is  configured in AppLock and can be manually launched by clicking on the application name in the list     Using a Stylus Tap    When the mobile device enters end user mode  a Switchpad icon  it looks like three tiny windows one above the other  is  displayed in the lower right corner of the display  The Switchpad is always visible on top of the application in focus  However  if  only one application is configured in AppLock and the Input Panel is disabled the Switchpad is not visible     a    When the user taps the Switchpad icon  a menu is displayed showing the applications available to the user  The user can tap  an application name in the popup menu and the selected application is brought to the foreground  The previous application  continues to run in the background  Stylus taps affect the application in focus only  When the user needs to use the Input  Panel  they tap the Keyboard option  Input Panel taps affect the application in focus only     Keyboard    v RFTerm EXE    Y pword exe      
147. ed  If there is a failure reading the hotkey  the internal factory       LOG_ERROR  using default default is used     App Command Line  E do   LOG_  eComma  d lines Command line of the application being locked PROCESSING  App   lt Application E    LOG_  Mames Name ofthe application being locked PROCESSING    dwProcessID   lt   gt  Device ID of the application being locked LOG_EX    lid key len Size of encrypt export key LOG_EX  Encrypt password  length   lt   gt  The length of the encrypted password  LOG _EX    Encrypted data len  lt   gt    Length of the encrypted password LOG_EX  hProcess   lt   gt  Handle of the application being locked LOG_EX  Key pressed    lt   gt  A key has been pressed and trapped by the hotkey processing  LOG_EX       3 44    Message Explanation and or corrective action Level    A EEEN The status information is being saved to a file and the file has been opened  LOG_EX  successfully  E    AppLock found the kbdhook dll  but was unable to get the address of the   initialization procedure  For some reason the dll is corrupted  Look in the  Windows   directory for kodhook dll  If it exists  delete it  Also delete AppLock exe from the LOG_ERROR  Windows directory and reboot the unit  Deleting AppLock exe triggers the AppLock   system to reload     Address of keyboard AppLock successfully retrieved the address of the keyboard filter initialization  LOG_EX  hook procedure OK procedure       Alt pressed The Alt key has been pressed and trapped by the HotKey 
148. ed  and disconnected  There may be audible or visual signals as paired devices re connect with the Thor VM1     The default Bluetooth setting is On     The Thor VM1 cannot be discovered by other Bluetooth devices when the Computer is discoverable option is  disabled  unchecked  on the Settings panel     Other Bluetooth devices cannot be discovered if they have been set up to be Non Discoverable or Invisible   When Filtered Mode is enabled  the Thor VM1 can pair with one Bluetooth scanner and one Bluetooth printer   When Filtered Mode is disabled  the Thor VM1 can pair with up to four Bluetooth devices    It is not necessary to disconnect a paired scanner and printer before a different scanner or printer is paired with the Thor  VM1     The target Bluetooth device should be as close as possible  up to 32 8 ft  10 meters  Line of Sight  to the Thor VM1  during the pairing process     Assumption  The System Administrator has Discovered and Paired targeted Bluetooth devices for the Thor VM1  The Thor  VM1 operating system has been upgraded to the revision level required for Bluetooth client operation  An application  or API  is  available that will accept data from serial Bluetooth devices     Bluetooth Devices    The Bluetooth Devices tab displays any device previously discovered and paired with the Thor VM1                LXEZ Pairing               Bluetooth Devices   Settings   Reconnect   About    Bluetooth Address                Clear   Discover               Discover    Tap
149. ed by double tapping the Summit icon in the taskbar or on the desktop     Certs    The Certs option displays a readme file containing details on how the Summit Configuration Utility  SCU  handles certificates  for WPA authentication     3 13       Command Prompt    Start  gt  Programs  gt  Command Prompt    File Edit Help    Pocket CMD v 6 0   gt           Type help cmd at the command prompt to view valid Pocket PC  Console  commands   Exit the command prompt by typing exit at the command prompt or tap File  gt  Close     eXpress Scan    The eXpress Scan utility allows an administrator to scan bar codes to provide the initial network and Avalanche Mobile Device  Server address configuration  This eliminates the need to edit radio parameters manually on the Thor VM1     eXpress Scan uses bar codes created with eXpress Config     Internet Explorer    Start  gt  Programs  gt  Internet Explorer    This option requires a WLAN or WWAN card and an Internet Service Provider  There are a few changes in the Windows CE  version of Internet Explorer as it relates to the general desktop Windows PC Internet Explorer options  Tap the   button to  access Internet Explorer Help     Media Player    Start  gt  Programs  gt  Media Player    There are few changes in the Windows CE version of Media Player as it relates to the general desktop Windows PC Microsoft  Media Player options     After the Media Player application is running  click the   button to access Media Player Help     3 14       Fi
150. ed for an Ad Hoc connection to another client  device  If a channel is selected that is not supported by the by the radio  the  default value is used    Options are    1 through 14  the 2 4GHz channels     36  40  44  48  the UNII 1 channels     When set to On and the current connection to an AP weakens  the radio  aggressively scans for available APs     Aggressive scanning works with standard scanning  set through Roam  Trigger  Roam Delta and Roam Period   Aggressive scanning should be set  to On unless there is significant co channel interference due to overlapping  APs on the same channel        Use of Cisco Compatible Extensions  CCX  radio management and AP  CCX or CCX Features ABG  i specified maximum transmit power features     This parameter cannot be changed     Use of Wi Fi Multimedia extensions    WMM off Options are  On  Off  Devices running Windows XP can change the default value  Devices running  all other OS cannot change the default value     Specifies the type of authentication server   Auth Server Type 1    Options are  Type 1  ACS server  and Type 2  non ACS server     Authentication method used within the secure tunnel created by EAP TTLS   Options are   AUTO EAP  Any available EAP method   TTLS Inner Method Auto EAP Ne  MSCHAP  PAP  CHAP  EAP MSCHAPV2    Type of Pairwise Master Key  PMK  caching to use when WPA2 is in use   PMK caching is designed to speed up roaming between APs by allowing the  client and the AP to cache the results of 802 1X authentic
151. ed records are displayed  all others are not  displayed     3 42       Log    Note     If a level higher than Error is selected  the status should be cleared frequently by the administrator     In addition to the three view levels the administrator can select that all status information be logged or turn off all status  information logging completely  The system default is    None     however to reduce registry use  the administrator may want to  select    None    after verifying the configuration  Tap the Clear button to clear the status information from the registry     None   Error  Processing  Extended  All    Save As    When the  Save As     button is selected  a standard  Save As  dialog screen is displayed  Specify the path and filename  If the  filename exists  the user is prompted whether the file should be overwritten  If the file does not exist  it is created     See Also  Error Messages    3 43       AppLock Help    The mobile device won   t switch from Administration mode to end user mode     e Ifthe configuration is valid for one application but not the other  the switch to end user mode fails  AppLock stays in  Administration mode and is stopped until the Administrator password is entered     The hotkey sequence needed is not allowed  What does this mean     When the Administrator is selecting a hotkey sequence to use when switching user modes  they are not allowed to enter key  combinations that are reserved by installed software applications  Only RFTerm key 
152. eetetetenees 3 113  ILENMET ODORS  ereire ce en ace eden te Aree ene tested ches cue tea eee nobe as Heaton ee Samoa Dares see oct ais 3 114  ICY DOGG sca es eee hs ce io da to gt ee hada 3 117  OY PAG aise he ae lt ado 3 118  Key Map Tab cacon ese aei ch oe eten do o a a a Eea 3 119  Remap a Single Key              0 0 00 nc 3 119  Remap a Key to a Unicode Value  ooooooccccccccccccccccccccccccccccccccccnncnnn cnn nro 3 119  Remap a Key Sequence oo    cece cece cece ns 3 120  Remap a Key to a Sequence of Unicode Values     21    eee cece cece ce ececcecccccccceccccecceceeeeeees 3 120  Remap an Application                2222 00 22 cece c cece cece cece cece cece cece ccc e eee e cece ce eeeeeeeeeeeeeeeeeeeeees 3 120  Remap a Command  2 222    ccc cece cece ccc cece cece cece cece cece cece cece eeeeee eee eeeeeeeeeeeeceeeeeeeeeees 3 121  LaunchApp Labs voca sce dusduleeaceceeesseusadeededs cise ceeyguGlecdcsuusneiedudckgeSes ededadietencsex 3 122  Runcma TAD 6s ct tee Pe ce ected te ane Pec ee eye teen eee sana 3 123  License VIS WO noticias di li dit ibi 3 124  MIX ups os a A lo lt acto te 3 125  Output Panel ns 3 125  Input Panel    2 0 0    eee eee e eee e eee ee ce eee e ee ceeceececeeeeeeeneneenenecnscncencccecceccecccceccccecccccccesccseececeeeee 3 126  AAA er st ae A er ee O eee 3 127  Network and Dialup Options           2 2 2    22222222  c cece eee ccc cece cece cece cee e cece cece eee eeeeeeeeeceeeeeeeeeeeeees 3 128  Create a New Connection         2 222220 2 0 ee
153. efault is 5 seconds   Tap OK     8  TCP IP Settings should not need to change from defaults  Tap the Finish button to create the new connection     10     11   12   13   14     Close the Remote Networking window     To activate the new connection select Start  gt  Settings  gt  Control Panel  gt  PC Connection and tap the Change  Connection    button     Select the new connection  Tap OK twice    Close the Control Panel window    Connect the desktop PC to the mobile device with the appropriate cable   Click the desktop Connect icon to test the new connection     You can activate the connection by double tapping on the specific connection icon in the Remote Networking window  but this  will only start an RAS  Remote Access Services  session  and does not start ActiveSync properly     3 128       Network Capture    Start  gt  Settings  gt  Control Panel  gt  Network Capture    Note  Verify the date and time before using the logging utilities to ensure meaningful data   The Network Capture panels provide configuration options for logging utilities   Two types of logging are configurable     Netlog is a Windows CE utility that monitors network traffic  Netlog creates a  CAP file that can be read using Microsoft  Windows Network Monitor or any compatible tool that supports  CAP files     NDISLog monitors the NDIS interface between the Summit radio and the NDIS driver  This utility creates a  TXT log file     Factory Default Settings    Netlog tab   Command options  pkt_size in byt
154. ei 2 4  Vehicle DC Power Supply  nc 2 4  External AC Power Supply  2 002000  cece ec ccc cece k ee ccc e e e ccc ceceeceeeeeeseeeeeeeeeteneenees 2 4  Uninterruptible Power Supply    22 22 20    c cece cece cece cece ce cece cece cece cece ce eeeeeeeteeeeeneees 2 4  Backup Battery  a aiei 0 aa aaa 2na aaea a a E Aa aa Laa aaan are raaraa reann enon 2 5  IT BG oe ate A A E a boc r a A AR EA 2 5  Power Management Modes       2 2 2 2    eee eee cece cece cece cece cece cece cece ccc EAA A E earar earrannan 2 6   ON Mode  DO  1 0300 de dt SE Dg Re eee EE OE ee tas ds 26  User Idle   Backlight Off Mode  D 1       oooooocccccccccccccccccccccnccnncnnnnn cnn nnnnn nono oraaa rarnana 2 6  System Idle   Display Off Mode  D2           22 0000 e cece cece eee cecececcceceeceeeeeeees 2 6  Suspend mode  DB e cece cece cece cece eee AA EDADA ADAADA EALE DLEE DEE aana anonn 2 6  Shutdown   Off Mode  D4     00    cece cece cece cece cece cece cece cece cece eee e cece cece cece eeeeeeeeeteteeeneees 2 6  Prima Events 5 652 eto sence ye as tai det rias 2 7   User Primary Events     255052 soc  ilatina 2 7   System Primary Events  nc 2 7    Wake Source Events  eee e ec eee ene cence ence DEDALA DDADL LDL Daana 2 7    Power Switch        0 0202  2 cece eee ccc cnn 2 9  Thor VM1 Power Button           00 00000000 cc cece ccc cnc 2 9  Vehicle Ignition Monitoring      2222 22 22 cece eee cece cece cece cece cece cece cece cece cece cece eeeeeeeeeeeeeeeees 2 10  Auto On Behavior 2 10  Auto On Enabled 
155. en the Thor VM1 and the highlighted paired Bluetooth device     Remove an unpaired device from the Bluetooth device list  The highlighted device name and iden   tifier is removed from the Thor VM1 Bluetooth Devices panel after the user taps OK     Properties More information on the highlighted Bluetooth device     Delete       3 57       Bluetooth Device Properties       Bluetooth Properties E    Name   AE    Bluetooth Address      00 20 E0 00 12 34  COD  oxe006 14  Subclass       COM port     Status   not pared          Data on the Bluetooth Properties panel cannot be changed by the user  The data displayed is the result of the device Query  performed during the Discovery process     The Status dialog box reflects the current state of the highlighted device     3 58       Settings       LXEZ Pairing   OK  x        Bluetooth Devices   Settings   Reconnect   About       V  Computer is connectable Turn OFF Bluetooth       Computer is discoverable                 v Prompt if devices request to pair   7 Continuous search     M  Filtered Mode     7 Printer Port   COM   Computer Friendly Name   7 Logging             Note  These options can still be checked or unchecked whether Bluetooth connection is enabled or disabled     Turn Off Bluetooth  Tap the button to toggle the Bluetooth client On or Off  The button title changes from Turn Off Bluetooth to Turn On Bluetooth   Default    The default value is Bluetooth On     3 59       Options    l This option is Enabled by default   Comp
156. er  any  software updates and additional configuration data are downloaded     5 28    Chapter 6  Wireless Network Connections    Summit Wireless Network Configuration    The Summit client device is a Summit 802  11a b g radio  capable of 802 11a  802 11b and 802 11g data rates  The radio can be  configured for no encryption  WEP encryption or WPA security     Security Options Supported are    None   WEP   LEAP  WPA PSK  WPA LEAP  PEAP MSCHAP  PEAP GTC  EAP TLS  EAP FAST    Important Notes    It is important that all dates are correct on the Thor VM1 and host computers when using any type of certificate   Certificates are date sensitive and if the date is not correct authentication will fail     It may be necessary to upgrade radio software in order to use certain Summit Client Utility  SCU  features     Contact Technical Assistance for details     When using the 802  11a radio  the U NII 1 band is the preferred band for indoor operation  For regulatory domains  in which the U NII 3 band is allowed  the following channels are supported  149  153  157 and 161  The AP must  be configured accordingly        After making any changes to the wireless configuration  warmboot the Thor VM1     6 1       Summit Client Utility    Note  When making changes to profile or global parameters  the device should be warmbooted afterwards   Start  gt  Programs  gt  Summit  gt  SCU or   SCU Icon on Desktop or   Summit Tray Icon  if present or   Wi FI Icon in the Windows Control Panel  if present 
157. er presence status on this tab     If a defroster is installed  the defroster can be switched between the Enabled and Disabled states using the radio buttons on  this tab  The default is Enabled     Specify the Defroster trip point  The default trip point is 40   C   104   F     3 140       Power    Start  gt  Settings  gt  Control Panel  gt  Power    The Thor VM1 power mode timers are cumulative     The System Idle timer begins the countdown after the User Idle timer has expired and the Suspend timer begins the countdown  after the System Idle timer has expired     When the User Idle timer is set to    Never     the power scheme timers never place the device in User Idle  System Idle or  Suspend modes  even when the device is idle      The Display  gt  Backlight setting is synchronized with the User Idle setting in the Schemes tab in the Power control panel   Factory Default Settings  Battery tab No user interaction    Schemes tab    Power Scheme Battery Power  AC Power    User Idle Timeout 2 minutes    System Idle Timeout 2 minutes  Suspend Timeout 8 hours          Power Properties Ed OK E  Battery   Schemes   Device Status      Status              External  Good    Percentage of power left in UPS  90           3 141          Power Properties      Battery Schemes   Device Status  Power Scheme  Jac Power y  _S  Switch state to User Idle   after 2 minutes y     Switch state to System Idle   after 2 minutes y   Switch state to Suspend   after 5 minutes y        Power Propertie
158. er should not be installed on the  mobile device s      The following features are supported by the Wavelink Avalanche Enabler when used in conjunction with the Avalanche  Manager     After configuration  Enabler files are installed upon initial bootup and after a hard reset  Network parameter configuration is  supported for     e  P address  DHCP or static IP  e RF network SSID  e DNS hosts  primary  secondary  tertiary   e Subnet mask  e Enabler update  Related Manual  Using Wavelink Avalanche    The Thor VM1 has the Avalanche Enabler installation files loaded  but not installed  on the mobile device when it is shipped   The installation files are located in the System folder on CE devices  The installation application must be run manually the first  time Avalanche is used     After the installation application is manually run  a reboot is necessary for the Enabler to begin normal performance  Following  this reboot  the Enabler will by default be an auto launch application  This behavior can be modified by accessing the  Avalanche Update Settings panel through the Enabler Interface     The designation of the mobile device to the Avalanche CE Manager is LXE_THOR     Internet Explorer    Start  gt  Programs  gt  Internet Explorer    This option requires a radio card and an Internet Service Provider  There are a few changes in the Windows CE version of  Internet Explorer as it relates to the general desktop Windows PC Internet Explorer options  Tap the         button to acces
159. erence guide has been developed for a Thor VM1 with a Microsoft   Windows   Embedded CE 6 operating system     1 1       End User License Agreement  EULA     When a new Thor VM1 starts up a EULA is displayed on the touch screen  It remains on the screen until the Accept or Decline  button is tapped with a stylus     Tap the Accept button to accept the EULA terms and the Thor VM1 continues the startup process  The EULA is not presented  to the user again     Tap the Decline button to decline the EULA and the Thor VM1 will reboot  It will continue to reboot until the Accept button is  tapped with the stylus     Note  The EULA will be presented after any operating system upgrade or re installation  including language specific  operating systems     1 2    Components    Front View       A OU N           Power Button     Speakers     Microphone     Ambient Light Sensor       Back View with Quick Mount Smart Dock         BAAR AAA AAG    on 19  9   ox I  ill hve                      ed   oxi        LM  F TN EO    Access Panels       1  Antenna Connectors  on Thor VM1     N    NQF Q    10   11   12   13     14   15     SIM card Access Panel  on Thor  VM1     COM1 Connector  on Dock   COM2 Connector  on Dock   USB Connector  on Dock   CAN Audio Connector  on Dock     Quick Release Handle  On Thor  VM1     Provision for Padlock  on Thor  VM1     Provision for Laptop Security Cable   on Thor VM1     Power Switch  on Dock   Power Connector  on Dock   Fuse  on Dock     SD Card Access Pane
160. ertificate store     7  Access the Credentials screen again  Make sure the Validate server and Use MS store checkboxes are checked     8  The default is to use the entire certificate store for the CA certificate  Alternatively  use the Browse button next to the    10   11   12     13     Note   Note     CA Cert  CA Certificate Filename  on the Credentials screen to select an individual certificate     For EAP TLS  also enter the User Cert  User Certificate filename  on the credentials screen by using the Browse  button     If using EAP FAST and manual PAC provisioning  input the PAC filename and password    Click the OK button then the Commit button     If changes are made to the stored credentials  click Commit to save those changes before making any additional  changes to the profile or global parameters     Verify the device is authenticated by reviewing the Status tab  When the device is property configured  the Status tab  indicates the device is Authenticated and the method used     See Configuring the Profile for more details     If invalid credentials are entered into the stored credentials  the authentication will fail  No error message is displayed   The user may or may not be prompted to enter valid credentials     How to  Use Sign On Screen    1     After completing the other entries in the profile  click on the Credentials button  Leave the Username and Password  blank  No entries are necessary on the Credentials screen for LEAP or LEAP WPA     For PEAP MSCHAP an
161. es 5000  cap_size in bytes 500000     cap file  netlog    Promiscuous Mode Disabled  NDISLog tab    i  ndislog txt       Netlog    Use this control panel to configure the Netlog utility  By configuring Netlog using the control panel  Netlog remains running  across a warmboot  However  please note that     e Netlog first stores data to a file named netlog0 cap  then netlog1 cap  Any time the current file reaches maximum size   Netlog switches to the other file     e Ifthe log file is stored in the root directory  any previous data is lost and a new log file started after the warmboot  e Ifthe log file is stored in System  all previous data is saved across the warmboot     e If Netlog is enabled across the warmboot  a series of brief popups may be displayed during the boot cycle  No user  interaction is required     3 129          Network Capture El  OK  E  Netlog   NOISLog      Command       Options     load O unload  sono pkt_size in bytes   O  options O start O stop  sooo cap_size in bytes        cap file    Promiscuous Mode  7 Enabled  IfName   SDCSD30AG1  isysteminetiog    ready to run command             Command    Command    Specifies the option to perform  See the table below for the option parameters and values     CON    Options       pkt_sizein   Specifies the maximum packet size captured in bytes  This option should only be run after you have called load  bytes and stop  Default is 5000     cap_size in   Specifies the maximum size of Netlog0 cap or Netlog1 cap in by
162. es RegLoad to open the file and make the indicated settings in the  registry     REGDUMP EXE    Registry dump     Saves a copy of the registry as a text file  The file  REG TXT  is located in the root folder     The Thor VM1 includes a Load User Defaults option in the Registry control panel  This is the preferred method for saving a  backup of the registry  Save the registry file to the System folder on the Reference Guide  persistent storage  or copy the file to  aPC     WARMBOOT EXE    Double click this file to warm boot the computer  i e   all RAM is preserved   It automatically saves the registry before  rebooting which means configuration changes are not lost     WAVPLAY EXE    Double tapping a sound file  e g   WAV  causes WavPlay to open the file and run it in the background     Thor VM1 Command line Utilities    Command line utilities can be executed by Start  gt  Run  gt   program name      PrtScrn EXE    Command line utility which performs a screen print and saves the file in  BMP format in the  System folder  Tap Start  gt  Run  and type prtscrn and tap OK  or press Enter  There is a 10 second delay before the screen print is made  The device beeps and  the screen captured file  scrnnnnn bmp  is placed in the  System folder  The numeric filename is incremented by 1 each time  the PrtScm function is activated  The command is not case sensitive     3 8       Desktop    Note  For general use instruction  please refer to commercially available Windows CE user s guides 
163. et screen properties for the Thor VM1     Factory Default Settings    Screen Blanking  Blackout    Enable screen blanking Disabled  Screen on delay  ms  1000   COM Port none selected  Current Level   LCD Brightness     100  see note   Ambient Light      see note     Automatic Brightness Control    Automatic brightness control is only available on a Thor VM1  with an outdoor display     Enable automatic brightness    Disabled  control    Low to medium light level       25  Medium to high light level       75       Note  If Automatic Brightness Control is enabled for an outdoor display  the value for LCD Brightness depends on the  Ambient Light    Otherwise  the display defaults to 100  brightness     Note  There is no default value for Ambient Light   as it varies depending on the level of light where the Thor VM1 is  located  If the Thor VM1 has an indoor display it does not have an ambient light sensor and the Ambient Light   is  always 0     3 147       Screen Control v0 2    Screen Blanking  Blackout    7 Enable screen blanking    Screen on delay  ms   1000  COM Port         Current Level    LCD Brightness     foo Ambient Light  9   fo    Automatic Brightness Control  for outdoor display only      Enable automatic brightness control    Low to medium light level        Medium to high light level             Note  Touch screen defroster controls are located on the Peripherals tab     3 148       Screen Blanking    Screen blanking requires the following hardware   e A Screen 
164. etting or press the Esc key to revert to the previous   calibration settings    Note  Ifthe touch screen looses calibration on a Thor VM1 with the 12 key keypad  you must use a USB mouse or keyboard  attached to the Thor VM1 to access this tab to recalibrate the touch screen     3 150       System    Start  gt  Settings  gt  Control Panel  gt  System    Use these Thor VM1 panels to   e Review System and mobile device data and revision levels   e Adjust Storage and Program memory settings   e Assign a device name and device descriptor     Factory Default Settings    1 4 storage  3 4 program memory    Unique to equipment type  Device Description   Unique to equipment type       General Tab       System Properties E  OK x     General   memory   Device Name   Copyrights    System  Computer     Microsoft   Windows   CE Processor Type   intel Corp   x86 Intel  Version 6 00 Expansion Slots    z     Memory  352564 KB RAM                    0 2006 Microsoft Corp  All rights  reserved  This computer program is  protected by U S  and international  copyright laws     Registered to           System  This screen is presented for information only  The System parameters cannot be changed by the user     Computer  The processor type is listed  The type cannot be changed by the user  Total computer memory and the  identification of the registered user is listed and cannot be changed by the user     Memory sizes given do not include memory used up by the operating system  For example  a system
165. ettings  gt  Control Panel  gt  WiFi  or click the Summit Client Utility icon    Use this option to set parameters and manage profiles for the wireless client pre loaded on your Thor VM1   See the Summit Client Utility for information and instruction     3 157    3 158    Chapter 4  ActiveSync    Introduction    Requirement   ActiveSync  version 4 5 or higher for Windows XP desktop laptop computers  must be resident on the host   desktop laptop  computer  Windows Mobile Device Center  version 6 1 or higher  is required fora Windows  Vista Windows 7 desktop laptop computer  ActiveSync and Windows Mobile Device Center for the PC is available from the  Microsoft website  Follow their instructions to locate  download and install ActiveSync or Windows Mobile Device Center on  your desktop computer   Note  For readability in this section  ActiveSync will be used in instructions and explanations  If you have a Windows Vista  or Windows 7 operating system on your desktop laptop  replace ActiveSync with Windows Mobile Device Center    Using Microsoft ActiveSync  you can synchronize information on your desktop computer with the Thor VM1 and vice versa   Synchronization compares the data on your mobile device with your desktop computer and updates both with the most recent  data   For example  you can    e Back up and restore your device data    e Copy  rather than synchronize  files between your device and desktop computer    e Control when synchronization occurs by selecting a synchro
166. eventing the locked application from exiting  AppLock must also  prevent the application from enabling the taskbar and resizing the application   s LOG_EX  window  This message traps a change in the window position and corrects it        gt  T ee LOG_  AppLock is calling the keyboard hook initialization  PROCESSING  The keyboard filter initialization failed  LOG_ERROR  The keyboard hook dll exists and loaded successfully  LOG_EX    Processing the backdoor entry LOG_EX    When AppLock first loads  itloads a dll that contains the keyboard hook processing    LOG_  This message is logged prior to the load attempt  PROCESSING    3 48       Message Explanation and or corrective action  a The status information is being saved to a file and the file open has failed  This  Open failure could occur if the file is write protected  If the file does not exist  it is created  POG ERROR      If the Administration registry key does not exist  the switch to user mode fails  Open registry failure because the AppName value in the Administration key is not available  LOG  ERROR  Opened status file The status information is being saved to a file and the file has been opened LOG EX  successfully     DuLonme many Ior  Not enough memory to encrypt the password LOG_ERROR  encrypted pwd 9 Y  yp P      pReal TaskbarnindProc The taskbar control has already been installed  LOG_EX  already set  Pwd cancelled or invalid    The password prompt was cancelled by the user or the maximum number of failed LOG EX
167. eyboard LED behavior  identifies the active sticky  modifier mode state of the keyboard     64 Key QWERTY Keyboard        EJ  E   E   hd  Es        The Thor VM1 has a QWERTY keyboard  available with a standard overlay  an IBM 3270 overlay or an IBM 5250 overlay     e Because the keyboard only has 64 keys  all functions are not visible  or printed on the keyboard   Therefore the Thor  VM1 keyboard supports what is called hidden keys     keys that are accessible but not visible on the keyboard     A key or combination of keys can be remapped to provide a single keypress  a string of keypresses or to execute an    application or command  Key remapping is configured via the KeyPad option in the Control Panel  Start  gt  Settings  gt   Control Panel  gt  KeyPad      e Remapped keys persist across a warmboot or power cycle   e The keyboard does not have a NumLock indicator or key  NumLock is always On     e The warmboot behavior of CapsLock can be set via the Misc tab in Start  gt  Settings  gt  Control Panel  gt  Options   The Thor VM1 keyboard keys are backlit     e By default  the keyboard backlight follows the display backlight  When the display backlight is on  the keyboard  backlight is on     e Ifthe display backlight brightness is increased  or decreased  the keyboard backlight brightness is increased  or  decreased      2 25       e The keyboard backlight and the display share the same timer  which is configured in Start  gt  Settings  gt  Control Panel  gt     Power     e
168. ff the LED        2 34       Alt LED    The Alt key is not present on the 12 key keypad     e Indicates the Alt modifier key is active  Alt mode is invoked for the next keypress  Solid Green only     e Pressing the Alt key a second time exits this modifier mode and turns off the LED        2 35       Display    The display is a thin film transistor display capable of supporting WVGA graphics modes  Display size is 800 x 480 pixels  The  display covering is designed to resist stains  The touch screen allows signature capture and touch input  The display supports  screen blanking to eliminate driver distraction when the vehicle is in motion     Touch Screen    The touch screen is a Resistive Panel with a scratch resistant finish that can detect touches by a stylus  and translate them  into computer commands  In effect  it simulates a computer mouse  Only Delrin or plastic styluses should be used  A right  mouse click is simulated by touching and holding the screen for the appropriate time interval     Always use the point of the stylus for tapping or making strokes on the display  Never use an actual pen  pencil  sharp or  abrasive object to write on the touch screen     An extra or replacement stylus may be ordered     A replaceable touch screen protective film is available when the Thor VM1 is used in an abrasive environment  Contact  Technical Assistance for availability     Note  Ifthe touch screen is disabled or looses calibration on a Thor VM1 with the 12 key keypad  you 
169. five years with normal use before it requires replacement     Note  The backup battery should only be changed by authorized service personnel     Fuse    The Thor VM1 uses an 8A time delay  slow blow   fuse that is externally accessible and user replaceable  The fuse is located  on the back of the Quick Mount Smart Dock  The fuse is accessed by unscrewing the cap as indicated below     Should it need replacement  replace with same size  rating and type of fuse     Littelfuse 0215008 MXP or equivalent   Fuse has voltage on it even when power is off  Always disconnect input power before changing the fuse                 Power Management Modes    The Thor VM1 supports the standard Microsoft Windows CE power management modes  On  DO   Backlight Off  D1   Display  Off  D2  and Suspend  D3      On Mode  D0     When the Thor VM1 is attached to either vehicle power or an external power supply or is operating from the UPS battery and  the power button is pressed  the Thor VM1 is in the On mode  In this mode  the keypad  touch screen and any attached  peripherals such as a scanner function normally  The display remains on until the backlight timer  if enabled  expires     User Idle   Backlight Off Mode  D1     Backlight is dimmed  but display is readable  The Thor VM1 transitions to this mode from On after the User Idle timeout period  has passed without a primary even occurring     System Idle   Display Off Mode  D2     Backlight and display are off  The status LED is solid green  The
170. g slowly  External power not present   1 2 sec  on  1 1 2 sec  off     CPU temperature less than  20  C   Need to move unit to warmer environment       2 31       UPS Status LED    The behavior of the UPS LED depends if external power is connected or not     External Power Present    LED   LEDBehavior        EF UPS charging   e UPS charged    Solid Green UPS charging    e Any charging fault    e Out of charging temperature range   e NoUPS present    e Charge timeout    Solid Amber    External Power Not Present    LED   LEDBehavior          q A  e UPS not present    Solid Amber UPS supplying power and discharging  Solid Red Approximately 2 minutes runtime until shutdown    SSD  Solid State Drive  LED    Flashing Green SSD read or write activity           No SSD read or write activity        2 32       Connection LEDs       eum    1  WWAN LED  2  WiFi LED  3  Bluetooth LED    WWAN LED    Solid Green Indicates a WWAN connection to a network   Indicates no WWAN connection     WiFi LED    Solid Green Indicates a connection with an IP address to an Access Point  Indicates no connection to an Access Point     Bluetooth LED    Blue Blinking Slowly Bluetooth is paired but not connected to a device           Blue Blinking Medium Bluetooth is paired and connected to a device   Blue Blinking Fast Bluetooth is discovering Bluetooth devices   Bluetooth hardware has been turned off        The Bluetooth LED blinks once every 6 seconds when the Bluetooth client is paired but not connected  It
171. gP promp y  PROCESSING    LOG_  PROCESSING      F a     LOG_  Exit restart app timer Processing is at the end of the timer function PROCESSING   z Exiting the function that switches the screen mode back to normal operation for the  LOG_   Exit ToAdmin Exiting the function that handles the mode switch into admin mode LOG   g PROCESSING   Exit ToUser Exiting the user mode switch function eae  me di PROCESSING    3 47    There are two exit paths from the enumeration function  This message denotes the  LOG_  enumeration function did not find the application  PROCESSING    Exit password timeout Exiting password timeout processing        Message Explanation and or corrective action Level    Exit ToUser Registry  read failure    er   LOG_  The AppName value does not existin the registry so user mode cannot be entered  PROCESSING    Exit verify password no Eds   i LOG_   Exiting password verification  PROCESSING  Exit verify password  Exiting password verification LOG   response from dialog gp i PROCESSING  Found taskbar The handle to the taskbar has been found so that AppLock can disable itin user LOG_   mode  PROCESSING    Getting address of  keyboard hook init  procedure    Getting configuration  from registry    a ae LOG_  AppLock is retrieving the address of the keyboard hook  PROCESSING  The AppLock configuration is being read from the registry  This occurs at   initialization and also at entry into user mode  The registry must be re read atentry  LOG_   into user mode in case 
172. he 12 key keyboard is available on the Thor VM1 running Windows CE 6 0        Because the keyboard only has 12 keys  all functions are not visible  or printed on the keyboard   Therefore the Thor  VM1 keyboard supports what is called hidden keys     keys that are accessible but not visible on the keyboard     A key or combination of keys can be remapped to provide a single keypress  a string of keypresses or to execute an  application or command  Key remapping is configured via the keyboard option in the Control Panel  Start  gt  Settings  gt   Control Panel  gt  KeyPad      Remapped keys persist across a warmboot or power cycle   The keyboard does not have a NumLock indicator or key  NumLock is always On   The warmboot behavior of CapsLock can be set via the Misc tab in Start  gt  Settings  gt  Control Panel  gt  Options     The Thor VM1 keyboard keys are backlit     Note     By default  the keyboard backlight follows the display backlight  When the display backlight is on  the keyboard  backlight is on   If the display backlight brightness is increased  or decreased  the keyboard backlight brightness is increased  or  decreased    The keyboard backlight and the display share the same timer  which is configured in Start  gt  Settings  gt  Control Panel  gt   Power   The keyboard backlight can be disabled  See Start  gt  Settings  gt  Control Panel  gt  Options  gt  Misc tab   When automatic brightness control is enabled for a Thor VM1 with an Outdoor display  the manual disp
173. he WEP Keys   PSK Keys button is active and  also determines the available entries in the WEP or PSK pop up window     Specify 802 11a  802 11b and or 802 11g rates when communicating with the AP  The options  displayed for this parameter depend on the type of radio installed in the mobile device     Options     B rates only  1  2  5 5 and 11 Mbps    BG Rates Full  All B and G rates    G rates only  6  9  12  18  24  36  48 and 54 Mbps    BG optimized or BG subset  1  2  5 5  6  11  24  36 and 54 Mbps    A rates only  6  9  12  18  24  36  48 and 54 Mbps    ABG Rates Full  All A rates and all B and G rates with A rates preferred    BGA Rates Full  All B and G rates and all A rates with B and G rates preferred           Ad Hoc  when connecting to another client device instead of an AP   Default   BGA Rates Full  for 802  11a b g radio     It is important the Radio Mode parameter correspond to the AP to which the device is to connect  For example  if this  parameter is set to G rates only  the Thor VM1 may only connect to APs set for G rates and not those set for B and G rates     Contact Technical Assistance if you have questions about the antenna s  installed on your Thor VM1     6 10       Status Tab    Start  gt  Programs  gt  Summit  gt  Status tab       Summit Client Utility    Main   Profle   Status   Diags   Global        ok  lt        Profile  Default   Status  Associated   Device Name   Unnamed   IP  100 100 100 100  MAC  00 17 23 00 00 00   AP Name   Unknown   IP  10
174. he persistent storage virtual drive  Then  information is added to the registry  if desired   to make the CAB file auto launch at startup     The registry information needed is under the key HKEY_LOCAL_MACHINE   Software   LXE   Persist  as follows  The main  subkey is any text  and is a description of the file  Then four mandatory values are added     FileName is the name of the CAB file  with the path  usually  System    Installed is a DWORD value of 0  which changes to 1 once auto launch installs the file     3 6       FileCheck is the name of a file to look for to determine if the CAB file is installed  This will be the name of one of  the files  with path  installed by the CAB file  Since the CAB file installs into DRAM  when memory is lost this file  is lost  and the CAB file must be reinstalled    Order is used to force a sequence of events  Order 0 is first  and Order 99 is last  Order must be greater than  4 for the Thor VM1  Two items which have the same order will be installed in the same pass  but not ina  predictable sequence     There are two optional fields that may be added     1     Delay is used to add a delay after the item is loaded  before the next is loaded  The delay is given in seconds  and  defaults to 0 if not specified  If the install fails  or the file to be installed is not found   the delay does not occur     PCMCIA is used to indicate that the file  usually a CAB file  being loaded is a radio driver  and the PCMCIA slots should  be started after
175. he selected scheme to the display     Backlight    Display Properties    Background   Appearance Backlight    To save battery life  you can adjust when the backlight  automatically shuts off     Automatically turn off backlight while on battery power    Turn off after  30 seconds y  of continuous idle time     Automatically turn off backlight while on external power    Turn off after  2 minutes y  of continuous idle time        When the backlight timer expires  the touch screen backlight is dimmed  not turned off  When both checkboxes are  unchecked  the backlight never turns off  or dims      The default values are 2 minutes for external power and 30 seconds when operating on the internal UPS battery     3 104       Gobi Connection Manager    Start  gt  Settings  gt  Control Panel  gt  Gobi Connection Manager or  Tap the Gobi Connection Manager Desktop Icon or  Tap the Gobi Connection Manager icon in the system tray or    Tap Start  gt  Programs  gt  GobiCM  gt  GobiCMExe    Note  Earlier versions may be labeled LKEGobiCM  gt  LXEGobiCMExe   Set parameters for optional internal WWAN module     View connection status and select firmware   CDMA Use this tab to activate a CDMA carrier such as Verizon     UMTS Use this tab to test and save connection parameters  View GPS statistics   View information on the WWAN card     The Gobi Connection Manager tray icon indicates the status of the connection in dark blue bars  If you hover the mouse pointer  over the Connection Manager Task
176. hen an application name is tapped by the end user  the application is launched  if  inactive  and brought to the foreground    Applications set up with Manual  Launch  enabled may or may not be launched at bootup  This function is based on the  application   s Auto At Boot setting  The applications have been listed as approved applications for end user manual launch  using the Switchpad menu structure  The approved applications are listed on the Switchpad  A checkmark indicates the  applications active status    When Manual  Launch  is disabled for an application  and Allow Close is enabled for the application  when the end user closes  the specific application it is no longer available  shown  on the Switchpad    When Auto At Boot and Manual  Launch  are both disabled for a specific application  the application is 1  not placed on the list  of approved applications for end user manual launch and 2  never launched  and 3  not displayed on the Switchpad     Allow Close           Application Launch Options  Launch     Y  Auto At Boot Retries  fo Delay  fro   Y Auto Re launch Retries  fo Delay  fo       Manual     T low Close                 Default is Disabled  When enabled  the associated application can be closed by the end user     This option allows the administrator to configure applications that consume system resources to be terminated if an error  condition occurs or at the end user   s request  Error conditions may generate a topmost popup requiring an end user respons
177. his password protection or perform a Load  Factory Defaults  contact Customer Support     Factory Default Settings                  Password Settings    Password              Password     Confirm password       Enable Password Protection     _  At Power On          e The password and password settings are saved during a warm boot and a restart   e The screensaver password affects the Remote Desktop screensaver only     e After a password is assigned and saved  each time a Settings  gt  Control Panel option is selected  the user will be  required to enter the password before the Control Panel will open     e The screensaver password is the same as the power on password  They are not set independently     e Ascreensaver password cannot be created without first enabling the    Enable password protection at power on     checkbox     e The screensaver password is not automatically enabled when the    power on    checkbox is enabled   Enter the password in the Password text box  then press Tab and type the password again to confirm it   Enable the power on checkbox and  if desired  the screensaver checkbox    A changed saved password is in effect immediately     3 138       PC Connection    Start  gt  Settings  gt  Control Panel  gt  PC Connection  Use these options to control a cabled connection  USB  serial  between the Thor VM1 and a nearby desktop laptop computer     Factory Default Settings    Enable direct connection Enabled    Connect using USB Client          PC Connection 
178. id VK code  key is output   e Otherwise  key is ignored  not output      If key output is disabled  a windows message is broadcast to notify listening applications that data is available     The manipulated data is ready to be read by applications     3 75       Factory Default Settings    Main Tab   Device 1   Device 2   Device 3   Send Key Message  WEDGE   COM1 Tab  External serial port   Baud Rate   Stop Bits   Parity   Data Bits   Power on Pin 9   COM2 Tab  External serial port   Baud Rate   Stop Bits   Parity   Data Bits   Power on Pin 9   Data Options Tab   Enable Code ID   Symbology Settings   Control Character Translate All    Custom IDs    Processing Tab    Enable buffered key output  Same buffer limit    Delay between buffers    Disabled  Disabled  Disabled  Enabled    Enabled    Enabled    None  A  Disabled    Name blank    Enabled       3 76       Main Tab    Start  gt  Settings  gt  Control Panel  gt  Data Collection  gt  Main tab    The parameters shown on these panels are only those that apply to the specific mobile device     Parameter    Device 1 2 3    Send Key Messages   WEDGE           Data Collection    Main   coma   come   Data Options   Processing   About    Device 1 Device 2 Device 3      disabled   disabled   disabled   O comi O comi O comi   O comz O comz O coma   O Bluetooth ul Output Enable hal Output Enable   C  Output Enable                          Send Key Messages  WEDGE        1   Default is Disabled   2   Default is Disabled   3   Default is
179. igured  the entire set of parameters from that symbologies screen are in effect for that  symbology  In other words  either the settings for the configured symbology will be used  or the default settings are used  not a  combination of the two     If asymbology has not been configured  does not have an   next to it  the settings for All are used which is not necessarily the  default     Clear Button    Clicking this button will erase any programmed overrides  returning to the default settings for the selected symbology   If Clear is pressed when All is selected as the symbology  a confirmation dialog appears                    then all symbologies are reset to their factory defaults  and all star     indications are removed from the list of Symbologies   Click the Yes button or the No button     3 83       Enable  Min  Max    Enable    This checkbox enables  checked  or disables  unchecked  the symbology field     The scanner driver searches the beginning of the bar code data for the type of ID specified in the Data Options tab    Enable  Code ID field plus any custom identifiers     When a code ID match is found as the scanner driver processes incoming bar code data  if the symbology is disabled  the bar  code is rejected  Otherwise  the other settings in the dialog are applied and the bar code is processed     If the symbology is disabled  all other fields on this dialog are dimmed    If there are customized settings  uncheck the Enable checkbox for the All symbology  This 
180. ility has been executed at least once        User Interface    The Enabler can be configured and controlled manually through the user interface on the Thor VM1  This section details the  functionality that can be controlled by the user or system administrator     Parameters and Screen Displays  Screen displays shown in this section are designed to present the end user with information graphically   Placement of information on the screen displays may be split between one or many tabbed panels     Standard Avalanche Enabler parameters that are not supported by Honeywell may be missing or dimmed  visible but unable to  be edited  on the tabbed panels or screen displays     Enabler Configuration    Depending on the version of the Enabler running on the Thor VM1  the desktop Enabler icon may look like one of the following     N    The available configuration options and tabs may vary by Enabler version  The examples shown in this section assume the  latest version of the Enabler is installed on the Thor VM1     The Enabler user interface application is launched by clicking either the Enabler icon on the desktop or Taskbar or by  selecting Avalanche Enabler from the Programs menu     The opening screen presents the Thor VM1 user with the connection status and a navigation menu     File View Help       Update Complete            Update complete     Note  Some parameters and features described in this section may not be available if you are not running the latest version  of the Enab
181. installation  please substitute the appropriate directory     6  LXEConnect is now installed on the host PC and ready to use        Using LXEConnect    1  Power up the Thor VM1     2  Connect the Thor VM1 to the host PC using the USB connection cable  Once connected  the ActiveSync dialog box  appears and the ActiveSync connection is automatically established     3  Select    No    for partnership when prompted  Dismiss any ActiveSync dialog boxes warning a partnership is not set up  It  is not necessary to establish a partnership to use LXEConnect  However  if a partnership is desired for other reasons   one may be established now     Double click the LXEConnect icon that was created on the PC desktop   LXEConnect launches     About CERDisp       6  Click the OK button to dismiss the About CERDisp dialog box  see Example LXEConnect Notice image above  on the  Thor VM1 desktop by clicking the OK button in the LXEConnect window on the PC desktop  The dialog box  automatically times out and disappears after approximately 20 seconds        7  The Thor VM1 can now be configured from the LXE Connect window  Input from the PC s mouse and keyboard are  recognized as if they were attached to the Thor VM1     8  When the remote session is completed  terminate the LXEConnect program by selecting File  gt  Exit or clicking on the X  in the upper right hand comer to close the application  then disconnect the ActiveSync cable     4 7    4 8    Chapter 5  Enabler Installation and Configura
182. into  place until the retaining tab snaps into place     Place the UPS battery into the well  Note the orientation of the battery in the illustration below  The flat surface of the  battery points toward the bottom of the Thor VM1  Make sure all wires are inside the battery well so they are not pinched  when the front panel is reinstalled      2 46    12     13   14     15   16     17        A  Slot on Thor VM1 body    B  Wiring connector on Thor VM1  body    C  Wiring connector on front panel  D  Tab on front panel       Position the front panel so the tab on the back of the front  D in figure above  panel lines up with the slot  A in figure  above  on the Thor VM1  Be sure the two wiring connectors  B and C in figures above  are also aligned     Gently press the front panel into place     Tighten the fourteen  14  captive M3 screws  In the order shown in the top figure above  use a  2 Philips bit and torque  the screws to 6 7 inch pounds     Reinstall the Thor VM1 in the Quick Mount Smart Dock     When the Thor VM1 is placed in the powered dock  the UPS battery automatically reconnects  The UPS battery  automatically begins charging from the powered dock     Restart the Thor VM1     2 47    2 48    Chapter 3  Software    Introduction    There are several different aspects to the setup  configuration and operation of the Thor VM1  Many of the setup and  configuration settings are dependent upon the optional features such as hardware and software installed on the unit  The  e
183. ion when this option is enabled    Note      If Allow Close is enabled and both Auto Re launch and Manual  Launch  are disabled  the application cannot be  restarted for the end user or by the end user after the application terminates     Retries    Default is 0 tries  Retries is the number of times AppLock will try to re launch the application  The retry count is reset after an  application is successfully launched and controlled by AppLock  Valid values are between 0  no tries  and 99 tries or  1 for  infinite  Infinite tries ends when the application successfully launches     Delay    Default is 0 seconds  no delay   Delay is the amount of time AppLock waits prior to re launching an application that has  terminated  The delay is specified in seconds  Valid values are between 0  no delay  and 99 seconds     AppLock must also be configured to automatically re launch an application  To AppLock  application termination by the end   user is indistinguishable from application termination for any other reason     3 37       Manual  Launch        Application Launch Options  Launch     V  Auto At Boot Retries  fo Delay  fro  Auto Re launch Retries  fo Delay  fo        7 Allow Close          Default is Disabled  Enabling this option allows the end user to launch the specified application s   Upon bootup completion an  application with Manual enabled is listed on the Switchpad accompanied by a checkmark that indicates the application is  currently active or available for Launching  W
184. ipting and plug in behavior for each zone  Internet   Local intranet  Trusted Sites  Restricted Sites   Use the Site button to add sites to each zone        3 114    Internet Options    General Security    Start Page   nttp  jinawi msn com    Search Page   http   search msn com  User Agent  requires browser restart    Windows CE    Cache Size  in KB    512 Delete Browsing History       Internet Options     General   Connection   7 Use LAN  no autodial  Autocial name   USE Client y     Settings     7 Use configuration script Address        7 Use a proxy server DO Bypass for local addresses    Address    Port  fo    Internet Options    General   Security    Internet Local Trusted sites Restricted _ Settings         intranet sites       Internet  This zone contains all Web sites you haven t  placed in other zones       3 115    Internet Options    General   Connection   Security   Privacy    Cookies   First party Cookies Third party Cookies    Accept    Accept      Block    Block      Prompt  O Prompt   Always allow session cookies    Internet Options    General   Advanced       Accessibility    Always expand ALT text for images  Anchors navigate on access key     Browsing      Always send URLs as UTF 8  A Display a notification about every script error  Enable stylesheets    Enahla nana transitinns    Internet Options    General   Connection   Security   Privacy   Advanced   Popups    Popup Windows   7 Block popups    Display notification when a popup has been blocked   7 Open 
185. ist     3  Copy the modified GrabTime ini file to the My Device  gt  System folder on the mobile device     The System GrabTime  ini file takes precedence over the Windows GrabTime  ini file  System Grabtime  ini also persists after a  coldboot  Windows Grabtime  ini does not persist     3 133       Misc    Options on this tab configure device specific options  Note that options not available on the Thor VM1are dimmed or grayed  out        Options al OK E      Communication   Misc  Status Popup                     CapsLock      Touch Screen Disable   Y Enable Keypad Backlight           Enable Auto On             CapsLock    By default  CapsLock is disabled after a warmboot  To enable CapsLock after a warmboot  click this checkbox     Touch Screen Disable    By default  the Thor VM1 touch screen is enabled  To disable the touch screen after a warmboot  click this checkbox     Note  Ifthe touch screen is disabled on a Thor VM1 with the 12 key keypad  you must use a USB mouse or keyboard  attached to the Thor VM1 to access this tab to re enable the touch screen     Enable Keypad Backlight    By default  the keypad backlight default setting is to follow the display backlight setting until it is changed by the user   Click the checkbox to disable the keypad backlight     Enable Auto On    When Auto On is enabled  the Thor VM1 boots when external power is applied    When Auto On is disabled   e if the ignition input signal is connected  when ignition changes from Inactive to Active
186. it Data Communications  the Laird Technologies Logo  the Summit logo  and  Connected  No Matter What  are  trademarks of Laird Technologies  Inc     The Bluetooth   word mark and logos are owned by the Bluetooth SIG  Inc     Symbol   is a registered trademark of Symbol Technologies  MOTOROLA  MOTO  MOTOROLA SOLUTIONS and the  Stylized M Logo are trademarks or registered trademarks of Motorola Trademark Holdings  LLC and are used under license     Wavelink    the Wavelink logo and tagline  Wavelink Studio     Avalanche Management Console     Mobile Manager     and  Mobile Manager Enterprise    are trademarks of Wavelink Corporation  Kirkland     RAM   and RAM Mount    are both trademarks of National Products Inc   1205 S  Orr Street  Seattle  WA 98108   Qualcomm is a registered trademark of Qualcomm Incorporated  Gobi is a trademark of Qualcomm Incorporated   Verizon   is a registered trademark of Verizon Trademark Services LLC    T MOBILE   is a registered trademark of Deutsche Telekom AG    AT amp T   is a registered trademark of AT amp T Intellectual Property    Acrobat   Reader    2012 with express permission from Adobe Systems Incorporated    Other product names or marks mentioned in this document may be trademarks or registered trademarks of other companies  and are the property of their respective owners    Patents    For patent information  please refer to www honeywellaidc com patents     Limited Warranty    Refer to www  honeywellaidc com warranty_ information for yo
187. ited warranty for the Thor VM1 AC power supply and cables is 1 year    The duration of the limited warranty for the Thor VM1 DC DC Converter is 1 year    The duration of the limited warranty for the Thor VM1 cables  USB  Serial  Communication  Power  is 1 year     9 2    9 3    Honeywell Scanning  amp  Mobility  9680 Old Bailes Road   Fort Mill  SC 29707  www honeywellaidc com    E EQ VM1CERG  Rev D  10 12    
188. k     6 25       LEAP    To use LEAP  without WPA   make sure the following profile options are used   e Enter the SSID of the Access Point assigned to this profile  e Set EAP Type to LEAP  e Set Encryption to WEP EAP or Auto WEP  depending on SCU version   e Set Auth Type as follows     e Ifthe Cisco CCX certified AP is configured for open authentication  set the Auth Type radio parameter to  Open     e Ifthe AP is configured to use shared key or passphrase  set the Auth Type radio parameter to Shared   e Ifthe AP is configured for network EAP only  set the Auth Type radio parameter to LEAP     Summit Client Utility B OK E  Main   Profile   status   Diags   Global    Profile   Default y  New   Rename  Delete   Scan Ke  Radio  Encryption  EAP type      api  Auto WEP 7   LEAP 7   WEP keys PSKs  Credentials    Save Changes  Commit                                 See Sign On vs  Stored Credentials for information on entering credentials     To use Stored Credentials  click on the Credentials button  No entries are necessary for Sign On Credentials as the user will  be prompted for the Username and Password when connecting to the network     Credentials H A    User     Password          Enter the Domain Username  if the Domain is required   otherwise enter the Username           Enter the password  Click OK then click Commit     Ensure the correct Active Profile is selected on the Main tab and warmboot  The SCU Main tab shows the device is associated  after the radio connects to 
189. l  On Thor  VM1     Strain Relief Clamps  on Dock   RAM Ball  on Dock        Access Panel Door is labeled with SSD and SD  Access Panel Door is labeled with SIM   1  CompactFlash Hard Drive 1  SIM card slot for WWAN radio  2  SD  Secure Digital  Memory Card Slot 2  UPS battery disconnect    1 4    Chapter 2  Hardware    System Hardware    Antenna Connectors                802 11a b g Wireless Client    The Thor VM1 has an 802  11a b g network card that supports diversity with two internal or external antennas  Power  management for the network card is configured with the Summit Client Utility     Central Processing Unit    The CPU is a 1 6 GHz Intel Atom processor  The operating system is Microsoft CE 6 0  The OS image is stored on an internal  CompactFlash card and is loaded into DRAM for execution     2 1       Input Output Components    The Thor VM1 supports the following I O components of the core logic   e Two 9 pin RS 232 serial ports configured as COM1 and COM2   e One slot for SD memory card   e CompactFlash  CF  drive   e Integrated keyboard   e Ports available via dongle cable     o USB Host port  o USB Client port  o CANbus   o Audio    System Memory    Main system memory is 1GB SDRAM     Video Subsystem    The Thor VM1 video subsystem consists of a color TFT display  The video subsystem complies with the VESA VL bus  standard  The resolution of this display is 800 x 480 pixels  This resolution complies with the WVGA graphics industry  standard     The display supp
190. lace the Thor VM1 in Suspend by pressing the Power button    Remove the Thor VM1 from the Quick Mount Smart Dock    Disconnect the UPS    Loosen the fourteen  14  captive M3 screws holding the front panel  Use a  2 Philips bit     a FF woON SB                      2 43       5  Carefully lift the front panel away from the device     A  Slot on Thor VM1 body    B  Wiring connector on Thor VM1  body       C  Wiring connector on front panel  D  Tab on front panel       Position the replacement front panel so the tab on the back of the front  D in figure above  panel lines up with the slot  A  in figure above  on the Thor VM1  Be sure the two wiring connectors  B and C in figures above  are also aligned     7  Gently press the front panel into place     8  Tighten the fourteen  14  captive M3 screws  In the order shown in the top figure above  use a  2 Philips bit and torque    10   11   12   13     the screws to 6 7 inch pounds    Reinstall the Thor VM1 in the Quick Mount Smart Dock    When the Thor VM1 is placed in the powered dock  the UPS battery automatically reconnects   Restart the Thor VM1    When restarted  the Thor VM1 automatically recognizes the keyboard type  12 or 64 keys      If the defroster configuration has changed  use the Test button on the Peripherals control panel to update the Thor VM1  defroster configuration     2 44       Field Replaceable UPS Battery    Requirements   User Supplied     e Torquing tool capable of measuring inch pounds  e  2 Philips screw
191. lay brightness  controls in the table below have no effect     8 6    To get this Key   Function  Power On Suspend Power      Brightness Up 2nd F7  see note above   Brightness Down 2nd  Volume Up 2nd  Volume Down 2nd F10          IBM Terminal Emulation    The Thor VM1IBM 3270 and IBM 5250 Terminal Emulator keypads are designed to allow the user to enter terminal emulator  commands when running the RFTerm program  When running RFTerm on the Thor VM1  please refer to the RFTerm  Reference Guide for equivalent keys and keypress sequences     IBM 3270     j  i a T   gt           amp      OG  OO    0068  000    Cir Ctrl C  Ins Ctrl      PA    Ctrl   F1  PA2 P  Ctrl   F2  PA3 P  Ctrl   F3  Rst Ctrl   R       8 8       IBM 5250    pa foa fomo       8 9    8 10    Chapter 9  Technical Assistance    If you need assistance installing or troubleshooting your device  please contact us by using one of the methods below   Knowledge Base  www hsmknowledgebase com    Our Knowledge Base provides thousands of immediate solutions  If the Knowledge Base cannot help  our Technical Support  Portal  see below  provides an easy way to report your problem or ask your question     Technical Support Portal  www hsmsupportportal com    The Technical Support Portal not only allows you to report your problem  but it also provides immediate solutions to your  technical issues by searching our Knowledge Base  With the Portal  you can submit and track your questions online and send  and receive attachments  
192. le Viewers    The following applications are included   e JETCET PDF Viewer  e Office 2003 Excel Viewer  e Office 2003 PowerPoint Viewer  e Office 2003 Word Viewer  Note  The viewer applications allow viewing documents  but not editing them     Microsoft WordPad    Start  gt  Programs  gt  Microsoft WordPad   Create and edit documents and templates in WordPad  using buttons and menu commands that are similar to those used in the  desktop PC version of Microsoft WordPad    By default WordPad files are saved as  PWD files  Documents can be saved in other formats e g    RTF or  DOC    Tap the   button to access WordPad Help     Remote Desktop Connection    Start  gt  Programs  gt  Remote Desktop   There are few changes in the Windows CE version of Remote Desktop as it relates to the general desktop Windows PC  Microsoft Remote Desktop options    If installed  Remote Desktop on the Thor VM1 can be accessed by Start  gt  Programs  gt  Remote Desktop    Select a computer from the drop down list or enter a host name and tap the Connect button     Tap the Options  gt  gt  button to access the General  Display  Local Resources  Programs and Experience tabs  Tap the   button  to access Remote Desktop Connection Help     Settings    Start  gt  Settings    The Settings menu option may include the following     Control Panel All control panels    Network and Dialup Con  Shortcut to control panel  Connect to a network  create a new connection  and adjust parameters for  nections client con
193. le cable is attached to the Thor VM1  Disconnect and reconnect the cable from the PC   Check that the correct connection is selected  USB    Client       See Also     Cold Boot and Loss of Host Reconnection        ActiveSync indicator on the host  disc in the toolbar tray  turns green and spins as soon as you connect the cable   before tapping the Connect icon  or REPLLOG EXE in the Windows directory      One or more control lines are tied together incorrectly  This is usually a cable problem   ActiveSync indicator on the host turns green and spins  but connection never occurs    Check that the correct connection is selected  USB    Client      Or   Incorrect or broken data lines in cable     ActiveSync indicator on the host remains gray    Solution 1  ActiveSync icon on the PC does not turn green after connecting USB cable from Thor VM1   1  Disconnect Thor VM1 USB cable from PC   2  Suspend Resume or Restart the Thor VM1   3  In ActiveSync  gt  File  gt  Connection Settings on PC disable Allow USB Connections and click OK   4  Re enable Allow USB Connections on the PC and click OK   5  Reconnect USB cable from Thor VM1 to PC     Solution 2  The host doesn   t know you are trying to connect  May mean a bad cable  with no control lines connected  or an  incompatible baud rate  Try the connection again  with a known good cable     4 5       Configuring the Thor VM1 with LXEConnect    LXEConnect allows a user to view the Thor VM1 screen remotely from a PC using an ActiveSync co
194. lect a task   Request a certificate    View the status of a pending certificate request  Download a CA certificate  certificate chain  or CRL       Click the Download a CA certificate  certificate chain or CRL link   Make sure the correct root CA certificate is selected in the list box     6 40       Microsoft Certificate Services    Download a CA Certificate  Certificate Chain  or CRL    To trust certificates issued from this certification authority   install this CA certificate chain     To download a CA certificate  certificate chain  or CRL  select the  certificate and encoding method     CA certificate     Encoding method      DER   C Base 64  Download CA certificate  Download CA certificate chain  Download latest base CRL  Download latest delta CRL    Click the DER button   To download the CA certificate  click on the Download CA certificate link        File Download   Security Warning          Click the Save button and save the certificate  Make sure to keep track of the name and location of the certificate   Install the certificate on the Thor VM1     6 41       Installing a Root CA Certificate    Note  This section is only if the Windows certificate store is used  If the certificate store is not used  copy the certificate to  the  System folder or other path specified in the Summit Certs global parameter     Copy the certificate file to the Thor VM1  Import the certificate by navigating to Start  gt  Control Panel  gt  Certificates                     Cl      Public 
195. ler  Contact Technical Assistance for upgrades        File Menu Options    The Connect option under the File menu allows the user to initiate a manual connection to the Mobile Device  Connect   Server  The connection methods  by default  are wireless and COM connections  Any updates available will be  applied to the Thor VM1 immediately upon a successful connection     The Scan Configuration feature is not supported  The Scan Config option under the File menu allows the user to  configure Enabler settings using a special bar code that can be created using the Avalanche MC Console utilities   Refer to the Wavelink Avalanche Mobility Center User Guide for details     The Settings option under the File menu allows the Thor VM1 user to access the control panel to locally configure  the Enabler settings  The Enabler control panel is  by default  password protected        Input Settings Password E          The default Settings password is system  The password is not case sensitive        Avalanche Update using File  gt  Settings    Use these menu options to setup the Avalanche Enabler on the Thor VM1  Change the settings and save them by rebooting  before connecting to the network     Alternatively  the Mobile Device Server can be disabled until needed  refer to the Wavelink Avalanche Mobility Center  User   s Guide for details      Menu Options    Note  Your Thor VM1 screen display may not be exactly as shown in the following menu options  Contact Technical  Assistance for version
196. les or copy files out of the  Windows folder on the mobile device   Technically  the only files you cannot delete or copy  are ones marked as system files in the original build of the Windows image  This  however  includes most of the files in the   Windows folder      Backup Data Files using ActiveSync  Use the following information to backup data files from the mobile device to a desktop or laptop PC using the appropriate cable  and Microsoft   s ActiveSync     Prerequisites    A partnership between the mobile device and ActiveSync has been established     e Adesktop or laptop PC with an available USB port and a mobile device with a USB port  The desktop or laptop PC must  be running Windows XP or greater     e Use the specific USB cable as listed in Connect Via USB     Connect    Connect the USB cable to the PC  the host  and the mobile device  the client    The    Get Connected    wizard on the host PC checks COM ports to establish a connection for the first time   Note  USB synchronization will start automatically when the cable is connected     43       Disconnect    e Disconnect the cable from the Thor VM1   e Open the status bar icon in the lower right hand corner of the status bar  Then tap the Disconnect button     When the Thor VM1 loses connection  e g  enters Suspend Mode  etc   the connection to ActiveSync will be lost  When the  Thor VM1 resumes  the ActiveSync session will automatically re connect     Thor VM1 with a Disabled Touch Screen    An Thor VM1 touch 
197. location chosen for  certificate storage should persist after a reboot     3  When completing the Credentials screen for the desired authentication  do not check the Use MS store checkbox after  checking the Validate server checkbox     Enter the certificate name in the CA Cert textbox   5  Click OK to exit the Credentials screen and then Commit to save the profile changes     How To  Use Windows Certificate Store    1  See Generating a Root CA Certificate and follow the instructions to download the Root Certificate to a PC   2  Toimport the certificate into the Windows store  See Installing a Root CA Certificate     3  When completing the Credentials screen for the desired authentication  be sure to check the Use MS store checkbox  after checking the Validate server checkbox     4  The default is to use all certificates in the store  If this is OK  skip to the last step   5  Otherwise  to select a specific certificate click on the Browse       button     6 21          Choose certificate     7 Use full trusted store               Issued By  Thawte Server CA  Thawte Premium Server CA  Secure Server Certification Authority    GTE CyberTrust Root  FO       GTE CyberTrust Global Root             6  Uncheck the Use full trusted store checkbox     7  Select the desired certificate and click the Select button to return the selected certificate to the CA Cert textbox   8  Click OK to exit the Credentials screen and then Commit to save the profile changes     6 22       Configuring th
198. ly the first time Avalanche is used  Following  installation  the Wavelink Avalanche Enabler will be an auto launch application  This behavior can be modified by accessing  the Avalanche Update Settings panel through the Enabler Interface     Software Development    See Also  CE API Programming Guide    The CE API Programming Guide documents Honeywell specific API calls for the Thor VM1  It is intended as an addition to  Microsoft Windows CE API documentation     A Software Developers Kit  SDK  and additional information about software development can be found on the Developer  Portal  Please Contact Technical Assistance for more information     Thor VM1 Utilities    The following files are pre loaded     LAUNCH EXE    Launch works in coordination with registry settings to allow drivers or applications to be loaded automatically into DRAM at  system startup  Registry settings control what gets launched  see the App Note for information on these settings  For  examples  you can look at the registry key   HKEY_LOCAL_MACHINE 1 Software   LXE   Persist   Launch will execute  CAB files   BAT files  or  EXE files     App Note    All applications to be installed into persistent memory must be in the form of Windows CE CAB files  These CAB  files exist as separate files from the main installation image  and are copied to the CE device using ActiveSync   or using a Compact Flash ATA card  The CAB files are copied from ATA or using ActiveSync Explore into the  folder System  which is t
199. matically  The installation application must be run manually the first  time Avalanche is used     After installation  the Enabler runs as a background application monitoring for updates  This behavior can be modified by  accessing the Avalanche Update Settings panel through the Enabler interface     This behavior can be modified by accessing the Avalanche Update Settings panel through the Enabler Interface   The RMU CE CAB file is placed on the device during manufacturing in the  System RMU folder   During the Enabler installation process  the Enabler checks for the RMU CE CAB file in the  System folder   e If present  it assumes the RMU CE CAB file is already installed and continues   e Ifthe file RMU CE CAB file is not present  it looks for the file in the  System RMU folder   e If present  the Enabler copies the file to the  System folder and installs it   At this point  the OS will automatically install the Remote Management Utility  RMU  after the Thor VM1 reboots        Enabler Uninstall Process    To remove the Avalanche Enabler from the Thor VM1     e Delete the Avalanche folder located in the  System directory   e Warm boot the Thor VM1   The Avalanche folder cannot be deleted while the Enabler is running  See Stop the Enabler Service     If sharing errors occur while attempting to delete the Avalanche folder  warm boot the Thor VM1  immediately delete the  Avalanche folder  and then perform another warm boot     Stop the Enabler Service    To stop the Enabler from 
200. min status popup windows     3 135       Owner    Start  gt  Settings  gt  Control Panel  gt  Owner  Set the Thor VM1 owner details  The Network ID is used when logging into a remote network     Factory Default Settings    Identification tab   Name Blank  Company Blank  Address Blank  Telephones Blank  Display owner ID at power on Disabled  Notes tab   Notes Blank    Display notes at power on Disabled    Network ID tab    Owner Properties E OK E  Identification   Notes   Network ID      At Power On  Name     7  Display owner identification  Company       Area code  Phone   Address  Work     Home     fo                      3 136    Owner Properties    Identification    Use the Notes field to  add any additional  information not included  in the Identification tab      _  Display owner notes at power on    Owner Properties    Identification   Notes   Network ID    Windows CE uses this User name   information to gain access to   network resources  Enter the Password   user name  password  and   domain provided by your Domain   network administrator        Enter user name  password and domain to be used when logging into network resources     3 137       Password    Start  gt  Settings  gt  Control Panel  gt  Password    Use this panel to set Thor VM1 user access to control panels and power up password properties   Important  This password must be entered before performing a Load Factory Defaults     If entering a power on or screen saver password does not allow you to disable t
201. monitoring for updates from the Mobility Center Console     1     NDOJA WON    Open the Enabler Settings Panels by tapping the Enabler icon on the Thor VM1 desktop    Select File  gt  Settings    Select the Preferences tab    Select Do not monitor to prevent automatic monitoring upon Startup    Select Exit Application for an immediate shutdown of all Enabler update functionality upon exiting the user interface   Click the OK button to save the changes    Reboot the Thor VM1 if necessary     5 2       Update Monitoring Overview    There are three methods by which the Enabler on the Thor VM1 can communicate with the Mobile Device Server running on the  host machine     e Wired via a serial cable between the Mobile Device Server PC and the Thor VM1   e Wired via a USB connection  using ActiveSync  between the Mobile Device Server PC and the Thor VM1   e Wirelessly via the Thor VM1 2 4GHz radio and an access point    After installing the Enabler on the Thor VM1 the Enabler searches for a Mobile Device Server  first by polling all available serial  ports and then over the wireless network     The Enabler running on the Thor VM1 will attempt to access COM1  COM2  and COM3     Agent not found    will be reported if the  Mobile Device Server is not located or a serial port is not present or available  COM port settings can be verified using the bar  code wedge panels on the Thor VM1      The wireless connection is made using the default wireless  radio  interface on the mobile device
202. must use a USB  mouse or keyboard attached to the Thor VM1 to access the control panel to re enable or recalibrate the touch screen     Touch Screen Defroster    Extended temperature versions of the Thor VM1 contain a touch screen defroster  The touch screen defroster can be disabled  when not needed  Start  gt  Settings  gt  Control Panel  gt  Peripherals   The defroster trip point is configurable  The defroster is  always disabled when the device is operating from UPS battery power     Screen Blanking    Screen blanking  blackout  can be enabled when the vehicle is in motion  A serial cable must be attached to the Thor VM1 and  the Thor VM1 must be configured to enable screen blanking  Start  gt  Settings  gt  Control Panel  gt Screen Control   Once screen  blanking is enabled  the display is blanked out any time when the cable sends the signal the vehicle is in motion  If the cable is  removed  screen blanking is disabled and the display remains on     Display Backlight Control    The display brightness on a Thor VM1 equipped with an outdoor display can be configured to automatically adjust depending on  the ambient light level  Start  gt  Settings  gt  Control Panel  gt  Screen Control      Note  When automatic brightness control is enabled  the manual display brightness controls described below have no  effect     The display brightness can be adjusted manually  via the keypad     e Use the 2nd   F7 keypress to increase backlight brightness and the 2nd   F8 keypress to d
203. nal emulation program  When RFTerm is installed  this icon is displayed on the  desktop     LXE RFTerm    f  A  Remote A shortcut to the Remote Desktop Connection utility     Desktop  Connection    mn Avalanche shortcut  Wavelink   Avalanche Mobility Center     Avalanche MC  is a remote client management     AS system that is designed to distribute software and configuration updates to monitored devices  The enabler for  Wavelink Avalanche is loaded on the Thor VM1 but not installed  When the enabler is installed the Avalanche    Avalanche   icon is displayed on the desktop      wa  The demo version of Wavelink Telnet CE is installed on all devices  Please Contact Technical Assistance for  Al  licensing information  When installed  license details are maintained in the Wavelink tab in the License Viewer  TelnetCE   control panel     FU Start Start button  Access programs  select from the Favorites listing  documents last worked on  change view set   tings for the control panel or taskbar  on line help or run programs        Taskbar    Sa  9 01PM  2     The number and type of icons displayed are based on the device type  installed options and configuration of the Thor VM1     My Device Folders    Storage Card or SD Card   Additional optional storage space  Temp Location for temporary files  Windows Operating System in Secure Storage       3 10       Wavelink Avalanche Enabler  Optional     Note  Ifthe useris NOT using Wavelink Avalanche to manage their mobile device  the Enabl
204. nd   F5 generates the remapped key  However  if the next key   press is Shift  the Thor VM1 reboots  The remapped keypress DOES NOT affect the 2nd   F5   Shift reboot key    sequence     Keypad Control Ed OK E    KeyMap  LaunchApp   RunCmd      Modifier Mode      None    shift    Function      Key                   Remapped Key       Key Sequence    SS    Escape  TE          Assign settings by clicking radio buttons and selecting keys from the drop down boxes  Tap the OK button when finished  The  changes take effect immediately     Remap a Single Key    Select the modifier key from the Modifier Mode options   Select the key to be remapped from the Key pulldown list   Select the value from the remapped key from the Remapped Key pulldown list     FON  gt     Click OK to save the result and close the control panel     Remap a Key to a Unicode Value    Select the modifier key from the Modifier Mode options   Select the key to be remapped from the Key pulldown list   Select Unicode from the Remapped Key pulldown list     FON  gt     There are two Unicode text boxes located on the lower part of this tab  Enter the Unicode value in the left textbox and  the Unicode character is displayed in the right textbox     5  Click OK to save the result and close the control panel     3 119       Remap a Key Sequence    Up to 16 keys may be specified for the key sequence  The sequence can consist of keys and Unicode values     1     oa FF ON    Select the modifier key from the Modifier Mode o
205. nding upon which components you are running  your product may  ontain the following third party technologies     ortions of this software are based on NCSA Mosaic  NCSA Mosaic was  veloped by the National Center for Supercomputing Applications at  the University of Illinois at Urbana Champaign  Distributed under a  icensing agreement with Spyglass  Inc  ly        This screen is presented for information only  The Copyrights information cannot be changed by the user     3 153       Terminal Server Client Licenses    Start  gt  Settings  gt  Control Panel  gt  Terminal Server Client Licenses    Terminal Server Client Licenses    Stored Licenses   aaa         No Licenses found       Any licenses stored on the Thor VM1 appear in the drop down list  Select a license and tap the Close button  The license is  available for use immediately     3 154       Volume and Sounds    Start  gt  Settings  gt  Control Panel  gt  Volume  amp  Sounds    Note  An application may override the control of the speaker volume  Tuming off sounds saves power and prolongs battery  life     Set volume parameters and assign sound WAV files to CE events using these options   You can also select   deselect sounds for key clicks and screen taps and whether each is loud or soft     As the volume scrollbar is moved between Loud and Soft  the Thor VM1 emits a tone each time the volume increases or  decreases     Volume must be enabled when you want to adjust volume settings using keypad keys     Factory Default 
206. ne store     Additional Options   Request Format    CMC OPKCS10    Hash Algorithm    SHA 1 vw  Only used to sign request                 O Save request to a file       Attributes                    Friendly Name        For the Certificate Template  select User   Check the Mark keys as exportable and the Export keys to file checkboxes   Type the full path on the local PC where the private key is to be copied  Also specify the private key filename     6 47       Be sure to note the name used for the private key file  for example AAAUSER PVK  The certificate file created later  in this process must be given the same name  for example  AAAUSER CER     DO NOT check to use strong private key protection   Make any other desired changes and click the Submit button     Potential Scripting Yiolation    This Web site is requesting a new certificate on your behalf  You should allow only  trusted Web sites to request a certificate for you   Do you want to request a certificate now     Yes   No         Potential Scripting Yiolation    Saving a file into your local system could potentially violate scripting safety   Do you want to create a private key user1key pwk     Yes   No         If any script notifications occur  click the    Yes button to continue the certificate request     Create Private Key Password x            Key  userlkey pyk    Password     Confirm Password          When prompted for the private key password     None   Cancel         e Click None if you do not wish to use a p
207. nections     Taskbar Set Taskbar parameters    Transcriber    To make changes to the Transcriber application  tap the keyboard icon in the status bar  Select Transcriber from the pop up  menu  Then open the Input control panel and tap the Options button  Transcriber Options  Start  gt  Settings  gt  Control Panel  gt     3 15       Input Panel  are available only when Transcriber is selected as the active input method  Tap the         button or the Help button to  access Transcriber Help     Windows Explorer    Start  gt  Programs  gt  Windows Explorer    There are a few changes in the Windows CE version of Windows Explorer as it relates to the general desktop PC Windows  Explorer options  Tap the         button to access Windows Explorer Help     3 16       Taskbar    Start  gt  Settings  gt  Taskbar    There are a few changes in the Windows CE version of Taskbar as it relates to the general desktop PC Windows Taskbar  options     When the taskbar is auto hidden  press the Ctrl key then the Esc key to make the Start button appear   Clicking the Taskbar option on the Settings menu displays the Taskbar General tab and the Taskbar Advanced tab   See Also   Taskbar Icons     General Tab    Factory Default Settings    Always on Top Enabled  Auto hide Disabled    Show Clock Enabled                   Taskbar and Start Menu Properties  Always on top    7 Auto hide  Show Clock          Advanced Tab              Taskbar and Start Menu Properties     Genera   Advanced    DARS  e Tap th
208. nel                2222 222     2c cee cece ccc cc cece cece cece cece cece cece cece eeeeeeecceeeeeeeeeeesseeeees 2 43  Replace Front Panel           2 2    0 222    c cece nana 2 43  Field Replaceable UPS Battery       22 2220222222 c cece eee ccc ccc cece cece cece ee aaaea Aa eeeeeeeeeeeeeereeeeneees 2 45  Replace UPS Battery  2 0    cece cece cece ccc cece eee ececeeeececeeceeteecettetetttetentneeneeeeenececeeeceeees 2 45  Chapter 3 Software_ 8  Introduction  seeen the cee ie eae ea tee ae eh otto saute emit e e seen c eae 3 1  Operating System      22    c cece cece cece cee ce cece secececececececeeeceeeeseeeeeeeeeeeeees 3 1  Windows CE Operating System  oo e cece eee e cece eee AEDA EEA A Ea aa arnan ann 3 1  General Windows CE Keyboard Shortcuts             00  00000000 o coco ec cee ce eee eee cece ee eeeeeeeeeeeeeeeeeeees 3 2  Rebooting the Thor VM1      0 2 2 2 eee eee cece eee cece cece cece cc cece cee cece ee eee cece eee ee ce eeeeeeeeeeeeeeceeeeereseeeeees 3 3  AE A 3 3  A   ee ol ee oo es es A 3 3  Clearing Persistent Storage   Reset to Default Settings             00 000000002 c occ c cece ccc ccc ccc ccc eee c eee eeeeeeees 3 3    Folders Copied at Startup       2 2 22      2 00 cc coc nn 3 3          Saving Changes to the Registry       2 0 0 0    ccc cccc cece eccccceececcccccceceecccccceeeececuceeeeeececceeeeeeesecceeeneeeees 3 4    Sofware Load  orcos st lage eee re eyed se Llc ate OSL ig ee eee eee dd 3 5  SoftWare Applications  s o oecon dons Sod Sec
209. new pages in the current window       3 116       Keyboard    Start  gt  Settings  gt  Control Panel  gt  Keyboard  Set keypad key map  keypad key repeat delay  and key repeat rate     Factory Default Settings    Repeat character    Repeat Delay       Repeat Rate       Keyboard Properties E    OK El  Repeat      Enable character repeat    oN Repeat delay     Repeat rate   Long Short   Slow Fast    E A ea ce  ES 3  Tap here and hold down a key to test  o             3 117       KeyPad    Start  gt  Settings  gt  Control Panel  gt  KeyPad    Use this control panel option to assign key functions to mappable keys available on your Thor VM1  determine application  launch sequences and program command Run sequences     Factory Default Settings    KeyMap    Modifier Mode   None  LaunchApp   Empty  App2  App3  App4    RunCmd   Cmd1 Empty  Cmd2 Empty  Cmd3 Empty  Cmd4 Empty  File Parm FILE       The KeyPad panels can be used to perform the following functions   e Remap a key to any single key  e Remap a key toa Unicode value  e Remap a key toa string of up to 16 keys or Unicode values in any combination  e Remap a key to launch a user selected application  e Remap a key to run a command    Note  KeyPad Control Panel options LaunchApp and RunCmd do not inter relate with similarly named options contained in  other Control Panel applets  For example  the AppLock Administrator Control panel file Launch option     3 118       KeyMap Tab    If 2nd   F5 is remapped to another key  pressing 2
210. ngs  gt  Control Panel  gt  Data Collection  gt  About tab    This tab displays the Data Collection Wedge driver version installed in the Thor VM1  The version number shown in the image  below is used only as an example  your version number will be different        Data Collection      main   com   Come   Data Options   Processing  About      DCWedge Version   DCWPCEX1Ay                   3 96       Length Based Bar Code Stripping    Use this procedure to create symbology rules for two bar codes with the same symbology but with different discrete lengths   This procedure is not applicable for bar codes with variable lengths  falling between a maximum value and a minimum value      Example   For the purposes of this example  the following sample bar code parameters will be used     EAN 128 and Code 128 bar codes   Some of the bar codes start with    00    and some start with    01     The bar codes are different lengths     e 34 character length with first two characters      01     strip first 2 and last 18   e 26 character length with first two characters      01     strip first 2 and last 10   e 24 character length with first two characters      01     strip first 2 and last 8   This 24 character bar code is Code 128   e 20 character length with first two characters      00     strip first O  no characters  and last 4   On the Data Options tab  set Enable Code ID to Custom   Create four custom IDs  using 1 for EAN 128 bar code and 0 for Code 128 bar code   e c1 Code     C1 
211. nique Bluetooth address bar  code for the Thor VM1     First  locate the Thor VM1 Bluetooth address by tapping Start  gt  Settings  gt  Control Panel  gt  Bluetooth  gt  About tab     LXEZ Pairing   OK E      Bluetooth Devices   Settings   Reconnect   About    Computer Friendly Name  Bluetooth Address     00 40 FD 02 03 04      BTC version 1 0 BTDRPX861Jw  Bluetooth Stack Revision  2 1                     Copyright 2006 2011 LXE Inc             Next  create  a Bluetooth address bar code label for the Thor VM1   The format for the bar code label is as follows   e Barcode type must be Code 128     e FNC3 character followed by string Uppercase L  lowercase n  lowercase k  uppercase B and then the Bluetooth  address  12 hex digits  no colons   For example  LnkB0400fd002031     Create and print the label   Scan the Thor VM1 Bluetooth address bar code label with the Bluetooth bar code reader   The devices are paired  The Bluetooth bar code reader responds with a series of beeps and LED flashes     Note  After scanning the Thor VM1 Bluetooth label  if there is no beep and no LED flash from the Bluetooth bar code reader   the devices are currently paired     See Also   Bluetooth Beep and LED Indications     1Free bar code creation software is available for download on the World Wide Web  Search using the keywords    bar code  create        3 69       Bluetooth Beep and LED Indications    Acknowledge label 1 beep   Label rejected 2 beeps at low frequency  Transmission error Beep will 
212. nization mode  For example  you can synchronize   continually while connected to your desktop computer or only when you choose the synchronize command     By default  ActiveSync does not automatically synchronize all types of information  Use ActiveSync Options to specify the  types of information you want to synchronize  The synchronization process makes the data  in the information types you  select  identical on both your desktop computer and your device     When installation of ActiveSync is complete on your desktop computer  the ActiveSync Setup Wizard begins and starts the  following processes     e connect your device to your desktop computer   e set up a partnership so you can synchronize information between your device and your desktop computer  and  e customize your synchronization settings     Because ActiveSync is already installed on your device  your first synchronization process begins automatically when you  finish setting up your desktop computer in the ActiveSync wizard  For more information about using ActiveSync on your  desktop computer  open ActiveSync  then open ActiveSync Help        Initial Setup    The initial setup of ActiveSync must be made via a USB connection  When there is a Connect icon on the desktop  this section  can be bypassed  Partnerships can only be created using USB cable connection     Connect via USB    The default connection type is USB Client   This is the only connection option supported on the Thor VM1   To verify it is set to US
213. nize all scanner formats for your device     3 74       Data Processing Overview    Bar code data processing involves several steps  Some steps may be skipped during the processing depending on user  selections on the Data Options control panels  The steps are presented below in the order they are performed on the scanned    data   1     o MANOA F WN    mb A     N 2 09    13     Scanned data is tested for a code ID and length  Min Max   If it matches  it is processed per the rules in place for that  symbology  If the scan does not meet the criteria for that symbology  it is processed based on the settings for All  If a  code ID is not found  the bar code data is processed based on the settings for All     If the symbology is disabled  the scan is rejected    Strip leading data bytes unconditionally    Strip trailing data bytes unconditionally    Parse for  and strip if found  Data Options strings    Replace any control characters with string  as configured    Add prefix string to output buffer    If Code ID is not stripped  add saved code ID from above to output buffer   Add processed data string from above to output buffer    Add suffix string to output buffer       Add a terminating NUL to the output buffer  in case the data is processed as a string     If key output is enabled  start the process to output keys  If control characters are encountered     e If Translate All is set  key is translated to CTRL   char  and output   e If Translate All is not set  and key has a val
214. nnection     Requirements  ActiveSync version 4 5  or higher  must be resident on a Windows XP  desktop laptop  host computer   Windows Mobile Device Center  version 6 1 or higher  is required for a Windows Vista Windows 7 desktop laptop computer     ActiveSync is already installed on the Thor VM1  The Thor VM1 is preconfigured to establish a USB ActiveSync connection to  a host PC when the USB cable is attached to the Thor VM1 and the host PC     Install LXEConnect    1  Contact Technical Assistance for the LXEConnect files   2  Download the files to a location on your host PC hard drive   3  Execute the setup exe file that was copied to the host PC  This setup program installs the LXEConnect utility     fi LXEConnect BBE  Welcome to the LXEConnect Setup Wizard  a    Ex     The installer will guide you through the steps required to install LXE Connect on your computer     WARNING  This computer program is protected by copyright law and international treaties   Unauthorized duplication or distribution of this program  or any portion of it  may result in severe civil  or criminal penalties  and will be prosecuted to the maximum extent possible under the law        Cancel   Back Next  gt          Follow the on screen installation prompts  The default installation directory is C  Program Files LXE LXEConnect     5  When the installation is complete  create a desktop shortcut to the LXEConnect exe file located in the directory above   If a different directory was selected during 
215. o the Thor VM1 and the device s Bluetooth connection is  active     Double tap a device in the list to open the device properties menu  The target device does not need to be active     Clear Button    Deletes all devices from the Device table that are not currently paired  A dialog box is presented   Delete all disconnected  devices  Yes No   Tap the Yes button to remove disconnected or deleted devices from the device table  The devices are  removed from the Device table after any reboot sequence or after closing and reopening the Bluetooth panels  Tap the No  button to make no changes  See Clear Pairing Table on Boot     3 56       Bluetooth Device Menu    Pre requisite  The Discover button has been clicked and there are Bluetooth devices listed     Click on a device in the list to highlight it  Double click the highlighted device to display the Bluetooth Device right click menu   The Bluetooth device does not need to be active     Pair as Scanner  Pair as Scanner  Pair as Printer    Pair as Printer    Pair as Serial Device  Delete       Properties Delete  Properties  Filtered Mode Enabled Filtered Mode Disabled    Right Click Menu Options    Pair as Scanner Receive data from the highlighted Bluetooth scanner or Bluetooth imager   Pair as Printer Send data to the highlighted Bluetooth printer     Communicate with the highlighted serial Bluetooth device  This option is available when Filtered    Pair as Serial Device   Vode is disabled     Disconnect Stop the connection betwe
216. obility Center Console and is disabled by default  For Summit clients  Manage Wireless Settings should  not be checked as configuration packages provide more radio configuration options     Cue Lists all network adapters currently installed on the Thor VM1   Adapter    Primary Indicates if the Enabler is to attempt to configure the primary adapter  active only if there are multiple network  Adapter adapters      Icon on Places the Avalanche icon in the Avalanche taskbar that may  optionally  override the standard Windows task   taskbar bar     The Enabler will apply all network settings sent to it by the Mobile Device Server        5 21    Selecting the Avalanche Icon will access the Avalanche Network Profile tab which will display current network  settings        Avalanche Avalanche Network Profile Properties OK E    Icon Profile       varies by  Enabler Property  version  ManageNet    no  ManageWWire    no          When enabled  the Enabler will ignore any network or wireless settings coming from the Avalanche MC Console  and use only the network settings on the Thor VM1     Properties   Selecting the Properties icon displays the Manual Settings Properties dialog applet  From here  the user can con   figure Network  DNS and Wireless parameters using the displays shown below        Note  A reboot may be required after enabling or disabling these options     Network DNS          Manual Settings Properties OK A    Network  ons   Authentication   Wireless        Manage network 
217. ode that acts as an identifier  the actual Code ID   Both Name and ID Code  must be specified in order to add a custom Code ID to the Custom IDs list     3 91       Buttons    Add    Entering data into both the Name and ID Code fields enables the Add button  Click the Add button and the data is added to the  next empty location in the Custom ID list     Insert    Click on an empty line in the Custom ID list  The Add button changes to Insert  Enter data into both the Name and ID Code  fields and click the Insert button  The data is added to the selected line in the Custom IDs list     Edit    Double click on the item to edit  Its values are copied to the text boxes for editing  The Add button changes to Replace  When  Replace is clicked  the values for the current item in the list are updated     Clear All    When no item in the Custom IDs list is selected  clicking the Clear All button clears the Custom ID list and any text written   and not yet added or inserted  in the Name and ID Code text boxes     Remove    The Clear All button text changes to a Remove button when an item in the Custom IDs list is selected  Click the desired line  item and then click the Remove button to delete it  Line items are Removed one at a time  Contents of the text box fields are  cleared at the same time     3 92       Control Code Replacement Examples    Gopngutation Translation Sombie Con epee Translated Data  Data trol Character   figuration  Ignore  drop  The control character is discarded f
218. on     PIN 1  PIN 6    PIN 5  PIN 9       Pinout    Siora  Descipion    6  DSR   Data Set Ready     Input   Request to Send     Output   8  CTS   Clear to Send     Input   5VDC   Bar Code Scanner Power   500mA max  or or  RI Ring Indicator   Input    Shell  CGND_   Chassis Ground          Screen Blanking    The screen blanking signal can be provided either by a Honeywell Screen Blanking Box or a user supplied switch or relay     e A screen blanking box can be used on a vehicle that provides voltage on vehicle motion  Voltage must be within the  range specified on the screen blanking box label     e A switch or relay can be used when an electrical signal is not available or is outside the acceptable range of the screen  blanking box     A serial cable must be used to connect the screen blanking device   e Anoptional Screen Blanking Box Cable is available from Honeywell  or    e A user supplied serial cable can be used  The cable must provide wires from pins 7 and 8 of the connector  No other  wires are used     Do not enable Screen Blanking until the cable is properly connected to the specified COM port        Serial Cable    Optional Honeywell Screen Blanking Box Cable  part number VM1080CABLE  or customer built cable with the following  specifications     PIN 5 PIN 1    re AE rt am  with Screen Blanking Box Honeywell Cable   o E  ae LA  AE A  ETA A AS  EE ME AA       2 13    DB9 Female Function Wire color from  with Screen Blanking Box Honeywell Cable        NotUsed   Used N
219. oot delay is associated for each application  it will be either a value specified by the Administrator or it will be the   delay default value  At startup  when a delay has been assigned for each application  AppLock waits for the delay associated   with the first application to expire before launching the first application then AppLock waits for the delay associated with the   second application to expire before launching the second application  AppLock continues in this manner until all applications   are launched    Note  A    Global Delay    can be accomplished by setting a timed delay for the first application to be launched  by lowest Order  number  and no delay  0 seconds  for all other applications     Note  Launch order is determined by the Order specified in the Application tab  The Order value does not have to be  sequential     3 36       Auto Re Launch       Application Launch Options  Launch     V  Auto At Boot Retries  fo Delay  fro   M  Retries  fo Delay  fo       Manual        7 Allow Close          Auto Re Launch    Default is Enabled     When enabled for a specific application  automatically re launches it  subject to the specified Auto Re Launch Delay in   seconds  after it terminates  This option allows the Administrator to disable the re launch operation  AppLock cannot prevent all   applications from closing  When an application that AppLock cannot prevent from closing terminates  perhaps because of an   error condition  AppLock re launches the applicat
220. or  VM1     e Maintain an uninterrupted AC DC power source to the Thor VM1 throughout this process     e The CF card with the OS and systems files must be present for the Thor VM1 to boot  Removal or installation of SD or  CF cards should be performed on a clean  well lit surface     e Always perform OS updates when the Thor VM1 has a dependable external power source connected to the Thor VM1     Procedure    Verify a dependable power source is applied to the Thor VM1 and will stay connected during the upgrade procedure   Warmboot the Thor VM1 before beginning the update process    Establish an ActiveSync connection between the Thor VM1 and a desktop laptop computer    Download the OS files from the desktop laptop to the Thor VM1 s System folder    During the file copy process to the Thor VM1 System folder  when asked    Overwrite       select Yes to All    Review the files that were downloaded to the System folder    Restart the Thor VM1    Disconnect from ActiveSync     o AN OA F WN      When the OS finishes loading  check the OS update version by selecting Start  gt  Settings  gt  Control Panel  gt  About  gt   Software tab     The touch screen may require calibration  however most Windows OS versions save the calibration data  eliminating the need  to calibrate     If the Thor VM1 won t boot up after the upgrade is finished  Contact Technical Assistance for re imaging options     3 19       BIOS    The Microsoft Windows CE operating system is installed before shipping  Th
221. or VM1 Vehicle Mounting  Reference Guide     Auto On Enabled    When Auto On is enabled  the Ignition Input signal  if connected via the Thor VM1 vehicle power supply cable  is ignored   When Auto On is enabled  the Thor VM1 boots when external power is applied  such as when    e The Thor VM1 is placed in a powered Smart Dock  with the dock s power switch set to On    e The Thor VM1 is ina Smart Dock and truck power is applied to the dock   e The Thor VM1 is in a powered Smart Dock and the dock s power switch is turned from Off to On     If the Thor VM1 is already on and one of the above events occurs  the Thor VM1 continues to run  however the power  management scheme may change based on the connection to extemal power     Auto On Disabled    When Auto On is disabled  the Ignition Input signal  if connected via the Thor VM1 vehicle power supply cable  is monitored   When the Ignition Input wire is connected    e Ifthe Thor VM1 is Off and Ignition Input is Inactive  the Thor VM1 remains Off    e Ifthe Thor VM1 is Off and Ignition Input changes from Inactive to Active  the Thor VM1 boots     e Ifthe Thor VM1 is On and Ignition Input changes from Inactive to Active  the Thor VM1 remains On  If  for example  a  Thor VM1 is running on the UPS and is placed into a Dock connected to a truck when the truck ignition is On  the power  management scheme may change based on the availability of external power     e Ifthe Thor VM1 is On and Ignition Input changes from Active to Inactive  
222. or each paired device  there is no indication of the continuing disconnect  state if Report Failure to Reconnect is disabled     3 66       Bluetooth Indicators    There may be audible or visual signals as paired devices re connect with the Thor VM1     Only printers or scanners are recognized and displayed in the Bluetooth panel  All other Bluetooth devices are ignored     Thor VM1 is connected to one or more of the targeted Bluetooth device s      Thor VM1 is not connected to any Bluetooth device   Thor VM1 is ready to connect with any Bluetooth device   Thor VM1 is out of range of all paired Bluetooth device s   Connection is inactive     Note  When an active paired device enters Suspend Mode  is turned Off or leaves the Thor VM1 Bluetooth scan range  the  Bluetooth connection between the paired device and the Thor VM1 is lost  There may be audible or visual signals as  paired devices disconnect from the Thor VM1       160     Blue  blinking slowly Bluetooth is active but not connected to a device   Blue  blinking medium Bluetooth is paired and connected to a device        Blue  blinking fast Bluetooth is discovering other Bluetooth devices   Bluetooth hardware has been turned off or does not exist in the Thor VM1     AppLock  if installed  does not stop the end user from using Bluetooth applications  nor does it stop authorized Bluetooth   enabled devices from pairing with the Thor VM1 while AppLock is in control        3 67       Bluetooth Bar Code Reader Setup    Please
223. or the Windows on line  Help application installed in the mobile device     The Thor VM1 Desktop appearance is similar to that of a desktop PC running a Windows operating system     At the bottom of the screen is the Start button  Tapping the Start Button causes the Start Menu to pop up  It contains the  standard Windows menu options  Programs  Favorites  Documents  Settings  Help  and Run     Desktop Icons    At a minimum  the desktop displays icons for My Device  Internet Explorer and the Recycle Bin  Following are a few of the  other icons that may be on the Thor VM1 Desktop  Please Contact Technical Assistance about the latest updates and  upgrades for your operating system     B Access files and programs   My Device     lt    a  zy Storage for files that are to be deleted   Recycle Bin    Discover and then pair with nearby discoverable Bluetooth devices   Blu    E  etooth  g    My Storage for downloaded files   applications     Documents    E    Internet  Explorer    A    Summit  Client Utility    Connect to the Internet intranet     Used for accessing the appropriate wireless configuration  SCU  Summit Client Utility      ba The eXpress Scan utility allows an administrator to scan bar codes to provide the initial network and Ava   2 lanche Mobile Device Server address configuration  This eliminates the need to edit radio parameters man     express   ually on the Thor VM1  eXpress Scan uses bar codes created with eXpress Config     Scan       RF Term is an optional termi
224. orts screen blanking to eliminate driver distraction when the vehicle is in motion     Audio Interface    Speakers are located on the bottom front of the Thor VM1  An headset adapter cable provides a connection for headset  operation  When a headset is plugged into the adapter cable  the main speakers are disabled     A microphone is located at the upper right of the Thor VM1 display  near the Thor VM1 emblem  When a headset is plugged into  the adapter cable  the intemal microphone is disabled     Card Slots    CompactFlash  CF  Slot    The CF ATA slot is not hot swappable  The Thor VM1 must be powered down to insert or remove an ATA card  Since the  operating system is stored on the CF ATA card  the Thor VM1 cannot operate without the ATA card     Secure Digital  SD  Slot    The SD slot accepts an SD memory card  The SD card is hot swappable     2 2       Bluetooth LXEZ Pair    The Thor VM1 contains Bluetooth version 2 0 with Enhanced Data Rate  EDR  up to 3 0 Mbit s over the air  Bluetooth device  connection  or pairing  can occur at distances up to 32 8 ft  10 meters  Line of Sight  The wireless client retains wireless  connectivity while Bluetooth is active     The user cannot select PIN authentication or encryption on connections from the Thor VM1  However  the Thor VM1 supports  authentication requests from pairing devices  If a pairing device requests authentication or encryption  the Thor VM1 displays a  prompt for the PIN or passcode  Maximum encryption is 128 bit  
225. ot Used A    sf to Screen a Box   Connected to Switch  Black  see note   8   Connected to Screen Blanking Box   Connected to Switch  Gray  see note     Note  Wire colors only apply to optional Honeywell Screen Blanking Box Cable  VM1080CABLE  Wire colors may vary in a  user supplied cable        Proper COM port settings to support screen blanking are located in Start  gt  Settings  gt  Control Panel  gt  Screen Control     Screen Blanking Box    Caution    AN Please refer to the label on the screen blanking box for allowable input voltage range        The Screen Blanking Box is designed to monitor a connection to a vehicle motion sensing circuit  When motion is detected  the  Screen Blanking Box opens the connection between the output feeds  which are connected to Pins 7 and 8 of the Thor VM1   and the display on the Thor VM1 is blanked  When motion is no longer detected the Screen Blanking Box provides a connection  between the output feeds  After the configured Screen On delay  if any  the Thor VM1 screen is displayed     Please refer to the wiring instructions  including appropriate cautions and warnings  in the Thor VM1 Vehicle Mounting  Reference Guide     Screen Blanking with Switch    In applications where it is impractical to use the screen blanking box due to vehicle voltage or lack of a motion sensing signal   screen blanking can be controlled via a user supplied switch or relay that provides an electrical conductive connection between  the wires connected to Pins 7
226. ot saved     Factory Default Settings    SSID Blank    Summit Client Utility   foki x   Main   Prafile   Status   Diags   Global    Profile   Defaut  y  New   Rename  Delete   Scan   4  lo  Encryption  EAP ca  Pt  None  7   WEP E Credentials    Save Changes  Commit                                    When logged in as an Admin  see Admin Login   use the Profile tab to manage profiles  When not logged in as an Admin  the  parameters can be viewed  and cannot be changed  The buttons on this tab are dimmed if the user is not logged in as Admin   The Profile tab was previously labeled Config     6 7       Buttons    on an OSO  Commit Saves the profile settings made on this screen  Settings are saved in the profile     Allows entry of a username and password  certificate names  and other information required to authenticate with  the access point  The information required depends on the EAP type     Delete Deletes the profile  The current active profile cannot be deleted and an error message is displayed if a delete is  attempted     Creates a new profile with the default settings  see Profile Parameters  and prompts for a unique name  If the  name is not unique  an error message is displayed and the new profile is not created     Credentials    New    Assigns a new  unique name  If the new name is not unique  an error message is displayed and the profile is not    Rename  renamed     Opens a window that lists access points that are broadcasting their SSIDs  Tap the Refresh button 
227. own box  Note the  availability of the Windows standard Refresh button     When the Windows Refresh button is tapped  the signal strength  signal quality and link speed are refreshed for the currently  selected adapter  It also searches for new adapters and may cause a slight delay to refresh the contents of the drop down  menu           Avalanche Update Settings                Scan Config   Shortcuts   SaaS   Adapters Status     Summit 304G Series WLAN Adapter y  3        Signal Strenath  Signal Quality   SSID  AP2  IP 100 100 100 200 MAC  00 1d 45 01 02 03    Speed  54 0 Mbps BSSID  00 1d 45 ae fc DO          Link speed indicates the speed at which the signal is being sent from the adapter to the Thor VM1  Speed is dependent on  signal strength     5 24       Exit    The Exit option is password protected  The default password is leave  The password is not case sensitive        Input Exit Password E          Note                 Do you want to     O  Continue monitoring     O Stop monitoring     The icon on the screen above may differ based on the version of the Enabler installed on the Thor VM1        Change the option if desired  Tap the X button to cancel Exit  Tap the OK button to exit the Avalanche applet     Using Remote Management    1     Configure the radio to connect to the network running the Mobile Device Server  After the Thor VM1 is connected   proceed to step 2     If it is desired to configure the radio using the Summit package  add the configured package to 
228. password for the certificate if appropriate           Verify Installation    Tap on View to see the certificate details again        Certificate Details    Friendly Mame    Field  Private Key y     Present a                           The private key should now say present  If it does not  there is a problem  Possible items to check     e Make sure the certificate was generated with a separate private key file  as shown earlier in this section  If the  certificate was not generated with a separate private key file  generate a new certificate and follow the import process  again    e Make sure the certificate and private key file have the same name  for example AAAuser cer for the certificate and  AAAuser pvk for the private key file  If the file names are not the same  rename the private key file and import it again     6 52    Chapter 7  Technical Specifications    Thor VM1      802 11 a b g radio   Bluetooth  penne Optional GPS   WWAN  Scanner Options No integrated scanner  p Optional serial  USB or Bluetooth scanners     Controller  WVGA compatible controller   Active matrix TFT   Resolution  800 x 480 pixels   400 NIT  indoor  or 900 NIT  outdoor  brightness  8   measured horizontally  display  Transmissive with LED backlight   Automatic brightness control on outdoor display  Vehicle motion screen blanking available    Impact resistive  Touch Screen Signature capture capability  Optional defroster  Field replaceable front panel including touch screen and optional defroster
229. person who will be logging into the mobile device     Connect to 10 1 2 204    Connecting to 100 100 100 100       User name    sl             Password           C  Remember my password       This process saves a user certificate and a separate private key file  Windows CE equipped devices such as the Thor VM1  require the private key to be saved as a separate file rather than including the private key in the user certificate     6 44    Microsoft Certificate Services       Welcome    Use this Web site to request a certificate for your Web browser  e mail  client  or other program  By using a certificate  you can verify your  identity to people you communicate with over the Web  sign and encrypt  messages  and  depending upon the type of certificate you request   perform other security tasks     You can also use this Web site to download a certificate authority  CA   certificate  certificate chain  or certificate revocation list  CRL   orto  view the status of a pending request     For more information about Certificate Services  see  Certificate Services Documentation     Selecta task   Request a certificate    View the status of a pending certificate request  Download a CA certificate  certificate chain  or CRL       Click the Request a certificate link     Microsoft Certificate Services       Request a Certificate    Select the certificate type   User Certificate    Or  submit an advanced certificate request     Click on the advanced certificate request link     6 45      
230. plications are included   e WordPad  e Data Collection Wedge  bar code result manipulation   e ActiveSync  e Transcriber  e Internet Explorer  e Word Viewer  e Excel Viewer  e PDF Viewer  e PowerPoint Viewer    Note that the viewer applications allow viewing documents  but not editing them     ActiveSync    ActiveSync is pre loaded  Using Microsoft ActiveSync you can copy files from your Thor VM1 to your desktop laptop   and  vice versa  After an ActiveSync relationship  partnership  has been established with a desktop laptop  ActiveSync will  automatically startup each time the Thor VM1 is cabled to the desktop laptop     Bluetooth    Start  gt  Settings  gt  Control Panel  gt  Bluetooth    Only installed on a Bluetooth equipped Thor VM1  The System Administrator can Discover and Pair targeted Bluetooth devices  for each Thor VM1  The System Administrator can enable   disable Bluetooth settings and assign a Computer Friendly name  for each Thor VM1     The Bluetooth control panel can also be accessed by double tapping the Bluetooth icon in the taskbar or on the desktop        LXE RFTerm  Optional     Start  gt  Programs  gt  LXE RFTerm    RF Term is pre loaded when ordered  The application can also be accessed by double clicking the RFTerm desktop icon     Avalanche    The Wavelink Avalanche Enabler installation file is loaded on the Thor VM1  however  the device is not configured to launch  the installation file automatically  The installation application must be run manual
231. pplied to the incoming data resulting from successful bar code scans  sent to the Thor VM1 for processing   Note  The Data Options tab contains only those options available for one type of decoding engine   The Data Options tab contains several options to control bar code processing  Options include   e Defining custom Code IDs  e Disable processing of specified bar code symbologies  e Rejecting bar code data that is too short or too long  e Stripping characters including Code ID  leading or trailing characters and specified bar code data strings  e Replacing control characters  e Adding a prefix and a suffix                   Main   Com1   com2   Data Options   Processing   About      Enable Code ID   None y     Symbology Settings    Ctrl Char Mapping    Custom Identifiers                              Enable Code ID    Choose an option in the Enable Code ID drop down box     Disables transmission of a Code ID  The only entry in the Symbology combo box is All        Does not change the scanner s Code ID transmission setting  The combo box in the Symbology con   Custom ID   i    trol panel is populated with any configured Custom code IDs     3 80       Buttons    Symbology Settings    Ctrl Char Mapping    Custom Identifiers    See Also   Data Processing Overview     Individually enable or disable a bar code from being scanned  set the mini   mum and maximum size bar code to accept  strip Code ID  strip data from  the beginning or end of a bar code  or  based on configurable Ba
232. processing  LOG_EX  Processing the hotkey and backdoor entry LOG_EX    Applicaton handie The application being locked did not complete initialization  LOG_ERROR   search failure   Application handle The application initialized itself successfully LOG_ERROR   search OK   Application load failure The application could not be launched by AppLock  the application could not be LOG ERROR  found or is corrupted     The backdoor keys have been pressed  The backdoor hotkeys provide a method for    a     e   LOG  customer service to get a user back into their system without editing the registry or E      PROCESSING  reloading the device     The load of the keyboard filter failed  This occurs when the dll is missing or is  corrupted  Look in the Windows directory for kbdhook dll  If it exists  delete it  Also  cannotind kodhook dii delete AppLock exe from the Windows directory and reboot the unit  Deleting LOGTERROR    Address of keyboard  hook procedure failure    Backdoor message  received    AppLock exe triggers the AppLock system to reload     Converted Pwd Converted password from wide to mbs LOG_EX    Could not create event The keyboard filter uses this event atthe Administrator Control panel  The event LOG ERROR  EVT_HOTKEYCHG could not be created   Could not hook keyboard Ifthe keyboard cannot be controlled  AppLock cannot process the hotkey  This LOG ERROR  failure prevents a mode switch into user mode  a  Could not start thread The keyboard filter must watch for hot key changes
233. ptions    Select the key to be remapped from the Key pulldown list    Select Key Sequence from the Remapped Key pulldown list    Select the first key for the multiple key sequence from the pulldown list    Press the Add button to add the key to the multiple key sequence shown in the Key Sequence box     Repeat this steps 4 and 5 until all desired keys have been added to the key sequence  If necessary  use the Clear  button to erase all entries in the Key Sequence box     Click OK to save the result and close the control panel     Remap a Key to a Sequence of Unicode Values    Up to 16 Unicode values may be specified for the key sequence  The sequence can consist of keys and Unicode values     1     ak wn    D    Select the modifier key from the Modifier Mode options   Select the key to be remapped from the Key pulldown list   Select Key Sequence from the Remapped Key pulldown list   Select Unicode from the Key Sequence pulldown list     There are two Unicode text boxes located on the lower part of this tab  Enter the Unicode value in the left textbox and  the Unicode character is displayed in the right textbox     Press the Add button to add the key to the multiple key sequence shown in the Key Sequence box     Repeat this steps 4 through 7 until all desired characters have been added to the key sequence  If necessary  use the  Clear button to erase all entries in the Key Sequence box     Click OK to save the result and close the control panel     Remap an Application    NO a
234. r Code  Data  add a prefix or suffix to a bar code before transmission     Define the operations the Wedge performs on control characters  values  less than 0x20  embedded in bar codes     Defines an identifier that is at the beginning of bar code data which acts as  a Code ID  After a Custom Identifier is defined  Symbology Settings can  be defined for the identifier just like standard Code IDs        3 81       Data Options   Symbology Settings    Start  gt  Settings  gt  Control Panel  gt  Data Collection  gt  Data Options  gt  Symbology Settings button  The Symbology selected in the Symbology drop down list defines the symbology for which the data is being configured  The  features available on the Symbology panel include the ability to   e individually enable or disable a bar code from scanning    e set the minimum and maximum size bar code to accept    e strip Code ID    e strip data from the beginning or end of a bar code    e or  based on configurable Bar Code Data  add a prefix or suffix to a bar code     The Code ID drop down box only filters the available symbologies in the Symbology drop down box by the selected Code ID   This Code ID box does not enable or disable the Code ID as that function is controlled by the Enable Code ID box on the Data  Options tab     The Symbology drop down box contains all symbologies supported based on the Code ID selected above  An asterisk appears  in front of symbologies that have already been configured or have been modified from 
235. r does LOG_ERROR  not affect the screen mode switch  processing continues     The taskbar is moved when switching into user mode  This prevents them from  being visible ifthe application is exited and restarted by the timer  This error does LOG_ERROR  not affect the screen mode switch  processing continues     Unhook taskbar wndproc   AppLock could not remove its control of the taskbar  This error does not affect  LOG_ERROR  AppLock processing      AppLock could not remove the hook that allows monitoring of the application  LOG_ERROR    In administration mode  the taskbar should return to normal operation  so AppLock   s  LOG_EX  control of the taskbar should be removed       3 50       Message Explanation and or corrective action Level    When the administrator leaves user mode  the device is fully operational  therefore   AppLock must stop monitoring the locked application     WM_SIZE adjusted This message denotes that AppLock has readjusted the window size  LOG_EX  X after Ctrl L Processing the backdoor entry  LOG_EX    Unhooking wndproc    Ret from password  lt   gt __  Return value from password dialog  LOG_EX  Decrypt data len  lt   gt  Length of decrypted password  LOG_EX    The window handle that is passed to the enumeration function  This message can  be used by engineering with other development tools to trouble shoot application  lock failures     Window handle to  enumwindows  x       a o Output the window size after it has been adjusted by AppLock LOG_EX  adjuste
236. r is not prompted again for credentials until   e the device is rebooted   e the radio is disabled then enabled   e the Reconnect button on the Diags Tab is clicked or  e the profile is modified and the Commit button is clicked     6 20       Windows Certificate Store vs  Certs Path    Note  Itis important that all dates are correct on the Thor VM1 and host computers when using any type of certificate   Certificates are date sensitive and if the date is not correct authentication will fail     User Certificates    EAP TLS authentication requires a user certificate  The user certificate must be stored in the Windows certificate store   e To generate the user certificate  see Generating a User Certificate   e Toimport the user certificate into the Windows certificate store  see Installing a User Certificate   e A Root CA certificate is also needed  Refer to the section below     Root CA Certificates    Root CA certificates are required for EAP TLS  PEAP GTC and PEAP MSCHAP  Two options are offered for storing these  certificates  They may be imported into the Windows certificate store or copied into the Certs Path directory     How To  Use the Certs Path    1  See Generating a Root CA Certificate and follow the instructions to download the Root Certificate to a PC     2  Copy the certificate to specified directory on the mobile device  The default location for Certs Path is  System  A  different location may be specified by using the Certs Path global variable  Please note the 
237. receipt of data from the scanner triggers a good  scan beep  from the external scanner   and then the rejection of scanned bar code data by the processing causes a  bad scan beep on the same data        3 94       Processing Tab    Start  gt  Settings  gt  Control Panel  gt  Data Collection  gt  Processing tab    The Processing tab contains a user configurable key delay that applies to scanned bar codes as they are input when Remote  Desktop is the application with the input focus     Factory Default Settings    Enable buffered key output Enabled    Same buffer limit  characters        Delay between  key  buffers    Note  Settings on this panel have no effect when RFTerm is the application with the input focus                Main   com1   com2   Data Options   Processing   about      Buffered Key Output                Enable buffered key output  Same buffer limit  laz    Delay between buffers  rs ms          Enable buffered key output   Default is enabled  checked   Click the checkbox to turn off buffered key output   Same buffer limit   Default is 32 ms  Raise or lower this value as desired    Delay between  key  buffers    Specifies the number of milliseconds to delay after each character in the scanned bar code is processed as a keystroke  This  value may need to be adjusted depending on the network traffic in the environment  The default value is 75 ms  Valid value is  from 0 to 9999  A zero value is No Delay between characters     3 95       About Tab    Start  gt  Setti
238. results in disabling all symbologies  except the customized ones    Min   This field specifies the minimum length that the bar code data  not including Code ID  must meet to be processed    Any bar code scanned that is less than the number of characters specified in the Min field is rejected  The default for this field is  1     Max    This field specifies the maximum length that the bar code data  not including Code ID  can be processed  Any bar code  scanned that has more characters than specified in the Max field is rejected  The default for this field is All  9999      If the value entered is greater than the maximum value allowed for that symbology  the maximum valid length is used instead        Strip Leading Trailing Control    Start  gt  Settings  gt  Control Panel  gt  Data Collection  gt  Data Options tab  gt  Symbology button    This group of controls determines what data is removed from the collected data before the data is buffered for the application   When all values are set  Code ID takes precedence over Leading and Trailing  Bar Code Data stripping is performed last   Stripping occurs before the Prefix and Suffix are added  so does not affect them     Strip     7 Leading bp  7  code 1D          Trailing p   Barcode Data      If the total number of characters being stripped is greater than the number of characters in the collected data  it becomes a zero  byte data string     If  in addition  Strip Code ID is enabled  and no prefix or suffix is configured  the
239. rface Language    The option will determine the language used for the menus  dialogs     Engish  United States   7     and alerts     Regional and Language Settings    Regional Settings User Interface Language Input Language  Default Input language    Select the input language to   f    use when ihe ae ee device   Engish  United States  US y   Installed Input Languages    Select input languages you plan  to use        3 144       Registry    Start  gt  Settings  gt  Control Panel  gt  Registry    Choose options for managing the registry and rebooting the Thor VM1     Registry E  OK x   Registry    Load User Defaults   Warmboot      Save User Defaults   Restart    Load Factory Defaults                                 When clicked  a standard load file dialog is opened  to allow the user to pick a Registry Save   RSG  file  The  applet then copies the specified User registry file to the Active registry  The user is asked to verify a reboot  and  then the applet does a warmboot to activate the new registry     Load User  Defaults    When clicked  a standard Save File dialog is opened  to allow the user to name the Registry Save   RSG  file   The applet then copies the Active registry to the specified User registry file and reboots the device     The applet copies the Factory Default registry from the OS to the Active registry  by deleting the current registry    The user is asked to verify a reboot  and then the applet performs a restart to activate the factory default registry 
240. ring AppLock operation     Status information is stored in a specific location on the storage device and in a specific logfile specified by the Administrator   For this reason  the administrator can configure the type of status information that is logged  as well as clear the status  information               Administrator Control               Application   Security   Options Status    Filename    System applock txt me    View Log    Level   None y  Level   None y                 Clear       Save As               Move the cursor to the Filename text box and either type the logfile path or tap the Browse button  the     button   The standard  Windows CE Browse dialog is displayed  After selecting the logfile from the Browse dialog  tap OK     Note  If your Status Panel does not look like the figure shown above  you may have the Single Application version which  does not have as many options     View    Error Error status messages are logged when an error occurs and is intended to be used by the administrator to deter   mine why the specified application cannot be locked   Processing status shows the flow control of AppLock components and is mainly intended for Customer Service  Process a A    when helping users troubleshoot problems with their AppLock program        Extended   Extended status provides more detailed information than that logged by Process Logging     All messages are displayed     Tap the Refresh button after changing from one view level to another  The filter
241. rom ESCape Ignore  drop  0x1B in the bar code is dis   9 p the bar code data  prefix and suffix p 9 p carded         0x02 in a bar code is con   Printable text   Text is substituted for Control Character    Start of Text STX  verted to the text STX   Hat encoded   The hat encoded text is translated to the   Value OxOd in a bar code is  Carriage Return    M  text equivalent hex value  converted to the value Ox0d     Escaped hat    The hat encoding to pass through to the   Value 0x09 in a bar code is  ae Horizontal Tab  WI   encoded text   application  converted to the text  l    Hex encoded   The hex encoded text is translated to the Value OxOD in a bar code is  q Carriage Return   Ox0A   text equivalent hex value  converted to a value Ox0A    Escaped hex    The hex encoding to pass through to the Vertical Tab  Ox0A or O x0A Value Ox0C is a bar code is   encoded text   application  converted to text Ox0A    See Also   Hat Encoding        3 93       Bar Code Processing Examples    The following table shows examples of stripping and prefix suffix configurations     Provided that the wedge is configured with the above table  below are examples of scanned bar code data and results of these  manipulations     Bar Code Symbology Raw Scanner Data Resulting Data    Suffix       Eats    gt     12 5  104444567890987654321  lt  rejected  gt   too long     woo LI    Code    Code 39  A4  lt  rejected  gt   too short     Note  Rejected bar codes generate a bad scan beep  In some cases  the 
242. rtificates y   Lists your personal  digital certificates y     Import     view     Remove                  Tap the Import button     Import Certificate or Key OK E      From a File    O From a Smart Card    Reader   y      Card Absent          Make sure From a File is selected and tap OK     6 50          Select a Certificate File ger        OJ My Documents     Shortcut to Office Templates       Name    Type   Certificates y           Using the explorer buttons  browse to the location where you copied the certificate  select the certificate desired and tap OK     The certificate is now shown in the list        Certificates ka OK E     ny Certificates y    Lists your personal   digital certificates y   Import     View     Remove      With the certificate you just imported highlighted  tap View              From the Field pull down menu  select Private Key        Certificate Details    Friendly Name    Field  Private Key y     Not Present          B       e Ifthe private key is present  the process is complete    e Ifthe private key is not present  import the private key   To import the private key  tap OK to return to the Certificates screen   Tap import                 Select a Certificate File    QJ  My Documents   Shortcut to Office Templates          Name    Type   Private Keys y     Using the explorer buttons  browse to the location where you copied the private key file  change the Type pull down list to  Private Keys  select the certificate desired and tap OK  Enter the 
243. ry charging       3 18       Thor VM1 OS Upgrade    Introduction    Depending on the size of the operating system  the total time required for a successful upgrade may require several minutes     The OS upgrade files are unique to your Thor VM1 physical configuration and date of manufacture  OS upgrade files designed  for one device configuration should not be used on a different device configuration     When upgrading the OS or firmware on a Thor VM1 with a 12 key keyboard  it is best to perform the upgrade using either  Wavelink Avalanche or with an external USB keyboard attached     There may be firmware and BIOS upgrades available for the Thor VM1  Contact Technical Assistance for upgrade information  and instructions  In some cases  it may be necessary to upgrade firmware before upgrading the operating system     Caution   The Thor VM1 must be connected to external power before upgrading the BIOS  firmware or operating  systems     If the Thor VM1 is operating on UPS battery power  the upgrade process does not initiate and the Thor VM1 is  not upgraded        Preparation    e Please Contact Technical Assistance to get the OS upgrade files     e Honeywell Technical Assistance may advise you that additional upgrades such as BIOS or firmware are required before  upgrading the OS  Please follow any additional upgrade instructions provided by Technical Assistance     e Use ActiveSync to back up Thor VM1 user files and store them elsewhere before beginning an upgrade on the Th
244. s      Double Click    Double click this grid to set the double click sensitivity for both  the speed and physical distance between clicks     Double click this icon to test your double click settings  If this  icon doesn t change  adjust your settings using the grid above        3 127       Network and Dialup Options    Start  gt  Settings  gt  Control Panel  gt  Network and Dialup Connections    Set Thor VM1 network driver properties and network access properties  Select a connection to use  or create a new  connection     File Edit View Advanced   X    fe  7  3     a  gt    Y   Sl Th   Make New USB Client SDCSD30      Connection          Create a New Connection    1     On the mobile device  select Start  gt  Settings  gt  Control Panel  gt  Network and Dialup Connections  A window is  displayed showing the existing connections     2  Assuming the connection you want does not exist  double tap Make New Connection     Give the new connection an appropriate name  My Connection   9600  etc    Tap the Direct Connection radio button     Tap the Next button     From the popup menu  choose the port you want to connect to  Only the available ports are shown     5  Tap the Configure    button     Under the Port Settings tab  choose the appropriate baud rate  Data bits  parity  and stop bits remain at 8  none  and 1   respectively     Under the Call Options tab  be sure to turn off Wait for dial tone  since a direct connection will not have a dial tone  Set  the timeout parameter  d
245. s    Battery   Schemes Device Status    Device Name Power Level  BKL1  High  DO   DSK1  High  DO   NDSO  High  SBS1  High  SDCSD304G1 High  SEC1  High          Because of the cumulative effect  if the Battery Power Scheme timers are set to 3 seconds  15 seconds and 5 minutes   e The backlight turns off after 3 seconds of no activity   e The display turns off after 18 seconds of no activity  15 sec   3 sec    e And the Thor VM1 enters Suspend after 5 minutes and 18 seconds of no activity     e Ifthe User Idle timer is set to Never  the power scheme timers never place the Thor VM1 in User Idle  System Idle or  Suspend modes     3 142       Regional and Language Settings    Start  gt  Settings  gt  Control Panel  gt  Regional Settings    Set the appearance of numbers  currency  time and date based on regional and language settings  Set the Thor VM1 user  interface language and the default input language     Factory Default Settings    Date M d yy short   dddd  MMMM  dd yyyy long  User Interface English  United States    Language English  United States    US   Installed English  United States   US                Regional and Language Settings ka oK x    Regional Settings   User Interface Language   Input Language    Your locale       The locale option affects how some programs format numbers  currency   time and dates      Engish  United States  y           3 143    Regional and Language Settings fra OK E    Regional Settings User Interface Language Input Language El    User Inte
246. s  Internet Explorer Help     3 11       Start Menu Program Options    The following list represents the factory default program installation  Your system may contain different items from those  shown below  based on the software and hardware options purchased     Communication  Connect    Start  or Stop  FTP  Server    Command Prompt  eXpress Scan  Internet Explorer  File Viewers  JETCET PDF Viewer    Office 2003 Excel  Viewer    Office 2003 PowerPoint  Viewer    Office 2003 Word  Viewer    Microsoft WordPad  Remote Desktop Connection  LXE RFTerm    Settings    Summit   Transcriber  Wavelink Avalanche  Windows Explorer    Stores Network communication options  Run this command after setting up a connection    Begin   end connection to FTP server    The command line interface in a separate window  Option  Requires Wavelink Avalanche option eXpress Config   Access web pages on the Intemet Intranet    View Adobe PDF Documents    View Excel 2003 and compatible documents  View PowerPoint 2003 and compatible documents    View Word 2003 and compatible documents    Opens an ASCII notepad  Log on to a Windows Terminal Server  Option  Terminal emulation application     Access to all Control Panels  a shortcut to the Network and Dialup Control Panel and  access to Taskbar options     Set Summit radio   network parameters   Enter data using the stylus on the touch screen  Option  Remote management for networked devices  File management program    e Ifinstalled  RFTerm runs automatically 
247. s  gt  Control Panel  gt  Date Time   or   Time in Desktop Taskbar  Use this Thor VM1 panel to set Date  Time  Time Zone  and assign a Daylight Savings location     Factory Default Settings    Midnight  GMT 05 00  Enabled             March 2011 y   EII  SMTITWT F Si o  27 28 1 2 3 4 5 Time Zone    6 7 8 9 10 11 12   GMT 08 00  Pacific Time  US  amp  Canada   y   13 14 15 16 17 18 19  GMT 08 00  Pacific Time  US  amp  Canada     20 21 22 23 24 25 2 Automatically adjust clock for daylight saving    27 28 29 31 1 2    There is very little functional change from general desktop or laptop Date Time Properties options   Double tapping the time displayed in the Desktop Taskbar causes the Date Time Properties screen to appear              The Sync button  if available  activates a utility that will set the clock using a network time server     3 101       Dialing  Start  gt  Settings  gt  Control Panel  gt  Dialing    Set dialup properties for internal modems  not supplied or supported on the Thor VM1      Factory Default Settings    Tone Dialing Enabled    Disable Call Waiting Disabled  blank     Dialing Properties Ez    OK Ed             When dialing from   work y  New      Remove    Local settings are   Dialing Patterns         The local area code is   425  The local country region code is  fi   Dial using    Tone O Pulse    7 Disable call waiting by dialing                       3 102       Display    Start  gt  Settings  gt  Control Panel  gt  Display    The display might also c
248. s configured to use shared key or passphrase  set the Auth Type radio parameter to Shared   e Ifthe AP is configured for network EAP only  set the Auth Type radio parameter to LEAP     To use another encryption type  select WPA CCKM  WPA2 AES or WPA2 CCKM for encryption and complete other entries as  detailed in this section     Summit Client Utility ka OK E  Main   Profile   status   Diags   Global    Profile   Default y  New   Rename  Delete   Scan E  lo  Encryption  EAP type      wpa TKIP 7  lear  gt    WEP keys PSKs  Credentials    Save Changes  Commit                                 See Sign On vs  Stored Credentials for information on entering credentials     To use Stored Credentials  click on the Credentials button  No entries are necessary for Sign On Credentials as the user will  be prompted for the Username and Password when connecting to the network     Credentials A E    User     Password          Enter the Domain Username  if the Domain is required   otherwise enter the Username           Enter the password   Click OK then click the Commit button   6 31       Ensure the correct Active Profile is selected on the Main tab and warmboot  The SCU Main tab shows the device is associated  after the radio connects to the network     6 32       EAP FAST    To use EAP FAST  make sure the following profile options are used   e Enter the SSID of the Access Point assigned to this profile  e Set EAP Type to EAP FAST  e Set Encryption to WPA TKIP  e Set Auth Type to Open    To
249. s of the connection        Gobi Connection Manager OK x  Home   coma   umTS   GPs   About            RSSI   108dBm UMTS Home Network  Status  Disconnected    Firmware Selection  Update Firmy  Generic  y         TepWindowSize   128K          Roaming Status  Operator Defined  Power  Online    Gobi 2000 Radio found       To update firmware   1  Select the firmware for the desired carrier from the Firmware Selection pull down list     2  If no firmware files are found  an error message is displayed  Contact Technical Assistance for information   3  Tap the Update Firmware button     4  The update process may take a minute or so to complete     The status of the Gobi 2000 radio is displayed in the lower left corner of this tab  An error message is displayed in this location if  the firmware selected requires a SIM card and no SIM card is installed in the Thor VM1     Connection status is at the top of this tab     3 107       CDMA    Use the CDMA tab to activate the Thor VM1 for use with a CDMA carrier such as Verizon  This step is not necessary for  carriers using a SIM card     The Serial Number  IMEI  International Mobile Equipment Identity  and MEID  Mobile Equipment ID  numbers are displayed on  this tab as the carrier may request this information when setting up an account        Gobi Connection Manager OK A          Home   CDMA  umTS   GPS   About      SIN B03EB555 Activation Type Autoconnect  Q Automatic O Manual        Enable    IMEI 980030000000000  Disconnected  MEID 41
250. screen can be disabled  using the Options control panel Misc tab   In these cases  it may be easier to  configure the Thor VM1 using ActiveSync and LXEConnect rather than using the Thor VM1 keypad only     Reset and Loss of Host Re connection    ActiveSync assigns a partnership between a client and a host computer  A partnership is defined by two objects     a unique  computer name and a random number generated when the partnership is first created  An ActiveSync partnership between a  unique client can be established to two hosts     When the mobile device is reset  retum to default settings   the random number is deleted     and the partnership with the last  one of the two hosts is also deleted  The host retains the random numbers and unique names of all devices having a  partnership with it  Two clients cannot have a partnership with the same host if they have the same name   Control Panel  gt   System  gt  Device Name     If the reset mobile device tries to reestablish the partnership with the same host PC  anew random number is generated for the  mobile device and ActiveSync will insist the unique name of the mobile device be changed  If the mobile device is associated  with a second host  changing the name will destroy that partnership as well  This can cause some confusion when re   establishing partnerships with hosts     44       Troubleshooting ActiveSync    ActiveSync on the host says that a device is trying to connect  but it cannot identify it    Verify the dong
251. settings    Manual Settings Properties OK E    Network   DNS   Authentication   Wireless        Manage network settings                O Use server assigned IP address  O Use the Following IP address     IP    Subnet     Gateway       assigned if DHCP is enabled     DNS 1     DNS 2     DNS 3  _       lt  lt     s   Domain  Sa             Authentication Wireless    5 22             Manual Settings Properties OK El    Network   DNS Authentication    L  Manage wireless settings  Type  None  Inner  i one y      Manual Settings Properties OK A         Network   DNS   Authentication   Wireless       Manage wireless settings  SSID       Encryption           Open System             Note  The Authentication tab may not be present in all versions of the Enabler   It is not recommend to enable    Manage Wireless Settings    for Summit Client devices     Troubleshooting  When you download a profile that is configured to manage network and wireless settings  the Enabler will  not apply the manage network and wireless settings to the adapter unless the global Manage wireless settings and Manage  network settings options are enabled on the Adapters panel  see Figure titled Adapters Options     Network  earlier in this  section   Until these options are enabled  the network and wireless settings are controlled by the third party software  associated with these settings     5 23       Status    The Status panel displays the current status of the Thor VM1 network adapter selected in the drop d
252. sound high low high low  Link successful Beep will sound low medium high    Link unsuccessful Beep will sound high low high low    Yellow LED blinks at 2 Hz Linking in progress    Off Disconnected or unlinked  Yellow LED blinks at 50 Hz Bluetooth transmission in progress  Yellow LED blinks at the same rate as the paging beep  1 Hz    Paging    Green LED blinks once a second Disabled indication       Upon startup  if the scanner sounds a long tone  this means the scanner has not passed its automatic Selftest and has entered  isolation mode  If the scanner is reset  the sequence is repeated  Contact Technical Assistance for assistance     Bluetooth Printer Setup    The Bluetooth managed device should be as close as possible  in direct line of sight  with the Thor VM1 during the pairing  process     1  Open the LXEZ Pair Panel   2  Tap Discover  Locate the Bluetooth printer in the Discovery panel   3  Tap and hold the stylus  or double tap  on the Bluetooth printer ID until the right mouse click menu appears   4  Select Pair as Printer to pair the Thor VM1 with the Bluetooth managed printer   The devices are paired  The Bluetooth managed printer may respond with a series of beeps or LED flashes     Please refer to the Bluetooth managed printer manufacturer s User Guide  it may be available on the manufacturer s web site   Contact Technical Assistance for Bluetooth product assistance     Note  If there is no beep or no LED flash from the Bluetooth managed printer  the Thor VM1 an
253. strength for the currently associated authenticated Access Point is  71 dBm to  90 dBm          Wireless Zero Config Utility and the Summit Radio    x    e The WZC utility has an icon in the toolbar that looks like a networked computer with a red X beside it  indicating that  Wireless Zero Config application is enabled but the connection is inactive at this time  the device is not connected to a  network   The WZC icon may not be visible until control is passed to the WZC utility as described below     e Youcan use either the Wireless Zero Configuration Utility or the Summit Client Utility to connect to your network  The  Summit Client Utility is recommended because the Wireless Zero Configuration Utility cannot control the complete set  of security features of the radio     How To  Use the Wireless Zero Config Utility    1  Select ThirdPartyC onfig in the Active Profile drop down list as the active profile  see Main Tab    2  Warmboot the device     The Summit Client Utility passes control to Wireless Zero Config and the WZC Wireless Information control panel  Using the  options in the Wireless Zero Config panels  setup radio and security settings  There may be a slight delay before the Wireless  Zero Config icon indicates the status of the connection     How to  Switch Control to SCU    1  To switch back to SCU control  select any other profile in the SCU Active Config drop down list  except  ThirdPartyC onfig   2  Warmboot the device     Radio control is passed to the SCU 
254. sult and close the control panel     If the KeyMap tab is accessed again  the command plus any specified parameters is displayed in the Key Sequence  text box when the remapped key is again selected     3 121       LaunchApp Tab    The default for all text boxes is Null or         The text boxes accept string values only     Note that executables and parameters are not checked for accuracy by the keyboard driver  If the launch fails  the Thor VM1  emits a single beep  if the launch is successful  it is silent     Keypad Control E OK E  KeyMap   LaunchApp  RunCmd    Appi                  The Launch App command is defined for use by system administrators  These instructions are parsed and executed directly by  the keyboard driver     1  Place the cursor in the text box next to the App you wish to run  e g   App1  App2   2  Enable the EXE radio button if the application is an EXE file    3  Enter the name of the executable file   4    Enable the OPT radio button to add options or parameters for the executable file in the same text box  Switching from  EXE to OPT clears the text box  but the information previously entered is stored   allowing parameter entry     Tap the OK button when finished  The changes take effect immediately     The result of the application  exe  and options  opt  entries are displayed on the KeyMap tab in the Key Sequence box when the  key mapped to the LauchApp is selected     3 122          RunCmd Tab    The default for all text boxes is Empty  Null or  
255. system   Tap the Import button to import a digital certificate file    Tap the View button to view a highlighted digital certificate    Tap the Remove button to remove highlighted certificate files     Tap the   button and follow the instructions in the Windows CE Help file when working with trusted authorities and digital  certificates     3 72       Data Collection Wedge Introduction    Start  gt  Settings  gt  Control Panel  gt  Data Collection    This software component is the interface between data collection devices such as bar code scanners  or imagers  externally  connected to a COM port on the Thor VM1 or bar code scanners wirelessly connected via Bluetooth to your Thor VM1  This  software component collects the data from the varied sources and presents it to applications on your Thor VM1 in a transparent  manner     Note  When a HID enabled USB scanner is connected to the Thor VM1 the scanned data is transmitted to the active  window as keystroke messages  The data bypasses the data collection wedge  Any data handling to be applied to the  scanned data  for example strip leading or trailing characters  must be programmed into the scan engine via  configuration bar codes or handled by the application accepting the data     Use the options on the control panels to set Thor VM1 data collection keyboard wedge parameters  enable or disable allowed  symbologies and assign scan key settings     Assign baud rate  parity  stop bits and data bits for available COM ports   Par
256. t been previously saved may be lost  The contents  of RAM are erased and the operating system and CAB files are reloaded     To initiate a restart     e Using the Registry  select Start  gt  Settings  gt  Control Panel  gt  Registry and tap the Restart button  The Thor VM1  immediately restarts     e Using the Start menu  select Start  gt  Run and type RESTART in the text box  Press Enter  The Thor VM1 immediately  restarts  The RESTART text command is not case sensitive     Clearing Persistent Storage   Reset to Default Settings    Use the Registry control panel Load Factory Defaults button to set the Thor VM1 registry back to factory defaults  No other  clearing is available or necessary     Folders Copied at Startup   If any of the following folders are created in the System folder  they are copied at startup   System Desktop copied to Windows Desktop  System Favorites copied to Windows Favorites  System Fonts copied to Windows Fonts       System Help copied to    System Programs copied to  AppMgr copied to  Recent copied to    This function copies only the folder contents  no sub folders     Windows Help  Windows Programs  Windows AppMgr  Windows Recent    The Windows Startup folder is not copied on startup because copying this folder has no effect on the system or an incorrect    effect     Files in the Startup folder are executed  but only from System Startup  Windows Startup is parsed too early in the boot process    soit has no effect     Executables in System Startup
257. t is Monitor for Updates   e Monitor for Updates   Attempt to connect to the Mobile Device Server and process any updates that are  Shutdown available  Do not launch the Enabler application     e Exit Application   Terminates the monitor  requires successful password entry if a password has been  configured         5 13       Activity Log    Use this option to control the level of detail recorded in the log file  The default is No Activity Log   No Activity Log   No log file is written     Critical   Only critical errors written to the log files     Error   Communication or configuration problems are written to the log file along with critical  Log Level messages   Warning   Possible operation problems are written to the log file along with critical and error messages   Info   Operational information is written to the log file   Debug   The most detailed log file     Use this option to control the level of detail shown on the main Enabler screen  The default is Basic Output   Basic Output   General information is displayed     Critical   Critical errors are displayed in addition to those above     Display Level Error   Communication or configuration problems are displayed in addition to those above     Warning   Possible operation problems are displayed in addition to those above   Info   Operational information is displayed in addition to those above   Debug   The most detailed list is displayed        5 14       Display                Avalanche Update Settings OK E  Display
258. t to be  ignored     Once the user types any character into the Replacement edit control  reselecting the character from the Character drop down  box redisplays the default Ignore  drop  in the Replacement edit control     Replacement    The edit control where the user types the characters to be assigned as the replacement of the control character     Replacements for a control character are assigned by selecting the appropriate character from the Character drop down box   typing the replacement in the Replacement edit control  according to the formats defined above  and then clicking the button   The assigned replacement is then added to the list box above the Assign button     For example  if Carriage Return is replaced by Line Feed  by specifying    J or Ox0A  in the configuration  the value Ox0d  received in any scanned bar code  or defined in the prefix or suffix  will be replaced with the value Ox0a     The Wedge then sends Ctrl J to the receiving application  rather than Ctrl M     List Box    The list box shows all user defined control characters and their assigned replacements   All replacements are enclosed in single quotes to delimit white space that has been assigned     Assign Button    Click this button when you want to assign the characters in the Replacement text box to the character in the Character drop  down box     Delete Button    This button is grayed unless an entry in the list box is highlighted   When an entry  or entries  is highlighted  and the Dele
259. ta communications from a fork lift truck or any properly configured vehicle   Wireless communications are supported over a 802 11 WLAN network and  optionally  over a WWAN network  The optional  Bluetooth    module supports Bluetooth printers and scanners     Caution  A Before shipping the Thor VM1  the internal UPS battery must be disconnected        The Thor VM1 is designed for use with a vehicle Quick Mount Smart Dock  The dock installs in the vehicle and connects to  vehicle power  The dock provides conditioned input power for the Thor VM1  Peripheral connections are on the dock  The Thor  VM1 is designed to easily be removed from the dock with a latch on the lower rear of the Thor VM1 housing  Since the dock  remains attached to the vehicle  the Thor VM1 computer can easily be moved from one vehicle equipped with a Quick Mount  Smart Dock to another vehicle equipped with a Quick Mount Smart Dock     The Thor VM1 contains a UPS battery which  when fully charged  can power the Thor VM1 for a minimum of 30 minutes  This  can be when the Thor VM1 is not attached to a Quick Mount Smart Dock or when the Thor VM1 is attached to a dock but the  vehicle power is interrupted  such as when the vehicle battery is being changed     Contact Technical Assistance for information on the latest upgrades for your Thor VM1                       About this Guide    This Thor VM1 Reference Guide provides instruction for the system administrator to follow when configuring a Thor VM1   This ref
260. te button is clicked  the highlighted material is deleted from the list box     3 90       Custom Identifiers    Code IDs are defined by the user for external bar code scanners  These are called custom Code IDs and are included in the  Symbology drop down box in the Symbology dialog  unless Enable Code ID is set to None  When the custom Code ID is  found in a bar code  the configuration specified for the custom Code ID is applied to the bar code data     When Enable Code ID is set to None  custom code IDs are ignored   Note  When Strip  Code ID is enabled  the entire custom Code ID string is stripped  i e   treated as a Code ID      The dialog box shown below allows the custom Code IDs to be configured  When incoming data is checked for a custom ID  code  the list is compared in the order displayed in this dialog box               Name    Add    ID Code    Clear All            After adding  changing and removing items from the Custom IDs list  click the OK button to save changes and return to the Bar  Code panel     Parameters    Name text box    Name is the descriptor that is used to identify the custom Code ID  Names must be unique from each other  however  the  Name and ID Code may have the same value  Name is used in the Symbology drop down box to identify the custom Code ID  in a user friendly manner  Both Name and ID Code must be specified in order to add a custom Code ID to the Custom IDs list     ID Code text box    ID Code defines the data at the beginning of a bar c
261. ters  characters below 20H  in scanned bar codes are assigned to  their appropriate CTRL code sequence when the bar codes are sent in Character mode     The wedge provides a one to one mapping of control characters to their equivalent control character sequence of keystrokes   If control characters are translated  the translation is performed on the bar code data  prefix  and suffix before the keystrokes  are simulated     Parameters    Translate All    This option is grayed unless the user has Send Key Messages  WEDGE  on the Main tab selected     In Key Message mode  when this option is enabled  control characters embedded in a scanned bar code are translated to their  equivalent control key keystroke sequence  13  0x0d  is translated to Control M keystrokes as if the user pressed the CTRL   SHIFT  and m keys on the keypad      Additionally  when Translate All is disabled  any control code which has a keystroke equivalent  enter  tab  escape   backspace  etc   is output as a keystroke     Any control code without a keystroke equivalent is dropped     3 89       Character    This is a drop down combo box that contains the control character name  Refer to the Character drop down box for the list of  control characters and their names     When a character name is selected from the drop down box  the default text Ignore  drop  is shown and highlighted in the  Replacement edit control  Ignore  drop  is highlighted so the user can type a replacement if the control character is no
262. tes  This option should only be run after you  bytes have called load and stop  Default is 500 000     Specifies the name of the file to which network traffic information is saved  This option should only be run after    illes you have called load and stop  Default is netlog        Run cmd    Performs the command selected  For example  to run Netlog and modify the packet size do the following    Select load from the Commands list and click the Run cmd button    Select stop from the Commands list and click the Run cmd button    Select options from the Commands list  enter the new packet size in the Options list and click the Run cmd button     3 130       NDISLog    NDISLog creates a   TXT file that can be viewed with any text editor program that supports  TXT files     Network Capture E OK E  Netlog NDISLog    Command       start    stop     indislog txt File  ready to run command                   Command     command Pemcion  Starts logging the network traffic     Stops logging network traffic     file       Specifies the name of the file to which NDISLog information is stored   Save File   Stores the file name    Run cmd    Performs the selected start or stop command     3 131       Options    Start  gt  Settings  gt  Control Panel  gt  Options    It may be necessary to warmboot the Thor VM1 after making desired changes  A pop up window indicates if a warmboot is  required     Note  _ If there is no icon corresponding to this item in the Control Panel  contact your Contact 
263. than the  Re connect option  This data dump includes radio state  profile settings  global  settings  and a list of broadcast SSID APs     Save To        Use this to save the results of the diagnostics to a text file  Use the explorer window to specify the name  and location for the diagnostic file  The text file can viewed using an application such as WordPad     6 12       Global Tab    Start  gt  Programs  gt  Summit  gt  Global tab    The parameters on this panel can only be changed when an Admin is logged in with a password  The current values for the  parameters can be viewed by the general user without requiring a password     Note  Tap the Commit button to save changes  If the panel is exited before tapping the Commit button  changes are not  saved     Factory Default Settings    Faye CON  CO A             Summit Client Utility kid OK A    Main   Profile   Status   Diags   Global      Property  Value  a             DFS Channels    Save Changes           Custom Parameter Option    The parameter value is displayed as    Custom    when the operating system registry has been edited to set the Summit  parameter to a value that is not available from the parameter   s drop down list  Selecting Custom from the drop down list has no  effect  Selecting any other value from the drop down list will overwrite the    custom    value in the registry     6 14       Global Parameters    Roam Trigger  65 dBm  DO    o    BG Channel Set    DFS Channels  DFS Scan Time    Ad Hoc Channel   
264. the Wavelink Avalanche  MC Console and enable it     Verify RMU CE CAB exists in the  System RMU folder   Double click the Thor VM1 enabler CAB file in the  System folder     The enabler automatically launches after installation and contacts the Mobile Device Server  The Avalanche MC  Console connected to that Mobile Device Server identifies the remote device and performs a sync  This downloads any  available packages available for the Thor VM1     5 25       Using eXpress Scan    Oil eXpress Scan Desktop Icon  express  scan    If the Thor VM1 has an eXpress Scan icon on the desktop  eXpress Scan may be used for the initial configuration of the device     If the eXpress Scan icon is not present on the desktop  install the Enabler  If the icon is still not present  the Enabler must be  updated     If the eXpress Scan icon is present  follow these steps to configure the Thor VM1 to connect with the wireless network and the  Mobile Device Server     Step 1  Create Bar Codes    Bar codes are created with the eXpress Config utility on the desktop laptop computer  not the mobile device  Depending on the  bar code length and the number of parameters selected  eXpress Config generates one or more bar codes for device  configuration  The bar codes contain configuration parameters for the wireless client in the mobile device and may also specify  the address of the Mobile Device Server     Bar codes should be printed at a minimum of 600 dpi   Please see Using Wavelink Avalanche for det
265. the administration changed the settings of the application PROCESSING  being controlled     Eon encrypt pwd The length of the encrypted password is being calculated  LOG_EX    Hook wndproc failure    AppLock is unable to lock the application  This could happen if the application being  locked encountered an error after performing its initialization and shut itself down LOG_ERROR  prior to being locked by AppLock     Hook wndprog ofopen The application is open  but AppLock cannot lock it  LOG_ERROR  app failure    ca evenEctedton The Admin applet is unable to create the hotkey notification  LOG_ERROR    Hot key pressed Processing the hotkey and backdoor entry LOG_EX    Hot key pressed    Hot key set event failure    Hotkey press message    received    In app hook WM_ SIZE    In app hook WM __    WINDOWPOSCHANGED    Initializing keyboard  hook procedure    Keyboard hook  initialization failure    Keyboard hook loaded    OK  L after Ctrl    Loading keyboard hook    Processing the hotkey and backdoor entry LOG_EX  When the administrator changes the hotkey configuration the hotkey controller must LOG ERROR  be notified  This notification failed      The user just pressed the configured hotke LOG    at g y  PROCESSING    In addition to preventing the locked application from exiting  AppLock must also  prevent the application from enabling the taskbar and resizing the application   s LOG_EX  window  This message traps a change in the window size and corrects it     In addition to pr
266. the default value     Each time a Symbology is changed  the settings are saved as soon as the ok button is tapped  Settings are also saved whena  new Symbology is selected from the Symbology drop down list             None  Symbology  arenes    Enable Min    Max  fal    Strip      Leading F T Code ID   _ Trailing F   Barcode Data      Add        Prefix               Suffix            The order in which these settings are processed are   e Min  Max  e Code ID  e Leading   Trailing  e Bar Code Data  e Prefix   Suffix    Note  When Enable Code ID is set to None on the Data Options tab and when All is selected in the Symbology field   Enable and Strip Code ID on the Symbology panel are grayed and the user is not allowed to change them  to prevent  deactivating the scanner completely     3 82       When All is selected in the Symbology field and the settings are changed  the settings in this dialog become the defaults  used  unless overwritten by the settings for individual symbologies  This is also true for Custom IDs  where the code IDs to be  stripped are specified by the user     Note  In Custom mode on the Data Options tab  any Code IDs not specified by the user will not be stripped  because they  will not be recognized as Code IDs     If aspecific symbology s settings have been configured  a star     will appear next to it in the Symbology drop down box  so the  user can tell which symbologies have been modified from their defaults     If a particular symbology has been conf
267. the network     6 26       PEAP MSCHAP    To use PEAP MSCHAP  make sure the following profile options are used   e Enter the SSID of the Access Point assigned to this profile  e Set EAP Type to PEAP MSCHAP  e Set Encryption to WPA TKIP  e Set Auth Type to Open    To use another encryption type  select WPA CCKM  WPA2 AES or WPA2 CCKM for encryption and complete other entries as  detailed in this section     Summit Client Utility 7  foki x     Main   Profile   status   Diags   Global      Profile   Default y    New   Rename  Delete   Scan   Y Cc  Radio  Encryption  EAP type       ap  wea TKIP     PEAP MSCHat y   WEP keys PSKs  Credentials     Save Changes  Commit                                 See Sign On vs  Stored Credentials for information on entering credentials   Click the Credentials button     e No entries except the CA Certificate Filename are necessary for Sign On Credentials as the user will be prompted for  the User Name and Password when connecting to the network     e For Stored Credentials  User  Password and the CA Certificate Filename must be entered   Enter these items as directed below     Credentials E x    Password     CA cert    a     _  Validate server    Use MS store    Enter the Domain Username  if the Domain is required   otherwise enter the Username   Enter the password           Leave the CA Certificate File Name blank for now     Click OK then click Commit  Ensure the correct Active profile is selected on the Main Tab     6 27       See Windows Cer
268. this event is treated the same as a Power  button press  which places the Thor VM1 in Suspend     If the Ignition Input wire is not connected  the Thor VM1 only powers on when the Power button is pressed     2 10       External Connectors    Power the Thor VM1 off before attaching a cable to any port  serial  USB  Audio CAN  etc     Most external connectors for the Thor VM1 are located on the Quick Mount Smart Dock     e COM1 connects to a serial bar code scanner  screen blanking cable  serial printer or PC   e COM2 connects to a serial bar code scanner  screen blanking cable  serial printer or PC   e USB accepts a dongle cable with a USB Host port and a USB Client port     e CANbus Audio accepts a cable with connections for a mono headset microphone or a cable with  CANbus adapters        The power connector is on the dock   Antenna connectors are located on the rear of the Thor VM1     2 11       Serial Connector  COM1 and COM2     The COM1 and COM2 connectors are D 9 male connectors located on the back of the Quick Mount Smart Dock   Power the Thor VM1 off before attaching a cable to any port  serial  USB  Audio CAN  etc      The serial connectors are industry standard RS 232  PC AT standard 9 pin    D    male connector     By default  Pin 9 is configured to provide  5V for an external bar code scanner  Pin 9 of COM1 or COM2 may also be  configured to provide RI     If aCOM port is not being used for a scanner  it can be used for screen blanking when the vehicle is in moti
269. tificate Store vs  Certs Path for more information on certificate storage     Once successfully authenticated  import the CA certificate into the Windows certificate store  Return to the Credentials screen  and check the Validate server checkbox            User   Password   LXE    CA cert      Full trusted store        Validate server Use MS store          If using the Windows certificate store   e Check the Use MS store checkbox  The default is to use the Full Trusted Store   e To select an individual certificate  click on the Browse button   e Uncheck the Use full trusted store checkbox   e Select the desired certificate and click Select  You are returned to the Credentials screen   If using the Certs Path option   e Leavethe Use MS store box unchecked   e Enter the certificate filename in the CA Cert textbox   Click OK then click Commit   The device should be authenticating the server certificate and using PEAP MSCHAP for the user authentication     Ensure the correct Active Profile is selected on the Main tab and warmboot  The SCU Main tab shows the device is associated  after the radio connects to the network     Note  The date must be properly set on the device to authenticate a certificate     6 28       PEAP GTC    To use PEAP GTC  make sure the following profile options are used   e Enter the SSID of the Access Point assigned to this profile  e Set EAP Type to PEAP GTC  e Set Encryption to WPA TKIP  e Set Auth Type to Open    To use another encryption type  select WP
270. tion    Introduction    This section discusses Honeywell supported features with Wavelink Avalanche Mobile Device Servers  This section is split  into three basic areas     e Installation  e User Interface  e Enabler Configuration    Installation    To use the Wavelink Avalanche MC System  the following items are required   e Adesktop or laptop PC on which to install the Avalanche MC Console     e Adesktop or laptop PC on which to install the Avalanche Mobile Device Server  this can be the same PC where the  Avalanche MC Console is installed      e Wavelink Avalanche MC Console 4 2 or later   e A Wavelink Device License for each client device   To use Avalanche Remote Control  the follow additional items are required   e Wavelink Remote Control plug in  2 0 or later  e A Wavelink Remote Control License for each client device    Installing the Enabler on Mobile Devices    Supported devices have the Avalanche Enabler installation files loaded  but not installed  on the mobile device when it is  shipped  The installation files are located in the  System folder on Windows devices     Note  Important  If the user is NOT using Wavelink Avalanche to manage their mobile device s   the Enabler should not be  installed on the mobile device s   Doing so results in unnecessary delays when booting the device     The Avalanche Enabler installation file LXE_ENABLER CAB is loaded on the Thor VM1 by Honeywell  however  the device is  not configured to launch the Enabler installation file auto
271. tion panel            Application Launch Options  Launch     V  Auto At Boot Retries  fo Delay  fio   Y Auto Re launch Retries  fo Delay  fo     7 Manual              7 Allow Close       Note  Launch order is determined by the Order specified in the Application tab  The Order value does not have to be  sequential     3 35       Auto At Boot       Application Launch Options  Launch     V  Auto At Boot Retries  fo Delay  fro   V  Auto Re launch Retries   0 Delay  fo       Manual        7 Allow Close          Default is Enabled   Auto At Boot    When enabled  automatically launches  subject to the specified Delay in seconds  the application after the unit is rebooted  If a  Delay in seconds is specified  AppLock waits for the specified period of time to expire before launching the application  The  Delay default value is 10 seconds  valid values are between 0    no delay    and a maximum of 999 seconds     Retries    This is the number of times the application launch will be retried if a failure occurs when the application is automatically  launched at bootup  Valid values are between 0  no tries  and 99 tries or  1 for infinite  Infinite tries ends when the application  successfully launches  The default is O retries     Delay    This timer is the time that AppLock waits prior to the initial launch of the selected application when it is automatically launched   at bootup  Delay default is 10 seconds  Valid values are between 0 seconds  no delay  and 999 seconds    The Auto At B
272. to encrypt password  LOG_ERROR    oe darn Encrypt password process successful  LOG_EX    Encrypt length failure Unable to encrypt password  LOG_ERROR    dl Sonar Unable to encrypt password  LOG_ERROR    Encrypted data OK The password has been successfully encrypted  LOG_EX    In order for AppLock to control the application being locked so it can prevent the  Enter application from exiting  AppLock launches the application and has to wait until it  AppLockEnumWindows   has created and initialized its main window  This message is logged when the  function that waits for the application initialization is entered     F F LOG_  Enter DecryptPwd Entering the password decryption process  PROCESSING  Enter EncryptPwd Entering the password encryption processin LOG   YP ey ee 9  PROCESSING  Enter FullScreenMode Entering the function that switches the screen mode  In full screen mode  the taskbar   LOG_  is hidden and disabled  PROCESSING  Processing is at the beginning of the function that retrieves the application LOG_  ENIT SEVAppINIO information from the registry  PROCESSING  Enter password dialo Entering the password dialog processin roc   P g i gp a PROCESSING    3 46    LOG_EX       Message Explanation and or corrective action Level    Enter password timeout   Entering the password timeout processing  ie    Some application shut down before AppLock can stop it  In these cases  AppLock   gets notification of the exit  When the notification is received  AppLock starts a timer  LOG_
273. to view an  updated list of APs  Each AP   s SSID  its received signal strength indication  RSSI  and whether or not data  encryption is in use  true or false   Sort the list by tapping on the column headers     If the scan finds more than one AP with the same SSID  the list displays the AP with the strongest RSSI and the  least security        nereh         If you are logged in as an Admin  tap an SSID in the list and tap the Configure button  you return to the Profile  window to recreate a profile for that SSID  with the profile name being the same as the SSID  or the SSID with a  suffix such as    _1    if a profile with the SSID as its name exists already      Allows entry of WEP keys or pass phrase as required by the type of encryption        Note  Unsaved Changes     The SCU will display a reminder if the Commit button is not clicked before an attempt is made to  close or browse away from this tab     Important     The settings for Auth Type  EAP Type and Encryption depend on the security type chosen        Profile Parameters    A string of 1 to 32 alphanumeric characters  establishes the name of the Profile   Edit Profile   Default   Options are Default or ThirdPartyConfig    A string of up to 32 alphanumeric characters  Establishes the Service Set Identifier  SSID  of the  SSID Blank   WLAN to which the client connects     A string of up to 16 characters  The client name is assigned to the network card and the device using  Client   i a    Name Blank the network card 
274. tooth Printer Setup      02    eee cece cece eee c cece cc cece ccccccccecceccececceceececcecceeeeeeeeeeeteeeeers 3 70   Easy Pairing and Auto Reconnect       2 22222    c eee cece cece cece ccc e cece ee ceeeeeeeeeteees 3 71  Certificates     cocoossitt ca el EAEE O eed Bede 3 72  Data Collection Wedge Introduction              0 000000 02 coe cc cece ccc cee cece cronos 3 73  Bar Code Readers x icono rica siii des 3 74  Return to Factory Default Settings              0000 000000 e cece aniraa rnaar nrnna 3 74  Data Processing Overview               2 02222 cece eee c ccc cece ns 3 75  Factory Default  Settings  2 2 caciones oat Mk 3 76    vi       Man Tanto ie era ets ead oa sia Vertes ata etude tate 3 77    COMET D ecclesia te A gk a er N 3 78  POWOPOMN PIM 262002  fo pede ir ti diia 3 78  AA A oh ite op A A Man eee se gees Pe ES 3 79  Poweron Pin ii nn cnccnccoes 3 79  Data Options Vabic csi eos steers ie tee a ett Oe SIS ae eae rue o eel 3 80  Enable Code ID a 53 case 34 coma dl ee ey lo ets ee EES e ES Satna tt E 3 80  AAA eae see tie ie este e a gabe a geet E see ees 3 81  Data Options   Symbology Settings    0    cece eee c cece ccc cc ccc ecccececceccececcecceeeeeeeeeeeeeeeeees 3 82  ARTO A A i cela A ee ds ee 3 83  Enable  Min  Max   cicsseccecescnieel eset a Yad etd Gedo eed Sack Gola CLS ee aes  alg ee ee 3 84  Strip Leading Trailing Control              000000020 occ c ccc ccc ccc ccc cece cece ee aandaa aaraa araona nannan 3 85   Bar Code Data Match List       0
275. tween applications  The Global Key default key sequence must be defined by the AppLock Admin   istrator  The Global key is presented to the end user as the Activation key     Default is 10 seconds  Enter the number of seconds that Applications must wait before starting to  run after reboot   Global Delay Note  Delay  Global  may not be available in all versions of AppLock  You can simulate a Global  Delay function by setting a delay for the first application  lowest Order  launched and  setting the delay to O for all other applications  See Boot Options        3 33    Default is Disabled  Enable  check  to show the Keyboard option on the Switchpad menu  When  Input Panel enabled the input panel cannot be enabled or disabled for each individual application  and is avail   able to the user for all configured applications     Tap the Clear button to clear all currently displayed Filename or Application information  The Global  Clear Button A  settings are not cleared     Use the left and right scroll buttons to move from application setup screen to application setup  Scroll Buttons screen  The left and right buttons update the information on the screen with the previous or next con   figured application respectively           Launch Button    Note  The Launch button may not be available in all versions of Multi AppLock  Contact Technical Assistance for and  AppLock update availability     When clicked  displays the Launch options panel for the Filename selected on the Administra
276. type of application is being locked  the  administrator should close all other applications before switching to end user mode to minimize the screen flicker     AppLock is updated periodically as new options become available  Contact Technical Assistance for update availability     3 26       Factory Default Settings   AppLock     gt   Le   3          r  Oo   gt   v  o   gt   o    Filename  Title  Arguments  Order  Internet  Global Key  Global Delay    Disabled  Ctrl Spc  10 sec   Disabled    Input Panel    Launch Button Panel    Enabled    10 sec    Enabled  Auto Re launch Retries  Auto Re launch Delay 0 sec  Disabled    Disabled    Manual Launch    Security Panel    Hotkey  Activation key  Shift Ctl A    Password Blank    Options Panel    Launch timeout 60000  20000    20000    Replace timeout    Restart timeout    Status Panel    Filename  System applock txt       3 27       Setup a New Device    Devices with the AppLock feature are shipped to boot in Administration mode with no default password  thus when the Thor  VM1 is first booted  the user has full access to the device and no password prompt is displayed  After the administrator  specifies the applications to lock  a password is assigned and the device is rebooted or the hotkey is pressed  the device  switches to end user mode     Briefly  the process to configure a new device is as follows   1  Connect an external power source to the device and press the Power button   Adjust screen display  audio volume and other p
277. umLock keys do     3 25       Administration  for AppLock     Start  gt  Settings  gt  Control Panel  gt  Administration    AppLock is designed to be run on certain certified Windows CE based devices only  The AppLock program is installed as part  of the default software load     Configuration parameters are specified by the AppLock Administrator for the Thor VM1 end user  AppLock is password  protected by the Administrator     End user mode locks the end user into the configured application or applications  The end user can still reboot the mobile  device and respond to dialog boxes  The administrator specified applications are automatically launched in the specified order  and run in full screen mode when the device boots up     When the mobile device is reset to factory default values  for example after a cold reset  the Administrator may need to  reconfigure the AppLock parameters     The assumption  in this section  is that the first user to power up a new mobile device is the system administrator     Note  AppLock Administrator Control panel file Launch option does not inter relate with similarly named options contained in  other Thor VM1 Control Panels     Note  A few applications do not follow normal procedures when closing  AppLock cannot prevent this type of application  from closing  but is notified that the application has closed  For these applications  AppLock immediately restarts the  application  see Auto Re Launch  which causes the screen to flicker  If this 
278. ur product s warranty information     Table of Contents    Chapter 1  Introduction        IIA 4  About this Guide o cnn 1 1  End User License Agreement  EULA   o occccccccccccccc cc 1 2   COMPONEN S Se e Ida 1 3  MON VICW  lt  atada 1 3  Back View with Quick Mount Smart Dock    2 22222  e ccc e eee c cece cece cece cece ceceeeeeeeeeees 14  Access Panels       22    22 2   2cc2esec che cede cece eee eee cee EAE S EE eee eee ece cede ceeee seen NEEE 1 4   Chapter 2 Hardware_ S 2   System Hardware        2 2    eee eee cee cece e cece cece cece cece cece cece cece cece DAADAA EAE E arrana 2 1  802 11a b g Wireless Client    200 2    c cece cece cece cece ccc cece ccc e cece cece cece eeeeeeeeeeeeeeereees 2 1  Central Processing Unit nn 2 1  Input Output Components  ninos 2 2  System Memory  ns 2 2  Video Subsystem     0 0000000000000 00 0000000000000000 cece cece eee cece eee e cece cece cece eeeeeeeeeeeeeeeeeeeetereeseeeees 2 2  Audio Interface    00    cece cece cece cece cece cece cece cece cece cece cece ce ccccceceeceeeeeeeeeeeeteteeteeeeeeeees 2 2  Card SIOUS ote  ee a tc ee re ee eee et 2 2   CompactFlash  CF  Slot    2 22 22    occ cece eee ccc cc ccc cc cece nn 2 2  Secure Digital  SD  Slot            00 0000 cee cee ee eee eee eee e cece eee e cece cee eeeeeeceseaaseeeesesee 2 2   Bluetooth EXEZ Palit  2 oct gnc k essen n a lio loci 2 3   MIN AA II E eda PN Rede 2 3   GPS ei tet A EENI AAEN etek AN ee aun a ute el dane etait edhe 2 3   OW E et re er ea See eet ee AEE h
279. uter is connectable   l   ote ete neha  Disable this option to inhibit Thor VM1 connection initiated by a Bluetooth scanner     ot This option is Disabled by default   Computer is discoverable i   i    Enable this option to ensure other devices can discover the Thor VM1     This option is Enabled by default     A dialog box appears on the Thor VM1 screen notifying the user a Bluetooth device requests to  pair with the Thor VM1     The requesting Bluetooth device does not need to have been Discovered by the Thor VM1    Prompt eso before the pairing request is received     pair  Tap the Accept button or the Decline button to remove the dialog box from the screen   Note  In some cases  if a Bluetooth device is already paired this setting cannot be changed   If this is the case  an error message is displayed and the option is not changed  The  Bluetooth device must be disconnected before changing this setting     This option is Disabled by default     When enabled  the Bluetooth connection never stops searching for a device it has paired with   Continuous Search when the connection is broken  such as the paired device entering Suspend mode  going out of  range or being turned off   When disabled  after being enabled  the Thor VM1 stops searching  after 30 minutes  This option draws power from the Main Battery     This option is Enabled by default     Determines whether the Bluetooth client discovers and displays all serial Bluetooth devices in  the vicinity  Filtered Mode is disa
280. ution  scan Config   Shortcuts   SaaS   Adapters   Status_ 4   gt     L  Auto Execute selection             Select Auto Execution App      7     Delay before execution  seconds            Auto Execute Selec   An application that has been installed with the Avalanche Management system can be run auto   tion matically following each boot     Select Auto  The drop down box provides a list of applications that have been installed with the Avalanche Man   Execute App agement System    Pelay PoS Time delay before launching Auto Execute application    execution       5 17       Scan Config    For best results  use eXpress Config and eXpress Scan for this function  eXpress Scan is included with the updated Thor VM1  enablers     Avalanche Update Settings       Scan Config functionality is a standard option of the Wavelink Avalanche MC system but is not currently supported on the Thor  VM1     5 18       Shortcuts    For best results  use AppLock for this function  AppLock is resident on each mobile device        Avalanche Update Settings OK E    Scan Config   Shortcuts   saas   Adapters   Status    Add    Edit      Delete                      Configure shortcuts to other applications on the Thor VM1  Shortcuts are viewed and activated in the Programs panel  This  limits the user s access to certain applications when the Enabler is controlling the mobile device display     5 19       SaaS       Avalanche Update Settings               Scan Config   Shortcuts   SaaS   Adapters   Status 
281. ve  This value is masked when the Admin is logged out     Options are  none   Specifies the number of seconds the Summit software waits for an EAP  authentication request to succeed or fail     If the authentication credentials are stored in the active profile and the  authentication times out  the association fails  No error message or    Auth Timeout 8 seconds prompting for corrected credentials is displayed     If the authentication credentials are not stored in the active profile and the  authentication times out  the user is again prompted to enter the credentials     Options are  An integer from 3 to 60        6 17    A valid directory path  of up to 64 characters  where WPA Certificate  Authority and User Certificates are stored on the mobile device when not  using the Windows certificates store  Ensure the Windows folder path exists  before assigning the path in this parameter  See Certificates for instructions  on obtaining CA and User Certificates  This value is masked when the   Certs Path System Admin is logged out   Options are  none   For example  when the valid certificate is stored as My  Computer System MYCERTIFICATE CER  enter System in the Certs Path  text box as the Windows folder path     Maximum amount of data to be transmitted on a ping   Ping Payload 32 bytes  Options are  32 bytes  64  128  256  512  or 1024 bytes     The amount of time  in milliseconds  that a device will be continuously  pinged  The Stop Ping button can be tapped to end the ping pro
282. wer Supply  AC to DC power input for the Thor VM1 is delivered to the Quick Mount Smart Dock via an optional external power supply and    adapter cable  One end of the adapter cable attaches to the dock and the other end is a barrel connector for the output cable  from the adapter     O _ AC Input Cable  US only     J 7 ELA AF    DC Output Cable  o             N      To DC Output Cable  see  above     CM  4  To Thor VM1    In North America  this unit is intended for use with a UL Listed ITE power supply with output rated 12     48 VDC   minimum 15 W  Outside North America  this unit is intended for use with an IEC certified ITE power supply with  output rated 12     48 VDC  minimum 15 W     The external power supply may be connected to either a 120V  60Hz supply or  outside North America  to a 230V  50Hz  supply  using the appropriate detachable cordset  In all cases  connect the external AC supply to a properly grounded source of  supply provided with maximum 15 Amp overcurrent protection  10 Amp for 230V circuits      Please refer to the wiring instructions  including appropriate cautions and warnings  in the Thor VM1 User Guide     Uninterruptible Power Supply    The Thor VM1 contains an internal UPS battery    The UPS battery is automatically charged when the Thor VM1 is placed in a powered dock   e A fully discharged UPS battery recharges in under 4 hours when the Thor VM1 is in a powered dock   e Charging of the UPS battery continues during power management of the Thor 
283. xamples found in this section are to be used as examples only  the configuration of your specific Thor VM1 computer may  vary  The following sections provide a general reference for the configuration of the Thor VM1 and some of its optional features     Operating System    Your Thor VM1 operating system is Microsoft   Windows   Embedded CE 6  The Thor VM1 operating system revision is  displayed on the Desktop  This is the default setting for the Desktop Display Background     Windows CE Operating System    Note  For general use instruction  please refer to commercially available Windows CE user s guides or the Windows CE on   line Help application installed with the Thor VM1 operating system    This segment assumes the system administrator is familiar with Microsoft Windows options and capabilities loaded on most   standard Windows computers    Therefore  the sections that follow describe only those Windows capabilities that are unique to the Thor VM1 and its Windows   CE environment        General Windows CE Keyboard Shortcuts    Use the keyboard shortcuts in the chart below to navigate with the Thor VM1 keyboard  These are standard keyboard shortcuts  for Windows CE applications     CTRL C Copy  CTRL  X Cut  CTRL V Paste  CTRL Z Undo  DELETE Delete    Select more than one item in a window or on the desktop  or select text    SHIFT with any of the arrow keys within a document     CTRL A Select all   ALT ESC Cycle through items in the order they were opened   CTRL ESC Display
    
Download Pdf Manuals
 
 
    
Related Search
    
Related Contents
  Bedienungsanleitung  Philips 717053348 Data Sheet  取扱説明書 - Bose  NANO-6060 User`s Manual  Télécharger la notice    HQ W7-51864/ NV  Guide de l`utilisateur/Dépannage Guida dell`utente/Soluzione dei  104L / 107L / 107B Coupe-herbe / Débroussailleuse    Copyright © All rights reserved. 
   Failed to retrieve file