Thor™ VM3 Vehicle-Mount Computer ® ® with Microsoft Windows Embedded Compact 7.0 User’s Guide...
Disclaimer Honeywell International Inc. (“HII”) reserves the right to make changes in specifications and other information contained in this document without prior notice, and the reader should in all cases consult HII to determine whether any such changes have been made.
Speaker Volume......................2-8 Power Up ..........................2-9 Rebooting the Thor VM3 ....................2-10 Tapping the Touch Screen with a Stylus ................2-10 Setup Terminal Emulation Parameters ................2-11 Cleaning ..........................2-11 Cleaning the Thor VM3 and the Dock ................2-11 Cleaning the Touch Screen..................2-11 Startup Help ........................2-11...
Chapter 3 - Hardware Overview System Hardware ........................ 3-1 802.11a/b/g/n Wireless Client..................3-1 Central Processing Unit ....................3-1 Input/Output Components....................3-1 System Memory......................3-1 Video Subsystem......................3-1 Audio Interface....................... 3-1 Card Slots ........................3-1 Bluetooth........................3-1 Power ..........................3-2 Vehicle DC Power Supply....................3-2 External AC Power Supply ....................
Place Thor VM3 in the Dock....................4-2 Dock I/O Pin Cover......................4-3 Padlock .......................... 4-3 Laptop Security Cable ....................4-3 Install RAM Mount ....................... 4-4 Components - RAM Mounting Kits ................4-4 Procedure - RAM Mount Assembly ................4-7 Install U Bracket Mount .....................
Connect via Serial Port......................6-1 Configure the serial port for ActiveSync ................ 6-1 Configure ActiveSync Settings ..................6-2 Configure PC Connection Settings ................6-2 Setup PC or Laptop ....................... 6-2 Start the ActiveSync Connection ................... 6-3 Explore ..........................6-3 Backup Data Files using ActiveSync ................... 6-3 Prerequisites........................
• Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. Consult the dealer or an experienced radio/TV technician for help. Caution - Changes or modifications made to this equipment not expressly approved by Honeywell may void the FCC authoriza- tion to operate this equipment.
Li-Ion Battery When disposing of the Thor VM3 UPS battery, the following precautions should be observed: The battery should be disposed of properly. The battery should not be disassembled or crushed. The battery should not be heated above 212°F (100°C) or inciner- ated.
Lagelandseweg 70, 6545CG Nijmegen The Netherlands Honeywell shall not be liable for use of our product with equipment (i.e., power supplies, personal computers, etc.) that is not CE marked and does not comply with the Low Voltage Directive. Part 0560 Number EN 300 328 V1.9.1: 2015...
Dealer License - Republic of Singapore Republic of Singapore - Dealer License Number DA104328 complies with IDA Standards. Complies with IDA Standards DA104328 WWAN is not available in Singapore. 1 - 4...
The Thor VM3 contains a UPS battery which, when fully charged, can power the Thor VM3 for a minimum of 30 minutes. This can be when the Thor VM3 is not attached to a dock or when the Thor VM3 is attached to a dock but the vehicle power is inter- rupted, such as when the vehicle battery is being changed.
(page 10-1). Initial Setup for Thor VM3 This page lists a quick outline of the steps you might take when setting up a new Thor VM3. More instruction for each step is listed later in this guide. Contact Technical Assistance (page 10-1) if you need additional help.
Thor VM3 for a minimum of 30 minutes when the unit is not mounted in the dock. All docks provide: • A mount for the Thor VM3 computer. The dock attaches to a vehicle via a RAM or U-bracket mount or to a RAM table stand for use in an office environment.
• 802.11 antenna connectors, used when the Thor VM3 is not equipped with internal antennas. • External GPS antenna connector, when the Thor VM3 is equipped with GPS. • External WWAN antenna connectors, when the Thor VM3 is equipped with WWAN. Optional WWAN radio (available in North America, Europe, New Zealand, and Australia only).
Front View - Dock Standard Dock Dock Contact Pads Enhanced Dock The Enhanced Dock has a foam surround around the dock contact pad. Dock Contact Pads Foam Surround Back View - Dock The connectors on the back of the dock vary by dock model. Standard Dock Ball Strain Relief...
Enhanced Dock Strain Relief Clamps Ball Accessory Accessory Mount Mount CANbus / Audio Fuse COM2 Power Switch COM1 Power Connector USB1 Note: For the VMX Enhanced Dock: COM1 is used for screen blanking (via the power cable connector) and is unavailable when the screen blanking box is attached.
Refer to the Screen Control (page 5-57) panel for the current display brightness level. Screen Blanking The Thor VM3 can be configured to blank (blackout) the display while the vehicle is in motion. Refer to ZoomZone (page 5-63) for information.
Power Up If a USB drive, such as a thumb drive is attached to the Thor VM3, the device may attempt to boot from the USB drive. Remove the USB drive and power up the Thor VM3 again. The dock has a power switch on the back.
Rebooting the Thor VM3 If a USB drive, such as a thumb drive is attached to the Thor VM3, the device attempts to boot from the USB drive: • If the USB drive contains a bootable sector, the Thor VM3 boots from the USB drive.
Cleaning Cleaning the Thor VM3 and the Dock Dampen a cloth with the cleaner and then wipe the surface. Do not spray the cleaner directly onto the Thor VM3 or the dock. Avoid harsh chemicals. The following cleaners are recommended: ®...
When a headset is plugged into the adapter cable, the main speakers are disabled. A microphone is located at the upper right of the Thor VM3 display, near the Thor VM3 emblem. When a headset is plugged into the adapter cable, the internal microphone is disabled.
If DC power is not available – for example, in an office environment – an optional external Universal Input Power Supply can be used to convert AC wall power to an appropriate DC level. AC to DC power input for the Thor VM3 is delivered to the dock via an optional external power supply and adapter cable.
• Charging does not occur when the Thor VM3 is in ignition mode and the ignition is inactive. • Charging of the UPS battery continues when the Thor VM3 is in power management (user idle, system idle or suspend modes).
Fuse The Thor VM3 uses an 8A time delay (slow blow) fuse that is externally accessible and user replaceable. The fuse is located on the back of the dock. The fuse is accessed by unscrewing the cap as indicated. Should it need replacement, replace with same size, rating and type of fuse: •...
Power the Thor VM3 off before attaching a cable to any port (serial, USB, Audio/CAN, etc.). The external I/O connectors for the Thor VM3 are located on the right side of the Quick Mount Smart Dock (when viewed from the back).
COM2 located on the back of the Quick Mount Smart Dock. USB2 Connector (page 9-8) for connector pinout detail. Power the Thor VM3 off before attaching a cable to any port (serial, USB, Audio/CAN, etc.). CANBUS/AUDIO Standard Dock Enhanced Dock An additional USB host port is located on the top of the Enhanced Dock.
2. WAN (MAIN) (Blue label) Main WWAN Antenna Connector 3. GPS (Green label) GPS The Thor VM3 is equipped with an 802.11 radio and can be ordered with internal Antenna Connector antennas, external antennas or external remote mount antennas. When the Thor VM3 is ordered with internal antennas, the external antenna connectors are not used.
Remove the rubber cap, if present, from the antenna connector before connecting an external antenna. Internal 802.11 Antenna If the internal 802.11 antenna option is ordered, antennas are mounted inside the Thor VM3. The internal antennas are not user accessible. Vehicle Remote Antenna The external antennas can be remotely mounted on the vehicle.
(page 3-16) for details. USB Keyboards Two Honeywell ruggedized USB keyboards are available, 95-key alphanumeric and 21-key numeric. 95-Key USB Keyboard The 95-key USB keyboard may have any of the following markings on the decal on the back of the keyboard: •...
(page 5-43) control panel. 21-key Numeric Keypad A numeric keypad is available for the Thor VM3 in applications where a full keyboard may not be needed. The USB keyboard connects directly to the D9 USB connector (Standard Dock) or USB1 connector (Enhanced Dock).
PS/2 Keyboards Legacy PS/2 keyboards can be used with the Thor VM3 via a USB to PS/2 adapter cable. PS/2 keyboards are available in 60-key and 95-key versions and were used with the VX6, VX7, Thor VX8 or Thor VX9.
F4 and F5 keys are not used as the display brightness is adjusted via the buttons on the Thor VM3. • The 2 functions of the F6 and F7 keys are not used as the Thor VM3 has TFT LCD screen with no provision for contrast adjustments. • The 2 functions of the F8 and F9 keys are not used as the sound volume on the Thor VM3 is controlled with the Sound icon in the Microsoft Windows System Tray.
A standard USB keyboard or mouse can be attached to the Thor VM3 using the appropriate adapter cable. The Y cable attaches to the Thor VM3 and provides a USB connector. Please refer to documentation provided with the USB keyboard or mouse for more information on their operation.
LED Behavior System State Green blinking very slowly External power present • Suspend (1/2 sec. on, 4 1/2 sec. off) • Off External power present • Suspend External power not present • Off • SuspendOff External power not present UPS Status LED The color of the UPS LED identifies the charge level, while the behavior of the LED identifies the charging state.
Connection LEDs WWAN LED Wi-Fi LED Bluetooth LED WWAN LED LED Behavior Status Solid Green Indicates a WWAN connection to a network Indicates no WWAN connection Wi-Fi LED LED Behavior Status Solid Green Indicates a connection with an IP address to an Access Point Indicates no connection to an Access Point Bluetooth LED LED Behavior...
(page 10-1) for availability. Note: If the touch screen is disabled or loses calibration on a Thor VM3, you must use a USB mouse or keyboard attached to the Thor VM3 to access the control panel to re-enable or recalibrate the touch screen unless a programmable key has been assigned to that function.
Display Backlight Control The display brightness on a Thor VM3 equipped with an outdoor display can be configured to automatically adjust depend- ing on the ambient light level via Screen Control (page 5-57).
Introduction The Thor VM3 is designed to be mounted to a Smart Dock in a vehicle with either a RAM mount or U Bracket system. A power cable is provided with the Thor VM3 dock. An optional 21 key numeric or 95 key laptop-style USB keyboard and keyboard mounts are available.
1. Locate the notch on the upper rear of the Thor VM3. 2. Slide this notch over the top lip of the dock. Slide the Thor VM3 from side to side on the dock to make sure it fully engages on the lip of the dock.
• When the Thor VM3 is not installed in the dock, use the I/O Pin Cover to protect the pins on the dock as shown. • When a Thor VM3 is installed in the dock, the I/O Pin Cover can be placed out of the way behind the dock.
In addition to the kits below, individual RAM mounting components are also available. Mounting Kits without Keyboards Each mounting kit contains: RAM Ball (Size D) for back of Thor VM3 Smart Dock with hardware (screws and washers) to attach RAM ball to dock RAM Arm (Size D), length varies by kit selected One of three mounting options: •...
Ball to Plate Mounting Kits with Integrated Keyboard Mounting Additionally, the kits for the Thor VM3 with an integrated 95 key keyboard mount include: Thor VM3 Keyboard Mounting Bracket RAM Ball (Size C) with hardware (nuts) to attach RAM ball to Keyboard...
RAM Ball (Size C) to attach RAM ball to 21key numeric keyboard or scan- ner holder. RAM Arm (Size C) 4 - 6...
Equipment Needed: Sockets, screwdriver and a Torque wrench capable of measuring to 50 inch pounds (5.64±.56 N/m). Note: Torquing tool is not supplied by Honeywell. Tools needed to attach the RAM Clamp Mount to the vehicle are not supplied by Honeywell.
2.5” (63.5 mm) wide and approximately 2” (50.8 mm) thick. The clamp may be attached to a thicker beam by substituting longer bolts (not included). Be sure to position the RAM clamp mount to allow access to the switches and ports on the bottom of the Thor VM3. Bolts...
1. Determine the position for mounting the RAM ball plate. Be sure to position the RAM plate to allow access to the switches and ports on the bottom of the Thor VM3. 2. Attach the RAM ball plate to the vehicle mounting surface using four 1/4 bolts (not included) or equivalent fasten- ers.
3. If using the external keyboard mount, position the Keyboard Bracket and the Size D RAM ball on the rear of the Thor VM3 dock, aligning the holes on the back of the Thor VM3 dock with the holes on the bracket and the RAM ball base.
Note: This step is only for a Thor VM3 with the optional external keyboard. 1. Slip the Size C RAM arm over the ball on the Thor VM3 Keyboard Bracket. 2. Slip the ball on the Keyboard Mounting Plate into the other end of the Size C RAM arm.
Step 8 - Attach Scanner Holder (Optional) This step is only for use with the Enhanced Dock. 1. Attach the accessory RAM ball to the Enhanced Dock. There are two mounting provisions, one on either side of the Enhanced dock and either can be used to mount the scanner holder. Note: Some components eliminated for detail clarity.
The U bracket kit is available in two configurations: • With a U Bracket included for new vehicle installations • Without a U Bracket for installing the Thor VM3 in place of a previous Honeywell vehicle mounted computer, such as a VX6 or VX7.
Note: 1/4 bolts and washers not included. It is recommended to use lock washers and flat washers on the fasteners. IMPORTANT: Mount to the most rigid surface available. After the bottom bracket has been attached to a rigid surface, you are ready to assemble the Thor VM3 bracket config- uration.
9. 1.25 in / 31.75 mm Step 2 - Remove RAM Ball If the Thor VM3 Smart Dock has a RAM ball attached, the RAM ball must be removed from the dock to use the U Bracket mount. Remove the RAM ball. The hardware used to attach the RAM ball to the dock is not reused for the U bracket mount.
For the Enhanced Dock there is a single cable clamp. Use this clamp for the power cable, Use the brackets for all other cables. 2. Remove the strain relief clamp from the Thor VM3 by turning the screw counterclockwise. Put the screw aside in a safe location.
(page 4-32) - Optional connection to blank the Thor VM3 display while the vehicle is in motion. • External AC/DC Power Supply (page 4-38) - For use when DC power is not available to power the Thor VM3, such as in an office environment. For the VMX3D Enhanced Dock, power options include: •...
The Green ground input is used for electrostatic discharge (ESD) protection. Vehicle 10-60VDC Direct Power Connection 1. The Thor VM3 must not be mounted in the Smart Dock. The power switch on the dock must be turned Off. The power cable must be UNPLUGGED from the dock.
7. Connect the watertight connector end of the power cable to the Thor VM3 Smart Dock power connector by aligning the connector pins to the power connector; push down on the watertight connector and twist it to fas- ten securely.
Ignition Control Wiring Diagram Existing Circuitry On Vehicle Quick Mount Smart Dock Battery Main Switch Ignition Cable for optional COM1 or COM2 screen blanking Connector connection Fuse - See Warning statement below Red/White (if present) Black/White (if present) Circular Power Black Connector Green...
Auto-On Control Wiring Diagram Existing Circuitry On Vehicle Quick Mount Smart Dock Battery Main Switch Cable for optional COM1 or COM2 screen blanking Connector connection Fuse - See Warning statement below Red/White (if present) Black/White (if present) Circular Power Black Connector Green Blue...
Manual Control Wiring Diagram Existing Circuitry On Vehicle Quick Mount Smart Dock Battery Main Switch Cable for optional COM1 or COM2 screen blanking Connector connection Fuse - See Warning statement below Red/White (if present) Black/White (if present) Circular Power Black Connector Green Blue...
60-144 VDC Vehicles (50-150 VDC Power Supply, Screws on Side of Lid) This option requires DC/DC external power supply Honeywell Part no. 9000313PWRSPLY. Shown With Lid Attached Shown With Lid Removed • Lid is secured with screws on the side of lid.
Wiring Diagram (page 4-25), before beginning power cable install. 2. The Thor VM3 must not be mounted in the Smart Dock. The power switch on the dock must be turned Off. The power cable must be UNPLUGGED from the dock.
(page 3-4) on the back of the Thor VM3 dock. 22. Press the Power Button (page 3-4) on the front of the Thor VM3 to turn on the Thor VM3. Note: Ignition control is not available for trucks over 60VDC. Wiring Diagram...
(page 4-28) for additional wire color-coding specifics. The Thor VM3 DC input wires (Red, Red/White DC+ and Black, Black/White DC-) and the Blue ignition input wire are galvanically isolated. The Green ground input is used for electrostatic discharge (ESD) protection.
Wiring Diagram (page 4-25), before beginning power cable install. 2. The Thor VM3 must not be mounted in the Smart Dock. The power switch on the dock must be turned Off. The power cable must be UNPLUGGED from the dock.
(page 3-4) on the back of the Thor VM3 dock. 21. Press the Power Button (page 3-4) on the front of the Thor VM3 to turn on the Thor VM3. Note: Ignition control is not available for trucks over 60VDC. Wiring Diagram...
VX6 / VX7 Adapter Cable An adapter cable is available to attach the Thor VM3 to a vehicle previously equipped with a VX6/VX7 DC power cable. The adapter cable has a 5-pin connector to match with the VX6/VX7 power supply cable on one end and a 6-pin con- nector to match to the Thor VM3 on the other end.
Thor VM3 on the other end. The cable also has bare wires for ground and ignition sense connection plus a D9 cable to connect to a COM port on the Thor VM3 dock to provide a screen blanking signal. This section assumes the VX8/VX9 power cable is properly connected to vehicle power.
CV61 Adapter Cable An adapter cable is available to attach the Thor VM3 to a vehicle previously equipped with a CV61 DC power cable. The adapter cable has a 5-pin connector to match with the VV61 power supply cable on one end and a 6-pin connector to match to the Thor VM3 on the other end.
1. Connect the gray wire of the cable to the switched side of the Screen Blanking Box. 2. Connect the black wire of the cable to the unswitched side of the Screen Blanking Box. 3. Connect the D9 serial connector to either COM1 or COM2 serial port on the Thor VM3 Smart Dock. 4 - 32...
2. Connect the wire from Pin 7 of the cable to the unswitched side of the Screen Blanking Box or to a user- supplied switch. 3. Connect the D9 serial connector to either COM1 or COM2 serial port on the Thor VM3 Smart Dock. Screen Blanking Box...
To pin 7 of COM1 or COM2 To pin 8 of COM1 or COM2 Note: The black and gray wire colors in the illustration only apply to the optional Honeywell Screen Blanking Box Cable, VM1080CABLE. The wire colors may be different in a user-supplied cable.
This dock eliminates the need for wiring changes by enabling the existing VX8/VX9 power cable and screen blanking box to be used when the VX8/VX9 is replaced by a Thor VM3 computer. These instructions are for this dock model only! The Ignition Control feature is not available when this dock is used.
DC/DC Power Supply with Screws on Top of Lid Inspect the cable shield to verify it is connected to chassis ground. If there is no connection from the cable shield to chassis ground, one must be added at this time. Use a jumper wire to connect the cable shield to chassis ground as shown below for the appropriate type of power supply installed on the vehicle.
DC/DC Power Supply with Screws on Side of Lid Inspect the cable shield to verify it is connected to chassis ground. If there is no connection from the cable shield to chassis ground, one must be added at this time. Use a jumper wire to connect the cable shield to chassis ground as shown below for the appropriate type of power supply installed on the vehicle.
3. Connect the DC Output Cable end to the corresponding connector on the Adapter Cable. 4. Connect the watertight connector end of the Adapter Cable to the Thor VM3 Smart Dock Power Connector by aligning the connector pins to the power connector; push down on the watertight connector and twist it to fas- ten securely.
A legacy PS/2 keyboard (used with VX6, VX7, Thor VX8 or Thor VX9), available in either 60-key or 95-key versions can be used with the Thor VM3 via a PS/2 to USB adapter cable. This function is only supported with the VM3D or VMXD Enhanced Docks.
1. Seat the male connector of the cable over the USB connector on the Thor VM3 Smart Dock. 2. Tighten the thumbscrews in a clockwise direction. Do not over tighten. 3. Seat the keyboard connector over the female connector of the cable.
USB and USB1 Connector (page 9-7) for connector pinouts. Note: The USB client connection is not available on the Thor VM3. 1. Seat the D9 connector firmly over the USB (Standard Dock) or USB1 (Enhanced Dock) connector on the dock.
2. Tighten the thumbscrews in a clockwise direction. Do not over tighten. click! 3. Slide the cable ends together until they click shut. Do not twist or bend the connectors. The Thor VM3 internal microphone and speakers are automatically disabled when the headset is connected.
Adjust Headset / Microphone and Secure Cable The headset consists of an earpiece, a microphone, a clothing clip and a cable. 1. Do not twist the microphone boom when adjusting the microphone. The microphone should be adjusted to be about two finger widths from your mouth. 2.
Connect CANbus Cable The CANbus/Audio connector supports a headset adapter cable or a CANbus Y cable. The Thor VM3 does not support connecting audio and CANbus simultaneously. CANbus / Audio Connector (page 9-11) for connector pinouts. 1. Seat the D15 cable end connector firmly over the CANbus/Audio Connector on the Smart Dock.
(base plate and right angle), cable, and antenna. Tools are not included. The desired remote antenna bracket is mounted on the top of a forklift, truck or other vehicle and cabled to the Thor VM3 inside the vehicle. The Vehicle Remote Mount Antenna cannot be used by devices with an internal antenna.
6. Connect the cable to the antenna connector (Wi-Fi Main or Wi-Fi Aux) on the Thor VM3. If only one antenna is used, be sure to connect it to the Wi-Fi Main connector.
The Remote Antenna Installation Kit consists of the WAN antenna and an extension cable. The remote antenna is mounted on the top of a forklift, truck or other vehicle and cabled to the Thor VM3 inside the vehicle. 1. Locate a mounting position on highest point on the vehicle, following these precautions: •...
Disconnect UPS Battery CAUTION - The UPS battery must be disconnected before you ship the Thor VM3 or Replace Front Panel (page 4-53). Equipment Required The following equipment is user-supplied: • Torquing tool capable of measuring inch pounds • #2 Phillips screwdriver bit Disconnect Procedure 1.
2. Remove the Thor VM3 from the dock. Disconnect UPS Battery (page 4-49). 4. Place the Thor VM3 face down on a stable surface. 5. Use a #2 Phillips bit to loosen the captive M3 screws on the access panel with the mSATA and SIM labels.
See WWAN Connection Manager (page 6-40) for software configuration. Note: The SIM card is not hot-swappable. After installing or removing a SIM card, the Thor VM3 must be rebooted for the change to take effect. Equipment Required The following equipment is user-supplied: •...
VM3 WWAN Connection Manager (page 6-40) identifies the top slot (the slot closest to the top of the Thor VM3 as slot 1 (SIM 1) and the lower slot as slot 2 (SIM 2). Note: If an mSATA drive has been installed, it is necessary to remove the drive before installing the SIM card(s).
Front Panel Options The front panel of the Thor VM3 is field replaceable. The front panel assembly contains the keypad, touch screen and optional defroster. Should any of these components fail, the front panel assembly can easily be replaced to reduce down- time.
10. When the Thor VM3 is placed in the powered dock, the UPS battery automatically reconnects. 11. Restart the Thor VM3. 12. If adding or removing a defroster, update the Thor VM3 configuration by selecting Start > Settings > Control Panel > Peripherals and tap the Test button.
The examples found in this section are to be used as examples only, the configuration of your specific Thor VM3 computer may vary. The fol- lowing sections provide a general reference for the configuration of the 1 and some of its optional features.
• PowerPoint Viewer Note that the viewer applications allow viewing documents, but not editing them. ActiveSync ActiveSync is pre-loaded. Using Microsoft ActiveSync you can copy files from your Thor VM3 to your desktop/laptop , and vice versa. RFTerm (Optional) Start > Programs > Honeywell RFTerm RFTerm is pre-loaded when ordered.
Order is used to force a sequence of events. Order=0 is first, and Order=99 is last. Order must be greater than 4 for the Thor VM3. Two items which have the same order will be installed in the same pass, but not in a predictable sequence.
(*.REG), or sound files (*.WAV). The mechanism is the same as listed above, but the appropriate application is called, depending on file type. Note: Registry entries may vary depending on software revision level and options ordered with the Thor VM3. LAUNCH.EXE and Persistent Storage...
1 each time the PrtScrn function is activated. The command is not case-sensitive. Desktop The Thor VM3 Desktop appearance is similar to that of a desktop PC running a Windows operating system. At the bottom of the screen is the Start button. Tapping the Start Button causes the Start Menu (page 5-7) to display.
Icon Function HTML5 Browser is for web applications designed to run on-line, off-line or a combination. Bluetooth scanning is sued to discover and pair certain Bluetooth scanners. A shortcut to the Remote Desktop Connection utility. Start button. Access programs, select from the Favorites listing, documents last worked on, change/view set- tings for the control panel or taskbar, on-line help or run programs.
Word Viewer View Word and compatible documents Microsoft WordPad Opens an ASCII notepad Remote Desktop Connection Log on to a Windows Terminal Server Honeywell RFTerm Option. Terminal emulation application. Enterprise Browser Lock down software. Enterprise TE Terminal emulation application. HTML5 Browser Lock-down menu software.
Windows PC Microsoft Remote Desktop options. If installed, Remote Desktop on the Thor VM3 can be accessed by Start > Programs > Remote Desktop. Select a computer from the drop down list or enter a host name and tap the Connect button.
Taskbar Start > Settings > Taskbar There are a few changes in the Windows Embedded Compact version of Taskbar as it relates to the general desktop PC Win- dows Taskbar options. When the taskbar is auto hidden, press the Ctrl key then the Esc key to make the Start button appear. Clicking the Taskbar option on the Settings menu displays the General and Advanced Taskbar tabs.
Refer to Start > Help for an explanation of standard Windows Embedded Compact taskbar icons. Following are a few of the Thor VM3 taskbar icons that may appear in the Taskbar. These icons are in addition to the Windows Embedded Compact taskbar icons.
The Thor VM3 must be connected to external power before upgrading the BIOS, firmware or operating systems. If the Thor VM3 is operating on UPS battery power, the upgrade process does not initiate and the Thor VM3 is not upgraded.
To access and modify the BIOS on the Thor VM3, an external keyboard must be attached. When the Press F2 for System Utilities prompt is displayed at power up, press the P2 key on the Thor VM3 or the F2 key on an external keyboard to enter BIOS setup.
(page 5-34) Set key repeat delay and key repeat rate. Keyboard Remapper (page 5-35) Remap programmable keys on Thor VM3 front panel or keys on an external USB keyboard. Mixer (page 5-38) Adjust the input and output parameters – volume, sidetone, and record gain, for headphone, software and microphone.
Option Function System (page 5-60) Review System and Computer data and revision levels. Adjust Storage and Program mem- ory settings. Enter device name and description. Review copyright notices. Terminal Server Client Licenses Select a server client license from a drop down list. (page 5-61) Volume and Sounds (page 5-62) Enable / disable volume and sounds.
The Versions tab displays the versions of many of the software programs installed. Not all installed software is included in this list and the list varies depending on the applications loaded on the Thor VM3. The Image line displays the revision of the system software installed. Refer to the last three digits to determine the revision level.
Accessibility Start > Settings > Control Panel > Accessibility Customize the way the Thor VM3 keyboard, sound, display, mouse, automatic reset and notification sounds function. There are a few changes from general Windows desktop Accessibility options. Contents Keyboard Sticky Keys - Disabled (cannot be enabled).
25% the gas gauge icon will turn red indicating the battery is low. The battery gauge icon is enabled by default, but can be disabled on the Thor VM3 Battery control panel. The UPS LED turns red when there is approximately 2 minutes of run time remaining.
(page 5-27) Note: You can also print wirelessly using Microsoft APIs with Bluetooth extensions for Winsock and Bluetooth. For help, see the Bluetooth Resource Kit documentation. The Bluetooth Printing wizard supports the following Honeywell printers: • PR2 • PR3 • PB31 •...
To continue after this error: • Dismiss the error. • Return to the Bluetooth Printing control panel and repeat the process starting with step 3. 8. The Bluetooth printer is shown. Print a test page if desired. 5 - 19...
• Honeywell Granit 1981i Bluetooth scanner • LXE 88x0 family of Bluetooth scanners Use the bar code Quick Connect bar code on either side of the Thor VM3 to connect the following scanners: • Intermec SF51 Bluetooth scanner • Intermec SF61 Bluetooth scanner •...
Scan the displayed bar code to connect one of Scan the displayed bar code to connect one of these scanners: these scanners: • Honeywell/LXE 8650 family of Bluetooth ring • Intermec SF51 Bluetooth scanner scanners • Intermec SF61 Bluetooth scanner •...
If Quick Connect does not work, use the other options to connect these scanners. • If the Honeywell Granit 1911i and Granit 1981i scanners cannot be found with the Search option, scan the PDAs/ Mobility Systems Devices bar code from the scanner manual and search again.
Start > Settings > Control Panel > Certificates Manage digital certificates used for secure communication. Note: Digital certificates are date sensitive. If the date on the Thor VM3 is incorrect, wireless authentication will fail. The Certificates stores tab lists the certificates trusted by the Thor VM3 user.
Date / Time Start > Settings > Control Panel > Date/Time - or - Time in Desktop Taskbar Use this Thor VM3 panel to set Date, Time, Time Zone, and assign a Daylight Savings location. Factory Default Settings Time Zone...
The display might also called the touch screen. Select the desktop background image and appearance scheme for the Thor VM3. Using the options on the Backlight tab, set the display backlight and keypad backlight timers when running on battery or external power.
Backlight When the backlight timer expires, the touch screen backlight is dimmed, not turned off. When both checkboxes are unchecked, the backlight never turns off (or dims). The default value for external power varies by the scheme selected on the Power (page 5-49) control panel (and for Ignition Control, the status of the vehicle ignition).
Enterprise Settings Start > Settings > Control Panel > Enterprise Settings Use Enterprise Settings to configure parameters for Enterprise applications on the computer. You can configure parame- ters for important functions like data collection and communications. External bar code scanners are supported by connecting the scanner to a COM port, USB port, or by Bluetooth. The scan- ners parameters, including bar code symbologies, can be configured using Enterprise Settings >...
Printer Configlet Version Memory Display Print Engine The settings that appear in these menus depend on the printer paired with Media the Thor VM3. The printer must be using the Bluetooth Printing (page 5-18) Print Defs application. Freed Adj Power...
None (displays applications that are licensed) Bar Code Scanners and Enterprise Settings The following types of bar code scanners are supported on the Thor VM3: • A tethered scanner connected to COM1 or COM2 • A wireless scanner connected via Bluetooth Note: USB scanners are not supported by or configured through Enterprise Settings.
USB Scanners When a HID enabled USB scanner is connected to the Thor VM3 the scanned data is transmitted to the active win- dows as keystroke messages. Any data handling to be applied to the scanned data (for example to strip leading or trailing characters) must be programmed into the scan engine.
Input Panel Start > Settings > Control Panel > Input Panel Set the current Thor VM3 keys and data input method. Factory Default Settings Input Panel Input Method Keyboard Allow applications to change input panel state Enabled Options button Keys...
Internet Options Start > Settings > Control Panel > Internet Options Set options for Thor VM3 Internet connectivity. Select a tab. Adjust the settings and tap the OK button. The changes take effect immediately. Factory Default Settings General Start Page http://www.honeywell.com...
1. If a USB keyboard has already been attached, remove the USB keyboard to program the integrated keys. 2. Start the remapping utility. 3. Program the integrated programmable keys (i.e.: P1 - P7) on the Thor VM3. 4. Exit the remapping utility.
If more than one keyboard was remapped, this function only applies to the current keyboard in the remapping util- ity. For example, if the integrated programmable keys on the Thor VM3 were remapped then a USB keyboard was attached only they remapped keys on the USB keyboard would be reset to default values. Remove the USB key- board and relaunch the remapper utility to restore defaults to the integrated programmable keys.
5. Add the values for the C4 key that was created. In this example, cmd.exe (command prompt) is added: Name Format Description Example Application “appname.exe” The name of the application “cmd.exe” Path “\Windows” The path of the application “\Windows” 6. Launch the Keyboard Remapper (page 5-35).
Mixer Start > Settings > Control Panel > Mixer The Thor VM3 has two speakers (located at the bottom front of the unit) and one microphone (located at the top front of the unit). Use the settings on these panels to adjust the master volume, record gain and sidetone.
Network and Dialup Connections Start > Settings > Control Panel > Network and Dialup Connections Set Thor VM3 network driver properties and network access properties. Select a connection to use, or create a new con- nection. Create a New Connection 1.
Network Capture Start > Settings > Control Panel > Network Capture Note: Verify the Date / Time (page 5-24) before using the logging utilities to ensure meaningful data. The Network Capture panels provide configuration options for logging utilities. Two types of logging are configurable: •...
Options Options Function pkt_size in Specifies the maximum packet size captured in bytes. This option should only be run after you have bytes called load and stop. Default is 5000. cap_size in Specifies the maximum size of Netlog0.cap or Netlog1.cap in bytes. This option should only be run bytes after you have called load and stop.
Options Start > Settings > Control Panel > Options It may be necessary to warmboot the Thor VM3 after making desired changes. A pop up window indicates if a warmboot is required. Communication Options on this tab configure communication options for the Thor VM3.
Note: If the touch screen is disabled on a Thor VM3, you must use a USB mouse or keyboard attached to the Thor VM3 to access this tab to re-enable the touch screen unless a key has been assigned to enable the touch...
Owner Start > Settings > Control Panel > Owner Set the Thor VM3 owner details. The Network ID is used when logging into a remote network. Factory Default Settings Identification Name Blank Company Blank Address Blank Telephones Blank Display owner ID at power-on...
Password Start > Settings > Control Panel > Password Important: This password must be entered before performing a Load Factory Defaults. If entering a power-on or screen saver password does not allow you to disable this password protection or perform a Load Factory Defaults, contact Technical Assistance (page 10-1).
PC Connection Start > Settings > Control Panel > PC Connection Use these options to control a cabled connection (USB, serial) between the Thor VM3 and a nearby desktop/laptop com- puter. Factory Default Settings Enable direct connection Disabled Connect using ActiveSync Tap the Change button to change the direct connect setting.
Tap the Test button to determine the presence of the defroster. Use this button when the front panel of the Thor VM3 has been swapped. For example, if the Thor VM3 did not contain a defroster but a new front panel with a defroster is installed, tap the Test button to update the defroster presence status on this tab.
• and, for ignition control, the status of the vehicle ignition signal. The Power Schemes are defined below. The active Power Scheme depends on the user-selected power configuration mode. However, if no external power is present, the Thor VM3 uses the UPS Power Scheme regardless of user selected Power Configuration mode.
• The Thor VM3 shuts down after 31 minutes and 30 seconds of no activity. • If the User Idle timer is set to Never, the power scheme timers never place the Thor VM3 in User Idle, System Idle or Suspend modes.
(page 5-49) control panel timeout values vary by the power configuration mode selected. AC/DC Mode This is the default power mode. In AC/DC mode the Thor VM3 is turned On by a press of the Power button. Ignition input is ignored when AC/DC Mode is enabled...
The Thor VM3 continues to run and follows the Ignition Control/Ignition On power scheme with timers reset at the time Ignition switched to Active. An example of this case would be a Thor VM3 that is running on UPS and is then mounted on a dock that has truck power and the ignition switch is already On.
The Thor VM3 boots and follows the UPS power scheme with power management timers reset at boot up. Conditions The Thor VM3 is Off and the power button is pressed the Thor VM3 and at least one of the following condi- tions are met: •...
Regional Settings Start > Settings > Control Panel > Regional Settings Set the appearance of numbers, currency, time and date based on regional and language settings. Set the Thor VM3 user interface language and the default input language. Factory Default Settings...
Start > Settings > Control Panel > Remove Programs Note: Lists programs installed in RAM that have been marked for removal. Select a program and tap Remove. Follow the prompts on the screen to uninstall Thor VM3 user-installed only programs. The change takes effect immediately.
Ambient Light %. Otherwise, the display defaults to 100% brightness. Note: There is no default value for Ambient Light % as it varies depending on the level of light where the Thor VM3 is located. If the Thor VM3 has an indoor display it does not have an ambient light sensor and the Ambient Light % is always 0.
Storage Manager Start > Settings > Control Panel > Storage Manager Installed storage devices are listed by device name in the drop-down box. To view information about the disk or perform store operations, select a device from the list. 5 - 58...
Stylus Start > Settings > Control Panel > Stylus Use this control panel option to set stylus double-tap sensitivity properties and calibrate the Thor VM3 touch panel when needed. Double-Tap Follow the instructions on the screen and tap the OK button to save any double-tap changes.
System Start > Settings > Control Panel > System Use these Thor VM3 panels to: • Review System and mobile device data and revision levels. • Adjust Storage and Program memory settings. • Assign a device name and device descriptor.
The device name and description can be changed by the user. Enter the name and description using either the keypad or the Input Panel and tap OK to save the changes. This information is used to identify the Thor VM3 to other comput- ers and devices.
Motion Detection Method Select the motion detection method. The Thor VM3 supports the screen blanking box to determine motion. Select the port (COM1 or COM2) to which the blanking box is attached. Note: By default, COM1 and COM2 ports are used by Enterprise Data Collection. To use a COM port for screen...
Set Zoom Area The ZoomArea can be selected from the current active desktop display. To set the zoom area: 1. Display the desired content on the Thor VM3 desktop. 2. Open the ZoomZone interface. 3. Tap the Set Zoom Area button.
2. The Thor VM3 automatically reboots and starts the update process after detecting the updatefw.tag file. No user intervention is required to reboot the Thor VM3 or run the update utility after the reboot. The update utility operates in a DOS screen.
Thor VM3. All other settings on the destination Thor VM3 are left unchanged. • Import changes and defaults - All configuration settings are applied to the destination Thor VM3. If a setting was modified on the source Thor VM3 the modified value is applied to the destination Thor VM3. Otherwise the default value is applied for that setting on the destination Thor VM3.
• ccf files - These files contain the modified values for the software settings. These files are created with the CCU . ccf files are encrypted for security. Once a ccf file is created on one Thor VM3 it can be copied to other Thor VM3s to duplicate the configuration.
• Tap No to apply the values from the ccf file and leave all other parameters as-is on the destination device. • Tap Cancel to exit with no changes to the destination device. Upon completion, exit the CCU and reboot the Thor VM3 so changes can take effect. User Selects the desired user access level: •...
Thor VM3. If the parameter setting changes should also be applied to this Thor VM3, select Registry > Import Settings. After importing the settings, a reboot is necessary for the changes to take effect on the Thor VM3.
4. Select File > Save then specify a file name and tap Save to save the settings to a ccf file. 5. The ccf file can be used to configure another Thor VM3. See Example 4. Example 2: Modify settings on the current device and save to a file To modify the settings on the Thor VM3 running the CCU: 1.
• Tap No to apply the values from the ccf file and leave all other parameters as-is on the destination device. • Tap Cancel to exit with no changes to the destination device. 7. Reboot the Thor VM3 for the new settings to take effect. 5 - 71...
ActiveSync, then open ActiveSync Help. Initial Setup The Thor VM3 supports ActiveSync over a serial port. The Thor VM3 does not support a USB ActiveSync connection. Connect via Serial Port In order to use a serial port for ActiveSync: •...
3. Verify that pane says Connect using ‘ActiveSync’. If necessary, tap the Change button to select the correct setting. Note: Do not use USB as this option is not supported on the Thor VM3. 4. Click OK to confirm settings and close the open window.
• From the Windows Mobile Device Center interface select File Management > Browse the contents of your device. This function allows you to explore the Thor VM3 from the PC side, with some limitations. You can copy files to or from the mobile device by drag-and-drop.
Verify the cable is attached to the Thor VM3. Disconnect and reconnect the cable from the PC. Check that the correct connection is selected. See Reset and Loss of Host Re-connection, above. ActiveSync indicator on the host (disc in the toolbar tray) turns green and spins as soon as you connect the cable, before tapping the Connect icon (or REPLLOG.EXE in the Windows directory).
IPv4) > Properties). Always reboot the Thor VM3 after changing the IP address type. Important Notes It is important that all dates are correct on the Thor VM3 and host computers when using any type of certificate. Certificates are date sensitive and if the date is not correct authentication will fail.
Tasks Tasks are listed on the left side of the screen: • Browse Nearby Wireless Networks (page 7-4) • Roam Management (page 7-27) • Admin Login (page 7-3) Status The status of the radio card is shown in the upper right hand of the screen: Radio is on.
The appearance of the icon indicates if the admin is logged in or not. To log in: 1. Tap the Admin Login icon. 2. Enter the password. The default password is Honeywell. 3. Tap the Login button to log in or Cancel to exit without logging in. To change the default password: 1.
Browse Nearby Wireless Networks Tap the Browse nearby wireless networks to open the open this window. Tap the Refresh button to update the network list. For each network discovered the following attributes are listed: • Network Name (SSID) - Name of the network (Service Set ID). •...
5. Tap Advanced security settings for additional configuration options including Security (page 7-6). 6. Tap OK to exit and save the profile or type Cancel to exit without creating a profile. Advanced Profile Configuration Connection This tab shows the basic information used to create the profile. Options include: •...
Security The options available on the security tab will depend on the security type and encryption type selected. Review the appropriate section for configuring the WCU for network security: • Open (No Security) (page 7-7) • (page 7-8) • WPA2-Personal (page 7-9) •...
Open (No Security) To configure for open (no security): 1. Set Security Type to No authentication (Open). 2. Set Encryption Type to none. 3. Tap OK. 4. From the profile listing, make sure the desired profile is active. 5. Verify the connection using Status (page 7-2).
To configure for WEP: 1. Set Security Type to No authentication (Open). 2. Set Encryption Type to WEP. 3. Enter the Network Security Key. 4. Select the Key Index. 5. Tap OK. 6. From the profile listing, make sure the desired profile is active. 7.
WPA2-Personal To configure for WPA2-Personal: 1. Set Security Type to WPA2-Personal. 2. Set Encryption Type to AES. 3. Enter the Network Security Key. 4. Tap OK. 5. From the profile listing, make sure the desired profile is active. 6. Verify the connection using Status (page 7-2).
PEAP-TLS To configure for PEAP-TLS: 1. Set Security Type to WPA2-Enterprise or CCKM. 2. Set Encryption Type to AES. 3. Set network authentication method to Protected EAP (PEAP). 4. Tap the Settings button. 5. Select the Connection tab. 6. Select Validate server certificate. 7.
8. Select the User Credentials tab. 9. Select Use certificate on this computer. 10. Select the Authentication tab. 11. Select Use certificate on this computer. 12. Select EAP-TLS as the authentication method. 13. Tap OK to close any open windows. 14.
PEAP-MSCHAP To configure for PEAP-MSCHAP: 1. Set Security Type to WPA2-Enterprise or CCKM. 2. Set Encryption Type to AES. 3. Set network authentication method to Protected EAP (PEAP). 4. Tap the Settings button. 5. Select the Connection tab. 6. Select Validate server certificate. 7.
8. Select the User Credentials tab. 9. Select the desired credentials method of providing credentials. Prompt automatically for username and pass- word is recommended. 10. If saved username and password is selected, enter the credentials now. 11. Select the Authentication tab. 12.
PEAP-GTC To configure for PEAP-TLS: 1. Set Security Type to WPA2-Enterprise or CCKM. 2. Set Encryption Type to AES. 3. Set network authentication method to Protected EAP (PEAP). 4. Tap the Settings button. 5. Select the Connection tab. 6. Select Validate server certificate. 7.
8. Select the User Credentials tab. 9. Select Prompt automatically for username and password. 10. Select the Authentication tab. 11. Select EAP-GTC as the authentication method. 12. Tap OK to close any open windows. 13. From the profile listing, make sure the desired profile is active. 14.
LEAP To configure for Cisco LEAP: 1. Set Security Type to WPA2-Enterprise or CCKM. 2. Set Encryption Type to AES. 3. Set network authentication method to CISCO-LEAP. 4. Tap the Settings button. 5. Select the desired credentials method of providing credentials. Prompt automatically for username and pass- word is recommended.
9. From the profile listing, make sure the desired profile is active. 10. If prompt for username and password option was selected, enter the credentials when prompted. Note: If the credentials are not entered when to window first pops up, the credentials window can become hidden behind other windows.
EAP-FAST PEAP To configure for Cisco EAP-FAST PEAP: 1. Set Security Type to WPA2-Enterprise or CCKM. 2. Set Encryption Type to AES. 3. Set network authentication method to CISCO-FAST. 4. Tap the Settings button. 7 - 18...
5. Select the User Credentials tab. 6. Select the desired credentials method of providing username and password. Prompt automatically for user- name and password is recommended. 7. If saved username and password is selected, enter the credentials now. 8. Tap the Authentication tab. 9.
10. The About tab provides Cisco copyright information. 11. Tap OK to close all open windows. 12. From the profile listing, make sure the desired profile is active. 13. If prompt for username and password option was selected, enter the credentials when prompted. Note: If the credentials are not entered when to window first pops up, the credentials window can become hidden behind other windows.
EAP-FAST TLS To configure for Cisco EAP-FAST TLS: 1. Set Security Type to WPA2-Enterprise or CCKM. 2. Set Encryption Type to AES. 3. Set network authentication method to Cisco:EAP-FAST. 4. Tap the Settings button. 7 - 21...
5. Select the User Credentials tab. 6. Select Use certificate on this computer. 7. No entries are needed on the Authentication tab. 8. The About tab provides Cisco copyright information. 9. Tap OK to close all open windows. 10. From the profile listing, make sure the desired profile is active. 11.
EAP-TLS To configure for EAP-TLS: 1. Set Security Type to WPA2-Enterprise or CCKM. 2. Set Encryption Type to AES. 3. Set network authentication method to Microsoft Smart Card or other certificate. 4. Tap the Settings button. Note: If a user certificate has already been selected, the details would be populated on this screen. 7 - 23...
5. Tap Select to select a user certificate on this computer. 6. Select the certificate from the listed certificates. 7. Tap OK. 8. The selected certificate is displayed. 9. Tap OK to close any open windows. 10. From the profile listing, make sure the desired profile is active. 11.
EAP-TTLS To configure for EAP-TTLS: 1. Set Security Type to WPA2-Enterprise or CCKM. 2. Set Encryption Type to AES. 3. Set network authentication method to EAP_TTLS. 4. Tap the Settings button. 5. Select the Connection tab. 6. Select Validate server certificate. 7 - 25...
7. Select the trusted root certificate from the listed certificates. 8. Select the User Credentials tab. 9. Select the desired credentials method of providing username and password. Prompt automatically for user- name and password is recommended. 10. If saved username and password is selected, enter the credentials now. 11.
Roam Management General The general tab provides information on the current connection. There are no user entries on this screen. 7 - 27...
Roaming The Roaming tab is used to configure roaming behavior. Roam Signal Level (dBm) When the signal strength is below this level, the radio will attempt to roam. Default -65 dBm, range is -80 to -55. Logging Enable When checked, logging is enabled. Logging can be set to Critical (fewer messages) or All (more messages).
CCKM Use CCKM (Cisco Centralized Key Management) for faster roaming. Default is en- abled. To save changes, tap Apply the button. Confirmation dialogs may be displayed. To exit without saving changes, tap the X in the upper right of the window. Tap restore default values, tap the Restore Default Values then tap Apply.
Adapter The adapter tab provides information on the radio card. There are no user entries on this screen. 7 - 30...
Advanced Settings 802.11 Settings Determines the method used for fast roaming: • Enable Standard Pairwise Master key caching - When standard Pairwise Master Key (PMK) is enabled, authentication can be skipped if the client has already authenticated to the access point previously. A connection to a new access point uses the 802.11x authentication process while a reconnect to the access point can skip the authentication.
Generate a User Certificate (page 7-35) and private key file and download them to a PC. 2. Connect the Thor VM3 to the desktop PC using ActiveSync and copy the certificate and private key file to the Thor VM3 \System folder.
Click the Download a CA certificate, certificate chain or CRL link. Make sure the correct root CA certificate is selected in the list box. Click the DER button. To download the CA certificate, click on the Download CA certificate link. 7 - 33...
Install the certificate on the Thor VM3. Install a Root CA Certificate Copy the certificate file to the Thor VM3. Import the certificate by navigating to Start > Control Panel > Certificates. Tap the Import button. Make sure From a File is selected and tap OK.
This process saves a user certificate and a separate private key file. Windows Embedded Compact equipped devices such as the Thor VM3 require the private key to be saved as a separate file rather than including the private key in the user cer- tificate.
Click on the advanced certificate request link. Click on the Create and submit a request to this CA link. 7 - 36...
For the Certificate Template, select User. Check the Mark keys as exportable and the Export keys to file checkboxes. Type the full path on the local PC where the private key is to be copied. Also specify the private key filename. Be sure to note the name used for the private key file, for example AAAUSER.PVK.
If any script notifications occur, click the “Yes button to continue the certificate request. When prompted for the private key password: • Click None if you do not wish to use a password, or • Enter and confirm your desired password then click OK. Click the Download certificate link.
Install a User Certificate Copy the certificate and private key files to the Thor VM3. Import the certificate by navigating to Start > Control Panel > Certificates. Select My Certificates from the pull-down list. Tap the Import button. Make sure From a File is selected and tap OK.
With the certificate you just imported highlighted, tap View. From the Field pull-down menu, select Private Key. • If the private key is present, the process is complete. • If the private key is not present, import the private key. To import the private key, tap OK to return to the Certificates screen.
VM3 WWAN Connection Manager Access the VM3 Connection Manager from the icon in the system tray. Double tap the Connection Manager icon (or right-click the icon and select Configuration Panel). The Connection Manager icon looks like this: VM3 Connection Manager icon when there is no active WLAN or WWAN connection. The icon may be flashing in the •...
Home The Home tab lists the available connections and information on these connections. The order of the connections listed are specified on the Link Settings tab. Each configured connection (or link) is identified by name, either WLAN (for a WLAN connection) or the name of the carrier (for a WWAN connection).
(page 7-1). The WWAN networks, if any, are shown on this page. A WWAN network is only displayed if a SIM card has been installed for that network. The Thor VM3 supports two SIM cards. See Install SIM Card(s) (page 4-51) for SIM card installation instructions.
To configure a WWAN network, tap the View Network Settings button. To configure the WLAN connection use the WLAN Wireless Configuration Utility (WCU) (page 7-1). Connection Type Use this tab to configure the connection parameters. The tab is identified by the type of connection, i.e.: UMTS, LTE, UDMA, etc.
PIN/PUK Next select the PIN/PUK tab. Note that the SIM card being configured (Sim1 or Sim2) is identified at the top of this tab. Enter the PIN or PUK and tap Save then tap Exit to return to the Connection Manager. 7 - 45...
System Settings Use this screen to configure WWAN settings. Enable Logging Check to enable logging. Specify the maximum file size and the location for the log file. By default logging is disabled. TcpWindow Size=128k Check to set the TCP window size to 128k. By default this options is disabled.
Using FOTA Honeywell recommends distributing firmware via a WLAN connection rather than the WWAN connection. This requires an HTTP server which can be hosted on the Internet or the same Intranet (i.e.: the same network domain) as the Thor VM3. Honeywell tested FOTA using: •...
7. Verify server setup: • Ping the sever from the Thor VM3 to verify connectivity between the devices. • Open the web browser on the Thor VM3 and verify the URL of the server can be accessed. Load Firmware Updates The firmware update is provided by Honeywell customer support.
Configure the Thor VM3 Repeat these steps for each Thor VM3 that will be using FOTA. Once configured, the Thor VM3 continues to check for firmware updates at the specified interval. On the System Settings tab of the Connection Manager: 1.
About The about screen has no user-configurable parameters. It identifies the firmware and hardware versions, the carrier selected, MEID, etc. for the WWAN radio. 7 - 50...
Key Maps Integrated Keypad There are seven integrated programmable keys located on the Thor VM3 below the display. Each programmable key can be modified by the Orange key for a total of 14 programmable keys. Keyboard Remapper (page 5-35) to remap these keys.
• Arrow keys are unaffected by Yellow or Green shifted mode. • Keypress combinations marked as N/A do nothing (the keystroke is consumed by the keyboard and not sent to the Thor VM3). • Pressing the backlight key (alone or after the Green or Yellow keys) cycles the keypad backlight through Low, Medium, High, Off then repeats.
95-key PS/2 Keyboard (page 3-11). The key map table that follows lists the commands used for the Thor VM3. Note that since the Thor VM3 uses a Microsoft Win- dows operating system, no DOS Terminal Emulation keypress sequences are provided.
» The 2nd functions of the F4 and F5 keys are not used as the display brightness is adjusted via the buttons on the front of the Thor VM3. » The 2nd functions of the F6 and F7 keys are not used as the Thor VM3 has TFT LCD screen with no provision for contrast adjustments.
Down Arrow Down Arrow Right Arrow Right Arrow Left Arrow Left Arrow Insert Bksp Delete (numeric) Home Left Arrow Right Arrow Page Up Up Arrow Page Down Down Arrow ScrollLock Shift Shift Shift 8 - 5...
Input Power DC Input Voltage: 10- 60 VDC, Input Current: 4.6 Amps (typical), Input Fuse: 8A Time Delay. Replace with same size, rating and type of fuse: • Littelfuse 0215008.MXP • Cooper Bussmann BK1/S506-8-R • Bel Fuse 5HT 8-R or equivalent. VM3D Enhanced Dock Power Connector 6-pin connector:...
Input Power DC Input Voltage: 13.2VDC, Input Current: 4.6 Amps (typical), Input Fuse: 8A Time Delay. Replace with same size, rating and type of fuse: • Littelfuse 0215008.MXP • Cooper Bussmann BK1/S506-8-R • Bel Fuse 5HT 8-R or equivalent. 9 - 3...
Dimensions Thor VM3 Width 12.6” (31.9 cm) Height 10.3” (26.1 cm) Depth 2.4” (6.2 cm) Weight 6.75 lb. (3.1 kg)?? Standard Dock Note: The RAM ball is not included in the following measurements. Length 7.1” (18.0 cm) Width 6.1” (15.5 cm) Height 2.5”...
Environmental Specifications Thor VM3 and Dock Operating Temperature -22º to 122º F (-30ºC to 50ºC) [non-condensing] Storage Temperature -22°F to 140°F (-30°C to 60°C) [non-condensing] Operating Humidity Up to 95% Water and Dust IEC 60529 compliant to IP66 15 kV air, 8kV direct contact Vibration MIL-STD-810F, composite wheeled vehicles.
Port and Connector Pinouts Power Supply Connector VM1D Standard Dock and VM3D Enhanced Dock Signal Description V In+ 10-60V DC input + V In+ 10-60V DC input + V In- input - V In- input - Chassis ground Ignition +0V to 60V to start terminal VMXD Enhanced Dock Signal Description...
Description 5V_USB USB Power, Current Limited PIN 4 USB_H1_D- USB D- PIN 1 USB_H1_D+ USB D+ USB Power Return Shell CGND Chassis Ground USB Client Connector The USB client connection is not supported on the Thor VM3. 9 - 7...
USB2 Connector The USB2 connector is only present on the Enhanced Dock. Signal Description Not Used PIN 5 PIN 1 PIN 10 PIN 6 Not Used Not Used Not Used PIN 15 PIN 11 Not Used USB_H2_PWR USB host 2 5V output power USB_H2_D+ USB host 2 data signal USB_H2_D-...
USB Dual Host Y Cable D15 Male Connector Signal Description Not Used PIN 1 PIN 5 PIN 6 PIN 10 Not Used Not Used Not Used PIN 11 PIN 15 Not Used USB_H2_PWR USB host 2 5V output power USB_H2_D+ USB host 2 data signal USB_H2_D- USB host 2 data signal...
PS/2 to USB Keyboard Adapter Cable Note: This cable is not supported when the Thor VM3 is used with the VM1D Standard Dock. D9 Male Connector - USB Signal Description Not Used PIN 1 PIN 5 Not Used Not Used...
CANbus / Audio Connector Signal Name Description CAN reserved PIN 1 PIN 5 PIN 6 PIN 10 CAN_L CAN_L bus line dominant low CAN_GND CAN Ground CAN reserved PIN 11 PIN 15 Optional ground Audio return Headset return Audio output Headset output Mic input Microphone input...
CANbus Y Cable D15 Female Connector Signal Description Not Used PIN 5 PIN 1 PIN 10 PIN 6 CAN_L CAN_L bus line dominant low CAN_GND CAN ground Not Used CAN reserved PIN 15 PIN 11 Ground Not used Not used Not used Not used Not used...
Licenses of Third Party Software This product contains software provided by third parties, which may include the below listed components. The Honeywell product that includes this file does not necessarily use all of the third party software components referred to below.
For example, if you distribute copies of such a program, whether gratis or for a fee, you must pass on to the recipients the same freedoms that you received. You must make sure that they, too, receive or can get the source code. And you must show them these terms so they know their rights.
To "modify" a work means to copy from or adapt all or part of the work in a fashion requiring copyright permission, other than the making of an exact copy. The resulting work is called a "modified version" of the earlier work or a work "based on"...
produce the work, or an object code interpreter used to run it. The "Corresponding Source" for a work in object code form means all the source code needed to generate, install, and (for an executable work) run the object code and to modify the work, including scripts to control those activities.
No covered work shall be deemed part of an effective technological measure under any applicable law fulfilling obligations under article 11 of the WIPO copyright treaty adopted on 20 December 1996, or similar laws prohibiting or restricting circumvention of such measures.
d) If the work has interactive user interfaces, each must display Appropriate Legal Notices; however, if the Program has interactive interfaces that do not display Appropriate Legal Notices, your work need not make them do so. A compilation of a covered work with other separate and independent works, which are not by their nature extensions of the covered work, and which are not combined with it such as to form a larger program, in or on a volume of a storage or distribution medium, is called an...
Corresponding Source along with the object code. If the place to copy the object code is a network server, the Corresponding Source may be on a different server (operated by you or a third party) that supports equivalent copying facilities, provided you maintain clear directions next to the object code saying where to find the Corresponding Source.
The requirement to provide Installation Information does not include a requirement to continue to provide support service, warranty, or updates for a work that has been modified or installed by the recipient, or for the User Product in which it has been modified or installed. Access to a network may be denied when the modification itself materially and adversely affects the operation of the network or violates the rules and protocols for communication across the network.
authors of the material; or e) Declining to grant rights under trademark law for use of some trade names, trademarks, or service marks; or f) Requiring indemnification of licensors and authors of that material by anyone who conveys the material (or modified versions of it) with contractual assumptions of liability to the recipient, for any liability that these contractual assumptions directly impose on those licensors and authors.
copyright holder, and you cure the violation prior to 30 days after your receipt of the notice. Termination of your rights under this section does not terminate the licenses of parties who have received copies or rights from you under this License.
work thus licensed is called the contributor's "contributor version". A contributor's "essential patent claims" are all patent claims owned or controlled by the contributor, whether already acquired or hereafter acquired, that would be infringed by some manner, permitted by this License, of making, using, or selling its contributor version, but do not include claims that would be infringed only as a consequence of further modification of the contributor version.
specifically granted under this License. You may not convey a covered work if you are a party to an arrangement with a third party that is in the business of distributing software, under which you make payment to the third party based on the extent of your activity of conveying the work, and under which the third party grants, to any of the parties who would receive the covered work from you, a discriminatory patent license (a) in connection with copies of the covered work...
Public License "or any later version" applies to it, you have the option of following the terms and conditions either of that numbered version or of any later version published by the Free Software Foundation. If the Program does not specify a version number of the GNU General Public License, you may choose any version ever published by the Free Software Foundation.
END OF TERMS AND CONDITIONS How to Apply These Terms to Your New Programs If you develop a new program, and you want it to be of the greatest possible use to the public, the best way to achieve this is to make it free software which everyone can redistribute and change under these terms.
into proprietary programs. If your program is a subroutine library, you may consider it more useful to permit linking proprietary applications with the library. If this is what you want to do, use the GNU Lesser General Public License instead of this License. But first, please read <http://www.gnu.org/philosophy/why-not-lgpl.html>.
1. Exception to Section 3 of the GNU GPL. You may convey a covered work under sections 3 and 4 of this License without being bound by section 3 of the GNU GPL. 2. Conveying Modified Versions. If you modify a copy of the Library, and, in your modifications, a facility refers to a function or data to be supplied by an Application that uses the facility (other than as an argument passed when the facility is invoked), then you may convey a copy of the modified...
b) Accompany the Combined Work with a copy of the GNU GPL and this license document. c) For a Combined Work that displays copyright notices during execution, include the copyright notice for the Library among these notices, as well as a reference directing the user to the copies of the GNU GPL and this license document.
b) Give prominent notice with the combined library that part of it is a work based on the Library, and explaining where to find the accompanying uncombined form of the same work. 6. Revised Versions of the GNU Lesser General Public License. The Free Software Foundation may publish revised and/or new versions of the GNU Lesser General Public License from time to time.
THE SOFTWARE IS PROVIDED 'AS IS', WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT. IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR ANYONE DISTRIBUTING THE SOFTWARE BE LIABLE FOR ANY DAMAGES OR OTHER LIABILITY, WHETHER IN CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
To protect your rights, we need to make restrictions that forbid distributors to deny you these rights or to ask you to surrender these rights. These restrictions translate to certain responsibilities for you if you distribute copies of the library or if you modify it. For example, if you distribute copies of the library, whether gratis or for a fee, you must give the recipients all the rights that we gave you.
Public License. It also provides other free software developers Less of an advantage over competing non-free programs. These disadvantages are the reason we use the ordinary General Public License for many libraries. However, the Lesser license provides advantages in certain special circumstances.
copyright law: that is to say, a work containing the Library or a portion of it, either verbatim or with modifications and/or translated straightforwardly into another language. (Hereinafter, translation is included without limitation in the term "modification".) "Source code" for a work means the preferred form of the work for making modifications to it.
in the event an application does not supply such function or table, the facility still operates, and performs whatever part of its purpose remains meaningful. (For example, a function in a library to compute square roots has a purpose that is entirely well-defined independent of the application.
4. You may copy and distribute the Library (or a portion or derivative of it, under Section 2) in object code or executable form under the terms of Sections 1 and 2 above provided that you accompany it with the complete corresponding machine-readable source code, which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange.
modification of the work for the customer's own use and reverse engineering for debugging such modifications. You must give prominent notice with each copy of the work that the Library is used in it and that the Library and its use are covered by this License.
which the executable runs, unless that component itself accompanies the executable. It may happen that this requirement contradicts the license restrictions of other proprietary libraries that do not normally accompany the operating system. Such a contradiction means you cannot use both them and the Library together in an executable that you distribute.
this License. 11. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License.
"any later version", you have the option of following the terms and conditions either of that version or of any later version published by the Free Software Foundation. If the Library does not specify a license version number, you may choose any version ever published by the Free Software Foundation.
To apply these terms, attach the following notices to the library. It is safest to attach them to the start of each source file to most effectively convey the exclusion of warranty; and each file should have at least the "copyright"...
LICENSE ISSUES ============== The OpenSSL toolkit stays under a dual license, i.e. both the conditions of the OpenSSL License and the original SSLeay license apply to the toolkit. See below for the actual license texts. Actually both licenses are BSD-style Open Source licenses.
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;...
documentation and/or other materials provided with the distribution. * 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: "This product includes cryptographic software written by Eric Young (email@example.com)" The word 'cryptographic' can be left out if the rouines from the library being used are not cryptographic related :-).
------------------- This software is provided 'as-is', without any express or implied warranty. In no event will the authors be held liable for any damages arising from the use of this software. Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions: 1.
"Contribution" means: a) in the case of the initial Contributor, the initial code and documentation distributed under this Agreement, and b) in the case of each subsequent Contributor: i) changes to the Program, and ii) additions to the Program; where such changes and/or additions to the Program originate from and are distributed by that particular Contributor. A Contribution 'originates' from a Contributor if it was added to the Program by such Contributor itself or anyone acting on such Contributor's behalf.
b) its license agreement: i) effectively disclaims on behalf of all Contributors all warranties and conditions, express and implied, including warranties or conditions of title and non-infringement, and implied warranties or conditions of merchantability and fitness for a particular purpose; ii) effectively excludes on behalf of all Contributors all liability for damages, including direct, indirect, special, incidental and consequential damages, such as lost profits;...
EXCEPT AS EXPRESSLY SET FORTH IN THIS AGREEMENT, NEITHER RECIPIENT NOR ANY CONTRIBUTORS SHALL HAVE ANY LIABILITY FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING WITHOUT LIMITATION LOST PROFITS), HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OR DISTRIBUTION OF THE PROGRAM OR THE EXERCISE OF ANY RIGHTS GRANTED HEREUNDER, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
* All rights reserved. Redistribution and use in source and binary * forms, with or without modification, are permitted provided that * this copyright notice is retained. * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED * WARRANTIES ARE DISCLAIMED. IN NO EVENT SHALL CORE SDI S.A. BE * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY OR * CONSEQUENTIAL DAMAGES RESULTING FROM THE USE OR MISUSE OF THIS * SOFTWARE.
The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.
* Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. * Neither the name of ekus.net nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.
"Publisher" means the provider of the website, magazine, CD-ROM, DVD or other medium from or by which the Work is obtained by You. "Source Code" refers to the collection of source code and configuration files used to create the Executable Files. "Standard Version"...
Termination. This License and the rights granted hereunder will terminate automatically upon any breach by You of any term of this License. Individuals or entities who have received Derivative Works from You under this License, however, will not have their licenses terminated provided such individuals or entities remain in full compliance with those licenses.
2. Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software. 3. This notice may not be removed or altered from any source distribution. Package(s) using RSA License ============================ * netwars (MD5) [Copyright (C) 1991-2, RSA Data Security, Inc.
This license governs use of code marked as “sample” or “example” available on this web site without a license agreement, as provided under the section above titled “NOTICE SPECIFIC TO SOFTWARE AVAILABLE ON THIS WEB SITE.” If you use such code (the “software”), you accept this license.
// _THE BLOWFISH ENCRYPTION ALGORITHM_ // by Bruce Schneier // Revised code--3/20/94 // Converted to C++ class 5/96, Jim Conger Blowfish is a symmetric block cipher that can be used as a drop-in replacement for DES or IDEA. It takes a variable-length key, from 32 bits to 448 bits, making it ideal for both domestic and exportable use.
(a) that the initial Contributor has attached the notice described in Exhibit B to the Covered Software; or (b) that the Covered Software was made available under the terms of version 1.1 or earlier of the License, but not also under the terms of a Secondary License.
1.14. "You" (or "Your") means an individual or a legal entity exercising rights under this License. For legal entities, "You" includes any entity that controls, is controlled by, or is under common control with You. For purposes of this definition, "control" means (a) the power, direct or indirect, to cause the direction or management of such entity, whether by contract or otherwise, or (b) ownership of more than fifty percent (50%) of the outstanding shares or beneficial...
Version); or (c) under Patent Claims infringed by Covered Software in the absence of its Contributions. This License does not grant any rights in the trademarks, service marks, or logos of any Contributor (except as may be necessary to comply with the notice requirements in Section 3.4).
(a) such Covered Software must also be made available in Source Code Form, as described in Section 3.1, and You must inform recipients of the Executable Form how they can obtain a copy of such Source Code Form by reasonable means in a timely manner, at a charge no more than the cost of distribution to the recipient;...
If it is impossible for You to comply with any of the terms of this License with respect to some or all of the Covered Software due to statute, judicial order, or regulation then You must: (a) comply with the terms of this License to the maximum extent possible; and (b) describe the limitations and the code they affect.
* quality and performance of the Covered Software is with You. * Should any Covered Software prove defective in any respect, You * (not any Contributor) assume the cost of any necessary servicing, * * repair, or correction. This disclaimer of warranty constitutes an * * essential part of this License.
that the language of a contract shall be construed against the drafter shall not be used to construe this License against a Contributor. 10. Versions of the License --------------------------- 10.1. New Versions Mozilla Foundation is the license steward. Except as provided in Section 10.3, no one other than the license steward has the right to modify or publish new versions of this License.
Exhibit B - "Incompatible With Secondary Licenses" Notice --------------------------------------------------------- This Source Code Form is "Incompatible With Secondary Licenses", as defined by the Mozilla Public License, v. 2.0. 9 - 66...
Limited Warranty Honeywell International Inc. (“HII”) warrants its products to be free from defects in materials and workmanship and to conform to HII’s published specifications applicable to the products purchased at the time of shipment. This warranty does not cover any HII product which is (i) improperly installed or used;...
The duration of the limited warranty for the Thor VM3 internal UPS battery is 1 year. The duration of the limited warranty for the Thor VM3 AC power supply and cables is 1 year. The duration of the limited warranty for the Thor VM3 DC/DC power supply is 1 year.