Certificates; Data Collection; Bar Code Readers - Honeywell Thor VM2 User Manual

Vehicle-mount computer with microsoft windows embedded ce 6.0
Hide thumbs Also See for Thor VM2:
Table of Contents

Advertisement

Certificates

Start > Settings > Control Panel > Certificates
Manage digital certificates used for secure communication.
Note: Digital certificates are date sensitive. If the date on the Thor VM2 is incorrect, wireless authentication will fail.
The Certificates stores tab lists the certificates trusted by the Thor VM2 user.
These values may change based on the type of network security resident in the client, access point or the host system.
Tap the Import button to import a digital certificate file.
Tap the View button to view a highlighted digital certificate.
Note: Tap the Remove button to remove highlighted certificate files.
Note: Tap the ? button and follow the instructions in the Windows CE Help file when working with trusted authorities and
digital certificates.

Data Collection

Start > Settings > Control Panel > Data Collection
The Data Collection wedge (DC Wedge) software component is the interface between data collection devices such as bar
code scanners or imagers connected to a COM port on the Thor VM2 or bar code scanners wirelessly connected via Blue-
tooth to your Thor VM2. This software component collects the data from the varied sources and presents it to applications
on your Thor VM2 in a transparent manner.
Note: When a HID enabled USB scanner is connected to the Thor VM2 the scanned data is transmitted to the active window
as keystroke messages. The data bypasses the data collection wedge. Any data handling to be applied to the
scanned data, for example strip leading or trailing characters, must be programmed into the scan engine via
configuration bar codes or handled by the application accepting the data.
Use the options on the control panels to set Thor VM2 data collection keyboard wedge parameters, enable or disable
allowed symbologies and assign scan key settings.
Assign baud rate, parity, stop bits and data bits for available COM ports.
Parameters on the Main tab and the COM tab(s) apply to this device only.
Bar code manipulation parameter settings on the
from successful bar code scans received by the Thor VM2 for processing. The successful bar code scan data may be sent
by
• a wireless Bluetooth scanner,
• or a tethered serial scanner.

Bar Code Readers

The Thor VM2 can use the following external bar code readers:
• Tethered hand-held scanners are tethered to a serial port or a USB host port on the Thor VM2 and are configured
by scanning the engine-specific bar codes in the scanner manufacturer's programming guide. The manufacturer's
guides are usually shipped with the bar code reader.
• Wireless hand-held Bluetooth scanners are configured by scanning the engine-specific bar codes in the scanner
manufacturer's programming guide. The manufacturer's guides are usually shipped with the bar code reader.
• The body worn Bluetooth Ring Scanner module may be using a Symbol 4400 Ring Imager or a Symbol 955 Ring
Scanner. The BTRS module is configured by scanning the bar codes in the Bluetooth Ring Scanner Guide.
5 - 40
Data Options
(page 5-44) tab are applied to the incoming data resulting

Advertisement

Table of Contents
loading

Table of Contents