Types Of Users; Important Concepts - Kodak SCAN STATION 100 User Manual

Kodak scanner user manual
Hide thumbs Also See for SCAN STATION 100:
Table of Contents

Advertisement

Types of users

Important concepts

A-61544 April 2006
While there are many possible uses for the Kodak Scan Station 100,
most users will fall into one of the following categories depending on
what they want to do.
• Walk-up user
A casual user in an office environment that sends their documents
without using the convenient, pre-configured personal settings they
may have on their USB flash drive. This user should read the
following chapters:
- Chapter 1, Introduction
- Chapter 2, Basic Use of the Scan Station
• Frequent user
A regular user that sends their documents using the custom settings
they see after inserting their USB flash drive into the Scan Station, or
is responsible for creating their own personal settings for their USB
flash drive. This could also be someone using a shared group of
settings for a specific department or work group – available only by
the department's shared USB flash drive.
This user should read the following chapters:
- Chapter 1, Introduction
- Chapter 2, Basic Use of the Scan Station
- Chapter 3, Installing and Using the Configuration Organizer
• Administrator
A user that creates the default configuration for the Scan Station,
including setting IP addresses, importing corporate email address
books, setting up network shares and rights. Typically, this person is
also the organization's network administrator. The administrator
should familiarize themselves with all chapters.
Configuration File
The Kodak Scan Station 100 has configurable menus that allow an
organization to easily tailor the device for their network. This setup is
done using the Kodak Scan Station Configuration Organizer. The
Configuration Organizer creates an encrypted configuration file that the
administrator loads onto the device. This encrypted configuration file is
what populates the touch screen menu of the Scan Station. Whichever
type of user is using the device, an encrypted device configuration file,
whether it is the default or a custom configuration file on a user's USB
flash drive, is read to determine what menu options should be
displayed. The custom configuration file on a user's USB flash drive is
what allows a frequent user to perform one-touch scanning using their
personal email address book or network share.
1-3

Advertisement

Table of Contents
loading

Table of Contents