Owners of Datalogic products are hereby granted a nonexclusive, revocable license to reproduce and transmit this documentation for the purchaser's own internal business purposes. Purchaser shall not remove or alter any proprietary notices, including copyright notices, contained in this documentation and shall ensure that all notices appear on any reproductions of the documentation.
Should future revisions of this manual be published, you can acquire printed versions by contacting your Datalogic representative. Electronic versions may either be downloadable from the Datalogic website www. If you visit our website and would like to make comments or suggestions about this or other Datalogic publications, please let us know via the "Contact Datalogic" page.
Disclaimer Datalogic has taken reasonable measures to provide information in this manual that is complete and accurate, however, Datalogic reserves the right to change any specification at any time without prior notice. All other brand and product names may be trademarks of their respective owners.
Patents See www. VI Conventions VII 1 1. The label artworks may be only a draft. Refer to the product labels for more precise information. Please check our website at www.
You can also click on the following link for direct access to this section: www. Enterprises rely on accurate inventories to both plan and manage activities. A laser scanner tackles high volume environments where speed is essential to receiving and shipping operations.
The imager captures linear, stacked and 2D codes to reduce failed reads due to damaged and poor quality barcodes. An optional camera takes pictures for the documentation of damaged or returned goods. For applications like cross docking where bar codes can be close at hand or far away, an auto ranging laser and an extended long range imager offer aggressive scanning solutions. This combination gears the device for real time information management.
Voice applications leverage the internet protocol connection for hands-free voice picking and push to talk communications. An extensive accessory offering accommodates existing installation needs for USB, RS, modem or Ethernet communications. A pistol grip version with numeric keypad tackles the high volume scan and quantity entry found at the receiving dock. While a hand held with alpha numeric keypad better suits the lighter pick and pack duty of preparing goods for shipment.
Plastic key caps with metal snap dome actuation withstand not only the abusive environment but the heavy use found in third party logistics centers, literally millions of cycles per year. An arched pistol grip handle and ergonomic trigger make the rapid receiving of goods comfortable throughout the day.
Maximized key sizes drive additional user efficiency with or without gloves. NET and Java programming languages. Datalogic Desktop, Configuration and Firmware Utilities deliver unprecedented ability to customize and update device configuration to the use environment or process. Wavelink Remote Control allows an administrator to remotely diagnose and remedy both applications and device settings. Remove all the components from their packaging; check their integrity and compare them with the packing documents.
Keep the original packaging for use when sending products to the technical assistance center. Damage caused by improper packaging is not covered under the warranty.
Therefore the first operation to perform is to charge them. See paragraph 2. To access the microSD card slot and insert the card, proceed as follows: 1. Press the latch release and lift the battery from the enclosure, as indicated in the figure below: 3. Insert the microSD card with the written part upward. Lock the card into place by pushing the cardholder down: 5. Replace battery. Proper ESD precautions include, but are not limited to, working on an ESD mat and ensuring that the operator is properly grounded.
If you feel resistance, remove the card, check the orientation, and reinsert it. Do not use the microSD card slot for any other accessories. Use of an alternative power supply will invalidate any approval given to this device and may be dangerous. Therefore the initial operation to perform is to charge them. See below. NOTE By default, the battery pack is disconnected at the factory to avoid damage due to excessive draining.
NOTE Annual replacement of rechargeable battery pack avoids possible risks or abnormalities and ensures maximum performance. Moreover recharging is possible by USB Direct connection with the host computer, but with longer charging times and only if the mobile computer off.
During the charging process the LED positioned at the right side of the display is red constant. Once the charging process has been completed this LED is green constant. Dispose of used batteries according to the instructions. Avoid storing batteries for long periods in a state of full charge or very low charge. CAUTION We recommend charging the battery pack every two to three months to keep its charge at a moderate level to maximize battery life.
Never charge the main device or spare batteries in a closed space where excessive heat can build up. They will be re-enabled a few minutes after the charging starts. Press the latch release and lift battery from the enclosure as indicated in the figure below: 3. Do not place the battery pack in or near a fire or other heat source; do not place the battery pack in direct sunlight, or use or store the battery pack inside unventilated areas in hot weather; do not place the battery pack in microwave ovens, in clothes dryers, in high pressure containers, on induction cook surfaces or similar devices.
Doing so may cause the battery pack to generate heat, explode or ignite. Using the battery pack in this manner may also result in a loss of performance and a shortened life expectancy. Use only a Datalogic approved power supply. The use of an alternative power supply will void the product warranty, may cause product damage and may cause heat, an explosion, or fire. The area in which the units are charged should be clear of debris and combustible materials or chemicals.
Do not use the battery pack of this terminal to power devices other than this mobile computer. Immediately discontinue use of the battery pack if, while using, charging or storing the battery pack, the battery pack emits an unusual smell, feels hot, changes colour or shape, or appears abnormal in any other way. This might happen, for example, when you carry a spare battery pack in your pocket or purse; accidental short—circuiting can occur when a metallic object such as a coin, clip, or pen causes direct connection of the contacts of the battery pack these look like metal strips on the battery pack.
Short— circuiting the terminals may damage the battery pack or the connecting object. Do not apply voltages to the battery pack contacts. Do not pierce the battery pack with nails, strike it with a hammer, step on it or otherwise subject it to strong impacts, pressures, or shocks.
Do not disassemble or modify i. The battery pack contains safety and protection devices, which, if damaged, may cause the battery pack to generate heat, explode or ignite. In case of leakage of liquid from the battery, avoid contact with liquid the skin or eyes. If the contact occurs, immediately wash the affected area with water and consult a doctor. Do not solder directly onto the battery pack. Do not expose the battery pack to liquids. Avoid any knocks or excessive vibrations.
If the device or the battery is dropped, especially on a hard surface, you should take it to the nearest Authorised Repair Centre for inspection before continuing to use it. Do not replace the battery pack when the device is turned on. Do not use the battery pack if it is damaged in any part. Battery pack usage by children should be supervised.
To maximize battery life, turn off radios when they are not needed. Do not use alcohol, corrosive products or solvents. NOTE The actual data transfer speed can be appreciably lower than the maximum theoretical speed. For all these devices maximum current withdrawal must be below mA. For models using the When the terminal resumes, depending on the radio power mode and security protocol selected, it may take up to 30 seconds for the Area coverage and radio performance may vary, due to environmental conditions, access point types or interference caused by other devices microwave ovens, radio transmitters, etc.
Unauthorized antennas, modifications or attachments could damage the product and may violate laws and regulations. In case of doubt concerning the use of wireless devices with an implanted medical device, contact your doctor. Turn this device OFF in health care facilities when any regulations posted in these areas instruct you to do so. Hospitals or health care facilities may use equipment that could be sensitive to external RF energy.
Check with the manufacturer or its representative regarding your vehicle. You should also consult the manufacturer of any equipment that has been added to your vehicle. DO NOT place objects, including either installed or portable wireless equipment, in the area over the air bag or in the air bag deployment area. Observe restrictions and follow closely any laws, regulations, warnings and best practices on the use of radio equipment near fuel storage areas or distribution fuel areas, chemical plants or where some operation involves use of explosive materials.
Do not store or carry flammable liquids, explosive gases or materials with the device or its parts or accessories. Areas with a potentially explosive atmosphere are often, but not always, clearly marked or showed. Sparks in such areas could cause an explosion or fire, resulting in injury or even death.
However there are several parameters that can be set and utilities that can be used to perform some basic functions such as data capture, communications, file management, etc 4. As soon as the mobile computer is on, the Windows CE 6. Wait a few seconds before starting any activity so that the mobile computer completes its startup procedure. Desktop Control Panel Use the stylus par.
The mobile computer goes into power-off low power with display and keyboard backlight off , when it is not used for more than a programmable timeout, which is defined in the POWER applet of the Control Panel. NOTE 4. The stylus functions like a mouse. Double Tap: Double tap the screen with the stylus to open items and select options.
Drag: Hold the stylus on the screen and drag across the screen to select text and images. Drag in a list to select multiple items. Tap-and-hold: Tap and hold the stylus on an item to see a list of actions available for that item. On the pop-up menu that appears, tap the action you want to perform.
To recalibrate the touch screen use the Stylus Applet see par. Use only original Datalogic styluses supplied with the product itself. In harsh applications, use of screen protectors should be taken into consideration, in order to extend the touch screen operating life. Do not apply not necessary high pressures on the screen.
For applications where an intensive use of the touch screen is foreseen, please consider that touch screen components are subject to progressive wear. Most gestures are a single stroke.
Windows CE supports five kinds of gestures. Tap: A tap represents the left click of a mouse. Double Tap: A double tap represents the left double click of a mouse. Hold: The user can press and hold on the screen to represent the right click of a mouse. Flick: The user can move a finger across the screen to initiate per-pixel scrolling, and if this movement is fast enough, scrolling will continue after the finger is lifted.
Pan: The user can press and hold on the screen and then drag the finger in any direction to represent a mouse move event. The touch screen calibration will also appear when the mobile computer is hard reset cold boot , but the user may press Esc to exit from the calibration.
The user must calibrate the touch screen see par. The lighted band emitted by the laser must completely cross the barcode as shown in the figure below. The omnidirectional scanning does not require that the operator orient the bar code to align with the scan pattern. A red beam illuminates the code, which is captured and decoded. You will get a good read. Symbologies with smaller bars or elements mil size should be read closer to the unit.
Symbologies with larger bars or elements mil size should be read farther from the unit. See par. Direct access to F1-F4. If pressed after the Yellow toggle, these keys enable you to move forwards, backwards, upwards or downwards within text fields, scroll through a Menu list or browse among folder files.
Yellow modifier toggle key : when pressed before a standard key, it enables the character or function printed in yellow above the key. Blue modifier one shot key : when pressed before a standard key, it enables the character or function printed in blue above the key. They let you move forwards, backwards, upwards or downwards within text fields, scroll through a Menu list or browse among folder files. It is placed on the upper left side of the terminal. A warm boot terminates an unresponsive application and clears the working RAM, but preserves the file system.
Registry is restored from persistent memory if available or returned to factory default. A cold boot forces all applications to close reinitializing completely the system. It clears the working RAM, but the file system is preserved. Registry is restored from persistent memory. Pull the battery latch down and remove the battery pack. Press and hold the scan button and then press the reset button. Insert the battery pack.
Clean Boot To perform a clean boot, do the following steps: 1. Press the Enter Key. Red It is solid while charging. Red blinking It blinks in case of charge fault. Off Keyboard in primary. Yellow solid Yellow alternate key mode. Blue solid Blue alternate key mode Pink CapsLock enabled. It also makes available the keyboard SIP and window selection. Double-tap it to open a status dialog that will let you disconnect the ActiveSync session without physically disconnecting the device from the PC.
It is the only way to disconnect a Bluetooth ActiveSync connection. Battery icon displays the system battery status. It indicates that the battery is charging. Bluetooth Manager icon displays whether Bluetooth is enabled, paired, or turned off. Double-tap this icon to open the Bluetooth Manager control panel applet. Below is an expanded view of the Control Panel showing all of the applets.
There are seven General Configuration pages and multiple Barcode symbology pages. Select General,1D Bar Code or 2D Bar Code, then use the menu or tap the left and right arrow keys to navigate the different pages of the Decoding utility. The menu options will change to reflect the items most recently selected. Use it to set volume, tone, duration, and number of various types of beeps.
Use it to configure prefix, suffix and data separator character strings. Use it to configure the User ID for symbologies, Redundancy and Aggressive Decoding if supported by the decoding module. Select a symbology to view or change the available properties settings. It allows enabling and configuration of Spot Beam and triggering modes. It is only available on devices equipped with laser and advanced long range laser decoding modules that support the Spot Beam Feature.
It configures the scan width and allows to enable the automatic range detection. Use it to enable or disable the keyboard wedge for Barcode scanner. Each barcode symbology opens to its own page, as shown in the figure below. Refer to the sample symbology control panels for examples of the types of fields and options you can modify. To permanently save these settings you need to save the Registry using the Persistent Registry applet in the Control Panel. When open, Decoding Properties acts as a simple barcode test tool that provides the Data decoded and the Data Type of the barcode scanned.
From the control panel main window, double tap the DL Buttons icon. On the DL Buttons tab, customize the program hardware buttons to launch your most used applications. Select the desired one from the list.
Delete Tap to delete the selected Button. You can only delete the Buttons you have added. Application Displays path to the selected application. Browse to browse for application files. To define a new Button, complete the following steps: 1. Make sure you do not attempt to add a Button that is already defined.
NOTE 2. Barcodes containing characters associated with assigned Buttons will trigger the action or application assigned to that Button. This allows the user to switch between the various open applications. The application switcher can be activated via an assigned shortcut key specified in the DL Buttons tab see par. When the assigned button is pressed, the dialog shown below will be displayed: Press the assigned button to cycle through the running applications when the dialog is open.
The Registry also contains information that the operating system continually references to during operation. To persist the Registry settings between boots, do the following steps: 1.
Tap OK to exit. Select a time interval from the menu. Tap OK to save and exit. There are two methods to access the SCU. Click the "Configure" button 4. Follow the on-screen instructions to setup security parameters for your network. For more detailed settings specific to your installation please contact your wireless network administrator. To recalibrate the touch screen, complete the following steps: 1. Repeat as the target moves around the screen.
By completing the calibration procedure you implicitly accept the new calibration settings. New calibration settings are persistently saved in the Registry. Startup Stylus Calibration When starting the terminal, a Welcome Wizard with Stylus Calibration comes up if valid calibration settings are not available. This happens in the following circumstances: 1.
After any cold boot if the user skipped stylus calibration earlier. After a Clean Boot. Each requires specific connections in order to function properly. On the license agreement screen, click Accept. Select the information types that you want to synchronize, then click Next.
Enter a device name and click Set Up. You can set up a connection to a device in the list by selecting the device and then tapping the 'Connect' button: To create a pairing: 1.
Select a service: 2. Configure any encryption, authentication, or virtual port options required by the service selected. This option is available only if you have selected a Printer or Serial service. To require Authentication, check the checkbox, then tap OK. Tap OK to complete. The dialog will also appear when an Authentication request is received from another device.
Tap the arrow to change the Virtual Port, or Delete to remove the device pairing. Tap Sync to initiate a Sync available only if the service is an ActiveSync connection. From the control panel main window, double tap the Bluetooth Manager icon to open the Bluetooth Manager control panel. Tap Settings. After you have downloaded the desired update, there are several ways you can update the firmware on your device. The following sections provide procedures for the retrieval and installation of the most current firmware image onto a Datalogic device.
Navigate to the Downloads section of the website. DXU can display its controls in several languages. Configure these settings only if you understand how these changes affect your network. Consult your network expert for more information. It is set to UDP port by default. It is set to TCP port 80 by default, like common web servers. You can enable the automatic discovery of Datalogic mobile computers by DXU. This is not enabled by default. Do not enable automatic discovery if you have more than one user of DXU console in your subnet, or you risk having two DXU administrators changing the settings on any particular device in your subnet at once.
DXU allows for command line execution, such as via a. This is a convenient method for configuring multiple devices without having to either launch the UI of DXU desktop or the need to configure Simplified Deploy. DXU configuration files end with the. They are essentially zip files that contain XML files. If you change the file extension to.
DXU will display a login prompt when you open a configuration file that requires authentication. You can edit configuration files even when the device they were drawn from are not connected to DXU.
Do this:. Once you have added the device to Desktop Configuration Utility , you can click on the listed device under Available devices and use Configure This Device option to start configuring the device. There is also an option to add comments on all the listed settings. See instructions for these methods in this section.
These lockdown settings can be set via the DXU desktop. There are two important prerequisites to configuring these settings when creating a DXU configuration file. The EULA on the device must first be accept. First, they must be converted into an encrypted activation code. Below are the steps to get the encrypted activation code, if you have the unencrypted activation code.
Users will be prompted to enter the password after tapping the screen five times to open the settings. You can select the path where you want to save the settings on the device and the filename. Comments are indicated with a small text balloon icon. Click the OK button to save. A small text balloon will appear next to the item you commented on.
You can select and edit comments in this table by double-clicking on the Comment field. Simply click the exit button X to close the dialog. From within the Device Configuration view, click either the Save or Save As button in order to save a configuration file. Assuming you click Save As , or this is the first time you are saving the file, the Save Configuration window will be displayed.
Once you have provided a filename and the any desired optional parameters described below and are done, click the Save button. You may type the path and file name in the field, or you can click the Browse button to use a standard file dialog to explore to the folder of your choice and type the filename.
The checkbox is unchecked by default, indicating no password is required to open the saved file. If checked, the password field to the right becomes enabled and you can enter a password. Anyone who opens this configuration file in the future will be required to provide the correct password in order to open the file.
It is highly recommended to leave Include Unmodified Changes checked, as unchecking this field results in unreliable behavior when applying configuration files to devices. See pros and cons section below for more details. The checkbox is checked by default, indicating that all settings, regardless if they have been changed from their default values or not, will be included in the saved file.
Unchecking this field results in only including settings that have been changed from defaults in the current editing session. The Include Unmodified Changes checkbox within the Save Configuration window deserves a more in depth analysis, as it has a large effect on the behavior of saved DXU configuration files.
First, it's helpful to be aware of the Show Config Changes button in the bottom ribbon of the Device Configuration editor. It will help you to reliably determine what fields have been modified from defaults in the current editing session. The following example demonstrates some of the problems that when editing files originally saved with Include Unmodified Changes unchecked.
You can view information about a device that is connected to DXU. You can view information about the device from which a configuration file was extracted.
Remote Control lets you see what is displayed on the screen of a connected Datalogic mobile computer. Note that clicking a button on screen does not physically press a button, or even trigger it electrically, but instead sends an event message in the system as if you had pushed a physical key or tapped a physical button on the touch screen.
Remote Control works through the magic of software. If the device is suspended, with its screen off, click the Power button 3 at the bottom of the Remote Control window. Click on the lock icon and drag it rightward, releasing it over the unlocked lock icon at the right edge of the Remote Control window. Some applications have a menu, and others do not, so this feature depends on which application is active when you click the Menu button.
If the device is awake, clicking the Power button will turn off the screen, locking the screen if the device is configured to do that. However, in general if you have your device configured to scan barcodes and an application is receiving the data, then the Scan button will trigger a scan remotely. At the bottom of the Remote Control window, the Save button takes a screen shot of the remote computer and prompts to save it to your PC. The default path that DXU saves screen shots is your user folder.
This field allows VNC communication to be authenticated, so prying eyes cannot remotely connect to and control your Datalogic mobile computer. This field is blank by default. It is a configuration parameter in the Device Configuration view.
To do this:. Note: the value in this field is encrypted for security. Once entered, it will be displayed as asterisks. Also, you can specify whether a factory data reset or an enterprise reset is performed after updating the firmware, or if the update will simply reboot the device without performing an update.
DXU firmware update is not the only way to update firmware on Datalogic mobile computers. If you need a method that can update firmware on many devices remotely, especially if they are not connected to a network, then other methods may suit your needs better. These terms are used because the creators of these operating systems use these terms, but the terms essentially mean the same thing. This option allows you to perform an image update that does not require any user interaction on the device.
If left unchecked, the user will be prompted to perform the update, but they have the option to cancel the update. This checkbox is not checked by default.
This option allows you to perform a full upgrade of the firmware regardless of what is installed on the device.
0コメント