8515 Vehicle-Mount Computer User Manual January 28, 2010 ISO 9001 Certified Quality Management System P/N 8100132.
© Copyright 2010 by Psion Teklogix Inc. 2100 Meadowvale Boulevard, Mississauga, Ontario, Canada L5N 7J9 http://www.psionteklogix.com This document and the information it contains is the property of Psion Teklogix Inc., is issued in strict confidence, and is not to be reproduced or copied, in whole or in part, except for the sole purpose of promoting the sale of Psion Teklogix manufactured goods and services.
Return-To-Factory Warranty Psion Teklogix Inc. provides a return to factory warranty on this product for a period of twelve (12) months in accordance with the Statement of Limited Warranty and Limitation of Liability provided at: www.psionteklogix.com/warranty The warranty on Psion Teklogix manufactured equipment does not extend to any product that has been tampered with, altered, or repaired by any person other than an employee of an authorized Psion Teklogix service organization.
Restriction On Hazardous Substances (RoHS) Directive 2002/95/EC What is RoHS? The European Union has mandated that high environmental standards be met in the design and manufacture of electronic and electrical products sold in Europe, to reduce hazardous substances from entering the environment. The “Restriction on Hazardous Substances Directive (RoHS)” prescribes the maximum trace levels of lead, cadmium, mercury, hexavalent chromium, and flame retardants PBB and PBDE that may be contained in a product.
TABLE OF CONTENTS Program License Agreements . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix Microsoft's End User License Agreement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix Psion Teklogix Inc. End User License Agreement . . . . . . . . . . . . . . . . . . . . . . . . . . x Approvals and Safety Summary . . . . . . . . . . . . . . . . . . . . . . . . . . xv CE Marking . . . . . . . . . . . . . R&TTE Directive 1999/5/EC . . . FCC Information to Users . . . . .
Contents 2.9 Resetting the 8515 Vehicle-Mount Computer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 Chapter 3: Getting to Know the 8515 3.1 3.2 3.3 The Internal Backup Battery. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 The Stylus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Contents 4.3.2 4.4 4.5 The Taskbar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .36 4.3.2.1 Using the Taskbar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 4.3.2.2 Customizing the Taskbar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 The Start Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Contents 5.5.6.2 Add and Edit Trigger Mapping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73 Power Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74 5.5.7.1 Battery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74 5.5.7.2 Suspend. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Contents 5.9.3.2 Adding a Destination. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97 5.9.3.3 Changing a Destination . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97 5.9.3.4 Removing a Trap Destination . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97 5.9.4 Permitted Hosts Tab. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Contents 6.4.2 6.4.3 6.4.4 6.4.5 6.4.6 6.5 6.6 MT33XX RAM Mounting Kit Specifications. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .119 Preparation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .120 Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .122 6.4.4.1 RAM Vesa Base. . . . . . . . . . . . . . .
Contents C.1.1 C.1.2 Launching the Application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .C-1 Installation Complete Dialog Box . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .C-3 Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
PROGRAM LICENSE AGREEMENTS Microsoft's End User License Agreement You have acquired a device (“DEVICE”) that includes software licensed by Psion Teklogix Inc. from Microsoft Licensing Inc. or its affiliates (‘MS”). Those installed software products of MS origin, as well as associated media, printed materials, and “online” or electronic documentation (“SOFTWARE”) are protected by international intellectual property laws and treaties. The SOFTWARE is licensed, not sold. All rights reserved.
Chapter : Program License Agreements • • • • • Note on Java Support. The SOFTWARE may contain support for programs written in Java.
Chapter : Program License Agreements The Software is the property of Psion Teklogix Inc. or its licensors and is protected by copyright laws and international copyright treaties, as well as other intellectual property laws and treaties. The Software is licensed, not sold. Psion Teklogix Inc. provides the Software and licenses its use worldwide. You assume responsibility for the selection of the Software to achieve your intended results, and for the use and results obtained from it. 1.
Chapter : Program License Agreements g. Assignment. You may not assign or transfer the Software to a third party or allow a third party to use the same. h. Reverse Engineering. Modification, reverse engineering, reverse compiling, disassembly, unbundling or extraction of the Software is expressly prohibited. i. Export Restrictions.
Chapter : Program License Agreements Under no circumstances are we or our third party suppliers liable for damages of third parties claimed against you, or for harm to your records or data, or special, incidental, indirect, or consequential damages, including but not limited to lost profits, lost business revenue or failure to realize expected savings, loss of data, loss of use of the Software or any associated equipment, downtime and user’s time, even if you informed us of their possibility, or for breach
Chapter : Program License Agreements performance or to exercise a right when entitled, does not prevent us from doing so at a later time, either in relation to that default or any subsequent one. No modifications of this Agreement shall be effective unless in writing and approved by us.
APPROVALS AND SAFETY SUMMARY CE Marking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .xvii R&TTE Directive 1999/5/EC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .xvii FCC Information to Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xviii Emissions Information for Canada . . . . . . . . . . . . . . . . . . . . . . . . . . . . xx Warnings to Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
xvi Psion Teklogix 8515 Vehicle-Mount Computer User Manual
Chapter : Approvals and Safety Summary CE Marking When used in a residential, commercial or light industrial environment the product and its approved UK and European peripherals fulfil all requirements for CE marking. R&TTE Directive 1999/5/EC This equipment complies with the essential requirements of EU Directive 1999/5/EC (Declaration available: www.psionteklogix.com). Cet équipement est conforme aux principales caractéristiques définies dans la Directive européenne RTTE 1999/5/CE.
Chapter : Approvals and Safety Summary Tämä laite vastaa EU:n radio- ja telepäätelaitedirektiivin (EU R&TTE Directive 1999/5/EC) vaatimuksia. (Julkilausuma nähtävillä osoitteessa: www.psionteklogix.com). Psion Teklogix tímto prohlašuje, že 8515 Vehicle-Mount Computer je ve shodě se základními požadavky a dalšími příslušnými ustanoveními směrnice 1995/5/ES (NV č. 426/2000 Sb.) a Prohlášení o shodě je k dispozici na www.psionteklogix.com.
Chapter : Approvals and Safety Summary This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions: 1. This device may not cause harmful interference, and 2. This device must accept any interference received, including interference that may cause undesired operation. FCC Caution: Any changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate this equipment.
Chapter : Approvals and Safety Summary Emissions Information for Canada This Class B digital apparatus meets all requirements of the Canadian Interference-Causing Equipment Regulations. When using the 802.11 radio option, to prevent radio interference, this device is intended to be operated indoors and away from windows to provide maximum shielding. Equipment (or its transmit antenna) that is installed outdoors is subject to licensing.
Chapter : Approvals and Safety Summary • • • • Do not operate the vehicle-mount computer with a damaged cord or plug. Replace immediately. Make sure the cord is positioned so that it is not stepped on, tripped over or otherwise subjected to damage or stress. An extension cord should not be used unless absolutely necessary. Use of an improper extension cord could result in fire or electric shock.
INTRODUCTION 1 1.1 About This Manual . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 1.2 Text Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 1.3 About the 8515 Vehicle-Mount Computer . . . . . . . . . . . . . . . . . . . . . . . .
2 Psion Teklogix 8515 Vehicle-Mount Computer User Manual
Chapter 1: Introduction About This Manual 1.1 About This Manual This manual describes how to configure, operate and maintain the Psion Teklogix 8515 Vehicle-Mount Computer. Chapter 1: Introduction provides a basic overview of the 8515 Vehicle-Mount Computer. Chapter 2: Basic Checkout describes the steps required to get the 8515 ready for operation. Chapter 3: Getting to Know the 8515 describes the 8515 features and provides a description of the keyboard, display, indicators, etc.
Chapter 1: Introduction Text Conventions 1.2 Text Conventions Note: Notes highlight additional helpful information. Important: These statements provide particularly important instructions or additional information that is critical to the operation of the equipment. Warning: These statements provide critical information that may prevent physical injury, equipment damage or data loss. 1.
2 BASIC CHECKOUT 2.1 Features of the 8515 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 2.2 Preparing the 8515 for Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 2.3 8515 Safety Instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 2.4 Important Operating Instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 2.5 Switching the 8515 On and Off . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 2.
6 Psion Teklogix 8515 Vehicle-Mount Computer User Manual
Chapter 2: Basic Checkout Features of the 8515 2.1 Features of the 8515 Figure 2.1 Front of the 8515 Vehicle-Mount Computer Antenna Function Keys Function Keys Beeper Power LED Macro Keys Figure 2.
Chapter 2: Basic Checkout Preparing the 8515 for Operation 2.2 Preparing the 8515 for Operation Typically the 8515 Vehicle-Mount Computer is configured at the factory and arrives ready for use. Although the 8515 is equipped with an internal Compact Flash slot and a Micro-SD I/O slot, these slots are not intended for user modification. If a device needs to be changed or added in these slots, contact qualified Psion Teklogix personnel. 2.
Chapter 2: Basic Checkout Important Operating Instructions 2.4 Important Operating Instructions Warning: IT IS CRITICAL that this information be reviewed and that any guidelines applicable to your 8515 be strictly followed. Backup Battery The computer backup battery provides one hour of memory backup. The capacity is reduced as the operating temperature cools. The table below provides a general outline of battery capacity based on the operating temperature.
Chapter 2: Basic Checkout Calibrating the Touchscreen Important: If the word ‘BLUE’ is displayed in uppercase in the taskbar at the bottom of the screen, this key is locked ‘on’—the 8515 will not switch off. Press the [BLUE] key again to unlock it; then press [BLUE] [ENTER/ON] to switch the 8515 off. If, however, you’ve disabled the “Blue Key” in the ‘One Shot’ dialog box (see “One Shots” on page 64), the 8515 can be turned off even when the [BLUE] key is locked ‘on’. 2.
Chapter 2: Basic Checkout Data Transfer Between the 8515 and a PC 2.7 Data Transfer Between the 8515 and a PC Data transfer options vary slightly depending on the type of operating system installed in your PC. For Windows XP SP2 operating systems or earlier, Microsoft® ActiveSync® is PC connectivity software that can be used to connect your 8515 to PCs running this software.
Chapter 2: Basic Checkout Summit Client Utility (SCU) for 802.11b/g Radio 2.8 Summit Client Utility (SCU) for 802.11b/g Radio This section describes the Summit Client Utility (SCU). The SCU provides the utilities you will need to configure the 802.11b/g Compact Flash radio module so that it can communicate through a wireless LAN effectively and securely. Note: 2.8.1 You do not need to reset your 8515 after configuring the Summit DC 802.11 SC (Model RA2041) CF radio.
Chapter 2: Basic Checkout Name Servers Tab 3. Tap on the IP Information tab Note: Choosing the Renew button forces the 8515 to renew or find a new IP address. This is useful if, for example, you are out of communication range for a longer period of time and your 8515 is dropped from the network. 4. To define a static IP address, tap the Configure button.
Chapter 2: Basic Checkout Using the SCU to Connect to the WLAN The DNS and WINS fields in the Name Servers tab allow you to specify additional WINS and DNS resolvers. The format for these fields is ###.###.###.###. 2.8.3 Using the SCU to Connect to the WLAN This section provides a quick set of steps to create a profile (referred to as a config). Detailed information about each of the SCU tabs—Main, Config, Status, Diags and Global Settings—is provided in Appendix B: “SCU for 802.11b/g Radio”.
Chapter 2: Basic Checkout Using the SCU to Connect to the WLAN • • • • • Tap on the New button to define a new profile. Type a name for your configuration using any alpha-numeric combination to uniquely identify this profile. Tap on OK to return to the Profile tab. Tap on Commit to save the profile name. When a pop-up message indicates that your configuration will be saved, tap on OK. 2.8.3.
Chapter 2: Basic Checkout Resetting the 8515 Vehicle-Mount Computer • Configure any other settings that are supplied by the network administrator for the SSID to which you will associate. • Make certain that you tap on Commit following each change. Once you’ve completed the configuration: • Tap the Main tab. Tap on the Active Profile button – your new profile will be listed in the drop-down menu. When you tap on the profile you created, the 802.
Chapter 2: Basic Checkout Resetting the 8515 Vehicle-Mount Computer Cold Reset There are two options when executing a cold reset: reset to BootLoader, or reset directly to Windows Embedded CE 5.0 operating system. To execute a cold reset and access the BooSt menu: • Press and hold down the [BLUE] key, the [ENTER] key and the [SPACE] key simultaneously for a minimum of six seconds. After a cold reset, the BooSt menu appears. • • If you want to load the Windows Embedded CE 5.0 operating system, type 1.
3 GETTING TO KNOW THE 8515 3.1 The Internal Backup Battery. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 3.2 The Stylus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 3.3 The Keyboard . . . . . . . . . . . . . . 3.3.1 Modifier Keys . . . . . . . . . . . 3.3.1.1 Activating Modifier Keys 3.3.1.2 Locking Modifier Keys . 3.3.2 The Keys . . . . . . . . . . . . . 3.4 Function Keys and Macro Keys . . . . . 3.4.1 Function Keys . . . . . . . . . . . 3.4.
20 Psion Teklogix 8515 Vehicle-Mount Computer User Manual
Chapter 3: Getting to Know the 8515 The Internal Backup Battery 3.1 The Internal Backup Battery The 8515 Vehicle-Mount Computer is equipped with an internal battery that will provide backup power to the unit for up to 30 seconds of normal operation. The display will be blank during this time. After 30 seconds, the unit will shut off to preserve the contents of RAM. The backup battery provides one hour of memory backup.
Chapter 3: Getting to Know the 8515 The Keys The [SHIFT], [CTRL] and [ALT] keys operate much like a desktop keyboard except that they are not chorded (two keys held down simultaneously). The modifier key must be pressed first followed by the key whose function you want modified. 3.3.1.1 Activating Modifier Keys When a modifier key is pressed once, it is displayed in lowercase letters in the taskbar at the bottom of the 8515 screen.
Chapter 3: Getting to Know the 8515 The Keys The Arrow Keys The Arrow keys move the cursor around the screen in the direction of the arrow—up, down, left and right. The cursor is the flashing box or underline character that indicates where the next character you type will appear. The [INS] Key The [INS] key inserts a character at the cursor position. The [DEL] Key The [DEL] key erases the character at the cursor position.
Chapter 3: Getting to Know the 8515 Function Keys and Macro Keys 3.4 Function Keys and Macro Keys In addition to the standard keyboard functions (see “The Keyboard” on page 21), 8515 Vehicle-Mount Computers are equipped with function keys and macro keys. 3.4.1 Function Keys The 8515 is equipped with a series of 30 function keys divided amongst 10 physical keys, each of which is defined in the application software. There are five keys located on each side of the display.
Chapter 3: Getting to Know the 8515 The Keypad Backlight Macro Keys [M3] to [M6] These keys are displayed in blue print on the [M1] and [M2] keys in the bottom row of executable keys, and on the [N] and [M] keys in the first row of alpha keys on the keyboard. To access these macro keys, press the [BLUE] key followed by the appropriate executable or alpha key. For example, on a Qwerty keyboard: • • 3.4.3 Press [BLUE] [N] to access macro key [M5]. To access [M3], press [BLUE] [M1], etc.
Chapter 3: Getting to Know the 8515 Onscreen Indicators Figure 3.1 Taskbar The taskbar changes dynamically, and only those icons that are applicable are displayed. For example, if a radio is not installed in your 8515, the radio signal icon is not displayed in the taskbar. Windows Start Button You can display the Start Menu by tapping on the Start button in the taskbar.
Chapter 3: Getting to Know the 8515 Audio Indicators Security Level Security levels can be set to limit user access to 8515 settings. In addition, applications can be restricted to prevent inadvertent changes. External Power This is the external power icon displayed in the taskbar. External Devices When a peripheral is attached to the USB or serial ports and activated, an associated icon appears in the taskbar. Scanner 3.6.
Chapter 3: Getting to Know the 8515 Scan LED Indicators • • • • • 3.7.2 Scan the entire bar code. If you are using a 1D or 2D scanner, make certain that the scan beam crosses every bar and space on the bar code, including the margins on either end of the symbol. If you are using a 2D imaging scanner, make certain the red, oval-shaped framing mark is centered within the bar code you want to scan. When using imaging scanners, do not move the scanner while decoding the bar code. Movement blurs the image.
Chapter 3: Getting to Know the 8515 Monitoring the Network Connection • 3.8 Aim at the bar code and press the trigger. The beam expands into a rectangle covering the bar code to properly scan it. The scan beam and a warning indicator are visible until a successful decode is achieved or three seconds have elapsed. Monitoring the Network Connection If your computer is equipped with a wireless LAN radio, it will typically associate with the nearest access point.
Chapter 3: Getting to Know the 8515 Cleaning the 8515 3.9.3 Cleaning the 8515 Important: Do not immerse the unit in water. Dampen a soft cloth with mild detergent to wipe the unit clean. • • • 30 Use only mild detergent or soapy water to clean the computer. Avoid abrasive cleaners, solvents or strong chemicals for cleaning. To clean ink marks from the keypad and touchscreen, use isopropyl alcohol.
4 WINDOWS EMBEDDED CE 5.0 4.1 Navigating In Windows Embedded CE 5.0 and Applications 4.1.1 Navigating Using a Touchscreen and Stylus . . . . . . 4.1.2 Navigating Using the Keyboard. . . . . . . . . . . . . 4.2 Working With Files, Folders, and Programs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33 33 33 34 4.3 The Startup Desktop . . . . . . . . . . . 4.3.1 The Desktop Icons. . . . . . . . . 4.3.2 The Taskbar . . . . . . .
32 Psion Teklogix 8515 Vehicle-Mount Computer User Manual
Chapter 4: Windows Embedded CE 5.0 Navigating In Windows Embedded CE 5.0 and Applications 4.1 Navigating In Windows Embedded CE 5.0 and Applications Note: In order to access many of the menus discussed in this chapter, the security level must be set to “Supervisor” (see “Security Level” on page 38). Graphic user interfaces like Windows Embedded CE 5.0 for portable devices and desktop Windows operating systems (Windows 2000, Windows XP, Windows Vista™, etc.) utilize ‘point and click’ navigation.
Chapter 4: Windows Embedded CE 5.0 Working With Files, Folders, and Programs been fully configured and your application is launched at startup, you’ll have little need for keyboard navigation. Table 4.
Chapter 4: Windows Embedded CE 5.0 The Startup Desktop • Double-tap on the appropriate icon—either a folder icon, an application icon or a file icon—to open or launch your selection. If you’re using the keyboard: • • 4.3 Use the arrow keys to highlight the icon you want to open or launch. Press [ENTER]. The Startup Desktop When the 8515 boots up, the startup desktop (shell) is displayed. Any applications stored in the Startup folder start up immediately.
Chapter 4: Windows Embedded CE 5.0 The Desktop Icons 4.3.1 The Desktop Icons The icons displayed in the startup desktop operate in much the same way as those displayed on any standard PC desktop that is running Windows. My Device Choosing this icon displays the contents of your 8515 computer. If you’re not sure how to work with the files, folders and programs displayed, refer to “Working With Files, Folders, and Programs” on page 34.
Chapter 4: Windows Embedded CE 5.0 The Taskbar The taskbar also displays active modifier keys—[SHIFT], [ALT], [CTRL], [BLUE] and [ORANGE]. Keys that have been locked “on” are displayed in uppercase letters. For example, if you press the [CTRL] key twice to lock it “on”, it is displayed as CTRL KEY in the taskbar. 4.3.2.1 Using the Taskbar A taskbar icon allows you to display a tooltip—a short description of the status of the icon, or to display the Control Panel dialog box associated with the icon.
Chapter 4: Windows Embedded CE 5.0 The Start Menu • Tap the stylus on the items you want to activate or deactivate. A check mark indicates active items. Note: 4.4 The Advanced tab allows you to tap on a Clear button to delete the contents of the Documents folder. The Start Menu Note: Some of the Start Menu items may be disabled based on the current 8515 security settings. The Start Menu lists the operations you can access and work with.
Chapter 4: Windows Embedded CE 5.0 Security Level Figure 4.6 Security Level Menu Assigning the Supervisor Security Level The security level is represented by an icon in the shape of a lock in the taskbar. The security levels define the options accessible to the operator in the Start Menu and the taskbar. By default, the security level is set to User, restricting access to only the most basic Start Menu items. To allow access to all the Start Menu and taskbar options: • • • 4.4.2.
Chapter 4: Windows Embedded CE 5.0 Programs Figure 4.7 Security Settings Note: 4.4.3 It is recommended that you enable ‘Allow Teklogix Security Level’ so that authorized Psion Teklogix service personnel can access your unit should it require maintenance. Programs • Tap on Programs to display a sub-menu of options. Figure 4.8 Programs List This sub-menu allows you to choose ActiveSync, Demo and Command Prompt, and you can access Internet Explorer, along with installed applications (e.g.
Chapter 4: Windows Embedded CE 5.0 Shortcuts Summit The Summit folder provides access to the SCU (Summit Client Utility). The SCU is the utility you will need to configure the Summit 802.11b/g Compact Flash radio module so that it can communicate through a wireless LAN effectively and securely. Command Prompt Command Prompt is used to access the DOS command prompt. At the prompt, you can type DOS commands such as dir to display all the directories in the drive.
Chapter 4: Windows Embedded CE 5.0 Shortcuts The System Tray If your touchscreen is not enabled, you can use the System Tray option to access the icons in the taskbar at the bottom of the screen. The taskbar displays indicators such as a radio signal icon and the security level. Highlighting a taskbar icon allows you to display a tooltip—a short description of the status of the icon, or to display the Control Panel dialog box associated with the icon. • Choose System Tray from the Shortcuts Start Menu.
Chapter 4: Windows Embedded CE 5.0 Settings 4.4.5 Settings • Tap on Settings to display a sub-menu of options. Figure 4.11 Settings List Control Panel The Control Panel contains applets used to configure hardware, the operating system and the shell. If your 8515 is running with the Psion Teklogix Tekterm application or another application, additional configuration applets may appear in the Control Panel.
Chapter 4: Windows Embedded CE 5.0 Shutdown Figure 4.12 Run Dialog 4.4.7 Shutdown Choosing Shutdown displays a sub-menu of options, including Suspend, Warm Reset and Cold Reset. Figure 4.13 Shutdown Menu Note: This menu varies slightly depending on the security level chosen. When the 8515 is set to User level, the Shutdown option is replaced by Suspend. A submenu is not available. At Teklogix security level, an additional option is available in the submenu—Bootloader.
Chapter 4: Windows Embedded CE 5.0 Using a Dialog Box Warm Reset The Warm Reset option resets the 8515, leaving all saved files and (registry) settings intact. Any unsaved data is lost. Cold Reset The Cold Reset option resets the 8515. Any files not stored in permanent memory are lost. However, the registry settings are saved. 4.5 Using a Dialog Box A dialog box (like those in the sample screens in Figure 4.14 on page 45) appears when you need to make selections and enter further information.
Chapter 4: Windows Embedded CE 5.0 Using a Dialog Box Note: If you’re using the touchscreen, use the stylus to tap on an element in a dialog box to select or deselect it, display dropdown menus, save your selections, etc. If you’re using a keyboard, follow the directions below. Dialog boxes contain one or more of the following elements: Tab: A tab separates different elements of a dialog box. Tap on a tab to display the associated information. Textbox: A textbox requires that you type information.
5 CONFIGURATION 5.1 Remote Desktop Connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 5.2 Pocket PC Compatibility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 5.3 The Control Panel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51 5.4 Control Panel Icons . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52 5.5 Control Panel Applications: Basic Setup . . . . 5.5.1 App Launch Keys . . . . . . . . . . . . . 5.5.2 Certificates .
5.5.8.1 Setting Double-Tap Sensitivity 5.5.8.2 Touchscreen Calibration. . . . 5.5.8.3 Disabling the Touchscreen . . 5.5.9 Volume and Sound Properties . . . . . 5.5.9.1 Volume Adjustments . . . . . 5.6 Bluetooth Setup . . . . . . . . . . . . . . . . 5.6.1 The Devices Tab . . . . . . . . . . . . 5.6.1.1 Scan . . . . . . . . . . . . . . 5.6.1.2 Services . . . . . . . . . . . . 5.6.1.3 Set PIN . . . . . . . . . . . . 5.6.2 The Servers Tab . . . . . . . . . . . . 5.6.3 Outgoing Tab . . . . . . . . . . . . . . 5.
5.9.3.4 Removing a Trap Destination 5.9.4 Permitted Hosts Tab . . . . . . . . . . 5.9.4.1 Adding a Host . . . . . . . . 5.9.4.2 Changing a Host . . . . . . . 5.10 Storage Manager . . . . . . . . . . . . . . 5.10.1 Formatting a Memory Card . . . . . 5.10.2 Creating Partitions . . . . . . . . . . 5.10.3 Partition Management . . . . . . . . 5.10.3.1 Dismounting a Partition. . . 5.10.3.2 Deleting a Partition . . . . . 5.10.3.3 Formatting a Partition . . . . 5.10.3.4 Mounting a Partition . . . . 5.
50 Psion Teklogix 8515 Vehicle-Mount Computer User Manual
Chapter 5: Configuration Remote Desktop Connection 5.1 Remote Desktop Connection Remote Desktop Connection is an 8515 application used to connect to a Windows Terminal Server so that you can run a “session” on the Server machine, using the 8515 (Windows Embedded CE 5.0 device). Refer to the following website for step-by-step information about setting up this connection: http://www.microsoft.com/WindowsXP/pro/using/howto/gomobile/remotedesktop/default.asp 5.
Chapter 5: Configuration Control Panel Icons Figure 5.1 Control Panel 5.4 Control Panel Icons The Control Panel provides a group of applications that allow you to customize and adjust settings on your 8515. This section shows the related icons in the Control Panel and gives a brief description of each. Section 5.5: “Control Panel Applications: Basic Setup” describes the basic configuration for these applications.
Chapter 5: Configuration Control Panel Icons Certificates A public key is transmitted as part of a certificate. The certificate assigned through this icon is used to ensure that the submitted public key is, in fact, the public key that belongs to the submitter. The client checks that the certificate has been digitally signed by a certification authority that the client explicitly trusts. “Scanner Settings” on page 87 directs you to the appropriate setup information.
Chapter 5: Configuration Control Panel Icons Network and Dial-up Connections Displays a network window from which the 8515 radio can be configured and an existing configuration can be executed. Refer to “Summit Client Utility (SCU) for 802.11b/g Radio” on page 12 for details. Owner Provides fields in which you can specify owner information. A Notes tab allows additional information to be entered and displayed when the unit is powered up. Network ID tab information is used to access network resources.
Chapter 5: Configuration Control Panel Icons SNMP SNMP (Simple Network Management Protocol) is the protocol used to monitor and manage devices attached to a TCP/IP network. Storage Manager Allows the user to view information about the storage devices that are present, such as the CF card. For details, see page 87. Stylus Adjusts how Windows Embedded CE 5.0 recognizes your double-tap (as slow or rapid successive taps).
Chapter 5: Configuration Control Panel Applications: Basic Setup 5.5 Control Panel Applications: Basic Setup 5.5.1 App Launch Keys The App Launch Keys icon allows you to map a key to an application so that you can then launch the application from a single key-press. • In the Control Panel, choose the App Launch Keys icon. To assign an application key: • Tap the Add button. • Press the key you want to use to launch an application.
Chapter 5: Configuration App Launch Keys • Once you’ve selected the file you want to map, tap on OK. The cursor moves to the Data field. You can use this field if you need to define special parameters to your application launch key. If you don’t want to assign any parameters, you can leave the Data field blank. If, for example, you want to assign an application launch key to launch the WordPad application, you can leave this field blank.
Chapter 5: Configuration Certificates 5.5.2 Certificates • In the Control Panel, choose the Certificates icon. Figure 5.2 Certificates Icon This dialog box is used in conjunction with 802.1X authentication to enhance 8515 security. Figure 5.3 Certificates Menu For a detailed description about Certificate setup for both the server and client-side devices (8515), refer to the following website: www.microsoft.com/windows2000/techinfo/planning/walkthroughs/default.asp - "Security Services" Note: 5.5.
Chapter 5: Configuration Display Properties • In the Display Properties dialog box, open the Background tab. Figure 5.5 Background Tab This option allows you to change the background colour or add an image. 5.5.3.2 Appearance • In the Display Properties dialog box, open the Appearance tab. Figure 5.6 Appearance Tab This dialog box allows you to customize the display colour scheme and font size. 5.5.3.
Chapter 5: Configuration Input Panel Figure 5.7 Backlight Tab Note: Backlight changes take effect immediately. You do not need to reset the 8515. Intensity This parameter is used to adjust the light intensity of the backlight. Sliding the bar to the left lowers the light intensity, and sliding it to the right raises the intensity. Bright For The value chosen from this dropdown menu determines the duration of time that the backlight stays on at the configured intensity when a unit is not in use.
Chapter 5: Configuration Input Panel Soft Keyboard Input Panel Button Icon Tapping on the Input Panel button displays a soft input panel (soft keyboard) that can be customized using the Input Panel dialog box. Important: If the Input Panel button icon is not visible in the taskbar, from the ‘Start’ menu, tap on Settings>Taskbar and Start Menu. Tap the checkbox next to ‘Show Input Panel Button’. To remove this icon from the taskbar, tap in the checkbox to erase the check mark.
Chapter 5: Configuration Keyboard Properties Figure 5.8 Input Panel Properties • Tap on the Options button to change the appearance of your soft keyboard. Note: You can also display this dialog box by double-tapping on the Input icon in the far-right corner of the taskbar. Figure 5.9 Soft Keyboard Options 5.5.
Chapter 5: Configuration Keyboard Properties 5.5.5.1 Key Repeat • In the Keyboard Properties dialog box, open the Repeat tab. Figure 5.11 Repeat Tab Enable Character Repeat Tapping in the checkbox next to this option enables the key behaviour you specify in this dialog box. Repeat Delay The position of the slider determines how long a key must be held down before it begins to autorepeat.
Chapter 5: Configuration Keyboard Properties Figure 5.12 Backlight Tab Intensity This parameter is used to adjust the light intensity of the 8515 keyboard backlight. Sliding the bar to the left darkens the keyboard backlight intensity, and sliding it to the right lightens the intensity. Options – ON For The value chosen from this dropdown menu determines the duration of time that the keyboard backlight stays on when a unit is not in use. Note: 5.5.5.
Chapter 5: Configuration Keyboard Properties The options in this tab allows you to determine how modifier keys on your 8515 behave. For each modifier key—[ALT], [SHIFT], [CTRL], [ORANGE] and [BLUE]—you have the following options in the drop-down menu: Lock, OneShot, and OneShot/Lock. Note: Keep in mind that checking the taskbar lets you know whether or not these keys are locked on.
Chapter 5: Configuration Keyboard Properties A macro has 200 programmable characters (or “positions”). The macro keys can be programmed to replace frequently used keystrokes, along with the function of executable keys including [ENTER], [BKSP] and [DEL] ([BLUE]-[BKSP]), function keys and arrow keys. Recording and Saving A Macro You can program up to six macro keys. • In the Macro menu, highlight a macro key number—for example, Macro 1 to assign a macro to macro key [M1]. Tap on the Record button.
Chapter 5: Configuration Keyboard Properties Macro Keys [M1] and [M2] These keys are displayed in black print on the bottom row of executable keys on the keyboard. These macro keys are accessed by simply pressing the key. Macro Keys [M3] To [M6] These keys are displayed in blue print on the [M1] and [M2] keys in the bottom row of executable keys, and on the [N] and [M] keys in the first row of alpha keys on the keyboard.
Chapter 5: Configuration Keyboard Properties Adding and Changing Unicode Values Important: Changes to Unicode mappings are not saved until you exit the Keyboard Properties dialog box. • Tap on the Add/Change button. Figure 5.17 Change Unicode Mapping • • Tap on a value in the Unicode mapping list—in the sample screen above, a value will be assigned to virtual key 0 (VK 0). Tap the stylus in the Unicode Mapping field, and type a Unicode value for the highlighted key.
Chapter 5: Configuration Keyboard Properties defines key presses that occur when the [ORANGE] modifier is on; the Blue table defines key presses that occur when the [BLUE] modifier is on. The default mappings of these scancodes can be overwritten for each of these three tables using the Scancode Remapping tab accessed from the Keyboard Properties dialog box. Figure 5.18 Scancode Remapping Tab The first column in the Scancode Remapping tab displays the Scancodes in hexidecimal.
Chapter 5: Configuration Keyboard Properties • Type the scan code in hexidecimal in the field labelled Scancode: Note: 5.5.5.7 Label: field displays the default function of the scancode you are remapping. Virtual Key, Function, and Macro The radio buttons along the side of the dialog box allow you to define to what the scan code will be remapped: Virtual Key, Function, or Macro. When Virtual Key is selected, you can choose to force [SHIFT] to be on or off when the virtual key is sent.
Chapter 5: Configuration Manage Triggers Figure 5.20 Lock Sequence Tab Enable Key Lock Sequence Once the key lock sequence is enabled, the following options become available: - A popup message can be displayed when the keyboard is locked and a key is pressed. - The keyboard can be in lock mode when the computer is started. - The touchscreen can be disabled when the keyboard is locked.
Chapter 5: Configuration Manage Triggers The Manage Triggers screen lists any trigger mappings. Figure 5.22 Manage Triggers Menu 5.5.6.1 Trigger Mappings A trigger mapping is an association between a particular key on the keyboard and a driver or application, the “owner(s)” of the trigger source. When the specified key is pressed, the owner (for example, a decoded scanner) is sent a message.
Chapter 5: Configuration Manage Triggers Edit Tapping this button brings up the Edit mapping dialog box, so that you can edit existing trigger mappings. Remove Tapping this button removes an existing mapping. OK The OK button in the top right of the Manage Triggers screen saves all changes made. If the cancel button X is tapped instead, or the [ESC] key is pressed, all changes made will be discarded. 5.5.6.2 Add and Edit Trigger Mapping This dialog box is used to add trigger mappings. Figure 5.
Chapter 5: Configuration Power Properties Trigger Type You can enable either an Up/Down or Double Click response to a trigger press. Normally, when a trigger (keyboard key, etc.) is pressed and released, a “trigger down” event is sent to the “owner”—that is, the application receiving the trigger press information followed by a “trigger up”. If Double Click is chosen in this menu, when the trigger is pressed, released, and then pressed again, a “double-click” event is generated.
Chapter 5: Configuration Power Properties Figure 5.25 Internal Battery Status If external power is removed, the battery will supply enough power to the computer to allow it to shut down gradually with up to 30 seconds of run time to do this. The display will be blank during this time. The computer will save any sessions, and the state of the computer is maintained. There is also a one hour backup of the state of the computer from when the external power was removed.
Chapter 5: Configuration Power Properties When the time in the Suspend Timeout field elapses without any activity, the unit enters Suspend state. In Suspend state, the 8515 CPU enters a sleep state, and the radio is shut off. The state of the device (RAM contents) is preserved. Pressing [ENTER] wakes the system from suspend state. When the 8515 is in suspend state, the network connection is broken immediately; therefore you must re-establish the network connection. 5.5.7.
Chapter 5: Configuration Stylus Properties 5.5.7.4 Devices Figure 5.28 Devices Tab Slot Power Status This tab allows you to enable or disable power to the CF slot in your unit. Built-In Devices Power Status A checkmark next to Enable Bluetooth indicates that the unit’s built-in, Bluetooth radio is enabled. 5.5.8 Stylus Properties Note: • Touchscreen calibration may not be enabled on your unit. If your screen appears to require recalibration, contact your supervisor.
Chapter 5: Configuration Stylus Properties Figure 5.30 Double-Tap Tab 5.5.8.2 Touchscreen Calibration Touchscreens rarely require recalibration. However, if your touchscreen has never been calibrated or if you find that the stylus pointer is not accurate when you tap on an item, you can use the Calibration tab to recalibrate the touchscreen. • Choose the Calibration tab and then tap on the Recalibrate button. Figure 5.
Chapter 5: Configuration Volume and Sound Properties 5.5.8.3 Disabling the Touchscreen Figure 5.32 Touch Tab • 5.5.9 Tap on the checkbox next to Disable the touch panel. The touchscreen will not accept screen taps. Volume and Sound Properties • In the Control Panel, choose the Volume & Sounds icon. Figure 5.33 Volume & Sounds Icon 5.5.9.1 Volume Adjustments Figure 5.34 Volume Tab • Slide the volume button upward to increase the beeper volume or downward to decrease the beeper volume.
Chapter 5: Configuration Bluetooth Setup • Under the heading Enable sounds for, enable the conditions under which you want the 8515 to emit a beep. Note: 5.6 Sounds (wave files) cannot be played on 8515 units. The conditions under which the 8515 emits sounds are tailored from within the application installed on your unit. Therefore the options in the Sounds menu are not available.
Chapter 5: Configuration The Devices Tab Figure 5.36 Devices Tab 5.6.1.1 Scan • Tap on the Scan button to list available devices. Figure 5.37 Scan Wait for the 8515 to complete its scan (approximately 20 seconds). When scanning starts, the Scan button will change to Stop—if necessary, you can tap on this button to stop the process. Once scanning is complete, all discovered devices will be displayed in the list box, with Name, Address, Active status, and PIN information.
Chapter 5: Configuration The Devices Tab At this point you can either query for services or set the PIN for each device. Once you highlight a device in the list box, both the Services and Set PIN buttons become available. 5.6.1.2 Services A discovered device may display several service profiles that it can use to communicate, and you will want to activate the type you need.
Chapter 5: Configuration The Servers Tab 5.6.1.3 Set PIN PINs can be set for each device by pressing the Set PIN button in the Devices tab, or you can skip this step and try to connect to the device first. Important: The remote device must have authentication enabled, otherwise the PIN authentication will fail. • Highlight a device, tap on the Set Pin button, and type the PIN. You will receive a message, either that the PIN has been successfully validated or that it has been rejected.
Chapter 5: Configuration Outgoing Tab Once you activate a server profile, it is recommended that the 8515 be rebooted before you try to bond from a server. Note: 5.6.3 You do not need to reboot if you are deactivating a server. Outgoing Tab Figure 5.39 Outgoing Outgoing Port acts as a serial port that can be used to connect to a list of Bluetooth devices (one at a time), but you have the freedom to switch on-the-fly. The Outgoing Port checkbox allows you to create the Outgoing port.
Chapter 5: Configuration Active Connections Tab Note: 5.6.4 To add a service to the Outgoing port, an active service must first be deactivated. Then you can choose the ‘Outgoing’ option from the Activation menu (highlight a service, right-click or press the [SPACE] bar to display the Activation menu). Active Connections Tab Figure 5.40 Active Conn. Tab The Active Conn. tab lists the Name, Address, and Type of the currently active connections.
Chapter 5: Configuration Properties Tab 5.6.5 Properties Tab Figure 5.41 Properties The Properties tab displays information about your 8515, and provides some port options. The Device Name field shows the device name of your 8515. This name can be changed (see the Note in this section for details). Device Class shows the Class of Device (e.g. desktop), which is always set to ‘Handheld’. Local Bluetooth Address shows the address of your 8515 radio.
Chapter 5: Configuration Scanner Settings Figure 5.43 IPv6 Support Dialog Box • 5.8 Tap on the checkbox next to Enable IPv6 Network Support to enable this internet protocol. Scanner Settings The Teklogix Scanners icon in the Control Panel provides dialog boxes in which you can tailor bar code options and change the ports settings.
Chapter 5: Configuration Scanner Settings Options Tab Figure 5.45 Scanner Settings Options 5.8.2.1 Double Click Click Time (msec) This parameter controls the maximum gap time (in milliseconds) for a double-click. If the time between the first and second clicks of the scanner trigger is within this time, it is considered a double-click. The allowable range is 0 to 1000. A value of zero disables this feature.
Chapter 5: Configuration Translations Tab Scan Indicator When this parameter is enabled, the laser warning logo appears on the display whenever the scanner is activated. Scan Result Time (sec) The value assigned to the ‘Scan Result Time (sec)’ parameter determines how long the scan results of a successful scan are displayed on the screen. Time is measured in seconds, and a value of ‘0’ (zero) disables the parameter. When you choose this option, a dialog box appears where you can enter a value.
Chapter 5: Configuration Translations Tab Figure 5.46 Translations • In the Translations tab, choose the Case # to create rules. Figure 5.47 Cases • Double-tap on a No rule item in the dropdown list to display the rules. Figure 5.48 Case Rules When you choose a rule, an associated screen is displayed in which you can define the rule.
Chapter 5: Configuration Ports Tab Figure 5.49 Case Rule Definitions 5.8.3.1 Case Rules The case rules are defined as follows: • • • • • • • No rule—ignored. Match at index—matches the match string at a specified index. Match and replace at index—matches the match string at a specified index and replaces/changes it. Replace at index—replaces/changes unspecified data in a given range. Add barcode prefix/suffix—adds a global prefix or suffix. Verify barcode size—verifies the bar code size.
Chapter 5: Configuration Ports Tab 5.8.4.1 Serial Port (COM 1) Figure 5.50 Serial Port Settings Enabled This parameter must be set to on in order for the 8515 to recognize the device connected to the serial port. Power Double-tapping on this parameter displays a dialog box in which you can choose to disable (turn off) this port, or you can assign 5V power to the port. Figure 5.
Chapter 5: Configuration SNMP (Simple Network Management Protocol) Setup Data Bits This parameter determines the number of bits for the data going through this port. Doubletapping on this option displays a pop-up window in which you can choose either 7 or 8 data bits. Figure 5.53 Data Bits Options Parity This parameter determines the type of parity checking used on the data going through the tether port.
Chapter 5: Configuration Contacts Tab ment Station can access. Each product has a defined set of MIBs that determine how SNMP operates, the type of access allowed etc. All Psion Teklogix products support the TEKLOGIX-GENERIC-MIB—a MIB that defines some common features across Teklogix products. All devices also support MIB-II, a management information base that defines the common features of TCP/IP networks. The SNMP Agent software embedded in the 8515 supports SNMPv1 (RFC 1157).
Chapter 5: Configuration Communities Tab 5.9.2 Communities Tab Figure 5.58 Communities Options The Communities tab provides a means of limiting access to SNMP managed devices to those SNMP Managers with matching “community names”, as specified by RFC 1157. 5.9.2.1 Enable SNMP Enabling Enable SNMP allows the device to respond to SNMP queries and to send Traps. After enabling this option and rebooting the device, the SNMP Agent will automatically start up.
Chapter 5: Configuration Trap Destination Tab 5.9.2.3 Modifying a Community Setting To modify an existing community: • • Highlight the community you want to alter. Tap on Change. Figure 5.60 Modify Community Dialog A Modify Community dialog box is displayed, listing the community you highlighted. • 5.9.2.4 Edit the Name and/or Rights, and press [ENTER] to save your changes.
Chapter 5: Configuration Trap Destination Tab 5.9.3.1 Enabling Authentication TRAPS Checking Enable Authentication TRAPS allows authorization traps to be sent when a failure is detected (e.g., an SNMP message received with a bad community name). 5.9.3.2 Adding a Destination • To add a new destination, tap on the Add button. Figure 5.62 Add IP Address Dialog • 5.9.3.3 Type a destination in the text box provided, and press [ENTER].
Chapter 5: Configuration Permitted Hosts Tab • Tap on the Remove button. A Delete Confirmation screen is displayed. • • 5.9.4 To remove a destination, tap on Yes, or If you decide not to remove the destination, tap on No. Permitted Hosts Tab For security reasons, the Network Administrator may want to restrict SNMP-node access to a known sub-set of SNMP Managers. This tab lists the IP addresses of all the SNMP Managers which are allowed to monitor and manage this device.
Chapter 5: Configuration Storage Manager • Highlight the IP address you want to alter in the Permitted Hosts tab, and then tap on the Change button. A dialog box like the one displayed when you add a host is displayed. • 5.10 Make the necessary changes, and press [ENTER]. Storage Manager The Storage Manager allows the user to view information about the storage devices that are present in the 8515, such as the Compact Flash card. 5.10.1 Formatting a Memory Card Formatting a memory card bulk-erases it.
Chapter 5: Configuration Creating Partitions 5.10.2 Creating Partitions Once the card is formatted, new partitions can be created in it. The default is to create one partition that occupies the whole card, but a card can be divided into more than one partition if desired. Each partition appears as a separate folder in Windows Explorer. To create new partitions: 1. Press the New button next to the Partitions listbox. The New Partition dialog appears: Figure 5.67 New Partition Dialog 2.
Chapter 5: Configuration Partition Management 5.10.3 Partition Management Partitions can be individually dismounted, mounted, deleted, or formatted as well. These and additional tasks are available from the Partition Properties dialog: Figure 5.69 Partition Properties Dialog 5.10.3.1 Dismounting a Partition 1. Select the desired partition. 2. Press the Properties button. The Partition Properties dialog appears. 3. Press the Dismount button. The partition is dismounted.
Chapter 5: Configuration Partition Management Figure 5.70 Format Dialog 5. Choose your format options. These options include: - Version of file system (FAT-16, for devices holding up to 4 GB; or FAT-32, for devices containing up to 32 GB). - Number of FATs (File-Allocation Tables). - Number of entries allowed in the root directory. - Cluster size (.5 KB to 64 KB). There are also two checkboxes, which govern: - Whether to use the transaction-safe FAT file system (TFAT).
Chapter 5: Configuration Total Recall The Partition Properties dialog has buttons for additional functions. Partitions can be defragmented, and their file structure can be scanned. 5.11 Total Recall Total Recall is a Psion Teklogix utility developed to maintain applications and setting over cold boots. This utility is based on a backup and restore concept. • In the Control Panel, choose the Total Recall icon. Figure 5.71 Total Recall Icon 5.11.1 Creating a Backup Profile Figure 5.
Chapter 5: Configuration Creating a Backup Profile 5.11.1.1 Profile Information Figure 5.73 Profile Information Dialog This dialog box lists the possible storage destinations for the profile file. • To begin, type a name for the profile in the field labelled Profile Name. The image type—OS Version and Registry Type—for the 8515 is displayed at the top of the dialog box. • Tap on the icon to expand the settings for Profile Type and Profile Location. Figure 5.
Chapter 5: Configuration Creating a Backup Profile • Tap on Next to display the next dialog box—Add Files. 5.11.1.2 Add Files Figure 5.75 Add Files Options By default, All Files: is selected so that all installed or copied files, database entries, and the Registry will be saved. You can, however, limit the backup to database, and/or the registry only. The Select Files option allows choose to limit the backup By Individual File, or you can choose to define which files will be backed up By File Type.
Chapter 5: Configuration Restoring a Profile Figure 5.77 View Selections • Tap on Next to perform the operation. 5.11.1.4 Performing the Backup Figure 5.78 Backup Dialog • 5.11.2 Tap on Backup to start the process and create a profile. Restoring a Profile To manually restore a profile: • • • Tap on the Total Recall icon. Choose Restore Selected Profile from the dropdown menu. Choose the Profile Name you want to restore from the Profile Name dropdown menu.
Chapter 5: Configuration TweakIT Settings 5.12 TweakIT Settings This utility allows you to ‘tweak’ or adjust Advanced system settings (interface, network, servers, driver, and radio), User settings (Internet Explorer settings, font size, and docking port message), and provides a Registry Editor. 5.12.1 Advanced 5.12.1.
Chapter 5: Configuration Advanced Modem Logging When this option is enabled, the 8515 logs AT commands (e.g., dial-out information, password string, etc.) that the administrator can monitor for debugging purposes. Modem commands are stored in: \MdmLog.txt. 5.12.1.2 Advanced Services Settings FTP Server This option is enabled by default to allow file transfers.
Chapter 5: Configuration Advanced 5.12.1.3 Advanced Intermediate Driver Intermediate Driver Support The 8515 employs a custom intermediate driver that is used to indicate radio transmission and reception on its LEDs. As well, the intermediate driver is employed to support the Psion Teklogix 802.IQ v1 protocol. This TweakIt option is included to allow the driver to be disabled in cases where it interferes with third party drivers or security supplicants.
Chapter 5: Configuration Advanced 5.12.1.4 Radio Features AP Density This option allows you to determine the signal strength at which the 8515 radio will begin searching for a new Access Point (AP): High, Medium or Low. If, for example, this option is set to High, the radio will begin searching for a new Access Point while still at a fairly strong signal strength.
Chapter 5: Configuration User 5.12.2 User 5.12.2.1 Internet Explorer Settings This option allows you to customize how your Internet Explorer is displayed and how the tabbing functions. 5.12.2.2 User Display Settings User Font Size This option allows you to adjust the size of the font used the 8515 display: Large, Normal or Small.
Chapter 5: Configuration Registry Editor 5.12.3 Registry Editor This option is reserved for senior administrators who have a strong understanding of registry keys and values. Careless registry editing can cause irreversible damage to the 8515.
6 PERIPHERAL DEVICES & 8515 INSTALLATIONS 6.1 External Bar Code Readers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115 6.1.1 Entering Data with the Bar Code Reader . . . . . . . . . . . . . . . . . . . . 115 6.2 Bluetooth Peripherals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115 6.3 Linking an 8515 to an Ethernet Network . . . . . . . . . . . . 6.3.1 Network Access . . . . . . . . . . . . . . . . . . . . . . 6.
114 Psion Teklogix 8515 Vehicle-Mount Computer User Manual
Chapter 6: Peripheral Devices & 8515 Installations External Bar Code Readers 6.1 External Bar Code Readers The 8515 supports these external decoded scanner types: • 1D Scanner. • 2D Standard Range Raster Laser Scanner (PDF417). • 2D Imager. • RFID Scanner. To connect a scanner to the 8515, attach the device to either the UART or USB port. Please refer to the scanner-specific programming manual provided by the manufacturer before you begin. 6.1.
Chapter 6: Peripheral Devices & 8515 Installations Linking an 8515 to an Ethernet Network 6.3 Linking an 8515 to an Ethernet Network A USB-Ethernet adaptor cable—model number WA4010-G1—is used to connect the 8515 to an Ethernet network. Figure 6.1 USB-Ethernet Adaptor Cable USB Connector Ethernet Port • • 6.3.1 Insert the adaptor’s USB connector into the Host USB port on the 8515. Connect your network Ethernet cable to the Ethernet port on the adaptor cable.
Chapter 6: Peripheral Devices & 8515 Installations 8515 Mounting Accessories: Installing the RAM Mounting Kit Warning: Failure to install the mount correctly, or modifications to the mount, may result in serious injury or damage to property. Contact Psion Teklogix Technical Support or your Psion Teklogix representative if you have problems installing this mount. To ensure operator safety, you must use a calibrated torque wrench and the supplied mounting hardware when fastening the cradle and mount.
Chapter 6: Peripheral Devices & 8515 Installations Component Part Numbers ance. Note also that for better protection, the equipment should be mounted inside the vehicle roll cage. Use of the Powered Fork Lift Cradle while charging the fork truck battery is prohibited. Important: Safeguards To avoid possible injury, this device must be properly secured when in a moving vehicle. Keep this device away from magnetic fields. Do not place the computer near a television or radio receiver.
Chapter 6: Peripheral Devices & 8515 Installations MT33XX RAM Mounting Kit Specifications Table 6.1 Mounting Components and Figure Legend 6.4.2 N Mounting Kit MT3509 (Rail base (for 4" or 12" RAM arm, 1¼" to 17/8") 9007509 P Mounting Kit MT3510 (Rail base (for 4" or 12" RAM arm, 2" to 2 ½") 9007510 MT33XX RAM Mounting Kit Specifications Max. Load: 15kg Articulating Range: Spherical through 180 degrees.
Chapter 6: Peripheral Devices & 8515 Installations Preparation Figure 6.3 Bolt Hole Pattern For RAM Circular Base 6.4.3 Preparation The RAM articulating mount can be installed in a variety of orientations (see Figure 6.9 on page 125). Select the best orientation for your specific application. Preferred orientations maintain the centre of mass of the computer assembly, directly over the centre of the base (see Figure 6.4). Figure 6.
Chapter 6: Peripheral Devices & 8515 Installations Preparation Important: The tilt and rotation of the cradle can be easily adjusted by the operator. Ensure that if the handscrew is loosened and the cradle slips, the operator and any equipment cannot be damaged by it. Also note that under extreme vibration, the mount may slowly ‘settle’, requiring readjustment and tightening of the handscrew. Psion Teklogix offers a tightening tool (P/N 9000594) which can be used to minimize settling. Figure 6.
Chapter 6: Peripheral Devices & 8515 Installations Installation 6.4.4 Installation Figure 6.6 8515 Vehicle-Mount Computer With Mounting Bracket Back of 8515 showing location of screw holes. A B C D 1. Attaching the mounting bracket and RAM base to the computer: The kit provides four screws and washers that are used to secure the mounting bracket to the computer. Figure 6.6 provides a diagram and a legend to help you attach the mounting bracket and the RAM Vesa base to the computer.
Chapter 6: Peripheral Devices & 8515 Installations Installation Figure 6.7 Mounting Bracket Attached To The 8515 2. Secure the RAM Base to the local platform and attach RAM Standard Arm: Use the supplied bolt hole pattern to drill the required holes in the local platform. Hole diameters must not exceed 10mm [13/32 inches]. Hardware (G, H, C, and J) for securing RAM Bases (B or F) to the local platform are in the recommended sizes (see Table 6.1 on page 118).
Chapter 6: Peripheral Devices & 8515 Installations Positioning the 8515 Figure 6.8 RAM Vesa Base RAM Circular Base E E G B C J H F C J 6.4.5 Positioning the 8515 Place the 8515 into the position best corresponding to the RAM hardware used (see Figure 6.9 on page 125) and tighten by hand until secure. Refer to “8515 Mounting Accessories: Installing the RAM Mounting Kit” on page 116 for warnings and proper tightening technique. Mount orientations shown in Figure 6.
Chapter 6: Peripheral Devices & 8515 Installations Optional Mount Kits Figure 6.9 Circular Base and Vesa Base Mount Orientations 15° 70° Circ. Base To Platform 6.4.6 15° 70° Vesa Base To Platform Optional Mount Kits One of the mounting kits shown in Figure 6.10 on page 126 may be substituted for the Vesa Base (B) or the circular base (F) when mounting to a post or forklift roll cage. To Install: Mount the Clamp Base and Lower Base around the shaft.
Chapter 6: Peripheral Devices & 8515 Installations MT3250 Quick Release Mount “Turn & Lock” Figure 6.10 Optional Mount Kits SCREW CLAMP BASE SCREW CLAMP BASE LOWER BASE LOWER BASE NUT NUT MT3505 MT3507 NUT NUT CLAMP BASE CLAMP BASE LOWER BASE LOWER BASE SCREW SCREW MT3509 6.5 MT3510 MT3250 Quick Release Mount “Turn & Lock” The Quick Release Mount “Turn & Lock” option allows a dismount with a quick flick of the wrist and without the need of tools.
Chapter 6: Peripheral Devices & 8515 Installations 8515 Vehicle-Mount Computer Installations 6.6 8515 Vehicle-Mount Computer Installations 6.6.1 Wiring Guidelines Before installing cables between the computer and other devices, consider the following: • • • • • • • Ensure the vehicle body and underlying wiring is not damaged while drilling mounting holes. Protect cable runs from pinching, overheating, and physical damage. Use grommets to protect cables that pass through metal.
Chapter 6: Peripheral Devices & 8515 Installations Wiring Vehicle Power to the 8515 (maximum 6A) accessory supply on the vehicle. When connecting a power pre-regulator to a vehicle, please follow the instructions in the installation sheet (P/N 16435) supplied with the extension cable. The 8515 draws no more than 6A (less if the accessory supply is greater than 12V). Any additional wiring (minimum 18 gauge), connectors or disconnects used should be rated for at least 90 VDC, 10A.
Chapter 6: Peripheral Devices & 8515 Installations Wiring Vehicle Power to the 8515 Figure 6.
SPECIFICATIONS 7 7.1 8515 Vehicle-Mount Computer Specifications . . . . . . . . . . . . . . . . . . . .133 7.2 Colour Display . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .134 7.3 Keyboard. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .135 7.4 External Power. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .135 7.5 Internal Lithium-Polymer Battery . . . . . . . . . . . . . . . . . . . . . . . . . . .135 7.
132 Psion Teklogix 8515 Vehicle-Mount Computer User Manual
Chapter 7: Specifications 8515 Vehicle-Mount Computer Specifications Note: 7.1 Performance specifications are nominal and subject to change without notice. 8515 Vehicle-Mount Computer Specifications Size 203 mm x 209 mm x 50 mm (7.99"x 8.23" x 1.97") Weight Approximately 1.3 kg (2.
Chapter 7: Specifications Colour Display One USB V 1.1 device port Allows 8515 to appear as USB peripheral to USB host computer Data rate: 12 Mbps; >50 Kbps ActiveSync throughput Approvals Safety UL 60950-1, CAN/CSA-C22.2 NO. 60950-1 LVD EN 60950-1 EMC North America FCC Part 15 Class B Europe Complies with R & TTE Directive for Radio approval. Complies with EMC Directive 2004/108/EC for EMC approval. Compliance with Automotive Directive 95/54/EC for e-marking.
Chapter 7: Specifications Keyboard 7.3 Keyboard Alphanumeric keyboard 58-key Qwerty and ABC formats available Epoxy-coated elastomeric keys 7.4 7.5 Function Keys 10 dedicated function keys Key Illumination Adjustable backlight External Power Power Input range 10 VDC to 30 VDC Power Output range 5 VDC, 6A (max 30W) Internal Lithium-Polymer Battery Not user accessible. 7.6 Technology 350 mA @ 3.
Chapter 7: Specifications External Bar Code Scanners RX Sensitivity -96 dBm @ 1 Mbps, -90 dBm @ 11 Mbps, -94 dBm @ 6 Mbps, -75 dBm @ 54 Mbps Data Rates 802.11g: 6, 9, 12, 18, 24, 36, 48, 54 Mbps 802.11b: 1, 2, 5.5, 11 Mbps Bluetooth Radio Embedded (USB interface) Bluetooth Version 1.2 compliant (features Adaptive Frequency Hopping for better co-existence with 802.11 radio) Chip Antenna 2 dBi peak Transmit Power -3 dBm (0.5mW) minimum, +4 dBm (2.5 mW) max Frequency Range 2.400 GHz to 2.
APPENDIX A PORT PINOUTS A.1 Serial Port Interface Pinout (DB-9 male) Table A.
Appendix A: Port Pinouts Enhanced USB1 Port Interface Pinout A.2 Enhanced USB1 Port Interface Pinout Table A.2 Signal # 1 2 3 4 Enhanced USB1 Pinout* Function Signal USB– VBUS USB– DUSB– D+ Ground RS-232 Serial Port Transmit Data RS-232 Serial Port Receive Data DCD RXD TXD DTR 7 Ground RTS 8 Port Detection ID CTS 9 PCON Programming Switch 5 6 GND DSR Type USB USB USB USB PCON console PCON console PCON console PCON console PCON console Notes Switched 5V @ 0.
Appendix A: Port Pinouts Enhanced USB2 Port Interface Pinout Table A.3 Enhanced USB2 Pinout* Signal # Function 8 Port Detection ID 9 NC Signal CTS Type PXA console PXA console Notes 23K2 pull-down resistor for PXA console detection Open for PXA console port * Signal definitions are with respect to the 8515 Vehicle-Mount Computer side.
B APPENDIX SCU FOR 802.11B/G RADIO B.1 SCU Tabs . . . . B.1.1 Main . B.1.2 Profile B.1.3 Status . B.1.4 Diags . B.1.2.1 B.1.2.2 B.1.2.3 B.1.2.4 B.1.5 Global . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . SCU Security Capabilities SCU EAP Types. . . . . . EAP Credentials. . . . . . ThirdPartyConfig . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
B-2 Psion Teklogix 8515 Vehicle-Mount Computer User Manual
Appendix B: SCU for 802.11b/g Radio SCU Tabs B.1 SCU Tabs This appendix provides details about each tab in the Summit Client Utility (SCU). For quick, step-by-step setup instructions, refer to “Summit Client Utility (SCU) for 802.11b/g Radio” on page 12. The following sections provide a detailed description of each of the tabs available in the SCU—Main (below), Profile (page B-4), Status (page B-9), Diags (page B-9), and Global (page B-10). B.1.
Appendix B: SCU for 802.11b/g Radio Profile B.1.2 Profile The Profile tab allows you to define radio and security settings that are stored in the registry as part of the configuration profile. The profile you create and save is listed in the Active Profile drop-down menu in the Main tab. You can define up to 20 profiles. Radio Attributes • • • • • • • B-4 Edit Profile: Used to choose the profile to be viewed or edited.
Appendix B: SCU for 802.11b/g Radio Profile The following table describes the options in the Radio attributes, Encryption, and EAP Type drop-down menus: Table B.1 Radio, Encryption, and EAP Menus Radio Attribute Description Value Default SSID Service set identifier (SSID) for Maximum of 32 characters. WLAN to which the radio connects. None Client Name Name assigned to radio & 8515 into Maximum of 16 characters. which it is installed. None Power Save Power save mode for radio.
Appendix B: SCU for 802.11b/g Radio Profile Table B.1 Radio, Encryption, and EAP Menus Radio Attribute • Description Value Default Credentials Authentication credentials for the selected EAP type. Refer to “EAP Credentials” on page B-7. User: Username or Domain/User- None name (up to 64 characters). Password: up to 64 characters. For PEAP: CA Cert–CA server certificate filename. Encryption Type of encryption used to protect transmitted data.
Appendix B: SCU for 802.11b/g Radio Profile • PEAP: Provides secure user authentication by using a TLS tunnel to encrypt EAP traffic. Two different inner methods are used with PEAP: - EAP-MSCHAPV2, resulting in PEAP-MSCHAP: This is appropriate for use against Windows Active Directory and domains. - EAP-GTC, resulting in PEAP-GTC: This is for authentication with one-time passwords (OTPs) against OTP databases such as SecureID. • • LEAP: Is an authentication method for use with Cisco WLAN access points.
Appendix B: SCU for 802.11b/g Radio Profile • • • If the credentials specified in the profile are incorrect and that profile is used, the authentication fails without an error message; you will not be prompted to enter correct credentials. If the credentials are not specified in the profile, when the radio tries to associate using that profile, you will be prompted to enter the credentials. When prompted, you can enter valid credentials, enter invalid credentials, or cancel the operation.
Appendix B: SCU for 802.11b/g Radio Status B.1.3 Status The Status tab provides status information including IP address and MAC address for the client radio, IP address and MAC address for the AP, signal strength, channel, transmit power and data rate. B.1.4 Diags Ping Address Ping Results Use the Diags tab as a troubleshooting tool.
Appendix B: SCU for 802.11b/g Radio Global • B.1.5 Diagnostics: Attempts to connect or reconnect to an AP, and provides a more detailed dump of data than if you used (Re)connect. The dump includes the radio state, profile settings, global settings and BSSID list of APs. The SCU is saved to a file called _sdc_diag.txt in the Windows directory.
Appendix B: SCU for 802.11b/g Radio Global Table B.2 Global Tab Global Setting Description Value Default DFS Channels Reserved Off, On Off Aggressive Scan When this setting is On and the current Off, On connection to an AP becomes unreliable, the radio scans for available APs more aggressively. Aggressive scanning complements and works in conjunction with the standard scanning that is configured through the Roam Trigger, Roam Delta, and Roam Period settings.
Appendix B: SCU for 802.11b/g Radio Global Table B.2 Global Tab Global Setting Description Default TX Diversity Defines how to handle antenna diversity when transmitting data to AP. -Main only: Use main antenna only. -Aux only: Use auxiliary antenna only. -On: Use diversity. Main only RX Diversity Defines how to handle antenna diversity when receiving data from AP. -On-Start on Main: On startup, use main antenna. -On-Start on Aux: On startup, use auxiliary antenna.
Appendix B: SCU for 802.11b/g Radio Global Table B.2 Global Tab Global Setting Description Value Default Auth Timeout Specifies the number of seconds that An integer from 3 to 60. 8 the software will wait for an EAP authentication request to succeed or fail. If authentication credentials are specified in the active profile and the authentication times out, then association will fail.
APPENDIX C USB SETUP APPLICATION C.1 USB Setup The USB Setup application is used to update a Windows 2000 or XP PC so that it can connect to a Psion Teklogix 8515 Vehicle-Mount Computer. Note: For details on connecting devices to Windows Vista™ PCs, see page 29. To download the USB Setup application, go to: www.psionteklogix.com/downloads This will take you to the Teknet home page. • Login with your Teknet Username and Password.
Appendix C: USB Setup Application Launching the Application Figure C.1 Welcome Dialog If you check the “Install as a generic device” checkbox, the Hardware Manager on your PC will not prompt you to install every new device you connect to your PC. A generic configuration will be used for the Psion Teklogix devices. 3. Tap on the Install button to configure your PC or the Cancel button to exit the USB Setup program. The program checks that ActiveSync is installed and that it is a supported version—3.
Appendix C: USB Setup Application Installation Complete Dialog Box Figure C.2 Installation Dialog Usually, this dialog is shown when more than one version of ActiveSync is installed. You can either select the correct inf file for the USB Setup program to work with, or you can cancel the installation, and uninstall the extra copies of ActiveSync. C.1.2 Installation Complete Dialog Box Figure C.3 Installation Successful This dialog box indicates the success or failure of the installation.
Appendix C: USB Setup Application Installation Complete Dialog Box 4. Tap on Exit to exit the application. If you need to view the log file, tap on View Log. Once the USB Setup program is exited, you can connect the computer to your PC using a USB cable, and turn the unit on. If the USB Setup process was successful, the “Found new hardware” wizard may start. If this occurs, choose the recommended defaults. ActiveSync will detect your 8515.
INDEX A accessories bar code readers, connecting 115 Ethernet adaptor cable 116 Active Conn Tab 85 ActiveSync ASync profile 82 adaptor cable USB-Ethernet 116 ALT Key 23 appearance (display colour scheme) 59 App Launch Keys 56 approvals, regulatory 134 arrow keys moving the cursor 23 audio indicators description of beep conditions 27 Authentication, Bluetooth Controls 82 B backlight display 59 keyboard 25 backup profile, creating (Total Recall) 103 backup profile, restoring (Total Recall) 106 Bad Scan Bee
Index App Launch Keys icon 56 control panel accessing 51 applications 56 Display Properties 58 icons 52 keyboard properties 62 power management properties 74 stylus properties 77 CTRL Key 23 cycle tasks 42 F D HOME 23 HOME Key 23 data entering with a bar code reader 115 Data Bits 93 decoded (external) parameters 92 decoded scanners 87 DEL Key 23 desktop connection, remote 51 Device Name, changing 85 dialog box, using 45 Dim For, backlight 60 dismounting partitions 101 display appearance (colour scheme)
Index arrow keys 23 BKSP 23 BLUE key 22 CTRL 23 DEL 23 END 23 ESC 23 Function keys 24 HOME 23 INS 23 macro keys 24, 65 modifiers 21 navigating using the keyboard 33 one shot mode 64 ORANGE key 22 SHIFT 22 SPACE 23 TAB 23 Keyboard Properties 63 backlight 63 lock sequence 70 one shot mode 64 Keyboard Properties 62–70 Key Repeat tab 63 L LANAccessUsingPPP service, Bluetooth 82 Location 94 lock sequence, keyboard 70 M Macro keys accessing 24 executing a macro 66, 67 Macros menu, accessing 65 recording and
Index Bad Scan Beep 89 Cases 89 Click Data 88 Click Time 88 Command Prompt 40 Internet Explorer 40 Remote Desktop Connection 40 Windows Explorer 40 punctuation marks, accessing (SHIFT Key) 22 decoded 87 decoded (external) Serial Port 92 Display 88 Double Click 88 R radio Bluetooth 80–86 name servers 13 RA2041 (Summit) configuring 12 specifications 135 SCU 12 signal quality 26 Summit DC-802.11 SC CF radio (Model RA2041) configuring 12 specifications 135 802.
Index Set PIN, Bluetooth Controls 83 Settings Control Panel 43 Network and Dial-up connections 43 Run 43 Taskbar and Start Menu 43 SHIFT Key 22 Shutdown Bootloader 44 Cold Reset 45 Suspend 44 Warm Reset 45 Shutdown (Start Menu) 44 signal quality, radio 26 Simple Network Management (SNMP) See SNMP 93 SIP 60 SIP (Soft Input Panel 53 slot power status, built-in device, enabling 77 SNMP (Simple Network Management Protocol) 93 Communities 95 Contact 94 Contacts 94 Enable SNMP 95 Location 94 Name 95 Rights 95 So
Index U USB-Ethernet adaptor cable (WA4010) 116 User security level 39 V vehicle-mount installation 122 accessories list 118 cables 127 RAM Circular Base 123 RAM Vesa Base 123 W warm reset 16 Warm Reset (Shutdown menu) 45 Windows Embedded CE 5.0 dialog box 45 files, folders, & programs, working with 34 Windows Embedded CE 5.0, navigating in 33 Windows Explorer 40 Windows Start Menu See Start Menu Windows Vista® 11 1D internal scanner 28 802.