Thor vm3
Thor vm3
Thor vm3
User’s Guide
Disclaimer
Honeywell International Inc. (“HII”) reserves the right to make changes in specifications and other information contained in this
document without prior notice, and the reader should in all cases consult HII to determine whether any such changes have been
made. The information in this publication does not represent a commitment on the part of HII.
HII shall not be liable for technical or editorial errors or omissions contained herein; nor for incidental or consequential damages
resulting from the furnishing, performance, or use of this material.
This document contains proprietary information that is protected by copyright. All rights are reserved. No part of this document
may be photocopied, reproduced, or translated into another language without the prior written consent of HII.
© 2014-2016 Honeywell International Inc. All rights reserved.
Web Address: www.honeywellaidc.com.
Trademarks
RFTerm is a trademark or registered trademark of EMS Technologies, Inc. in the United States and/or other countries.
Microsoft® Windows, ActiveSync®, MSN, Outlook®, Windows Mobile®, the Windows logo, and Windows Media are registered
trademarks or trademarks of Microsoft Corporation.
Intel® and Atom™ are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other
countries.
Wi-Fi®, WMM®, Wi-Fi Mutlimedia™, Wi-Fi Protected Access®, WPA™, WPA2™ and the Wi-Fi CERTIFIED™ logo are trade-
marks or registered trademarks of Wi-Fi Alliance.
The Bluetooth® word mark and logos are owned by the Bluetooth SIG, Inc.
Symbol® is a registered trademark of Symbol Technologies. MOTOROLA, MOTO, MOTOROLA SOLUTIONS and the Stylized
M Logo are trademarks or registered trademarks of Motorola Trademark Holdings, LLC and are used under license.
RAM® and RAM Mount™ are both trademarks of National Products Inc., 1205 S. Orr Street, Seattle, WA 98108.
Other product names or marks mentioned in this document may be trademarks or registered trademarks of other companies
and are the property of their respective owners.
Patents
For patent information, please refer to www.hsmpats.com.
Table of Contents
i
Chapter 3 - Hardware Overview
System Hardware ................................................................................................................ 3-1
802.11a/b/g/n Wireless Client........................................................................................ 3-1
Central Processing Unit ................................................................................................. 3-1
Input/Output Components.............................................................................................. 3-1
System Memory............................................................................................................. 3-1
Video Subsystem........................................................................................................... 3-1
Audio Interface............................................................................................................... 3-1
Card Slots ...................................................................................................................... 3-1
Bluetooth........................................................................................................................ 3-1
Power .................................................................................................................................. 3-2
Vehicle DC Power Supply.............................................................................................. 3-2
External AC Power Supply ............................................................................................ 3-2
Uninterruptible Power Supply ........................................................................................ 3-2
Backup Battery .............................................................................................................. 3-3
Fuse............................................................................................................................... 3-4
Power Management Modes........................................................................................... 3-4
Power Controls .............................................................................................................. 3-4
External Connectors ............................................................................................................ 3-5
Serial Connector (COM1 and COM2)............................................................................ 3-5
USB Connector(s).......................................................................................................... 3-6
Ethernet Connector........................................................................................................ 3-6
CANbus / Audio Connector............................................................................................ 3-7
Power Supply Connector ............................................................................................... 3-7
Antenna Connections .................................................................................................... 3-7
Keyboard Options................................................................................................................ 3-9
USB Keyboards ............................................................................................................. 3-9
PS/2 Keyboards........................................................................................................... 3-11
USB Keyboard / Mouse ............................................................................................... 3-13
LED Functions ................................................................................................................... 3-13
System LEDs ............................................................................................................... 3-13
Connection LEDs......................................................................................................... 3-15
Keyboard LEDs............................................................................................................ 3-16
Display............................................................................................................................... 3-16
Touch Screen .............................................................................................................. 3-16
Touch Screen Defroster............................................................................................... 3-16
Screen Blanking........................................................................................................... 3-17
Display Backlight Control............................................................................................. 3-17
ii
Place Thor VM3 in the Dock................................................................................................ 4-2
Dock I/O Pin Cover. ....................................................................................................... 4-3
Padlock .......................................................................................................................... 4-3
Laptop Security Cable ................................................................................................... 4-3
Install RAM Mount ............................................................................................................... 4-4
Components - RAM Mounting Kits ................................................................................ 4-4
Procedure - RAM Mount Assembly ............................................................................... 4-7
Install U Bracket Mount ..................................................................................................... 4-13
Components - U Bracket Mounting Assembly ............................................................. 4-13
Procedure - U Bracket Assembly................................................................................. 4-13
Connect Cables ................................................................................................................. 4-16
Strain Relief Cable Clamps.......................................................................................... 4-16
Connect Power ............................................................................................................ 4-17
Power Cable Cautions ................................................................................................. 4-17
Connect USB Keyboard............................................................................................... 4-39
Connect PS/2 Keyboard .............................................................................................. 4-39
Connect USB Host....................................................................................................... 4-41
Connect USB Client..................................................................................................... 4-41
Connect Serial Device ................................................................................................. 4-41
Connect Headset Cable............................................................................................... 4-42
Connect CANbus Cable............................................................................................... 4-44
Install External Antenna............................................................................................... 4-44
Install Remote Antenna ............................................................................................... 4-45
Apply Touch Screen Protective Film ................................................................................. 4-48
Installation.................................................................................................................... 4-48
Removal....................................................................................................................... 4-48
Disconnect UPS Battery .................................................................................................... 4-49
Install mSATA Drive .......................................................................................................... 4-50
Equipment Required .................................................................................................... 4-50
Installation Procedure .................................................................................................. 4-50
Install SIM Card(s)............................................................................................................. 4-51
Equipment Required .................................................................................................... 4-51
Installation Procedure .................................................................................................. 4-51
Replace Front Panel.......................................................................................................... 4-53
Equipment Required .................................................................................................... 4-53
Replacement Procedure .............................................................................................. 4-53
Chapter 5 - Software
Introduction.......................................................................................................................... 5-1
Operating System................................................................................................................ 5-1
Windows Embedded Compact Operating System .............................................................. 5-1
General Windows Embedded Compact Keyboard Shortcuts ........................................ 5-1
Save Changes to the Registry ....................................................................................... 5-2
iii
Software Load ..................................................................................................................... 5-2
Software Applications .................................................................................................... 5-2
ActiveSync ..................................................................................................................... 5-2
RFTerm (Optional)......................................................................................................... 5-2
Enterprise TE (Optional) ................................................................................................ 5-2
Music Player .................................................................................................................. 5-2
Enterprise Client Pack ................................................................................................... 5-3
Thor VM3 Utilities ................................................................................................................ 5-3
LAUNCH.EXE................................................................................................................ 5-3
LAUNCH.EXE and Persistent Storage .......................................................................... 5-4
REGEDIT.EXE............................................................................................................... 5-5
WARMBOOT.EXE ......................................................................................................... 5-5
Thor VM3 Command-line Utilities .................................................................................. 5-5
Desktop ............................................................................................................................... 5-5
Desktop Icons ................................................................................................................ 5-5
My Device Folders ......................................................................................................... 5-6
Internet Explorer ............................................................................................................ 5-6
Start Menu ........................................................................................................................... 5-7
Communication.............................................................................................................. 5-7
Command Prompt.......................................................................................................... 5-7
Internet Explorer ............................................................................................................ 5-7
Media Player.................................................................................................................. 5-8
File Viewers ................................................................................................................... 5-8
Microsoft WordPad ........................................................................................................ 5-8
Remote Desktop Connection......................................................................................... 5-8
Settings.......................................................................................................................... 5-8
Windows Explorer.......................................................................................................... 5-8
Taskbar................................................................................................................................ 5-9
General .......................................................................................................................... 5-9
Advanced....................................................................................................................... 5-9
Thor VM3 OS Upgrade...................................................................................................... 5-11
Introduction .................................................................................................................. 5-11
Preparation .................................................................................................................. 5-11
Procedure .................................................................................................................... 5-11
BIOS .................................................................................................................................. 5-12
Accessing the BIOS Setup .......................................................................................... 5-12
iv
Control Panel..................................................................................................................... 5-13
About ........................................................................................................................... 5-15
Accessibility ................................................................................................................. 5-16
Battery ......................................................................................................................... 5-17
Bluetooth Printing ........................................................................................................ 5-18
Bluetooth Scanning...................................................................................................... 5-20
Certificates................................................................................................................... 5-23
Date / Time .................................................................................................................. 5-24
Dialing.......................................................................................................................... 5-24
Display ......................................................................................................................... 5-25
Enterprise Settings ...................................................................................................... 5-27
Error Reporting ............................................................................................................ 5-30
Input Panel................................................................................................................... 5-31
Internet Options ........................................................................................................... 5-32
Keyboard ..................................................................................................................... 5-34
Keyboard Remapper.................................................................................................... 5-35
Mixer ............................................................................................................................ 5-38
Mouse .......................................................................................................................... 5-39
Network and Dialup Connections ................................................................................ 5-40
Network Capture.......................................................................................................... 5-41
Options ........................................................................................................................ 5-43
Owner .......................................................................................................................... 5-45
Password ..................................................................................................................... 5-46
PC Connection............................................................................................................. 5-47
Peripherals................................................................................................................... 5-48
Power........................................................................................................................... 5-49
Power Configuration Mode .......................................................................................... 5-51
Regional Settings......................................................................................................... 5-54
Registry........................................................................................................................ 5-55
Remove Programs....................................................................................................... 5-56
Screen Control............................................................................................................. 5-57
Storage Manager ......................................................................................................... 5-58
Stylus ........................................................................................................................... 5-59
System......................................................................................................................... 5-60
Terminal Server Client Licenses.................................................................................. 5-61
Volume and Sounds .................................................................................................... 5-62
ZoomZone ................................................................................................................... 5-63
Automatic Firmware Update Utility .................................................................................... 5-65
Firmware Distribution Files .......................................................................................... 5-65
Update Process ........................................................................................................... 5-65
Configuration Cloning Utility (CCU) ................................................................................... 5-66
Configuration Cloning Utility GUI ................................................................................. 5-67
Chapter 6 - ActiveSync
Introduction.......................................................................................................................... 6-1
Initial Setup.......................................................................................................................... 6-1
v
Connect via Serial Port........................................................................................................ 6-1
Configure the serial port for ActiveSync ........................................................................ 6-1
Configure ActiveSync Settings ...................................................................................... 6-2
Configure PC Connection Settings ................................................................................ 6-2
Setup PC or Laptop ....................................................................................................... 6-2
Start the ActiveSync Connection ................................................................................... 6-3
Explore ................................................................................................................................ 6-3
Backup Data Files using ActiveSync ................................................................................... 6-3
Prerequisites.................................................................................................................. 6-3
Connect ......................................................................................................................... 6-3
Disconnect........................................................................................................................... 6-3
Reset and Loss of Host Re-connection ............................................................................... 6-3
ActiveSync Help .................................................................................................................. 6-3
vi
External 60-Key Keyboard................................................................................................... 8-4
60 Key KeyMap 101-Key Equivalencies........................................................................ 8-4
vii
viii
1
Thor VM3 Agency Information
Thor VM3 mobile computers meet or exceed the requirements of all applicable standards organizations for safe operation.
However as with any electrical equipment, the best way to ensure safe operation is to operate them according to the agency
guidelines that follow. Read these guidelines before using your Thor VM3.
This documentation is relevant for the following Thor models: VM3.
1-1
Le présent appareil est conforme aux CNR d'Industrie Canada applicables auxappareils radio exempts de licence.L'exploitation
est autorisée aux deux conditions suivantes: (1) l'appareil ne doit pas produire de brouillage, et (2) l'utilisateur de l'appareil doit
accepter tout brouillage adioélectrique subi, même si le brouillage est susceptible d'en compromettre le fonctionnement.
Conformité des appareils de radiocommunication aux limites d'exposition humaine aux radiofréquences (CNR-102)
L'ordinateur utilise des antennes intégrales à faible gain qui n'émettent pas un champ électromagnétique supérieur aux normes
imposées par Santé Canada pour la population. Consultez le Code de sécurité 6 sur le site Internet de Santé Canada à
l'adresse suivante : http://www.hc-sc.gc.ca/
L'énergie émise par les antennes reliées aux cartes sans fil respecte la limite d'exposition aux radiofréquences telle que définie
par Industrie Canada dans ldu document CNR-102, version 5.
This radio transmitter has been approved by Industry Canada to operate with the antenna types listed below with the maximum
permissible gain indicated. Antenna types not included in this list, having a gain greater than the maximum gain indicated for
that type, are strictly prohibited for use with this device.
Immediately following the above notice, the manufacturer shall provide a list of all antenna types approved for use with the trans-
mitter, indicating the maximum permissible antenna gain (in dBi).
5GHz Statement
UNII-1 Band (5150-5250 MHz) is in passive/listen mode only and will not actively initiate communication.
ANATEL (Brazil)
Este equipamento opera em caráter secundário, isto é, não tem direito a proteção contra interferência prejudicial, mesmo de
estações do mesmo tipo, e não causar interferência a sistema operando em caráter primário.
警告
此为 A 级产品,在生活环境中,该产品可能会造成无线电干扰,在这种情况下,可能需要用户对干扰采取切实可行的措施。
For proper and safe installation, the input power cable must be connected to a fused circuit on the vehicle. If the supply connec-
tion is made directly to the battery, the fuse should be installed in the positive lead within 5 inches (12.7 cm) of the battery’s pos-
itive (+) terminal. Use VM3055FUSEKIT (or equivalent) to install the fuse as shown below:
• For 12VDC input, use the 10A in VM3055FUSEKIT or a slow blow fuse that has a DC voltage rating greater than 12VDC.
• For 24VDC input, use the 6A in VM3055FUSEKIT or a slow blow fuse that has a DC voltage rating greater than 24VDC.
• For 36VDC input, use the 4A in VM3055FUSEKIT or a slow blow fuse that has a DC voltage rating greater than 36VDC.
• For 48VDC input, use the 3A in VM3055FUSEKIT or a slow blow fuse that has a DC voltage rating greater than 48VDC.
Li-Ion Battery
When disposing of the Thor VM3 UPS battery, the following precautions should be observed: The battery should be disposed of
properly. The battery should not be disassembled or crushed. The battery should not be heated above 212°F (100°C) or inciner-
ated.
1-2
Safety requirements restrict the temperature at which the Li-Ion UPS battery can be charged. Charging is disabled if the ambi-
ent temperature is outside of the -30ºC (-22ºF) to 50ºC (122ºF) safe charging range. In order to maintain UPS charge the Thor
VM3 should have power applied while the unit is within the safe charging range for at least an hour each day.
RF Safety Notice
This device is intended to transmit RF energy. For protection against RF exposure to humans and in accordance with
FCC rules and Industry Canada rules, this transmitter should be installed such that a minimum separation distance of at
least 20 cm (7.8 in.) is maintained between the antenna and the general population. .
Bluetooth
Class II
CE Mark
The CE marking on the product indicates that this device is in conformity with the following directives:
• 1999/5/EC R&TTE
• 2004/108/EC
• 2011/65/EU RoHS (Recast)
In addition, complies to 2006/95/EC Low Voltage Directive, when shipped with recommended power supply.
European contact:
Hand Held Products Europe BV
Lagelandseweg 70,
6545CG Nijmegen
The Netherlands
Honeywell shall not be liable for use of our product with equipment (i.e., power supplies, personal computers, etc.) that is not CE
marked and does not comply with the Low Voltage Directive.
Part
0560 Number
1-3
Dealer License - Republic of Singapore
Republic of Singapore - Dealer License Number DA104328 complies with IDA Standards.
Complies with
IDA Standards
DA104328
1-4
2
Getting Started
Overview
The Thor VM3 Vehicle Mount Computer (VMC) is a rugged, vehicle mounted computer running a Microsoft® Windows® Embed-
ded Compact 7 operating system and capable of wireless data communications from a fork-lift truck or any properly configured
vehicle. Wireless communications are supported over a 802.11 WLAN network and, optionally, over a WWAN network. The
Bluetooth® module supports Bluetooth printers and scanners.
CAUTION - Before shipping the Thor VM3, be sure to Disconnect UPS Battery (page 4-49) .
!
The Thor VM3 is designed for use with a vehicle dock. Two models of docks are supported, a Standard Dock (page 2-6) and an
Enhanced Dock (page 2-7). The dock installs in the vehicle and connects to vehicle power. The dock provides conditioned
input power for the Thor VM3. Peripheral connections are on the dock. The Thor VM3 is designed to easily be removed from
the dock with a latch on the lower rear of the Thor VM3 housing. Since the dock remains attached to the vehicle, the Thor VM3
computer can easily be moved from one vehicle equipped with a dock to another vehicle equipped with a dock.
The Thor VM3 contains a UPS battery which, when fully charged, can power the Thor VM3 for a minimum of 30 minutes. This
can be when the Thor VM3 is not attached to a dock or when the Thor VM3 is attached to a dock but the vehicle power is inter-
rupted, such as when the vehicle battery is being changed.
The Thor VM3 can be used with or without an external keyboard. There are 7 programmable keys (P1-P7) on the front bezel
and, when used with the Orange modifier key, provide 7 additional programmable keys (P8-P14).
Contact Technical Assistance (page 10-1) for information on the latest upgrades for your Thor VM3.
2-1
Out of the Box
The following items may be packaged separately:
• Thor VM3
• Standard or Enhanced Dock (includes 10-60VDC power cable)
• RAM or U-Bracket vehicle mount kit
If you ordered additional accessories for the Thor VM3, verify they are also included with the order. Keep the original packaging
material in the event the Thor VM3 should need to be returned for service. For details, see Product Service and Repair (page
10-1).
Hardware Setup
1. Install RAM Mount (page 4-4) or Install U Bracket Mount (page 4-13) to the vehicle.
2. Place Thor VM3 in the Dock (page 4-2).
3. Secure the optional external keyboard to either an integrated or remote mounting bracket.
4. Connect Cables (page 4-16) for any peripherals.
5. Connect Power (page 4-17).
6. Secure all cables in Strain Relief Cable Clamps (page 4-16).
7. Press the Power Switch (page 3-4) on the dock to the on position.
8. Press the Power Button (page 3-4) on the Thor VM3.
9. Perform touch screen Calibration (page 5-59).
Software
Languages
The Thor VM3 is shipped with a multi-language operating system. To change the language displayed, go to the User
Interface Language tab of the Regional Settings (page 5-54) control panel. Available languages are displayed in a
pull-down list. After selecting the desired language a reboot may be necessary. Use the Restart option on the
Registry (page 5-55) control panel to reboot.
First Boot
When a new Thor VM3 starts up a EULA (End User License Agreement) may be displayed on the touch screen. It
remains on the screen until the Accept or Decline button is tapped with a stylus.
Tap the Accept button to accept the EULA terms and the Thor VM3 continues the startup process. The EULA is not
presented to the user again.
Tap the Decline button to decline the EULA and the Thor VM3 reboots. It will continue to reboot until the Accept but-
ton is tapped with the stylus.
Software Setup
Hardware setup should be completed before starting software setup.
2-2
Dock
The Thor VM3 assembly consists of two parts, the Thor VM3 computer and the dock. The Thor VM3 contains an internal UPS
battery that, once fully charged, powers the Thor VM3 for a minimum of 30 minutes when the unit is not mounted in the dock.
All docks provide:
• A mount for the Thor VM3 computer. The dock attaches to a vehicle via a RAM or U-bracket mount or to a RAM table stand
for use in an office environment.
• Conditioned power for the Thor VM3. The dock accepts 10-60VDC power input directly or 50-150VDC power input with a DC/
DC converter.
• Mobility of the Thor VM3, since the dock remains attached to the vehicle the Thor VM3 computer can easily be moved from
one vehicle equipped with a dock to another.
• Several I/O ports as described in the table below.
• Strain relief provisions for cables.
• Headset connection via an adapter cable. When a headset is not attached, the microphone and speakers on the Thor VM3
are active.
There are three type of docks available for the Thor VM3. Features of the docks are described below:
2-3
Additional Connectors
External antenna connectors may be present on the back of the Thor VM3. The connectors may include:
• 802.11 antenna connectors, used when the Thor VM3 is not equipped with internal antennas.
• External GPS antenna connector, when the Thor VM3 is equipped with GPS.
• External WWAN antenna connectors, when the Thor VM3 is equipped with WWAN. Optional WWAN radio (available in North
America, Europe, New Zealand, and Australia only).
Components
Front View - Thor VM3
Microphone
Power Ambient
Button Light
Sensor
Speakers
2-4
Back View - Thor VM3
External Antenna Connectors
WWAN
Antenna
Cable
Access
Panel
Card
and
mSATA
Access
Panel
Dock
Contact
Pads
Provision for
Laptop Security
Cable
2-5
Front View - Dock
Standard Dock
Dock
Contact
Pads
Enhanced Dock
The Enhanced Dock has a foam surround around the dock contact pad.
Dock
Contact
Pads
Foam
Surround
RAM
Ball
Strain Relief
Clamps
Fuse
COM 1
Power
Connector COM2
CANbus
/ Audio
2-6
Enhanced Dock
Strain Relief RAM
Clamps Ball
Accessory Accessory
Mount Mount
CANbus
/ Audio
Fuse
COM2
Power Switch
COM1
Power
Connector USB1
Note: For the VMX Enhanced Dock: COM1 is used for screen blanking (via the power cable connector) and is
unavailable when the screen blanking box is attached. When a screen blanking box is attached, any external
serial device such as a scanner, must be connected to the COM2 port on the dock. If a screen blanking box is
not connected via the power cable, the COM1 port on the dock is available for a serial device
2-7
Backlights and Indicators
Display Backlight
There are several configuration options for the Thor VM3 display backlight:
Power Management
The display backlight is controlled by power management. When the user activity timer expires, the display backlight is
turned off. Timeouts can be set for the available power management schemes.
See Power (page 5-49) for configuration options.
Backlight Brightness
The intensity of the display backlight can be manually configured:
1. Press the Blue key to enter Blue mode
2. Press the P5 key to increase backlight brightness or the P6 key to decrease backlight brightness.
3. Press the Blue key to exit Blue mode.
Refer to the Screen Control (page 5-57) panel for the current display brightness level.
Screen Blanking
The Thor VM3 can be configured to blank (blackout) the display while the vehicle is in motion.
Refer to ZoomZone (page 5-63) for information.
Keypad Backlight
By default, the integrated keypad backlight follows the display backlight. The integrated keypad backlight can be disabled.
To change this behavior, see the Misc tab of the Options (page 5-43) control panel.
The external USB keyboard backlight is manually controlled.
Speaker Volume
The speaker volume can be adjusted via the Thor VM3 keypad:
1. Press the Blue key to enter Blue mode
2. Press the P1 key to increase speaker volume or the P2 key to decrease speaker volume.
3. Press the Blue key to exit Blue mode.
The current volume level can be viewed on the Mixer (page 5-38) control panel. This control panel can also be used to
adjust speaker volume.
2-8
Power Up
If a USB drive, such as a thumb drive is attached to the Thor VM3, the device may attempt to boot from the USB drive.
! Remove the USB drive and power up the Thor VM3 again.
The “On” side of this rocker switch has a raised bump to allow the state of the switch to be determined when the switch may not
be easily viewed, for example, after the dock is mounted in a vehicle.
After external power has been connected and the Thor VM3 has been mounted in the dock, press the side of the power switch
with the raised bump to pass power from the dock to the Thor VM3.
Next locate the power button on the front of the Thor VM3.
Press the power button to turn the Thor VM3 on. When the Windows desktop is displayed or an application begins, the power up
sequence is complete.
See Power Controls (page 3-4) for more information.
2-9
Rebooting the Thor VM3
If a USB drive, such as a thumb drive is attached to the Thor VM3, the device attempts to boot from the USB drive:
! • If the USB drive contains a bootable sector, the Thor VM3 boots from the USB drive.
• If the USB drive does not contain a bootable sector, the Thor VM3 may not boot. Remove the USB drive and boot
the Thor VM3 again.
Warmboot
A warmboot reboots the Thor VM3 without erasing any registry data. Configuration settings and data in RAM are pre-
served during a warmboot. Network sessions are lost and any data in running applications that has not been previ-
ously saved may be lost. CAB files already installed remain installed.
There are several warmboot methods available:
• Using the Registry, select Start > Settings > Control Panel > Registry and tap the Warmboot button. The Thor
VM3 immediately warmboots.
• Using the Start menu, select Start > Run and type WARMBOOT in the text box. Press Enter. The Thor VM3
immediately warmboots. The WARMBOOT text command is not case-sensitive.
• Use the P1 + P7 + Orange key press sequence to reboot the Thor VM3. The keys must be pressed in sequence;
they do not need to be held down simultaneously.
Restart
A restart reboots the Thor VM3 without erasing any registry data. Configuration settings are preserved during a
restart. Network sessions are lost and any data in running applications that has not been previously saved may be
lost. The contents of RAM are erased and the operating system and CAB files are reloaded.
To initiate a restart:
• Using the Registry, select Start > Settings > Control Panel > Registry and tap the Restart button. The Thor VM3
immediately restarts.
• Using the Start menu, select Start > Run and type RESTART in the text box. Press Enter. The Thor VM3
immediately restarts. The RESTART text command is not case-sensitive.
Clearing Persistent Storage / Reset to Default Settings
Use the Registry control panel Load Factory Defaults button to set the Thor VM3 registry back to factory defaults. No
other clearing is available or necessary.
Never use an actual pen, pencil, or sharp/abrasive object to write on the touch screen.
Hold the stylus as if it were a pen or pencil. Touch an element on the screen with the tip of the stylus then remove the stylus from
the screen.
Firmly press the stylus into the stylus holder when the stylus is not in use.
Using a stylus is similar to moving the mouse pointer then left-clicking icons on a desktop computer screen.
Using the stylus to tap icons on the touch screen is the basic action that can:
• Open applications
• Choose menu commands
• Select options in dialog boxes or drop-down boxes
• Drag the slider in a scroll bar
• Select text by dragging the stylus across the text
• Place the cursor in a text box prior to typing in data
• Place the cursor in a text box prior to retrieving data using a scanner/imager.
A right-click can be simulated by touching the touch screen with the stylus and holding it for a short time.
A stylus replacement kit is available.
2 - 10
Setup Terminal Emulation Parameters
The Thor VM3 offers both RFTerm and Enterprise TE. For details on configuring these terminal emulators, refer to the appropri-
ate user’s guide at www.honeywellaidc.com.
Cleaning
Cleaning the Thor VM3 and the Dock
Dampen a cloth with the cleaner and then wipe the surface. Do not spray the cleaner directly onto the Thor VM3 or the
dock. Avoid harsh chemicals. The following cleaners are recommended:
• Windex® Glass Cleaner
• Formula 409® All-Purpose Cleaner or Glass and Surface Cleaner
• Fantastik® All Purpose Cleaner
• Liquid hand soap
Keep rough or sharp objects away from the Thor VM3 touch screen and, if installed, the bar code reader scanning aperture.
If the glass becomes soiled or smudged, clean only with a standard household cleaner such as Windex® without vinegar or
use isopropyl alcohol. Dampen the cloth with the cleaner and then wipe the surface.
Do not use paper towels or harsh-chemical-based cleaning fluids since they may result in damage to the glass surface. Use
a clean, damp, lint-free cloth.
Do not scrub optical surfaces. If possible, clean only those areas which are soiled. Lint and particulates can be removed
with clean, filtered canned air.
Startup Help
Contact Technical Assistance (page 10-1) if you need more help.
Thor VM3 seems to lockup as soon There may be slight delays while the wireless client connects to the network, authoriza-
as it is rebooted. tion for voice-enabled applications complete, and Bluetooth relationships establish or re-
establish.
When an application begins, the Thor VM3 is ready for use.
2 - 11
2 - 12
3
Hardware Overview
System Hardware
802.11a/b/g/n Wireless Client
The Thor VM3 has an 802.11a/b/g/n network card that supports diversity with two internal or external antennas. Power
management for the network card is configured with the Wireless Configuration Utility (page 6-1).
Input/Output Components
The Thor VM3 supports the following I/O components of the core logic:
• Two 9-pin RS-232 serial ports, COM1 and COM2, on dock.
• One slot for mSATA card for operating system storage.
• Second slot for mSATA memory card for storage expansion.
• Integrated keyboard with programmable keys.
• Ports available via adapter cables on dock: USB host port, CANbus, Audio. Direct connections on Enhanced Dock:
Ethernet and USB host.
System Memory
Main system memory is 2 or 4 GB SDRAM.
Video Subsystem
The Thor VM3 video subsystem consists of a color TFT display. The video subsystem complies with the VESA VL bus
standard. The resolution of this display is 800 x 600 or 1024 x 768 pixels. This resolution complies with the SVGA graphics
industry standard.
The display supports screen blanking to eliminate driver distraction when the vehicle is in motion.
Audio Interface
Speakers are located on the bottom front of the Thor VM3. A headset adapter cable provides a connection for headset
operation. When a headset is plugged into the adapter cable, the main speakers are disabled.
A microphone is located at the upper right of the Thor VM3 display, near the Thor VM3 emblem. When a headset is
plugged into the adapter cable, the internal microphone is disabled.
Card Slots
mSATA Slots
There are two mSATA slots. The lower slot contains an mSATA card loaded with the operating system.
The upper slot is available for a user installable mSATA card for storage expansion.
Bluetooth
The Thor VM3 contains Bluetooth version 2.0 with Enhanced Data Rate (EDR) up to 3.0 Mbit/s over the air. Bluetooth
device connection (or pairing) can occur at distances up to 32.8 ft (10 meters) Line of Sight. The wireless client retains
wireless connectivity while Bluetooth is active.
The user cannot select PIN authentication or encryption on connections from the Thor VM3. However, the Thor VM3 sup-
ports authentication requests from pairing devices. If a pairing device requests authentication or encryption, the Thor VM3
displays a prompt for the PIN or passcode. Maximum encryption is 128 bit. Encryption is based on the length of the user’s
passcode.
3-1
Bluetooth simultaneously supports one printer as a slave Bluetooth device and one scanner, either as a slave or as a mas-
ter Bluetooth device.
• The LED on the Bluetooth scanner illuminates during a scanning operation.
• Multiple beeps may be heard during a bar code scan using a mobile Bluetooth scanner. The mobile Bluetooth scanner
may beep as the bar code data is accepted/rejected and the Thor VM3 may beep during final bar code data manipulation.
Power
Vehicle DC Power Supply
Vehicle power input for the Thor VM3 dock is 10V to 60V DC and is accepted without the need to perform any manual oper-
ation within the Thor VM3 dock, see 12-48 VDC Vehicles (10-60 VDC Direct Connection) (page 4-18). The dock provides
a conditioned power output for the Thor VM3. By using a specified DC/DC power supply, input voltage of 50-150V DC can
be accepted, see 60-144 VDC Vehicles (50-150 VDC Power Supply, Screws on Top of Lid) (page 4-26) or 60-144 VDC
Vehicles (50-150 VDC Power Supply, Screws on Top of Lid) (page 4-26).
Power input is fused for protection and the fuse is externally accessible, see Fuse (page 3-4).
3-2
Charging and Power Management
• Charging does not occur when the Thor VM3 is in ignition mode and the ignition is inactive.
• Charging of the UPS battery continues when the Thor VM3 is in power management (user idle, system idle or
suspend modes).
Backup Battery
The Thor VM3 has a permanent Lithium battery installed to maintain time, date and CMOS setup information for a minimum
of 90 days. The lithium battery is not user serviceable and should last four years with normal use before it requires replace-
ment.
Note: The backup battery should only be changed by authorized service personnel.
3-3
Fuse
The Thor VM3 uses an 8A time delay (slow blow) fuse that is externally
accessible and user replaceable. The fuse is located on the back of the
dock. The fuse is accessed by unscrewing the cap as indicated.
Should it need replacement, replace with same size, rating and type of
fuse:
• Littelfuse 0215008.MXP
• Cooper Bussmann BK1/S506-8-R
• Bel Fuse 5HT 8-R
or equivalent.
Fuse has voltage on it even when power is off. Always disconnect input
power before changing the fuse.
If the Thor VM3 is On, pressing the power button places the unit in
Suspend.
3-4
External Connectors
Power the Thor VM3 off before attaching a cable to any port (serial, USB, Audio/CAN, etc.).
The external I/O connectors for the Thor VM3 are located on the right side of the Quick Mount Smart Dock (when viewed from
the back).
The Power Supply Connector (page 3-7) is on the left side of the dock (when viewed from the back).
Antenna connectors are located on the top rear of the Thor VM3.
Enhanced Dock
Screen Blanking
The screen blanking signal can be provided either by a Honeywell Screen Blanking Box or a user supplied switch or
relay. See Screen Blanking (page 4-32) for information on connecting screen blanking accessories.
3-5
USB Connector(s)
The USB or USB1 connector is a D-9 female connec-
tor located on the back of the Quick Mount Smart
Dock. See USB and USB1 Connector (page 9-7) for
COM1 connector pinout detail.
CANBUS/AUDIO
Standard Dock
Enhanced Dock
An additional USB host port is located on the top of the Enhanced Dock. Lift the cover to access the USB port.
Ethernet Connector
An Ethernet port is located on the top of the Enhanced Dock. Lift the cover to access the Ethernet port.
3-6
CANbus / Audio Connector
The CANbus/Audio connector is a D-15 male connec-
tor located on the back of the Quick Mount Smart
Dock.
COM1 The connector supports a headset adapter cable or a
CANbus cable. The Thor VM3 does not support con-
necting audio and CANbus simultaneously.
COM2 See CANbus / Audio Connector (page 9-11) for con-
nector pinout detail.
A headset cable attaches to the CANbus / Audio con-
USB
nector and provides a quick connect connection for a
headset. See Connect Headset Cable (page 4-42) for
more information.
CANBUS/AUDIO
The CANbus Y cable has a 9 pin F SAE J1939
Standard Dock (Deutsch) and 9 pin M SAE J1939 (Deutsch) connec-
tor. See Connect CANbus Cable (page 4-44) for more
information.
Enhanced Dock
The CANbus interface is a virtual COM port. This port
can be accessed using standard Windows API calls.
Antenna Connections
1 2 3 4 5 1. WI-FI (MAIN) 802.11 Main
External Antenna Connector
2. WAN (MAIN) (Blue label) Main
WWAN Antenna Connector
The Thor VM3 is equipped with an 802.11 radio and can be ordered with internal 3. GPS (Green label) GPS
Antenna Connector
antennas, external antennas or external remote mount antennas. When the Thor VM3
is ordered with internal antennas, the external antenna connectors are not used. GPS 4. WAN (AUX) (Blue label)
and WWAN are optional on the Thor VM3 and require external remote mount anten- Auxiliary WWAN Antenna
nas. Connector
5. WI-FI (AUX) 802.11 Auxiliary
External Antenna Connector
3-7
External Antenna Connector
When the Thor VM3 is ordered with the internal antenna option, the 802.11 antenna connectors on
the back are not connected to the 802.11 radio. Instead the internal antenna connector is connected
to the 802.11 radio.
Remove the rubber cap, if present, from the antenna connector before connecting an external
antenna.
3-8
Keyboard Options
The integrated keypad contains seven programmable keys, a blue modifier key and an orange modifier key.
The P1 though P7 keys are user programmable.
• When used with no modifier key, P1 through P7 can be configured for a user programmable function.
• When used with the Orange modifier key, P1 through P7 provide secondary programmable keys, P8 through P14, and
can be configured for a user programmable function.
• The programmable keys can be remapped to provide a single keypress, a string of keypresses or to execute an
application or command. Key remapping is configured via the Keyboard Remapper (page 5-35) option in the Control
Panel.
• Programmable keys persist across a warmboot or power cycle.
• When used with the Blue modifier key, P1 and P2 keys are used to adjust speaker volume and P5 and P6 keys are used
to adjust display brightness.
USB Keyboards
Two Honeywell ruggedized USB keyboards are available, 95-key alphanumeric and 21-key numeric.
95-Key USB Keyboard
The 95-key USB keyboard may have any of the following markings on the decal on the back of the keyboard:
• 164288-0001
• 95 KEY USB
• 9000160KEYBRD
If the keyboard looks similar but has a different part number refer to 95-key PS/2 Keyboard (page 3-11).
If the keyboard is labeled as 164288-0001 Revision B (or greater ) the keyboard has sticky keys for Alt, Ctrl and Shift.
These keys will remain active for the next keypress. Earlier versions of this keyboard (Revision A) do not have sticky
keys implemented.
Print
Esc F1 F2 F3 F4 F5 F6 F7 F8 F9 F10 F11 F12 Screen Scroll Pause Fn
SysRq Lock Break
~ _ +
! @ # $ % ^ & * ( ) BackSpace Num / * -
` 1 2 3 4 5 6 7 8 9 0 - = Lock
Tab Q W E R T Y U I O P { } | 7 8 9 +
[ ] \ Home PgUp
L R
3-9
The Thor VM3 uses an optional rugged QWERTY 95 key keyboard, designed for ease of use with the Windows oper-
ating system. The USB keyboard connects directly to the D9 USB connector (Standard Dock) or USB1 connector
(Enhanced Dock).
• The 95 key keyboard supports all 104 keyboard functions (101 standard keyboard plus Windows keys) and includes
an integrated pointing device and left and right mouse buttons. However, because the keyboard only has 95 keys,
all functions are not visible (or printed on the keyboard). Therefore the keyboard supports what is called hidden keys
- keys that are accessible but not visible on the keyboard.
• The 95 key keyboard keys are backlit. The keyboard backlight is manually controlled.
Keyboard Backlight
The keyboard backlight key in the top right hand corner has a light bulb icon.
The keyboard keys are backlit. The keyboard backlight is manually controlled using the backlight key in the upper
right hand corner of the keyboard. Pressing the backlight key cycles the keyboard backlight through the levels of
backlight intensity: Off, Low intensity, Medium intensity, Maximum intensity, Off, etc. When the Thor VM3 is pow-
ered on, the keyboard backlight defaults to Off.
Since the keyboard is a USB device, by default the external keyboard backlight is turned off when the Thor VM3
enters Suspend. This behavior can be changed by enabling USB power in Suspend on the Misc tab of the
Options (page 5-43) control panel.
21-key Numeric Keypad
A numeric keypad is available for the Thor VM3 in applications where a full keyboard may not be needed. The USB
keyboard connects directly to the D9 USB connector (Standard Dock) or USB1 connector (Enhanced Dock).
Keyboard Backlight
The keyboard backlight key has a light bulb icon.
The keyboard keys are backlit. The keyboard backlight is manually controlled using the backlight key in the upper
right hand corner of the keyboard. Pressing the backlight key cycles the keyboard backlight through the levels of
backlight intensity: Off, Low intensity, Medium intensity, Maximum intensity, Off, etc. When the Thor VM3 is pow-
ered on, the keyboard backlight defaults to Off.
Since the keyboard is a USB device, by default the external keyboard backlight is turned off when the Thor VM3
enters Suspend. This behavior can be changed by enabling USB power in Suspend on the Misc tab of the
Options (page 5-43) control panel.
The PF key can be programmed using the Keyboard Remapper (page 5-35) control panel.
3 - 10
PS/2 Keyboards
Legacy PS/2 keyboards can be used with the Thor VM3 via a USB to PS/2 adapter cable. PS/2 keyboards are available in
60-key and 95-key versions and were used with the VX6, VX7, Thor VX8 or Thor VX9.
Note: The PS/2 adapter cable does not work with the Thor VM3 and the VM1D Standard Dock. The PS/2 adapter cable
works with either the VM3D or VMXD Enhanced Docks.
Print
Esc F1 F2 F3 F4 F5 F6 F7 F8 F9 F10 F11 F12 Screen Scroll Pause Fn
SysRq Lock Break
~ _ +
! @ # $ % ^ & * ( ) BackSpace Num / * -
` 1 2 3 4 5 6 7 8 9 0 - = Lock
Tab Q W E R T Y U I O P { } | 7 8 9 +
[ ] \ Home PgUp
L R
3 - 11
60-key PS/2 Keyboard
The 60-key PS/2 keyboard is part number 160068-0001 (see decal on back of keyboard).
An adapter cable is required to attach this keyboard to the Thor VM3. See Secure the cable to the Thor VM3 with
Strain Relief Cable Clamps (page 4-16). (page 4-39) for details.
The 60-key keyboard has 101 keyboard functions, including a numeric keyboard pad.
Key Maps
The 60-key keyboard supports all 101 keyboard functions. However, because the keyboard only has 60 keys, all
functions are not visible (or printed on the keyboard). Therefore the Thor VM3 keyboard supports what is called
hidden keys - keys that are accessible but not visible on the keyboard.
On standard keyboards many keys are found in the Alphanumeric section as well as on the Numeric keypad (i.e.
the 1 key is found on the numeric keypad and above the alpha characters on standard keyboards). However these
keys send distinctly different scan codes when the keys are pressed. The default codes for the Thor VM3 number
keys correspond to the numeric keypad on standard keyboards. In order to duplicate the codes sent when the
alphanumeric key is pressed, the hidden keystroke must be used.
Refer to External 60-Key Keyboard (page 8-4) for keymaps.
NumLock
The 60-key keyboard does not have a NumLock indicator or key. NumLock can be toggled On or Off using the 2nd
SHIFT F10 keypress sequence.
Keyboard Backlight
The keyboard keys are backlit with LEDs. The backlight is manually controlled using the 2nd + CTRL + F10 key-
press sequence. The keyboard backlight is off when the Thor VM3 is powered up. The backlight must be manu-
ally turned on with the 2nd + CTRL + F10 key sequence.
Control Keys
The VMT keyboard has several control keys. Because of the construction of the Thor VM3 and the Microsoft Win-
dows operating system, many of the Control Keys are not used on the Thor VM3.
• The 2nd functions of the F4 and F5 keys are not used as the display brightness is adjusted via the buttons on
the Thor VM3.
• The 2nd functions of the F6 and F7 keys are not used as the Thor VM3 has TFT LCD screen with no provision
for contrast adjustments.
• The 2nd functions of the F8 and F9 keys are not used as the sound volume on the Thor VM3 is controlled with
the Sound icon in the Microsoft Windows System Tray.
• The F10 key is used to toggle the backlight as part of the keypress sequence 2nd + CTRL + F10. This key
sequence immediately toggles the status of the keyboard backlight. Pressing 2nd + F10 has no effect on the
keyboard backlight.
Keyboard LEDs
CAPS LED
This LED indicates the state of the keyboard CapsLock mode. If CapsLock is enabled this LED is illuminated
green. When CapsLock is off, the LED is dark.
Press 2nd then F1 to toggle CapsLock On and Off.
The default value of CapsLock is Off.
3 - 12
Secondary Keys LED
The VMT keyboard is equipped with several secondary keys. These keys are identified by the superscripted
text found on the keyboard keys. The secondary keys are accessible by using two (2) keystrokes: the 2nd key
followed by the superscripted key.
Once the 2nd state is enabled (by pressing the 2nd key) the Secondary Mode LED is illuminated and the 2nd
state is enabled until another key is pressed. The 2nd key is toggled on with a 2nd keypress and then immedi-
ately off with another 2nd keypress.
• Press 2nd and F1 to turn CapsLock on and off.
• Press 2nd and ↑ (up arrow) to initiate the PgUp command.
• Press 2nd and Q to type the “!” key.
• Press 2nd and BkSp to enter the Insert (Ins) mode.
LED Functions
Programmable LED
System LEDs
SYS (System Status) LED
SYS
UPS (Uninterruptible Power Supply) LED UPS
SS D
SSD (Solid State Drive) LED
3 - 13
LED Behavior System State
Green blinking very slowly
External power present • Suspend
(1/2 sec. on, 4 1/2 sec. off)
Off
External power present • Off
Off • Suspend
External power not present • Off
Off
External power not present • SuspendOff
Charging State
LED Behavior Status
Slow Blink Charging
(1 sec. on, 3 sec. off)
Fast Blink UPS supplying power and discharging
(1/2 sec. on, 1/2 sec. off)
On Neither charging or discharging
Off Unit is off or is in Suspend
UPS Unavailable
LED Behavior Status
Super-Fast Blink • Out of charging temperature range
(1/8 sec. on, 1/8 sec. off) • Charge timeout
• UPS is not installed
3 - 14
Connection LEDs
WWAN LED
Wi-Fi LED Wi Fi
Bluetooth LED
WWAN LED
LED Behavior Status
Solid Green Indicates a WWAN connection to a network
Off Indicates no WWAN connection
Wi-Fi LED
LED Behavior Status
Solid Green Indicates a connection with an IP address to an Access Point
Off Indicates no connection to an Access Point
Bluetooth LED
LED Behavior Status
On Bluetooth hardware is on
Off Bluetooth hardware has been turned off
3 - 15
Keyboard LEDs
The keyboard LEDs are located near the specified key.
Blue LED
Solid Blue • Indicates the Blue modifier key is active
• Pressing the Blue key a second time exits this modifier mode and turns off the LED
• Pressing the Orange key exits the Blue mode and turns off the Blue LED
• When Blue mode is active, keys P1 and P2 provide volume adjustment and keys P5 and
P6 provide brightness adjustment functions
Off Blue mode is not invoked
Orange LED
LED Behavior Status
Solid Orange • Indicates the Orange modifier key is active. Orange mode is invoked for the next keypress
only
• Pressing the Orange key a second time exits this modifier mode and turns off the LED
• Pressing the Blue key exits the Orange mode and turns off the Orange LED
Off Orange mode is not invoked.
Programmable LED
The Programmable LED is available for user applications. The LED defaults to Off unless activated by user applica-
tion.
Display
The display is a thin-film transistor display capable of supporting SXGA graphics modes. Display size is 1024x768 pixels. The
display covering is designed to resist stains. The display supports screen blanking to eliminate driver distraction when the vehi-
cle is in motion.
Touch Screen
The touch screen is a Resistive Panel with a scratch resistant finish that can detect touches by a stylus, and translate them
into computer commands. In effect, it simulates a computer mouse. Only Delrin or plastic styluses should be used. A right
mouse click is simulated by touching and holding the screen for the appropriate time interval.
When a dialog box is too large for the display, tap and drag the dialog box up or down or from side to side to view the
remainder of the dialog box.
Always use the point of the stylus for tapping or making strokes on the display. Never use an actual pen, pencil, sharp or
abrasive object to write on the touch screen.
An extra or replacement stylus may be ordered.
A replaceable touch screen protective film is available when the Thor VM3 is used in an abrasive environment. Contact
Technical Assistance (page 10-1) for availability.
Note: If the touch screen is disabled or loses calibration on a Thor VM3, you must use a USB mouse or keyboard attached
to the Thor VM3 to access the control panel to re-enable or recalibrate the touch screen unless a programmable key
has been assigned to that function.
3 - 16
Screen Blanking
Screen blanking (blackout) can be enabled when the vehicle is in motion. See Screen Blanking (page 4-32) for hardware
setup and Screen Control (page 5-57) for software setup to enable screen blanking. Once screen blanking is enabled, the
display is blanked out any time when the cable sends the signal that the vehicle is in motion. If the cable is removed,
screen blanking is disabled and the display remains on.
3 - 17
3 - 18
4
Vehicle Mounting and Accessory Installation
Introduction
The Thor VM3 is designed to be mounted to a Smart Dock in a vehicle with either a RAM mount or U Bracket system. A power
cable is provided with the Thor VM3 dock. An optional 21 key numeric or 95 key laptop-style USB keyboard and keyboard
mounts are available. An integrated scanner mount is also offered. Optional communication cables are available.
Vehicle mounting brackets are specifically designed for vehicle mount applications. The vehicle mounted assembly restrains the
Thor VM3 and isolates it from shock and vibration. A RAM metal table stand is available to secure the Thor VM3 and dock when
in an office environment, for example.
The vehicle mount holds the dock and the Thor VM3 attaches to the dock. The dock remains attached to the vehicle, however,
the Thor VM3 has a quick release located on the lower rear side that allows the Thor VM3 to easily be removed from the dock.
The Thor VM3 can be operated for a minimum of 30 minutes from an internal UPS battery when not attached to a dock. The
Thor VM3 can be transferred from one dock equipped vehicle to another for easy portability. The dock provides accessory
attachment and conditioned power for the Thor VM3.
Overhead, dash and roof support pillar mounting is via a RAM Mount or U-bracket accessory which includes all the hardware
required for vehicle mounting.
Never put the Thor VM3 into the vehicle mounted assembly until the assembly is securely fastened to the vehicle.
Quick Start
The following list outlines, in a general way, the process to follow when mounting the Thor VM3 in a vehicle. Refer to the fol-
lowing sections in this document for more details.
1. Install RAM Mount (page 4-4) or Install U Bracket Mount (page 4-13) to the vehicle.
2. Place Thor VM3 in the Dock (page 4-2).
3. Secure accessories such as an optional external keyboard or a scanner holder to either an integrated or remote
mounting bracket.
4. Adjust the Thor VM3 to the best viewing angle.
5. Install Remote Antenna (page 4-45) or Install External Antenna (page 4-44) if necessary.
6. Connect Cables (page 4-16) for any peripherals.
7. Connect vehicle power:
• 12-48 VDC Vehicles (10-60 VDC Direct Connection) (page 4-18)
• 60-144 VDC Vehicles (50-150 VDC Power Supply, Screws on Top of Lid) (page 4-26)
• 60-144 VDC Vehicles (50-150 VDC Power Supply, Screws on Side of Lid) (page 4-23).
• Thor VX8 / Thor VX9 Adapter Cable (page 4-30)
• VX6 / VX7 Adapter Cable (page 4-29)
4-1
Maintenance - Vehicle Mounted Devices
Check the vehicle mounting hardware frequently and re-tighten if necessary.
If the vehicle mounting hardware and connections become broken, loose or cracked, the assembly must be taken out of service
and replaced. Contact Technical Assistance (page 10-1) for help.
Cleaning
If it becomes necessary to clean the Thor VM3, dock, peripherals or mounting hardware see:
• Cleaning the Thor VM3 and the Dock (page 2-11)
• Cleaning the Touch Screen (page 2-11)
Release Lever
4-2
Dock I/O Pin Cover.
The dock contains a tethered I/O Pin Cover to protect the I/O pins on the dock when
a Thor VM3 is not mounted in the dock.
• When the Thor VM3 is not installed in the dock, use the I/O Pin Cover to protect
the pins on the dock as shown.
• When a Thor VM3 is installed in the dock, the I/O Pin Cover can be placed out of
the way behind the dock.
Padlock
It may be desirable to secure the Thor VM3 in the dock so it cannot be
removed from the dock. The quick release handle on the Thor VM3 is
notched to allow a user supplied standard padlock to be placed through a
hole in the bracket on the back of the Thor VM3 in the location shown
below. Once the padlock is installed, the release handle cannot be moved
so the Thor VM3 cannot be removed from the dock. The padlock shackle
must be smaller than 3/16” (4.76mm).
A cable tie wrap can be used instead of a padlock if desired.
4-3
Install RAM Mount
CAUTION - This device is intended to transmit RF energy. For protection against RF exposure to humans and in accor-
dance with FCC rules and Industry Canada rules, this transmitter should be installed such that a minimum separation dis-
tance of at least 20 cm (7.8 in.) is maintained between the antenna and the general population. This device is not to be
co-located with other transmitters.
Before installation begins, verify you have the applicable vehicle mounting bracket assembly components necessary, as shown
in the following figures.
4-4
• RAM Plate mount with RAM Ball (Size D) with Hardware (cone washers
and nuts) to attach Ball to Plate
RAM Ball (Size C) with hardware (nuts) to attach RAM ball to Keyboard
Mounting Bracket
Keyboard Mounting Plate with RAM Ball (Size C) and hardware (screws
and washers) to attack Keyboard to Mounting Plate
4-5
RAM Ball (Size C) to attach RAM ball to 21key numeric keyboard or scan-
ner holder.
4-6
Procedure - RAM Mount Assembly
Equipment Needed: Sockets, screwdriver and a Torque wrench capable of measuring to 50 inch pounds (5.64±.56 N/m).
Note: Torquing tool is not supplied by Honeywell. Tools needed to attach the RAM Clamp Mount to the vehicle are not
supplied by Honeywell.
Torque Measurement
You will need a torquing tool capable of torquing to 20 inch pounds (1.10 N/m). Torque all screws and bolts according
to the following table:
1. Determine the position for mounting the RAM ball base. Be sure to position the RAM bracket to allow access to
the switches and ports on the bottom of the Thor VM3.
2. Attach the RAM ball base to the vehicle mounting surface using three or four 1/4 bolts (not included) or equivalent
fasteners. If the mounting kit includes cone washers, use those as illustrated below.
IMPORTANT: Mount to the most rigid surface available.
Mounting Dimensions
Note: Drill and tap holes for three 1/4 bolts. Drawing not to scale.
60º 60º
3.69" / 93.73 mm
2.75" / 69.85 mm
120º 120º
4-7
Step 1b – Mount RAM Clamp to Vehicle
Note: If you are using the RAM ball mount, please go to Step 1a – Attach RAM Ball to Vehicle (page 4-7). If you are
using the RAM plate mount, please go to Step 1c – Attach RAM Plate to Vehicle and Attach RAM Ball (page 4-9).
1. Determine the position for mounting the RAM clamp mount. The clamp mount can be used on a beam (such as on
a fork lift truck) up to 2.5” (63.5 mm) wide and approximately 2” (50.8 mm) thick. The clamp may be attached to a
thicker beam by substituting longer bolts (not included). Be sure to position the RAM clamp mount to allow access
to the switches and ports on the bottom of the Thor VM3.
Bolts
Nuts
2. Position the upper clamp piece with ball on the beam. Place the bolts through the holes in the upper clamp piece.
3. Position the lower clamp piece below the beam. Align the bolts with the holes in the lower clamp piece.
4. Place the nylon locking nuts on the bolts and tighten the bolts.
Mounting Dimensions
Note: Drawing not to scale.
2.56” /
65.02mm 1.84” (46.74mm)
4-8
Step 1c – Attach RAM Plate to Vehicle and Attach RAM Ball
Note: If you are using the RAM ball mount, please go to Step 1a – Attach RAM Ball to Vehicle (page 4-7) If you are
using the RAM clamp mount, please go to Step 1b – Mount RAM Clamp to Vehicle (page 4-8).
1. Determine the position for mounting the RAM ball plate. Be sure to position the RAM plate to allow access to the
switches and ports on the bottom of the Thor VM3.
2. Attach the RAM ball plate to the vehicle mounting surface using four 1/4 bolts (not included) or equivalent fasten-
ers.
3. If not already attached, attach the RAM ball to the RAM ball plate using three M6 nuts and washers.
IMPORTANT: Mount to the most rigid surface available.
Mounting Dimensions
There are 4 mounting holes in the plate. Use four 1/4 bolts to secure the plate to the vehicle.
Note: Drawing not to scale.
176 mm
6.99”
76mm 2.99”
100mm 3.94”
200 mm
7.87”
4-9
Step 2 – Attach RAM Mount Ball to the Thor VM3 Dock
1. Turn the Thor VM3 off before attaching the RAM mount ball.
2. Place the Thor VM3 face down on a stable surface.
3. If using the external keyboard mount, position the Keyboard Bracket and the Size D RAM ball on the rear of the
Thor VM3 dock, aligning the holes on the back of the Thor VM3 dock with the holes on the bracket and the RAM
ball base.
4. If not using the external keyboard mount, position the RAM ball on the rear of the Thor VM3 dock, aligning the
holes on the back of the Thor VM3 dock with the holes on the RAM ball base. Attach with four M5 screws, flat
washers and lock washers.
5. If using the external keyboard mount, attach the Size C RAM ball to the Thor VM3 Keyboard bracket with four M5
nuts, flat washers and lock washers.
If using the optional integrated keyboard mount, attach the keyboard to keyboard mounting plate, using four #8 screws,
flat washers and lock washers.
Note: Excess keyboard cable length can be looped around the hooks on the bottom of the keyboard mounting plate.
4 - 10
Step 6 – Attach Keyboard Assembly to Thor VM3 Assembly (Optional)
Note: This step is only for a Thor VM3 with the optional external keyboard.
1. Slip the Size C RAM arm over the ball on the Thor VM3 Keyboard Bracket.
2. Slip the ball on the Keyboard Mounting Plate into the other end of the Size C RAM arm.
3. Tighten the knob on the RAM arm using the supplied RAM wrench.
Note: Some components omitted for detail clarity.
5. Tighten the knob on the RAM arm while adjusting to the desired angle.
4 - 11
Step 8 - Attach Scanner Holder (Optional)
This step is only for use with the Enhanced Dock.
1. Attach the accessory RAM ball to the Enhanced Dock. There are two mounting provisions, one on either side of
the Enhanced dock and either can be used to mount the scanner holder.
5. Tighten the knob on the RAM arm while adjusting to the desired angle.
4 - 12
Install U Bracket Mount
Note: This mounting system does not have provisions for an integrated external keyboard mount or scanner holder. These
accessories can be mounted remotely if desired. Contact Technical Assistance (page 10-1) for details.
Before installation begins, verify you have the applicable vehicle mounting bracket assembly components necessary, as shown
in the following figures.
Adapter Bracket (includes screws, flat washers and lock washers to attach
Adapter Bracket to Thor VM3 and to U Bracket). The U bracket may already
be installed on the vehicle where a VX1, VX2, VX4, VX5, VX6 or VX7 was
previously installed.
Torque Measurement
You will need a torquing tool capable of torquing to 35-50 inch pounds (1.10 N/m). Torque all screws and bolts accord-
ing to the following table:
4 - 13
Mounting Positions
The adapter bracket can be mounted in a high or low position, depending on viewing position, as shown below.
Additionally, the slotted U bracket allows the Thor VM3 to be mounted vertically or tilted forward or backward for best
viewing angle.
Step 1 - Install U Bracket to Vehicle
1. Position the bracket to allow access to the switches and ports on the bottom of the Thor VM3.
2. Attach the bottom mounting bracket to the vehicle mounting surface using a minimum of four 1/4 bolts (or equiva-
lent) fasteners.
Note: 1/4 bolts and washers not included. It is recommended to use lock washers and flat washers on the fasteners.
After the bottom bracket has been attached to a rigid surface, you are ready to assemble the Thor VM3 bracket config-
uration.
4 - 14
Mounting Dimensions
Note: Drawing not to scale.
1. 14.40 in / 359.2 mm
1
2. 12.10 in / 307.3 mm
2
3. 6.05 in / 153.6 mm
4
3 4. 1.02 in / 25.9 mm
5. 3.38 in / 85.85 mm
Note: For the steps below, always place the lock washer on the bolt before the flat washer.
1. Attach the Adapter Bracket to the Thor VM3 dock using four each M5x16mm bolt, M5 lock washer and M5 flat
washer. Torque to 35 in/lbs (4.0 N/m).
2. Attach the Thor VM3/Adapter Bracket assembly to the U Bracket using 4 each 1/4-20x5/8 bolt, 1/4 lock washer
and 1/4 flat washer.
3. If the Thor VM3 is not already mounted to the dock, Place Thor VM3 in the Dock (page 4-2).
4. Adjust the Thor VM3 to the desired viewing angle.
5. Torque the 14-20 bolts to 50 in/lbs (5.6 N/m).
4 - 15
Connect Cables
There are many cables available for the Thor VM3 including power cables, and data/ communication cables.
4 - 16
Connect Power
See Power Supply Connector (page 9-6) for connector pinout
For the VM1D Standard Dock and VM3D Enhanced Dock, power options include:
• 12-48 VDC Vehicles (10-60 VDC Direct Connection) (page 4-18) - Direct connection to vehicle power.
• 60-144 VDC Vehicles (50-150 VDC Power Supply, Screws on Side of Lid) (page 4-23) - Requires the use of a DC/DC
power supply.
• 60-144 VDC Vehicles (50-150 VDC Power Supply, Screws on Top of Lid) (page 4-26) - Requires the use of a DC/DC
power supply.
• VX6 / VX7 Adapter Cable (page 4-29) - For applications where the Thor VM3 replaces a previously installed VX6 or VX7.
• Thor VX8 / Thor VX9 Adapter Cable (page 4-30) - For applications where the Thor VM3 (with a VM1D Standard Dock or
VM3D Enhanced dock( replaces a previously installed Thor VX8 or Thor VX9.
• Screen Blanking (page 4-32) - Optional connection to blank the Thor VM3 display while the vehicle is in motion.
• External AC/DC Power Supply (page 4-38) - For use when DC power is not available to power the Thor VM3, such as in
an office environment.
For the VMX3D Enhanced Dock, power options include:
• VMXD Enhanced Dock with Thor VX8/Thor VX9 Power Cable (page 4-35) - For applications where a Thor VM3 (with a
VMXD Enhanced Dock) replaces a previously installed Thor VX8 or Thor VX9.
• External AC/DC Power Supply (page 4-38) - For use when DC power is not available to power the Thor VM3, such as in
an office environment.
!
CAUTION - When routing the power cable:
• Route power cable away from the outside of the fork truck.
• Choose a mounting location so that the power cable does not extend outside the vehicle and that provides sufficient
clearance so that the power cable (especially the dock connector end) is not pressed against part of the vehicle.
• Use the proper Strain Relief Cable Clamps (page 4-16) to secure cable.
• The power cable is less flexible in low temperature environments. Avoid sharp bends.
Regularly inspect power cable for damage, especially in low temperature environments. Contact Technical
Assistance (page 10-1) for replacement cable options.
Power Cable Routing
4 - 17
12-48 VDC Vehicles (10-60 VDC Direct Connection)
!
CAUTION - For installation by trained service personnel only.
!
Use caution when routing the power cable. See Power Cable Cautions (page 4-17).
!
Fuse Requirements
WARNING - For proper and safe installation, the input power cable must be connected to a fused circuit on the
vehicle. If the supply connection is made directly to the battery, the fuse should be installed in the positive lead
within 5 inches of the battery’s positive (+) terminal. Use VM3055FUSE (or equivalent) to install the fuse as
shown below:
• For 12VDC input, use the 10A fuse from the kit or a slow blow fuse that has a DC voltage rating greater than
12VDC.
• For 24VDC input, use the 6A fuse from the kit or a slow blow fuse that has a DC voltage rating greater than
24VDC.
• For 36VDC input, use the 4A fuse from the kit or a slow blow fuse that has a DC voltage rating greater than
36VDC.
• For 48VDC input, use the 3A fuse from the kit or a slow blow fuse that has a DC voltage rating greater than
48VDC.
Note: For North America, a UL Listed fuse is to be used.
!
Twist the red and red/white wires together and twist the Green Ground
black and black/white wires together before connecting to
vehicle power. Blue Ignition Input (optional)
Note: Correct electrical polarity is required for safe and proper installation. See the figures below for additional wire
color-coding specifics.
The Thor VM3 DC input wires (Red, Red/White DC+ and Black, Black/White DC-) and the Blue ignition input wire are
galvanically isolated. The Green ground input is used for electrostatic discharge (ESD) protection.
Vehicle 10-60VDC Direct Power Connection
1. The Thor VM3 must not be mounted in the Smart Dock. The power switch on the dock must be turned Off.
The power cable must be UNPLUGGED from the dock.
2. While observing the Fuse Requirements (page 4-18), connect the power cable as close as possible to the
actual battery terminals of the vehicle (if using unswitched power).
3. Use proper electrical and mechanical fastening means for terminating the cable. Properly sized “crimp” type
electrical terminals are an accepted method of termination. Please select electrical connectors sized for use
with 20AWG (0.81mm2) conductors.
4. Refer to the wiring diagrams following this section for wire colors and connections:
• Ignition Control Wiring Diagram (page 4-20)
• Auto-On Control Wiring Diagram (page 4-21)
• Manual Control Wiring Diagram (page 4-22)
4 - 18
5. Route the power cable the shortest way possible removing any left-over cable. The cable is rated for a maxi-
mum temperature of 105°C (221°F). Therefore, when routing this cable it should be protected from physical
damage and from surfaces that might exceed this temperature. Cable should be protected from physical
damage from moving parts. Do not expose the cable to chemicals or oil that may cause the wiring insulation
to deteriorate. Always route the cable so that it does not interfere with safe operation and maintenance of the
vehicle.
6. Provide mechanical support for the cable by securing it to the vehicle structure at approximately one foot inter-
vals, taking care not to over tighten and pinch conductors or penetrate outer cable jacket.
7. Connect the watertight connector end of the power cable to the Thor VM3 Smart Dock power connector by
aligning the connector pins to the power connector; push down on the watertight connector and twist it to fas-
ten securely.
8. Secure the power cable to the Thor VM3 using the Strain Relief Cable Clamps (page 4-16).
9. Place Thor VM3 in the Dock (page 4-2)
10. If using the Screen Blanking (page 4-32) feature, install the screen blanking box or switch.
11. Press the Power Switch (page 3-4) on the back of the Thor VM3 dock.
12. Press the Power Button (page 3-4) on the front of the Thor VM3 to turn on the Thor VM3.
4 - 19
Ignition Control Wiring Diagram
Existing Circuitry On Vehicle
Quick Mount
Smart Dock
Battery
Main Switch
Ignition
+Vo -Vo Cable for optional
COM1 or COM2
screen blanking
Connector
connection
Fuse - See
Warning
statement below
Red
Blue
!
CAUTION
For battery powered vehicles:
• Twist the red and red/white wires together and connect to battery positive.
• Black and black/white wires must be connected to battery negative. Twist these wires together and
connect to battery negative.
• Green wire must be connected to the vehicle chassis ground.
For internal combustion engine powered vehicles:
• Twist the red and red/white wires together and connect to battery positive.
• Twist the black wire and a black/white together and connect to battery negative.
• Green wire is connected to the vehicle chassis ground, which can also be battery negative.
!
WARNING
For proper and safe installation, the input power cable must be connected to a fused circuit on the ve-
hicle. If the supply connection is made directly to the battery, the fuse should be installed in the positive
lead within 5 inches of the battery’s positive (+) terminal. Use VM3055FUSE (or equivalent) to install
the fuse as shown below:
• For 12VDC input, use the 10A fuse from the kit or a slow blow fuse that has a DC voltage rating
greater than 12VDC.
• For 24VDC input, use the 6A fuse from the kit or a slow blow fuse that has a DC voltage rating greater
than 24VDC.
• For 36VDC input, use the 4A fuse from the kit or a slow blow fuse that has a DC voltage rating greater
than 36VDC.
• For 48VDC input, use the 3A fuse from the kit or a slow blow fuse that has a DC voltage rating greater
than 48VDC.
Note: For North America, a UL Listed fuse is to be used.
4 - 20
Auto-On Control Wiring Diagram
Existing Circuitry On Vehicle
Quick Mount
Smart Dock
Battery
Main Switch
Red
Blue
(not connected)
See Caution statement below .
!
CAUTION
For battery powered vehicles:
• Twist the red and red/white wires together and connect to battery positive.
• Black and black/white wires must be connected to battery negative. Twist these wires together and
connect to battery negative.
• Green wire must be connected to the vehicle chassis ground.
For internal combustion engine powered vehicles:
• Twist the red and red/white wires together and connect to battery positive.
• Twist the black wire and a black/white together and connect to battery negative.
• Green wire is connected to the vehicle chassis ground, which can also be battery negative.
!
WARNING
For proper and safe installation, the input power cable must be connected to a fused circuit on the ve-
hicle. If the supply connection is made directly to the battery, the fuse should be installed in the positive
lead within 5 inches of the battery’s positive (+) terminal. Use VM3055FUSE (or equivalent) to install
the fuse as shown below:
• For 12VDC input, use the 10A fuse from the kit or a slow blow fuse that has a DC voltage rating
greater than 12VDC.
• For 24VDC input, use the 6A fuse from the kit or a slow blow fuse that has a DC voltage rating greater
than 24VDC.
• For 36VDC input, use the 4A fuse from the kit or a slow blow fuse that has a DC voltage rating greater
than 36VDC.
• For 48VDC input, use the 3A fuse from the kit or a slow blow fuse that has a DC voltage rating greater
than 48VDC.
Note: For North America, a UL Listed fuse is to be used.
4 - 21
Manual Control Wiring Diagram
Existing Circuitry On Vehicle
Quick Mount
Smart Dock
Battery
Main Switch
Red
Blue
(not connected)
See Caution statement below
!
CAUTION
For battery powered vehicles:
• Twist the red and red/white wires together and connect to battery positive.
• Black and black/white wires must be connected to battery negative. Twist these wires together and
connect to battery negative.
• Green wire must be connected to the vehicle chassis ground.
For internal combustion engine powered vehicles:
• Twist the red and red/white wires together and connect to battery positive.
• Twist the black wire and a black/white together and connect to battery negative.
• Green wire is connected to the vehicle chassis ground, which can also be battery negative.
!
WARNING
For proper and safe installation, the input power cable must be connected to a fused circuit on the ve-
hicle. If the supply connection is made directly to the battery, the fuse should be installed in the positive
lead within 5 inches of the battery’s positive (+) terminal. Use VM3055FUSE (or equivalent) to install
the fuse as shown below:
• For 12VDC input, use the 10A fuse from the kit or a slow blow fuse that has a DC voltage rating
greater than 12VDC.
• For 24VDC input, use the 6A fuse from the kit or a slow blow fuse that has a DC voltage rating greater
than 24VDC.
• For 36VDC input, use the 4A fuse from the kit or a slow blow fuse that has a DC voltage rating greater
than 36VDC.
• For 48VDC input, use the 3A fuse from the kit or a slow blow fuse that has a DC voltage rating greater
than 48VDC.
Note: For North America, a UL Listed fuse is to be used.
4 - 22
60-144 VDC Vehicles (50-150 VDC Power Supply, Screws on Side of Lid)
This option requires DC/DC external power supply Honeywell Part no. 9000313PWRSPLY.
!
CAUTION - For installation by trained service personnel only.
!
CAUTION - Usage in areas where moisture can affect the power supply connections should be avoided. The
power supply should be mounted in a dry location within the vehicle or placed in a suitable protective enclosure.
!
Use caution when routing the power cable. See Power Cable Cautions (page 4-17).
!
Fuse Requirements
WARNING - For proper and safe installation, the input power cable must be connected to a fused circuit on the
vehicle. If the supply connection is made directly to the battery, the fuse should be installed in the positive lead
within 5 inches of the battery’s positive (+) terminal. Use VM3055FUSE (or equivalent) to install the fuse as
shown below:
• For all voltages, use the 3A fuse from the kit or a slow blow fuse that has a DC voltage rating greater than
the vehicle input voltage.
Note: For North America, a UL Listed fuse is to be used.
!
Twist the red and red/white wires together and twist the Green Ground
black and black/white wires together before connecting to
vehicle power. Blue Ignition Input (not used)
Note: Correct electrical polarity is required for safe and proper installation. See Wiring Diagram (page 4-25) for
additional wire color-coding specifics.
4 - 23
The Thor VM3 DC input wires (Red, Red/White DC+ and Black, Black/White DC-) and the Blue ignition input wire are
galvanically isolated. The Green ground input is used for electrostatic discharge (ESD) protection.
Vehicle 50-150VDC Power Connection
1. Please review the Wiring Diagram (page 4-25), before beginning power cable install.
2. The Thor VM3 must not be mounted in the Smart Dock. The power switch on the dock must be turned Off.
The power cable must be UNPLUGGED from the dock.
3. Route the cable from the Thor VM3 to the DC/DC power supply. Route the power cable the shortest way pos-
sible. The cable is rated for a maximum temperature of 105°C (221°F). When routing this cable, it should be
protected from physical damage and from surfaces that might exceed this temperature. Do not expose the
cable to chemicals or oil that may cause the wiring insulation to deteriorate. Always route the cable so that it
does not interfere with safe operation and maintenance of the vehicle.
4. Cut the cable to length and strip the wire ends.
5. Remove the lid from the DC/DC power supply.
6. Connect the stripped end of the positive wires (red and red/white twisted together) to the output block. See
Power Cable Identification (page 4-23).
7. Connect the stripped end of the negative wires (black and black/white twisted together) to the output. See
Power Cable Identification (page 4-23).
Note: The input block has VIN+, VIN- and GND terminals. The
output block has VO+ and VO- terminals.
8. Connect the ground (green) wire from the Thor VM3 to the
GND terminal on the input side of the DC/DC power supply.
9. Route the wiring from the DC/DC power supply to the vehi-
cle’s electrical system. Do not connect to vehicle power
at this time.
10. Strip the wire ends and connect to the input side of the DC/
DC power supply.
11. Use looms and wire ties to secure all wiring as shown.
12. Reattach the cover with the screws.
13. Connect the DC/DC power supply to the vehicle’s electrical system as directed below:
!
For battery powered vehicles:
VIN+ is connected to battery positive.
ViN- must be connected to battery negative.
GND must be connected to the vehicle chassis ground.
For internal combustion engine powered vehicles:
VIN+ is connected to battery positive.
ViN- is connected to battery negative.
GND is connected to the vehicle chassis ground, which can also be battery negative.
14. While observing the Fuse Requirements (page 4-23) connect the power cable as close as possible to the
actual battery terminals of the vehicle. When available, always connect to unswitched terminals in the vehicle
fuse panel, after providing proper fusing.
ATTENTION: For uninterrupted power, electrical supply connections should not be made at any point
after the ignition switch of the vehicle.
15. Use proper electrical and mechanical fastening means for terminating the cable. Properly sized “crimp” type
electrical terminals are an accepted method of termination. Select electrical connectors sized for use with
18AWG (1mm2) conductors.
16. Provide mechanical support for the cable by securing it to the vehicle structure at approximately one foot inter-
vals, taking care not to over tighten and pinch conductors or penetrate the outer cable jacket.
17. Connect the watertight connector end of the power cable to the Thor VM3 Smart Dock power connector by
aligning the connector pins to the power connector; push down on the watertight connector and twist it to fas-
ten securely. Flip the power switch on the back of the dock to On.
4 - 24
18. Secure the power cable to the Thor VM3 using the Strain Relief Cable Clamps (page 4-16).
19. Place Thor VM3 in the Dock (page 4-2)
20. If using the Screen Blanking (page 4-32) feature, install the screen blanking box or switch.
21. Press the Power Switch (page 3-4) on the back of the Thor VM3 dock.
22. Press the Power Button (page 3-4) on the front of the Thor VM3 to turn on the Thor VM3.
Note: Ignition control is not available for trucks over 60VDC.
Wiring Diagram
Existing Circuitry on Vehicle
Quick Mount
Smart Dock
Forklift Battery
Main Switch
See Caution
statement GND VIN+ VIN-
Red/White (if present)
below
Red
VO+
Black/White (if present) Circular
Power
VO-
Black Connector
on Dock
Green
DC/DC Blue
Power (not connected)
Supply
!
CAUTION
For battery powered vehicles:
GND must be connected to the vehicle chassis ground.
For internal combustion engine powered vehicles:
GND is connected to the vehicle chassis ground, which can also be battery negative.
!
Fuse Requirements
WARNING - For proper and safe installation, the input power cable must be connected to a fused circuit on
the vehicle. If the supply connection is made directly to the battery, the fuse should be installed in the pos-
itive lead within 5 inches of the battery’s positive (+) terminal. Use VM3055FUSE (or equivalent) to install
the fuse as shown below:
• For all voltages, use the 3A fuse from the kit or a slow blow fuse that has a DC voltage rating greater
than the vehicle input voltage.
Note: For North America, a UL Listed fuse is to be used.
4 - 25
60-144 VDC Vehicles (50-150 VDC Power Supply, Screws on Top of Lid)
This option requires DC/DC power supply Honeywell Part no. VX89303PWRSPLY, shown below.
!
CAUTION - For installation by trained service personnel only.
!
CAUTION - The VX89303PWRSPLY power supply is sealed per IPXX. Usage in areas where moisture can affect
the power supply connections should be avoided. The power supply should be mounted in a dry location within
the vehicle or placed in a suitable protective enclosure.
!
Use caution when routing the power cable. See Power Cable Cautions (page 4-17).
!
Fuse Requirements
WARNING - For proper and safe installation, the input power cable must be connected to a fused circuit on the
vehicle. If the supply connection is made directly to the battery, the fuse should be installed in the positive lead
within 5 inches of the battery’s positive (+) terminal. Use VM3055FUSE (or equivalent) to install the fuse as
shown below:
• For all voltages, use the 3A fuse from the kit or a slow blow fuse that has a DC voltage rating greater than
the vehicle input voltage.
Note: For North America, a UL Listed fuse is to be used.
!
Twist the red and red/white wires together and twist the Green Ground
black and black/white wires together before connecting to
vehicle power. Blue Ignition Input (not used)
Note: Correct electrical polarity is required for safe and proper installation. See Wiring Diagram (page 4-28) for
additional wire color-coding specifics.
The Thor VM3 DC input wires (Red, Red/White DC+ and Black, Black/White DC-) and the Blue ignition input wire are
galvanically isolated. The Green ground input is used for electrostatic discharge (ESD) protection.
4 - 26
Vehicle 50-150VDC Power Connection
1. Please review the Wiring Diagram (page 4-25), before beginning power cable install.
2. The Thor VM3 must not be mounted in the Smart Dock. The power switch on the dock must be turned Off.
The power cable must be UNPLUGGED from the dock.
3. Route the cable from the Thor VM3 to the DC/DC power supply. Route the power cable the shortest way pos-
sible. The cable is rated for a maximum temperature of 105°C (221°F). When routing this cable, it should be
protected from physical damage and from surfaces that might exceed this temperature. Do not expose the
cable to chemicals or oil that may cause the wiring insulation to deteriorate. Always route the cable so that it
does not interfere with safe operation and maintenance of the vehicle.
4. Cut the cable to length and strip the wire ends.
5. Remove the lid from the DC/DC power supply.
6. Connect the stripped end of the positive wires (red and red/white twisted together) to the output block. See
Power Cable Identification (page 4-26).
7. Connect the stripped end of the negative wires (black and black/white twisted together) to the output. See
Power Cable Identification (page 4-26).
Note: The input and output blocks each have two + (plus), two –
(minus) and two (ground) connectors. Either connector
in the block can be used to connect the matching polarity
wire.
8. Route the wiring from the DC/DC power supply to the vehi-
cle’s electrical system. Do not connect to vehicle power
at this time.
9. Strip the wire ends and connect to the input side of the DC/
DC power supply.
10. Use looms and wire ties to secure all wiring as shown.
11. Reattach the cover with the screws.
12. Connect the DC/DC power supply to the vehicle’s electrical system as directed below
!
For battery powered vehicles:
+ is connected to battery positive.
- must be connected to battery negative.
must be connected to the vehicle chassis ground.
For internal combustion engine powered vehicles:
+ is connected to battery positive.
- is connected to battery negative.
is connected to the vehicle chassis ground, which can also be battery negative.
13. While observing the Fuse Requirements (page 4-25), connect the power cable as close as possible to the
actual battery terminals of the vehicle. When available, always connect to unswitched terminals in the vehicle
fuse panel, after providing proper fusing.
ATTENTION: For uninterrupted power, electrical supply connections should not be made at any point
after the ignition switch of the vehicle.
14. Use proper electrical and mechanical fastening means for terminating the cable. Properly sized “crimp” type
electrical terminals are an accepted method of termination. Select electrical connectors sized for use with
18AWG (1mm2) conductors.
15. Provide mechanical support for the cable by securing it to the vehicle structure at approximately one foot inter-
vals, taking care not to over tighten and pinch conductors or penetrate the outer cable jacket.
16. Connect the watertight connector end of the power cable to the Thor VM3 Smart Dock power connector by
aligning the connector pins to the power connector; push down on the watertight connector and twist it to fas-
ten securely. Flip the power switch on the back of the dock to On.
4 - 27
17. Secure the power cable to the Thor VM3 using the Strain Relief Cable Clamps (page 4-16).
18. Place Thor VM3 in the Dock (page 4-2)
19. If using the Screen Blanking (page 4-32) feature, install the screen blanking box or switch.
20. Press the Power Switch (page 3-4) on the back of the Thor VM3 dock.
21. Press the Power Button (page 3-4) on the front of the Thor VM3 to turn on the Thor VM3.
Note: Ignition control is not available for trucks over 60VDC.
Wiring Diagram
Existing Circuitry on Vehicle
Quick Mount
Smart Dock
Forklift Battery
Main Switch
See Caution
statement below + -
Red/White (if present)
Red
+
Black/White (if present)
Power
Black Connector
-
Green
DC/DC Blue
Power (not connected)
Supply
!
CAUTION
For battery powered vehicles:
must be connected to the vehicle chassis ground.
For internal combustion engine powered vehicles:
is connected to the vehicle chassis ground, which can also be battery negative.
!
Fuse Requirements
WARNING - For proper and safe installation, the input power cable must be connected to a fused circuit on
the vehicle. If the supply connection is made directly to the battery, the fuse should be installed in the pos-
itive lead within 5 inches of the battery’s positive (+) terminal. Use VM3055FUSE (or equivalent) to install
the fuse as shown below:
• For all voltages, use the 3A fuse from the kit or a slow blow fuse that has a DC voltage rating greater
than the vehicle input voltage.
Note: For North America, a UL Listed fuse is to be used.
4 - 28
VX6 / VX7 Adapter Cable
An adapter cable is available to attach the Thor VM3 to a vehicle previously equipped with a VX6/VX7 DC power cable.
The adapter cable has a 5-pin connector to match with the VX6/VX7 power supply cable on one end and a 6-pin con-
nector to match to the Thor VM3 on the other end. This section assumes the VX6/VX7 power cable is properly con-
nected to vehicle power. Refer to the VX6 or VX7 Vehicle Mounting Reference Guide for details.
!
CAUTION - Because the VX6/VX7 supports 10-60 VDC power input, verify input voltages before using this
adapter cable with an existing VX6 or VX7 power connection installation.
When this adapter cable is used, there is no provision for an ignition switch input. Therefore the vehicle ignition moni-
toring function is not available when using this cable.
Connect to VX6 / VX7 Power Cable
1. Connect the adapter cable to the Thor VM3 power cable by aligning the connector pins to the power connec-
tor; push down on the watertight connector and twist it to fasten securely.
2. The cable is rated for a maximum temperature of 105°C (221°F). Therefore, routing this cable it should be
protected from physical damage and from surfaces that might exceed this temperature. Cable should be pro-
tected from physical damage from moving parts. Do not expose the cable to chemicals or oil that may cause
the wiring insulation to deteriorate. Always route the cable so that it does not interfere with safe operation and
maintenance of the vehicle.
3. Provide mechanical support for the cable by securing it to the vehicle structure at approximately one foot inter-
vals, taking care not to over tighten and pinch conductors or penetrate outer cable jacket.
4. Connect the watertight connector end of the power cable to the Thor VM3 Smart Dock power connector by
aligning the connector pins to the power connector; push down on the watertight connector and twist it to fas-
ten securely.
5. Secure the power cable to the Thor VM3 using the Strain Relief Cable Clamps (page 4-16).
6. Place Thor VM3 in the Dock (page 4-2)
7. If using the Screen Blanking (page 4-32) feature, install the screen blanking box or switch.
8. Press the Power Switch (page 3-4) on the back of the Thor VM3 dock.
9. Press the Power Button (page 3-4) on the front of the Thor VM3 to turn on the Thor VM3.
4 - 29
Thor VX8 / Thor VX9 Adapter Cable
Note: This cable is for use with VM1D Standard Dock and VM3D Enhanced Dock. This cable is not needed for VMXD
Enhanced Dock.
An adapter cable is available to attach the Thor VM3 to a vehicle previously equipped with a VX8/VX9 DC power cable.
The adapter cable has a 6-pin connector to match the VX8/XVX9 power supply cable on one end and a 6-pin connec-
tor to match the Thor VM3 on the other end. The cable also has bare wires for ground and ignition sense connection
plus a D9 cable to connect to a COM port on the Thor VM3 dock to provide a screen blanking signal. This section
assumes the VX8/VX9 power cable is properly connected to vehicle power. Refer to the VX8 or VX9 Vehicle Mounting
Reference Guide for details.
To COM port
on Dock
To Ground and
Ignition Sense
!
For battery powered vehicles:
The green wire must be connected to the vehicle chassis ground.
For internal combustion engine powered vehicles:
The green wire is connected to the vehicle chassis ground, which can also be battery negative.
3. If ignition control will be used, connect the blue wire to an ignition switched circuit (less than 1mA over input
voltage range). If ignition control is not used, the blue wire can be left disconnected,
4. If the VX8/VX9 cable is connected to a screen blanking box or switch, connect the D9 connector to a COM
port on the dock.
5. The cable is rated for a maximum temperature of 105°C (221°F). Therefore, when routing this cable it should
be protected from physical damage and from surfaces that might exceed this temperature. Cable should be
protected from physical damage from moving parts. Do not expose the cable to chemicals or oil that may
cause the wiring insulation to deteriorate. Always route the cable so that it does not interfere with safe opera-
tion and maintenance of the vehicle.
6. Provide mechanical support for the cable by securing it to the vehicle structure at approximately one foot inter-
vals, taking care not to over tighten and pinch conductors or penetrate outer cable jacket.
7. Connect the watertight connector end of the power cable to the Thor VM3 Smart Dock power connector by
aligning the connector pins to the power connector; push down on the watertight connector and twist it to fas-
ten securely.
8. Secure the power cable to the Thor VM3 using the Strain Relief Cable Clamps (page 4-16).
9. Place Thor VM3 in the Dock (page 4-2)
10. If using the Screen Blanking (page 4-32) feature, install the screen blanking box or switch if not previously
installed.
11. Press the Power Switch (page 3-4) on the back of the Thor VM3 dock.
12. Press the Power Button (page 3-4) on the front of the Thor VM3 to turn on the Thor VM3.
4 - 30
CV61 Adapter Cable
An adapter cable is available to attach the Thor VM3 to a vehicle previously equipped with a CV61 DC power cable.
The adapter cable has a 5-pin connector to match with the VV61 power supply cable on one end and a 6-pin connector
to match to the Thor VM3 on the other end. This section assumes the CV61 power cable is properly connected to
vehicle power. Refer to the CV61 documentation for details.
When this adapter cable is used, there is no provision for an ignition switch input. Therefore the vehicle ignition moni-
toring function is not available when using this cable.
Connect to CV61 Power Cable
1. Connect the adapter cable to the CV61 power cable by aligning the connector pins to the power connector;
push down on the watertight connector and twist it to fasten securely.
2. The cable is rated for a maximum temperature of 105°C (221°F). Therefore, routing this cable it should be
protected from physical damage and from surfaces that might exceed this temperature. Cable should be pro-
tected from physical damage from moving parts. Do not expose the cable to chemicals or oil that may cause
the wiring insulation to deteriorate. Always route the cable so that it does not interfere with safe operation and
maintenance of the vehicle.
3. Provide mechanical support for the cable by securing it to the vehicle structure at approximately one foot inter-
vals, taking care not to over tighten and pinch conductors or penetrate outer cable jacket.
4. Connect the watertight connector end of the power cable to the Thor VM3 Smart Dock power connector by
aligning the connector pins to the power connector; push down on the watertight connector and twist it to fas-
ten securely.
5. Secure the power cable to the Thor VM3 using the Strain Relief Cable Clamps (page 4-16).
6. Place Thor VM3 in the Dock (page 4-2)
7. If using the Screen Blanking (page 4-32) feature, install the screen blanking box or switch.
8. Press the Power Switch (page 3-4) on the back of the Thor VM3 dock.
9. Press the Power Button (page 3-4) on the front of the Thor VM3 to turn on the Thor VM3.
4 - 31
Screen Blanking
Prerequisite: The steps outlined in either 12-48 VDC Vehicles (10-60 VDC Direct Connection) (page 4-18), 60-144
VDC Vehicles (50-150 VDC Power Supply, Screws on Side of Lid) (page 4-23) or 60-144 VDC Vehicles (50-150 VDC
Power Supply, Screws on Top of Lid) (page 4-26) have been completed.
Screen blanking is accomplished by either a Screen Blanking Box or a user supplied switch.
!
CAUTION - For installation by trained service personnel only.
!
CAUTION - For proper and safe installation, the input power lead to the Screen Blanking Box requires a 3 Amp
maximum time delay (slow blow) high interrupting rating fuse. Note: For North America, a UL Listed fuse is to be
used.
Note: Wire colors only apply to optional Honeywell Screen Blanking Box Cable, VM1080CABLE. Wire colors
may vary in a user-supplied cable.
The optional Honeywell Screen Blanking Box Cable, VM1080CABLE, is installed as follows:
1. Connect the gray wire of the cable to the switched side of the Screen Blanking Box.
2. Connect the black wire of the cable to the unswitched side of the Screen Blanking Box.
3. Connect the D9 serial connector to either COM1 or COM2 serial port on the Thor VM3 Smart Dock.
4 - 32
User-Supplied Cable
A user-supplied cable can be used as well. Pins 7 and 8 must be connected as detailed below. No other pins
are to be connected.
PIN 5 PIN 1
PIN 8 PIN 7
DB9 Female Function with Screen Blanking Box Function with Switch
1 -6, 9 Not Used Not Used
7 (RTS) Connected to Screen Blanking Box, unswitched side Connected to Switch
8 (CTS) Connected to Screen Blanking Box, switched side Connected to Switch
It is assumed that the motion sensing circuitry in the illustrations below is powered by internal vehicle circuitry.
Please refer to the appropriate illustration below for Screen Blanking Box wiring diagrams.
!
CAUTION - Do not exceed the maximum input voltage, either 60 or 72VDC, specified on the Screen Blanking
Box label when using this configuration.
4 - 33
MOTION
CIRCUITRY
GND
+Vi
3A fuse
To -Vo on vehicle,
i.e. Negative
battery terminal
Note: The black and gray wire colors in the illustration only apply to the optional Honeywell Screen Blanking Box
Cable, VM1080CABLE. The wire colors may be different in a user-supplied cable.
To pins 7 and 8
of COM1 or COM2
port on dock
Pins 7 and 8 must be connected as shown in the illustration above. No other pins are to be connected.
4 - 34
VMXD Enhanced Dock with Thor VX8/Thor VX9 Power Cable
This dock is recommended for use when replacing an existing Thor VX8 or Thor VX9 where screen blanking is
! used. This dock eliminates the need for wiring changes by enabling the existing VX8/VX9 power cable and
screen blanking box to be used when the VX8/VX9 is replaced by a Thor VM3 computer. These instructions
are for this dock model only!
The Ignition Control feature is not available when this dock is used.
The external DC/DC converter previously used with the Thor VX8 or Thor VX9 must be left in place to pro-
! vide ground isolation.
Connecting the dock power input directly to vehicle power could result in a safety hazard or equipment damage.
The cable shielding must be connected to chassis ground.
!
Consult the instructions later in this section for the respective power supply type.
COM1 is used for screen blanking (via the power cable connector) and is unavailable when the screen blanking
! box is attached. When a screen blanking box is attached, any external serial device such as a scanner, must be
connected to the COM2 port on the dock. If a screen blanking box is not connected via the power cable, the
COM1 port on the dock is available for a serial device connection.
Determine the type of power supply used with the previous Thor VX8 or Thor VX9 installation:
• DC/DC Power Supply with Screws on Top of Lid (page 4-36)
• DC/DC Power Supply with Screws on Side of Lid (page 4-37)
4 - 35
DC/DC Power Supply with Screws on Top of Lid
Inspect the cable shield to verify it is connected to chassis ground. If there is no connection from the cable
! shield to chassis ground, one must be added at this time. Use a jumper wire to connect the cable shield to
chassis ground as shown below for the appropriate type of power supply installed on the vehicle. A jumper
wire, as shown in the illustrations below, may be present to attach the chassis ground to the white wire of the
power cable. This wire is not necessary but can be left in place if present. For proper screen blanking, verify
the yellow and green wires are attached to the screen blanking box as shown in the illustrations below.
For this model, follow the diagram below to attach the power cable shield to chassis ground:
Existing Circuitry on Vehicle
Forklift Battery
MOTION
CIRCUITRY
Main Switch
GND
+Vi
+Vo -Vo
VMX004VMCRADLE
10A slow fuse Vehicle Mount
3A fuse
Close to power Smart Dock
source
5
Green
+ -
6 Circular
Yellow
Power
Connector
+ 1
Brown
- 3
White
DC/DC
Supplied Power Cable
Power
(Shielding to be trimmed)
Supply
4 - 36
DC/DC Power Supply with Screws on Side of Lid
Inspect the cable shield to verify it is connected to chassis ground. If there is no connection from the cable
! shield to chassis ground, one must be added at this time. Use a jumper wire to connect the cable shield to
chassis ground as shown below for the appropriate type of power supply installed on the vehicle. A jumper
wire, as shown in the illustrations below, may be present to attach the chassis ground to the white wire of the
power cable. This wire is not necessary but can be left in place if present. For proper screen blanking, verify
the yellow and green wires are attached to the screen blanking box as shown in the illustrations below.
For this model, follow the diagram below to attach the power cable shield to chassis ground:
Existing Circuitry on Vehicle
Forklift Battery
MOTION
CIRCUITRY
Main Switch
GND
+Vi
+Vo -Vo
VMX004VMCRADLE
10A slow fuse Vehicle Mount
3A fuse
Close to power Smart Dock
source
5
Green
GND +Vi -Vi
6 Circular
Yellow
Power
Connector
+Vo 1
Brown
-Vo 3
White
4 - 37
External AC/DC Power Supply
The optional external AC/DC power supply is for use in environments, such as an office, where DC power is not avail-
able.
Note: The Honeywell-approved AC/DC Power Supply and Adapter Cable are only intended for use in a 25ºC (77ºF)
maximum ambient temperature environment.
In North America, this unit is intended for use with a UL Listed ITE power supply with output rated 10 – 60 VDC, mini-
mum 15W. Outside North America, this unit is intended for use with an IEC certified ITE power supply with output
rated 10 – 60 VDC, minimum 15W.
The external power supply may be connected to either a 120V, 60Hz supply or, outside North America, to a 230V,
50Hz supply, using the appropriate detachable cordset. In all cases, connect to a properly grounded source of supply
provided with maximum 15 Amp overcurrent protection (10 Amp for 230V circuits).
4 - 38
Connect USB Keyboard
There are two external USB keyboard options
• 95-key keyboard (part number 164288-0001)
• 21-key numeric keyboard.
These USB keyboards have a D9 connector which attaches to the USB port on the Standard Dock or the USB1 connector
on the Enhanced Dock.
Print
Esc F1 F2 F3 F4 F5 F6 F7 F8 F9 F10 F11 F12 Screen Scroll Pause Fn
SysRq Lock Break
~ ! @ # $ % ^ & * ( ) _ + Num / * =
BackSpace
Lock
` 1 2 3 4 5 6 7 8 9 0 - =
Tab Q W E R T Y U I O P { } | 7 8 9 +
[ ] \ Home PgUp
Caps
A S D F G H J K L : " Enter 4 5 6
Lock ; '
L R
1. Seat the keyboard cable connector over the USB or USB1 connector on the dock.
2. Tighten the thumbscrews in a clockwise direction. Do not over tighten.
Secure the cable to the Thor VM3 with Strain Relief Cable Clamps (page 4-16).
Print
Esc F1 F2 F3 F4 F5 F6 F7 F8 F9 F10 F11 F12 Screen Scroll Pause Fn
SysRq Lock Break
BKLT CAPS
ESC 2ND
CAPS BREAK R/S / - +
F1 F2 F3 F4 F5 F6 F7 F8 F9 F10 7 8 9 ~ ! @ # $ % ^ & * ( ) _ + =
BackSpace
Num / *
Lock
2nd ` 1 2 3 4 5 6 7 8 9 0 - =
! @ # $ % ^ & * ( )
CTRL
INS = { }
Q W E R T Y U I O P BKSP 4 5 6 { } 7 8
Tab Q W E R T Y U I O P | 9 +
[ ] \ Home PgUp
| \ : ; " ' ’ . ? PgUp [ ] >
SHIFT
A S D F G H J K L ENTER 1 2 3 Caps : 4 5
Lock
A S D F G H J K L ;
" Enter 6
'
~ _ Home PgDn END <
ALT SP
Z X C V B
´
N M 0
DEL
. Shift Z X C V B N M <
,
>
.
?
/
Shift 1
End
2 3
PgDn
L R
A legacy PS/2 keyboard (used with VX6, VX7, Thor VX8 or Thor VX9), available in either 60-key or 95-key versions can be
used with the Thor VM3 via a PS/2 to USB adapter cable. This function is only supported with the VM3D or VMXD
Enhanced Docks. It is not supported with the VM1D Standard Dock.
4 - 39
1. Seat the male connector of the cable over the USB connector on the Thor VM3 Smart Dock.
2. Tighten the thumbscrews in a clockwise direction. Do not over tighten.
3. Seat the keyboard connector over the female connector of the cable.
4. Tighten the thumbscrews in a clockwise direction. Do not overtighten.
5. Secure the cable to the Thor VM3 with Strain Relief Cable Clamps (page 4-16). The strain relief must capture the
keyboard cable.
4 - 40
Connect USB Host
Host / Client Y Cable
USB Host Connector
D9 Connector
See USB and USB1 Connector (page 9-7) for connector pinouts.
Note: The USB client connection is not available on the Thor VM3.
1. Seat the D9 connector firmly over the USB (Standard Dock) or USB1 (Enhanced Dock) connector on the dock.
2. Tighten the thumbscrews in a clockwise direction. Do not over tighten.
3. The USB-host connector provides a connector for a USB device such as a USB thumb drive.
4. Secure the cables to the Thor VM3 with Strain Relief Cable Clamps (page 4-16).
USB Scanner
A USB scanner may be attached to the USB host port.
If using Enterprise Settings (page 5-11) to configure the USB scanner, it may be necessary to unplug the scanner and
plug it back into the USB port in order for the auto-detect function to display the scanner settings.
Note: By default, COM1 and COM2 ports are used by Enterprise Data Collection. To use a COM port for screen blanking,
access Enterprise Settings (page 5-27) and set Data Collection > Tethered Scanners > Tethered Scanner (COMx)
- Enable Scanner Port to off (where COMx is either COM1 or COM2).
Enterprise Settings (page 5-11)See COM1 and COM2 Connector (page 9-6) for connector pinouts.
4 - 41
1. Seat the cable end connector firmly over the serial COM port on the Smart Dock.
2. Turn the thumbscrews in a clockwise direction. Do not over tighten.
3. Secure the cables to the Thor VM3 with Strain Relief Cable Clamps (page 4-16).
4. Connect the other cable end to the desired serial device.
Headphones
Microphone
To Audio cable
click!
3. Slide the cable ends together until they click shut. Do not twist or bend the connectors. The Thor VM3 internal
microphone and speakers are automatically disabled when the headset is connected.
4 - 42
Adjust Headset / Microphone and Secure Cable
Under Clothing
• Leave the cable exposed only at the top of the collar.
• Be sure to leave a small loop of cable to allow movement of your head.
Over Clothing
• Use clothing clips to hold the cable close to your body.
• Tuck the cable under the belt, but leave a small loop where it goes under the belt.
• Do not wear the cable on the front of your body. It may get in your way or get caught on protruding objects.
4 - 43
Connect CANbus Cable
The CANbus/Audio connector supports a headset adapter cable or a CANbus Y cable. The Thor VM3 does not support
connecting audio and CANbus simultaneously.
4 - 44
Install Remote Antenna
Remote antennas are available for the 802.11 WLAN radio, the WWAN radio and the GPS.
802.11 Remote Mount Antenna
The Remote Antenna Installation Kit consists of two brackets
(base plate and right angle), cable, and antenna. Tools are not
included.
The desired remote antenna bracket is mounted on the top of a
forklift, truck or other vehicle and cabled to the Thor VM3 inside
the vehicle.
The Vehicle Remote Mount Antenna cannot be used by devices
with an internal antenna.
Nut
Washer
Washer
Bracket
To antenna
Antenna
To antenna Bracket
4 - 45
Typical Installation
Antenna Mounting Bracket
Mounting Instructions
1. Attach and secure the desired mounting bracket to the highest point on the safety cage, following these pre-
cautions:
• The plate must be mounted so the antenna is not damaged while the vehicle or any of its parts are moving.
• The antenna mounting portion of the bracket must be parallel to the floor.
• If using two antennas, they must be mounted at least 12 inches (304.8mm) apart.
2. Attach the female connector of the coaxial cable to the antenna connector on the vehicle mounted Thor VM3.
3. Secure the whip antenna to the mounting bracket.
4. Connect the antenna cable to the whip antenna.
5. Use cable ties to secure the coaxial cable to the vehicle as necessary. Make sure the cable is routed so it is
not damaged by any moving parts of the vehicle.
6. Connect the cable to the antenna connector (Wi-Fi Main or Wi-Fi Aux) on the Thor VM3. If only one antenna
is used, be sure to connect it to the Wi-Fi Main connector.
7. Repeat the steps above for the second 802.11 antenna.
4 - 46
WAN Remote Mount Antenna
The WAN remote mount antenna can be either a magnetic mount or an adhesive mount antenna.
Magnetic Mount WAN Antenna Adhesive Mount WAN Antenna
To extension cable
To antenna
To antenna
connector on
computer
To antenna
connector on
computer
The Remote Antenna Installation Kit consists of the WAN antenna and an extension cable. The remote antenna is
mounted on the top of a forklift, truck or other vehicle and cabled to the Thor VM3 inside the vehicle.
1. Locate a mounting position on highest point on the vehicle, following these precautions:
• The antenna must be mounted so the antenna is not damaged while the vehicle or any of its parts are moving.
1. Locate a mounting position on highest point on the vehicle, following these precautions:
• The antenna must be mounted so the antenna is not damaged while the vehicle or any of its parts are moving.
4 - 47
Apply Touch Screen Protective Film
The optional Thor VM3 touch screen protective film is shipped in packs of 10. The protective film is flexible and treated with an
anti-glare coating on the outer surface.
The protective film is slightly larger than the Thor VM3 touch screen,
however the notches on the edge of the protective film (indicated by the
arrows) correspond to the display size of the Thor VM3. The protective
film is not adhesive. The corner edges are designed to fit between the
Thor VM3 display and the display housing to hold the protective film in
place.
A protective backing is applied to the rear surface of the protective film. A
pull tab is attached to the protective backing for easy removal of the pro-
tective backing from the film.
Pull Tab
Installation
1. Make sure the touch screen is clean and dry before installation. See Cleaning (page 4-2) for instructions on suitable
cleaning agents.
2. Pull the release tab to separate the protective backing from the rear of the protective film. Avoid touching the rear side
of the protective film while removing the liner.
3. Place the rear side of the protective film against the Thor VM3 display, roughly centering the protective film over the
display.
4. Slide the protective film until one corner can be slid back between the touch screen and the display housing as the
protective film is re-centered on the display. It may be necessary to press the edges of the protective film against the
display to ensure the entire edge slides under the display housing. It is easiest to start with one of the bottom corners.
5. Slide the protective film away from the other bottom corner. The film may bulge slightly away from the Thor VM3 as it is
being slid. Only slide the protective film enough so that the protective film can slide under the display housing on that
corner when the protective film is returned to center.
6. Repeat with each of the top corners, sliding the protective film away from the corner just enough that the protective film
can slide under the display housing when the protective film is returned to center.
7. It may be necessary to flex the protective film during the install, however use care not to flex the protective film so much
that the protective film kinks.
8. Once all corners are secure under the display housing, adjust the protective film, if necessary, so it is centered on the
touch screen.
Removal
1. To remove the protective film, slide the protective film in one direction until the edge clears.
2. Lift up on the edge of the protective film so it does not slide between the touch screen and display housing when the
protective film is slid back to the center.
3. Repeat until all edges are free and remove the protective film.
4 - 48
Disconnect UPS Battery
!
CAUTION - The UPS battery must be disconnected before you ship the Thor VM3 or Replace Front Panel (page 4-53).
Equipment Required
The following equipment is user-supplied:
• Torquing tool capable of measuring inch pounds
• #2 Phillips screwdriver bit
Disconnect Procedure
1. For convenience, the Thor VM3 can be removed
from the Smart Dock, though it is not necessary.
2. If the Thor VM3 remains in the dock, disconnect
the power cable from the dock.
3. Place the Thor VM3 in Suspend by pressing the
Power button.
4. Place the Thor VM3 face down on a stable
surface.
5. Use a #2 Phillips bit to loosen the captive M3
screws on the access panel with the mSATA and
SIM labels. This panel is on the right hand side
when the Thor VM3 is face down with the top
away from the user.
6. Locate the small push button located just below the SIM card installation slot.
7. Press the push button to disconnect the UPS. The UPS battery maintains its charge but is
disconnected from the power circuitry of the Thor VM3.
8. Reattach the access panel, torquing the M3 screws to 7.0 ± 0.5 inch pounds using a #2 Phillips
bit.
9. When the Thor VM3 is attached to external power, the UPS battery is automatically
reconnected.
10. Restart the Thor VM3.
4 - 49
Install mSATA Drive
Note: Install SIM Card(s) (page 4-51) before installing the mSATA drive.
!
• Only mSATA drives with pin 43 not connected are supported.
• Connecting an mSATA drive with connector pin 43 grounded can result in system instability such as a failure to
boot or non-functional accessories such as keyboard or mouse.
Equipment Required
The following equipment is user-supplied:
• Torquing tool capable of measuring inch pounds
• mSATA card
Installation Procedure
Note: Install any SIM cards before installing the mSATA drive.
4 - 50
Install SIM Card(s)
The Thor VM3 supports two SIM cards for WWAN switching. The Thor VM3 can switch between carriers, but the WWAN con-
nection is lost during this switch as the first carrier must be disconnected before the second carrier can be connected. See VM3
WWAN Connection Manager (page 6-40) for software configuration.
Note: The SIM card is not hot-swappable. After installing or removing a SIM card, the Thor VM3 must be rebooted for the
change to take effect.
Equipment Required
The following equipment is user-supplied:
• SIM card(s) for desired carrier(s)
• Torquing tool capable of measuring inch pounds
• #2 Phillips screwdriver bit
Installation Procedure
1. Place the Thor VM3 in Suspend by pressing the
Power button.
2. Remove the Thor VM3 from the dock.
3. Disconnect UPS Battery (page 4-49).
4. Place the Thor VM3 face down on a stable surface.
5. Use a #2 Phillips bit to loosen the captive M3
screws on the access panel with the mSATA and
SIM labels. This panel is on the right hand side
when the Thor VM3 is face down with the top away
from the user.
4 - 51
6. Locate the SIM card holders. The VM3 WWAN Connection Manager (page 6-40) identifies the
top slot (the slot closest to the top of the Thor VM3 as slot 1 (SIM 1) and the lower slot as slot 2
(SIM 2).
Note: If an mSATA drive has been installed, it is necessary to remove the drive before installing
the SIM card(s).
7. Slide the silver retainer clip toward the center of the Thor VM3.
8. After the clip is slid in, lift the outer edge of the SIM holder so it is at a 45º to 90º angle (compared
to the circuit board on which it is mounted).
SIM
10. Lower the SIM holder to back to its flat position.
11. Slide the silver retainer clip back toward the outside edge of the Thor VM3. This locks the SIM
card in place.
12. Reattach the access panel, torquing the screws to 7.0 ± 0.5 inch pounds.
13. Reinstall the Thor VM3 in the dock.
14. Resume the Thor VM3 from Suspend.
15. Restart the Thor VM3 (Start | Settings | Control Panel | Registry and tap the Restart button).
4 - 52
Replace Front Panel
Front Panel Options
The front panel of the Thor VM3 is field replaceable. The front panel assembly contains the keypad, touch screen and
optional defroster. Should any of these components fail, the front panel assembly can easily be replaced to reduce down-
time. The replacement front panel is available in several configurations:
• Standard temperature with resistive touch screen
• Cold storage with resistive touch screen
• Outdoor with resistive touch screen
Note: The Thor VM3 with Microsoft Windows Embedded Compact operating system does not support PCAP touch screens.
Equipment Required
The following equipment is user-supplied:
• Torquing tool capable of measuring inch pounds
• #2 Phillips screwdriver bit
Replacement Procedure
!
CAUTION - Before replacing the Thor VM3 front panel, Disconnect UPS Battery (page 4-49).
14 12
3 8 10 6 2
4 - 53
5. Carefully lift the front panel away from the device.
6. Position the replacement front panel so wiring connector on the back of the front panel lines up with the connector on
the Thor VM3.
7. Gently press the front panel into place.
8. Tighten the sixteen (16) captive M3 screws. In the order shown in the top figure above, use a #2 Phillips bit and torque
the screws to 7 ± 0.5 inch pounds.
9. Reinstall the Thor VM3 in the Smart Dock.
10. When the Thor VM3 is placed in the powered dock, the UPS battery automatically reconnects.
11. Restart the Thor VM3.
12. If adding or removing a defroster, update the Thor VM3 configuration by selecting Start > Settings > Control Panel >
Peripherals and tap the Test button.
13. Close any open control panel windows.
14. Perform a touch screen Calibration (page 5-59).
15. The Thor VM3 is ready for use.
4 - 54
5
Software
Introduction
There are several different aspects to the setup, configuration and operation of the Thor VM3. Many of the setup and configura-
tion settings are dependent upon the optional features such as hardware and software installed on the unit. The examples
found in this section are to be used as examples only, the configuration of your specific Thor VM3 computer may vary. The fol-
lowing sections provide a general reference for the configuration of the 1 and some of its optional features.
Operating System
Your Thor VM3 operating system is Microsoft® Windows® Embedded Compact 7. The Thor VM3 operating system revision is
displayed on the Desktop. This is the default setting for the Desktop Display Background.
5-1
Save Changes to the Registry
The Thor VM3 saves the registry when you:
• Warmboot - either from the Registry control panel, the warmboot command or the reboot keypress sequence.
• Restart - from the Registry control panel
• Suspend/Resume - Either user initiated or upon Suspend timer expiration.
• Shutdown - The registry is saved during a controlled shutdown, such as when the UPS charge reaches a critically low
level and external power is not available.
The registry save process takes 0 – 3 seconds. If nothing has been changed, nothing is saved (e.g., 0 seconds).
Software Load
The software loaded on the Thor VM3 consists of Microsoft® Windows® Embedded Compact 7 OS, hardware-specific OEM
Adaptation Layer, device drivers, Internet Explorer and utilities. The software supported is summarized below:
• Full Operating System License: Includes all operating system components, including Microsoft® Windows® Embedded
Compact 7 kernel, file system, communications, connectivity (for remote APIs), device drivers, events and messaging,
graphics, keyboard and touch screen input, window management, and common controls.
• Network and Device Drivers
• Bluetooth
Note: Please contact Honeywell Technical Assistance for software updates and CAB files as they are released by Honeywell.
Software Applications
The following applications are included:
• WordPad
• Enterprise Client Pack
• ActiveSync
• Internet Explorer
• Word Viewer
• Excel Viewer
• PDF Viewer
• PowerPoint Viewer
Note that the viewer applications allow viewing documents, but not editing them.
ActiveSync
ActiveSync is pre-loaded. Using Microsoft ActiveSync you can copy files from your Thor VM3 to your desktop/laptop , and
vice versa.
RFTerm (Optional)
Start > Programs > Honeywell RFTerm
RFTerm is pre-loaded when ordered. The application can also be accessed by double-clicking the RFTerm desktop icon.
Enterprise TE (Optional)
Start > Programs > Enterprise TE
Enterprise TE is pre-loaded when ordered. The application can also be accessed by double-clicking the Enterprise TE
desktop icon.
Music Player
Music Player is supported on the VM3. However, the Save function should not be used due to an issue within this Microsoft
product.
5-2
Enterprise Client Pack
There are several components of the Enterprise Client Pack installed on the Thor VM3. For more information on these pro-
grams visit the Thor VM3 product page at www.honeywellaidc.com.
Enterprise TE
Start > All Programs > Honeywell > Enterprise TE
Optional terminal emulation software. The application can also be accessed by double-clicking the Enterprise TE
desktop icon.
Enterprise Browser
Start > All Programs > Honeywell > Enterprise Browser
Optional lock-down web client software. The application can also be accessed by double-clicking the Enterprise
Browser desktop icon.
Enterprise Browser is designed for users running web-based applications to limit access to other applications, web
sites, or other parts of the operating system
Enterprise Browser can be used alone or with Launcher.
Launcher
Start > All Programs > Honeywell > Launcher
Optional lock-down menu software. The application can also be accessed by double-clicking the Launcher desktop
icon.
End users must log in and can only access authorized programs.
Launcher can be used alone or with Enterprise Browser .
LAUNCH.EXE
Launch works in coordination with registry settings to allow drivers or applications to be loaded automatically into DRAM at
system startup. Registry settings control what gets launched; see the App Note for information on these settings. For
examples, you can look at the registry key
HKEY_LOCAL_MACHINE \ Software \ HSM \ Persist
5-3
There are two optional fields that may be added:
1. Delay is used to add a delay after the item is loaded, before the next is loaded. The delay is given in seconds, and
defaults to 0 if not specified. If the install fails (or the file to be installed is not found), the delay does not occur.
2. PCMCIA is used to indicate that the file (usually a CAB file) being loaded is a radio driver, and the PCMCIA slots
should be started after this file is loaded. By default, the PCMCIA slots are off on powerup, to prevent the “Uniden-
tified PCMCIA Slot” dialog from appearing. Once the drivers are loaded, the slot can be turned on. The value in
the PCMCIA field is a DWORD, representing the number of seconds to wait after installing the CAB file, but before
activating the slot (a latency to allow the thread loading the driver to finish installation). The default value of 0
means the slot is not powered on. The default values for the default radio drivers (listed below) is 1, meaning one
second elapses between the CAB file loading and the slot powering up.
The auto-launch process proceeds as follows:
1. The launch utility opens the registry database and reads the list of CAB files to auto-launch.
2. First it looks for FileName to see if the CAB file is present. If not, the registry entry is ignored. If it is present, and
the Installed flag is not set, auto-launch makes a copy of the CAB file (since it gets deleted by installation), and
runs the Microsoft utility WCELOAD to install it.
3. If the Installed flag is set, auto-launch looks for the FileCheck file. If it is present, the CAB file is installed, and that
registry entry is complete. If the FileCheck file is not present, memory has been lost, and the utility calls WCE-
LOAD to reinstall the CAB file.
4. Then, the whole process repeats for the next entry in the registry, until all registry entries are analyzed.
5. To force execution every time (for example, for AUTOEXEC.BAT), use a FileCheck of “dummy”, which will never
be found, forcing the item to execute.
6. For persist keys specifying .EXE or .BAT files, the executing process is started, and then Launch will continue,
leaving the loading process to run independently. For other persist keys (including .CAB files), Launch will wait for
the loading process to complete before continuing. This is important, for example, to ensure that a .CAB file is
installed before the .EXE files from the .CAB file are run.
7. Note that the auto-launch process can also launch batch files (*.BAT), executable files (*.EXE), registry setting
files (*.REG), or sound files (*.WAV). The mechanism is the same as listed above, but the appropriate application
is called, depending on file type.
Note: Registry entries may vary depending on software revision level and options ordered with the Thor VM3.
5-4
REGEDIT.EXE
Registry Editor – Use caution when editing the Registry. Make a backup copy of the registry before changes are made.
WARMBOOT.EXE
Double-click this file to warm boot the computer (i.e., all RAM is preserved). It automatically saves the registry before
rebooting which means configuration changes are not lost.
PrtScrn.EXE
Command line utility which performs a screen print and saves the file in .BMP format in the \System folder. Tap Start >
Run and type prtscrn and tap OK, or press Enter. There is a 10 second delay before the screen print is made. The
device beeps and the screen captured file (scrnnnnn.bmp) is placed in the \System folder. The numeric filename is
incremented by 1 each time the PrtScrn function is activated. The command is not case-sensitive.
Desktop
The Thor VM3 Desktop appearance is similar to that of a desktop PC running a Windows operating system.
At the bottom of the screen is the Start button. Tapping the Start Button causes the Start Menu (page 5-7) to display. It contains
the standard Windows menu options: Programs, Favorites, Documents, Settings, Help, and Run.
Desktop Icons
At a minimum, the desktop displays icons for My Device, Internet Explorer and the Recycle Bin. Following are a few of the
other icons that may be on the Thor VM3 Desktop. Contact Technical Assistance (page 10-1) about the latest updates and
upgrades for your operating system.
Icon Function
Access files and programs.
Used for access the WLAN Wireless Configuration Utility (WCU) (page 7-1).
RFTerm is an optional terminal emulation program. When RFTerm is installed, this icon is displayed on the
desktop.
Enterprise TE is an optional terminal emulation program. When Enterprise TE is installed, this icon is dis-
played on the desktop.
Launcher is lock-down menu software used to restrict users to only authorized programs.
Enterprise Browser is a lock-down web client software used to restrict user’s access to other applications,
web sites and the operating system.
5-5
Icon Function
HTML5 Browser is for web applications designed to run on-line, off-line or a combination.
Start button. Access programs, select from the Favorites listing, documents last worked on, change/view set-
tings for the control panel or taskbar, on-line help or run programs.
Taskbar
The number and type of icons displayed are based on the device type, installed options and configuration of the Thor
VM3.
My Device Folders
Folder Description Preserved upon Reboot?
Application Data Data saved by running applications No
My Documents Storage for downloaded files / applications No
Network Mounted network drive No
Program Files Applications No
System Internal mSATA (CAB file storage) Yes
Temp Location for temporary files No
Windows Operating System in Secure Storage No
Internet Explorer
Start > Programs > Internet Explorer
There are a few changes in the Windows Embedded Compact version of Internet Explorer as it relates to the general desk-
top Windows PC Internet Explorer options. Tap the “?” button to access Internet Explorer Help.
5-6
Start Menu
The following list represents a typical factory default program installation. Your system may contain different items from those
shown below, based on the software and hardware options purchased.
Communication Stores Network communication options
Start (or Stop) FTP Server Begin / end connection to FTP server
Command Prompt The command line interface in a separate window
Internet Explorer Access web pages on the Internet/Intranet
File Viewers
JETCET PDF Viewer View Adobe PDF Documents
Excel Viewer View Excel and compatible documents
PowerPoint Viewer View PowerPoint and compatible documents
Word Viewer View Word and compatible documents
Microsoft WordPad Opens an ASCII notepad
Remote Desktop Connection Log on to a Windows Terminal Server
Honeywell RFTerm Option. Terminal emulation application.
Enterprise Browser Lock down software.
Enterprise TE Terminal emulation application.
HTML5 Browser Lock-down menu software.
Launcher Browser for web applications.
Settings Access to all Control Panels, a shortcut to the Network and Dialup Control Panel and
access to Taskbar options.
Windows Explorer File management program
Communication
Start > Programs > Communication
Command Prompt
Start > Programs > Command Prompt
Type help cmd at the command prompt to view valid Pocket PC (Console) commands.
Exit the command prompt by typing exit at the command prompt or tap File > Close.
Internet Explorer
Start > Programs > Internet Explorer
There are a few changes in the Windows Embedded Compact version of Internet Explorer as it relates to the general desk-
top Windows PC Internet Explorer options. Tap the “?” button to access Internet Explorer Help.
5-7
Media Player
Start > Programs > Media Player
There are few changes in the Windows Embedded Compact version of Media Player as it relates to the general desktop
Windows PC Microsoft Media Player options.
After the Media Player application is running, click the ? button to access Media Player Help.
File Viewers
The following applications are included:
• JETCET PDF Viewer
• Excel Viewer
• PowerPoint Viewer
• Word Viewer
Note: The viewer applications allow viewing documents, but not editing them.
Microsoft WordPad
Start > Programs > Microsoft WordPad
Create and edit documents and templates in WordPad, using buttons and menu commands that are similar to those used in
the desktop PC version of Microsoft WordPad.
By default WordPad files are saved as .PWD files. Documents can be saved in other formats e.g., .RTF or .DOC.
Tap the ? button to access WordPad Help.
Settings
Start > Settings
The Settings menu option may include the following:
Control Panel (page 5-13) All control panels
Network and Dialup Shortcut to control panel. Connect to a network, create a new connection, and adjust pa-
Connections (page 5-40) rameters for client connections.
Taskbar (page 5-9) Set Taskbar parameters
Windows Explorer
Start > Programs > Windows Explorer
There are a few changes in the Windows Embedded Compact version of Windows Explorer as it relates to the general
desktop PC Windows Explorer options. Tap the “?” button to access Windows Explorer Help.
5-8
Taskbar
Start > Settings > Taskbar
There are a few changes in the Windows Embedded Compact version of Taskbar as it relates to the general desktop PC Win-
dows Taskbar options.
When the taskbar is auto hidden, press the Ctrl key then the Esc key to make the Start button appear.
Clicking the Taskbar option on the Settings menu displays the General and Advanced Taskbar tabs.
General
Factory Default Settings
Always on Top Enabled
Auto hide Disabled
Show Clock Enabled
Advanced
5-9
Taskbar Icons
As Thor VM3 devices and applications open and change state, icons are placed in the Taskbar. In most cases, tapping
the icon in the Taskbar opens the related application.
Refer to Start > Help for an explanation of standard Windows Embedded Compact taskbar icons.
Following are a few of the Thor VM3 taskbar icons that may appear in the Taskbar. These icons are in addition to the
Windows Embedded Compact taskbar icons.
Wireless Zero Config Inactive / Connected / Not Connected.
Clicking on the icon opens the Wireless Zero Config utility.
ActiveSync (page 6-1) connection
Current time. Clicking the time display opens the Date / Time (page 5-24) control panel.
CapsLock active.
5 - 10
Thor VM3 OS Upgrade
Introduction
Depending on the size of the operating system, the total time required for a successful upgrade may require several min-
utes.
There may be firmware and BIOS upgrades available for the Thor VM3. Contact Technical Assistance (page 10-1) for
upgrade information and instructions. In some cases, it may be necessary to upgrade firmware before upgrading the oper-
ating system.
!
The Thor VM3 must be connected to external power before upgrading the BIOS, firmware or operating systems.
If the Thor VM3 is operating on UPS battery power, the upgrade process does not initiate and the Thor VM3 is not
upgraded.
Preparation
• Contact Technical Assistance (page 10-1) to get the OS upgrade files.
• Honeywell Technical Assistance may advise you that additional upgrades such as BIOS or firmware are required before
upgrading the OS. Please follow any additional upgrade instructions provided by Technical Assistance.
• Use ActiveSync to back up Thor VM3 user files and store them elsewhere before beginning an upgrade on the Thor VM3.
• Maintain an uninterrupted AC/DC power source to the Thor VM3 throughout this process.
• The mSATA card with the OS and systems files must be present for the Thor VM3 to boot.
• Always perform OS updates when the Thor VM3 has a dependable external power source connected to the Thor VM3.
Procedure
1. Verify a dependable power source is applied to the Thor VM3 and will stay connected during the upgrade procedure.
2. Copy the OS files to a USB thumb drive.
3. Copy the files from the USB drive to the Thor VM3's System folder.
4. During the file copy process to the Thor VM3 System folder, when asked “Overwrite ?”, select Yes to All.
5. Review the files that were downloaded to the System folder.
6. Remove the USB drive.
7. Restart the Thor VM3.
8. When the OS finishes loading, check the OS update version by selecting Start > Settings > Control Panel > About >
Software tab.
The touch screen may require calibration, however some Windows OS versions save the calibration data, eliminating the
need to calibrate.
If the Thor VM3 won't boot up after the upgrade is finished, contact Technical Assistance (page 10-1) for re-imaging
options.
5 - 11
BIOS
The Microsoft Windows Embedded Compact operating system is installed before shipping. The default BIOS parameters are
configured at that time. In most cases, it is unnecessary to modify the BIOS parameters.
Generally, it is only necessary to enter the BIOS setup to change the boot order of the drives.
This section is not intended to detail all features of the BIOS, instead it is intended to cover the most commonly used setup
options.
!
CAUTION - Be very careful when using this utility to modify BIOS Setup parameters. The Thor VM3 may generate unex-
pected results when incorrect or conflicting parameter values are entered. Selecting incorrect or invalid options may re-
quire the Thor VM3 to be returned for repairs.
The parameters should only be modified by Information Services personnel or the system administrator.
Boot Order
To view or edit the boot order, select the Boot tab.
By default, the first device in the boot order is USB Hard Drive.
The boot drive can also be selected at bootup. Press P5 from the Thor VM3 keypad or press F5 from an external key-
board. Use the arrows on the external keypad to make a selection. This does not change the default boot order and
the next bootup will return to the default drive without user intervention.
5 - 12
Control Panel
Start > Settings > Control Panel or My Device > Control Panel link
Tap the ? button for Help when changing Thor VM3 Control Panel options.
Option Function
About (page 5-15) Software, hardware, versions and network IP. No user intervention allowed.
Accessibility (page 5-16) Customize the way the keyboard, audio, display or mouse function for users with hearing or
viewing difficulties.
Battery (page 5-17) View voltage and status of the internal UPS battery.
Bluetooth Printing (page 5-18) Discover and pair Bluetooth printers.
Bluetooth Scanning (page 5-20) Discover and pair Bluetooth scanners.
Certificates (page 5-23) Manage digital certificates used for secure communication.
Date / Time (page 5-24) Set Date, Time, Time Zone, and Daylight Savings.
Dialing (page 5-24) Connection setup for modem attached to COM port or CompactFlash slot. . CompactFlash
slot not available for modem use on Thor VM3.
Display (page 5-25) Set background graphic and scheme. Set touch screen and keypad backlight properties and
timers.
Enterprise Settings (page 5-27) Configure data collection, Bluetooth, certain applications, etc.
Error Reporting (page 5-30) Reports software errors to Microsoft.
Input Panel (page 5-31) Select the current key / data input method. Select custom key maps.
Internet Options (page 5-32) Set General, Connection, Security, Privacy, Advanced and Popups options for Internet con-
nectivity.
Keyboard (page 5-34) Set key repeat delay and key repeat rate.
Keyboard Remapper (page 5-35) Remap programmable keys on Thor VM3 front panel or keys on an external USB keyboard.
Mixer (page 5-38) Adjust the input and output parameters – volume, sidetone, and record gain, for headphone,
software and microphone.
Mouse (page 5-39) Set the double-tap sensitivity for stylus taps on the touch screen.
Network and Dialup Connections Set network driver properties and network access properties.
(page 5-40)
Network Capture (page 5-41) Set network logging options.
Options (page 5-43) Set various device specific configuration options.
Owner (page 5-45) Set the mobile device owner details (name, phone, etc.). Enter notes. Enable / disable Own-
er display parameters. Enter Network ID for the device – user name, password, domain.
Password (page 5-46) Set OS access password properties for signon and/or screen saver.
PC Connection (page 5-47) Control the connection between the mobile device and a local desktop or laptop computer.
Peripherals (page 5-48) Enable or disable touch screen defroster (heater), if installed.
Power (page 5-49) Set power scheme properties. Review device status.
Power Configuration Mode (page Set power configuration mode.
5-51)
Regional Settings (page 5-54) Set appearance of numbers, currency, time and date based on country region and language
settings.
Registry (page 5-55) Load or save user defaults, load factory defaults, warmboot or restart.
Remove Programs (page 5-56) Select to remove specific user installed programs in their entirety.
Screen Control (page 5-57) Configure screen blanking.
Storage Manager (page 5-58) Displays the available storage drives.
Stylus (page 5-59) Set double-tap sensitivity properties and/or calibrate the touch panel.
5 - 13
Option Function
System (page 5-60) Review System and Computer data and revision levels. Adjust Storage and Program mem-
ory settings. Enter device name and description. Review copyright notices.
Terminal Server Client Licenses Select a server client license from a drop down list.
(page 5-61)
Volume and Sounds (page 5-62) Enable / disable volume and sounds. Set volume parameters and assign sound WAV files
to events.
ZoomZone (page 5-63) Configures screen blanking.
5 - 14
About
Start > Settings > Control Panel > About
The data cannot be edited by the Thor VM3 user on these panels.
Tab Contents
Software GUID, Serial Number, Windows Embedded Compact Version, OAL Version, Compile Version, and Language.
Language indicates localized version.
Hardware CPU Type, Codec Type, Display, and DRAM memory
Versions Revision level of software modules and .NET Compact Framework Version.
Network IP Current network connection IP and MAC address.
Software
Firmware Versions
The Software tab lists the firmware versions installed. The BIOS, EC and Screen MCU firmware versions are
shown on this tab.
Language
The Software tab displays the localized language version of the OS image. The language is identified as English
only or + an additional language.
The languages are ordered separately and built-in to the OS image. The Thor VM3 may be pre-loaded with an
English only OS. Contact Technical Assistance (page 10-1) for information on installing an OS for a different lan-
guage. The built-in languages are added to registry entries and are available immediately upon startup.
Versions
The Versions tab displays the versions of many of the software programs installed. Not all installed software is
included in this list and the list varies depending on the applications loaded on the Thor VM3. The Image line displays
the revision of the system software installed. Refer to the last three digits to determine the revision level.
Versions Tab and the Registry
The Versions tab displays program version details from the registry.
Customized information can be displayed by modifying the Registry using the Registry Editor. Use caution when
editing the Registry and make a backup copy of the registry before changes are made.
The registry settings for the Version tab are under HKEY_LOCAL_MACHINE \ Software \ HSM \ Version in the
registry.
To add a user application to the Version panel, create a new string value under the HKLM\Software\HSM\Version
key. The string name should be the Application name to appear in the Version window. The data for the value
should be the version number to appear in the Version window.
Version strings can be equal to or less than 254 characters. Because the strings are displayed in a text box, any
number can be accommodated, up to the 64K byte text box limitation.
5 - 15
Network IP
MAC Address
The Network IP tab displays the MAC address of the network card(s) such as the WLAN radio and the Bluetooth
module.
Accessibility
Start > Settings > Control Panel > Accessibility
Customize the way the Thor VM3 keyboard, sound, display, mouse, automatic reset and notification sounds function.
There are a few changes from general Windows desktop Accessibility options.
Tab Contents
Keyboard Sticky Keys - Disabled (cannot be enabled).
ToggleKeys - Disabled by default. Tap the Use ToggleKeys checkbox to enable this option. Tap the Settings
button to view or change parameters.
Sound SoundSentry is disabled by default. Tap the Use SoundSentry checkbox to enable this option. Tap the Set-
tings button to view or change parameters.
Display High Contrast is disabled by default. Tap the Use High Contrast checkbox to enable this option. Tap the Set-
tings button to view or change parameters.
Mouse MouseKeys is disabled by default. Tap the Use MouseKeys checkbox to enable this option. Tap the Settings
button to view or change parameters.
General Automatic reset is disabled by default. Tap the Turn off accessibility features checkbox to enable this option
and use the dropdown option to assign a timer.
Notification is enabled by default. Sounds are emitted when turning a feature on or off.
The following exceptions are due to a limitation in the Microsoft Windows Embedded Compact operating system:
• If the ToggleKeys option is selected, please note that the ScrollLock key does not produce a sound as the CapsLock and
NumLock keys do.
• If the SoundSentry option is selected, please note that ScrollLock does not produce a visual warning as the CapsLock
and NumLock keys do.
5 - 16
Battery
Start > Settings > Control Panel > Battery
This panel is used to view the status and percentage of power remaining in the Thor VM3 UPS battery.
The battery gas gauge icon resides in the system tray and shows four levels of charge – 100%, 75%, 50%, 25%. At
a point below 25% the gas gauge icon will turn red indicating the battery is low.
The battery gauge icon is enabled by default, but can be disabled on the Thor VM3 Battery control panel. The UPS
LED turns red when there is approximately 2 minutes of run time remaining.
The Status box indicates if the UPS battery is receiving external power.
5 - 17
Bluetooth Printing
Start > Settings > Control Panel > Bluetooth Printing
To configure your computer for Bluetooth wireless printing, you need to:
• Create an application that opens the wireless printing COM port on your computer. For help, see the Bluetooth Resource
Kit, which is part of the Intermec Developer Library (IDL), available from the Intermec website at www.intermec.com/idl.
• Select the current wireless printer on your computer. For help, see the Printer Options section of Enterprise Settings
(page 5-27)
Note: You can also print wirelessly using Microsoft APIs with Bluetooth extensions for Winsock and Bluetooth. For help,
see the Bluetooth Resource Kit documentation.
3. Tap Search.
Note: The printer can also be specified by taping the Manual button and entering the MAC address of the printer.
5. Select the desired printer from the list and tap the Set button.
6. If this is the first time a printer is connected, it may take 40-45 seconds for the driver to install.
7. If no error message is displayed, the printer is ready. If an error message is displayed, the timeout may have happened
before the driver installation has completed.
5 - 18
To continue after this error:
• Dismiss the error.
• Return to the Bluetooth Printing control panel and repeat the process starting with step 3.
5 - 19
Bluetooth Scanning
Start > Settings > Control Panel > Bluetooth Scanning
Quick Connect
There are two different bar codes printed on decals on the side of the Thor VM3.
Note: The bar codes below are samples. Do not scan these to connect a Bluetooth scanner. Scan the bar code on
your device.
Use the bar code Quick Connect bar code on either side of the Thor VM3 to connect the following scanners:
• Intermec SF51 Bluetooth scanner
• Intermec SF61 Bluetooth scanner
• Intermec SR61 Bluetooth scanner
5 - 20
Using Quick Connect with On Screen Bar Code
1. Select Bluetooth Scanning from the Control Panel (either large or small icon view option must be selected).
2. Tap Add Device.
3. Select Quick Connect.
4. Tap Next.
5. Select the type of scanner to add:
Note: The bar codes below are samples. Do not scan these to connect a Bluetooth scanner. Scan the bar
code on your device
Note: If this choice is not presented, the on-screen bar code displayed is only valid for SF51, SF61 or SR61
bar code scanners.
Select Granit 2D scanner to display this bar code Select SF51, SF61 or SR61 scanner to display
this bar code
Scan the displayed bar code to connect one of Scan the displayed bar code to connect one of
these scanners: these scanners:
• Honeywell/LXE 8650 family of Bluetooth ring • Intermec SF51 Bluetooth scanner
scanners • Intermec SF61 Bluetooth scanner
• Honeywell Granit 1911i Bluetooth scanner • Intermec SR61 Bluetooth scanner
• Honeywell Granit 1981i Bluetooth scanner
• LXE 88x0 family of Bluetooth scanners
Note: Not all bar code scanners can read the bar code from the screen. If this process fails, use the printed
label on the device. See Using Quick Connect with On Screen Bar Code (page 5-21)
Search
To search for a Bluetooth scanner:
1. Select Bluetooth Scanning from the Control Panel (either large or small icon view option must be selected).
2. Tap Add Device.
3. Select Search.
4. Tap Next.
5. Select the scanner from the devices shown.
6. Tap Next.
5 - 21
Manual Connect
1. Select Bluetooth Scanning from the Control Panel (either large or small icon view option must be selected).
2. Tap Add Device.
3. Select Manual.
4. Tap Next.
5. Enter the MAC address of the Bluetooth scanner.
6. Tap Next.
Troubleshooting
• The Honeywell Xenon 1902 Bluetooth scanner does not work with Quick Connect. It must be connected using the
Search or Manual options.
• Make sure the scanner is in the correct mode. Bar codes to set the mode can be found in the manual provided with
the Bluetooth scanner.
» The scanner must be a master device to use the Quick Connect option.
» The scanner must be a slave device to use the Search or Manual option.
• The Motorola/Symbol LS3578 family of scanners may not support the Quick Connect feature (depending on firmware
installed). If Quick Connect does not work, use the other options to connect these scanners.
• If the Honeywell Granit 1911i and Granit 1981i scanners cannot be found with the Search option, scan the PDAs/
Mobility Systems Devices bar code from the scanner manual and search again.
• If the Honeywell Granit 1911i and Granit 1981i scanners cannot connect using the manual option, scan the PDAs/
Mobility Systems Devices bar code from the scanner manual then repeat the manual add process again.
• If the Honeywell Granit 1911i and Granit 1981i scanners are not removed after using the Remove option, the auto-
reconnect option is enabled on the Granit scanner (this is the default option). To remove the scanner:
» Scan the disable auto-reconnect bar code from the Granit scanner manual then tap Remove, or
» Scan BT_RMV to unlink and disconnect the scanner the tap Remove.
• If a Honeywell/LXE ring scanner is not connecting, scan the Restore Factory Defaults bar code in the scanner
manual and try connecting again.
5 - 22
Certificates
Start > Settings > Control Panel > Certificates
Manage digital certificates used for secure communication.
Note: Digital certificates are date sensitive. If the date on the Thor VM3 is incorrect, wireless authentication will fail.
The Certificates stores tab lists the certificates trusted by the Thor VM3 user.
These values may change based on the type of network security resident in the client, access point or the host system.
Tap the Import button to import a digital certificate file.
Tap the View button to view a highlighted digital certificate.
Note: Tap the Remove button to remove highlighted certificate files.
Note: Tap the ? button and follow the instructions in the Windows Help file when working with trusted authorities and digital
certificates.
5 - 23
Date / Time
Start > Settings > Control Panel > Date/Time - or - Time in Desktop Taskbar
Use this Thor VM3 panel to set Date, Time, Time Zone, and assign a Daylight Savings location.
Factory Default Settings
Time Zone GMT-08:00
Daylight Savings Enabled
There is very little functional change from general desktop or laptop Date/Time Properties options.
Double-tapping the time displayed in the Desktop Taskbar causes the Date/Time Properties screen to appear.
Date and time can be set to automatically synchronize with a time server on the Communications tab of the Options control
panel. See Autolaunch TimeSync (page 5-43).
Dialing
Start > Settings > Control Panel > Dialing
Set dialup properties for internal modems (not supplied or supported on the Thor VM3).
Factory Default Settings
Location Work
Area Code 425
Tone Dialing Enabled
Country/Region 1
Disable Call Waiting Disabled (blank)
5 - 24
Display
Start > Settings > Control Panel > Display
The display might also called the touch screen.
Select the desktop background image and appearance scheme for the Thor VM3. Using the options on the Backlight tab,
set the display backlight and keypad backlight timers when running on battery or external power.
Adjust the settings and tap the OK button to save the changes. Saved changes take effect immediately.
Factory Default Settings
Background
There is very little change from general desktop PC Display Properties / Background options. Select an image from
the dropdown list (or tap the Browse button to select an image from another folder) to display on the Desktop, and then
tap the OK button to save the change. The change takes effect immediately.
Appearance
There is very little change from general desktop PC Appearance options. Select a scheme from the dropdown list and
make changes to the parameters. The default is High Contrast White for monochrome displays and Windows Stan-
dard for color displays. Tap the Save button to save any changes, renaming the scheme if desired. Tap the Delete but-
ton to delete schemes. Tap the Apply button to apply the selected scheme to the display.
5 - 25
Backlight
When the backlight timer expires, the touch screen backlight is dimmed, not turned off. When both checkboxes are
unchecked, the backlight never turns off (or dims).
The default value for external power varies by the scheme selected on the Power (page 5-49) control panel (and for
Ignition Control, the status of the vehicle ignition). The default value is 1 minute when operating on the internal UPS
battery.
5 - 26
Enterprise Settings
Start > Settings > Control Panel > Enterprise Settings
Use Enterprise Settings to configure parameters for Enterprise applications on the computer. You can configure parame-
ters for important functions like data collection and communications.
External bar code scanners are supported by connecting the scanner to a COM port, USB port, or by Bluetooth. The scan-
ners parameters, including bar code symbologies, can be configured using Enterprise Settings > Data Collection.
Tethered Scanners
Tethered/USB-Configure on Connect Auto-configure on connect:
• Overwrite with computer settings (default)
• Keep scanner settings
Tethered Scanner (COM1) • Enable scanner port (On by default, see note below)
• Symbologies
• Symbology Options
• Scanner Settings
• Scanner port Settings
• Decode Security
Tethered Scanner (COM2) • Enable scanner port (On by default, see note below)
• Symbologies
• Symbology Options
• Scanner Settings
• Scanner port Settings
• Decode Security
Note: By default, COM1 and COM2 are enabled as scanner ports. To use the COM port for another use (such as
screen blanking), set the Enable Scanner Port to Off for the desired port.
Bluetooth Scanners
5 - 27
BT-Configure on Connect Auto-configure on connect:
• Overwrite with computer settings
• Keep scanner settings
Bluetooth Parameters
Power • Off
• On (default)
Discoverable • Disable (default)
• Enable
Connectable • Disable
• Enable (default)
Class of Device Hardware information (no user entry)
IBT Hardware information (no user entry)
Radio Hardware information (no user entry)
Device Address Hardware information (no user entry)
Printers Parameters
Information Printer Configlet Version
Memory
Display
Print Engine
Media The settings that appear in these menus depend on the printer paired with
the Thor VM3. The printer must be using the Bluetooth Printing (page 5-18)
Print Defs application.
Freed Adj
Power
Bluetooth Communication
Applications Parameters
Launcher • Program Version
• Application Launch Buttons
» Caption text Color
» Application Button 1 - 21
• Background Image
• Single Application Auto Start
• Default Password
• Keypad Options
• Advanced Options
Enterprise Terminal Emulation Enterprise Terminal Emulation Configuration Options
Auto Start Auto Start Options
• None (default)
• Launcher
• Enterprise Browser
• Enterprise Terminal Emulation
• HTML5 Browser
Enterprise Browser Program Version
Browser Engine
General
Menu Options
Security
Privacy
Appearance
Menu and Toolbar Actions
5 - 28
HTML5 Browser Program Version
General
Security
Privacy
Appearance
Core Messaging Service Parameters
Server IP Server IP (read-only)
Broadcast Name Broadcast Name
Port Port (read-only)
Keep Alive Ping Interval Keep alive ping interval
SmartSystem information Parameters
Identity Identity information (hardware version, firmware version, OS version, etc.)
(read-only)
Administrator Administrator settings (name, phone, and email)
Location Location settings (country, state, city, campus, and detail)
Information Device Notes (read-only
Device Manager Parameters
Device Health Controls • Enable Data Health Collection
• Enable Blue Light (LED)
• Set Rule File Location
• Set Data Refresh periods
Disabled Executables Disabled Executables Template
Device Wipe • Enable Wipe
• Interval (in days)
Virtual Wedge Parameters
Enable Virtual Wedge Enable virtual wedge
Virtual Wedge Method • Adapt to Application (default)
• Character mode
• Block mode
Barcode Scanner Wedge • Barcode Scanner Grid
• Label Encoding (Code Page)
License Manager Parameters
About Information on License Vault
License Vault None (displays applications that are licensed)
Note: USB scanners are not supported by or configured through Enterprise Settings. See USB Scanners (page 5-30).
The scanner symbologies can be updated through Enterprise data collection software.
Serial Scanners
To configure a particular scanner to work with Enterprise data collection software, select Start > Control Panel >
Enterprise Settings > Data Collection > Tethered Scanner > Tethered Scanner (COM1) or (COM2) > Scan-
ner Settings.
5 - 29
Select the appropriate scanner model (SR Intermec Scanner, ASCII, SR60). By default, both COM1 and COM2
are opened so the appropriate scanners (see below) can work without changing factory defaults:
Tethered Scanner (COM1)
By default the Scanner Model is set to SR Intermec Scanner, which covers models such as SR61T, SR30,
and SR31.
Tethered Scanner (COM2)
By default the Scanner Model is set to ASCII to connect with a scanner with baud rate of 9600, 8 data bits, no
parity, 1 stopbit, and no flow control.
Bluetooth Scanners
See Bluetooth Scanning (page 5-20) for information on connecting Bluetooth scanners.
Always use Enterprise Settings to configure Bluetooth parameters. Do not use the Bluetooth configuration options
available from the Bluetooth icon in the system tray.
USB Scanners
When a HID enabled USB scanner is connected to the Thor VM3 the scanned data is transmitted to the active win-
dows as keystroke messages. Any data handling to be applied to the scanned data (for example to strip leading or
trailing characters) must be programmed into the scan engine. This is done by scanning configuration bar codes from
the scanner manufacturer or handled by the application accepting the data. Note that Enterprise Settings data collec-
tion does not support USB Scanners.
Error Reporting
Start > Settings > Control Panel > Error Reporting
5 - 30
Input Panel
Start > Settings > Control Panel > Input Panel
Set the current Thor VM3 keys and data input method.
Factory Default Settings
Input Panel
Input Method Keyboard
Allow applications to change input panel state Enabled
Options button
Keys Small keys
Use gestures Disabled
Use this panel to make the Input Panel (on-screen keyboard) or the physical keypad primarily available when entering data
on any screen. Selecting Keyboard enables both.
Tap the Options button to set the size of the keys displayed on-screen and whether gestures are enabled or disabled.
5 - 31
Internet Options
Start > Settings > Control Panel > Internet Options
Set options for Thor VM3 Internet connectivity.
Select a tab. Adjust the settings and tap the OK button. The changes take effect immediately.
Factory Default Settings
General
Start Page http://www.honeywell.com
Search Page http://search.msn.com
User Agent N/A
Cache Size 5120 KB
Connection
Use LAN Disabled
Autodial Name None
Proxy Server Disabled
Bypass Proxy Disabled
Security
Internet Default site
Advanced
Stylesheets Enabled
Theming Support Enable
Multimedia All options enabled
Security All options enabled
Security Tab: Use the Settings button to set ActiveX control, scripting and plug-in behavior for each zone (Internet, Local
intranet, Trusted Sites, Restricted Sites). Use the Site button to add sites to each zone.
5 - 32
5 - 33
Keyboard
Start > Settings > Control Panel > Keyboard
Set keypad key map, keypad key repeat delay, and key repeat rate.
Factory Default Settings
Repeat character Enable
Repeat Delay Short
Repeat Rate Slow
5 - 34
Keyboard Remapper
Start > Settings > Control Panel > Keyboard Remapper
3. Select the desired value for the remapped key from the Key Value pull-down list.
4. Tap Add Key Definition.
5. The value for the remapped key shows in the box below.
6. To return any key to the default value, select Key Default Value from the Key Value list.
7. Changes are saved when the remapping utility is exited.
Abort
Tap the Abort button to exit without saving changes.
5 - 35
Menu
The following options are available.
About
Displays information about the keyboard remapper utility.
Import Keymap
Use this option to import a keymap file.
1. Tap Menu > Import Keymap.
2. Enter the file name to import. If no location is specified, the default is to look in the root of the drive. Other-
wise enter the path and file name.
3. Tap Import to import the keymap or Abort to cancel without importing.
4. If the import is not successful (i.e.: an incorrect file name or location was specified) an error message is dis-
played. Otherwise the keymap has been imported.
Export Keymap
Use this option to export a keymap file.
1. Tap Menu > Export Keymap.
2. Enter the file name to export. If no location is specified, the default is to export to the root of the drive. Other-
wise enter the path and file name.
3. Tap Export to import the keymap or Abort to cancel without exporting.
4. If there are unsaved changes in the keymap, a message is displayed:
• Tap OK to save the changes and export the keymap file.
• Tap cancel (X) to the keymap to a file without any unsaved changes included.
5. If the import is not successful (i.e.: an invalid file name or location was specified) an error message is dis-
played. Otherwise the keymap has been exported.
Restore Defaults
Tap Restore Defaults to apply the default values for all keys.
If more than one keyboard was remapped, this function only applies to the current keyboard in the remapping util-
ity. For example, if the integrated programmable keys on the Thor VM3 were remapped then a USB keyboard was
attached only they remapped keys on the USB keyboard would be reset to default values. Remove the USB key-
board and relaunch the remapper utility to restore defaults to the integrated programmable keys.
3. There are entries for each of the currently defined key values. These values are C1 through C6, representing
VK_APP_LAUNCH1 through VK_APP_LAUNCH6. All six values may not be associated with a keypress and there-
fore not currently defined in the registry.
4. Add a key for the application launch VKEY you are adding. In this example, assuming C4 is not used, add a C4
subkey to the keys under HKEY_LOCAL_MACHINE\Software\Microsoft\Shell\Keys.
5 - 36
5. Add the values for the C4 key that was created. In this example, cmd.exe (command prompt) is added:
5 - 37
Mixer
Start > Settings > Control Panel > Mixer
The Thor VM3 has two speakers (located at the bottom front of the unit) and one microphone (located at the top front of the
unit).
Use the settings on these panels to adjust the master volume, record gain and sidetone.
Factory Default Settings
Output
Master Volume - dB
Input
Record Gain 0.0 dB
Sidetone Disabled
Output Panel
Tap and hold the Master Volume slider and move either left or right, or tap the left and right arrows, to adjust Speaker
volume decibel level.
Tap the Test button to play a sample sound at the selected volume.
Input Panel
By default the side tone is muted. If needed, the user should enable the side tone. If this causes interfering noise, the
side tone should be disabled. The VM3 audio is designed to be used with or without the side tone. This is acceptable
permissible performance for the Thor VM3.
Use the radio buttons to enable or disable the sidetone.
Tap and hold the Record Gain or Sidetone sliders and move either left or right, or tap the left and right arrows, to adjust
the levels.
5 - 38
Mouse
Start > Settings > Control Panel > Mouse
Use this option to set the double-tap sensitivity for stylus taps on the Thor VM3 touch screen.
5 - 39
Network and Dialup Connections
Start > Settings > Control Panel > Network and Dialup Connections
Set Thor VM3 network driver properties and network access properties. Select a connection to use, or create a new con-
nection.
5 - 40
Network Capture
Start > Settings > Control Panel > Network Capture
Note: Verify the Date / Time (page 5-24) before using the logging utilities to ensure meaningful data.
The Network Capture panels provide configuration options for logging utilities. Two types of logging are configurable:
• Netlog is a Windows utility that monitors network traffic. Netlog creates a .CAP file that can be read using Microsoft
Windows Network Monitor or any compatible tool that supports .CAP files.
• NDISLog monitors the NDIS interface between the WLAN radio and the NDIS driver. This utility creates a .TXT log file.
Factory Default Settings
Netlog
Use this control panel to configure the Netlog utility. By configuring Netlog using the control panel, Netlog remains run-
ning across a warmboot. However, please note that:
• Netlog first stores data to a file named netlog0.cap, then netlog1.cap. Any time the current file reaches maximum
size, Netlog switches to the other file.
• If the log file is stored in the root directory, any previous data is lost and a new log file started after the warmboot
• If the log file is stored in \System, all previous data is saved across the warmboot.
• If Netlog is enabled across the warmboot, a series of brief popups may be displayed during the boot cycle. No user
interaction is required.
Command
Command Function
options Specifies the option to perform. See the table below for the option parameters and values.
load Loads and starts Netlog.
start Starts the Netlog process of logging the network traffic.
stop Stops Netlog from logging network traffic.
unload Unloads Netlog.
5 - 41
Options
Options Function
pkt_size in Specifies the maximum packet size captured in bytes. This option should only be run after you have
bytes called load and stop. Default is 5000.
cap_size in Specifies the maximum size of Netlog0.cap or Netlog1.cap in bytes. This option should only be run
bytes after you have called load and stop. Default is 500,000.
.cap file Specifies the name of the file to which network traffic information is saved. This option should only
be run after you have called load and stop. Default is \netlog.
Run cmd
Performs the command selected. For example, to run Netlog and modify the packet size do the following:
1. Select load from the Commands list and click the Run cmd button.
2. Select stop from the Commands list and click the Run cmd button.
3. Select options from the Commands list, enter the new packet size in the Options list and click the Run cmd
button.
NDISLog
NDISLog creates a .TXT file that can be viewed with any text editor program that supports .TXT files.
Command
Command Function
start Starts logging the network traffic.
stop Stops logging network traffic.
file
Specifies the name of the file to which NDISLog information is stored.
Save File
Stores the file name.
Run cmd
Performs the selected start or stop command.
5 - 42
Options
Start > Settings > Control Panel > Options
It may be necessary to warmboot the Thor VM3 after making desired changes. A pop up window indicates if a warmboot is
required.
Communication
Options on this tab configure communication options for the Thor VM3.
Autolaunch TimeSync
By default, TimeSync does not automatically run on the Thor VM3. To enable TimeSync to run automatically on
the Thor VM3, check this checkbox.
Synchronize with a Local Time Server
By default, GrabTime synchronizes via an Internet connection. To synchronize with a local time server:
1. Use ActiveSync (or a USB thumb drive) to copy GrabTime.ini from the My Device > Windows folder on
the mobile device to the host PC.
2. Edit the copy of GrabTime.ini on the host PC. Add the local time server’s domain name to the beginning
of the list of servers. You can optionally delete the remainder of the list.
3. Copy the modified GrabTime.ini file to the My Device > System folder on the mobile device.
The System/GrabTime.ini file takes precedence over the Windows/GrabTime.ini file. System/Grabtime.ini
also persists after a coldboot; Windows/Grabtime.ini does not persist.
5 - 43
Misc
Options on this tab configure device specific options. Note that options not available on the Thor VM3are dimmed or
grayed out.
CapsLock
By default, CapsLock is off after a warmboot. Check this box to turn CapsLock on after a warmboot.
Touch Screen Disable
By default, the Thor VM3 touch screen is enabled. To disable the touch screen after a warmboot, click this check-
box.
Note: If the touch screen is disabled on a Thor VM3, you must use a USB mouse or keyboard attached to the Thor
VM3 to access this tab to re-enable the touch screen unless a key has been assigned to enable the touch
screen using Keyboard Remapper (page 5-35).
5 - 44
Owner
Start > Settings > Control Panel > Owner
Set the Thor VM3 owner details. The Network ID is used when logging into a remote network.
Factory Default Settings
Identification
Name Blank
Company Blank
Address Blank
Telephones Blank
Display owner ID at power-on Disabled
Notes
Notes Blank
Display notes at power-on Disabled
Network ID
User Name Blank
Password Blank
Domain Blank
Enter user name, password and domain to be used when logging into network resources.
5 - 45
Password
Start > Settings > Control Panel > Password
Important: This password must be entered before performing a Load Factory Defaults.
If entering a power-on or screen saver password does not allow you to disable this password protection or perform a Load
Factory Defaults, contact Technical Assistance (page 10-1).
Factory Default Settings
Prompt if device unused for Disabled
Timeout 0 minutes
Password Blank
Password
Hint
5 - 46
PC Connection
Start > Settings > Control Panel > PC Connection
Use these options to control a cabled connection (USB, serial) between the Thor VM3 and a nearby desktop/laptop com-
puter.
Factory Default Settings
Enable direct connection Disabled
Connect using ActiveSync
5 - 47
Peripherals
Start > Settings > Control Panel > Peripherals
This panel is used to enable and disable the touch screen defroster.
Factory Default Settings
Defroster
Defroster Enabled (if installed)
Defroster Trip Point 40º C (104º F)
Defroster
Note: Settings have no effect if the defroster is not installed.
5 - 48
Power
Start > Settings > Control Panel > Power
The Thor VM3 power mode timers are cumulative.
The System Idle timer begins the countdown after the User Idle timer has expired and the Suspend timer begins the count-
down after the System Idle timer has expired.
When the User Idle timer is set to “Never”, the power scheme timers never place the device in User Idle, System Idle or
Suspend modes (even when the device is idle).
The Display > Backlight setting is synchronized with the User Idle setting in the Schemes tab in the Power control panel.
Factory Default Settings
The default Power Scheme selected for the Thor VM3 depends on:
• if external power is connected to the Thor VM3,
• and, for ignition control, the status of the vehicle ignition signal.
The Power Schemes are defined below. The active Power Scheme depends on the user-selected power configuration
mode. However, if no external power is present, the Thor VM3 uses the UPS Power Scheme regardless of user selected
Power Configuration mode.
• AC/DC - When AC/DC has been selected for the Power Configuration mode, this Power Scheme is selected. Because
of the presence of external power, this Power Scheme has longer timeout values.
• Ignition Control/Ignition On - When either Ignition Control option has been selected for the Power Configuration mode
and the Ignition Switch is On, this Power Scheme is selected. Because of the presence of external power, this Power
Scheme has longer timeout values.
• Ignition Control/Ignition Off - When either Ignition Control option has been selected for the Power Configuration mode
and the Ignition Switch is Off, this Power Scheme is selected. This Power Scheme has shorter timeout values (compared
to Ignition On) to preserve the vehicle battery.
• Auto-On - When Auto-On has been selected for the Power Configuration mode, this Power Scheme is selected. Because
of the presence of external power, this Power Scheme has longer timeout values.
• UPS - When any Power Configuration Mode is selected but no external power is present, the UPS Power Scheme is
used. This Power Scheme has much shorter timeout values designed to shut down the Thor VM3 before the UPS battery
is depleted.
5 - 49
Because of the cumulative effect, if the Thor VM3 is operating from the UPS, for example:
• The backlight turns off after 30 seconds of no activity,
• The display turns off after 1 minute and 30 seconds of no activity (30 sec + 1 min),
• The Thor VM3 enters Suspend after 11 minutes and 30 seconds of no activity.
• The Thor VM3 shuts down after 31 minutes and 30 seconds of no activity.
• If the User Idle timer is set to Never, the power scheme timers never place the Thor VM3 in User Idle, System Idle or
Suspend modes.
5 - 50
Power Configuration Mode
Start > Settings > Control Panel > Power Configuration Mode
There are three user selectable power configuration modes for the Thor VM3 available. Additionally a UPS power configu-
ration mode is supported and automatically selected regardless of the user selected mode any time external power is not
present.
Power (page 5-49) control panel timeout values vary by the power configuration mode selected.
AC/DC Mode
This is the default power mode. In AC/DC mode the Thor VM3 is turned On by a press of the Power button. Ignition
input is ignored when AC/DC Mode is enabled
Thor VM3 is Off
Conditions
The Thor VM3 is Off and external power is available, such as:
• Thor VM3 is installed on a powered Quick Mount Smart Dock with the dock power switch On
• Thor VM3 is already mounted to a dock and external power is applied to the dock
Result
The Thor VM3 boots when the Power button is pressed. Once booted the Thor VM3 follows the AC/DC power
scheme with timers reset after bootup.
Thor VM3 is On
Conditions
The Thor VM3 is On (but powered by the UPS battery) and gets external power, such as:
• Thor VM3 is installed on a powered dock with the dock power switch On
• Thor VM3 is already mounted to a dock with the dock power switch On and truck power is applied to the
dock
• Thor VM3 is already mounted to a dock and the dock power switch is turned On
Result
The Thor VM3 continues to run and follows the AC/DC power scheme with timers reset at power connection.
5 - 51
Conditions
The Thor VM3 has external power but vehicle ignition is Off. The Power button is pressed.
Result
The Thor VM3 boots. Once booted the Thor VM3 follows the Ignition Control/Ignition Off power scheme with
timers reset after the boot completes.
Thor VM3 is Off and Vehicle Ignition is Switched to On
Conditions
The Thor VM3 is Off and vehicle ignition changes from Off to On.
Result
The Thor VM3 boots. Once booted the Thor VM3 follows the Ignition Control/Ignition On power scheme with
timers reset after the boot completes.
Thor VM3 is On and Vehicle Ignition is Switched to On
Conditions
The Thor VM3 is On and vehicle ignition changes from Off (or not present) to On.
Result
The Thor VM3 continues to run and follows the Ignition Control/Ignition On power scheme with timers reset at
the time Ignition switched to Active.
An example of this case would be a Thor VM3 that is running on UPS and is then mounted on a dock that has
truck power and the ignition switch is already On.
Thor VM3 is On and Vehicle Ignition is Switched to Off
Conditions
The Thor VM3 is On and vehicle ignition changes from On to Off.
Result
The Thor VM3 follows the Ignition Control/Ignition Off power scheme with timers reset at the time Ignition
switched to Inactive. UPS charging is disabled.
An example of this case would be a Thor VM3 that is running on UPS and is then mounted on a dock that has
truck power and the ignition switch is already Off.
Auto-On Mode
In Auto-On mode, the Thor VM3 is turned On by the presence of external power with no user interaction
required. Ignition input is ignored when Auto-On Mode is enabled.
Thor VM3 is Off
Conditions
The Thor VM3 is Off and gets external power, such as
• Thor VM3 is installed on a powered Quick Mount Smart Dock with the dock power switch On
• Thor VM3 is already mounted to a dock and external power is applied to the dock
• Thor VM3 is already mounted to a dock and the dock power switch is turned On
Result
The Thor VM3 boots. Once booted the Thor VM3 follows the Auto-On power scheme with timers reset after
the boot completes.
Thor VM3 is On
Conditions
The Thor VM3 is On and gets external power, such as
5 - 52
• Thor VM3 is installed on a powered Quick Mount Smart Dock with the dock power switch On
• Thor VM3 is already mounted to a dock and external power is applied to the dock
• Thor VM3 is already mounted to a dock and the dock power switch is turned On
Result
The Thor VM3 continues to run and follows the Auto-On power scheme with timers reset at the time power
was connected.
UPS Mode
This mode is selected any time external power is not present, regardless of selected Power Configuration. Ignition
Input is ignored.
Thor VM3 is Off
Conditions
• The Thor VM3 is Off and the power button is pressed the Thor VM3 and both the following conditions are
met:
• UPS power is over 10% capacity
• CPU temperature is over 20ºC
Result
The Thor VM3 boots and follows the UPS power scheme with power management timers reset at boot up.
Conditions
The Thor VM3 is Off and the power button is pressed the Thor VM3 and at least one of the following condi-
tions are met:
• UPS power is under 10% capacity
• CPU temperature is under 20ºC
Results
The Thor VM3 remains Off.
Thor VM3 is On
Conditions
The Thor VM3 is On and external power is removed, such as:
• Thor VM3 is removed from a powered dock (Dock power switch On)
• Thor VM3 is mounted to a dock and truck power is removed from the dock
• Thor VM3 is mounted to a dock and the dock power switch is turned Off
Result
The Thor VM3 continues to run and follows the UPS mode power scheme with power management timers
reset at the time of power removal. UPS charging is disabled.
5 - 53
Regional Settings
Start > Settings > Control Panel > Regional Settings
Set the appearance of numbers, currency, time and date based on regional and language settings. Set the Thor VM3 user
interface language and the default input language.
Factory Default Settings
Region
Locale English (United States)
Number 123,456,789.00 / -123,456,789.00 neg
Currency $123,456,789.00 pos / ($123,456,789.00) neg
Time h:mm:ss tt (tt=AM or PM)
Date M/d/yy short / dddd,MMMM,dd,yyyy long
Language
User Interface English (United States)
Input
Language English (United States)-US
Installed English (United States)-US
5 - 54
Registry
Button Action
Load User Defaults When clicked, a standard load file dialog is opened, to allow the user to pick a Registry Save (.RSG)
file. The applet then copies the specified User registry file to the Active registry. The user is asked
to verify a reboot, and then the applet does a warmboot to activate the new registry.
Note: When the Thor VM3 is set to user defaults, a second reboot must be performed to load the
WLAN driver. When the Thor VM3 has finished booting, return to the Registry panel and tap
Restart,
Save User Defaults When clicked, a standard Save File dialog is opened, to allow the user to name the Registry Save
(.RSG) file. The applet then copies the Active registry to the specified User registry file and reboots
the device.
Load Registry De- The applet copies the Factory Default registry from the OS to the Active registry (by deleting the cur-
faults rent registry). The user is asked to verify a reboot, and then the applet performs a restart to activate
the factory default registry. If a user password has been set, the applet warns the user that the pass-
word will be erased, and asks them to enter it before the reboot is allowed.
Note: When the Thor VM3 is reset to factory defaults, a second reboot must be performed to load
the WLAN driver. When the Thor VM3 has finished booting, return to the Registry panel and
tap Restart,
Restart When clicked, the OS performs a registry save, and then a restart. OS and CAB files are reloaded.
5 - 55
Remove Programs
Start > Settings > Control Panel > Remove Programs
Note: Lists programs installed in RAM that have been marked for removal.
Select a program and tap Remove. Follow the prompts on the screen to uninstall Thor VM3 user-installed only programs.
The change takes effect immediately.
Files stored in the My Documents folder are not removed using this option.
Note: Do not remove factory installed programs using this option. Contact Technical Assistance (page 10-1) if factory
installed programs must be deleted.
5 - 56
Screen Control
Start > Settings > Control Panel > Screen Control
Set screen properties for the Thor VM3.
Factory Default Settings
Current Level
LCD Brightness (%) 100 (see note)
Ambient Light (%) (see note)
Automatic Brightness Control
Automatic brightness control is only available on a Thor
VM3 with an outdoor display.
Enable automatic brightness Disabled
control
Low to medium light level (%) 25
Medium to high light level (%) 75
Note: If Automatic Brightness Control is enabled for an outdoor display, the value for LCD Brightness depends on the
Ambient Light %. Otherwise, the display defaults to 100% brightness.
Note: There is no default value for Ambient Light % as it varies depending on the level of light where the Thor VM3 is
located. If the Thor VM3 has an indoor display it does not have an ambient light sensor and the Ambient Light % is
always 0.
Note: Touch screen defroster controls are located on the Peripherals (page 5-48) control panel.
Current Level
LCD brightness displays the current LCD brightness level. The default brightness is 100%.
5 - 57
Storage Manager
Start > Settings > Control Panel > Storage Manager
Installed storage devices are listed by device name in the drop-down box. To view information about the disk or perform
store operations, select a device from the list.
5 - 58
Stylus
Start > Settings > Control Panel > Stylus
Use this control panel option to set stylus double-tap sensitivity properties and calibrate the Thor VM3 touch panel when
needed.
Double-Tap
Follow the instructions on the screen and tap the OK button to save any double-tap changes.
Calibration
Calibration involves tapping the center of a target. If you miss the center, keep the stylus on the screen, slide it over
the target's center, and then lift the stylus.
To begin, tap the Recalibrate button on the screen with the stylus. Press and hold the stylus on the center of the tar-
get as it moves around the screen. Press the Enter key to keep the new calibration setting or press the Esc key to
revert to the previous calibration settings.
5 - 59
System
Start > Settings > Control Panel > System
Use these Thor VM3 panels to:
• Review System and mobile device data and revision levels.
• Adjust Storage and Program memory settings.
• Assign a device name and device descriptor.
Factory Default Settings
General No user interaction
Memory 1/4 storage, 3/4 program memory
Device Name Unique to equipment type
Device Description Unique to equipment type
Copyrights No user interaction
General
System: This screen is presented for information only. The System parameters cannot be changed by the user.
Computer: The processor type is listed. The type cannot be changed by the user. Total computer memory and the
identification of the registered user is listed and cannot be changed by the user.
Memory sizes given do not include memory used up by the operating system. For example, a system with 128 MB
may only report 99 MB memory, since 29 MB is used by the operating system. This is actual DRAM memory, and does
not include internal flash used for storage.
Memory
Move the slider to allocate more memory for programs or storage. If there isn’t enough space for a file, increase the
amount of storage memory. If the mobile device is running slowly, try increasing the amount of program memory.
5 - 60
Device Name
The device name and description can be changed by the user. Enter the name and description using either the keypad
or the Input Panel and tap OK to save the changes. This information is used to identify the Thor VM3 to other comput-
ers and devices.
Copyrights
This screen is presented for information only. The Copyrights information cannot be changed by the user.
Any licenses stored on the Thor VM3 appear in the drop-down list. Select a license and tap the Close button. The license
is available for use immediately.
5 - 61
Volume and Sounds
Start > Settings > Control Panel > Volume & Sounds
Note: An application may override the control of the speaker volume. Turning off sounds saves power and prolongs battery
life.
Set volume parameters and assign sound WAV files to events using these options.
You can also select / deselect sounds for key clicks and screen taps and whether each is loud or soft.
As the volume scrollbar is moved between Loud and Soft, the Thor VM3 emits a tone each time the volume increases or
decreases.
Volume must be enabled when you want to adjust volume settings using keypad keys.
Factory Default Settings
Volume
Events Enabled
Application Enabled
Notifications Enabled
Volume One level below Loud
Key click Disabled
Screen tap Disabled
Sounds
Scheme LOUD!
The volume setting is stored in the registry and is recalled at power on.
Note: Rejected bar codes generate a bad scan beep. In some cases, the receipt of data from the scanner triggers a good
scan beep from a tethered scanner, and then the rejection of scanned bar code data by the bar code processing
causes a bad scan beep from the mobile device on the same data.
5 - 62
ZoomZone
Start > Settings > Control Panel > ZoomZone
ZoomZone can be used to configure screen blanking behavior.
5 - 63
4. Tap OK to confirm changes or Cancel to discard changes.
5. If the selected are is not satisfactory, repeat the step above to reselect an area.
6. At the top of the display, tap File and select one of the available options:
• Save - Saves the selected zoom area are returns to the ZoomZone user interface.
• Test - Previews the zoom area as it would be displayed during screen blanking.
» Tap Accept Zoom to keep the zoom area and finish, or
» Tap Reject Zoom to discard the zoom are and be returned to select a different zoom area.
• Exit - Discards changes and returns to the ZoomZone user interface.
Show Zoom Area
Tap the Show Zoom Area button to show the currently selected zoom area. The selected area is highlighted in red.
To see how the zoom area would be displayed during screen blanking.
When finished, at the top of the display tap File > Exit to exit.
5 - 64
Automatic Firmware Update Utility
The automatic firmware update utility provides an automated process to update the firmware on the Thor VM3. Firmware that
can be updated includes BIOS, EC (Embedded Controller) and Screen MCU (Micro Controller Unit). Firmware updates are dis-
tributed as cabinet (.cab) files. The .cab file contains the necessary firmware files (BIOS, EC and Screen MCU) and a utility to
install firmware files. The firmware update utility is installed as part of the factory software load. This utility can be used to
install newer firmware or to revert to older firmware.
Use the Software tab of the About (see page 5-15) control panel to determine the currently installed firmware versions.
It may be necessary to update firmware before installing an updated operating system.
Update Process
1. Copy the files listed above to the \System\FWUpdate folder. Copy the.cab file first then the .tag file.
!
Be sure to copy the updatefw.tag file to the \System\FWUpdate folder last. The Thor VM3 begins the reboot process
after detecting this file.
2. The Thor VM3 automatically reboots and starts the update process after detecting the updatefw.tag file. No user
intervention is required to reboot the Thor VM3 or run the update utility after the reboot. The update utility operates in
a DOS screen.
3. If the update is not successful, the update is tried three more times.
4. If the update fails, the \System\FWUpdate folder is cleaned up leaving flashapp.exe, a flashlog.txt and a retry.tag file.
5. Review the flashlog.txt file. The log file lists what firmware (if any) has been installed. If an error has occurred during
the update process, it is detailed in the flashlog.txt file.
6. Review the Software tab of the About (see page 5-15) to verify the installed firmware versions. Compare the digits
from the name of the cab file (see above) with those shown in the About control panel.
5 - 65
Configuration Cloning Utility (CCU)
This utility provides an automated process to read the configuration settings from one Thor VM3 and then apply those settings
to one or more other Thor VM3s with the same operating system. The Configuration Cloning Utility (CCU) is installed as part of
the factory software load. Configuration settings for the following items may be included:
• RFTerm
• Honeywell Control Panels:
• USB powered in Sleep
• Enable/disable touch screen
• Defroster settings
• COM port pin 9 +5V or RI
The CCU allows a configuration file (ccf file) to be created by:
• Reading the current program settings from the source Thor VM3
• Reading the default program settings from a ddf file.
If desired, settings can be modified (advanced user only) before saving the ccf file. If any changes have been made, the CCU
can also apply them to the source Thor VM3.
The configuration file can then be copied and deployed to the destination Thor VM3(s). Options include:
• Import changes only - Only those configuration settings which have been modified from their default value are applied to the
destination Thor VM3. All other settings on the destination Thor VM3 are left unchanged.
• Import changes and defaults - All configuration settings are applied to the destination Thor VM3. If a setting was modified on
the source Thor VM3 the modified value is applied to the destination Thor VM3. Otherwise the default value is applied for that
setting on the destination Thor VM3.
The Configuration Cloning Utility can be run as a GUI or command line interface.
5 - 66
Configuration Cloning Utility GUI
To launch the Client Configuration Utility, locate the CCU icon either on the desktop or by selecting Start > Programs >
CCU.
Menu Options
File
The File menu contains information for working with the configuration files.
About
Displays version and copyright information for the Configuration Cloning Utility.
Open
Opens a configuration file. The CCU looks for configuration files in the \System\DDF folder. CCU can open
the following files types:
• ddf files - These files contain the factory default values for the software. These files are placed on the Thor
VM3 when the applicable software was installed or upgraded. Use this option if you wish to start a
configuration settings file based on the factory defaults.
• ccf files - These files contain the modified values for the software settings. These files are created with the
CCU . ccf files are encrypted for security. Once a ccf file is created on one Thor VM3 it can be copied to
other Thor VM3s to duplicate the configuration. An existing ccf file can be opened, modified, applied to the
Thor VM3, saved, saved with a different name, etc.
Close
Closes the open data file.
Save
Saves the open data file as a ccf file.
• If a ccf file was opened, it is saved with the same name and in the same location.
• If a ddf file was opened, a prompt is displayed for the name to assign to the new ccf file. By default a new
file is saved at \System\DDF though a different location can be specified.
Save As
Saves the open data file as a ccf. If a ccf file was opened, this option allows a new name or location for the
data file to be specified during the save process.
Exit
Exits the CCU. A prompt may be displayed if there are unsaved ccf changes.
Edit
Provides access to the standard Windows Cut, Copy and Paste functions. These functions can be used to manip-
ulate the settings within the configuration file.
5 - 67
Registry
Reads values from and writes values to the system registry.
Import Settings
Imports the current settings from the Windows registry for the selected application(s). When selected, the
available programs from which settings can be read are displayed in a tree format.
Apply Settings
Applies the current settings to the Windows registry for the selected applications. During the process, a
Default all Non-Configured Parameters prompt is displayed:
• Tap Yes to set all parameters not configured in the ccf file to defaults on the destination device.
• Tap No to apply the values from the ccf file and leave all other parameters as-is on the destination device.
• Tap Cancel to exit with no changes to the destination device.
Upon completion, exit the CCU and reboot the Thor VM3 so changes can take effect.
User
Selects the desired user access level:
• Basic - Basic users can open files and import setting from the system registry. Basic users cannot modify
settings from an opened file or setting imported from the registry. Basic users can apply setting to the system
registry.
• Advanced - Advanced users can open files and import settings registry. Advanced users can modify the values
from either an opened file or imported from the system registry. Advanced users can apply settings to the
system registry.
Shortcuts
The table below lists the valid shortcut key combinations within the CCU.
Modifying Settings
Advanced user only. Basic user cannot view the expanded tree or modify settings.
When settings have been loaded (either from Registry > Import Settings or File > Open) the following screen is dis-
played.
5 - 68
The left side of the upper pane displays the current program settings that have been imported or are part of the open
ccf file. Click the + icon to expand the tree or the - icon to condense the tree. When the tree is expanded sufficiently to
view the settings, the settings are displayed in the right portion of the upper pane. When a parameter is selected, the
name of the parameter is highlighted in blue. The parameter name remains highlighted in blue (regardless of if the
value was changed or not) until the parameter name button is tapped a second time. Enter a new value for the param-
eter as desired. Depending on the parameter selected, the following entry types are available:
• Text box - This is an open entry field and a new value can be typed into the text box. Depending on the parameter,
there may be validity checking to ensure the entry in the text box is within the valid range.
• Pull-down list - A down arrow indicates the setting must be selected from a pull-down list of available values. Expand
the list and select the desired setting from the list of options.
• Button - Items with two choices (such as Off or On) are displayed as a button. Tapping the button switches the value
for the parameter.
When all desired parameter settings have been made, tap File > Save to save as a ccf file which can be used to
deploy these settings on another Thor VM3.
If the parameter setting changes should also be applied to this Thor VM3, select Registry > Import Settings. After
importing the settings, a reboot is necessary for the changes to take effect on the Thor VM3.
5 - 69
Using the CCU
Refer to the following examples for instructions on using the CCU.
Example 1: Import the current settings and save to a file
To import the current settings from the Thor VM3 running the CCU:
1. If you want to view the settings, tap User and select Advanced.
2. Tap Registry > Import settings.
3. Select the desired program(s) from which to import the settings.
4. Select File > Save then specify a file name and tap Save to save the settings to a ccf file.
5. The ccf file can be used to configure another Thor VM3. See Example 4.
5 - 70
• Tap No to apply the values from the ccf file and leave all other parameters as-is on the destination device.
• Tap Cancel to exit with no changes to the destination device.
7. Reboot the Thor VM3 for the new settings to take effect.
5 - 71
5 - 72
6
ActiveSync
Introduction
Requirement - ActiveSync (version 4.5 or higher for Windows XP desktop/laptop computers) must be resident on the host
(desktop/laptop) computer. Windows Mobile Device Center (version 6.1 or higher) is required for a Windows Vista/Windows
7/Windows 8 desktop/laptop computer. ActiveSync and Windows Mobile Device Center for the PC is available from the Micro-
soft website. Follow their instructions to locate, download and install ActiveSync or Windows Mobile Device Center on your
desktop computer.
Note: For readability in this section, ActiveSync will be used in instructions and explanations. If you have a Windows Vista,
Windows 7, or Windows 8 operating system on your desktop/laptop, replace ActiveSync with Windows Mobile Device
Center.
Using Microsoft ActiveSync, you can synchronize information on your desktop computer with the Thor VM3 and vice versa.
Synchronization compares the data on your mobile device with your desktop computer and updates both with the most recent
data.
For example, you can:
• Back up and restore your device data.
• Copy (rather than synchronize) files between your device and desktop computer.
• Control when synchronization occurs by selecting a synchronization mode. For example, you can synchronize continually
while connected to your desktop computer or only when you choose the synchronize command.
By default, ActiveSync does not automatically synchronize all types of information. Use ActiveSync Options to specify the types
of information you want to synchronize. The synchronization process makes the data (in the information types you select) iden-
tical on both your desktop computer and your device.
When installation of ActiveSync is complete on your desktop computer, the ActiveSync Setup Wizard begins and starts the fol-
lowing processes:
• connect your device to your desktop computer,
• set up a partnership so you can synchronize information between your device and your desktop computer, and
• customize your synchronization settings.
Because ActiveSync is already installed on your device, your first synchronization process begins automatically when you finish
setting up your desktop computer in the ActiveSync wizard. For more information about using ActiveSync on your desktop com-
puter, open ActiveSync, then open ActiveSync Help.
Initial Setup
The Thor VM3 supports ActiveSync over a serial port. The Thor VM3 does not support a USB ActiveSync connection.
6-1
7. Select Menu > Exit to close Enterprise Settings.
8. From the control panel, select Options > Misc tab.
9. Uncheck the box for 5V on COM1 or 5V on COM2 as appropriate. When unchecked, pin 9 provides the Ring Indicator
(RI) signal instead of delivering power on pin 9.
10. Click OK to save the change and close the Options pane.
11. The COM port is now ready for ActiveSync.
Setup PC or Laptop
The PC or laptop must have a Windows operating system.
1. Verify Windows Mobile Device Center (WMDC) is installed if the PC or laptop is running a Windows 7 or greater oper-
ating system. For a PC or laptop with a Windows XP operating system, ActiveSync must be installed.
Note: WMDC can be downloaded from microsoft.com.
2. Open WMDC and select Mobile Device Settings > Connection Settings.
3. Make sure Allow connections to one of the following is checked.
4. Select the COM port to which the full-wired null-modem cable is attached.
5. Check the option Allow automatic device authentication.
6. Check the option Allow data connections on the device when connected to the PC.
6-2
7. Click OK to save the settings and close the open window.
Note: Do not use the ActiveSync link on the Thor VM3 desktop as this link attempts to connect to a server to synchronize
emails.
Explore
• From the ActiveSync Dialog on the Desktop PC, tap the Explore button.
• From the Windows Mobile Device Center interface select File Management > Browse the contents of your device.
This function allows you to explore the Thor VM3 from the PC side, with some limitations. You can copy files to or from the
mobile device by drag-and-drop. You will not be allowed to delete files or copy files out of the \Windows folder on the mobile
device. (Technically, the only files you cannot delete or copy are ones marked as system files in the original build of the Win-
dows image. This, however, includes most of the files in the \Windows folder).
Prerequisites
A partnership between the mobile device and ActiveSync has been established.
Connect
Connect the serial cable to the PC (the host) and the mobile device (the client).
The “Get Connected” wizard on the host PC checks COM ports to establish a connection for the first time.
Disconnect
• Disconnect the cable from the Thor VM3.
• Open the status bar icon in the lower right hand corner of the status bar. Then tap the Disconnect button.
When the Thor VM3 loses connection, e.g.: enters Suspend Mode, etc., the connection to ActiveSync will be lost.
ActiveSync Help
ActiveSync on the host says that a device is trying to connect, but it cannot identify it
6-3
Verify the cable is attached to the Thor VM3. Disconnect and reconnect the cable from the PC.
Check that the correct connection is selected.
See Reset and Loss of Host Re-connection, above.
ActiveSync indicator on the host (disc in the toolbar tray) turns green and spins as soon as you connect the cable,
before tapping the Connect icon (or REPLLOG.EXE in the Windows directory).
One or more control lines are tied together incorrectly. This is usually a cable problem.
ActiveSync indicator on the host turns green and spins, but connection never occurs
Check that the correct connection is selected.
-or-
Incorrect or broken data lines in cable.
6-4
71
Wireless Network Connections
Important Notes
It is important that all dates are correct on the Thor VM3 and host computers when using any type of certificate. Certificates
are date sensitive and if the date is not correct authentication will fail.
When using the 802.11 radio, the U-NII 1 band is the preferred band for indoor operation. For regulatory domains in which
! the U-NII 3 band is allowed, the following channels are supported: 149, 153, 157 and 161. The AP must be configured
accordingly.
Start > All Programs > Honeywell > Honeywell (version ID) > WCU or
WCU Icon on Desktop
Tasks
Status
Profile List
When using any profile that requires the user to enter credentials (user name, password), the user should enter those cre-
! dentials when the window pops up. If the credentials are not entered then, the credentials window may be hidden by other
windows.
This screen contains several items:
7-1
Tasks
Tasks are listed on the left side of the screen:
• Browse Nearby Wireless Networks (page 7-4)
• Roam Management (page 7-27)
• Admin Login (page 7-3)
Status
The status of the radio card is shown in the upper right hand of the screen:
Radio is on.
Tapping the button turns the radio off.
Radio is off.
Tapping the button turns the radio on.
Note: The radio status can only be changed when the admin is logged on. Tapping the icon has no effect when not logged
in.
Profile List
All profiles that have been created are listed in this section. Profiles can be configured for auto connect or manual connect
and are subdivided by connection type in this list.
From the profile list, an admin can:
• Organize - Open or rename a profile
• New - Create a new profile
• Delete - Delete an existing profile
• Activate - Make an inactive profile the active profile. The inactive profile may be either a manual or an auto profile not
currently in use.
• Deactivate - When the current active profile is selected, this option deactivates that profile. If there is an inactive auto
profile, that profile may become active.
• Up - If there are multiple profiles, the Up feature moves the selected profile up the list. This feature is available for both
the Auto and Manual profiles.
• Down - If there are multiple profiles, the Down feature moves the selected profile down the list. This feature is available
for both the Auto and Manual profiles.
7-2
• Open - Open the selected profile to view or edit properties.
• Activate - Make an inactive profile the active profile. The inactive profile may be either a manual or an auto profile not
currently in use.
• Deactivate - When the current active profile is selected, this option deactivates that profile. If there is an inactive auto
profile, that profile may become active.
• Disconnect - If the selected profile is connected, this option disconnects the profile.
Admin Login
All users can select from existing profiles and use the browse feature to view nearby networks.
It is necessary to log in to create or edit profiles, turn the radio off or on and to adjust the roaming parameters.
Admin is logged in
3. Tap the Login button to log in or Cancel to exit without logging in.
To change the default password:
1. Tap the Admin Login icon.
2. Tap the Reset Password button.
3. Enter the current password.
4. Enter and confirm the new password.
5. Tap Reset to save the new password or Cancel to exit without changing the password.
7-3
Browse Nearby Wireless Networks
Tap the Browse nearby wireless networks to open the open this window.
Note: Tapping on any of the column headings will sort the network list by the contents of that column.
If logged on as admin, tap on any network in the list to create a profile for that network.
Creating a Profile
To create from the Profile list,
1. Log in as admin.
2. Tap the New button.
3. Select the desired profile type - auto connect, manual connect or Ad Hoc.
4. Enter a profile name and network name.
5. Tap Next.
6. Tap Connect To... to connect to the network or tap Change connection settings for additional configuration options
including Security (page 7-6).
To create a profile from the nearby networks:
1. Log in as admin.
2. Tap the Browse button.
3. Tap the desired network then tap the Connect icon or double tap the desired network.
4. Change the profile name if desired.
7-4
5. Tap Advanced security settings for additional configuration options including Security (page 7-6).
6. Tap OK to exit and save the profile or type Cancel to exit without creating a profile.
This tab shows the basic information used to create the profile.
Options include:
• Connect automatically when this network is in range - If the profile was created as an auto connect profile, this box
is checked. If created as a manual profile, this box is unchecked.
• Connect to a more preferred network if available
• Connect even if the network is not broadcasting its name (SSID) - If a network is not broadcasting its SSID, check
this box.
• Enable Atheros connection settings.
Note: Atheros connection settings must be enabled to use CCX. It is disabled by default.
7-5
Security
The options available on the security tab will depend on the security type and encryption type selected.
Review the appropriate section for configuring the WCU for network security:
• Open (No Security) (page 7-7)
• WEP (page 7-8)
• WPA2-Personal (page 7-9)
• PEAP-TLS (page 7-10)
• PEAP-MSCHAP (page 7-12)
• PEAP-GTC (page 7-14)
• LEAP (page 7-16)
• EAP-FAST PEAP (page 7-18)
• EAP-FAST TLS (page 7-21)
• EAP-TLS (page 7-23)
• EAP-TTLS (page 7-25)
7-6
Open (No Security)
7-7
WEP
7-8
WPA2-Personal
7-9
PEAP-TLS
7 - 10
8. Select the User Credentials tab.
7 - 11
PEAP-MSCHAP
7 - 12
8. Select the User Credentials tab.
9. Select the desired credentials method of providing credentials. Prompt automatically for username and pass-
word is recommended.
10. If saved username and password is selected, enter the credentials now.
11. Select the Authentication tab.
7 - 13
PEAP-GTC
7 - 14
8. Select the User Credentials tab.
7 - 15
LEAP
5. Select the desired credentials method of providing credentials. Prompt automatically for username and pass-
word is recommended.
6. If saved username and password is selected, enter the credentials now.
7. The About tab provides Cisco copyright information.
8. Tap OK to close all open windows.
7 - 16
9. From the profile listing, make sure the desired profile is active.
10. If prompt for username and password option was selected, enter the credentials when prompted.
Note: If the credentials are not entered when to window first pops up, the credentials window can become hidden
behind other windows.
7 - 17
EAP-FAST PEAP
7 - 18
5. Select the User Credentials tab.
6. Select the desired credentials method of providing username and password. Prompt automatically for user-
name and password is recommended.
7. If saved username and password is selected, enter the credentials now.
8. Tap the Authentication tab.
9. Select the desired authentication method. Any of the available options may be used.
7 - 19
10. The About tab provides Cisco copyright information.
11. Tap OK to close all open windows.
12. From the profile listing, make sure the desired profile is active.
13. If prompt for username and password option was selected, enter the credentials when prompted.
Note: If the credentials are not entered when to window first pops up, the credentials window can become hidden
behind other windows.
7 - 20
EAP-FAST TLS
7 - 21
5. Select the User Credentials tab.
7 - 22
EAP-TLS
Note: If a user certificate has already been selected, the details would be populated on this screen.
7 - 23
5. Tap Select to select a user certificate on this computer.
7 - 24
EAP-TTLS
7 - 25
7. Select the trusted root certificate from the listed certificates.
8. Select the User Credentials tab.
9. Select the desired credentials method of providing username and password. Prompt automatically for user-
name and password is recommended.
10. If saved username and password is selected, enter the credentials now.
11. Tap OK to close any open windows.
12. From the profile listing, make sure the desired profile is active.
13. If prompt for username and password option was selected, enter the credentials when prompted.
Note: If the credentials are not entered when to window first pops up, the credentials window can become hidden
behind other windows.
7 - 26
Roam Management
General
The general tab provides information on the current connection. There are no user entries on this screen.
7 - 27
Roaming
The Roaming tab is used to configure roaming behavior.
Roam
Signal Level (dBm) When the signal strength is below this level, the radio will attempt to roam. Default
-65 dBm, range is -80 to -55.
Logging Enable When checked, logging is enabled. Logging can be set to Critical (fewer messages)
or All (more messages). Logging is disabled by default.
Note: Logging is set to disabled after any reboot to prevent log files for taking up
disk space when not needed.
Minimum Connection Time The minimum connection time the radio stays connected to the current access point
(sec) before roaming begins. Default 10 seconds, range is 5 to 25.
Roam RISSI Difference (dBm) The minimum signal strength difference between APs before the radio roams. De-
fault 5 dBm, range is 5 to 25.
Background Scan
Signal Level (dBm) The minimum signal strength an access point signal must have to be considered for
roaming. Default -65 dBm, range is -80 to -55.
Probe Request Interval (sec) The interval between roam probes. Default 5 seconds, range is 5 to 60.
CCX Control
Note: For CCX to be enabled, two settings must be enabled:
• CCX must be enabled (checked) on this screen.
• Enable Atheros Connection Settings must be enabled (checked) on the Connection (page 7-5) tab.
If both settings are not enabled, the WLAN radio does not identify itself as CCX V4 compatible when associating to
an access point.
CCX Use CCX (Cisco Client Extensions) for faster roaming. Default is enabled.
7 - 28
CCKM Use CCKM (Cisco Centralized Key Management) for faster roaming. Default is en-
abled.
To save changes, tap Apply the button. Confirmation dialogs may be displayed.
To exit without saving changes, tap the X in the upper right of the window.
Tap restore default values, tap the Restore Default Values then tap Apply.
Radio
Power Save Set the power save level. Options are Off (default) and Auto-PSM.
Note: Power save level is reset to the default (Off) after reboot.
Band Selection Select the bands to use. Options are: A, BG, G, ABG (default).
DataRate Selec- To limit data rates, check the Limit DataRate checkbox. If checked, select the desired rate
tion (MCS0 to MCS15). MCS0 (Modulation and Coding Scheme) 0 is slowest, MCS15 is fastest but
subject to more errors. Default is disabled.
Note: DataRate selection is reset to default (Disabled) after reboot.
Diversity Selection By default, diversity is on.
7 - 29
Adapter
The adapter tab provides information on the radio card. There are no user entries on this screen.
7 - 30
Advanced Settings
802.11 Settings
7 - 31
Certificates
Note: Please refer to the Security Primer to prepare the Authentication Server and Access Point for communication.
Note: It is important that all dates are correct on the Thor VM3 and host computers when using any type of certificate.
Certificates are date sensitive and if the date is not correct authentication will fail.
Quick Start
Root Certificates are necessary for EAP-TLS, PEAP/GTC and PEAP/MSCHAP.
1. Generate a Root CA Certificate (page 7-32) and download it to a PC.
2. Connect the Thor VM3 to the desktop PC using ActiveSync and copy the certificate to the Thor VM3 \System folder or
use a USB thumb drive to transfer the certificate file.
3. Install a Root CA Certificate (page 7-34).
User Certificates are necessary for EAP-TLS.
1. Generate a User Certificate (page 7-35) and private key file and download them to a PC.
2. Connect the Thor VM3 to the desktop PC using ActiveSync and copy the certificate and private key file to the Thor VM3
\System folder.
3. Install a User Certificate (page 7-39) and the private key file.
4. After installation, perform a Suspend/Resume.
5. Verify Installation (page 7-40).
The easiest way to get the root CA certificate is to use a browser on a PC to navigate to the Certificate Authority. To
request the root CA certificate, open a browser to
http://<CA IP address>/certsrv.
Sign into the CA with any valid username and password.
7 - 32
Click the Download a CA certificate, certificate chain or CRL link.
Make sure the correct root CA certificate is selected in the list box.
7 - 33
Click the Save button and save the certificate. Make sure to keep track of the name and location of the certificate.
Install the certificate on the Thor VM3.
Using the explorer buttons, browse to the location where you copied the certificate, select the certificate desired and tap
OK.
7 - 34
Tap Yes to import the certificate.
Once the certificate is installed, return to the proper authentication section, earlier in this manual.
This process saves a user certificate and a separate private key file. Windows Embedded Compact equipped devices such
as the Thor VM3 require the private key to be saved as a separate file rather than including the private key in the user cer-
tificate.
7 - 35
Click on the advanced certificate request link.
7 - 36
For the Certificate Template, select User.
Check the Mark keys as exportable and the Export keys to file checkboxes.
Type the full path on the local PC where the private key is to be copied. Also specify the private key filename.
Be sure to note the name used for the private key file, for example AAAUSER.PVK. The certificate file created later in
! this process must be given the same name, for example, AAAUSER.CER.
7 - 37
If any script notifications occur, click the “Yes button to continue the certificate request.
Click Save to download and store the user certificate to the PC. Make sure to keep track of the name and location of the
certificate. The private key file is also downloaded and saved during this process.
Be sure use the same name for the certificate file as was used for the private key file. For example, it the private key was
saved as AAAUSER.PVK then the certificate file created must be given the same name, for example, AAAUSER.CER.
Install the user certificate.
7 - 38
Install a User Certificate
Copy the certificate and private key files to the Thor VM3. Import the certificate by navigating to Start > Control Panel >
Certificates.
Using the explorer buttons, browse to the location where you copied the certificate, select the certificate desired and tap
OK.
The certificate is now shown in the list.
7 - 39
With the certificate you just imported highlighted, tap View.
From the Field pull-down menu, select Private Key.
Using the explorer buttons, browse to the location where you copied the private key file, change the Type pull-down list to
Private Keys, select the certificate desired and tap OK. Enter the password for the certificate if appropriate.
Verify Installation
Tap on View to see the certificate details again.
The private key should now say present. If it does not, there is a problem. Possible items to check:
• Make sure the certificate was generated with a separate private key file, as shown earlier in this section. If the
certificate was not generated with a separate private key file, generate a new certificate and follow the import process
again.
• Make sure the certificate and private key file have the same name, for example AAAuser.cer for the certificate and
AAAuser.pvk for the private key file. If the file names are not the same, rename the private key file and import it again.
7 - 40
VM3 WWAN Connection Manager
Access the VM3 Connection Manager from the icon in the system tray. Double tap the Connection Manager icon (or right-click
the icon and select Configuration Panel). The Connection Manager icon looks like this:
VM3 Connection Manager icon when there is no active WLAN or WWAN connection. The icon may be flashing in the
•
system tray when there is no connection..
WVM3 Connection Manager icon when there is an active WLAN connection.
•
VM3 connection manager icon when a WWAN connection is active. The icon indicates which SIM card is used (1 or
•
2) and the strength of the connection (1 to 4 bars).
Use the VM3 Connection Manager to:
• Configure WWAN connections
• Configure hyper-roaming between WWAN carriers or between WWAN and WLAN.
!
Hyper-Roaming Notes:
Hyper-Roaming Notes:
• The Connection Manager roams from WLAN to WWAN when the WLAN signal is weak enough to allow the roaming.
Due to the fact that WWAN signals are present in most areas, it is unlikely the Connection Manager will roam back to a
WLAN connection automatically. User intervention may be required to switch back to WLAN.
• Roaming to or between WWAN carriers is different than roaming between WLAN access points. In order for WWAN to
roam, the Connection Manager must first disconnect from the old WWAN carrier then establish a connection to the new
WWAN carrier.
• When hyper-roaming (either between WWAN carriers or between WLAN/WWAN) the network connection is temporarily
lost during the switching process. When switching to or between WWAN carriers, the connection manager must load
carrier firmware and this can take several minutes.
!
Connection troubleshooting:
If there is a connection issue, the first step in troubleshooting is to verify the APN on the Connection Type (page 7-44) tab.
7 - 41
Home
The Home tab lists the available connections and information on these connections. The order of the connections listed are
specified on the Link Settings tab.
Each configured connection (or link) is identified by name, either WLAN (for a WLAN connection) or the name of the carrier
(for a WWAN connection). If a connection is not configured, there is no name after the link and the status field is empty.
The active connection displays the IP address and signal strength (RSSI). Inactive connections show the status as
Standby.
If a WWAN connection is active, the roaming status (Home or Roam) is displayed.
7 - 42
Link Settings
The available network connections are shown on this tab:
The WLAN network can be enabled or disabled from this tab, however configuration settings for the 802.11 a/b/g/n radio
are set with the WLAN Wireless Configuration Utility (WCU) (page 7-1).
The WWAN networks, if any, are shown on this page. A WWAN network is only displayed if a SIM card has been installed
for that network. The Thor VM3 supports two SIM cards. See Install SIM Card(s) (page 4-51) for SIM card installation
instructions. A WWAN network can be enabled or disabled from this screen, however the connection is configured by tap-
ping the applicable Network Settings button.
7 - 43
To configure a WWAN network, tap the View Network Settings button. To configure the WLAN connection use the WLAN
Wireless Configuration Utility (WCU) (page 7-1).
Connection Type
Use this tab to configure the connection parameters. The tab is identified by the type of connection, i.e.: UMTS, LTE,
UDMA, etc. The label on this tab corresponds to the Technology field on the About (page 7-50) tab.
Note that the SIM card being configured (Sim1 or Sim2) is identified at the top of this tab.
!
If the WWAN radio fails to connect, please check that the correct APN is entered. This entry can be verified by
contacting the WWAN carrier.
An APN mismatch may generate an error message, however this is not always the case. The first step in diag-
nosing a connection error should be to verify the APN.
After all entries are completed, tap the Save button.
7 - 44
PIN/PUK
Next select the PIN/PUK tab. Note that the SIM card being configured (Sim1 or Sim2) is identified at the top of this tab.
Enter the PIN or PUK and tap Save then tap Exit to return to the Connection Manager.
7 - 45
System Settings
Use this screen to configure WWAN settings.
Enable Logging
Check to enable logging. Specify the maximum file size and the location for the log file.
By default logging is disabled.
TcpWindow Size=128k
Check to set the TCP window size to 128k.
By default this options is disabled.
Enable On-screen Connection Icon
Check to enable an on-screen connection icon. The icon is displayed in the lower right corner of the screen, above the
date/time.
7 - 46
Using FOTA
Honeywell recommends distributing firmware via a WLAN connection rather than the WWAN connection. This
requires an HTTP server which can be hosted on the Internet or the same Intranet (i.e.: the same network domain) as
the Thor VM3. Honeywell tested FOTA using:
• Uniform Server: https://sourceforge.net/projects/miniserver/
• IIS: Microsoft Internet Information Services, Windows 2012 server
To use FOTA, the following steps must be completed before initial use:
• Configure HTTP Server (page 7-47)
• Load Firmware Updates (page 7-48)
• Configure the Thor VM3 (page 7-49)
For subsequent updates, it is only necessary to Load Firmware Updates (page 7-48).
Configure HTTP Server
The instructions below are for Uniform Server (UniServer). Setup information for IIS server is widely available on
line. Follow the same folder setup as in step 4 below for IIS.
1. After installing, browse to the installation folder and run the server by double-clicking UniController.exe.
2. Click the Start Apache button. The indicator changes from red to green when the server is running. The but-
ton label also changes to Stop Apache.
3. Display the test page by clicking the View www button or typing http://localhost into a web browser.
4. Create the folder structure on the web server:
<Server URL>/<wwan>/<Carrier Number>/<Version>.
Assuming initroot is root folder for the HTTP server, create a wwan folder underneath initroot. Then create
folders under wwan numbered 0-15 to represent each carrier number. The structure is shown below. As firm-
ware updates are received, create version folders under the appropriate carrier number. Notice the version
folders under the <3> folder in this example.
<initroot>
<wwan>
<0>
<1>
<2>
<3>
1.0.0
1.0.1
1.0.2
<4>
<5>
...
<14>
<15>
7 - 47
5. Click on the Apache tab and select Access and Passwords > Folder www access and passwords.
3. Copy the three files into the update folder created above.
7 - 48
Configure the Thor VM3
Repeat these steps for each Thor VM3 that will be using FOTA. Once configured, the Thor VM3 continues to
check for firmware updates at the specified interval.
On the System Settings tab of the Connection Manager:
1. Check the Enable Firmware Update checkbox.
2. Select the desired frequency (daily or weekly) to Check for Updates.
3. Specify the Firmware Storage Path. This path includes the address of the web server but does not include
the carrier number or version folders created. The carrier folder and update folder are automatically detected
by the update utility. For example, if the web server is hosted at http://127.0.0.1, the path is entered as
http://127.0.0.1/wwan/
Important - the trailing / must be included after wwan.
GPS
This screen displays GPS data. A WWAN connection is not required for the GPS data, however an antenna must be
attached to the GPS port.
Tap the Start button to begin receiving GPS data. Once started, the button label changes to Stop and GPS data on screen
is populated.
Tap the Clear GPS Data button to erase the GPS data.
7 - 49
About
The about screen has no user-configurable parameters. It identifies the firmware and hardware versions, the carrier
selected, MEID, etc. for the WWAN radio.
7 - 50
8
Key Maps
Integrated Keypad
There are seven integrated programmable keys located on the Thor VM3 below the display. Each programmable key can be
modified by the Orange key for a total of 14 programmable keys.
See Keyboard Remapper (page 5-35) to remap these keys.
The default values for these keys are:
To get this Programmable Key Press These Keys in this Order Default Key Value
P1 (Programmable key 1) P1 F1
P2 (Programmable key 2) P2 F2
P3 (Programmable key 3) P3 F3
P4 (Programmable key 4) P4 F4
P5 (Programmable key 5) P5 F5
P6 (Programmable key 6) P6 Open/Close Soft Keyboard
P7 (Programmable key 7) P7 Enter
P8 (Programmable key 8) Orange P1 <none>
P9 (Programmable key 9) Orange P2 <none>
P10 (Programmable key 10) Orange P3 <none>
P10 (Programmable key 11) Orange P4 <none>
P10 (Programmable key 12) Orange P5 <none>
P10 (Programmable key 13) Orange P6 <none>
P10 (Programmable key 14) Orange P7 <none>
Increase speaker volume Blue P1 Increase speaker volume
Decrease speaker volume Blue P2 Decrease speaker volume
Increase display brightness Blue P5 Increase display brightness
Decrease display brightness Blue P6 Decrease display brightness
8-1
External 21-Key Keyboard
The table below shows the results of the keypress combinations. Each key has an unshifted mode, a Yellow shifted mode and a
Green shifted mode.
• To enter Yellow shifted mode, press the Yellow key. The keypad remains in Yellow shifted mode until any other key is pressed
or the Yellow key is pressed again.
• To enter Green shifted mode, press the Green key. The keypad remains in Green shifted mode until any other key is pressed
or the Green key is pressed again.
• Pressing the Yellow key then the Green key cancels Yellow mode and the keypad is in Green shifted mode.
• Pressing the Green key then the Yellow key cancels Green mode and the keypad is in Yellow shifted mode.
• Arrow keys are unaffected by Yellow or Green shifted mode.
• Keypress combinations marked as N/A do nothing (the keystroke is consumed by the keyboard and not sent to the Thor VM3).
• Pressing the backlight key (alone or after the Green or Yellow keys) cycles the keypad backlight through Low, Medium, High,
Off then repeats.
Key Non-Shifted Yellow-Shifted Green-Shifted
1 1 F1 F11
2 2 F2 F12
3 3 F3 F13
4 4 F4 F14
5 5 F5 F15
6 6 F6 F16
7 7 F7 F17
8 8 F8 F18
9 9 F9 F19
0 0 F10 F20
PF Programmable Programmable N/A
Del Delete Backspace N/A
Tab Tab Backtab N/A
Left Left Left Left
Right Right Right Right
Up Up Up Up
Down Down Down Down
8-2
External 95-Key Keyboard
Print
Esc F1 F2 F3 F4 F5 F6 F7 F8 F9 F10 F11 F12 Screen Scroll Pause Fn
SysRq Lock Break
~ _ +
! @ # $ % ^ & * ( ) BackSpace Num / * -
` 1 2 3 4 5 6 7 8 9 0 - = Lock
Tab Q W E R T Y U I O P { } | 7 8 9 +
[ ] \ Home PgUp
L R
These key functions apply to both the 95-Key USB Keyboard (page 3-9) and the 95-key PS/2 Keyboard (page 3-11).
The key map table that follows lists the commands used for the Thor VM3. Note that since the Thor VM3 uses a Microsoft Win-
dows operating system, no DOS Terminal Emulation keypress sequences are provided.
There are 10 hidden keys on the 95 key keyboard. Each of the hidden keys is accessed by pressing the <Fn> key (located in the
top right hand corner) plus a key on the numeric keypad on the right. Additional function keys are supported as well.
8-3
External 60-Key Keyboard
The key map table that follows lists the commands used when using the Thor VM3 with the 60-key PS/2 Keyboard (page 3-12).
The 60-key keyboard does not have a NumLock indicator or key. NumLock can be toggled On or Off using the 2nd SHIFT F10
keypress sequence. The default for NumLock is On. Changes made to the NumLock status persist across a Windows restart.
When running RFTerm, please refer to the RFTerm Reference Guide for equivalent keys and keypress sequences.
8-4
Down Arrow Down Arrow
Right Arrow Right Arrow
Left Arrow Left Arrow
Insert 2nd Bksp
Delete (numeric) 2nd DOT
Home 2nd Left Arrow
End 2nd Right Arrow
Page Up 2nd Up Arrow
Page Down 2nd Down Arrow
ScrollLock 2nd Shift F10
F1 F1
F2 F2
F3 F3
F4 F4
F5 F5
F6 F6
F7 F7
F8 F8
F9 F9
F10 F10
F11 2nd Shift F1
F12 2nd Shift F2
a A
b B
c C
d D
e E
f F
g G
h H
i I
j J
k K
l L
m M
n N
o O
p P
q Q
r R
s S
t T
8-5
u U
v V
w W
x X
y Y
z Z
A Shift A
B Shift B
C Shift C
D Shift D
E Shift E
F Shift F
G Shift G
H Shift H
I Shift I
J Shift J
K Shift K
L Shift L
M Shift M
N Shift N
O Shift O
P Shift P
Q Shift Q
R Shift R
S Shift S
T Shift T
U Shift U
V Shift V
W Shift W
X Shift X
Y Shift Y
Z Shift Z
1 1
2 2
3 3
4 4
5 5
6 6
7 7
8 8
9 9
0 0
8-6
DOT DOT
< 2nd 0
[ 2nd 1
] 2nd 2
> 2nd 3
= 2nd 4
{ 2nd 5
} 2nd 6
/ (numeric) 2nd Ctrl 7
/ (alpha) 2nd 7
- (numeric) 2nd Ctrl 8
- (alpha) 2nd 8
+ (numeric) 2nd Ctrl 9
+ (alpha) 2nd 9
* (numeric) 2nd I (letter i)
* (alpha) 2nd Ctrl I (letter i)
: (colon) 2nd D
; (semicolon) 2nd F
? 2nd L
` 2nd N
_ (underscore) 2nd M
, (comma) 2nd J
' (apostrophe) 2nd H
~ (tilde) 2nd B
\ 2nd S
| 2nd A
" 2nd G
! 2nd Q
@ 2nd W
# 2nd E
$ 2nd R
% 2nd T
^ 2nd Y
& 2nd U
( 2nd O
) 2nd P
8-7
8-8
9
Specifications and Reference Material
Technical Specifications
Thor VM3
Processor Intel Atom Dual Core CPU operating at 1.46GHz
Memory 2 or 4 GB DDR3 RAM
Mass Storage 2 GB mSATA
Storage Expansion 4 GB mSATA (user installable)
Operating System Microsoft Windows Embedded Compact 7
Radio Modules 802.11 a/b/g/n radio / Bluetooth
Scanner Options No integrated scanner, Optional serial, USB or Bluetooth scanners
Display Technology Intel HD graphics processor
Active matrix TFT
Resolution: 1024 x 468 pixels (maximum)
400 NIT (indoor) or 900 NIT (outdoor) brightness
12.1” (measured horizontally) display
Transmissive with LED backlight
Automatic brightness control on outdoor display
Vehicle motion screen blanking available
Keyboard Integrated 7-key keypad
Optional 95-key USB keyboard
Optional numeric-only keyboard
Optional adapter cable for Honeywell PS/2 keyboards
Touch Screen Impact resistive, standard hardened
Optional defroster
Field replaceable front panel including standard touch screen and optional defroster
External Connectors Optional external 802.11 / GPS / WWAN antenna connectors
Additional connectors on Quick Mount Smart Dock, see below
Beeper Minimum loudness greater than 95dBm at 10 cm in front of unit
Power Supply 10 to 60 VDC isolated
Uninterruptible Power Supply Internal UPS battery, 30-minute life at -30°C (-22°F)
Backup Battery (RCT) Internal lithium battery maintains Real Time Clock
9-1
Input Power DC Input Voltage: 10- 60 VDC,
Input Current: 4.6 Amps (typical),
Input Fuse: 8A Time Delay. Replace with same size, rating and type of fuse:
• Littelfuse 0215008.MXP
• Cooper Bussmann BK1/S506-8-R
• Bel Fuse 5HT 8-R
or equivalent.
9-2
Input Power DC Input Voltage: 13.2VDC,
Input Current: 4.6 Amps (typical),
Input Fuse: 8A Time Delay. Replace with same size, rating and type of fuse:
• Littelfuse 0215008.MXP
• Cooper Bussmann BK1/S506-8-R
• Bel Fuse 5HT 8-R
or equivalent.
9-3
Dimensions
Thor VM3
Width 12.6” (31.9 cm)
Height 10.3” (26.1 cm)
Depth 2.4” (6.2 cm)
Weight 6.75 lb. (3.1 kg)??
Standard Dock
Note: The RAM ball is not included in the following measurements.
Enhanced Dock
Note: The RAM ball is not included in the following measurements.
9-4
Environmental Specifications
Thor VM3 and Dock
Operating Temperature -22º to 122º F (-30ºC to 50ºC) [non-condensing]
Storage Temperature -22°F to 140°F (-30°C to 60°C) [non-condensing]
Operating Humidity Up to 95%
Water and Dust IEC 60529 compliant to IP66
ESD 15 kV air, 8kV direct contact
Vibration MIL-STD-810F, composite wheeled vehicles.
Crash SAE-J 1455
WPAN - Bluetooth
Bus Interface USB
Enhanced Data Rate Up to 3.0 Mbit/s over the air
Connection No less than 32.80 feet (10 meters) line of sight
Bluetooth Version 2.0 + EDR
Operating Frequency 2.402 - 2.480 GHz
QDID B013455
9-5
Port and Connector Pinouts
Power Supply Connector
VM1D Standard Dock and VM3D Enhanced Dock
Pin Signal Description
1 V In+ 10-60V DC input +
4 5
2 V In+ 10-60V DC input +
3 6 3 V In- input -
2 1 4 V In- input -
5 GND Chassis ground
6 Ignition +0V to 60V to start terminal
2 1 4 V In- Input -
5 COM1 Screen Blanking Box + The green wire in the power cable must
RTS be connected to the switched side of the screen blanking box.
See the applicable wiring diagram below.
6 COM1 Screen Blanking Box - The white wire in the power cable must
CTS be connected to the unswitched side of the screen blanking box.
See applicable wiring diagram below.
Cable shell provides chassis ground connection.
VMXD Enhanced Dock only: Because the power supply connector port for the VMXD Enhanced Dock contains COM1
RTS and CTS signals, the COM1 port on the dock should not be used when the power cable is used for screen blanking to
avoid port conflicts.
9-6
USB and USB1 Connector
The Standard Dock has a USB connector. The Enhanced Dock has a USB1 connector.
9-7
USB2 Connector
The USB2 connector is only present on the Enhanced Dock.
9-8
USB Dual Host Y Cable
D15 Male Connector
Pin Signal Description
9-9
PS/2 to USB Keyboard Adapter Cable
Note: This cable is not supported when the Thor VM3 is used with the VM1D Standard Dock.
9 - 10
CANbus / Audio Connector
Pin Signal Name Description
PIN 1 PIN 5 1 - CAN reserved
PIN 6 PIN 10
2 CAN_L CAN_L bus line dominant low
3 CAN_GND CAN Ground
9 - 11
CANbus Y Cable
D15 Female Connector
Pin Signal Description
9 - 12
Hat Encoding
9 - 13
9 - 14
Licenses of Third Party Software
This product contains software provided by third parties, which may include the below listed components. The Honeywell product that includes
this file does not necessarily use all of the third party software components referred to below.
.. contents::
Preamble
The licenses for most software and other practical works are designed
to take away your freedom to share and change the works. By contrast,
the GNU General Public License is intended to guarantee your freedom to
share and change all versions of a program--to make sure it remains free
software for all its users. We, the Free Software Foundation, use the
GNU General Public License for most of our software; it applies also to
any other work released this way by its authors. You can apply it to
your programs, too.
9 - 15
For example, if you distribute copies of such a program, whether
gratis or for a fee, you must pass on to the recipients the same
freedoms that you received. You must make sure that they, too, receive
or can get the source code. And you must show them these terms so they
know their rights.
Developers that use the GNU GPL protect your rights with two steps:
(1) assert copyright on the software, and (2) offer you this License
giving you legal permission to copy, distribute and/or modify it.
For the developers' and authors' protection, the GPL clearly explains
that there is no warranty for this free software. For both users' and
authors' sake, the GPL requires that modified versions be marked as
changed, so that their problems will not be attributed erroneously to
authors of previous versions.
0. Definitions.
9 - 16
To "modify" a work means to copy from or adapt all or part of the work
in a fashion requiring copyright permission, other than the making of an
exact copy. The resulting work is called a "modified version" of the
earlier work or a work "based on" the earlier work.
1. Source Code.
The "source code" for a work means the preferred form of the work
for making modifications to it. "Object code" means any non-source
form of a work.
9 - 17
produce the work, or an object code interpreter used to run it.
The "Corresponding Source" for a work in object code form means all
the source code needed to generate, install, and (for an executable
work) run the object code and to modify the work, including scripts to
control those activities. However, it does not include the work's
System Libraries, or general-purpose tools or generally available free
programs which are used unmodified in performing those activities but
which are not part of the work. For example, Corresponding Source
includes interface definition files associated with source files for
the work, and the source code for shared libraries and dynamically
linked subprograms that the work is specifically designed to require,
such as by intimate data communication or control flow between those
subprograms and other parts of the work.
2. Basic Permissions.
All rights granted under this License are granted for the term of
copyright on the Program, and are irrevocable provided the stated
conditions are met. This License explicitly affirms your unlimited
permission to run the unmodified Program. The output from running a
covered work is covered by this License only if the output, given its
content, constitutes a covered work. This License acknowledges your
rights of fair use or other equivalent, as provided by copyright law.
You may make, run and propagate covered works that you do not
convey, without conditions so long as your license otherwise remains
in force. You may convey covered works to others for the sole purpose
of having them make modifications exclusively for you, or provide you
with facilities for running those works, provided that you comply with
the terms of this License in conveying all material for which you do
not control copyright. Those thus making or running the covered works
for you must do so exclusively on your behalf, under your direction
and control, on terms that prohibit them from making any copies of
your copyrighted material outside their relationship with you.
9 - 18
No covered work shall be deemed part of an effective technological
measure under any applicable law fulfilling obligations under article
11 of the WIPO copyright treaty adopted on 20 December 1996, or
similar laws prohibiting or restricting circumvention of such
measures.
When you convey a covered work, you waive any legal power to forbid
circumvention of technological measures to the extent such circumvention
is effected by exercising rights under this License with respect to
the covered work, and you disclaim any intention to limit operation or
modification of the work as a means of enforcing, against the work's
users, your or third parties' legal rights to forbid circumvention of
technological measures.
You may convey verbatim copies of the Program's source code as you
receive it, in any medium, provided that you conspicuously and
appropriately publish on each copy an appropriate copyright notice;
keep intact all notices stating that this License and any
non-permissive terms added in accord with section 7 apply to the code;
keep intact all notices of the absence of any warranty; and give all
recipients a copy of this License along with the Program.
You may charge any price or no price for each copy that you convey,
and you may offer support or warranty protection for a fee.
a) The work must carry prominent notices stating that you modified
it, and giving a relevant date.
9 - 19
d) If the work has interactive user interfaces, each must display
Appropriate Legal Notices; however, if the Program has interactive
interfaces that do not display Appropriate Legal Notices, your
work need not make them do so.
You may convey a covered work in object code form under the terms
of sections 4 and 5, provided that you also convey the
machine-readable Corresponding Source under the terms of this License,
in one of these ways:
9 - 20
Corresponding Source along with the object code. If the place to
copy the object code is a network server, the Corresponding Source
may be on a different server (operated by you or a third party)
that supports equivalent copying facilities, provided you maintain
clear directions next to the object code saying where to find the
Corresponding Source. Regardless of what server hosts the
Corresponding Source, you remain obligated to ensure that it is
available for as long as needed to satisfy these requirements.
If you convey an object code work under this section in, or with, or
specifically for use in, a User Product, and the conveying occurs as
part of a transaction in which the right of possession and use of the
User Product is transferred to the recipient in perpetuity or for a
fixed term (regardless of how the transaction is characterized), the
Corresponding Source conveyed under this section must be accompanied
by the Installation Information. But this requirement does not apply
if neither you nor any third party retains the ability to install
modified object code on the User Product (for example, the work has
been installed in ROM).
9 - 21
The requirement to provide Installation Information does not include a
requirement to continue to provide support service, warranty, or updates
for a work that has been modified or installed by the recipient, or for
the User Product in which it has been modified or installed. Access to a
network may be denied when the modification itself materially and
adversely affects the operation of the network or violates the rules and
protocols for communication across the network.
7. Additional Terms.
When you convey a copy of a covered work, you may at your option
remove any additional permissions from that copy, or from any part of
it. (Additional permissions may be written to require their own
removal in certain cases when you modify the work.) You may place
additional permissions on material, added by you to a covered work,
for which you have or can give appropriate copyright permission.
9 - 22
authors of the material; or
If you add terms to a covered work in accord with this section, you
must place, in the relevant source files, a statement of the
additional terms that apply to those files, or a notice indicating
where to find the applicable terms.
8. Termination.
9 - 23
copyright holder, and you cure the violation prior to 30 days after
your receipt of the notice.
Termination of your rights under this section does not terminate the
licenses of parties who have received copies or rights from you under
this License. If your rights have been terminated and not permanently
reinstated, you do not qualify to receive new licenses for the same
material under section 10.
You may not impose any further restrictions on the exercise of the
rights granted or affirmed under this License. For example, you may
not impose a license fee, royalty, or other charge for exercise of
rights granted under this License, and you may not initiate litigation
(including a cross-claim or counterclaim in a lawsuit) alleging that
any patent claim is infringed by making, using, selling, offering for
sale, or importing the Program or any portion of it.
11. Patents.
9 - 24
work thus licensed is called the contributor's "contributor version".
9 - 25
specifically granted under this License. You may not convey a covered
work if you are a party to an arrangement with a third party that is
in the business of distributing software, under which you make payment
to the third party based on the extent of your activity of conveying
the work, and under which the third party grants, to any of the
parties who would receive the covered work from you, a discriminatory
patent license (a) in connection with copies of the covered work
conveyed by you (or copies made from those copies), or (b) primarily
for and in connection with specific products or compilations that
contain the covered work, unless you entered into that arrangement,
or that patent license was granted, prior to 28 March 2007.
The Free Software Foundation may publish revised and/or new versions of
the GNU General Public License from time to time. Such new versions will
be similar in spirit to the present version, but may differ in detail to
address new problems or concerns.
9 - 26
Public License "or any later version" applies to it, you have the
option of following the terms and conditions either of that numbered
version or of any later version published by the Free Software
Foundation. If the Program does not specify a version number of the
GNU General Public License, you may choose any version ever published
by the Free Software Foundation.
9 - 27
END OF TERMS AND CONDITIONS
<one line to give the program's name and a brief idea of what it does.>
Copyright (C) <year> <name of author>
You should have received a copy of the GNU General Public License
along with this program. If not, see <http://www.gnu.org/licenses/>.
Also add information on how to contact you by electronic and paper mail.
The hypothetical commands `show w' and `show c' should show the appropriate
parts of the General Public License. Of course, your program's commands
might be different; for a GUI interface, you would use an "about box".
You should also get your employer (if you work as a programmer) or school,
if any, to sign a "copyright disclaimer" for the program, if necessary.
For more information on this, and how to apply and follow the GNU GPL, see
<http://www.gnu.org/licenses/>.
The GNU General Public License does not permit incorporating your program
9 - 28
into proprietary programs. If your program is a subroutine library, you
may consider it more useful to permit linking proprietary applications with
the library. If this is what you want to do, use the GNU Lesser General
Public License instead of this License. But first, please read
<http://www.gnu.org/philosophy/why-not-lgpl.html>.
0. Additional Definitions.
9 - 29
1. Exception to Section 3 of the GNU GPL.
You may convey a covered work under sections 3 and 4 of this License
without being bound by section 3 of the GNU GPL.
a) under this License, provided that you make a good faith effort to
ensure that, in the event an Application does not supply the
function or data, the facility still operates, and performs
whatever part of its purpose remains meaningful, or
a) Give prominent notice with each copy of the object code that the
Library is used in it and that the Library and its use are
covered by this License.
b) Accompany the object code with a copy of the GNU GPL and this license
document.
4. Combined Works.
You may convey a Combined Work under terms of your choice that,
taken together, effectively do not restrict modification of the
portions of the Library contained in the Combined Work and reverse
engineering for debugging such modifications, if you also do each of
the following:
a) Give prominent notice with each copy of the Combined Work that
the Library is used in it and that the Library and its use are
covered by this License.
9 - 30
b) Accompany the Combined Work with a copy of the GNU GPL and this license
document.
5. Combined Libraries.
You may place library facilities that are a work based on the
Library side by side in a single library together with other library
facilities that are not Applications and are not covered by this
License, and convey such a combined library under terms of your
choice, if you do both of the following:
a) Accompany the combined library with a copy of the same work based
on the Library, uncombined with any other library facilities,
conveyed under the terms of this License.
9 - 31
b) Give prominent notice with the combined library that part of it
is a work based on the Library, and explaining where to find the
accompanying uncombined form of the same work.
The Free Software Foundation may publish revised and/or new versions
of the GNU Lesser General Public License from time to time. Such new
versions will be similar in spirit to the present version, but may
differ in detail to address new problems or concerns.
Permission is hereby granted, free of charge, to any person or organization obtaining a copy of the software and accompanying documentation
covered by this license (the 'Software') to use, reproduce, display, distribute, execute, and transmit the Software, and to prepare derivative works
of the Software, and to permit third-parties to whom the Software is furnished to do so, all subject to the following:
The copyright notices in the Software and this entire statement, including the above license grant, this restriction and the following disclaimer,
must be included in all copies of the Software, in whole or in part, and all derivative works of the Software, unless such copies or derivative
works are solely in the form of machine-executable object code generated by a source language processor.
9 - 32
THE SOFTWARE IS PROVIDED 'AS IS', WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO
THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT. IN NO EVENT
SHALL THE COPYRIGHT HOLDERS OR ANYONE DISTRIBUTING THE SOFTWARE BE LIABLE FOR ANY DAMAGES OR OTHER
LIABILITY, WHETHER IN CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR
THE USE OR OTHER DEALINGS IN THE SOFTWARE.
[This is the first released version of the Lesser GPL. It also counts
as the successor of the GNU Library Public License, version 2, hence
the version number 2.1.]
Preamble
The licenses for most software are designed to take away your
freedom to share and change it. By contrast, the GNU General Public
Licenses are intended to guarantee your freedom to share and change
free software--to make sure the software is free for all its users.
9 - 33
To protect your rights, we need to make restrictions that forbid
distributors to deny you these rights or to ask you to surrender these
rights. These restrictions translate to certain responsibilities for
you if you distribute copies of the library or if you modify it.
9 - 34
Public License. It also provides other free software developers Less
of an advantage over competing non-free programs. These disadvantages
are the reason we use the ordinary General Public License for many
libraries. However, the Lesser license provides advantages in certain
special circumstances.
9 - 35
copyright law: that is to say, a work containing the Library or a
portion of it, either verbatim or with modifications and/or translated
straightforwardly into another language. (Hereinafter, translation is
included without limitation in the term "modification".)
"Source code" for a work means the preferred form of the work for
making modifications to it. For a library, complete source code means
all the source code for all modules it contains, plus any associated
interface definition files, plus the scripts used to control compilation
and installation of the library.
You may charge a fee for the physical act of transferring a copy,
and you may at your option offer warranty protection in exchange for a
fee.
2. You may modify your copy or copies of the Library or any portion
of it, thus forming a work based on the Library, and copy and
distribute such modifications or work under the terms of Section 1
above, provided that you also meet all of these conditions:
9 - 36
in the event an application does not supply such function or
table, the facility still operates, and performs whatever part of
its purpose remains meaningful.
3. You may opt to apply the terms of the ordinary GNU General Public
License instead of this License to a given copy of the Library. To do
this, you must alter all the notices that refer to this License, so
that they refer to the ordinary GNU General Public License, version 2,
instead of to this License. (If a newer version than version 2 of the
ordinary GNU General Public License has appeared, then you can specify
that version instead if you wish.) Do not make any other change in
these notices.
This option is useful when you wish to copy part of the code of
the Library into a program that is not a library.
9 - 37
4. You may copy and distribute the Library (or a portion or
derivative of it, under Section 2) in object code or executable form
under the terms of Sections 1 and 2 above provided that you accompany
it with the complete corresponding machine-readable source code, which
must be distributed under the terms of Sections 1 and 2 above on a
medium customarily used for software interchange.
However, linking a "work that uses the Library" with the Library
creates an executable that is a derivative of the Library (because it
contains portions of the Library), rather than a "work that uses the
library". The executable is therefore covered by this License.
Section 6 states terms for distribution of such executables.
When a "work that uses the Library" uses material from a header file
that is part of the Library, the object code for the work may be a
derivative work of the Library even though the source code is not.
Whether this is true is especially significant if the work can be
linked without the Library, or if the work is itself a library. The
threshold for this to be true is not precisely defined by law.
9 - 38
modification of the work for the customer's own use and reverse
engineering for debugging such modifications.
You must give prominent notice with each copy of the work that the
Library is used in it and that the Library and its use are covered by
this License. You must supply a copy of this License. If the work
during execution displays copyright notices, you must include the
copyright notice for the Library among them, as well as a reference
directing the user to the copy of this License. Also, you must do one
of these things:
For an executable, the required form of the "work that uses the
Library" must include any data and utility programs needed for
reproducing the executable from it. However, as a special exception,
the materials to be distributed need not include anything that is
normally distributed (in either source or binary form) with the major
components (compiler, kernel, and so on) of the operating system on
9 - 39
which the executable runs, unless that component itself accompanies
the executable.
7. You may place library facilities that are a work based on the
Library side-by-side in a single library together with other library
facilities not covered by this License, and distribute such a combined
library, provided that the separate distribution of the work based on
the Library and of the other library facilities is otherwise
permitted, and provided that you do these two things:
9. You are not required to accept this License, since you have not
signed it. However, nothing else grants you permission to modify or
distribute the Library or its derivative works. These actions are
prohibited by law if you do not accept this License. Therefore, by
modifying or distributing the Library (or any work based on the
Library), you indicate your acceptance of this License to do so, and
all its terms and conditions for copying, distributing or modifying
the Library or works based on it.
10. Each time you redistribute the Library (or any work based on the
Library), the recipient automatically receives a license from the
original licensor to copy, distribute, link with or modify the Library
subject to these terms and conditions. You may not impose any further
restrictions on the recipients' exercise of the rights granted herein.
You are not responsible for enforcing compliance by third parties with
9 - 40
this License.
13. The Free Software Foundation may publish revised and/or new
versions of the Lesser General Public License from time to time.
Such new versions will be similar in spirit to the present version,
but may differ in detail to address new problems or concerns.
9 - 41
"any later version", you have the option of following the terms and
conditions either of that version or of any later version published by
the Free Software Foundation. If the Library does not specify a
license version number, you may choose any version ever published by
the Free Software Foundation.
14. If you wish to incorporate parts of the Library into other free
programs whose distribution conditions are incompatible with these,
write to the author to ask for permission. For software which is
copyrighted by the Free Software Foundation, write to the Free
Software Foundation; we sometimes make exceptions for this. Our
decision will be guided by the two goals of preserving the free status
of all derivatives of our free software and of promoting the sharing
and reuse of software generally.
NO WARRANTY
9 - 42
To apply these terms, attach the following notices to the library. It is
safest to attach them to the start of each source file to most effectively
convey the exclusion of warranty; and each file should have at least the
"copyright" line and a pointer to where the full notice is found.
<one line to give the library's name and a brief idea of what it does.>
Copyright (C) <year> <name of author>
You should have received a copy of the GNU Lesser General Public
License along with this library; if not, write to the Free Software
Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
Also add information on how to contact you by electronic and paper mail.
You should also get your employer (if you work as a programmer) or your
school, if any, to sign a "copyright disclaimer" for the library, if
necessary. Here is a sample; alter the names:
9 - 43
LICENSE ISSUES
==============
The OpenSSL toolkit stays under a dual license, i.e. both the conditions of
the OpenSSL License and the original SSLeay license apply to the toolkit.
See below for the actual license texts. Actually both licenses are BSD-style
Open Source licenses. In case of any license issues related to OpenSSL
please contact [email protected].
OpenSSL License
---------------
/* ====================================================================
* Copyright (c) 1998-2008 The OpenSSL Project. All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
*
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
*
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in
* the documentation and/or other materials provided with the
* distribution.
*
* 3. All advertising materials mentioning features or use of this
* software must display the following acknowledgment:
* "This product includes software developed by the OpenSSL Project
* for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
*
* 4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to
* endorse or promote products derived from this software without
* prior written permission. For written permission, please contact
* [email protected].
*
* 5. Products derived from this software may not be called "OpenSSL"
* nor may "OpenSSL" appear in their names without prior written
* permission of the OpenSSL Project.
*
* 6. Redistributions of any form whatsoever must retain the following
* acknowledgment:
* "This product includes software developed by the OpenSSL Project
* for use in the OpenSSL Toolkit (http://www.openssl.org/)"
*
* THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
* EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
9 - 44
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR
* ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
* OF THE POSSIBILITY OF SUCH DAMAGE.
* ====================================================================
*
* This product includes cryptographic software written by Eric Young
* ([email protected]). This product includes software written by Tim
* Hudson ([email protected]).
*
*/
9 - 45
* documentation and/or other materials provided with the distribution.
* 3. All advertising materials mentioning features or use of this software
* must display the following acknowledgement:
* "This product includes cryptographic software written by
* Eric Young ([email protected])"
* The word 'cryptographic' can be left out if the rouines from the library
* being used are not cryptographic related :-).
* 4. If you include any Windows specific code (or a derivative thereof) from
* the apps directory (application code) you must include an acknowledgement:
* "This product includes software written by Tim Hudson ([email protected])"
*
* THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
* SUCH DAMAGE.
*
* The licence and distribution terms for any publically available version or
* derivative of this code cannot be changed. i.e. this code cannot simply be
* copied and put under another distribution licence
* [including the GNU Public Licence.]
*/
* All NSIS source code, plug-ins, documentation, examples, header files and graphics, with the exception of the compression modules and
where otherwise noted, are licensed under the zlib/libpng license.
* The zlib compression module for NSIS is licensed under the zlib/libpng license.
* The bzip2 compression module for NSIS is licensed under the bzip2 license.
* The LZMA compression module for NSIS is licensed under the Common Public License version 1.0.
ZLIB/LIBPNG LICENSE
9 - 46
-------------------
This software is provided 'as-is', without any express or implied warranty. In no event will the authors be held liable for any damages arising from
the use of this software.
Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely,
subject to the following restrictions:
1. The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in
a product, an acknowledgment in the product documentation would be appreciated but is not required.
2. Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.
3. This notice may not be removed or altered from any source distribution.
BZIP2 LICENSE
-------------
This program, "bzip2" and associated library "libbzip2", are copyright (C) 1996-2000 Julian R Seward. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
2. The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in
a product, an acknowledgment in the product documentation would be appreciated but is not required.
3. Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software.
4. The name of the author may not be used to endorse or promote products derived from this software without specific prior written
permission.
THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN
NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
THE ACCOMPANYING PROGRAM IS PROVIDED UNDER THE TERMS OF THIS COMMON PUBLIC LICENSE ("AGREEMENT"). ANY USE,
REPRODUCTION OR DISTRIBUTION OF THE PROGRAM CONSTITUTES RECIPIENT'S ACCEPTANCE OF THIS AGREEMENT.
1. DEFINITIONS
9 - 47
"Contribution" means:
a) in the case of the initial Contributor, the initial code and documentation distributed under this Agreement, and
b) in the case of each subsequent Contributor:
where such changes and/or additions to the Program originate from and are distributed by that particular Contributor. A Contribution
'originates' from a Contributor if it was added to the Program by such Contributor itself or anyone acting on such Contributor's behalf.
Contributions do not include additions to the Program which: (i) are separate modules of software distributed in conjunction with the Program
under their own license agreement, and (ii) are not derivative works of the Program.
"Licensed Patents " mean patent claims licensable by a Contributor which are necessarily infringed by the use or sale of its Contribution alone
or when combined with the Program.
"Recipient" means anyone who receives the Program under this Agreement, including all Contributors.
2. GRANT OF RIGHTS
a) Subject to the terms of this Agreement, each Contributor hereby grants Recipient a non-exclusive, worldwide, royalty-free copyright
license to reproduce, prepare derivative works of, publicly display, publicly perform, distribute and sublicense the Contribution of such
Contributor, if any, and such derivative works, in source code and object code form.
b) Subject to the terms of this Agreement, each Contributor hereby grants Recipient a non-exclusive, worldwide, royalty-free patent license
under Licensed Patents to make, use, sell, offer to sell, import and otherwise transfer the Contribution of such Contributor, if any, in source code
and object code form. This patent license shall apply to the combination of the Contribution and the Program if, at the time the Contribution is
added by the Contributor, such addition of the Contribution causes such combination to be covered by the Licensed Patents. The patent license
shall not apply to any other combinations which include the Contribution. No hardware per se is licensed hereunder.
c) Recipient understands that although each Contributor grants the licenses to its Contributions set forth herein, no assurances are provided
by any Contributor that the Program does not infringe the patent or other intellectual property rights of any other entity. Each Contributor
disclaims any liability to Recipient for claims brought by any other entity based on infringement of intellectual property rights or otherwise. As a
condition to exercising the rights and licenses granted hereunder, each Recipient hereby assumes sole responsibility to secure any other
intellectual property rights needed, if any. For example, if a third party patent license is required to allow Recipient to distribute the Program, it is
Recipient's responsibility to acquire that license before distributing the Program.
d) Each Contributor represents that to its knowledge it has sufficient copyright rights in its Contribution, if any, to grant the copyright license
set forth in this Agreement.
3. REQUIREMENTS
A Contributor may choose to distribute the Program in object code form under its own license agreement, provided that:
9 - 48
b) its license agreement:
i) effectively disclaims on behalf of all Contributors all warranties and conditions, express and implied, including warranties or conditions of
title and non-infringement, and implied warranties or conditions of merchantability and fitness for a particular purpose;
ii) effectively excludes on behalf of all Contributors all liability for damages, including direct, indirect, special, incidental and consequential
damages, such as lost profits;
iii) states that any provisions which differ from this Agreement are offered by that Contributor alone and not by any other party; and
iv) states that source code for the Program is available from such Contributor, and informs licensees how to obtain it in a reasonable manner
on or through a medium customarily used for software exchange.
b) a copy of this Agreement must be included with each copy of the Program.
Contributors may not remove or alter any copyright notices contained within the Program.
Each Contributor must identify itself as the originator of its Contribution, if any, in a manner that reasonably allows subsequent Recipients to
identify the originator of the Contribution.
4. COMMERCIAL DISTRIBUTION
Commercial distributors of software may accept certain responsibilities with respect to end users, business partners and the like. While this
license is intended to facilitate the commercial use of the Program, the Contributor who includes the Program in a commercial product offering
should do so in a manner which does not create potential liability for other Contributors. Therefore, if a Contributor includes the Program in a
commercial product offering, such Contributor ("Commercial Contributor") hereby agrees to defend and indemnify every other Contributor
("Indemnified Contributor") against any losses, damages and costs (collectively "Losses") arising from claims, lawsuits and other legal actions
brought by a third party against the Indemnified Contributor to the extent caused by the acts or omissions of such Commercial Contributor in
connection with its distribution of the Program in a commercial product offering. The obligations in this section do not apply to any claims or
Losses relating to any actual or alleged intellectual property infringement. In order to qualify, an Indemnified Contributor must: a) promptly notify
the Commercial Contributor in writing of such claim, and b) allow the Commercial Contributor to control, and cooperate with the Commercial
Contributor in, the defense and any related settlement negotiations. The Indemnified Contributor may participate in any such claim at its own
expense.
For example, a Contributor might include the Program in a commercial product offering, Product X. That Contributor is then a Commercial
Contributor. If that Commercial Contributor then makes performance claims, or offers warranties related to Product X, those performance claims
and warranties are such Commercial Contributor's responsibility alone. Under this section, the Commercial Contributor would have to defend
claims against the other Contributors related to those performance claims and warranties, and if a court requires any other Contributor to pay
any damages as a result, the Commercial Contributor must pay those damages.
5. NO WARRANTY
EXCEPT AS EXPRESSLY SET FORTH IN THIS AGREEMENT, THE PROGRAM IS PROVIDED ON AN "AS IS" BASIS, WITHOUT
WARRANTIES OR CONDITIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED INCLUDING, WITHOUT LIMITATION, ANY WARRANTIES
OR CONDITIONS OF TITLE, NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Each Recipient is
solely responsible for determining the appropriateness of using and distributing the Program and assumes all risks associated with its exercise
of rights under this Agreement, including but not limited to the risks and costs of program errors, compliance with applicable laws, damage to or
loss of data, programs or equipment, and unavailability or interruption of operations.
6. DISCLAIMER OF LIABILITY
9 - 49
EXCEPT AS EXPRESSLY SET FORTH IN THIS AGREEMENT, NEITHER RECIPIENT NOR ANY CONTRIBUTORS SHALL HAVE ANY
LIABILITY FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING WITHOUT
LIMITATION LOST PROFITS), HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OR DISTRIBUTION OF THE PROGRAM
OR THE EXERCISE OF ANY RIGHTS GRANTED HEREUNDER, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
7. GENERAL
If any provision of this Agreement is invalid or unenforceable under applicable law, it shall not affect the validity or enforceability of the remainder
of the terms of this Agreement, and without further action by the parties hereto, such provision shall be reformed to the minimum extent
necessary to make such provision valid and enforceable.
If Recipient institutes patent litigation against a Contributor with respect to a patent applicable to software (including a cross-claim or
counterclaim in a lawsuit), then any patent licenses granted by that Contributor to such Recipient under this Agreement shall terminate as of the
date such litigation is filed. In addition, if Recipient institutes patent litigation against any entity (including a cross-claim or counterclaim in a
lawsuit) alleging that the Program itself (excluding combinations of the Program with other software or hardware) infringes such Recipient's
patent(s), then such Recipient's rights granted under Section 2(b) shall terminate as of the date such litigation is filed.
All Recipient's rights under this Agreement shall terminate if it fails to comply with any of the material terms or conditions of this Agreement and
does not cure such failure in a reasonable period of time after becoming aware of such noncompliance. If all Recipient's rights under this
Agreement terminate, Recipient agrees to cease use and distribution of the Program as soon as reasonably practicable. However, Recipient's
obligations under this Agreement and any licenses granted by Recipient relating to the Program shall continue and survive.
Everyone is permitted to copy and distribute copies of this Agreement, but in order to avoid inconsistency the Agreement is copyrighted and
may only be modified in the following manner. The Agreement Steward reserves the right to publish new versions (including revisions) of this
Agreement from time to time. No one other than the Agreement Steward has the right to modify this Agreement. IBM is the initial Agreement
Steward. IBM may assign the responsibility to serve as the Agreement Steward to a suitable separate entity. Each new version of the
Agreement will be given a distinguishing version number. The Program (including Contributions) may always be distributed subject to the
version of the Agreement under which it was received. In addition, after a new version of the Agreement is published, Contributor may elect to
distribute the Program (including its Contributions) under the new version. Except as expressly stated in Sections 2(a) and 2(b) above, Recipient
receives no rights or licenses to the intellectual property of any Contributor under this Agreement, whether expressly, by implication, estoppel or
otherwise. All rights in the Program not expressly granted under this Agreement are reserved.
This Agreement is governed by the laws of the State of New York and the intellectual property laws of the United States of America. No party to
this Agreement will bring a legal action under this Agreement more than one year after the cause of action arose. Each party waives its rights to
a jury trial in any resulting litigation.
Igor Pavlov and Amir Szekely, the authors of the LZMA compression module for NSIS, expressly permit you to statically or dynamically link your
code (or bind by name) to the files from the LZMA compression module for NSIS without subjecting your linked code to the terms of the
Common Public license version 1.0. Any modifications or additions to files from the LZMA compression module for NSIS, however, are subject
to the terms of the Common Public License version 1.0.
9 - 50
*
* All rights reserved. Redistribution and use in source and binary
* forms, with or without modification, are permitted provided that
* this copyright notice is retained.
*
* THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED
* WARRANTIES ARE DISCLAIMED. IN NO EVENT SHALL CORE SDI S.A. BE
* LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY OR
* CONSEQUENTIAL DAMAGES RESULTING FROM THE USE OR MISUSE OF THIS
* SOFTWARE.
Portions copyright Robert de Bath, Joris van Rantwijk, Delian Delchev, Andreas Schultz, Jeroen Massar, Wez Furlong, Nicolas Barry, Justin
Bradford, Ben Harris, Malcolm Smith, Ahmad Khalifa, Markus Kuhn, Colin Watson, Christopher Staite, and CORE SDI S.A.
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the
"Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute,
sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following
conditions:
The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED
TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT
SHALL SIMON TATHAM BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT
OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
SOFTWARE.
9 - 51
The above copyright notice and this permission notice shall be included in
all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
THE SOFTWARE.
http://www.apache.org/licenses/LICENSE-2.0
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
* Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
9 - 52
* Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the
documentation and/or other materials provided with the distribution.
* Neither the name of ekus.net nor the names of its contributors may be used to endorse or promote products derived from this software without
specific prior written permission.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED
WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY
DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY
OF SUCH DAMAGE.
License
THE WORK (AS DEFINED BELOW) IS PROVIDED UNDER THE TERMS OF THIS CODE PROJECT OPEN LICENSE ("LICENSE"). THE
WORK IS PROTECTED BY COPYRIGHT AND/OR OTHER APPLICABLE LAW. ANY USE OF THE WORK OTHER THAN AS AUTHORIZED
UNDER THIS LICENSE OR COPYRIGHT LAW IS PROHIBITED.
BY EXERCISING ANY RIGHTS TO THE WORK PROVIDED HEREIN, YOU ACCEPT AND AGREE TO BE BOUND BY THE TERMS OF THIS
LICENSE. THE AUTHOR GRANTS YOU THE RIGHTS CONTAINED HEREIN IN CONSIDERATION OF YOUR ACCEPTANCE OF SUCH
TERMS AND CONDITIONS. IF YOU DO NOT AGREE TO ACCEPT AND BE BOUND BY THE TERMS OF THIS LICENSE, YOU CANNOT
MAKE ANY USE OF THE WORK.
Definitions.
"Articles" means, collectively, all articles written by Author which describes how the Source Code and Executable Files for the Work may be
used by a user.
"Author" means the individual or entity that offers the Work under the terms of this License.
"Derivative Work" means a work based upon the Work or upon the Work and other pre-existing works.
"Executable Files" refer to the executables, binary files, configuration and any required data files included in the Work.
9 - 53
"Publisher" means the provider of the website, magazine, CD-ROM, DVD or other medium from or by which the Work is obtained by You.
"Source Code" refers to the collection of source code and configuration files used to create the Executable Files.
"Standard Version" refers to such a Work if it has not been modified, or has been modified in accordance with the consent of the Author, such
consent being in the full discretion of the Author.
"Work" refers to the collection of files distributed by the Publisher, including the Source Code, Executable Files, binaries, data files,
documentation, whitepapers and the Articles.
"You" is you, an individual or entity wishing to use the Work and exercise your rights under this License.
Fair Use/Fair Use Rights. Nothing in this License is intended to reduce, limit, or restrict any rights arising from fair use, fair dealing, first sale or
other limitations on the exclusive rights of the copyright owner under copyright law or other applicable laws.
License Grant. Subject to the terms and conditions of this License, the Author hereby grants You a worldwide, royalty-free, non-exclusive,
perpetual (for the duration of the applicable copyright) license to exercise the rights in the Work as stated below:
You may use the standard version of the Source Code or Executable Files in Your own applications.
You may apply bug fixes, portability fixes and other modifications obtained from the Public Domain or from the Author. A Work modified in such
a way shall still be considered the standard version and will be subject to this License.
You may otherwise modify Your copy of this Work (excluding the Articles) in any way to create a Derivative Work, provided that You insert a
prominent notice in each changed file stating how, when and where You changed that file.
You may distribute the standard version of the Executable Files and Source Code or Derivative Work in aggregate with other (possibly
commercial) programs as part of a larger (possibly commercial) software distribution.
The Articles discussing the Work published in any form by the author may not be distributed or republished without the Author's consent. The
author retains copyright to any such Articles. You may use the Executable Files and Source Code pursuant to this License but you may not
repost or republish or otherwise distribute or make available the Articles, without the prior written consent of the Author.
Any subroutines or modules supplied by You and linked into the Source Code or Executable Files of this Work shall not be considered part of
this Work and will not be subject to the terms of this License.
Patent License. Subject to the terms and conditions of this License, each Author hereby grants to You a perpetual, worldwide, non-exclusive,
no-charge, royalty-free, irrevocable (except as stated in this section) patent license to make, have made, use, import, and otherwise transfer the
Work.
Restrictions. The license granted in Section 3 above is expressly made subject to and limited by the following restrictions:
You agree not to remove any of the original copyright, patent, trademark, and attribution notices and associated disclaimers that may appear in
the Source Code or Executable Files.
You agree not to advertise or in any way imply that this Work is a product of Your own.
The name of the Author may not be used to endorse or promote products derived from the Work without the prior written consent of the Author.
You agree not to sell, lease, or rent any part of the Work. This does not restrict you from including the Work or any part of the Work inside a
larger software distribution that itself is being sold. The Work by itself, though, cannot be sold, leased or rented.
You may distribute the Executable Files and Source Code only under the terms of this License, and You must include a copy of, or the Uniform
Resource Identifier for, this License with every copy of the Executable Files or Source Code You distribute and ensure that anyone receiving
such Executable Files and Source Code agrees that the terms of this License apply to such Executable Files and/or Source Code. You may not
offer or impose any terms on the Work that alter or restrict the terms of this License or the recipients' exercise of the rights granted hereunder.
You may not sublicense the Work. You must keep intact all notices that refer to this License and to the disclaimer of warranties. You may not
distribute the Executable Files or Source Code with any technological measures that control access or use of the Work in a manner inconsistent
with the terms of this License.
You agree not to use the Work for illegal, immoral or improper purposes, or on pages containing illegal, immoral or improper material. The Work
is subject to applicable export laws. You agree to comply with all such laws and regulations that may apply to the Work after Your receipt of the
Work.
Representations, Warranties and Disclaimer. THIS WORK IS PROVIDED "AS IS", "WHERE IS" AND "AS AVAILABLE", WITHOUT ANY
EXPRESS OR IMPLIED WARRANTIES OR CONDITIONS OR GUARANTEES. YOU, THE USER, ASSUME ALL RISK IN ITS USE,
INCLUDING COPYRIGHT INFRINGEMENT, PATENT INFRINGEMENT, SUITABILITY, ETC. AUTHOR EXPRESSLY DISCLAIMS ALL
EXPRESS, IMPLIED OR STATUTORY WARRANTIES OR CONDITIONS, INCLUDING WITHOUT LIMITATION, WARRANTIES OR
CONDITIONS OF MERCHANTABILITY, MERCHANTABLE QUALITY OR FITNESS FOR A PARTICULAR PURPOSE, OR ANY WARRANTY
OF TITLE OR NON-INFRINGEMENT, OR THAT THE WORK (OR ANY PORTION THEREOF) IS CORRECT, USEFUL, BUG-FREE OR FREE
OF VIRUSES. YOU MUST PASS THIS DISCLAIMER ON WHENEVER YOU DISTRIBUTE THE WORK OR DERIVATIVE WORKS.
Indemnity. You agree to defend, indemnify and hold harmless the Author and the Publisher from and against any claims, suits, losses, damages,
liabilities, costs, and expenses (including reasonable legal or attorneys’ fees) resulting from or relating to any use of the Work by You.
Limitation on Liability. EXCEPT TO THE EXTENT REQUIRED BY APPLICABLE LAW, IN NO EVENT WILL THE AUTHOR OR THE
PUBLISHER BE LIABLE TO YOU ON ANY LEGAL THEORY FOR ANY SPECIAL, INCIDENTAL, CONSEQUENTIAL, PUNITIVE OR
EXEMPLARY DAMAGES ARISING OUT OF THIS LICENSE OR THE USE OF THE WORK OR OTHERWISE, EVEN IF THE AUTHOR OR
THE PUBLISHER HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
9 - 54
Termination.
This License and the rights granted hereunder will terminate automatically upon any breach by You of any term of this License. Individuals or
entities who have received Derivative Works from You under this License, however, will not have their licenses terminated provided such
individuals or entities remain in full compliance with those licenses. Sections 1, 2, 6, 7, 8, 9, 10 and 11 will survive any termination of this
License.
If You bring a copyright, trademark, patent or any other infringement claim against any contributor over infringements You claim are made by the
Work, your License from such contributor to the Work ends automatically.
Subject to the above terms and conditions, this License is perpetual (for the duration of the applicable copyright in the Work). Notwithstanding
the above, the Author reserves the right to release the Work under different license terms or to stop distributing the Work at any time; provided,
however that any such election will not serve to withdraw this License (or any other license that has been, or is required to be, granted under the
terms of this License), and this License will continue in full force and effect unless terminated as stated above.
Publisher. The parties hereby confirm that the Publisher shall not, under any circumstances, be responsible for and shall not have any liability in
respect of the subject matter of this License. The Publisher makes no warranty whatsoever in connection with the Work and shall not be liable to
You or any party on any legal theory for any damages whatsoever, including without limitation any general, special, incidental or consequential
damages arising in connection to this license. The Publisher reserves the right to cease making the Work available to You at any time without
notice
Miscellaneous
This License shall be governed by the laws of the location of the head office of the Author or if the Author is an individual, the laws of location of
the principal place of residence of the Author.
If any provision of this License is invalid or unenforceable under applicable law, it shall not affect the validity or enforceability of the remainder of
the terms of this License, and without further action by the parties to this License, such provision shall be reformed to the minimum extent
necessary to make such provision valid and enforceable.
No term or provision of this License shall be deemed waived and no breach consented to unless such waiver or consent shall be in writing and
signed by the party to be charged with such waiver or consent.
This License constitutes the entire agreement between the parties with respect to the Work licensed herein. There are no understandings,
agreements or representations with respect to the Work not specified herein. The Author shall not be bound by any additional provisions that
may appear in any communication from You. This License may not be modified without the mutual written agreement of the Author and You.
* zlib
[ Copyright (C) 1995-2013 Jean-loup Gailly and Mark Adler]
9 - 55
2. Altered source versions must be plainly marked as such, and
must not be misrepresented as being the original software.
* Rathaxes
[Copyright (c) 1997 Microsoft Corporation]
9 - 56
This license governs use of code marked as “sample” or “example” available on this web site without a license agreement, as provided under
the section above titled “NOTICE SPECIFIC TO SOFTWARE AVAILABLE ON THIS WEB SITE.” If you use such code (the “software”), you
accept this license. If you do not accept the license, do not use the software.
1. Definitions
The terms “reproduce,” “reproduction,” “derivative works,” and “distribution” have the same meaning here as under U.S. copyright law.
A “contributor” is any person that distributes its contribution under this license.
“Licensed patents” are a contributor’s patent claims that read directly on its contribution.
2. Grant of Rights
(A) Copyright Grant - Subject to the terms of this license, including the license conditions and limitations in section 3, each contributor grants
you a non-exclusive, worldwide, royalty-free copyright license to reproduce its contribution, prepare derivative works of its contribution, and
distribute its contribution or any derivative works that you create.
(B) Patent Grant - Subject to the terms of this license, including the license conditions and limitations in section 3, each contributor grants you a
non-exclusive, worldwide, royalty-free license under its licensed patents to make, have made, use, sell, offer for sale, import, and/or otherwise
dispose of its contribution in the software or derivative works of the contribution in the software.
(A) No Trademark License- This license does not grant you rights to use any contributors’ name, logo, or trademarks.
(B) If you bring a patent claim against any contributor over patents that you claim are infringed by the software, your patent license from such
contributor to the software ends automatically.
(C) If you distribute any portion of the software, you must retain all copyright, patent, trademark, and attribution notices that are present in the
software.
(D) If you distribute any portion of the software in source code form, you may do so only under this license by including a complete copy of this
license with your distribution. If you distribute any portion of the software in compiled or object code form, you may only do so under a license
that complies with this license.
(E) The software is licensed “as-is.” You bear the risk of using it. The contributors give no express warranties, guarantees or conditions. You may
have additional consumer rights under your local laws which this license cannot change. To the extent permitted under your local laws, the
contributors exclude the implied warranties of merchantability, fitness for a particular purpose and non-infringement.
(F) Platform Limitation - The licenses granted in sections 2(A) and 2(B) extend only to the software or derivative works that you create that run
on a Microsoft Windows operating system product.
9 - 57
// _THE BLOWFISH ENCRYPTION ALGORITHM_
// by Bruce Schneier
// Revised code--3/20/94
// Converted to C++ class 5/96, Jim Conger
Blowfish is a symmetric block cipher that can be used as a drop-in replacement for DES or IDEA. It takes a variable-length key, from 32 bits to
448 bits, making it ideal for both domestic and exportable use. Blowfish was designed in 1993 by Bruce Schneier as a fast, free alternative to
existing encryption algorithms. Since then it has been analyzed considerably, and it is slowly gaining acceptance as a strong encryption
algorithm. Blowfish is unpatented and license-free, and is available free for all uses.
Package(s)
============================
* touch
1. Definitions
--------------
1.1. "Contributor"
means each individual or legal entity that creates, contributes to
the creation of, or owns Covered Software.
1.3. "Contribution"
means Covered Software of a particular Contributor.
9 - 58
(a) that the initial Contributor has attached the notice described
in Exhibit B to the Covered Software; or
(b) that the Covered Software was made available under the terms of
version 1.1 or earlier of the License, but not also under the
terms of a Secondary License.
1.8. "License"
means this document.
1.9. "Licensable"
means having the right to grant, to the maximum extent possible,
whether at the time of the initial grant or subsequently, any and
all of the rights conveyed by this License.
1.10. "Modifications"
means any of the following:
(a) any file in Source Code Form that results from an addition to,
deletion from, or modification of the contents of Covered
Software; or
(b) any new file in Source Code Form that contains any Covered
Software.
9 - 59
1.14. "You" (or "Your")
means an individual or a legal entity exercising rights under this
License. For legal entities, "You" includes any entity that
controls, is controlled by, or is under common control with You. For
purposes of this definition, "control" means (a) the power, direct
or indirect, to cause the direction or management of such entity,
whether by contract or otherwise, or (b) ownership of more than
fifty percent (50%) of the outstanding shares or beneficial
ownership of such entity.
2.1. Grants
(b) under Patent Claims of such Contributor to make, use, sell, offer
for sale, have made, import, and otherwise transfer either its
Contributions or its Contributor Version.
The licenses granted in this Section 2 are the only rights granted under
this License. No additional rights or licenses will be implied from the
distribution or licensing of Covered Software under this License.
Notwithstanding Section 2.1(b) above, no patent license is granted by a
Contributor:
(a) for any code that a Contributor has removed from Covered Software;
or
(b) for infringements caused by: (i) Your and any other third party's
modifications of Covered Software, or (ii) the combination of its
Contributions with other software (except as part of its Contributor
9 - 60
Version); or
This License does not grant any rights in the trademarks, service marks,
or logos of any Contributor (except as may be necessary to comply with
the notice requirements in Section 3.4).
2.5. Representation
This License is not intended to limit any rights You have under
applicable copyright doctrines of fair use, fair dealing, or other
equivalents.
2.7. Conditions
Sections 3.1, 3.2, 3.3, and 3.4 are conditions of the licenses granted
in Section 2.1.
3. Responsibilities
-------------------
9 - 61
(a) such Covered Software must also be made available in Source Code
Form, as described in Section 3.1, and You must inform recipients of
the Executable Form how they can obtain a copy of such Source Code
Form by reasonable means in a timely manner, at a charge no more
than the cost of distribution to the recipient; and
(b) You may distribute such Executable Form under the terms of this
License, or sublicense it under different terms, provided that the
license for the Executable Form does not attempt to limit or alter
the recipients' rights in the Source Code Form under this License.
You may create and distribute a Larger Work under terms of Your choice,
provided that You also comply with the requirements of this License for
the Covered Software. If the Larger Work is a combination of Covered
Software with a work governed by one or more Secondary Licenses, and the
Covered Software is not Incompatible With Secondary Licenses, this
License permits You to additionally distribute such Covered Software
under the terms of such Secondary License(s), so that the recipient of
the Larger Work may, at their option, further distribute the Covered
Software under the terms of either this License or such Secondary
License(s).
3.4. Notices
You may not remove or alter the substance of any license notices
(including copyright notices, patent notices, disclaimers of warranty,
or limitations of liability) contained within the Source Code Form of
the Covered Software, except that You may alter any license notices to
the extent required to remedy known factual inaccuracies.
You may choose to offer, and to charge a fee for, warranty, support,
indemnity or liability obligations to one or more recipients of Covered
Software. However, You may do so only on Your own behalf, and not on
behalf of any Contributor. You must make it absolutely clear that any
such warranty, support, indemnity, or liability obligation is offered by
You alone, and You hereby agree to indemnify every Contributor for any
liability incurred by such Contributor as a result of warranty, support,
indemnity or liability terms You offer. You may include additional
disclaimers of warranty and limitations of liability specific to any
jurisdiction.
9 - 62
If it is impossible for You to comply with any of the terms of this
License with respect to some or all of the Covered Software due to
statute, judicial order, or regulation then You must: (a) comply with
the terms of this License to the maximum extent possible; and (b)
describe the limitations and the code they affect. Such description must
be placed in a text file included with all distributions of the Covered
Software under this License. Except to the extent prohibited by statute
or regulation, such description must be sufficiently detailed for a
recipient of ordinary skill to be able to understand it.
5. Termination
--------------
5.1. The rights granted under this License will terminate automatically
if You fail to comply with any of its terms. However, if You become
compliant, then the rights granted under this License from a particular
Contributor are reinstated (a) provisionally, unless and until such
Contributor explicitly and finally terminates Your grants, and (b) on an
ongoing basis, if such Contributor fails to notify You of the
non-compliance by some reasonable means prior to 60 days after You have
come back into compliance. Moreover, Your grants from a particular
Contributor are reinstated on an ongoing basis if such Contributor
notifies You of the non-compliance by some reasonable means, this is the
first time You have received notice of non-compliance with this License
from such Contributor, and You become compliant prior to 30 days after
Your receipt of the notice.
5.3. In the event of termination under Sections 5.1 or 5.2 above, all
end user license agreements (excluding distributors and resellers) which
have been validly granted by You or Your distributors under this License
prior to termination shall survive termination.
************************************************************************
* *
* 6. Disclaimer of Warranty *
* ------------------------- *
* *
* Covered Software is provided under this License on an "as is" *
* basis, without warranty of any kind, either expressed, implied, or *
* statutory, including, without limitation, warranties that the *
* Covered Software is free of defects, merchantable, fit for a *
* particular purpose or non-infringing. The entire risk as to the *
9 - 63
* quality and performance of the Covered Software is with You. *
* Should any Covered Software prove defective in any respect, You *
* (not any Contributor) assume the cost of any necessary servicing, *
* repair, or correction. This disclaimer of warranty constitutes an *
* essential part of this License. No use of any Covered Software is *
* authorized under this License except under this disclaimer. *
* *
************************************************************************
************************************************************************
* *
* 7. Limitation of Liability *
* -------------------------- *
* *
* Under no circumstances and under no legal theory, whether tort *
* (including negligence), contract, or otherwise, shall any *
* Contributor, or anyone who distributes Covered Software as *
* permitted above, be liable to You for any direct, indirect, *
* special, incidental, or consequential damages of any character *
* including, without limitation, damages for lost profits, loss of *
* goodwill, work stoppage, computer failure or malfunction, or any *
* and all other commercial damages or losses, even if such party *
* shall have been informed of the possibility of such damages. This *
* limitation of liability shall not apply to liability for death or *
* personal injury resulting from such party's negligence to the *
* extent applicable law prohibits such limitation. Some *
* jurisdictions do not allow the exclusion or limitation of *
* incidental or consequential damages, so this exclusion and *
* limitation may not apply to You. *
* *
************************************************************************
8. Litigation
-------------
9. Miscellaneous
----------------
9 - 64
that the language of a contract shall be construed against the drafter
shall not be used to construe this License against a Contributor.
You may distribute the Covered Software under the terms of the version
of the License under which You originally received the Covered Software,
or under the terms of any subsequent version published by the license
steward.
If you create software not governed by this License, and you want to
create a new license for such software, you may create and use a
modified version of this License if you rename the license and remove
any references to the name of the license steward (except to note that
such modified license differs from this License).
This Source Code Form is subject to the terms of the Mozilla Public
License, v. 2.0. If a copy of the MPL was not distributed with this
file, You can obtain one at http://mozilla.org/MPL/2.0/.
9 - 65
Exhibit B - "Incompatible With Secondary Licenses" Notice
---------------------------------------------------------
9 - 66
10
Customer Support
Technical Assistance
If you need assistance installing or troubleshooting your device, please contact us by using one of the methods below:
Knowledge Base: www.hsmknowledgebase.com
Our Knowledge Base provides thousands of immediate solutions. If the Knowledge Base cannot help, our Technical Support
Portal (see below) provides an easy way to report your problem or ask your question.
Technical Support Portal: www.hsmsupportportal.com
The Technical Support Portal not only allows you to report your problem, but it also provides immediate solutions to your techni-
cal issues by searching our Knowledge Base. With the Portal, you can submit and track your questions online and send and
receive attachments.
Telephone: www.honeywellaidc.com/locations
For our latest contact information, please check our website at the link above.
Limited Warranty
Honeywell International Inc. (“HII”) warrants its products to be free from defects in materials and workmanship and to conform to
HII’s published specifications applicable to the products purchased at the time of shipment. This warranty does not cover any
HII product which is (i) improperly installed or used; (ii) damaged by accident or negligence, including failure to follow the proper
maintenance, service, and cleaning schedule; or (iii) damaged as a result of (A) modification or alteration by the purchaser or
other party, (B) excessive voltage or current supplied to or drawn from the interface connections, (C) static electricity or electro-
static discharge, (D) operation under conditions beyond the specified operating parameters, or (E) repair or service of the prod-
uct by anyone other than HII or its authorized representatives.
This warranty shall extend from the time of shipment for the duration published by HII for the product at the time of purchase
(“Warranty Period”). Any defective product must be returned (at purchaser’s expense) during the Warranty Period to HII factory
or authorized service center for inspection. No product will be accepted by HII without a Return Materials Authorization, which
may be obtained by contacting HII. In the event that the product is returned to HII or its authorized service center within the
Warranty Period and HII determines to its satisfaction that the product is defective due to defects in materials or workmanship,
HII, at its sole option, will either repair or replace the product without charge, except for return shipping to HII.
EXCEPT AS MAY BE OTHERWISE PROVIDED BY APPLICABLE LAW, THE FOREGOING WARRANTY IS IN LIEU OF ALL
OTHER COVENANTS OR WARRANTIES, EITHER EXPRESSED OR IMPLIED, ORAL OR WRITTEN, INCLUDING, WITHOUT
LIMITATION, ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE, OR
NON-INFRINGEMENT.
HII’S RESPONSIBILITY AND PURCHASER’S EXCLUSIVE REMEDY UNDER THIS WARRANTY IS LIMITED TO THE
REPAIR OR REPLACEMENT OF THE DEFECTIVE PRODUCT WITH NEW OR REFURBISHED PARTS. IN NO EVENT
SHALL HII BE LIABLE FOR INDIRECT, INCIDENTAL, OR CONSEQUENTIAL DAMAGES, AND, IN NO EVENT, SHALL ANY
LIABILITY OF HII ARISING IN CONNECTION WITH ANY PRODUCT SOLD HEREUNDER (WHETHER SUCH LIABILITY
ARISES FROM A CLAIM BASED ON CONTRACT, WARRANTY, TORT, OR OTHERWISE) EXCEED THE ACTUAL AMOUNT
PAID TO HII FOR THE PRODUCT. THESE LIMITATIONS ON LIABILITY SHALL REMAIN IN FULL FORCE AND EFFECT
EVEN WHEN HII MAY HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH INJURIES, LOSSES, OR DAMAGES. SOME
STATES, PROVINCES, OR COUNTRIES DO NOT ALLOW THE EXCLUSION OR LIMITATIONS OF INCIDENTAL OR CONSE-
QUENTIAL DAMAGES, SO THE ABOVE LIMITATION OR EXCLUSION MAY NOT APPLY TO YOU.
10 - 1
All provisions of this Limited Warranty are separate and severable, which means that if any provision is held invalid and unen-
forceable, such determination shall not affect the validity of enforceability of the other provisions hereof. Use of any peripherals
not provided by the manufacturer may result in damage not covered by this warranty. This includes but is not limited to: cables,
power supplies, cradles, and docking stations. HII extends these warranties only to the first end-users of the products. These
warranties are non-transferable.
The duration of the limited warranty for the Thor VM3 is 1 year.
The duration of the limited warranty for the Thor VM3 Quick Mount Smart Dock is 1 year.
The duration of the limited warranty for the Thor VM3 Vehicle Mount Assembly is 1 year.
The duration of the limited warranty for the Thor VM3 internal UPS battery is 1 year.
The duration of the limited warranty for the Thor VM3 AC power supply and cables is 1 year.
The duration of the limited warranty for the Thor VM3 DC/DC power supply is 1 year.
The duration of the limited warranty for the Thor VM3 cables (USB, Serial, Communication, Power) is 1 year.
The duration of the limited warranty for the Thor VM3 headset is 1 year.
10 - 2
Back Cvr - 1
Honeywell International Inc.
9680 Old Bailes Road
Fort Mill, SC 29707
www.honeywellaidc.com
VM3-WEC-UG Rev C
10/16