Honeywell Thor VM3 Manual

Honeywell Thor VM3 Manual

Vehicle-mount computer
Hide thumbs Also See for Thor VM3:
Table of Contents

Advertisement

Quick Links

Thor™ VM3 Vehicle-Mount Computer
®
®
with Microsoft
Windows
10 IoT Enterprise
User's Guide

Advertisement

Table of Contents
loading

Summary of Contents for Honeywell Thor VM3

  • Page 1 Thor™ VM3 Vehicle-Mount Computer ® ® with Microsoft Windows 10 IoT Enterprise User’s Guide...
  • Page 2 Disclaimer Honeywell International Inc. (“HII”) reserves the right to make changes in specifications and other information contained in this document without prior notice, and the reader should in all cases consult HII to determine whether any such changes have been made.
  • Page 3: Table Of Contents

    Rebooting the Thor VM3 ....................2-10 Tapping the Touch Screen with a Stylus ................2-10 Setup Terminal Emulation Parameters ................2-10 Cleaning ..........................2-10 Cleaning the Thor VM3 and the Dock ................2-10 Cleaning the Touch Screen..................2-11 Startup Help ........................2-11 Chapter 3 - Hardware Overview...
  • Page 4 Prepare for Vehicle Mounting ....................4-1 Quick Start ........................4-1 Maintenance - Vehicle Mounted Devices ................4-2 Cleaning ..........................4-2 Place Thor VM3 in the Dock....................4-2 Dock I/O Pin Cover......................4-3 Padlock .......................... 4-3 Laptop Security Cable ....................4-3...
  • Page 5 Install RAM Mount ....................... 4-4 Components - RAM Mounting Kits ................4-4 Procedure - RAM Mount Assembly ................4-7 Install U Bracket Mount ..................... 4-13 Components - U Bracket Mounting Assembly ............. 4-13 Procedure - U Bracket Assembly................. 4-13 Connect Cables ......................... 4-16 Strain Relief Cable Clamps..................
  • Page 6 Boot Order ........................5-43 Exiting BIOS Setup ...................... 5-43 Using PXE Boot to Load an Operating System ............5-44 Thor VM3 Recovery DVD ....................5-45 Thor VM3 Drivers DVD...................... 5-45 Configuration Cloning Utility (CCU) ................... 5-46 Launching Configuration Cloning Utility GUI ............... 5-47 Using Configuration Cloning Utility GUI...............
  • Page 7 Dimensions.......................... 8-3 Thor VM3 ........................8-3 Standard Dock ....................... 8-3 Enhanced Dock ......................8-3 Environmental Specifications ....................8-4 Thor VM3 and Dock....................... 8-4 Network Card Specifications ....................8-4 Bluetooth........................8-4 WWAN ........................... 8-4 Port and Connector Pinouts ....................8-5 Power Supply Connector ....................8-5 COM1 and COM2 Connector ..................
  • Page 9: Chapter 1 - Thor Vm3 Agency Information

    • Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. Consult the dealer or an experienced radio/TV technician for help. Caution - Changes or modifications made to this equipment not expressly approved by Honeywell may void the FCC authoriza- tion to operate this equipment.
  • Page 10: Anatel (Brazil)

    Li-Ion Battery When disposing of the Thor VM3 UPS battery, the following precautions should be observed: The battery should be disposed of properly. The battery should not be disassembled or crushed. The battery should not be heated above 212°F (100°C) or inciner- ated.
  • Page 11: Rf Safety Notice

    Safety requirements restrict the temperature at which the Li-Ion UPS battery can be charged. Charging is disabled if the ambi- ent temperature is outside of the -20ºC to 50ºC safe charging range. In order to maintain UPS charge the Thor VM3 should have power applied while the unit is within the safe charging range for at least an hour each day.
  • Page 12: Dealer License - Republic Of Singapore

    Dealer License - Republic of Singapore Republic of Singapore - Dealer License Number DA104328 complies with IDA Standards. Complies with IDA Standards DA104328 WWAN is not available in Singapore. 1 - 4...
  • Page 13: Chapter 2 - Getting Started

    The Thor VM3 contains a UPS battery which, when fully charged, can power the Thor VM3 for a minimum of 30 minutes. This can be when the Thor VM3 is not attached to a dock or when the Thor VM3 is attached to a dock but the vehicle power is inter- rupted, such as when the vehicle battery is being changed.
  • Page 14: Out Of The Box

    (page 10-1). Initial Setup for Thor VM3 This page lists a quick outline of the steps you might take when setting up a new Thor VM3. More instruction for each step is listed later in this guide. Contact Technical Assistance (page 10-1) if you need additional help.
  • Page 15: Dock

    Thor VM3 for a minimum of 30 minutes when the unit is not mounted in the dock. All docks provide: • A mount for the Thor VM3 computer. The dock attaches to a vehicle via a RAM or U-bracket mount or to a RAM table stand for use in an office environment.
  • Page 16 There are three type of docks available for the Thor VM3. Features of the docks are described below: VMXD Enhanced Dock VM1D Standard Dock VM3D Enhanced Dock (for Thor VM3 replacing Thor VX8 and Thor VX9 SKUs VM1001VMCRADLE (with RAM...
  • Page 17: Additional Connectors

    • 802.11 antenna connectors, used when the Thor VM3 is not equipped with internal antennas. • External GPS antenna connector, when the Thor VM3 is equipped with GPS. • External WWAN antenna connectors, when the Thor VM3 is equipped with WWAN. Optional WWAN radio (available in North America, Europe, New Zealand, and Australia only).
  • Page 18: Back View - Thor Vm3

    Back View - Thor VM3 External Antenna Connectors WWAN WWAN Antenna Antenna Cable Cable Access Access Panel Panel Card mSATA Access Panel Dock Contact Pads Provision for Laptop Security Cable Provision for Padlock Quick Release Handle Access Panels - Thor VM3...
  • Page 19: Front View - Dock

    Front View - Dock Standard Dock Dock Contact Pads Enhanced Dock The Enhanced Dock has a foam surround around the dock contact pad. Dock Contact Pads Foam Surround Back View - Dock The connectors on the back of the dock vary by dock model. Standard Dock Ball Strain Relief...
  • Page 20: Top View - Enhanced Dock

    Enhanced Dock Strain Relief Clamps Ball Accessory Accessory Mount Mount CANbus / Audio Fuse COM2 Power Switch COM1 Power Connector USB1 Note: For the VX4D Enhanced DOCK: COM1 is used for screen blanking (via the power cable connector) and is unavailable when the screen blanking box is attached.
  • Page 21: Backlights And Indicators

    Refer to the Screen Control (page 5-37) panel for the current display brightness level. Screen Blanking The Thor VM3 can be configured to blank (blackout) the display while the vehicle is in motion. Refer to ZoomZone (page 5-63) for information.
  • Page 22: Power Up

    Power Up If a USB drive, such as a thumb drive is attached to the Thor VM3, the device may attempt to boot from the USB drive. Remove the USB drive and power up the Thor VM3 again. The dock has a power switch on the back.
  • Page 23: Rebooting The Thor Vm3

    A stylus replacement kit is available. Note: The stylus is different for a Thor VM3 with a PCAP touch screen and one with a resistive touch screen. Be sure the stylus is the correct type for the touch screen installed in the device.
  • Page 24: Setup Terminal Emulation Parameters

    Cleaning Cleaning the Thor VM3 and the Dock Dampen a cloth with the cleaner and then wipe the surface. Do not spray the cleaner directly onto the Thor VM3 or the dock. Avoid harsh chemicals,. The following cleaners are recommended: ®...
  • Page 25: Chapter 3 - Hardware Overview

    When a headset is plugged into the adapter cable, the main speakers are disabled. A microphone is located at the upper right of the Thor VM3 display, near the Thor VM3 emblem. When a headset is plugged into the adapter cable, the internal microphone is disabled.
  • Page 26: Bluetooth

    If DC power is not available – for example, in an office environment – an optional external Universal Input Power Supply can be used to convert AC wall power to an appropriate DC level. AC to DC power input for the Thor VM3 is delivered to the dock via an optional external power supply and adapter cable.
  • Page 27: Backup Battery

    When the Thor VM3 is attached to either vehicle power or an external power supply or is operating from the UPS bat- tery and the power button is pressed, the Thor VM3 is in the On mode. In this mode, the keypad, touch screen and any attached peripherals such as a scanner function normally.
  • Page 28: Power Controls

    Power the Thor VM3 off before attaching a cable to any port (serial, USB, Audio/CAN, etc.). The external I/O connectors for the Thor VM3 are located on the right side of the Smart Dock (when viewed from the back). Power Supply Connector (page 3-7) is on the left side of the dock (when viewed from the back).
  • Page 29: Serial Connector (Com1 And Com2)

    Standard Dock Enhanced Dock Screen Blanking The screen blanking signal can be provided either by a Honeywell Screen Blanking Box or a user supplied switch or relay. See Screen Blanking (page 4-32) for information on connecting screen blanking accessories.
  • Page 30: Usb Connector(S)

    COM2 located on the back of the Smart Dock. See USB2 Connector (page 9-8) for connector pinout detail. Power the Thor VM3 off before attaching a cable to any port (serial, USB, Audio/CAN, etc.). CANBUS/AUDIO Standard Dock Enhanced Dock An additional USB host port is located on the top of the Enhanced Dock. Lift the cover to access the USB port.
  • Page 31: Canbus / Audio Connector

    2. WAN (MAIN) (Blue label) Main WWAN Antenna Connector 3. GPS (Green label) GPS The Thor VM3 is equipped with an 802.11 radio and can be ordered with internal Antenna Connector antennas, external antennas or external remote mount antennas. When the Thor VM3 is ordered with internal antennas, the external antenna connectors are not used.
  • Page 32 Remove the rubber cap, if present, from the antenna connector before connecting an external antenna. Internal 802.11 Antenna If the internal 802.11 antenna option is ordered, antennas are mounted inside the Thor VM3. The internal antennas are not user accessible. Vehicle Remote Antenna The external antennas can be remotely mounted on the vehicle.
  • Page 33: Keyboard Options

    (page 3-16) for details. USB Keyboards Two Honeywell ruggedized USB keyboards are available, 95-key alphanumeric and 21-key numeric. 95-Key USB Keyboard The 95-key USB keyboard may have any of the following markings on the decal on the back of the keyboard: •...
  • Page 34 21-key Numeric Keypad A numeric keypad is available for the Thor VM3 in applications where a full keyboard may not be needed. The USB keyboard connects directly to the D9 USB connector (Standard Dock) or USB1 connector (Enhanced Dock).
  • Page 35 Off. Since the keyboard is a USB device, by default the external keyboard backlight is turned off when the Thor VM3 enters Suspend. This behavior can be changed by enabling USB power in Suspend on the Misc tab of the Options (page 5-43) control panel.
  • Page 36: Ps/2 Keyboards

    PS/2 Keyboards Legacy PS/2 keyboards can be used with the Thor VM3 via a USB to PS/2 adapter cable. PS/2 keyboards are available in 60-key and 95-key versions and were used with the VX6, VX7, Thor VX8 or Thor VX9.
  • Page 37: Keyboard Leds

    F4 and F5 keys are not used as the display brightness is adjusted via the buttons on the Thor VM3. • The 2 functions of the F6 and F7 keys are not used as the Thor VM3 has TFT LCD screen with no provision for contrast adjustments. • The 2 functions of the F8 and F9 keys are not used as the sound volume on the Thor VM3 is controlled with the Sound icon in the Microsoft Windows System Tray.
  • Page 38: Usb Keyboard / Mouse

    A standard USB keyboard or mouse can be attached to the Thor VM3 using the appropriate adapter cable. The Y cable attaches to the Thor VM3 and provides a USB connector. Please refer to documentation provided with the USB keyboard or mouse for more information on their operation.
  • Page 39 SYS (System Status) LED LED Behavior System State Solid Green • On • On but Backlight Off • On but Display Off • Off External power present • Suspend External power not present • Hibernate • Standby/Sleep • Off UPS Status LED The color of the UPS LED identifies the charge level, while the behavior of the LED identifies the charging state.
  • Page 40: Connection Leds

    Connection LEDs WWAN LED Wi-Fi LED Bluetooth LED WWAN LED LED Behavior Status Solid Green Indicates a WWAN connection to a network Indicates no WWAN connection Wi-Fi LED LED Behavior Status Solid Green Indicates a connection with an IP address to an Access Point Indicates no connection to an Access Point Bluetooth LED LED Behavior...
  • Page 41: Keyboard Leds

    The Thor VM3 has two touch screen options: • The standard touch screen is a Resistive Panel with a scratch resistant finish that uses a standard plastic stylus.
  • Page 42: Touch Screen Defroster

    (page 10-1) for availability. Note: If the touch screen is disabled or looses calibration on a Thor VM3, you must use a USB mouse or keyboard attached to the Thor VM3 to access the control panel to re-enable or recalibrate the touch screen unless a programmable key has been assigned to that function.
  • Page 43 3 - 19...
  • Page 44 3 - 20...
  • Page 45: Chapter 4 - Vehicle Mounting And Accessory Installation

    Introduction The Thor VM3 is designed to be mounted to a Smart Dock in a vehicle with either a RAM mount or U Bracket system. A power cable is provided with the Thor VM3 dock. An optional 21 key numeric or 95 key laptop-style USB keyboard and keyboard mounts are available.
  • Page 46: Maintenance - Vehicle Mounted Devices

    1. Locate the notch on the upper rear of the Thor VM3. 2. Slide this notch over the top lip of the dock. Slide the Thor VM3 from side to side on the dock to make sure it fully engages on the lip of the dock.
  • Page 47: Dock I/O Pin Cover

    • When the Thor VM3 is not installed in the dock, use the I/O Pin Cover to protect the pins on the dock as shown. • When a Thor VM3 is installed in the dock, the I/O Pin Cover can be placed out of the way behind the dock.
  • Page 48: Install Ram Mount

    In addition to the kits below, individual RAM mounting components are also available. Mounting Kits without Keyboards Each mounting kit contains: RAM Ball (Size D) for back of Thor VM3 Smart Dock with hardware (screws and washers) to attach RAM ball to dock RAM Arm (Size D), length varies by kit selected One of three mounting options: •...
  • Page 49 Ball to Plate Mounting Kits with Integrated Keyboard Mounting Additionally, the kits for the Thor VM3 with an integrated 95 key keyboard mount include: Thor VM3 Keyboard Mounting Bracket RAM Ball (Size C) with hardware (nuts) to attach RAM ball to Keyboard...
  • Page 50 RAM Ball (Size C) to attach RAM ball to 21key numeric keyboard or scan- ner holder. RAM Arm (Size C) 4 - 6...
  • Page 51: Procedure - Ram Mount Assembly

    Equipment Needed: Sockets, screwdriver and a Torque wrench capable of measuring to 50 inch pounds (5.64±.56 N/m). Note: Torquing tool is not supplied by Honeywell. Tools needed to attach the RAM Clamp Mount to the vehicle are not supplied by Honeywell.
  • Page 52 2.5” (63.5 mm) wide and approximately 2” (50.8 mm) thick. The clamp may be attached to a thicker beam by substituting longer bolts (not included). Be sure to position the RAM clamp mount to allow access to the switches and ports on the bottom of the Thor VM3. Bolts...
  • Page 53 1. Determine the position for mounting the RAM ball plate. Be sure to position the RAM plate to allow access to the switches and ports on the bottom of the Thor VM3. 2. Attach the RAM ball plate to the vehicle mounting surface using four 1/4 bolts (not included) or equivalent fasten- ers.
  • Page 54 3. If using the external keyboard mount, position the Keyboard Bracket and the Size D RAM ball on the rear of the Thor VM3 dock, aligning the holes on the back of the Thor VM3 dock with the holes on the bracket and the RAM ball base.
  • Page 55 Note: This step is only for a Thor VM3 with the optional external keyboard. 1. Slip the Size C RAM arm over the ball on the Thor VM3 Keyboard Bracket. 2. Slip the ball on the Keyboard Mounting Plate into the other end of the Size C RAM arm.
  • Page 56 Step 8 - Attach Scanner Holder (Optional) This step is only for use with the Enhanced Dock. 1. Attach the accessory RAM ball to the Enhanced Dock. There are two mounting provisions, one on either side of the Enhanced dock and either can be used to mount the scanner holder. Note: Some components eliminated for detail clarity.
  • Page 57: Install U Bracket Mount

    The U bracket kit is available in two configurations: • With a U Bracket included for new vehicle installations • Without a U Bracket for installing the Thor VM3 in place of a previous Honeywell vehicle mounted computer, such as a VX6 or VX7.
  • Page 58 Note: 1/4 bolts and washers not included. It is recommended to use lock washers and flat washers on the fasteners. IMPORTANT: Mount to the most rigid surface available. After the bottom bracket has been attached to a rigid surface, you are ready to assemble the Thor VM3 bracket config- uration.
  • Page 59 9. 1.25 in / 31.75 mm Step 2 - Remove RAM Ball If the Thor VM3 Smart Dock has a RAM ball attached, the RAM ball must be removed from the dock to use the U Bracket mount. Remove the RAM ball. The hardware used to attach the RAM ball to the dock is not reused for the U bracket mount.
  • Page 60: Connect Cables

    For the Enhanced Dock there is a single cable clamp. Use this clamp for the power cable, Use the brackets for all other cables. 2. Remove the strain relief clamp from the Thor VM3 by turning the screw counterclockwise. Put the screw aside in a safe location.
  • Page 61: Connect Power

    (page 4-32) - Optional connection to blank the Thor VM3 display while the vehicle is in motion. • External AC/DC Power Supply (page 4-38) - For use when DC power is not available to power the Thor VM3, such as in an office environment. For the VMX3D Enhanced Dock, power options include: •...
  • Page 62 The Green ground input is used for electrostatic discharge (ESD) protection. Vehicle 10-60VDC Direct Power Connection 1. The Thor VM3 must not be mounted in the Smart Dock. The power switch on the dock must be turned Off. The power cable must be UNPLUGGED from the dock.
  • Page 63 7. Connect the watertight connector end of the power cable to the Thor VM3 Smart Dock power connector by aligning the connector pins to the power connector; push down on the watertight connector and twist it to fas- ten securely.
  • Page 64 Ignition Control Wiring Diagram Existing Circuitry On Vehicle Quick Mount Smart Dock Battery Main Switch Ignition Cable for optional COM1 or COM2 screen blanking Connector connection Fuse - See Warning statement below Red/White (if present) Black/White (if present) Circular Power Black Connector Green...
  • Page 65 Auto-On Control Wiring Diagram Existing Circuitry On Vehicle Quick Mount Smart Dock Battery Main Switch Cable for optional COM1 or COM2 screen blanking Connector connection Fuse - See Warning statement below Red/White (if present) Black/White (if present) Circular Power Black Connector Green Blue...
  • Page 66 Manual Control Wiring Diagram Existing Circuitry On Vehicle Quick Mount Smart Dock Battery Main Switch Cable for optional COM1 or COM2 screen blanking Connector connection Fuse - See Warning statement below Red/White (if present) Black/White (if present) Circular Power Black Connector Green Blue...
  • Page 67 60-144 VDC Vehicles (50-150 VDC Power Supply, Screws on Side of Lid) This option requires DC/DC external power supply Honeywell Part no. 9000313PWRSPLY. Shown With Lid Attached Shown With Lid Removed • Lid is secured with screws on the side of lid.
  • Page 68 Wiring Diagram (page 4-25), before beginning power cable install. 2. The Thor VM3 must not be mounted in the Smart Dock. The power switch on the dock must be turned Off. The power cable must be UNPLUGGED from the dock.
  • Page 69 (page 3-4) on the back of the Thor VM3 dock. 22. Press the Power Button (page 3-4) on the front of the Thor VM3 to turn on the Thor VM3. Note: Ignition control is not available for trucks over 60VDC. Wiring Diagram...
  • Page 70 (page 4-28) for additional wire color-coding specifics. The Thor VM3 DC input wires (Red, Red/White DC+ and Black, Black/White DC-) and the Blue ignition input wire are galvanically isolated. The Green ground input is used for electrostatic discharge (ESD) protection.
  • Page 71 Wiring Diagram (page 4-25), before beginning power cable install. 2. The Thor VM3 must not be mounted in the Smart Dock. The power switch on the dock must be turned Off. The power cable must be UNPLUGGED from the dock.
  • Page 72 (page 3-4) on the back of the Thor VM3 dock. 21. Press the Power Button (page 3-4) on the front of the Thor VM3 to turn on the Thor VM3. Note: Ignition control is not available for trucks over 60VDC. Wiring Diagram...
  • Page 73 VX6 / VX7 Adapter Cable An adapter cable is available to attach the Thor VM3 to a vehicle previously equipped with a VX6/VX7 DC power cable. The adapter cable has a 5-pin connector to match with the VX6/VX7 power supply cable on one end and a 6-pin con- nector to match to the Thor VM3 on the other end.
  • Page 74 Thor VM3 on the other end. The cable also has bare wires for ground and ignition sense connection plus a D9 cable to connect to a COM port on the Thor VM3 dock to provide a screen blanking signal. This section assumes the VX8/VX9 power cable is properly connected to vehicle power.
  • Page 75 CV61 Adapter Cable An adapter cable is available to attach the Thor VM3 to a vehicle previously equipped with a CV61 DC power cable. The adapter cable has a 5-pin connector to match with the VV61 power supply cable on one end and a 6-pin connector to match to the Thor VM3 on the other end.
  • Page 76 1. Connect the gray wire of the cable to the switched side of the Screen Blanking Box. 2. Connect the black wire of the cable to the unswitched side of the Screen Blanking Box. 3. Connect the D9 serial connector to either COM1 or COM2 serial port on the Thor VM3 Smart Dock. 4 - 32...
  • Page 77 2. Connect the wire from Pin 7 of the cable to the unswitched side of the Screen Blanking Box or to a user- supplied switch. 3. Connect the D9 serial connector to either COM1 or COM2 serial port on the Thor VM3 Smart Dock. Screen Blanking Box...
  • Page 78: Screen Blanking With Switch

    To pin 7 of COM1 or COM2 To pin 8 of COM1 or COM2 Note: The black and gray wire colors in the illustration only apply to the optional Honeywell Screen Blanking Box Cable, VM1080CABLE. The wire colors may be different in a user-supplied cable.
  • Page 79 This dock eliminates the need for wiring changes by enabling the existing VX8/VX9 power cable and screen blanking box to be used when the VX8/VX9 is replaced by a Thor VM3 computer. These instructions are for this dock model only! The Ignition Control feature is not available when this dock is used.
  • Page 80 DC/DC Power Supply with Screws on Top of Lid Inspect the cable shield to verify it is connected to chassis ground. If there is no connection from the cable shield to chassis ground, one must be added at this time. Use a jumper wire to connect the cable shield to chassis ground as shown below for the appropriate type of power supply installed on the vehicle.
  • Page 81 DC/DC Power Supply with Screws on Side of Lid Inspect the cable shield to verify it is connected to chassis ground. If there is no connection from the cable shield to chassis ground, one must be added at this time. Use a jumper wire to connect the cable shield to chassis ground as shown below for the appropriate type of power supply installed on the vehicle.
  • Page 82 3. Connect the DC Output Cable end to the corresponding connector on the Adapter Cable. 4. Connect the watertight connector end of the Adapter Cable to the Thor VM3 Smart Dock Power Connector by aligning the connector pins to the power connector; push down on the watertight connector and twist it to fas- ten securely.
  • Page 83: Connect Usb Keyboard

    A legacy PS/2 keyboard (used with VX6, VX7, Thor VX8 or Thor VX9), available in either 60-key or 95-key versions can be used with the Thor VM3 via a PS/2 to USB adapter cable. This function is only supported with the VM3D or VMXD Enhanced Docks.
  • Page 84 1. Seat the male connector of the cable over the USB connector on the Thor VM3 Smart Dock. 2. Tighten the thumbscrews in a clockwise direction. Do not over tighten. 3. Seat the keyboard connector over the female connector of the cable.
  • Page 85: Connect Usb Host

    USB and USB1 Connector (page 9-7) for connector pinouts. Note: The USB client connection is not available on the Thor VM3. 1. Seat the D9 connector firmly over the USB (Standard Dock) or USB1 (Enhanced Dock) connector on the dock.
  • Page 86: Connect Serial Device

    4. Configure the Data Collection (DC) Wedge to manipulate scanned data as desired. Connect Headset Cable The CANbus/Audio connector supports a headset adapter cable or a CANbus cable. The Thor VM3 does not support con- necting audio and CANbus simultaneously.
  • Page 87 3. Slide the cable ends together until they click shut. Do not twist or bend the connectors. The Thor VM3 internal microphone and speakers are automatically disabled when the headset is connected. Adjust Headset / Microphone and Secure Cable The headset consists of an earpiece, a microphone, a clothing clip and a cable.
  • Page 88: Connect Canbus Cable

    Connect CANbus Cable The CANbus/Audio connector supports a headset adapter cable or a CANbus Y cable. The Thor VM3 does not support connecting audio and CANbus simultaneously. CANbus / Audio Connector (page 9-11) for connector pinouts. 1. Seat the D15 cable end connector firmly over the CANbus/Audio Connector on the Smart Dock.
  • Page 89: Install Remote Antenna

    (base plate and right angle), cable, and antenna. Tools are not included. The desired remote antenna bracket is mounted on the top of a forklift, truck or other vehicle and cabled to the Thor VM3 inside the vehicle. The Vehicle Remote Mount Antenna cannot be used by devices with an internal antenna.
  • Page 90 6. Connect the cable to the antenna connector (Wi-Fi Main or Wi-Fi Aux) on the Thor VM3. If only one antenna is used, be sure to connect it to the Wi-Fi Main connector.
  • Page 91 The Remote Antenna Installation Kit consists of the WAN antenna and an extension cable. The remote antenna is mounted on the top of a forklift, truck or other vehicle and cabled to the Thor VM3 inside the vehicle. 1. Locate a mounting position on highest point on the vehicle, following these precautions: •...
  • Page 92: Apply Touch Screen Protective Film

    Apply Touch Screen Protective Film The optional Thor VM3 touch screen protective film is shipped in packs of 10. The protective film is flexible and treated with an anti-glare coating on the outer surface. The protective film is slightly larger than the Thor VM3 touch screen, however the notches on the edge of the protective film (indicated by the arrows) correspond to the display size of the Thor VM3.
  • Page 93: Disconnect Ups Battery

    Disconnect UPS Battery CAUTION - The UPS battery must be disconnected before you ship the Thor VM3 or Replace Front Panel (page 4-53). Equipment Required The following equipment is user-supplied: • Torquing tool capable of measuring inch pounds • #2 Phillips screwdriver bit Disconnect Procedure 1.
  • Page 94: Install Msata Drive

    2. Remove the Thor VM3 from the dock. Disconnect UPS Battery (page 4-49). 4. Place the Thor VM3 face down on a stable surface. 5. Use a #2 Phillips bit to loosen the captive M3 screws on the access panel with the mSATA and SIM labels.
  • Page 95: Install Sim Card(S)

    See WWAN Connection Manager (page 6-36) for software configuration. Note: The SIM card is not hot-swappable. After installing or removing a SIM card, the Thor VM3 must be rebooted for the change to take effect. Equipment Required The following equipment is user-supplied: •...
  • Page 96 10. Lower the SIM holder to back to its flat position. 11. Slide the silver retainer clip back toward the outside edge of the Thor VM3. This locks the SIM card in place. 12. Reattach the access panel, torquing the screws to 7.0 ± 0.5 inch pounds.
  • Page 97: Replace Front Panel

    Front Panel Options The front panel of the Thor VM3 is field replaceable. The front panel assembly contains the keypad, touch screen and optional defroster. Should any of these components fail, the front panel assembly can easily be replaced to reduce down- time.
  • Page 98 10. When the Thor VM3 is placed in the powered dock, the UPS battery automatically reconnects. 11. Restart the Thor VM3. 12. If adding or removing a defroster, update the Thor VM3 configuration by selecting Start > Settings > Control Panel > Peripherals and tap the Test button.
  • Page 99: Chapter 5 - Software

    After the system files are processed, Microsoft Windows begins to load. Windows maintains a System Registry and INI files. Standard Windows configuration options apply to the Thor VM3. Configuration options are located in the System Tray or the Control Panel: •...
  • Page 100 Change settings for all users is tapped before changing the privilege level. Enterprise Client Pack There are several components of the Enterprise Client Pack installed on the Thor VM3. For more information on these programs visit the Thor VM3 product page at www.honeywellaidc.com. Enterprise TE (Start) >...
  • Page 101: Control Panel

    The Versions tab displays the versions of many of the software programs installed. Not all installed software is included in this list and the list varies depending on the applications loaded on the Thor VM3. The Image line displays the revision of the system software installed. Refer to the last three digits to determine the revision level.
  • Page 102: Bluetooth Printing

    (page 5-10) Note: You can also print wirelessly using Microsoft APIs with Bluetooth extensions for Winsock and Bluetooth. For help, see the Bluetooth Resource Kit documentation. The Bluetooth Printing wizard supports the following Honeywell printers: • PR2 • PR3 • PB31 •...
  • Page 103 Note: Due to operating system limitations, other Bluetooth devices may not be filtered out from the printer listing. 5. If this is the first time a printer is connected, it may take 40-45 seconds for the driver to install. 6. If no error message is displayed, the printer is ready. If an error message such as the one below is displayed, the timeout may have happened before the driver installation has completed.
  • Page 104: Bluetooth Scanning

    • Honeywell Granit 1981i Bluetooth scanner • LXE 88x0 family of Bluetooth scanners Use the bar code Quick Connect bar code on either side of the Thor VM3 to connect the following scanners: • Intermec SF51 Bluetooth scanner • Intermec SF61 Bluetooth scanner •...
  • Page 105 Scan the displayed bar code to connect one of Scan the displayed bar code to connect one of these scanners: these scanners: • Honeywell/LXE 8650 family of Bluetooth ring • Intermec SF51 Bluetooth scanner scanners • Intermec SF61 Bluetooth scanner •...
  • Page 106 If Quick Connect does not work, use the other options to connect these scanners. • If the Honeywell Granit 1911i and Granit 1981i scanners cannot be found with the Search option, scan the PDAs/ Mobility Systems Devices bar code from the scanner manual and search again.
  • Page 107: Display

    Display (Start) > All Apps > Windows System > Control Panel > Display (Large or Small Icon View) The Thor VM3 supports a maximum 1024 x 768 pixel display resolution. Screen Blanking via ZoomZone (page 5-40), Defroster Control (page 5-38) and...
  • Page 108: Enterprise Settings

    Enterprise Settings (Start) > All Apps > Windows System > Control Panel > Enterprise Settings (Large or Small Icon View) Use Enterprise Settings to configure parameters for Enterprise applications on the computer. You can configure parame- ters for important functions like data collection and communications. External bar code scanners are supported by connecting the scanner to a COM port, USB port, or by Bluetooth.
  • Page 109 Tethered Scanner (COM1) • Enable scanner port (On by default, see note below) • Symbologies • Symbology Options • Scanner Settings • Scanner port Settings • Decode Security Tethered Scanner (COM2) • Enable scanner port (On by default, see note below) •...
  • Page 110 Auto Start Auto Start Options • None (default) • Launcher • Enterprise Browser • Enterprise Terminal Emulation Enterprise Terminal Emulation Enterprise Terminal Emulation Configuration Options Printers Parameters Printer Options If connected through Bluetooth Printing, configuration options such as Auto detect printer, memory, display, etc. are available. Common Lockdown Service Parameters CLDS Server...
  • Page 111 USB Scanners By default, when a HID enabled USB scanner is connected to the Thor VM3, the scanned data is transmitted to the active windows as keystroke messages. Any data handling to be applied to the scanned data, for example to strip leading or trailing characters, must be programmed into the scan engine.
  • Page 112: External Keypad

    (Start) > All Apps > Windows System > Control Panel > External Keypad (Large or Small Icon View) This function remaps the programmable keys (PF and Yellow + PF) in the external (21-key numeric) USB keyboard. To remap the P1-P7 keys integrated into the front panel of the Thor VM3, see Programmable Key (page 5-29).
  • Page 113 Remap a Key to a Key Sequence Up to 16 keys may be specified for the key sequence. The sequence can consist of keys and Unicode values. 1. Select the modifier key from the Modifier Mode options. 2. The key to be remapped is the programmable function (PF) key on the numeric keyboard. 3.
  • Page 114 Remap a Key to Run a Command 1. Select the modifier key from the Modifier Mode options. 2. The key to be remapped is the programmable function (PF) key on the numeric keyboard. 3. Select RunCmd 1-2 from the remapped key from the Remapped Key pull-down list. 4.
  • Page 115: Options

    USB Powered in Sleep By default, power is removed from attached USB devices when the Thor VM3 is in Standby or Sleep mode. Check this box to maintain power to attached USB devices in Standby. or Sleep...
  • Page 116: Power Options

    • Plugged in for when external power is present (such as vehicle power or from an AC power adapter) • Running on batteries for when external power is not present and the Thor VM3 is operating on UPS power. Select a Power Plan The Thor VM3 has four power management as described in the following sections.
  • Page 117 The Thor VM3 is On (but powered by the UPS battery) and gets external power, such as: • Thor VM3 is installed on a powered dock with the dock power switch On • Thor VM3 is already mounted to a dock with the dock power switch On and truck power is applied to the dock •...
  • Page 118 Select either the Ignition Control/Ignition On or the Ignition Control/Ignition Off power scheme/plan when ignition control of the Thor VM3 power on process is desired. The Thor VM3 aromatically switches between the Ignition Control/Ignition On or the Ignition Control/Ignition Off power schemes/plans depending on the state of the vehicle ignition input.
  • Page 119 Ignition switched to Active. An example of this case would be a Thor VM3 that is running on UPS and is then mounted on a dock that has truck power and the ignition switch is already On.
  • Page 120 Thor VM3 power on process is desired. The Thor VM3 automatically switches between the Ignition Control/Ignition On or the Ignition Control/Ignition Off power schemes/plans depending on the state of the vehicle ignition input. Default timeouts are shorter in this scheme to conserve the vehicle battery charge.
  • Page 121 Ignition switched to Inactive. UPS charging is disabled. An example of this case would be a Thor VM3 that is running on UPS and is then mounted on a dock that has truck power and the ignition switch is already Off.
  • Page 122 Select the Auto-On power scheme/plan when it is desired that the Thor VM3 power on when external power is connected. In Auto-On mode, the Thor VM3 is turned On by the presence of external power with no user interaction required. Ignition input is ignored when Auto-On Mode is enabled.
  • Page 123 Auto-On Behavior When the Auto-On power scheme/plan is selected and external power is present the Thor VM3 behaves as described below. If external power is not present, refer to the (page 5-26) section for Thor VM3 behavior. Thor VM3 is Off...
  • Page 124 When the Thor VM3 is operating on the UPS the timeouts from the battery section for the selected power scheme/ plan are used. By default, the timeouts for UPS are the same for each power scheme/plan. UPS Behavior The Thor VM3 behavior when operating from UPS power is described below.
  • Page 125 Choose What the Power Button Does (Start) > All Apps > Windows System > Control Panel > Power Options (Large or Small Icon View) Tap Choose what the power button does. For both battery and external power, the power button press may be configured as follows: •...
  • Page 126 Configure Hibernation (Start) > All Apps > Windows System > Control Panel > Power Options (Large or Small Icon View) By default, hibernate is enabled on the Thor VM3. To change the hibernate settings: 1. Open the Power Options control panel.
  • Page 127: Programmable Key

    (Start) > All Apps > Windows System > Control Panel > Programmable Key (Large or Small Icon View) This function remaps P1-P7 keys integrated into the front panel of the Thor VM3. To remap the programmable keys (PF and Yellow + PF) in the optional external (21-key numeric) USB keyboard. see External Keypad (page 5-14).
  • Page 128 Keymap A key or combination of keys can be remapped to provide a single keypress or a string of keypresses. Assign settings by clicking radio buttons and selecting keys from the drop down boxes. Tap the OK button to save changes and exit the Programmable Keys control panel. Tap the Cancel button to discard any changes and exit the Programmable Keys control panel.
  • Page 129 4. Select the first key for the multiple key sequence from the pull-down list. 5. Press the Add button to add the key to the multiple key sequence shown in the Key Sequence box. 6. Repeat this steps 4 and 5 until all desired keys have been added to the key sequence. If necessary, use the Clear button to erase all entries in the Key Sequence box.
  • Page 130 Remap a Key to Run a Command 1. Select the modifier key from the Modifier Mode options. 2. Select the key to be remapped from the Key pull-down list. 3. Select RunCmd 1-4 from the remapped key from the Remapped Key pull-down list. 4.
  • Page 131 The default for all text boxes is Null or “ ”. The text boxes accept string values only. The executables and parameters are not checked for accuracy by the keyboard driver. If the launch fails, the Thor VM3 displays a popup error message. If the launch is successful, no notification is displayed.
  • Page 132 The default for all text boxes is Empty, Null or “ ”. The text boxes accept string values only. The executables and parameters are not checked for accuracy by the keyboard driver. If the launch fails, the Thor VM3 displays a popup error message. If the launch is successful, no notification is displayed.
  • Page 133: Region And Language

    Region and Language (Start) > Settings > Time & Language > Region & Language To add a language, there must be Internet access available to access the Windows update site. 1. Tap Add a language. 2. A list of available languages is displayed. Tap the desired language. 3.
  • Page 134 7. When the download and installation are completed, Language pack installed is displayed. 8. Tap the (back arrow symbol) at the top left of the screen. 9. Tap the new language again. 10. Tap Set as default. 11. Restart the Thor VM3. 5 - 36...
  • Page 135: Screen Control

    Note: If automatic brightness control is enabled for an outdoor display, the value for LCD brightness depends on the Ambient Light %. Note: There is no default value for Ambient Light % as it varies depending on the level of light where the Thor VM3 is located.
  • Page 136: Sounds

    • By default the side tone is muted. If needed, the user should enable the side tone. If this causes interfering noise, the side tone should be disabled. The VM3 audio is designed to be used with or without the side tone. This is acceptable permissible performance for the Thor VM3. 5 - 38...
  • Page 137: Ssd State Monitor

    The PCAP touch screen is calibrated at the factory and does not use the calibration utility. User Accounts Note: The following applies to a Thor VM3 that is not part of a domain. When the Thor VM3 is part of a domain, the user is prompted for credentials at Windows startup or log on.
  • Page 138: Vm3 Connection Manager

    Motion Detection Method Select the motion detection method. The Thor VM3 supports the screen blanking box to determine motion. Select the port (COM1 or COM2) to which the blanking box is attached. Note: By default, COM1 and COM2 ports are used by Enterprise Data Collection. To use a COM port for screen...
  • Page 139 Set Zoom Area The ZoomArea can be selected from the current active desktop display. To set the zoom area: 1. Display the desired content on the Thor VM3 desktop. 2. Open the ZoomZone interface. 3. Tap the Set Zoom Area button.
  • Page 140: Bar Code Readers

    The Thor VM3 can use the following external bar code readers: • Tethered hand-held scanners are tethered to a serial port or a USB host port (via a dongle cable) on the Thor VM3 Smart Dock and are configured by scanning the engine-specific bar codes in the scanner manufacturer's programming guide. The manufacturer's guides are usually shipped with the bar code reader.
  • Page 141: Bios

    To access and modify the BIOS on the Thor VM3, an external keyboard must be attached. When the Press F2 for System Utilities prompt is displayed at power up, press the P2 key on the Thor VM3 or the F2 key on an external keyboard to enter BIOS setup.
  • Page 142: Using Pxe Boot To Load An Operating System

    To Use UFE Mode PXE Boot: 1. Start the Thor VM3. 2. When the Press F2 for System Utilities prompt is displayed at power up, press the P2 key on the Thor VM3 or the F2 key on an external keyboard to enter BIOS setup.
  • Page 143: Thor Vm3 Recovery Dvd

    Thor VM3 Recovery DVD A recovery DVD is available to restore the operating system on your Thor VM3 to the same state it had when it was shipped from the factory. The recovery DVD may not reload all factory installed software, but the...
  • Page 144: Configuration Cloning Utility (Ccu)

    Thor VM3. All other settings on the destination Thor VM3 are left unchanged. • Import changes and defaults - All configuration settings are applied to the destination Thor VM3. If a setting was modified on the source Thor VM3 the modified value is applied to the destination Thor VM3. Otherwise the default value is applied for that setting on the destination Thor VM3.
  • Page 145: Launching Configuration Cloning Utility Gui

    • ccf files - These files contain the modified values for the software settings. These files are created with the CCU . ccf files are encrypted for security. Once a ccf file is created on one Thor VM3 it can be copied to other Thor VM3s to duplicate the configuration.
  • Page 146 • Tap No to apply the values from the ccf file and leave all other parameters as-is on the destination device. • Tap Cancel to exit with no changes to the destination device. Upon completion, exit the CCU and reboot the Thor VM3 so changes can take effect. User Selects the desired user access level: •...
  • Page 147 Thor VM3. If the parameter setting changes should also be applied to this Thor VM3, select Registry > Import Settings. After importing the settings, a reboot is necessary for the changes to take effect on the Thor VM3.
  • Page 148 4. Select File > Save then specify a file name and tap Save to save the settings to a ccf file. 5. The ccf file can be used to configure another Thor VM3. See Example 4. Example 2: Modify settings on the current device and save to a file To modify the settings on the Thor VM3 running the CCU: 1.
  • Page 149: Configuration Cloning Utility Command Line Interface

    If ran with no parameters, the GUI CCU interface is opened. Example 2: Import settings CCU.exe -import -[programs] -C:\myfile.ccf Us this command line example to import the current settings from the Thor VM3 running the CCU. Where: import directs the CCU to read the settings from the system registry.
  • Page 150 When -reset is specified, all setting are reset to their default values before the customized settings in the ccf file are applied. Any prior changes made to these settings on the Thor VM3 are lost. If -reset is not specified, only the changed values in the ccf file are applied.
  • Page 151: Chapter 6 - Wireless Network Connections

    Protocol Version 4 (TCP/IPv4) > Properties) be sure to reboot the Thor VM3 after changing the IP address type. Important Notes It is important that all dates are correct on the Thor VM3 and host computers when using any type of certificate. Cer- tificates are date sensitive and if the date is not correct authentication will fail.
  • Page 152 This screen contains several items: Tasks Tasks are listed on the left side of the screen: • Browse Nearby Wireless Networks (page 6-4) • Roam Management (page 6-25) • Admin Login (page 6-3) Status The status of the radio card is shown in the upper right hand of the screen: Radio is on.
  • Page 153 Admin is logged in logged in The appearance of the icon indicates if the admin is logged in or not. To log in: 1. Tap the Admin Login icon. 2. Enter the password. The default password is Honeywell. 6 - 3...
  • Page 154 3. Tap the Login button to log in or Cancel to exit without logging in. To change the default password: 1. Tap the Admin Login icon. 2. Tap the Reset Password button. 3. Enter the current password. 4. Enter and confirm the new password. 5.
  • Page 155: Creating A Profile

    If logged on as admin, tap on any network in the list to create a profile for that network. Creating a Profile To create from the Profile list: 1. Log in as admin. 2. Tap the New button. 3. Select the desired profile type - auto connect, manual connect or Ad Hoc. 4.
  • Page 156 • Connect automatically when this network is in range - If the profile was created as an auto connect profile, this box is checked. If created as a manual profile, this box is unchecked. • Connect to a more preferred network if available •...
  • Page 157 Security The options available on the security tab will depend on the security type and encryption type selected. Continue to the applicable section to configure the WCU for network security: • Open (No Security) (page 6-8) • (page 6-9) • WPA2-Personal (page 6-10) •...
  • Page 158 Open (No Security) To configure for open (no security): 1. Set Security Type to No authentication (Open). 2. Set Encryption type to none. 3. Tap OK. 4. From the profile listing, make sure the desired profile is active. 5. Verify the connection using Status (page 6-2).
  • Page 159 To configure for WEP: 1. Set Security Type to No authentication (Open). 2. Set Encryption type to WEP. 3. Enter the Network Security Key. 4. Select the Key Index 5. Tap OK. 6. From the profile listing, make sure the desired profile is active. 7.
  • Page 160 WPA2-Personal To configure for WPA2-Personal: 1. Set Security Type to WPA2-Personal. 2. Set Encryption type to AES. 3. Enter the Network Security Key 4. Tap OK. 5. From the profile listing, make sure the desired profile is active. 6. Verify the connection using Status (page 6-2).
  • Page 161 PEAP-TLS To configure for Microsoft PEAP-TLS: 1. Set Security Type to WPA2-Enterprise or CCKM. 2. Set Encryption type to AES. 3. Set network authentication method to Microsoft Protected EAP (PEAP). 4. Tap the Settings button. 6 - 11...
  • Page 162 5. Set the authentication method to Smart Card or other certificate. 6. Tap the Configure button. 7. Select Use a certificate on this computer. 8. Select the trusted root certificate from the listed certificates. 9. Tap OK to close any open windows. 10.
  • Page 163 LEAP To configure for Cisco LEAP: 1. Set Security Type to WPA2-Enterprise or CCKM. 2. Set Encryption type to AES. 3. Tap the Settings button. 4. Select the desired credentials method of providing credentials. Prompt automatically for username and password is recommended.
  • Page 164 EAP-FAST PEAP To configure for Cisco EAP-FAST PEAP: 1. Set Security Type to WPA2-Enterprise or CCKM. 2. Set Encryption type to AES. 3. Set network authentication method to Cisco:EAP-FAST. 4. Tap the Settings button. 6 - 14...
  • Page 165 5. Select the User Credentials tab. 6. Select the desired credentials method of providing username and password. Prompt automatically for username and password is recommended. 7. If saved username and password is selected, enter the credentials now. 8. From the profile listing, make sure the desired profile is active. 9.
  • Page 166 10. Select the desired authentication method. Any of the available options may be used. 11. The About tab provides Cisco copyright information. 12. Tap OK to close all open windows. 13. From the profile listing, make sure the desired profile is active. 14.
  • Page 167 EAP-FAST TLS To configure for Cisco EAP-FAST TLS: 1. Set Security Type to WPA2-Enterprise or CCKM. 2. Set Encryption type to AES. 3. Set network authentication method to Cisco:EAP-FAST. 4. Tap the Settings button. 6 - 17...
  • Page 168 5. Select the User Credentials tab. 6. Select use certificate on this computer. 7. No entries are needed on the Authentication tab. 8. The About tab provides Cisco copyright information. 9. Tap OK to close all open windows. 10. From the profile listing, make sure the desired profile is active. 11.
  • Page 169 EAP-TLS To configure for EAP-TLS: 1. Set Security Type to WPA2-Enterprise or CCKM. 2. Set Encryption type to AES. 3. Set network authentication method to Microsoft Smart Card or other certificate. 4. Tap the Settings button. 6 - 19...
  • Page 170 5. Select Use a certificate on this computer. 6. Select the trusted root certificate from the listed certificates. 7. Tap OK to close any open windows. 8. From the profile listing, make sure the desired profile is active. 9. Verify the connection using Status (page 6-2).
  • Page 171 EAP-TTLS To configure for EAP-TTLS: 1. Set Security Type to WPA2-Enterprise or CCKM. 2. Set Encryption type to AES. 3. Set network authentication method to IGX: EAP_TTLS. 4. Tap the Settings button. 5. Select the Connection tab. 6. Select Validate server certificate. 6 - 21...
  • Page 172 7. Select the trusted root certificate from the listed certificates. 8. Select the User Credentials tab. 9. Select the desired credentials method of providing username and password. Prompt automatically for username and password is recommended. 10. If saved username and password is selected, enter the credentials now. 11.
  • Page 173 PEAP-MSCHAPv2 To configure for PEAP-MSCAHPv2: 1. Set Security Type to WPA2-Enterprise or CCKM. 2. Set Encryption type to AES. 3. Set network authentication method to PEAP-MSCHAPv2. 4. Tap the Settings button. 6 - 23...
  • Page 174 5. Select the Connection tab. 6. Select Validate server certificate. 7. Select the trusted root certificate from the listed certificates. 8. Select the User Credentials tab. 9. Select the desired credentials method of providing username and password. Prompt automatically for username and password is recommended.
  • Page 175: Roam Management

    Roam Management General The general tab provides information on the current connection. There are no user entries on this screen. Roaming The Roaming tab is used to configure roaming behavior. Roam Signal Level (dBm) When the signal strength is below this level, the radio will attempt to roam. Default -65 dBm, range is -80 to -55.
  • Page 176 Logging Enable When checked, logging is enabled. Logging can be set to Critical (fewer messages) or All (more messages). Logging is disabled by default. Note: Logging is set to disabled after any reboot to prevent log files for taking up disk space when not needed.
  • Page 177: Advanced Settings

    Diversity Selection By default, diversity is on. Adapter The adapter tab provides information on the radio card. There are no user entries on this screen. Advanced Settings 802.1X Settings Enable single sign-on from this screen,. When enabled, the user credentials are provided to the WCU either immedi- ately before or immediately after the user logs into the computer.
  • Page 178 802.11 Settings Determines the method used for fast roaming: • Enable Standard Pairwise Master key caching - When standard Pairwise Master Key (PMK) is enabled, authentication can be skipped if the if the client has already authenticated to the access point previously. A connection to a new access point uses the 802.11x authentication process while a reconnect to the access point can skip the authentication.
  • Page 179: Certificates

    Certificates are date sensitive and if the date is not correct authentication will fail. The easiest way to get the root CA certificate is to use a browser on a PC or the Thor VM3 to navigate to the Certificate Authority.
  • Page 180 Click the Download a CA certificate, certificate chain or CRL link. Make sure the correct root CA certificate is selected in the list box. Click the DER button. To download the CA certificate, click on the Download CA certificate link. 6 - 30...
  • Page 181: Install A Root Ca Certificate

    2. In the left pane, right-click Trusted Root Certificate Authorities and select All Tasks > Import. 3. The Certificate Import Wizard starts. 4. Tap Next and use the Browse.. button to locate the Root certificate copied to the Thor VM3 then tap Open. 5. The certificate filename and path are displayed. Tap Next.
  • Page 182: Generate A User Certificate

    5. An import successful message is displayed. Generate a User Certificate The easiest way to get the user certificate is to use the browser on the Thor VM3 or a PC to navigate to the Certificate Authority. To request the user certificate, open a browser to http://<CA IP address>/certsrv.
  • Page 183 The User Certificate is issued. Install the user certificate on the requesting computer by clicking the Install this certificate link. If the requesting computer is the Thor VM3, then the process is finished. otherwise, export the certificate as described below.
  • Page 184: Install A User Certificate

    .PFX extension. Click Finish. and OK to close the Successful Export message. Locate the User Certificate in the specified location. Copy to the Thor VM3. Install the User certificate. Install a User Certificate After generating and exporting the user certificate, install the user certificate.
  • Page 185 3. The Certificate Import Wizard starts. 4. Tap Next and use the Browse.. button to locate the User certificate copied to the Thor VM3. If necessary, change the file type drop down list at the bottom of the explorer window from *.cer to *.pfx. After selecting the .PFX file, tap Open.
  • Page 186: Vm3 Wwan Connection Manager

    VM3 WWAN Connection Manager Access the VM3 Connection Manager from the Honeywell Connection Manager icon on the desktop or the icon in the system tray. Double tap the Connection Manager icon in the system tray (or right-click and select Configuration Panel). The system tray Connection Manager icon looks like this: VM3 Connection Manager icon when there is no active WWAN connection.
  • Page 187: Link Settings

    (page 6-1). The WWAN networks, if any, are shown on this page. A WWAN network is only displayed if a card has been installed for that network. The Thor VM3 supports two cards. See Install SIM Card(s) (page 4-51) for card installation instructions. A WWAN network can be enabled or disabled from this screen, however the connection is configured by tapping the applica- ble Network Settings button.
  • Page 188 Connection Type Use this tab to configure the connection parameters. The tab is identified by the type of connection, i.e.: UMTS, LTE, UDMA, etc. The label on this tab corresponds to the Technology field on the About (page 6-42) tab. Note that the card being configured (Sim or Sim2) is identified at the top of this tab.
  • Page 189 PIN/PUK Next select the PIN/PUK tab. Note that the card being configured (Sim1 or Sim2) is identified at the top of this tab. Enter the PIN or PUK and tap Save then tap Exit to return to the Connection Manager. 6 - 39...
  • Page 190: System Settings

    System Settings Use this screen to enable logging. By default, logging is disabled. 6 - 40...
  • Page 191: Gps

    This screen displays GPS data. A WWAN connection is not required for the GPS data, however an antenna must be attached to the GPS port. Tap the Start button to begin receiving GPS data. Once started, the GPS data on screen is populated. Tap the Clear GPS Data button to erase the GPS data.
  • Page 192: About

    About The about screen has no user-configurable parameters. It identifies the firmware and hardware versions, the carrier selected, MEID, etc. for the WWAN radio. 6 - 42...
  • Page 193: Integrated Keypad

    Key Maps Integrated Keypad There are seven integrated programmable keys located on the Thor VM3 below the display. Each programmable key can be modified by the Orange key for a total of 14 programmable keys. Keyboard Remapper (page 5-35) to remap these keys.
  • Page 194: External 21-Key Keyboard

    • Arrow keys are unaffected by Yellow or Green shifted mode. • Keypress combinations marked as N/A do nothing (the keystroke is consumed by the keyboard and not sent to the Thor VM3). • Keys marked as programmable can be assigned a value using the Programmable Key (page 5-29) control panel.
  • Page 195: External 95-Key Keyboard

    95-key PS/2 Keyboard (page 3-11). The key map table that follows lists the commands used for the Thor VM3. Note that since the Thor VM3 uses a Microsoft Win- dows operating system, no DOS Terminal Emulation keypress sequences are provided.
  • Page 196: External 60-Key Keyboard

    » The 2nd functions of the F4 and F5 keys are not used as the display brightness is adjusted via the buttons on the front of the Thor VM3. » The 2nd functions of the F6 and F7 keys are not used as the Thor VM3 has TFT LCD screen with no provision for contrast adjustments.
  • Page 197 Down Arrow Down Arrow Right Arrow Right Arrow Left Arrow Left Arrow Insert Bksp Delete (numeric) Home Left Arrow Right Arrow Page Up Up Arrow Page Down Down Arrow ScrollLock Shift Shift Shift 8 - 5...
  • Page 198 Shift Shift Shift Shift Shift Shift Shift Shift Shift Shift Shift Shift Shift Shift Shift Shift Shift Shift Shift Shift Shift Shift Shift Shift Shift Shift 8 - 6...
  • Page 199 < > / (numeric) Ctrl / (alpha) - (numeric) Ctrl - (alpha) + (numeric) Ctrl + (alpha) * (numeric) I (letter i) * (alpha) Ctrl I (letter i) : (colon) ; (semicolon) _ (underscore) , (comma) ' (apostrophe) ~ (tilde) "...
  • Page 200 8 - 8...
  • Page 201: Chapter 8 - Specifications And Reference Material

    No integrated scanner, Optional serial, USB or Bluetooth scanners Keyboard Integrated 7-key keypad Optional 95-key USB keyboard Optional numeric-only keyboard Optional adapter cable for Honeywell PS/2 keyboards External Connectors Optional external 802.11 / GPS / WWAN antenna connectors Additional connectors on Smart Dock, see below Beeper...
  • Page 202: Vm3D Enhanced Dock

    VM3D Enhanced Dock Power Connector 6-pin connector: Direct10-60V DC input power Optional external converters for AC (90-240 VAC) and extended range DC (60-150 VDC) COM1Connector 9-pin male, RS-232 serial port, COM1 with switchable power on pin 9 COM2 Connector 9-pin male, RS-232 serial port, COM2 with switchable power on pin 9 CANBUS/AUDIO Connector 15-pin male, CANbus/Audio connector supports either audio/microphone via adapter cable or J1939 Female and J1939 Male connectors via CANbus cable...
  • Page 203: Dimensions

    Dimensions Thor VM3 Standard Dock Note: The RAM ball is not included in the following measurements. Length 7.1” (18.0 cm) Width 6.1” (15.5 cm) Height 2.5” (6.4 cm), measurement includes strain relief cable clamps Weight 3.2 lb. (1.5 kg) Enhanced Dock Note: The RAM ball is not included in the following measurements.
  • Page 204: Environmental Specifications

    Environmental Specifications Thor VM3 and Dock Operating Temperature -22º to 122º F (-30ºC to 50ºC) [non-condensing] Storage Temperature -22°F to 140°F (-30°C to 60°C) [non-condensing] Water and Dust IEC 60529 compliant to IP66 15 kV air, 8kV direct contact Vibration MIL-STD-810F, composite wheeled vehicles.
  • Page 205: Port And Connector Pinouts

    Port and Connector Pinouts Power Supply Connector VM1D Standard Dock and VM3D Enhanced Dock Signal Description V In+ 10-60V DC input + V In+ 10-60V DC input + V In- input - V In- input - Chassis ground Ignition +0V to 60V to start terminal VMXD Enhanced Dock Signal Description...
  • Page 206: Usb And Usb1 Connector

    Description 5V_USB USB Power, Current Limited PIN 4 USB_H1_D- USB D- PIN 1 USB_H1_D+ USB D+ USB Power Return Shell CGND Chassis Ground USB Client Connector The USB client connection is not supported on the Thor VM3. 9 - 6...
  • Page 207: Usb2 Connector

    USB2 Connector The USB2 connector is only present on the Enhanced Dock. Signal Description Not Used PIN 5 PIN 1 PIN 10 PIN 6 Not Used Not Used Not Used PIN 15 PIN 11 Not Used USB_H2_PWR USB host 2 5V output power USB_H2_D+ USB host 2 data signal USB_H2_D-...
  • Page 208 USB Dual Host Y Cable D15 Male Connector Signal Description Not Used PIN 1 PIN 5 PIN 6 PIN 10 Not Used Not Used Not Used PIN 11 PIN 15 Not Used USB_H2_PWR USB host 2 5V output power USB_H2_D+ USB host 2 data signal USB_H2_D- USB host 2 data signal...
  • Page 209 PS/2 to USB Keyboard Adapter Cable Note: This cable is not supported when the Thor VM3 is used with the VM1D Standard Dock. D9 Male Connector - USB Signal Description Not Used PIN 1 PIN 5 Not Used Not Used...
  • Page 210: Canbus / Audio Connector

    CANbus / Audio Connector Signal Name Description CAN reserved PIN 1 PIN 5 PIN 6 PIN 10 CAN_L CAN_L bus line dominant low CAN_GND CAN Ground CAN reserved PIN 11 PIN 15 Optional ground Audio return Headset return Audio output Headset output Mic input Microphone input...
  • Page 211 CANbus Y Cable D15 Female Connector Signal Description Not Used PIN 5 PIN 1 PIN 10 PIN 6 CAN_L CAN_L bus line dominant low CAN_GND CAN ground Not Used CAN reserved PIN 15 PIN 11 Ground Not used Not used Not used Not used Not used...
  • Page 212: Hat Encoding

    Hat Encoding 9 - 12...
  • Page 213 9 - 13...
  • Page 214: Licenses Of Third Party Software

    Licenses of Third Party Software This product contains software provided by third parties, which may include the below listed components. The Honeywell product that includes this file does not necessarily use all of the third party software components referred to below.
  • Page 215 For example, if you distribute copies of such a program, whether gratis or for a fee, you must pass on to the recipients the same freedoms that you received. You must make sure that they, too, receive or can get the source code. And you must show them these terms so they know their rights.
  • Page 216 To "modify" a work means to copy from or adapt all or part of the work in a fashion requiring copyright permission, other than the making of an exact copy. The resulting work is called a "modified version" of the earlier work or a work "based on"...
  • Page 217 produce the work, or an object code interpreter used to run it. The "Corresponding Source" for a work in object code form means all the source code needed to generate, install, and (for an executable work) run the object code and to modify the work, including scripts to control those activities.
  • Page 218 No covered work shall be deemed part of an effective technological measure under any applicable law fulfilling obligations under article 11 of the WIPO copyright treaty adopted on 20 December 1996, or similar laws prohibiting or restricting circumvention of such measures.
  • Page 219 d) If the work has interactive user interfaces, each must display Appropriate Legal Notices; however, if the Program has interactive interfaces that do not display Appropriate Legal Notices, your work need not make them do so. A compilation of a covered work with other separate and independent works, which are not by their nature extensions of the covered work, and which are not combined with it such as to form a larger program, in or on a volume of a storage or distribution medium, is called an...
  • Page 220 Corresponding Source along with the object code. If the place to copy the object code is a network server, the Corresponding Source may be on a different server (operated by you or a third party) that supports equivalent copying facilities, provided you maintain clear directions next to the object code saying where to find the Corresponding Source.
  • Page 221 The requirement to provide Installation Information does not include a requirement to continue to provide support service, warranty, or updates for a work that has been modified or installed by the recipient, or for the User Product in which it has been modified or installed. Access to a network may be denied when the modification itself materially and adversely affects the operation of the network or violates the rules and protocols for communication across the network.
  • Page 222 authors of the material; or e) Declining to grant rights under trademark law for use of some trade names, trademarks, or service marks; or f) Requiring indemnification of licensors and authors of that material by anyone who conveys the material (or modified versions of it) with contractual assumptions of liability to the recipient, for any liability that these contractual assumptions directly impose on those licensors and authors.
  • Page 223 copyright holder, and you cure the violation prior to 30 days after your receipt of the notice. Termination of your rights under this section does not terminate the licenses of parties who have received copies or rights from you under this License.
  • Page 224 work thus licensed is called the contributor's "contributor version". A contributor's "essential patent claims" are all patent claims owned or controlled by the contributor, whether already acquired or hereafter acquired, that would be infringed by some manner, permitted by this License, of making, using, or selling its contributor version, but do not include claims that would be infringed only as a consequence of further modification of the contributor version.
  • Page 225 specifically granted under this License. You may not convey a covered work if you are a party to an arrangement with a third party that is in the business of distributing software, under which you make payment to the third party based on the extent of your activity of conveying the work, and under which the third party grants, to any of the parties who would receive the covered work from you, a discriminatory patent license (a) in connection with copies of the covered work...
  • Page 226 Public License "or any later version" applies to it, you have the option of following the terms and conditions either of that numbered version or of any later version published by the Free Software Foundation. If the Program does not specify a version number of the GNU General Public License, you may choose any version ever published by the Free Software Foundation.
  • Page 227 END OF TERMS AND CONDITIONS How to Apply These Terms to Your New Programs If you develop a new program, and you want it to be of the greatest possible use to the public, the best way to achieve this is to make it free software which everyone can redistribute and change under these terms.
  • Page 228 into proprietary programs. If your program is a subroutine library, you may consider it more useful to permit linking proprietary applications with the library. If this is what you want to do, use the GNU Lesser General Public License instead of this License. But first, please read <http://www.gnu.org/philosophy/why-not-lgpl.html>.
  • Page 229 1. Exception to Section 3 of the GNU GPL. You may convey a covered work under sections 3 and 4 of this License without being bound by section 3 of the GNU GPL. 2. Conveying Modified Versions. If you modify a copy of the Library, and, in your modifications, a facility refers to a function or data to be supplied by an Application that uses the facility (other than as an argument passed when the facility is invoked), then you may convey a copy of the modified...
  • Page 230 b) Accompany the Combined Work with a copy of the GNU GPL and this license document. c) For a Combined Work that displays copyright notices during execution, include the copyright notice for the Library among these notices, as well as a reference directing the user to the copies of the GNU GPL and this license document.
  • Page 231 b) Give prominent notice with the combined library that part of it is a work based on the Library, and explaining where to find the accompanying uncombined form of the same work. 6. Revised Versions of the GNU Lesser General Public License. The Free Software Foundation may publish revised and/or new versions of the GNU Lesser General Public License from time to time.
  • Page 232 THE SOFTWARE IS PROVIDED 'AS IS', WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT. IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR ANYONE DISTRIBUTING THE SOFTWARE BE LIABLE FOR ANY DAMAGES OR OTHER LIABILITY, WHETHER IN CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
  • Page 233 To protect your rights, we need to make restrictions that forbid distributors to deny you these rights or to ask you to surrender these rights. These restrictions translate to certain responsibilities for you if you distribute copies of the library or if you modify it. For example, if you distribute copies of the library, whether gratis or for a fee, you must give the recipients all the rights that we gave you.
  • Page 234 Public License. It also provides other free software developers Less of an advantage over competing non-free programs. These disadvantages are the reason we use the ordinary General Public License for many libraries. However, the Lesser license provides advantages in certain special circumstances.
  • Page 235 copyright law: that is to say, a work containing the Library or a portion of it, either verbatim or with modifications and/or translated straightforwardly into another language. (Hereinafter, translation is included without limitation in the term "modification".) "Source code" for a work means the preferred form of the work for making modifications to it.
  • Page 236 in the event an application does not supply such function or table, the facility still operates, and performs whatever part of its purpose remains meaningful. (For example, a function in a library to compute square roots has a purpose that is entirely well-defined independent of the application.
  • Page 237 4. You may copy and distribute the Library (or a portion or derivative of it, under Section 2) in object code or executable form under the terms of Sections 1 and 2 above provided that you accompany it with the complete corresponding machine-readable source code, which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange.
  • Page 238 modification of the work for the customer's own use and reverse engineering for debugging such modifications. You must give prominent notice with each copy of the work that the Library is used in it and that the Library and its use are covered by this License.
  • Page 239 which the executable runs, unless that component itself accompanies the executable. It may happen that this requirement contradicts the license restrictions of other proprietary libraries that do not normally accompany the operating system. Such a contradiction means you cannot use both them and the Library together in an executable that you distribute.
  • Page 240 this License. 11. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License.
  • Page 241 "any later version", you have the option of following the terms and conditions either of that version or of any later version published by the Free Software Foundation. If the Library does not specify a license version number, you may choose any version ever published by the Free Software Foundation.
  • Page 242 To apply these terms, attach the following notices to the library. It is safest to attach them to the start of each source file to most effectively convey the exclusion of warranty; and each file should have at least the "copyright"...
  • Page 243 LICENSE ISSUES ============== The OpenSSL toolkit stays under a dual license, i.e. both the conditions of the OpenSSL License and the original SSLeay license apply to the toolkit. See below for the actual license texts. Actually both licenses are BSD-style Open Source licenses.
  • Page 244 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;...
  • Page 245 documentation and/or other materials provided with the distribution. * 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: "This product includes cryptographic software written by Eric Young (eay@cryptsoft.com)" The word 'cryptographic' can be left out if the rouines from the library being used are not cryptographic related :-).
  • Page 246 ------------------- This software is provided 'as-is', without any express or implied warranty. In no event will the authors be held liable for any damages arising from the use of this software. Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions: 1.
  • Page 247 "Contribution" means: a) in the case of the initial Contributor, the initial code and documentation distributed under this Agreement, and b) in the case of each subsequent Contributor: i) changes to the Program, and ii) additions to the Program; where such changes and/or additions to the Program originate from and are distributed by that particular Contributor. A Contribution 'originates' from a Contributor if it was added to the Program by such Contributor itself or anyone acting on such Contributor's behalf.
  • Page 248 b) its license agreement: i) effectively disclaims on behalf of all Contributors all warranties and conditions, express and implied, including warranties or conditions of title and non-infringement, and implied warranties or conditions of merchantability and fitness for a particular purpose; ii) effectively excludes on behalf of all Contributors all liability for damages, including direct, indirect, special, incidental and consequential damages, such as lost profits;...
  • Page 249 EXCEPT AS EXPRESSLY SET FORTH IN THIS AGREEMENT, NEITHER RECIPIENT NOR ANY CONTRIBUTORS SHALL HAVE ANY LIABILITY FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING WITHOUT LIMITATION LOST PROFITS), HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OR DISTRIBUTION OF THE PROGRAM OR THE EXERCISE OF ANY RIGHTS GRANTED HEREUNDER, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
  • Page 250 * All rights reserved. Redistribution and use in source and binary * forms, with or without modification, are permitted provided that * this copyright notice is retained. * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED * WARRANTIES ARE DISCLAIMED. IN NO EVENT SHALL CORE SDI S.A. BE * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY OR * CONSEQUENTIAL DAMAGES RESULTING FROM THE USE OR MISUSE OF THIS * SOFTWARE.
  • Page 251 furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.
  • Page 252 * Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. * Neither the name of ekus.net nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.
  • Page 253 "Executable Files" refer to the executables, binary files, configuration and any required data files included in the Work. "Publisher" means the provider of the website, magazine, CD-ROM, DVD or other medium from or by which the Work is obtained by You. "Source Code"...
  • Page 254 EXEMPLARY DAMAGES ARISING OUT OF THIS LICENSE OR THE USE OF THE WORK OR OTHERWISE, EVEN IF THE AUTHOR OR THE PUBLISHER HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Termination. This License and the rights granted hereunder will terminate automatically upon any breach by You of any term of this License. Individuals or entities who have received Derivative Works from You under this License, however, will not have their licenses terminated provided such individuals or entities remain in full compliance with those licenses.
  • Page 255 would be appreciated but is not required. 2. Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software. 3. This notice may not be removed or altered from any source distribution. Package(s) using RSA License ============================ * netwars (MD5)
  • Page 256 This license governs use of code marked as “sample” or “example” available on this web site without a license agreement, as provided under the section above titled “NOTICE SPECIFIC TO SOFTWARE AVAILABLE ON THIS WEB SITE.” If you use such code (the “software”), you accept this license.
  • Page 257 // blowfish.cpp C++ class implementation of the BLOWFISH encryption algorithm // _THE BLOWFISH ENCRYPTION ALGORITHM_ // by Bruce Schneier // Revised code--3/20/94 // Converted to C++ class 5/96, Jim Conger Blowfish is a symmetric block cipher that can be used as a drop-in replacement for DES or IDEA. It takes a variable-length key, from 32 bits to 448 bits, making it ideal for both domestic and exportable use.
  • Page 258 means (a) that the initial Contributor has attached the notice described in Exhibit B to the Covered Software; or (b) that the Covered Software was made available under the terms of version 1.1 or earlier of the License, but not also under the terms of a Secondary License.
  • Page 259 means the form of the work preferred for making modifications. 1.14. "You" (or "Your") means an individual or a legal entity exercising rights under this License. For legal entities, "You" includes any entity that controls, is controlled by, or is under common control with You. For purposes of this definition, "control"...
  • Page 260 Contributions with other software (except as part of its Contributor Version); or (c) under Patent Claims infringed by Covered Software in the absence of its Contributions. This License does not grant any rights in the trademarks, service marks, or logos of any Contributor (except as may be necessary to comply with the notice requirements in Section 3.4).
  • Page 261 If You distribute Covered Software in Executable Form then: (a) such Covered Software must also be made available in Source Code Form, as described in Section 3.1, and You must inform recipients of the Executable Form how they can obtain a copy of such Source Code Form by reasonable means in a timely manner, at a charge no more than the cost of distribution to the recipient;...
  • Page 262 If it is impossible for You to comply with any of the terms of this License with respect to some or all of the Covered Software due to statute, judicial order, or regulation then You must: (a) comply with the terms of this License to the maximum extent possible; and (b) describe the limitations and the code they affect.
  • Page 263 * particular purpose or non-infringing. The entire risk as to the * quality and performance of the Covered Software is with You. * Should any Covered Software prove defective in any respect, You * (not any Contributor) assume the cost of any necessary servicing, * * repair, or correction.
  • Page 264 necessary to make it enforceable. Any law or regulation which provides that the language of a contract shall be construed against the drafter shall not be used to construe this License against a Contributor. 10. Versions of the License --------------------------- 10.1.
  • Page 265 Exhibit B - "Incompatible With Secondary Licenses" Notice --------------------------------------------------------- This Source Code Form is "Incompatible With Secondary Licenses", as defined by the Mozilla Public License, v. 2.0. 9 - 65...
  • Page 266 9 - 66...
  • Page 267: Chapter 9 - Customer Support

    Limited Warranty Honeywell International Inc. (“HII”) warrants its products to be free from defects in materials and workmanship and to conform to HII’s published specifications applicable to the products purchased at the time of shipment. This warranty does not cover any HII product which is (i) improperly installed or used;...
  • Page 268 The duration of the limited warranty for the Thor VM3 internal UPS battery is 1 year. The duration of the limited warranty for the Thor VM3 AC power supply and cables is 1 year. The duration of the limited warranty for the Thor VM3 DC/DC power supply is 1 year.
  • Page 269 10 - 1...
  • Page 270 Honeywell International Inc. 9680 Old Bailes Road Fort Mill, SC 29707 www.honeywellaidc.com ™ VM3-W10-UG Rev A 8/16...

Table of Contents