Working with Motorola RFID
|
|
|
- Corey Harrell
- 10 years ago
- Views:
Transcription
1
2 APPFORUM Americas 2012 Working with Motorola RFID Andy Doorty Ι Alliance Manager Adithya Krishnamurthy Ι Solution Manager APPFORUM Americas 2012
3 RFID Product Overview RFID Architecture RFID API3 for.net Information Location Best Practice
4 RFID Adoption
5 RFID Product Suite Industrial Warehousing & Distribution Supply Chain Manufacturing Energy Fixed Fixed Handheld Mobile FX9500 XR480 MC9090-Z RD5000 Business Retail Inventory Management Asset Management File tracking Healthcare Fixed Handheld Hands-Free FX7400 MC3190-Z DS9808-R
6 INCREASED SENSITIVITY: GREATER ACCURACY for challenging materials like metals and liquids LONGER READ RANGES for large DC s and yard management applications HIGHER THROUGHPUT rates for reading more, and densely packed goods NEATER, MORE MANAGEABLE FOOTPRINT All cabling and input/output ports are on one side for a smaller installation footprint and better manageability
7 Host Based Applications Non RFID MC
8 Other Host Based Applications Wired Connection USB No Support With RFID3 API or LLRP Interface
9 Embedded Applications Mobile Application Headless Application
10 LLRP Low Level Reader Protocol What is LLRP? It stands for Low Level Reader Protocol, defined by the EPCGlobal organization It is the open standard protocol that defines communication interface between readers and applications. It is a message-oriented protocol Messages from the Client to the Reader include: Getting and setting configuration of Readers, reader s capabilities discovery, and managing the inventory and access operations Messages from the Reader to the Client include: Reporting of Reader status, inventory and access results, and various events It is the standard RFID interface to Motorola mobile as well as Motorola fixed readers
11 LLRP Protocol For Reading Enjoyment LLRP Specification can be downloaded from EPCGlobal 11
12 Architecture of Motorola RFID System App RFID 3 API set LLRP Protocol LLRP Server Customer applications in C, C++ &.NET Motorola RFID3 API is built based on LLRP Protocol LLRP defines a communication interface between RFID Readers and Applications LLRP Server is running on the RFID Reader in background
13 Architecture of Motorola RFID System EMBEDDED RFID3 DOT NET-API EMBEDDED RFID3 C-API APPLICATIONS in C APPLICATIONS IN HOST BASED RFID3 DOT NET-API HOST BASED RFID3 C-API DIRECT LLRP APPS LTK Toolkit
14 Functionality of Motorola RFID Reader Reading Tags Writing Tags Locating Tags Direction of Tags LLRP Specific Functionality 2 Major Operations Reader Operations Antenna Inventory Access Operations Read, Write Tag s Memory
15 RFID3 API Interface Provide API set for Motorola s LLRP based Fixed & Hand-held readers - Fixed Reader: XR Series (LLRP Enabled), FX7400, FX Hand-Held Reader: MC3090Z, MC3190Z, MC9090Z Support multiple readers access and is thread-safe Designed for fast application development to support both simple and advanced Reader Operations. Provide a Full-fledged user-friendly interface for - Generic reader functionality (over LLRP), and - Reader Manageability ( over Http or custom LLRP extensions ) 15
16 Comparison between using RFID3 API and LTK toolkit SAME FUNCTIONALITY Using RFID3 API Start Inventory // reader.actions.inventory.perform(); // Stop Inventory // reader.actions.inventory.stop(); // Using LTK Toolkit Start Inventory 1. Build RoSpec package 2. Send the following LLRP messages to LLRP Server ADD_ROSPEC ENABLE_ROSPEC START_ROSPEC Stop Inventory 1. STOP_ROSPEC 2. DISABLE_ROSPEC 3. DELETE_ROSPEC LESS COMPLEXITY
17 Generic LLRP Reader Interface Talks with LLRP based Motorola Readers via LLRP interface Allows applications to perform: Connection Management Knowing Reader Capabilities Configuring the Reader Managing Events Managing Tags Setting Filters and Triggers Inventory & Access Operations 17
18 Reader Management Interface Talks over the custom interface as supported by Reader Via xml over http (for XR Series, FX Series) Via custom LLRP extensions (for MC3090Z, MC3190Z, MC9090Z) Allows application to perform Login/Logout Get Reader Information Change Antenna Mode (only for XR Series) Enable/Disable antenna port (only for XR Series, FX Series) Update Software/Firmware Import/Export Profiles (only for XR Series, FX Series) Get System Info (only for XR Series, FX Series). 18
19 Application Choices APPLICATION Application RFID API3 LLRP RFID Reader READERS HOST PC Loopback FIXED RFID MC HANDHELD MOBILE Non RFID MC
20 A Simple Inventory Code Snippet // Establish connection to the RFID Reader RFIDReader reader = new RFIDReader(" ", 0, 0); reader.connect(); // Specify that TagData should be reported along with the ReadNotify Event // Handler reader.events.attachtagdatawithreadevent = true; // registering for read tag event notification reader.events.readnotify += new Events.ReadNotifyHandler(Events_ReadNotify); // perform simple inventory reader.actions.inventory.perform(); // Read for 5 seconds Thread.Sleep(5000); // stop the inventory reader.actions.inventory.stop(); // Disconnects reader and performs clean-up reader.disconnect();
21 Programming Tip Question: I am using the Motorola Handheld RFID reader to inventory tags and there are over hundreds tags in the FOV. I observe that the tag read rate is quite slow and my application responds slowly as well. Sometime the system even crashes. What could possibly cause this issue? Answer: When writing embedded applications on the handheld readers, try NOT to implement computation heavy and complex logic, like frequently update database, play sound, communicate with server. This could have the undesirable effect of crippling the core functionality of the RFID. Coming May 2010
22 Programming Tip Question: Does RFID3 API allow user to control the inventory operation via trigger button on Hand-held reader? Start Inventory when trigger is pulled, and stop inventory when trigger is released Answer: Yes. A special trigger type is added in the RFID3 API, which is Handheld trigger. The sample code in the next slide shows how to use handheld trigger to control the inventory operation Coming May 2010
23 Programming Tip Question: Can RFID3 API support reading large-capacity tag, Eg. EPC ID > 12 byts, MB size > 64 bytes? Answer: Yes. In order to read large-capacity tag, application should change the default API tag storage settings, which are: Maximum size of EPC Data in Bytes: 12 bytes (96 bits) Maximum size of tag s Memory Bank: 64 bytes(512 bits) Change TagStorageSettings TagStorageSettings tagstoragesettings = new TagStorageSettings(); tagstoragesettings.maxtagidlength = 30; // New maximum EPC ID: 30 bytes tagstoragesettings. MaxSizeMemoryBank = 128; // New maximum memory bank size: 128 bytes Coming May 2010 rfid3reader.config.settagstoragesettings(tagstoragesettings);
24 Inventory with no Singulation PRODUCT ON SHELF APPLICATION
25 Inventory with no Singulation PRODUCT ON SHELF APPLICATION
26 Inventory with Singulation S1 PRODUCT ON SHELF S1 A S1 A S1 A S1 A S1 A APPLICATION
27 Inventory with Singulation S1 PRODUCT ON SHELF S1 A S1 A S1 A S1 A S1 A Less RFID Noise = More efficient application APPLICATION
28 Sessions S0 S1 S2 S3 A/B A/B A/B A/B Tags provide 4 sessions (denoted S0, S1, S2, and S3) and maintain an independent inventoried flag for each session Singulation State Aware More complex application handles State Unaware Reader Handles The following are the steps to use pre-filters: 1. Add pre-filters Check ReaderCapabilites.MaxNumPreFilters Use StateUnawareAction for tag selection control 2. Set appropriate Singulation controls Session S0 no select persistency Session S1-S3 Tag stays selected for configurable time 3. Perform Inventory or Access operation
29 Pre-Filtering PRODUCT Pre-Filter: Pre-filter are same as the Select command of C1G2 specification. Once applied, pre-filters are applied prior to Inventory and Access operations APPLICATION
30 Post And Access Filters PRODUCT ON SHELF Post-Filter Post-filter is the filter which is applied on the Tags that reader already read but not yet returned to application Access-Filter Access-filter is used to filter tags on which the access commands would be applied APPLICATION
31 RFID3 API Interface Download The EMDKs can be downloaded from Symbol support website: RFID3 API Programmer Guide & RFID3 Sample Applications
32 API3 for.net Reference Guide Start -> Programs -> Motorola EMDK for.net V2.3 -> Help
33 API3 for.net Sample Application Guide
34 Samples in VS2005 and VS2008 EMDK samples list Samples in.net Samples in C Type of application Target devices CS_RFID3_Host_Sample1 BasicRFIDHost1 Host based FX series, XR(with LLRP) CS_RFID3_Host_Sample2 RFIDHostSample1 Host based FX series, XR(with LLRP) CS_RFID3_Sample3 BasicRFID2 Embedded FX740x, XR(with LLRP) CS_RFID3_Sample4 RFIDSample4 Embedded FX740x, XR(with LLRP) CS_RFID3_Sample5 BasicRFID1 Embedded MC3x90-Z and MC9x90-Z CS_RFID3_Sample6 RFIDSample3 Embedded MC3x90-Z and MC9x90-Z
35 On The Floor In The Field In The Warehouse
36 More Details on RFID3 API FAQs On Using RFID3 API
37 Question: How to efficiently retrieve inventory results from RFID3 API? Answer: The RFID3 API allows users to get notified when tag read events occur. But more importantly, the tag data can be retrieved in two ways: 1. Completely relies on tag events to get tag data In this way, associated tag data will be attached to the tag event handler provide by application when the tag event occurs 2. Retrieve tag data directly from API tag buffer when the tag event occurs To do this, application should explicitly turn off ATTACH TAG DATA TO EVENT Coming May 2010 FOR SYSTEMS WHICH SEE HIGH TAG POPULATIONS, WE RECOMMEND USING METHOD #2.
38 Inventory operations Method #2 Main reader object = RFIDReader // --Reader declarations RFIDReader reader; // Initialize and Connect to RFID reader // --Reader initializations reader = new RFIDReader( ", 0, 0); reader.connect(); // Disable AttachTagDataWithReadEvent // reader.events.attachtagdatawithreadevent = false; // Register for read notifications // reader.events.readnotify += new Events.ReadNotifyHandler(Events_ReadNotify); // Start polling // reader.actions.inventory.perform(); // Callback function // void Events_ReadNotify(object sender, Events.ReadEventArgs e) { TagData[ ] tagdata = reader.actions.getreadtags(1000); if ((tagdata!= null) && (tagdata.length > 0)) { foreach(tagdata t in tagdata) { UpdateListBox(t.TagID+" : "+ t.antennaid.tostring()); } } } // Stop polling // reader.actions.inventory.stop(); // Disconnect from RFID reader // --Reader initializations reader.disconnect(); //
39 Question: What is the difference between the synchronous and asynchronous access operation supported by RFID3 API? Answer: 1. Synchronous access operations, like ReadWait(), WriteWaite(), is performed on a specific tag. And application will be blocked until the function call returns. It is a safe and easy way to access a tag, but it does not offer the best performance on speed. (high reliability, easy to program but low performance on speed) 2.Asynchronous access operation, like ReadEvent(), WriteEvent(), is performed on all tags that are in the field of view of reader s antenna(s) (Broadcasting command). The asynchronous function call issues the access operation then immediately returns, therefore, application should rely on AccessStopEvent to be notified when the access operation completes. It increases the programming complexity but get high performance on speed. Coming May 2010 Note: Application can issue asynchronous access operation in conjunction with the
40 Access operations Synchronous Access operation // Write user memory bank data string tagid = "1234ABCD B1"; TagAccess.WriteAccessParams writeparams = new TagAccess.WriteAccessParams(); byte[] writedata = new byte[4] {0x11, 0x22, 0x33, 0x44}; writeparams.accesspassword = 0; writeparams.writedatalength = writedata.length; writeparams.memorybank = MEMORY_BANK.MEMORY_BANK_USER; writeparams.byteoffset = 0; writeparams.writedata = writedata; // antenna Info is null performs on all antenna // Application waits until function returns rfid3.actions.tagaccess.writewait(tagid, writeaccessparams, null);
41 Access operations Asynchronous Access operation // Create Event to signify access operation complete AutoResetEvent AccessComplete = new AutoResetEvent(false); rfid3.events.notifyaccessstopevent = true; rfid3.events.statusnotify += new Events.StatusNotifyHandler(Events_StatusNotify);.... // Status Notification event handler public void Events_StatusNotify(object sender, Events.StatusEventArgs e) { switch (e.statuseventdata.statuseventtype) {.. case Events.STATUS_EVENT_TYPE.ACCESS_STOP_EVENT: AccessComplete.Set(); break;. } }.. Asynchronous Access operation (Continue ) // Write user memory bank data TagAccess.WriteAccessParams writeparams = new TagAccess.WriteAccessParams(); byte[] writedata = new byte[4] { 0xff, 0xff, 0xff, 0xff }; writeparams.accesspassword = 0; writeparams.memorybank = MEMORY_BANK.MEMORY_BANK_USER; writeparams.byteoffset = 0; writeparams.writedatalength = writedata.length; writeparams.writedata = writedata; AccessComplete.Reset(); // Asynchronous write operation rfid3.actions.tagaccess.writeevent(writeparams, null, null); // wait for access operation to complete AccessComplete.WaitOne();
42 Question: Can RFID3 API support reading large-capacity tag, Eg. EPC ID > 12 byts, MB size > 64 bytes? Answer: Yes. In order to read large-capacity tag, application should change the default API tag storage settings, which are: Maximum size of EPC Data in Bytes: 12 bytes (96 bits) Maximum size of tag s Memory Bank: 64 bytes(512 bits) Change TagStorageSettings TagStorageSettings tagstoragesettings = new TagStorageSettings(); tagstoragesettings.maxtagidlength = 30; // New maximum EPC ID: 30 bytes tagstoragesettings. MaxSizeMemoryBank = 128; // New maximum memory bank size: 128 bytes Coming May 2010 rfid3reader.config.settagstoragesettings(tagstoragesettings);
43 Question: I don t want the same tag getting reported multiple times. Does RFID3 API provide the mechanism to report tag during the inventory only when this is the new tag first seen by reader or this tag s visibility is changed? Answer: Yes. RFID3 API implements the autonomous mode. In this mode, applications can subscribe for only new tag event in which case only new tags will get reported, or subscribe the visibility changed event so that tag gets reported only when it is read by different antenna. Enable autonomous mode and only receive new tags (unique tags) TriggerInfo triggerinfo = new TriggerInfo(); triggerinfo.enabletageventreport = true; // Enable Autonomous mode // only register new tag event triggerinfo.tageventreportinfo.reportnewtagevent = TAG_EVENT_REPORT_TRIGGER. IMMEDIATE; triggerinfo.tageventreportinfo.reporttaginvisibleevent = TAG_EVENT_REPORT_TRIGGER.NEVER; triggerinfo.tageventreportinfo.reporttagbacktovisibilityevent = TAG_EVENT_REPORT_TRIGGER.NEVER; rfid3.actions.inventory.perform(null, triggerinfo, null); // TAG_EVENT reported as part of TAG_DATA indicates the visibility state of the Tag. Coming May 2010
44 Question: Does RFID3 API allow user to control the inventory operation via trigger button on Hand-held reader? Start Inventory when trigger is pulled, and stop inventory when trigger is released Answer: Yes. A special trigger type is added in the RFID3 API, which is Handheld trigger. The sample code in the next slide shows how to use handheld trigger to control the inventory operation Coming May 2010
45 Handheld Trigger Type // --TriggerInfo declarations TriggerInfo triggerinfo; // // -- Setting up start and stop trigger to be handheld triggers triggerinfo = new TriggerInfo(); triggerinfo.tagreporttrigger = 1; // This will cause tags to be reported to application as soon as they are available triggerinfo.starttrigger.type = START_TRIGGER_TYPE.START_TRIGGER_TYPE_HANDHELD; triggerinfo.starttrigger.handheld.handheldevent = HANDHELD_TRIGGER_EVENT_TYPE.HANDHELD_TRIGGER_PRESSED; triggerinfo.stoptrigger.type = STOP_TRIGGER_TYPE.STOP_TRIGGER_TYPE_HANDHELD_WITH_TIMEOUT; triggerinfo.stoptrigger.handheld.handheldevent = HANDHELD_TRIGGER_EVENT_TYPE.HANDHELD_TRIGGER_RELEASED; triggerinfo.stoptrigger.handheld.timeout = 0; // no timeout setting // Start polling // reader.actions.inventory.perform(null, triggerinfo, null); // the TriggerInfo object is passed in when RFID reading is performed // Stop polling // reader.actions.inventory.stop(); //
46 Question: I already write a non-zero value AccessPassword to a tag. How come I still can access that tag without providing password? Answer: Writing a non-zero value AccessPassword to a tag does not mean the tag is protected from the subsequent Read/Write operation. The next thing user needs to do is to perform the lock operation on a specific memory bank or individual passwords of that tag by calling LockWait() and LockEvent() from RFID3 API. Coming May 2010
47 Question: I already write a non-zero value AccessPassword to a tag and perform the lock operation on it. How come I still can read data from tag s EPC, TID, and User memory bank without providing the access password? Answer: C1G2 tag protocol specifies that only tag s Kill & Access password can be protected from both read and write operation; Reading tag s EPC, TID and User memory bank does not require providing the access password even though these memory banks have already been locked. Some special C1G2 tags are able to support the read protection via the extended read command. Eg, NXP tag Coming May 2010
48 Question: I am using the Motorola Handheld RFID reader to inventory tags and there are over hundreds tags in the FOV. I observe that the tag read rate is quite slow and my application responds slowly as well. Sometime the system even crashes. What could possibly cause this issue? Answer: When writing embedded applications on the handheld readers, try NOT to implement computation heavy and complex logic, like frequently update database, play sound, communicate with server. This could have the undesirable effect of crippling the core functionality of the RFID. Coming May 2010
Cloud RFID UHF Gen 2
Cloud RFID UHF Gen 2 Supply chain visibility In store stock management and security. - Stock take by RFID - Stock search - Reorder report, - Dynamic reorder, Security. Introduction The Adilam RFID system
ebus Player Quick Start Guide
ebus Player Quick Start Guide This guide provides you with the information you need to efficiently set up and start using the ebus Player software application to control your GigE Vision or USB3 Vision
E-Blocks Easy RFID Bundle
Page 1 Cover Page Page 2 Flowcode Installing Flowcode Instruction for installing Flowcode can be found inside the installation booklet located inside the Flowcode DVD case. Before starting with the course
Secure Web Gateway Version 11.7 High Availability
Secure Web Gateway Version 11.7 High Availability Legal Notice Copyright 2015 Trustwave Holdings, Inc. All rights reserved. This document is protected by copyright and any distribution, reproduction, copying,
RFID Tag Data Standards. Kenneth R. Traub, PhD Ken Traub Consulting LLC 12 April 2011
RFID Tag Data Standards Kenneth R. Traub, PhD Ken Traub Consulting LLC 12 April 2011 Outline for Today 11:30: RFID Visibility Data for Business Applications What s the important data, and how do you use
UM0853 User manual. 1 Introduction. M24LRxx application software user guide
User manual M24LRxx application software user guide 1 Introduction The purpose of this user manual is to teach how to use the M24LRxx tool kit with the M24LRxx_Application_Software. It describes the M24LRxx_Application_Software
Network Licensing. White Paper 0-15Apr014ks(WP02_Network) Network Licensing with the CRYPTO-BOX. White Paper
WP2 Subject: with the CRYPTO-BOX Version: Smarx OS PPK 5.90 and higher 0-15Apr014ks(WP02_Network).odt Last Update: 28 April 2014 Target Operating Systems: Windows 8/7/Vista (32 & 64 bit), XP, Linux, OS
Grandstream Networks, Inc.
Grandstream Networks, Inc. XML Based Downloadable Phone Book Guide GXP21xx/GXP14xx/GXP116x IP Phone Version 2.0 XML Based Downloadable Phone Book Guide Index INTRODUCTION... 4 WHAT IS XML... 4 WHY XML...
Kepware Technologies Optimizing KEPServerEX V5 Projects
Kepware Technologies Optimizing KEPServerEX V5 Projects September, 2010 Ref. 50.16 Kepware Technologies Table of Contents 1. Overview... 1 2. Factors that Affect Communication Speed... 1 2.1 Defining Bandwidth...
Deploying the BIG-IP LTM system and Microsoft Windows Server 2003 Terminal Services
Deployment Guide Deploying the BIG-IP System with Microsoft Windows Server 2003 Terminal Services Deploying the BIG-IP LTM system and Microsoft Windows Server 2003 Terminal Services Welcome to the BIG-IP
CipherLab 5100 Time Attendance Utility Manual
CipherLab 5100 Time Attendance Utility Manual K:\Products\Product Technical\BI\BI-PC5100T\CipherLab5100TimeAttendnaceUtilityManual0707-process.doc Page 1 / 13 1 Login A popup form as follows will appear
Implementing SPI Master and Slave Functionality Using the Z8 Encore! F083A
Application Note Implementing SPI Master and Slave Functionality Using the Z8 Encore! F083A AN026701-0308 Abstract This application note demonstrates a method of implementing the Serial Peripheral Interface
A Transport Protocol for Multimedia Wireless Sensor Networks
A Transport Protocol for Multimedia Wireless Sensor Networks Duarte Meneses, António Grilo, Paulo Rogério Pereira 1 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks Introduction Wireless
Preparing Log-ic 360 USB Loggers for Use
Preparing Log-ic 360 USB Loggers for Use Preparing Log-ic 360 USB Loggers for Use Step 1) Install the latest version of the Log-ic Software. Step 2) Connect the Desktop Reader or plug in a USB logger.
Radio Frequency Identification (RFID) An Overview
Radio Frequency Identification (RFID) An Overview How RFID Is Changing the Business Environment Today Radio frequency identification (RFID) technology has been in use for several decades to track and identify
Ethernet 241 Discovery Tool User Manual
Ethernet 241 Discovery Tool User Manual V1.1 Rev A Thank You! Congratulations on the purchase of your Ethernet 241 device and Discovery Tool. RF IDeas hopes you enjoy using our products as much as we enjoyed
Developing Algo Trading Applications with SmartQuant Framework The Getting Started Guide. 24.02.2014 SmartQuant Ltd Dr. Anton B.
Developing Algo Trading Applications with SmartQuant Framework The Getting Started Guide 24.02.2014 SmartQuant Ltd Dr. Anton B. Fokin Introduction... 3 Prerequisites... 3 Installing SmartQuant Framework...
USB Plus+ RFID Reader Setup Guide
875-0042-03 RevA USB Plus+ RFID Reader Setup Guide 1 Government Limited Rights Notice: All documentation and manuals were developed at private expense and no part of it was developed using Government funds.
Grid-In-Hand Mobile Grid Revised 1/27/15
Grid-In-Hand Mobile Grid Revised 1/27/15 Grid-In-Hand provides a mobile solution framework by coupling your mobile scanner to your ios or Android device. Use Mobile Grid for inventory, asset management,
Getting Started Guide with WIZ550web
1/21 WIZ550web is an embedded Web server module based on WIZnet s W5500 hardwired TCP/IP chip, Users can control & monitor the 16-configurable digital I/O and 4-ADC inputs on module via web pages. WIZ550web
C-more Remote Access, Data Log, FTP File Transfer, and Email Tutorial
C-more Remote Access, Data Log, FTP File Transfer, and Email Tutorial P a g e 2 Introduction: This script will walk you through the basic process of setting up the remote access, data logging, FTP file
Release Notes LS Retail Data Director 3.01.04 August 2011
Release Notes LS Retail Data Director 3.01.04 August 2011 Copyright 2010-2011, LS Retail. All rights reserved. All trademarks belong to their respective holders. Contents 1 Introduction... 1 1.1 What s
Honor T1 8.0 FAQ. Issue 01. Date 06/30
Honor T1 8.0 FAQ Issue 01 Date 06/30 1 System and update... 1-1 1.1 Why does my Honor T1 8.0 constantly crash?... 1-1 1.2 Will data be erased if I update my Honor T1 8.0?... 1-1 1.3 Why can't I power
Overview. 1. GPS data tracking via GSM SMS / GPRS. 2. GPS data logging in internal memory. 3. Alarm alert via GSM SMS / Dialing / GPRS
Vehicle or Personal Position Tracking Vehicle Status and Speed Tracking Auto Accident Report Global Position System (GPS) Navigation System Anti theft Alarm System Overview 1. GPS data tracking via GSM
Ciphermail Gateway PDF Encryption Setup Guide
CIPHERMAIL EMAIL ENCRYPTION Ciphermail Gateway PDF Encryption Setup Guide March 6, 2014, Rev: 5454 Copyright c 2008-2014, ciphermail.com. CONTENTS CONTENTS Contents 1 Introduction 4 2 Portal 4 3 PDF encryption
GS-SL2X00 Series. GS-WTX00 Series. Enterprise Android Barcode Device. User Manual
GS-SL2X00 Series GS-WTX00 Series Enterprise Android Barcode Device User Manual Version:1.0 1 / 50 2 / 50 1. Introduction GS-SL2000 Enterprise Android Barcode Sled is designed for Samsung Galaxy Trend Duos
The FlexiSchools Online Order Management System Installation Guide
The FlexiSchools Online Order Management System Installation Guide FlexiSchools May 2012 Page 1 of 16 Installation Pack Welcome to the FlexiSchools system. You will have received a disc containing: Sato
HUAWEI MediaPad T1 8.0 FAQ HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 06/30
HUAWEI MediaPad T1 8.0 FAQ Issue 01 Date 06/30 HUAWEI TECHNOLOGIES CO., LTD. 1 System and update... 1-1 1.1 Why does my HUAWEI MediaPad T1 8.0 constantly crash?... 1-1 1.2 Will data be erased if I update
3M Cloud Library for Wyoming: User Guide for PC/MacOS
3M Cloud Library for Wyoming: User Guide for PC/MacOS April 2015 How to Use 3M Cloud Library *These instructions are for users who wish to read on a computer or transfer books to an ereader. See the help
MS Active Sync: Sync with External Memory Files
Mindfire Solutions - 1 - MS Active Sync: Sync with External Memory Files Author: Rahul Gaur Mindfire Solutions, Mindfire Solutions - 2 - Table of Contents Overview 3 Target Audience 3 Conventions...3 1.
Special Note Ethernet Connection Problems and Handling Methods (CS203 / CS468 / CS469)
Special Note Connection Problems and Handling Methods (CS203 / CS468 / CS469) Sometimes user cannot find the RFID device after installing the CSL Demo App and the RFID reader is connected. If user cannot
RFID Tag Data Standards. Kenneth R. Traub, PhD Ken Traub Consulting LLC 3 April 2012
1 RFID Tag Data Standards Kenneth R. Traub, PhD Ken Traub Consulting LLC 3 April 2012 2 Outline for Today 11:30: RFID Visibility Data for Business Applications What s the important data, and how do you
The FlexiSchools Online Order Management System Installation Guide
The FlexiSchools Online Order Management System Installation Guide FlexiSchools May 2012 Page 1 of 18 Installation Pack Welcome to the FlexiSchools system. You will have received a disc containing: Sato
Flow Visualization Using MS-Excel
Flow Visualization Using MS-Excel Visualization for the Common Man Presented by Lee Rock and Jay Brown US-CERT Analysts Einstein Program Background US-CERT Mission Einstein Program > Large volumes of traffic
Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
Automated Identification Technologies
Spec 2000 ebusiness Forum Automated Identification Technologies Jon Andresen President Technology Solutions [email protected] Budapest, Hungry 23 October 2008 Agenda 1. AIT Chapter 9 Intro - Jon A. AIT
GCM for Android Setup Guide
GCM for Android Setup Guide This guide provides information on...... Prerequisites for using Google Cloud Messaging service... Instructions for setting up GCM service via the Google API console... Configuring
Introducing the BIG-IP and SharePoint Portal Server 2003 configuration
Deployment Guide Deploying Microsoft SharePoint Portal Server 2003 and the F5 BIG-IP System Introducing the BIG-IP and SharePoint Portal Server 2003 configuration F5 and Microsoft have collaborated on
How to develop your own app
How to develop your own app It s important that everything on the hardware side and also on the software side of our Android-to-serial converter should be as simple as possible. We have the advantage that
SysPatrol - Server Security Monitor
SysPatrol Server Security Monitor User Manual Version 2.2 Sep 2013 www.flexense.com www.syspatrol.com 1 Product Overview SysPatrol is a server security monitoring solution allowing one to monitor one or
Keep it Simple Timing
Keep it Simple Timing Support... 1 Introduction... 2 Turn On and Go... 3 Start Clock for Orienteering... 3 Pre Start Clock for Orienteering... 3 Real Time / Finish Clock... 3 Timer Clock... 4 Configuring
Implementation Guide. Version 10
Implementation Guide Version 10 Synthesis Enterprise Portal Implementation Guide Part Identification: RPIGSEP10 ReliaSoft Corporation Worldwide Headquarters 1450 South Eastside Loop Tucson, Arizona 85710-6703,
Team Quicken Loans: Mobile RFID Inventory Tracking System. Administrator Manual
Team Quicken Loans: Mobile RFID Inventory Tracking System Administrator Manual TABLE OF CONTENTS Mobile RFID Inventory Tracking System Admin Manual What s the Mobile RFID Inventory Tracking System?...
mypro Installation and Handling Manual Version: 7
mypro Installation and Handling Manual Version: 7 Date: JAN 2016 Thank you for using mypro on your PC. myscada is a full featured HMI/SCADA system with advanced options such as vector graphics views, advanced
Mechanics Bank Mobile Banking Mobile Finance Manager (MFM) Application Palm Treo Installation
Mechanics Bank Mobile Banking Mobile Finance Manager (MFM) Application Palm Treo Installation Thank you for your interest in Mechanics Bank Mobile Banking. This guide will help you get started with Mechanics
The Service Availability Forum Specification for High Availability Middleware
The Availability Forum Specification for High Availability Middleware Timo Jokiaho, Fred Herrmann, Dave Penkler, Manfred Reitenspiess, Louise Moser Availability Forum [email protected], [email protected],
Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council
Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions July, 2006 Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked
Remote Access Server - Dial-Out User s Guide
Remote Access Server - Dial-Out User s Guide 95-2345-05 Copyrights IBM is the registered trademark of International Business Machines Corporation. Microsoft, MS-DOS and Windows are registered trademarks
Sophos Mobile Control Technical guide
Sophos Mobile Control Technical guide Product version: 2 Document date: December 2011 Contents 1. About Sophos Mobile Control... 3 2. Integration... 4 3. Architecture... 6 4. Workflow... 12 5. Directory
Connect Getting Started Guide. Connect 2.1.1 Getting Started Guide
Connect 2.1.1 Getting Started Guide Page 1 of 22 Internetware Limited, 2008 Welcome...3 Introduction...3 What s new in 2.1...3 Technical Requirements...4 How does Connect work?...5 Application Connectors...5
Before You Begin You must have at least the following: Web Browser Wired Hub/Switch/Router OR Wireless 802.11b Router CD-ROM Drive
This product can be set up using any current Web browser, i.e., Internet Explorer 6.0 or Netscape Navigator 7.0 DCS-1000W D-Link 2.4Ghz Wireless Internet Camera Before You Begin You must have at least
3.5. cmsg Developer s Guide. Data Acquisition Group JEFFERSON LAB. Version
Version 3.5 JEFFERSON LAB Data Acquisition Group cmsg Developer s Guide J E F F E R S O N L A B D A T A A C Q U I S I T I O N G R O U P cmsg Developer s Guide Elliott Wolin [email protected] Carl Timmer [email protected]
OCS Training Workshop LAB14. Email Setup
OCS Training Workshop LAB14 Email Setup Introduction The objective of this lab is to provide the skills to develop and trouble shoot email messaging. Overview Electronic mail (email) is a method of exchanging
Windows Mobile 6.5 Classic Pocket Inventory Install and Setup in Windows XP
One Blue Hill Plaza, 16 th Floor, PO Box 1546 Pearl River, NY 10965 1-800-PC-AMERICA, 1-800-722-6374 (Voice) 845-920-0800 (Fax) 845-920-0880 Windows Mobile 6.5 Classic Pocket Inventory Install and Setup
Using IDENT M System T with Modbus/TCP
Using IDENT M System T with Modbus/TCP Introduction The Pepperl+Fuchs IDENT M System T consists of two models MTT3000-F180-B12- V45-MON, which is a read only unit and the MTT6000-F120-B12-V45 which is
Integrating VoltDB with Hadoop
The NewSQL database you ll never outgrow Integrating with Hadoop Hadoop is an open source framework for managing and manipulating massive volumes of data. is an database for handling high velocity data.
Teltonika FM41XX. Configurator v. 1.0
Teltonika FM41XX Configurator v. 1.0 1. First steps Connect Teltonika FM41XX (PIN1 for plus and PIN11 ground ) to the voltage supply 10-30 V as shown below and GPS, GSM antennas. (GSM is long and thin,
V310 Support Note Version 1.0 November, 2011
1 V310 Support Note Version 1.0 November, 2011 2 Index How to Register V310 to Your SIP server... 3 Register Your V310 through Auto-Provision... 4 Phone Book and Firmware Upgrade... 5 Auto Upgrade... 6
Web Testing, Java Testing, Server Monitoring. AppPerfect Installation Guide
Web Testing, Java Testing, Server Monitoring AppPerfect Installation Guide You will need administrator rights on Windows machines and root access on Linux machine to install AppPerfect products. If you
Using NSM for Event Notification. Abstract. with DM3, R4, and Win32 Devices
Using NSM for Event Notification with DM3, R4, and Win32 Devices Abstract This document explains why Native Synchronization Methods (NSM) is the best solution for controlling synchronization of DM3, R4,
RhoMobile Suite. Develop applications for the next generation of business mobility
RhoMobile Suite Develop applications for the next generation of business mobility With the Motorola Solutions RhoMobile Suite application development platform, you ll never have to write more than one
Developing for MSI Android Devices
Android Application Development Enterprise Features October 2013 Developing for MSI Android Devices Majority is the same as developing for any Android device Fully compatible with Android SDK We test using
ACS 5.x and later: Integration with Microsoft Active Directory Configuration Example
ACS 5.x and later: Integration with Microsoft Active Directory Configuration Example Document ID: 113571 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information
DiskPulse DISK CHANGE MONITOR
DiskPulse DISK CHANGE MONITOR User Manual Version 7.9 Oct 2015 www.diskpulse.com [email protected] 1 1 DiskPulse Overview...3 2 DiskPulse Product Versions...5 3 Using Desktop Product Version...6 3.1 Product
PCI-SIG ENGINEERING CHANGE REQUEST
PCI-SIG ENGINEERING CHANGE REQUEST TITLE: Update DMTF SM CLP Specification References DATE: 8/2009 AFFECTED DOCUMENT: PCIFW30_CLP_1_0_071906.pdf SPONSOR: Austin Bolen, Dell Inc. Part I 1. Summary of the
RedundancyMaster Help. 2014 Kepware Technologies
2014 Kepware Technologies 2 RedundancyMaster Help Table of Contents Table of Contents 2 Introduction 4 System Requirements 10 Accessing the Administration Menu 11 Setting Up Redundancy 11 Adding Redundancy
Introducing the Microsoft IIS deployment guide
Deployment Guide Deploying Microsoft Internet Information Services with the BIG-IP System Introducing the Microsoft IIS deployment guide F5 s BIG-IP system can increase the existing benefits of deploying
Mechanics Bank Mobile Banking Mobile Finance Manager (MFM) Application Windows Mobile Phone Installation
Mechanics Bank Mobile Banking Mobile Finance Manager (MFM) Application Windows Mobile Phone Installation Thank you for your interest in Mechanics Bank Mobile Banking. This guide will help you get started
Novell ZENworks Asset Management
Novell ZENworks Asset Management Administrative Best Practices and Troubleshooting www.novell.com APRIL 19, 2005 2 GETTING THE MOST OUT OF NOVELL ZENWORKS ASSET MANAGEMENT The award-winning asset tracking
Product Comparison List
Product Comparison List Data Center Size Site Solution / Feature
Living Requirements Document: Sniffit
Living Requirements Document: Sniffit RFID locator system Andrew Pang Braulio Fonseca Enrique Gutierrez Nader Khalil Sohan Shah Victor Porter Introduction Sniffit is a handy tracking application that helps
S4000TH HART. HART Communication Manual
HART Communication Manual The information and technical data disclosed in this document may be used and disseminated only for the purposes and to the extent specifically authorized in writing by General
Raytec Milestone Plug-in User Guide Raytec Ltd 2013
Raytec Milestone Plug-in User Guide Raytec Ltd 2013 1 1 Contents 2 Introduction 3 System Requirements 4 Raytec Milestone Plug-in Installation Instructions 5 Using the Raytec Discovery Tool 6 Configuring
Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation
Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia E70 Configuring connection settings Nokia E70 Configuring connection settings Legal Notice Copyright Nokia 2006. All
WIRELESS ACCESS POINT
WIRELESS ACCESS POINT AN-100-AP-I-N AN-300-AP-I-N FCC Warning Changes or modifications not expressly approved by the party responsible for compliance could void the user s authority to operate the equipment.
µtasker Document FTP Client
Embedding it better... µtasker Document FTP Client utaskerftp_client.doc/1.01 Copyright 2012 M.J.Butcher Consulting Table of Contents 1. Introduction...3 2. FTP Log-In...4 3. FTP Operation Modes...4 4.
Deploying Microsoft Operations Manager with the BIG-IP system and icontrol
Deployment Guide Deploying Microsoft Operations Manager with the BIG-IP system and icontrol Deploying Microsoft Operations Manager with the BIG-IP system and icontrol Welcome to the BIG-IP LTM system -
Local Interconnect Network Training. Local Interconnect Network Training. Overview
Overview Local Interconnect Network Training History and introduction Technical features The ISO/OSI reference model and LIN Frames Message Frames Communication concept of LIN Command Frames and Extended
SMTP-32 Library. Simple Mail Transfer Protocol Dynamic Link Library for Microsoft Windows. Version 5.2
SMTP-32 Library Simple Mail Transfer Protocol Dynamic Link Library for Microsoft Windows Version 5.2 Copyright 1994-2003 by Distinct Corporation All rights reserved Table of Contents 1 Overview... 5 1.1
GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android
GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android 1 Table of Contents GO!Enterprise MDM
Monday, April 8, 13. Creating Successful Magento ERP Integrations
Creating Successful Magento ERP Integrations Happy Together Creating Successful Magento ERP Integrations David Alger CTO / Lead Engineer www.classyllama.com A Little About Me Exclusively focused on Magento
NetIQ Advanced Authentication Framework - Smartphone Applications
NetIQ Advanced Authentication Framework - Smartphone Applications User Guide Version 3.0 1 Table of Contents 1 Table of Contents 2 Introduction 3 About This Document 3 System Requirements 4 Install Smartphone
Neuron Event Manager. USER S GUIDE Product Version: 1.17.1
Neuron Event Manager USER S GUIDE Product Version: 1.17.1 Copyright Copyright 1995-2014 Halcyon Monitoring Solutions, Inc. All rights reserved. This product and related documentation is protected by copyright
Resource Utilization of Middleware Components in Embedded Systems
Resource Utilization of Middleware Components in Embedded Systems 3 Introduction System memory, CPU, and network resources are critical to the operation and performance of any software system. These system
Unified Utility Manual Label Printer. Rev. 2.08
Unified Utility Manual Label Printer Rev. 2.08 SRP-770 / 770II / 770IIE SLP-T400 / T400E SLP-T403 / T403E SLP-D420 / D420E SLP-D423 / D423E SLP-D220 / D220E SLP-D223 / D223E SLP-T400R / T403R http://www.bixolon.com
Allen Bradley ControlLogix Ethernet Driver for KEPServerEX
Allen Bradley ControlLogix Ethernet Driver for KEPServerEX Allen-Bradley ControlLogix is a popular Programmable Logic Controller (PLC) model that offers a flexible address space and plenty of processing
Active RFID Solutions for Asset Tracking and Inventory Management
Active RFID Solutions for Asset Tracking and Inventory Management Introduction RFID (Radio Frequency Identification) technology is fast replacing ScanCode technology for asset tracking and inventory management.
Simple Network Management Protocol
CHAPTER 4 This chapter gives an overview of (SNMP). It contains the following sections: Overview, page 4-1 SNMP Versioning, page 4-2 SNMP and Cisco Unified CM Basics, page 4-3 SNMP Basic Commands, page
...2. Standard Installation...4. Example Installation Scenarios...5. Network Installation...8. Advanced Settings...10. Product Requirements
...2. Standard Installation...4. Example Installation Scenarios...5. Network Installation...8. Advanced Settings...10. Product Requirements ProjectMatrix 1 Standard Installation Install ProjectNotify from
Using vcenter Orchestrator AMQP Plug-in
Using vcenter Orchestrator AMQP Plug-in Walkthrough guide TECHNICAL WHITE PAPER Document Title Table of Contents What is vcenter Orchestrator AMQP Plug-in?... 2 AMQP Plug-in Installation... 2 Configure
ValveLink Mobile Software
Quick Start Guide ValveLink Mobile Software Version 4.0 ValveLink Mobile Software ValveLink Mobile software lets you configure, calibrate, and troubleshoot FIELDVUE DVC2000, DVC6000, DVC6000f, DVC6200,
Proliphix. Installer. Remote Management. Guide
Proliphix Installer Remote Management Guide Rev 2.0 Page 2 of 21 Table of Contents 1. Intended Audience...3 2. Remote Management Overview...4 3. Installer Profile Modification...5 4. Remote Management
Ultra Thin Client TC-401 TC-402. Users s Guide
Ultra Thin Client TC-401 TC-402 Users s Guide CONTENT 1. OVERVIEW... 3 1.1 HARDWARE SPECIFICATION... 3 1.2 SOFTWARE OVERVIEW... 4 1.3 HARDWARE OVERVIEW...5 1.4 NETWORK CONNECTION... 7 2. INSTALLING THE
Quick Start Guide: NotifyLink for Symbian Series 60, 3 rd Edition
Quick Start Guide: NotifyLink for Symbian Series 60, 3 rd Edition Service Requirements Your device will require one of the following: Cellular connection supporting data transmission through your mobile
