
Data Collection Wedge Introduction
Start > Settings > Control Panel > Data Collection
This software component is the interface between data collection devices such as bar code scanners, or imagers, externally
connected to a COM port on the Thor VM1 or bar code scanners wirelessly connected via Bluetooth to your Thor VM1. This
software component collects the data from the varied sources and presents it to applications on your Thor VM1 in a transparent
manner.
Note:
When a HID enabled USB scanner is connected to the Thor VM1 the scanned data is transmitted to
the active window as keystroke messages. The data bypasses the data collection wedge. Any data
handling to be applied to the scanned data, for example strip leading or trailing characters, must be
programmed into the scan engine via configuration bar codes or handled by the application accepting
the data.
Use the options on the control panels to set Thor VM1 data collection keyboard wedge parameters, enable or disable allowed
symbologies and assign scan key settings.
Assign baud rate, parity, stop bits and data bits for available COM ports.
Parameters on the Main tab and the COM tab(s) apply to this device only.
Bar code manipulation parameter settings on the
are applied to the incoming data resulting from successful
bar code scans received by the Thor VM1 for processing. The successful bar code scan data may be sent by
l
a wireless Bluetooth Handheld Scanner,
l
or a tethered serial scanner.
3-74
Summary of Contents for THOR VM1
Page 17: ...Components Front View 1 Power Button 2 Speakers 3 Ambient Light Sensor 4 Microphone 1 3 ...
Page 43: ...IBM 3270 Overlay 2 25 ...
Page 162: ...Hat Encoding 3 100 ...
Page 163: ...3 101 ...
Page 175: ...About This tab displays information on the Gobi 2000 radio installed in the Thor VM1 3 113 ...
Page 179: ...3 117 ...
Page 199: ...Enter user name password and domain to be used when logging into network resources 3 137 ...
Page 206: ...3 144 ...
Page 220: ...3 158 ...
Page 228: ...4 8 ...
Page 301: ...Click the Request a certificate link Click on the advanced certificate request link 6 45 ...
Page 302: ...Click on the Create and submit a request to this CA link 6 46 ...
Page 312: ...7 4 ...
Page 318: ... Shift 9 Shift 0 8 6 ...