1 - Introduction
iDynamo 5 and iDynamo 5 (Gen II)| Secure Card Reader Authenticator | Installation and Operation Manual
Page 12 of 33 (
D99875473-120
)
1.5
About Solution Planning
Smooth deployment of an iDynamo solution requires some up-front planning and decision-making:
Determine the overall
functional requirements
and desired
user experience
of the solution
iDynamo will be integrated into. For example, how iDynamo and its host will be physically
presented
to the cardholder. This includes whether the solution will be handheld or permanently
mounted in a stand or enclosure, and whether the solution is intended to be used in portrait or
landscape orientation. When planning placement, be sure to consider:
a)
Power source availability
. For example, permanently mounted solutions should be within
reasonable cabling distance from the power source; handheld solutions need a designated secure
location with charging power available.
b)
Ergonomics
. For example, make sure there is adequate clearance for operators or cardholders to
easily find the critical components of the device, and swipe a card.
Determine what
documentation
and
training
will be required from solution design through testing
and field deployment. For example, it may be necessary to develop a solution-specific installation
procedure for technicians, and training materials for operators.
Determine what type of
host
iDynamo is appropriate for your solution, and use
to determine which adapters and
provides detailed information about each adapter. When
planning, include any additional support or devices required by the host, such as physical locations,
mounting, and power connections.
Determine how the host and iDynamo will be
mounted
.
Determine what
software
will be installed on the host and how it will be configured. Software can
include operating system, transaction processing software, security software, and so on. Include any
additional support required by the software, such as network connections.
Determine how iDynamo should be
configured
, and specify that when you order devices. MagTek
or your reseller can advise. For deep detail about configuration options and how they affect device
behavior, see
D998200309 iDynamo 5 (Gen II) Programmer’s Manual (COMMANDS)
,
available from MagTek.
Determine how the solution will be powered. iDynamo provides a USB port for pass-through
charging of the connected iOS host, or can draw power from the iOS host in handheld solutions. In a
handheld solution using the host’s power, determine the
battery recharge
schedule(s)
. For example,
in high-traffic mission-critical solutions, it may be wise to keep spares configured and charged for
fast swap-out.
Determine how iDynamo will be
branded
. In large quantities, MagTek can accommodate custom
branding colors and trade dress. Contact a representative for details.
Determine how the solution will be
tested
and, if appropriate, how it will be
certified
.
Determine how the solution will be
maintained
. See section
maintaining the iDynamo portion of the solution.
Determine how the solution will be
regularly inspected
for tampering, unauthorized added
components such as eavesdropping or skimming devices, and so on. Proper inspection requires
additional solution-specific training, instructions, and visual references.