Datalogic S r l JX2WB JOYA X2 Plus Mobile Computer User Manual I

Datalogic ADC S.r.l. JOYA X2 Plus Mobile Computer I

user manual I

   Datalogic JOYATM X2 R2U ”Ready to Use”        User Guide
   Datalogic ADC, S.r.l. Via S. Vitalino, 13 40012 Lippo di Calderara di Reno Bologna - Italy Telephone: (+39) 051-3147011  Fax: (+39) 051-3147205  ©2014 Datalogic ADC, S.r.l. An  Unpublished  Work  -  All  rights  reserved.  No  part  of  the  contents  of  this documentation  or  the  procedures  described  therein  may  be  reproduced  or transmitted  in  any  form  or  by  any  means  without  prior  written  permission  of Datalogic ADC, S.r.l. or its subsidiaries or affiliates ("Datalogic" or “Datalogic ADC”). Owners  of  Datalogic  products  are  hereby  granted  a  non-exclusive,  revocable license  to  reproduce  and  transmit  this  documentation  for  the  purchaser's  own internal  business  purposes.  Purchaser  shall  not  remove  or  alter  any  proprietary notices,  including  copyright  notices,  contained  in  this  documentation  and  shall ensure that  all notices  appear on any reproductions  of the  documentation. Should future  revisions  of this  manual  be published,  you can  acquire  printed  versions  by contacting  your  Datalogic  representative.  Electronic  versions  may  either  be downloadable  from  the  Datalogic  website  (www.datalogic.com)  or  provided  on appropriate  media.  If  you  visit  our  website  and  would  like  to  make  comments  or suggestions  about this  or  other  Datalogic publications, please let us know  via  the "Contact Datalogic" page.   Disclaimer Datalogic has taken reasonable measures to provide information in this manual that is  complete  and  accurate,  however,  Datalogic  reserves  the  right  to  change  any specification at any time without prior notice. Datalogic and the Datalogic logo are registered  trademarks  of  Datalogic  S.p.A.  in  many  countries,  including  the U.S.A. and the E.U.  Joya  is  a  trademark  of  Datalogic  ADC  S.r.l.  and  the  Joya  logo  is  a  registered trademark of Datalogic ADC S.r.l. in the U.S.A. and the E.U. All other brand and product names may be trademarks of their respective owners.  Patents  See www.patents.datalogic.com for patent list. This product is covered by one or more of the following patents: Design patents: AU323628, EP000891544, USD613289, ZL200830146270.9 Utility patents: EP0789315B1, EP1128315B1, EP1396811B1, EP1413971B1, US5992740, US6808114, US6997385, US7387246, US7620475
 ii             Datalogic ADC S.r.l. Via S. Vitalino 13  40012 - Lippo di Calderara di Reno Bologna - Italy   Datalogic JOYA™  X2 R2U - User's Manual   Ed.:  REG REV3          ALL RIGHTS RESERVED The  Datalogic  name  and  logo  are  registered  trademarks  of  Datalogic  S.p.A.  in  many countries.  The JOYA name and logo are a trademarks of Datalogic ADC S.r.l. All other brand and product names mentioned herein are for identification purposes only and may be trademarks or registered trademarks of their respective owners.   Datalogic  reserves  the  right  to  make  modifications  and  improvements  without  prior notification.  Datalogic shall not be liable for technical or editorial errors or omissions contained herein, nor for incidental or consequential damages resulting from the use of this material.  © 2008 Datalogic ADC S.r.l. • All rights reserved. • Protected to the fullest extent under U.S. and international laws. • Copying, or altering of this document is prohibited without express written consent from Datalogic  ADC S.r.l.
  iii  CONTENTS  1 INTRODUCTION ............................................................................. 17 1.1 Datalogic JOYA™ X2 Description ................................................... 17 1.2 Model Description ........................................................................... 17 1.3 Package Contents ........................................................................... 19 1.4 Accessories .................................................................................... 19 2 CONNECTIONS .............................................................................. 20 2.1 USB Connection.............................................................................. 20 2.2 WLAN Connection .......................................................................... 22 2.3 WPAN Connections ........................................................................ 23 3 USE AND FUNCTIONING............................................................... 24 3.1 Startup ............................................................................................ 24 3.2 Avalanche Enabler .......................................................................... 27 3.3 Wavelink Avalanche System ........................................................... 28 3.4 Avalanche Management console .................................................... 29 3.4.1 Network profile ................................................................................ 29 3.4.2 ScanToConfig Profile ...................................................................... 31 3.4.3 Software profile ............................................................................... 34 3.4.4 DLdcu package ............................................................................... 36 3.5 Avalanche package builder ............................................................. 40 3.5.1 Wavelink software package ............................................................. 40 3.6 Datalogic configuration utility ........................................................... 41 3.6.1 Create JOYA™ X2 configuration profile .......................................... 42 3.7 Using the Stylus (available only on JOYA™ X2 Plus) ...................... 43 3.8 Data Capture ................................................................................... 43 3.8.1 Imager Data Capture ....................................................................... 44 3.9 Description of the Keys ................................................................... 47 3.9.1 Resetting the JOYA™ X2 ................................................................ 48 3.10 Status Indicators ............................................................................. 50 3.10.1 Taskbar ........................................................................................... 50 3.11 Data Capture Configuration ............................................................. 51 3.11.1 Configure ........................................................................................ 51 3.12 Control Panel .................................................................................. 60 3.12.1 Registry ........................................................................................... 60 3.12.2 Using Summit Radio Card Utility ..................................................... 61 3.12.3 Summit Radio Card : Starting client ................................................ 61 3.12.4 Summit Radio Card : Main screen ................................................... 62 3.12.5 Summit Radio Card : Profile screen ................................................ 63 3.12.6 Summit Radio Card : Status screen ................................................ 63 3.12.7 Summit Radio Card : Diagnostic screen .......................................... 65 3.12.8 Summit Radio Card : Global Settings screen .................................. 66 3.13 Stylus Calibration ............................................................................ 67 3.14 Windows Connections ..................................................................... 68 3.14.1 Microsoft® ActiveSync® .................................................................. 68 3.14.2 Microsoft® Windows Mobile Device Center® .................................. 68 3.14.3 ActiveSync® Remote ...................................................................... 68 3.14.4 Bluetooth® Manager Device Setup ................................................. 69 3.14.5 FTP Server Setup ........................................................................... 72
 iv    3.15 Backup Directory File Management................................................. 73 3.16 Firmware Update ............................................................................. 75 3.16.1 Retrieving a Firmware Image Update .............................................. 75 3.16.2 Firmware Update Procedure ........................................................... 76 3.17 DAatalogic Configuration Utility ....................................................... 77 3.18 Datalogic Desktop Utility ................................................................. 77 4 MAINTENANCE .............................................................................. 78 4.1 Charging the Battery Pack .............................................................. 78 4.2 Replacing the Battery Pack ............................................................. 79 4.3 Cleaning the Mobile Computer ........................................................ 83 5 JOYA CRADLE DISPENSER ......................................................... 84 5.1 Introduction ..................................................................................... 84 5.2 Accessories .................................................................................... 84 5.3 Installation requirements ................................................................. 85 5.3.1 Base Unit Construction Details ........................................................ 86 5.3.2 JOYA Cradle Dispenser Supports ................................................... 87 5.3.3 Internal Cabinet Space and Openings ............................................. 88 5.3.4 Anchoring and Maintenance Issues................................................. 88 5.3.5 Power Supply Positioning and Cooling ............................................ 88 5.3.6 AC Power Cabling ........................................................................... 89 5.3.7 Wiring ............................................................................................. 90 5.3.8 Cable to Power Supply Connection ................................................. 92 5.3.9 Affixing Cables to Cabinet ............................................................... 92 5.3.10 Safety Precautions .......................................................................... 92 5.3.11 Connection to AC Line Voltage ....................................................... 94 5.4 JOYA™ X2 cradle dispenser firmware ............................................ 95 5.4.1 JOYA Cradle Tool installation ......................................................... 95 5.4.2 Starting program ............................................................................. 95 5.4.3 Reading firmware version ................................................................ 96 5.4.4 Firmware update procedure ............................................................ 97 5.5 JOYA™X2/JOYA cradle dispenser connection ............................. 100 5.6 Configuration ................................................................................. 100 5.7 Use and functioning ...................................................................... 100 6 TECHNICAL FEATURES .............................................................. 102 6.1 JOYATM X2 technical datasheet .................................................... 102 7 TEST CODES ............................................................................... 103 8 GLOSSARY .................................................................................. 106
  v    DATALOGIC END USER LICENSE AGREEMENT   BY  DOWNLOADING  OR  INSTALLING  THE  SOFTWARE,  OR  BY  USING  DATALOGIC EQUIPMENT  THAT  INCLUDES  THIS  SOFTWARE,  YOU  ARE  CONSENTING  TO  BE BOUND BY THIS AGREEMENT. IF YOU DO NOT AGREE TO ALL OF THE TERMS OF THIS AGREEMENT, THEN DO NOT DOWNLOAD, INSTALL, USE THE SOFTWARE NOR DATALOGIC EQUIPMENT. The following terms and conditions govern your use of the Software except to the extent that a particular program (a) is the subject of a separate written agreement with Datalogic or (b) includes a separate “click-on”  license  agreement  as  part  of  the  installation  and/or  download  process.  Should  a  conflict  arise between  the  provisions  of  the  foregoing  documents,  the  order  of  precedence  shall  be  (1)  the  written agreement, (2) the click-on agreement, and (3) this agreement (“Agreement”).  1. License. Subject to the terms and conditions of and except as otherwise provided in this Agreement, Datalogic  ADC  S.r.l.  (“Datalogic”)  and its  suppliers  grant  to Customer (“Customer”) a  nonexclusive and nontransferable  license to use the specific  program modules, feature set(s)  or feature(s) in object code form only  as  well  as  associated  media,  printed  materials  and  “online”  or  electronic  documentation  (the “Software”) for which Customer has paid, if required, the license fees. The Software is licensed not sold. The license shall be subject to each of the following limitations: •  Unless otherwise expressly provided in the documentation, Customer shall use the Software solely as embedded in, for execution on, or (where the applicable documentation permits installation on non-Datalogic  equipment)  for  communication  with  Datalogic  equipment  owned  or  leased  by Customer; •  Customer’s use of the Software shall be limited to use on a single hardware chassis, on a single central  processing  unit,  as  applicable,  or  use  on  such  greater  number  of  chassis  or  central processing units as Customer may have paid Datalogic the required license fee; and •  Customer’s  use  of  the  Software  shall  also  be  limited,  as  applicable  and  set  forth  in  Customer’s purchase order or in Datalogic’s product catalog, user documentation, or web site, to a maximum number  of  (a)  seats  (i.e.  users  with  access  to  the  installed  Software),  (b)  concurrent  users, sessions,  ports,  and/or  issued  and  outstanding  IP  addresses,  and/or  (c)  central  processing  unit cycles or instructions per second. Customer’s use of the Software shall also be limited by any other restrictions  set  forth  in  Customer’s  purchase  order  or  in  Datalogic’s  product  catalog,  user documentation or web site for the Software.  2.  General  Limitations.  Except as otherwise expressly provided under this Agreement, Customer shall have no right, and Customer specifically agrees not to (i) transfer, assign or sublicense its license rights to any other person, or use the Software on unauthorized or secondhand Datalogic equipment, and any such attempted transfer, assignment or sublicense shall be void; (ii) correct errors to or otherwise modify or adapt the Software or create derivative works based upon the Software, or to permit third parties to do the same; or (iii) decompile, decrypt, reverse engineer, disassemble or otherwise reduce the Software to human-readable form to gain access to trade secrets or confidential information in the Software. To the extent  required  by  law,  at  Customer's  request,  Datalogic  shall  provide  Customer  with  the  interface information needed to achieve interoperability between the Software and another independently created program,  upon  payment  of  Datalogic's  applicable  fee.  Customer  shall  observe  strict  obligations  of confidentiality with respect to such information.  3. Upgrades and Additional Copies. For purposes of this Agreement, “Software” shall include (and the terms  and  conditions  of  this  Agreement  shall  apply  to)  any  upgrades,  updates,  bug  fixes  or  modified versions (collectively, “Upgrades”) or backup copies of the Software licensed or provided to Customer by Datalogic  or  an  authorized  distributor  for  which  Customer  has  paid  the  applicable  license  fees. Notwithstanding any other provision of this Agreement: (1)  customer has no license  or right to use any such  additional  copies  or  upgrades  unless  customer,  at  the  time  of  acquiring  such  copy  or  upgrade, already holds a valid license to the original Software and has paid the applicable fee for the upgrade, if required;  (2)  use  of  upgrades  is  limited  to  Datalogic  equipment for  which  customer is  the  original  end user,  purchaser  or  lessee  or  who  otherwise  holds  a  valid  license  to  use  the  Software  which  is  being upgraded; and (3) use of additional copies is limited to backup purposes only.  4. Proprietary  Notices.  Customer agrees to maintain and reproduce all copyright and other proprietary notices on all copies, in any form, of the Software in the same form and manner that such copyright and other proprietary notices are included on the Software. Except as expressly authorized in this Agreement, Customer shall not make any copies or duplicates or any Software without the prior written permission of Datalogic. Customer may make such backup copies of the Software as may be necessary for Customer’s
 vi    lawful use, provided Customer affixes to such copies all copyright, confidentiality, and proprietary notices that appear on the original. 5.  Protection  of  Information.  Customer  agrees  that  aspects  of  the  Software  and  associated documentation, including the specific design and structure of individual programs, constitute trade secrets and/or  copyrighted  material  of  Datalogic.  Customer  shall  not  disclose,  provide,  or  otherwise  make available such trade secrets or copyrighted material in any form to any third party without the prior written consent  of  Datalogic.  Customer  shall  implement  reasonable  security  measures  to  protect  such  trade secrets and copyrighted material. Software and documentation shall remain solely property of Datalogic.  6. Limited Warranty. If Customer obtained the Software directly from Datalogic, then Datalogic warrants that during the Warranty Period (as defined below): (i) the media on which the Software is furnished will be free of defects in materials and workmanship under normal use; and (ii) the Software will substantially conform to its published specifications. The “Warranty Period” means a period beginning on the date of Customer’s receipt of the Software and ending on the later of (a) ninety (90) days from the date of initial shipment of the Software by Datalogic, or (b) the end of the minimum period required by the law of the applicable jurisdiction. The limited warranties extend only to Customer as the original licensee. Customer's sole and exclusive remedy and the entire liability of Datalogic and its suppliers under these limited warranties will be, at Datalogic’s sole option, repair or replacement of the Software if reported (or, upon request, returned) to Datalogic. Except as expressly granted in this Agreement, the Software is provided AS IS and with all faults. Datalogic does not warrant that the  Software  is  error  free  or  that  Customer  will  be  able  to  operate  the  Software  without  problems  or interruptions. In addition, due to the continual development of new techniques for intruding upon and attacking networks,  Datalogic  does not warrant that the Software or any equipment, system or network on which the Software is used will be free of vulnerability to intrusion or attack. This warranty does not apply if the Software (a) is licensed for beta, evaluation, testing or demonstration purposes for which Datalogic does not receive a license  fee,  (b)  has  been  altered,  except  by  Datalogic,  (c)  has  not  been  installed, operated,  repaired,  or maintained in accordance with instructions supplied by Datalogic, (d) has been subjected to abnormal physical or electrical stress, misuse, negligence, or accident, or (e) is used in ultra hazardous activities. If Customer obtained  the  Software  from  a  Datalogic  reseller, the  terms  of  any  warranty  shall  be  as  provided  by  such distributor, and Datalogic provides Customer no warranty with respect to such Software. The Software may contain  support  for  programs  written  in  Java.  Java  technology  is  not  fault  tolerant  and  is  not  designed, manufactured, or intended for use or resale as online control equipment in hazardous environments requiring fail-safe  performance,  such  as  in  the  operation  of  nuclear  facilities,  aircraft  navigation  or  communication systems,  air  traffic  control,  direct  life  support  machines, or weapons systems, in  which the  failure  of Java technology could lead directly to death, personal injury, or severe physical or environmental damage. Microsoft Inc. has contractually obligated Datalogic to make this disclaimer.  7.  Disclaimer  of  Warranties.  Except  as  specified  in  this  warranty,  all  expressed  or  implied  conditions, representations,  and  warranties  including,  without  limitation,  any  implied  warranty  or  condition  of merchantability, fitness for a particular purpose, non-infringement, satisfactory quality or arising from a course of dealing, usage, or trade practice, are hereby excluded to the extent allowed by applicable law. To the extent that an implied warranty cannot be excluded, such warranty is limited in duration to the warranty period.  8. Disclaimer of Liabilities. In no event will Datalogic or its suppliers be liable for any lost revenue, profit, or  data,  or  for  special,  indirect,  consequential,  incidental,  or  punitive  damages  however  caused  and arising  out  of  the  use  of  or  inability  to  use  the  Software  even  if  Datalogic  has  been  advised  of  the possibility of such damages. In no event shall Datalogic or its suppliers' liability to customer, whether in contract,  tort  (including  negligence),  or  otherwise,  exceed  the  price  paid  by  customer.  The  foregoing limitations shall apply even if the above-stated warranty fails of its essential purpose.  9.  Term  and  Termination.  This  Agreement  is  effective  until  terminated.  Customer  may  terminate  this Agreement  at  any  time  by  destroying  all  copies  of  Software  including  any  documentation.  Customer’s license rights under this Agreement will terminate immediately without notice from Datalogic if Customer fails to comply with any provision of this Agreement.  Upon termination, Customer must destroy all copies of Software in its possession or control.  10.  Customer  Records.  Customer  grants  to  Datalogic  and  its  independent  accountants  the  right  to examine  Customer’s  books,  records  and  accounts  during  Customer’s  normal  business  hours  to  verify compliance with this Agreement. In the event such audit discloses non-compliance with this Agreement, Customer shall promptly pay to Datalogic the appropriate license fees.  11.  General  Provisions. This  Agreement shall  be  governed  by  and  construed  in  accordance  with  the laws  of  Italy.  All  disputes  arising  out  of  or  in  connection  with  this  Agreement  will  be  subject  to  the exclusive jurisdiction of the competent Court of the place where Datalogic has its registered office. If any portion  hereof  is  found  to  be  void  or  unenforceable,  the  remaining  provisions  of  this  Agreement  shall remain in full force and effect. Except as expressly provided herein, this Agreement constitutes the entire agreement between the parties with respect to the license of the Software and supercedes any conflicting or additional terms contained in the purchase order.
INTRODUCTION   1  1 REFERENCES   CONVENTIONS   This manual uses the following conventions:  "JOYA  ™  X2"  refers  to  all  possible  JOYA  ™  X2  hardware  configurations, unless otherwise specified.  “User” refers to anyone using a Datalogic JOYA™ X2 mobile computer. “Mobile computer” and "Datalogic JOYA™" refer to Datalogic JOYA™ X2. “You” refers to the System Administrator or Technical Support person using this manual  to  install,  configure,  operate,  maintain  or  troubleshoot  a  Datalogic JOYA™ X2. “Cradle” refers to Datalogic JOYA™ X2 Cradle Dispenser.   REFERENCE DOCUMENTATION   For further information regarding Datalogic  JOYA™  X2 refer to the SDK Help on-Line.
DATALOGIC JOYA™ X2 2    1 SAFETY REGULATIONS    Read  this  manual  carefully  before  performing  any  type  of connection to the Datalogic JOYA™ X2 mobile computer. The user  is  responsible  for  any  damages  caused  by  incorrect use  of  the  equipment  or  by  inobservance  of  the  indication supplied in this manual. NOTE   GENERAL SAFETY RULES  −  Use  only  the  components  supplied  by  the  manufacturer  for  the  specific Datalogic JOYA™ X2 being used. −  Do  not  attempt  to  disassemble  the  Datalogic  JOYA™  X2  mobile computer,  as  it does  not  contain parts  that can be  repaired by the user. Any tampering will invalidate the warranty. −  When replacing the battery pack or at the end of the operative life of the Datalogic  JOYA™  X2  mobile  computer,  disposal  must  be  performed  in compliance with the laws in force.  −  Before using the device and the battery pack, see par. 0 and read every warnings about the device and the battery pack. −  Do not submerge the Datalogic JOYA™ X2 in liquid products. −  The Datalogic  JOYA™ X2 is  designed and labelled to  be compliant with laws, rules and regulations in force in the countries where it is sold. −  For further information, refer to this manual and to the Datalogic ADC web site: http://www.adc.datalogic.com.  BLUETOOTH® APPROVAL  For Bluetooth ® approval visit:  https://www.bluetooth.org/tpg/QLI_viewQDL.cfm?qid=23316
INTRODUCTION   3  1  FCC COMPLIACE – JOYA X2  FCC Regulations:      • This device complies with part 15 of the FCC Rules. Operation is subject to the  following  two  conditions:  (1)  This  device  may  not  cause  harmful interference,  and  (2)  this  device  must  accept  any  interference  received, including interference that may cause undesired operation.      • This device has been tested and found to comply with the limits for a Class B  digital    device,  pursuant  to  Part  15  of  the  FCC  Rules.  These  limits  are designed to provide reasonable protection against harmful interference in a residential  installation.  This  equipment  generates,  uses  and  can    radiated radio frequency energy and, if not installed and used  in accordance with the instructions,  may  cause  harmful    interference  to  radio  communications. However,  there  is  no  guarantee  that  interference    will    not    occur    in    a particular installation If this equipment does cause harmful interference  to radio  or  television  reception,  which  can  be  determined  by  turning  the equipment    off  and  on,  the  user  is  encouraged  to  try  to  correct  the interference by one or more of the following measures:      -  Reorient or relocate the receiving antenna.   -  Increase the separation between the equipment and receiver.   -  Connect the equipment into an outlet on a circuit different from that to which  the receiver is connected.   -  Consult the dealer or an experienced radio/TV technician for help.     Change or Modifications that are not expressly approved by the manufacturer could void the user's authority to operate the equipment  The FCC/IC ID is located behind the battery. The product is sold without the battery installed.
DATALOGIC JOYA™ X2 4    1   RF EXPOSURE INFORMATION (SAR)     This device meets the government’s requirements for exposure to radio waves. This device is designed and manufactured not to exceed the emission limits for exposure  to radio  frequency  (RF)  energy set by the Federal Communications Commission of the U.S. Government.     The  exposure  standard  for  wireless  devices  employs  a  unit  of  measurement known as the Specific Absorption Rate, or SAR. The SAR limit set by the FCC is  1.6W/kg.  Tests  for SAR are  conducted  using  standard  operating  positions  accepted by the FCC with the device transmitting at its highest certified power level  in  all  tested  frequency  bands.  Although  the  SAR  is  determined  at  the highest certified power level, the actual SAR level of the device while operating can be well below the maximum value. This is because the device is designed  to operate at multiple power levels so as to use only the poser required to reach the network. In general, the closer you are to a wireless base station antenna, the lower the power output.     While there may be differences between the SAR levels of various devices and  at various positions, they all meet the government requirement.     For  body  worn  operation,  this  device  has  been  tested  and  meets  FCC  RF exposure guidelines when used with an accessory that contains no metal and that positions the handset  a minimum distance of 0 cm from the body.  The maximum SAR value is  0,748 W/kg for Body   Use of other  accessories  may  not  ensure  compliance  with  FCC  RF  exposure guidelines.      The FCC has granted an Equipment Authorization for this model device with all  reported SAR levels evaluated as in compliance with the FCC RF exposure  guidelines. SAR information on this
INTRODUCTION   5  1 model device is on file with the FCC and  can be found under the Display Grant section of http://www.fcc.gov/oet/fccid   after searching on the below FCC IDs:   FCC ID: U4GJX2WB  (for models with  WLAN and BT) FCC ID: U4GJX2W  (for model with WLAN only)   This  device  is  compliant  with  SAR  for  general  population  /uncontrolled exposure limits  in  ANSI/IEEE C95.1-1999 and had been tested in accordance with the measurement methods and procedures specified in OET Bulletin 65  Supplement C.     INDUSTRY CANADA COMPLIANCE – JOYA X2   This  device  complies  with  Industry  Canada  licence-exempt  RSS  standard(s).  Operation  is  subject    to  the  following  two  conditions:  (1)  this  device  may not cause interference, and (2) this device must accept any interference, including interference that may cause undesired operation of the device.    This Class B digital apparatus complies with Canadian ICES-003.     This  device  and  its  antenna(s)  must  not  be  co-located  or  operating  in conjunction with any other antenna or transmitter.     The  County  Code  Selection  feature  is  disabled  for  products  marketed  in  the US/Canada.     Le présent appareil est conforme aux CNR d'Industrie Canada applicables aux appareils  radio  exempts  de  licence.  L'exploitation  est  autorisée  aux  deux conditions  suivantes :  (1)  l'appareil  ne  doit  pas  produire  de  brouillage,  et  (2)  l'appareil  doit  accepter  tout  brouillage  radioélectrique  subi,  même  si  le brouillage est susceptible d'en compromettre le fonctionnement.  Cet appareil numérique de la classe B est conforme à la norme NMB-003 du Canada.     This Class B digital apparatus complies with Canadian ICES-003. Cet appareil numérique de la classe B est conforme à la norme NMB-003 du Canada.
DATALOGIC JOYA™ X2 6    1    Ce dispositif  et ses antennes ne doivent pas être co-implantés ou utilisés avec une autre antenne ou an autre émetteur     La  fonction  de  sélection  de  code  de  pays  est  désactivée  pour  les  produits commercialisés en Etats-Unis / Canada      IC RADIATION EXPOSURE STATEMENT  This EUT is compliant with SAR for general population/uncontrolled exposure limits in IC RSS-102 and had been tested in accordance with the measurement  methods and procedures specified in IEEE 1528. This equipment can be installed and operated with minimum distance of 0 cm between the radiator &  your body.    SAR COMPLIANCE    This product has been tested and found to comply with the following standards:    •  The portable device JOYA X2 from Datalogic is in compliance with the IC RSS  102  Issue  4  [RSS  102]  and  Federal  Communications  Commission (FCC) Guidelines [OET 65] for uncontrolled exposure. SAR assessment in body  worn  was  conducted  with  the  back  of  the  device  in  direct  contact  against the flat phantom.  •  The portable device Joya ™ X2 from Datalogic is in compliance European Standard EN 50566: Product standard to demonstrate compliance of radio frequency fields from handheld and body-mounted wireless communication  devices used by the general public (30 MHz - 6 GHz)
INTRODUCTION   7  1 WEEE COMPLIANCE            Informazione degli utenti ai sensi della Direttiva Europea 2012/19/EC    L’apparecchiatura  che  riporta  il  simbolo  del  bidone  barrato  deve  essere  smaltita, alla fine della sua vita utile, separatamente dai rifiuti urbani.    Smaltire l’apparecchiatura in conformità alla presente Direttiva consente di:    Evitare possibili conseguenze negative per l’ambiente e per la salute  umana che potrebbero invece essere causati dall’errato smaltimento  dello stesso;    Recuperare  materiali  di  cui  è  composto  al  fine  di  ottenere  un  importante risparmio di energia e di risorse.    Per maggiori  dettagli  sulle  modalità di smaltimento, contattare il Fornitore dal  quale è stata acquistata l’apparecchiatura o consultare la sezione dedicata sul  sito www.datalogic.com.        Information  for  the  user  in  accordance  with  the  European  Commission  Directive 2012/19/EC
DATALOGIC JOYA™ X2 8    1 At the end of its useful life, the product marked with the crossed out wheeled  wastebin must be disposed of separately from urban waste.    Disposing of the product according to this Directive:    avoids  potentially  negative  consequences  to  the  environment  and  human health which otherwise could be caused by incorrect disposal    enables  the  recovery  of  materials  to  obtain  a  significant  savings  of  energy and resources.    For more detailed information about disposal, contact the supplier that provided  you with the product in question or consult the dedicated section at the website  www.datalogic.com.   Information  aux  utilisateurs  concernant  la  Directive  Européenne  2012/19/EC    Au terme de sa vie utile, le produit qui porte le symbole d'un caisson à ordures  barré ne doit pas être éliminé avec les déchets urbains.    Éliminer ce produit selon cette Directive permet de:    éviter  les  retombées  négatives  pour  l'environnement  et  la  santé  dérivant d'une élimination incorrecte    récupérer  les  matériaux  dans  le  but  d'une  économie  importante  en  termes d'énergie et de ressources    Pour  obtenir  des  informations  complémentaires  concernant  l'élimination,  veuillez contacter le fournisseur auprès duquel vous avez acheté le produit ou  consulter la section consacrée au site Web www.datalogic.com.
INTRODUCTION   9  1 Información  para  el  usuario  de  accuerdo  con  la  Directiva  Europea  2012/19/CE    Al final de su vida útil, el producto marcado con un simbolo de contenedor de  bassura móvil tachado no debe eliminarse junto a los desechos urbanos.    Eliminar este producto de accuerdo con la Directiva permite de:    evitar posibles consecuencias negativas para el medio ambiente y la  salud derivadas de una eliminación inadecuada    recuperar  los  materiales  obteniendo  así  un  ahorro  importante  de  energía y recursos    Para  obtener  una  información  más  detallada  sobre  la  eliminación,  por  favor,  póngase en contacto con el proveedor donde lo compró o consultar la sección  dedicada en el Web site www.datalogic.com.        Benutzerinformation  bezüglich  Richtlinie  2012/19/EC  der  europäischen  Kommission    Am Ende des Gerätelebenszyklus darf das Produkt nicht über den städtischen  Hausmüll entsorgt werden. Eine entsprechende Mülltrennung ist erforderlich.     Beseitigung des Produkts entsprechend der Richtlinie:    verhindert negative Auswirkungen für die Umwelt und die Gesundheit  der Menschen    ermöglicht  die  Wiederverwendung  der  Materialien  und  spart  somit  Energie und Resourcen.
DATALOGIC JOYA™ X2 10    1 Weitere  Informationen  zu  dieser  Richtlinie  erhalten  sie  von ihrem Lieferanten  über den sie das Produkt erworben haben, oder besuchen sie unsere Hompage  unter www.datalogic.com.
INTRODUCTION   11  1   WIRELESS AND RADIO FREQUENCIES WARNINGS   Most modern electronic equipment is shielded from RF signals. However,  certain  electronic  equipment  may  not  be  shielded against the RF signals generated by Datalogic Joya™. WARNING    Datalogic  recommends  persons  with  pacemakers  or  other medical devices to follow the same recommendations provided by  Health  Industry  Manufacturers  Associations  for  mobile phones. Persons with pacemakers: • Should  ALWAYS  keep  this  device  more  than  twenty  five (25)  cm  from  their  pacemaker  and/or  any  other  medical device; • Should not carry this device in a breast pocket; • Should  keep  the  device  at  the  opposite  side  of  the pacemaker and/or any other medical device; • Should turn this device OFF or move it immediately AWAY  if there is any reason to suspect that interference is taking place. • Should  ALWAYS  read  pacemaker  or  any  other  medical device  guides  or  should  consult  the  manufacturer  of  the medical  device  to  determine  if  it  is  adequately  shielded from external RF energy. In case of doubt concerning the use of wireless devices with an implanted medical device, contact your doctor. WARNING   Turn  this  device  OFF  in  health  care  facilities  when  any regulations  posted  in  these  areas  instruct  you  to  do  so. Hospitals or health care facilities may use equipment that could be sensitive to external RF energy. WARNING  Turn  off  the  device  when  in  any  area  with  a  potentially explosive  atmosphere.  Observe  restrictions  and  follow  closely any laws,  regulations, warnings  and best  practices  on the use of  radio  equipment  near  fuel  storage  areas  or  distribution  fuel
DATALOGIC JOYA™ X2 12    1 WARNING  areas, chemical plants or where some operation involves use of explosive materials.  Do  not  store  or  carry  flammable  liquids,  explosive  gases  or materials with the device or its parts or accessories.  Areas with a potentially explosive atmosphere are often, but not always, clearly marked or showed.  Sparks in such areas could cause an explosion or fire, resulting in injury or even death.   PATENTS  This product is covered by one or more of the following patents. Design Pat.: EP 891,544; AU 323,628; US D 613,289 S; ZL 200830146270.9. U.S.  Pat.  Nos:  5,992,740;  6,808,114  B1;  6,997,385  B2;  7,387,246  B2; 7,620,475 B2. European Pat. Nos: 789,315 B1; 1,128,315 B1; 1,396,811 B1; 1,413,971 B1. Additional patents pending.  WEEE COMPLIANCE     Informazione degli utenti ai sensi della Direttiva Europea 2012/19/EC  L’apparecchiatura  che  riporta  il  simbolo  del  bidone  barrato  deve  essere smaltita, alla fine della sua vita utile, separatamente dai rifiuti urbani.  Smaltire l’apparecchiatura in conformità alla presente Direttiva consente di:   Evitare possibili conseguenze negative per l’ambiente e per la salute umana che potrebbero invece essere causati dall’errato smaltimento dello stesso;   Recuperare  materiali  di  cui  è  composto  al  fine  di  ottenere  un importante risparmio di energia e di risorse.  Per maggiori  dettagli  sulle  modalità di smaltimento, contattare il  Fornitore dal quale è stata acquistata l’apparecchiatura o consultare la sezione dedicata sul sito www.ADC.datalogic.com.    Information  for  the  user  in  accordance  with  the  European  Commission Directive 2012/19/EC
INTRODUCTION   13  1  At the end of its useful life, the product marked with the crossed out wheeled wastebin must be disposed of separately from urban waste.  Disposing of the product according to this Directive:   avoids  potentially  negative  consequences  to  the  environment  and human health which otherwise could be caused by incorrect disposal   enables  the  recovery  of  materials  to  obtain  a  significant  savings  of energy and resources.  For more detailed information about disposal, contact the supplier that provided you with the product in question or consult the dedicated section at the website www.ADC.datalogic.com.
DATALOGIC JOYA™ X2 14    1 Information  aux  utilisateurs  concernant  la  Directive  Européenne 2012/19/EC  Au terme de sa vie utile, le produit qui porte le symbole d'un caisson à ordures barré ne doit pas être éliminé avec les déchets urbains.  Éliminer ce produit selon cette Directive permet de:   éviter  les  retombées  négatives  pour  l'environnement  et  la  santé dérivant d'une élimination incorrecte   récupérer  les  matériaux  dans  le  but  d'une  économie  importante  en termes d'énergie et de ressources  Pour  obtenir  des  informations  complémentaires  concernant  l'élimination, veuillez contacter le fournisseur auprès duquel vous avez acheté le produit ou consulter la section consacrée au site Web www.ADC.datalogic.com.    Información  para  el  usuario  de  accuerdo  con  la  Directiva  Europea 2012/19/CE  Al final de su vida útil, el producto marcado con un simbolo de contenedor de bassura móvil tachado no debe eliminarse junto a los desechos urbanos.  Eliminar este producto de accuerdo con la Directiva permite de:   evitar posibles consecuencias negativas para el medio ambiente y la salud derivadas de una eliminación inadecuada   recuperar  los  materiales  obteniendo  así  un  ahorro  importante  de energía y recursos  Para  obtener una  información  más  detallada  sobre  la  eliminación,  por favor, póngase en contacto con el proveedor donde lo compró o consultar la sección dedicada en el Web site www.ADC.datalogic.com.    Benutzerinformation  bezüglich  Richtlinie  2012/19/EC  der  europäischen Kommission  Am Ende des Gerätelebenszyklus darf das Produkt nicht über den städtischen Hausmüll entsorgt werden. Eine entsprechende Mülltrennung ist erforderlich.   Beseitigung des Produkts entsprechend der Richtlinie:   verhindert negative Auswirkungen für die Umwelt und die Gesundheit der Menschen   ermöglicht  die  Wiederverwendung  der  Materialien  und  spart  somit Energie und Resourcen.  Weitere  Informationen  zu  dieser  Richtlinie  erhalten  sie  von ihrem  Lieferanten über den sie das Produkt erworben haben, oder besuchen sie unsere Hompage unter  www.ADC.datalogic.com.
INTRODUCTION   15  1 GENERAL VIEW        A) Display *  D) Bumper  G) Loudspeaker B) 6 keys keyboard  E) Cold reset Hole  H) Micro USB C) TTL Serial connector  F) Neck Strip Anchor  I) Reader window  *Remove protective film cover before use
DATALOGIC JOYA™ X2 16    1
INTRODUCTION   17  1 1  INTRODUCTION   1.1  DATALOGIC JOYA™ X2 DESCRIPTION   The  Datalogic  JOYA™  X2  is  a  pocket-sized  Windows  powered  mobile computer.  This  extremely  compact,  lightweight,  and  versatile  device,  combines  fully integrated automatic  data capture (2D bar code) and wireless communication capabilities, supporting nearly any application.  The  Datalogic  JOYA™ X2 system  architecture  is based on the blend of Intel  X-Scale series processors coupled with the Windows CE operating system and it was developed to meet the most demanding customer needs.  A huge quantity of on-board memory is available. It enables the user to adapt the terminal for any specific need.  Thanks  to  its  great  ergonomics  and  the  state  of  the  art  architecture,  the Datalogic  JOYA™  X2  is  the  right  answer  to  enhance  your  business opportunities.   1.2  MODEL DESCRIPTION  The  brand  new  Datalogic  JOYA™  X2  is  available in  several different  models depending on the options it is equipped with. All options are listed below:  xxxxxxxxx JOYA™  X2, 802.11 b/g/n CCX V4, 256 MB RAM/512 MB Flash, 2D SE4500 Imager with Green Spot, Windows CE Core 6.0 + Avalanche. xxxxxxxxx JOYA™  X2, 802.11 b/g/n CCX V4, 256 MB RAM/512 MB Flash, 2D  SE4500  Imager  with  Green  Spot,  Windows  CE  Professional  6.0  + Avalanche. xxxxxxxxx JOYA™  X2, 802.11 b/g/n CCX V4, 256 MB RAM/512 MB Flash, 2D  SE4500  Imager  with  Green  Spot,  Windows  CE  Core  6.0  +  Avalanche, Bluetooth®. xxxxxxxxx JOYA™  X2, 802.11 b/g/n CCX V4, 256 MB RAM/512 MB Flash, 2D  SE4500  Imager  with  Green  Spot,  Windows  CE  Professional  6.0  + Avalanche, Bluetooth®. xxxxxxxxx JOYA™  X2, 802.11 b/g/n CCX V4, 256 MB RAM/512 MB Flash, 2D Halogen Imager with Green Spot, Windows CE Core 6.0 + Avalanche. xxxxxxxxx JOYA™  X2, 802.11 b/g/n CCX V4, 256 MB RAM/512 MB Flash, 2D  Halogen  Imager  with  Green  Spot,  Windows  CE  Professional  6.0  + Avalanche.
DATALOGIC JOYA™ X2 18    1 xxxxxxxxx JOYA™  X2, 802.11 b/g/n CCX V4, 256 MB RAM/512 MB Flash, 2D  Halogen  Imager  with  Green  Spot,  Windows  CE  Core  6.0  +  Avalanche, Bluetooth®. xxxxxxxxx JOYA™  X2, 802.11 b/g/n CCX V4, 256 MB RAM/512 MB Flash, 2D  Halogen  Imager  with  Green  Spot,  Windows  CE  Professional  6.0  + Avalanche, Bluetooth®. xxxxxxxxx JOYA™ X2, 802.11 b/g/n CCX V4, 256 MB RAM/1 GB Flash, uSD (4GB), touchscreen,  2D  SE4500  Imager with  Green Spot,  Windows  CE  Core 6.0 + Avalanche. xxxxxxxxx JOYA™ X2, 802.11 b/g/n CCX V4, 256 MB RAM/1 GB Flash, uSD (4GB),  touchscreen,2D  SE4500  Imager  with  Green  Spot,  Windows  CE Professional 6.0 + Avalanche. xxxxxxxxx JOYA™ X2, 802.11 b/g/n CCX V4, 256 MB RAM/1 GB Flash, uSD (4GB),  touchscreen,2D  SE4500  Imager  with  Green  Spot,  Windows  CE  Core 6.0 + Avalanche, Bluetooth®. xxxxxxxxx JOYA™ X2, 802.11 b/g/n CCX V4, 256 MB RAM/1 GB Flash, uSD (4GB),  touchscreen,2D  SE4500  Imager  with  Green  Spot,  Windows  CE Professional 6.0 + Avalanche, Bluetooth®. xxxxxxxxx JOYA™ X2, 802.11 b/g/n CCX V4, 256 MB RAM/1 GB Flash, uSD (4GB),  touchscreen,2D  Halogen  Imager  with  Green Spot,  Windows  CE  Core 6.0 + Avalanche. xxxxxxxxx JOYA™ X2, 802.11 b/g/n CCX V4, 256 MB RAM/1 GB Flash, uSD (4GB),  touchscreen,2D  Halogen  Imager  with  Green  Spot,  Windows  CE Professional 6.0 + Avalanche. xxxxxxxxx JOYA™ X2, 802.11 b/g/n CCX V4, 256 MB RAM/1 GB Flash, uSD (4GB),  touchscreen,2D  Halogen  Imager  with  Green Spot,  Windows  CE  Core 6.0 + Avalanche, Bluetooth®. xxxxxxxxx JOYA™ X2, 802.11 b/g/n CCX V4, 256 MB RAM/1 GB Flash, uSD (4GB),  touchscreen,2D  Halogen  Imager  with  Green  Spot,  Windows  CE Professional 6.0 + Avalanche, Bluetooth®.   For further details about the Datalogic JOYA™ X2 models refer to the web site: http://www.JOYA.datalogic.com.
  19  1.3  PACKAGE CONTENTS  The Datalogic JOYA™ X2 package contains: −  1 Datalogic JOYA™ X2 mobile computer  Remove  all  the  components  from  their  packaging;  check  their  integrity  and congruity with the packing documents.   Keep the original packaging for use when sending products to  the  technical  assistance  center.  Damage  caused  by improper packaging is not covered under the warranty. CAUTION   Rechargeable  battery  packs  are  not  initially  charged. Therefore the initial operation to perform is to charge them. NOTE   1.4  ACCESSORIES   Cradle 912201000 Datalogic JOYA™ X2 Cradle Dispenser    Batteries 890002010 Datalogic JOYA™ X2 Battery Pack (10 pcs.)    Cradle Accessories 91ACC1000 Power Supply 12V 300W 91ACC0730 Power Junction Cable I90x/3 Cradle (8 pcs.) 91ACC0650 Term. Unlock Magnets (5 pcs.)    Various 94ACC1328 Datalogic JOYA™ X2 Stylus Pens (10 pcs) 91ACC1056 Datalogic JOYA™ X2 trolley holder (60 pcs.) 91ACC1057 Datalogic JOYA™ X2 checkout holder   Use  only  a  Datalogic  ADC-approved  power  supply  and  cables. Use  of  an  alternative  power  supply  will  invalidate  any  approval given to this device and may be dangerous. NOTE
DATALOGIC JOYA™ X2 20    2 2  CONNECTIONS   2.1  USB CONNECTION  You can  use any standard micro USB cable to directly connect the Datalogic JOYA™ X2 to a host computer to transfer data through the USB interface.        Key: A)  Host Computer  C)  Datalogic JOYA™ X2 B)  Standard Micro USB cable type USB A – micro USB B
CONNECTIONS  21  2   To comply with the FCC rules the EMI  ferrite filter (Fair-Rite™  p.n.  0444164951) must  be  used  and installed  round the  cable  (see pictures below) WARNING
DATALOGIC JOYA™ X2 22    2 2.2  WLAN CONNECTION   Datalogic JOYA™ X2 Wi-Fi 802.11 b/g/n radio models can communicate with the host  using the on-board radio frequency component and an Access Point connected to the host computer.  To launch this utility you can tap the specific icon if it's visible on the taskbar or you can open Connections folder or Control Panel from desktop and select the 'Summit Client Utility' icon.                A    Key: Datalogic JOYA™ X2 Access Point Host – Application Server
CONNECTIONS  23  2  Wi-Fi  module  is  on  by  default,  in  order  to  avoid  wasting energy,  you  can  switch  it  off  using  the  Wireless Communications applet. NOTE   Suspending the terminal powers off the 802.11b/g/n radio and drops  the  radio  connection.  When  the  terminal  resumes, depending  on  the  radio  power  mode  and  security  protocol selected,  it  may  take  up  to  30  seconds  for  the  802.11b/g/n radio driver to re-associate the radio to the network. NOTE   Area  coverage  and  radio  performance  may  vary,  due  to environmental conditions, access points types or interference caused  by  other  devices  (microwave  ovens,  radio transmitters, etc.) NOTE    2.3  WPAN CONNECTIONS  Datalogic  JOYA™  X2  mobile  computer  models  can  communicate  with  a Bluetooth  device,  such  as  a  printer,  within  a  range  of  10  m,  using  the on-board Bluetooth module.      Key: A)  Datalogic JOYA™ X2  B)  Bluetooth printer
DATALOGIC JOYA™ X2 24    2  In order to avoid wasting energy, the Bluetooth® module is off by default. If you need to have Bluetooth® working, the module  must  be  powered  on  using  the  Wireless Communications  applet  and  perform  the  Discovery procedure. NOTE   Suspending the terminal powers off the Bluetooth radio and drops  the  piconet  (Bluetooth  connection).  When  the terminal resumes,  it  takes  approximately  10 seconds  for the Bluetooth radio driver to re-initialize the radio. NOTE   Area coverage and Bluetooth radio performance may vary, due  to  environmental  conditions  or  interference  caused  by other devices (microwave ovens, radio transmitters, etc.), etc. NOTE      3  USE AND FUNCTIONING  The  use  of  the  Datalogic  JOYA™  X2  depends  on  the  application  software loaded. However there are several parameters that can be set and utilities that can  be  used  to  perform  some  basic  functions  such  as  data  capture, communications, file management, etc. Furthermore  there  are  two  major  utilities  embedded  in  the  software  provided from factory:  •  ScanToConfig •  Avalanche Enabler  3.1  STARTUP  The Datalogic JOYA™ X2 turns on when a charged battery pack is inserted.  As  soon  as  the  mobile  computer  is  on,  the  “ScanToConfig”  request  screen appears and stays on for five seconds:
USE AND FUNCTIONING  25  3    By pressing the “+” key, the reader beam is lit. By reading different predefined barcodes, different actions are performed. In particular it is possible to:    Start the Wavelink Avalanche Enabler-application interface (embedded);    Start the "JOYA Cradle Tool" application if present in \BACKUP\CTOOLS;    Start “JOYA Diagnostic Tool" application if present in \BACKUP\CTOOLS;     Perform a hardware reset;
DATALOGIC JOYA™ X2 26    1 3 Perform a software reset;    Enable the reader trigger when the "+" key is pressed. Default is “enabled”;   A reset (either HW or SW) is required to confirm the choice.    Disable the reader trigger when the "+" key is pressed.    A reset (either HW or SW) is required to confirm the choice.  When the ScanToConfig timeout expires, Windows CE desktop will appear on the screen. Wait a few seconds before starting any activity so that the mobile computer completes its startup procedure.      The mobile computer goes into power-off (low power with display and keyboard backlight off), when it is no longer used for more than a programmable timeout,
USE AND FUNCTIONING  27  3 which is defined in the POWER applet of the Control Panel. In this mode it can be awakened (resuming operation) pressing the “Up” Key.   The  mobile  computer  can  also  be  awakened  or  turned off by the application program. NOTE  3.2  AVALANCHE ENABLER  By  scanning  the  AVALANCHE-S2C  barcode,  user  can  start  the  avalanche enabler interface. First screen ask for the barcode setup sequence     At  this  point,  user  must  scan  the  previously  generated  barcodes  to  properly configure  the  radio  interface.  Barcodes  can  be  scanned  in  any  order,  Scan Configuration screen will report about scanned and remaining barcodes.    Then  Avalanche  Enabler  connects  the  server  and  downloads  suitable information  in  term of  “packages”.  These  packages  are previously created by using the Avalanche Package Builder.
DATALOGIC JOYA™ X2 28    1 3   3.3  WAVELINK AVALANCHE SYSTEM  Is  a  client  management  system  that  automatically  deploys  software  and configuration updates to JOYA™ X2. Avalanche uses "push/pull" technology to install, update, and manage the software and configurations of JOYA™ X2 and other  mobile  devices.  For  detailed  information  please  refer  directly  to  the Wavelink website:  http://www.wavelink.com/  The Wavelink Avalanche system includes three primary components:  Avalanche Manager: This tool provides centralized client management within a  network.  The  Avalanche  Manager  consists  of  two  applications:  Avalanche Manager Agent and the Avalanche Management Console. The Agent performs the  management  functions  on  the  LAN  or  WAN,  while  the  Management Console provides an administrative interface to one or more Manager Agents  Avalanche  Enabler:  This  tool  is  an  agent  that  runs  on  each  JOYA™  X2  to allow device management via Avalanche Manager.  Avalanche-enabled  software  packages:  These  software  packages  are intended to run on the JOYA™ X2 and include settings and applications. The Avalanche  Enabler  is  embedded  in  the  JOYA™  X2  allowing  communicating directly with the Avalanche Manager over a wireless connection.  The Enabler and  the  Avalanche  Manager  work  together  to  synchronize  software  on  the JOYA™ X2 to an associated profile on the Management Console. The profile can include one or more distinct software packages, as well as RF and TCP/IP configurations, and can apply to multiple devices.
USE AND FUNCTIONING  29  3 3.4  AVALANCHE MANAGEMENT CONSOLE  The Avalanche Management Console provides an administrative interface to one or more Manager Agents. After installing, click on the Avalanche shortcut on desktop or select Avalanche SE Console from All Programs -> Wavelink Avalanche SE menu.     3.4.1  Network profile  Define the way each JOYA™ X2 terminal will connect the network.       To create a Network Profile select the tab Quick Star, click on Create a Network Profile.
DATALOGIC JOYA™ X2 30    1 3    Insert a suitable profile name, leave status disabled then click Next.  Skip the Profile Selection Criteria screen then select Finish in the Review Profile Settings screen. A new line named Network Profile will appear on the right part of the main screen      Keep the Network profile line previously created highlighted. Click on the Edit button on the top lower part of the main screen. Check the Manage WLAN IP, the Manage WLAN and the Override Settings on Mobile Devices boxes.     On the lower part of the main screen select the WLAN IP Settings tab.  Check the box Manage IP Assignment and select DHCP Server on the side drop-down menu. Check the box Server Address and enter the DHCP server IP address in decimal dotted notation.
USE AND FUNCTIONING  31  3 Check the box Subnet Mask and enter the subnet mask in decimal dotted notation.     On the lower part of the main screen select the WLAN Settings tab.  Check the box SSID and enter the wifi SSID key. In the Encryption Settings area enter the suitable values for the wifi communication (encryption type and key value).      Click on the Save button to confirm modifications.       3.4.2  ScanToConfig Profile  Avalanche allows creating ScanToConfig profiles (setup by scanning barcodes) that  are configured  with  network  settings.  User can  then  print  the profiles  as barcodes and a JOYA™ X2 can scan these barcodes. The information from the scanned barcodes is used to configure the network settings on the JOYA™ X2
DATALOGIC JOYA™ X2 32    1 3 such  as  the  IP  address,  subnet  mask,  and  gateway  as  well  as  wireless parameters  such  as  SSID,  encryption rules and keys  etc...  The  length of  the barcode is configurable.    To create a Network Profile select the tab Quick Star, click on Create a Scan to Config Profile.    Enter a suitable Network Profile name then click Next     Verify  and  confirm  by  clicking  on  Finish.  A  new  line  named  Scan  To  Config Profile will appear on the right part of the main screen
USE AND FUNCTIONING  33  3   Be sure that the Scan To Config Profile line is highlighted then press the Edit key.  Check  the  box  Use  settings  from  network  profile  and verify  the  network profile name selected in the right windows. Confirm by clicking the Save key.  Select the Scan To Config Profile line then press the Print Barcodes key.    Select Save as PDF then click on the folder icon and enter a suitable name and path for the output file. Then a PDF file will be created.
DATALOGIC JOYA™ X2 34    1 3 Make a paper copy and use it for JOYA™ X2 configuration.  When the device is properly configured and connected to the Avalanche server it will be reported in the Mobile Device Inventory tab.      3.4.3  Software profile  Software profiles allow user to organize and configure software for deployment to  JOYA™  X2  terminal,  as  well  as  change  device  parameters.  Add software packages to the profile, configure them, and schedule how and when they will be installed. When the profile is enabled and applied to a location, the software packages  associated  with  the  profile  are  installed  on  JOYA™  X2  terminals meeting the selection criteria for the profile and packages.      To  create  new  software  profile,  from  the  Quick  Start  tab  select  Add  Device Software.
USE AND FUNCTIONING  35  3 Insert a suitable software profile name, leave status disabled then click Next.    You  can  add  packages,  copy  packages  that  have  already  been  added  to  a different  profile,  or  create  custom  software  packages  from  the  Avalanche Console. Before you create a custom package, ensure you know the location of all the files you want to include and ensure that the files are valid.  In the example select a previously created Software Package (AVA extension) then Next.      Check the license agreement and confirm with Next.
DATALOGIC JOYA™ X2 36    1 3   Wait for installation then click Next.      Close this wizard with Finish.  Once you create a software profile, you must enable/disable and add/remove the  software  packages  to  that  profile.  Through  the  software  profile  you  can configure  the  software  package  settings  and  then  deploy  the  packages  to specific mobile devices. When working in software profiles, you do not need to be in Edit Mode to add or configure  software  packages.  Software  package  configuration  changes  are saved to the actual package. However, you must enter Edit Mode to configure any other software package options.  3.4.4  DLdcu package  The Datalogic Configuration Utility for Avalanche is a preassembled Avalanche package  (AVA  extension)  specifically  created  and  freely distributed,  aimed to deploy configuration  parameters  on  different mobile  devices  manufactured by Datalogic through the Avalanche platform. Usually this package is assigned to the default profile.
USE AND FUNCTIONING  37  3  In  order  to  install  the  DLdcu Avalanche Package you  first must install the DCU program in the PC.    From the Profiles tab select Software profile/Default Software Profile.     On the lower part of the screen click on Install Package      Check Install an Avalanche package. Browse and select the DLdcuxx.AVA file

Navigation menu