Page 1
75 Series Mobile Computer with Windows® Embedded Handheld 6.5 CN75, CN75e, CN75 NI, CN75e NI, CK75 User Guide...
Page 3
Disclaimer Honeywell International Inc. (“HII”) reserves the right to make changes in specifications and other information contained in this document without prior notice, and the reader should in all cases consult HII to determine whether any such changes have been made. The information in this publication does not represent a commitment on the part of HII.
TABLE OF CONTENTS Customer Support ........................vii Technical Assistance ......................vii Product Service and Repair ....................vii Limited Warranty ........................vii Send Feedback ........................vii Chapter 1 - About the Computer Features........... 1 About the 75 Series Mobile Computers ................1 Overview of 75 Series Features..................
Page 6
Scan Bar Codes ........................26 Connect a Bluetooth Scanner ..................27 Insert a MicroSD Card........................28 Install a MicroSD Card in a CN75 or CN75e ..............28 Install a MicroSD Card in a CK75 ...................30 How to Transfer Files........................32 Option 1: Set Up the Computer to Sync Data with a PC ........32 Option 2: Set Up the Computer as a Mass Storage Device ........33...
Page 7
How to Add and Switch Between Network Carriers ............45 Enable Automatic Configuration of Carrier Settings ..........46 Switch Carriers........................46 Activate the UMTS Phone....................46 Activate the CDMA Phone ....................48 Make a Phone Call ........................49 Make an Emergency Phone Call ....................49 Configure Phone Sounds......................49 Chapter 4 - Use the Camera ................51 About the Color Camera ......................51 How to Take Pictures and Record Videos ................51...
Page 8
Chapter 6 - Configure the Computer............75 How to Configure the Computer....................75 About Enterprise Settings on the Computer ..............75 Start Enterprise Settings....................76 About the Structure of Enterprise Settings ..............76 How to Navigate in Enterprise Settings ...............81 Enable Enterprise Settings Password................81 How to Restore Enterprise Setting Defaults...............81 How to Hide Menu Items in Enterprise Settings ............82 Configure the Computer Remotely with SmartSystems ..........83...
Page 9
Clean the Computer .........................113 Chapter A - Specifications ................115 Computer Agency Information ....................115 Label Locations........................115 Physical and Environmental Specifications ..............116 CN75/CN75e ........................116 CN75/CN75e Non-Incendive (NI) ................117 CK75 ............................118 Back Accessory Interface Pin-outs................119 Imager Specifications ......................120 Bar Code Symbologies .....................120 EA30 Extended Reading Range..................121 EA30 Minimum Reading Distances................122...
Page 10
Chapter B - Default Settings - Enterprise Settings App.......129 Data Collection Settings ......................129 Internal Scanner Settings ....................129 Bluetooth Scanner Settings................... 133 Camera Settings ......................... 133 Magstripe Reader Settings..................... 138 Communications Settings ....................138 802.11 Radio Settings...................... 138 Ethernet Adapter Settings ....................140 Bluetooth Radio Settings ....................
For our latest contact information, see www.honeywellaidc.com/locations. Product Service and Repair Honeywell International Inc. provides service for all of its products through service centers throughout the world. To find your service center, go to www.honeywellaidc.com and select Support.
Page 12
viii 75 Series Mobile Computer User Guide...
The CK75 has most of the same features as the CN75, but the CK75 offers a choice of imager options and does not offer WWAN or GPS radio versions. Honeywell offers heater-equipped cold storage CK75 versions to extend the use of the CK75 in cold storage and freezer environments.
Page 14
* Camera feature is not available in CK75 Cold Storage models. The 75 Series Mobile Computer with an IEEE 802.11a/b/g/n radio installed is Wi-Fi® certified for interoperability with other 802.11a/b/g/n wireless LAN devices. CN75 Front and Right Side View Speaker Touch Panel...
Page 15
Warning: The I/O cover must be attached when using the CN75/CN75e NI in a dangerous environment. Avertissement : Le couvercle entrée-sortie doit être fi xé lorsque le CN75/CN75e NI est utilisé...
Page 16
CK75 Front and Right Side View Speaker Touch Panel Good Read LED Volume Buttons Notification LED Battery Status LED Scan Button Power Button Microphone CK75 Back and Left Side View Imager (LED/Laser Aperture) Camera Speaker Port Laser Safety Label Location Application Button Stylus microSD Card Socket...
318-046-032 3.7 V, 5200 mAH (19.2 Wh) We recommend use of Honeywell Li-ion battery packs. Use of any non-Honeywell battery may result in damage not covered by the warranty. Caution: The battery used in this device may present a fire or chemical burn hazard if it is mistreated.
Page 18
• Quad Base (Model 1002UU04, 1002UU05) with Battery Cup Model 1002UC02 and power supply You can charge a 1000AB02 battery installed in a CN75 or CN75e with these accessories: • DX1 Desktop Base (Model 1002UU01) with Computer Cup Model 1002UD01 and power supply •...
How to Replace the I/O Cover on Non-Incendive Models An I/O cover is supplied with non-incendive versions of the CN75 and CN75e computers. After charging the battery, always immediately install the I/O cover. Warning: Warning: The I/O cover must be attached when using the CN75/CN75e NI in a dangerous environment.
Hibernate mode places the computer in a low power state so that the battery can be removed for a short period of time. Note: When you remove a battery from the computer, Honeywell recommends that you install a charged battery within one minute to maintain your network connections.
Page 21
Warning: CN75 NI and CN75e NI Models Explosion Hazard - Batteries must only be changed or charged in an area known to be non-hazardous. Use ONLY Honeywell CN75 NI battery part number 1000AB02. Avertissement : Modèles CN75 NI and CN75e NI Risqued’explosion-Les batteries doivent uniquement être...
4. Remove the battery. • On the CN75 or CN75e, push the battery latch toward the bottom of the computer until the battery releases, and then lift the battery away from the computer. • On the CK75, push the battery latch toward the top of the computer until the battery releases, and then lift it away from the computer.
Page 23
Battery is charging. Computer is connected to an external power source. The battery status LED below the computer screen indicates the charging status of the battery. CN75/CN75e CK75 Battery Status LED Battery Status LED...
4. Tap OK. About Battery Life and Conservation Batteries that are stored outside the computer for long periods of time slowly discharge. Honeywell recommends storing the battery in a charger to maintain battery performance. When you want to: Do this to save battery power:...
Use the following illustrations and table to understand the status LEDs on your computer. All six status LEDS are not available on every 75 Series computer. For example, the QWERTY versions of the CN75 and CN75e do not have a Green key status LED.
The 75 Series is available in these keypad configurations: • The QWERTY keypad is available for both the CN75 and CN75e but the CN75e also includes a larger keypad with numeric keys (phone-style with 1-2-3 digits across the top). The QWERTY keypad is designed for applications that require primarily alphabetic data.
Page 27
CN75 QWERTY Keypad / CN75 Numeric Keypad & Enter Enter Space CN75e QWERTY Numeric Keypad / CN75e Numeric Keypad 75 Series Mobile Computer User Guide...
CK75 Alphanumeric Keypad /CK75 Numeric Function Keypad Configure the Keypad Backlight You can configure the keypad backlight to always turn on, always stay off, or turn on depending on the lighting level of your work environment. You can also set different values for the brightness of the backlight depending on the computer power source (battery power or external power).
Brightness (External power) list. • Tap OK. About the Color-Coded Keys Note: The QWERTY keypads on the CN75 and CN75e do not include a green key. Use the orange key and the green key to access additional characters, symbols, and functions printed on the keypad overlay.
You can still type orange modifier characters by pressing and then the key for that character. To turn off Caps Lock, press Enter Characters on the Numeric Keypad You need to use the orange modifier key and the green modifier key access all characters and functions on the Numeric keypad.
To type a character or access a function printed in green on the overlay: • Press and then press the key for the character or function. To type a single uppercase letter: • Press and then the letter key. To type all uppercase letters: •...
Page 32
Use the following table to understand the Power Options and what settings are available for your computer. Enabled by Power Options Description Default Hibernate (battery swap) High power saving mode. Enabled Use this setting only for swapping the battery. The computer saves the current system state, registry, and file system and then powers off all radios and internal devices.
About the Dashboard Button If the Ready-to-Work LED blinks, your computer may be experiencing a problem. Press information button to launch the Dashboard application and view troubleshooting and status information. You can press the button at any time to bring up the Dashboard. If the computer is not healthy, the current issues are displayed at the top of the screen.
About the CK75 Cold Storage Model Heater CK75 Cold Storage (CS) models come equipped with touch screen and scan window heaters to support extended use in freezers as well as transitions into and out of freezer areas. CK75 cold storage models have external Temperature Monitoring enabled by default to determine when the computer enters a cold storage environment.
How Preemptive Mode Works Preemptive mode minimizes screen defrosting time but slightly reduces cold storage battery life since the heaters enter a low power pre-heat stage before the computer detects a rise in the ambient temperature. The heater only enters the low power pre-heat stage once the following conditions are met in the order listed: 1.
Configure the Heater Feature You can configure the following parameters in Enterprise Settings or the computer registry to optimize the operation of the heaters to fit your specific application environment. Heater Setting Description Temperature monitoring Enable or Disable the heater feature and temperature Registry Key: TempMonitoring monitoring.
Heater Setting Description Heater Cycle Time When the heaters are activated, the computer cycles power between the scanner window heater and the display window heater. You can independently adjust the cycle time for each heater. Note: During pre-heating, there is a buffer time between heater cycles when both heaters are turned off.
Adjust the Speaker Volume The computer volume includes sounds you hear when you tap the screen or scan bar codes. You can modify the volume level, switch to vibrate mode or turn both sound and vibration off. 1. Tap the Title bar at the top of the screen. 2.
4. Release the Scan button. Connect a Bluetooth Scanner You can connect the computer to a Honeywell Bluetooth scanner, such as the Granit™ 1981i and 1911i. Make sure that the Bluetooth radio in the computer is turned on before you try to connect to a scanner. To learn how, see...
Note: Always place the computer in hibernate mode and remove the battery before attempting to install or remove a card. Install a MicroSD Card in a CN75 or CN75e You need a Phillips screwdriver to install the microSD card. Format the microSD card before initial use.
Page 41
5. Slide the microSD card holder towards the top of the computer, and then lift up to reveal the microSD card socket. 6. Place the microSD card in the holder with the contacts facing away from the holder. 7. Close and latch the microSD card holder and SIM card holder. 8.
Install a MicroSD Card in a CK75 You need a slotted screwdriver to install the microSD card. Format the microSD card before initial use. 1. Press the Power button, and then select Hibernate. 2. Remove both ends of the handstrap. 3.
Page 43
6. Slide the microSD card holder towards the top of the computer, and then up to reveal the microSD card socket. 7. Place the microSD card in the holder with the contacts facing away from the holder. 8. Close and latch the microSD card holder and SIM card holder. 75 Series Mobile Computer User Guide...
Desktop Base with battery cup, power supply and USB cable Note: To learn more about accessories available for 75 Series computers, go to www.honeywellaidc.com or contact your local Honeywell sales representative. To sync data with a PC: 1. Connect the mobile computer to your PC using a USB charge/communication accessory.
Standard Rechargeable Li-ion battery (Model 1001AB01/PN 318-046-031) • Cold Storage Rechargeable Li-ion battery (Model 1001AB01/PN 318-046-032) Battery Model 1000AB02 This battery provides main power to the CN75 and CN75e. Standard Rechargeable Li-ion battery (Model 1000AB02/PN 318-043-033). 75 Series Mobile Computer User Guide...
Page 46
Use the Ethernet adapter to be able to connect the computer to an Ethernet network. Handstrap Replacement Kit You can order and install a replacement handstrap for the CN75, CN75e, and CK75. Each kit contains 5 handstraps. Holster Use the holster to store the computer when you need your hands free.
APPLICATIONS Learn about the Windows Embedded Handheld user interface and how to interact with the screen. You can also use this chapter to learn about the Honeywell applications on your computer, as well as additional applications available for download from www.honeywellaidc.com.
Navigation Bar Description Horizontal scroll bar A horizontal scroll bar appears when you tap the Title bar. The scroll bar makes it easy to access the applications associated with the Tile bar icons. You can select the magnifier icon on the horizontal bar to make parts of the screen large enough to tap with your finger.
Page 49
Icon Description The microphone is on. An internet call is in progress. A Bluetooth headset is detected. An ActiveSync connection has been established. There is a problem with the ActiveSync synchronization. An ActiveSync synchronization is in progress over USB. A CDMA connection is active. A CDMA connection is available, but not transferring data.
Page 50
Icon Description Wi-Fi is not connected to a network, and other networks are detected. Other wireless networks are detected. Connected to a wireless network. Synchronizing through a Wi-Fi connection. Connected to a wireless network, and other networks are detected. Information about a new wireless network is available. A network connection is active.
Icon Description The battery has a low charge. The battery has a very low charge. The battery is attached to external power and is charging. No battery is installed in the computer. Call forwarding is on. Voice mail is off. GPS locator is off.
3. Select Align Screen and follow the instructions to align the screen. 4. Tap OK. About Honeywell Applications Honeywell provides several useful applications to help you configure, troubleshoot, and connect your computer to other devices and networks. You can also download additional applications from the Honeywell website at www.honeywellaidc.com...
Many of the applications that are part of Features Demo also have separate full-featured versions that you can download and license for your computer. Features Demo suite can be downloaded at no charge from the Honeywell website. For more information, visit www.honeywellaidc.com. About Honeywell Enterprise Browser Enterprise Browser for Microsoft®...
Page 54
URL bar, browsing history, favorites list and other elements common to typical web browsers. HTML5 can be downloaded at no charge from the Honeywell website. For more information, visit www.honeywellaidc.com. About Honeywell Launcher...
Page 55
IT resources and lower the total cost of ownership for data collection equipment. SmartSystems Foundation can be downloaded at no charge from the Honeywell website. For more information, visit www.honeywellaidc.com. 75 Series Mobile Computer User Guide...
Phone features on the computer include a speaker and a microphone. You can also use a Bluetooth headset or hands-free kit. On CN75 and CN75e WWAN models the phone feature is enabled by default and a flexible network radio provides the ability to connect to CDMA or UMTS networks in all regions that support these technologies.
Carrier Selection screen. Activate the UMTS Phone You use a SIM card to activate the UMTS phone on your CN75/CN75e WWAN model computer. You can purchase the SIM card from your network provider. A Phillips screwdriver is needed to install the SIM card.
Page 59
5. Remove the two Phillips screws and open the card access door. 6. Slide the SIM card holder to the left and up. 7. Place the SIM card in the holder with the contacts facing away from the holder. 75 Series Mobile Computer User Guide...
Note: Data connections are to the public domain on your network. Activate the CDMA Phone To activate the CDMA radio module in your CN75/CN75e WWAN model computer, you need to contact your wireless carrier and set up an account. You also need to provide the carrier with the Mobile Equipment Identifier (MEID) for the computer.
After you activate your UTMS or CDMA phone, you are ready to start making phone calls. Note: Phone features are only supported on CN75 and CN75e WWAN models (CN75WAN). 1. Press Phone. 2. Tap the keys to enter the telephone number you want to call, and then tap Talk.
Page 62
3. Tap OK. 75 Series Mobile Computer User Guide...
CHAPTER USE THE CAMERA Learn to use the color camera to take pictures and record videos, read bar codes, perform document capture, or perform signature capture. About the Color Camera The camera lens and flash are located on the back of the computer. You run the Pictures &...
Note: You must use Enterprise Settings to configure camera settings for reading bar codes, document imaging, or signature capture. Take a Picture You run the Pictures & Videos application to use the camera for taking pictures. When you take a picture, the image is saved as a .jpg file and stored in the /My Documents/My Pictures folder.
4. Tap Menu > Options. 5. From the “Save file to” list, select SD card and tap OK. Configure or Create Camera Scenes Camera scenes are sets of preset values for camera settings. You can select or create a scene to accommodate your specific needs. 1.
Page 66
Setting Description Choices Focus Determines the focus • Touch: Tap the screen to set the focal point. method. • Portrait: Uses a depth of field of 50 cm to the focal point. • Infinity: Uses a depth of field of greater than 4 m.
Setting Description Choices Flash Sets state of the • camera flash when • you take a picture. • Auto Color Effects Sets the color effect • None for pictures. • Negative • Solarize • Sepia • Gray • Natural • Vivid •...
About the Camera Settings for Pictures and Videos You can configure camera settings to meet the needs of your operating environment. In the Pictures & Videos application, camera settings are available from the menu when the camera is operating. Certain settings are only available when taking either Video or Still pictures, but not for both.
Page 70
Setting Description Choices Settings White Balance • Auto • DayLight • Cloudy • Shade • Tungsten • Fluorescent • Incandescent • Horizon • Twilight • Warm Fluorescent • Sunset Settings Exposure • From +2.5 to -2.5 in .5 increments. Compensation Settings ISO Speed •...
Page 71
Setting Description Choices Settings Exposure - Metering • Metering: • Whole Average • Whole Center Weight • Center 1/4 Average • Lower 1/4 Average • Upper 1/4 Average • Lower 1/2 Average • Upper 1/2 Average Torch Sets whether or not to •...
Page 72
Setting Description Choices Options > Camera Resolution • 1936 x 2592 (5.0 mp) • 1536 x 2048 (3.2 mp) • 1200 x 1600 (2.0 mp) • 1072 x 1920 (2.2 mp) • 960 x 1280 (1.2 mp) • 720 x 1280 (0.9 mp) •...
Page 73
Setting Description Choices Zoom Sets the amount of • 1.0x digital zoom. • 1.5x • 2.0x • 2.5x • 3.0x • 3.5x • 4.0x • 6.0x • 8.0x • Manual Scenes Selects a Scene for the • Auto camera. Scenes are •...
Page 74
Setting Description Choices Saturation • +100 • • • • -100 • Manual Color Effects • None • Negative • Solarize • Sepia • Gray • Natural • Vivid • Color Swap • Black Board • White Board • Aqua •...
Page 75
Setting Description Choices Exposure - Auto Auto Exposure: Exposure • Auto • Night • Spot Light • Sport • Snow • Beach • Aperture • Small Aperture Exposure - Manual Manual Exposure: Exposure • 1/200 • 1/100 • 1/50 • 1/33 •...
Enable or Disable Reading Bar Codes with the Camera You use the Profile Settings application to enable or disable reading bar codes with the camera. Reading bar codes with the camera is disabled by default. Note: You can also enable reading bar codes by setting parameters in Enterprise Settings. 1.
Page 78
Setting Description Choices Lighting goal Default is 30. Illumination level Default is 3. Initial 1D search area • Center • Full • Smart raster Damaged 1D codes • Disable • Enable Enable viewfinder • Enable • Disable Focus mode Sets the focus mode •...
How to Perform Document Capture with the Camera You can use the camera to perform document capture. Document capture is a specialized feature for taking a picture of a document, and automatically applying perspective correction to the image so that only the document appears in the image.
Enable or Disable Document Capture with the Camera You use the Profile Settings application to enable or disable document capture with the camera. Performing document capture with the camera is disabled by default. Note: You can also enable document capture by setting parameters in Enterprise Settings. 1.
Page 81
Setting Description Choices Focus check Sets the acceptable • Disable (no focus check) focus level for • Medium level document imaging. • High level Image/area to capture Default is 30. ratio Output compression Sets the image • Bitmap compression level. •...
CHAPTER USE GPS CN75 and CN75e computers come equipped with an integrated Global Positioning System (GPS) receiver if the computer model has phone capability (WWAN radio). The GPS receiver can deliver standard National Marine Electronics Association (NMEA) data strings to GPS applications.
In Standalone mode, the GPS module relies solely on GPS satellites to determine position. Note: The CN75 and CN75e models with phone capability (WWAN radio) also support GLONASS. In MS Assisted mode, the computer can determine position without receiving GPS signals directly from satellites;...
4. Select one of these options: Standalone (1), MS assisted (2), or Enable gpsOneXTRA (check box). 5. Tap OK. Note: Honeywell recommends that you enable GLONASS for better accuracy. To enable GLONASS, make sure the Enable GLONASS box is selected. 75 Series Mobile Computer User Guide...
Using configuration bundles that you create with SmartSystems. About Enterprise Settings on the Computer Use Enterprise Settings to configure parameters for Honeywell applications on the computer as well as some device-specific parameters like volume. You can configure parameters for important functions like data collection and communications.
Start Enterprise Settings Note: After a reboot, to ensure all background tasks complete the initial setup, wait approximately 2 minutes once the home screen appears before starting the Enterprise Setting application. Enterprise Settings is located on the System screen. • Tap Start >...
Page 89
Data Collection Menu Item Parameter You Can Configure Bluetooth Scanners BT-Configure on Connect When a scanner is connected to the computer using Bluetooth technology, you can also configure: • Enable Scanner Port • Symbologies • Symbology Options • Scanner Settings •...
Page 90
Device Settings Menu Item Parameter You Can Configure Backlight Display and Keypad Backlight Settings Date and Time Date and Time Settings Features Disabled by Policy (Read-only) Lists systems disabled by policy. Good Read • Internal Scanner • Bluetooth Scanner Heater Set heater parameters in cold storage CK75 (CK75 cold storage models only.) models.
Page 91
Device Settings Menu Item Parameter You Can Configure Sounds • Beeper and Voice • Good Read Vibrate Intensity • Headset Beeper • Screen Taps • Key Clicks System Component Versions (Read-only) System component versions USB function driver PrintPad Enable or Disable Printers Menu Item Parameter You Can Configure Printer...
Page 92
Smartsystems Information Menu Item Parameter You Can Configure Identity (Read-only) Identity Information (e.g., hardware version, firmware version, OS version) Administrator Administrator Settings (i.e., name, phone, and email) Location Location Settings (i.e., country, state, city, campus, and detail) Information (Read-only) Device Notes Device Monitor Menu Item Parameter You Can Configure Device Health Controls...
Location Services Menu Item Parameter You Can Configure Virtual GPS Virtual GPS settings available if Server is set to Enable. • Enable or Disable Output • COM Port How to Navigate in Enterprise Settings You can easily navigate through the screens in Enterprise Settings to find the parameters you need to configure.
Restore Default Settings to a Single Menu You can restore default settings for a specific menu item in Enterprise Settings. 1. Start Enterprise Settings. 2. Navigate to the menu that you want to restore to defaults. 3. Tap Menu > Restore Menu Defaults. 4.
Configure the Computer Remotely with SmartSystems You can use Enterprise Settings from a SmartSystems console to remotely configure all the Honeywell computers. For help using Enterprise Settings, click Help > Contents in the SmartSystems console. For more information about SmartSystems, see...
5. Tap OK. Connect to a Bluetooth Scanner Using the Wireless Scanning Application You can connect the computer to a Honeywell Bluetooth scanner, such as the Granit™ 1981i and 1911i using the Wireless Scanning application. Make sure that the Bluetooth radio in the computer is turned on before you try to connect to a scanner.
Page 97
4. Create an account if you have not already created one. You must log in to download the software. 5. Install the Honeywell Download Manager tool on your PC prior to trying to download any files. 6. Locate EasySet in the Software directory (Barcode Scanners > Software > Tools and Utilities).
Page 98
You can connect your 75 Series computer to a Honeywell Bluetooth-enabled printer, such as the PB21, PB50, or PR3 for wireless printing. Honeywell offers two resource kits to assist with app development that supports wireless printing: Printing Resource Kit and Bluetooth Resource Kit.
3. Follow the onscreen instructions to select the current wireless printer. 4. (Optional) Tap Print Test Page. The printer prints out a test page. Connect to a Bluetooth Audio Device Use the Bluetooth Audio applet to discover, activate, and connect to Bluetooth audio devices such as a headset.
• You use either Funk, Microsoft or Reliable Access Client (RAC) security to implement your wireless security solution. Honeywell recommends using RAC security. Before you set security, you need to enable the radio, set the date, and set the SSID on your computer.
• Choose Microsoft security if you primarily use the computer to connect to Wi-Fi hotspots. • (Recommended) Choose Reliable Access Client (RAC) security if you need to connect to different WLAN networks without user intervention, similar to MS ZeroConfig. Using the Funk Security client only allows one WLAN network setup of four definitions being active, whereas RAC will switch between defined WLAN networks automatically (more than 10 possible profiles).
Page 102
Configure WPA or WPA2 Enterprise (802.1x) Security with Funk Security Before you set WPA-802.1x or WPA2-802.1x security with Funk security, you need to configure your authentication server and authenticators. To use TLS protocol, you also need to load a user and root certificate. On your computer, you need to enable the radio and set the date.
Before you set 802.1x-WEP security with Funk security, you need to enable the radio on your computer and set the date. To use TLS protocol, you also need to load a user and root certificate. Honeywell recommends that you use WPA2-802.1x instead of 802.1x-WEP if possible.
Configure Static WEP Security with Funk Security Before you set static WEP security with Funk security, you need to enable the radio on your computer and set the date. Honeywell recommends that you use WPA2- PSK instead of WEP if possible.
Page 105
3. Select Microsoft Security. 4. Tap Yes to save your settings and reboot the computer. The computer reboots and starts with Microsoft Security as the Security Choice. Configure WPA or WPA2 Enterprise (802.1x) Security with Microsoft Security Before you set WPA-802.1x or WPA2-802.1x security with Microsoft Security, you need to configure your authentication server and authenticators.
Configure Static WEP Security with Microsoft Security Before you set static WEP security with Microsoft security, you need to enable the radio on your computer and set the date. Honeywell recommends that you use WPA2-PSK instead of WEP if possible.
Page 107
6. For 802.1X Authentication, select Disabled. 7. For Network Key Value, enter an ASCII key or a hex key. • For 64-bit WEP, enter a 5-byte value: 5 ASCII characters or 0x followed by 5 hexadecimal pairs. • For 128-bit WEP, enter a 13-byte value: 13 ASCII characters or 0x followed by 13 hexadecimal pairs.
Software downloads can be accessed through the Technical Support Downloads Portal at https://hsmftp.honeywell.com. Note that you will need to create an account to download any Honeywell software. Manage the Computer Using CloneNGo CloneNGo is a software application that allows you to copy the settings and parameters from a master computer onto one or more client computers.
4. Create an account if you have not already created one. You must log in to download the software. 5. Install the Honeywell Download Manager tool on your PC prior to trying to download any files. 6. Click on Software > Software and Tools > Developer Library > SDKs for Windows >...
For very simple applications, the executable file may be the only file you need to deploy. Typically, you will have a set of files to install. Honeywell recommends using cabinet (.cab) files to install more complex applications. The computer uses standard Windows Mobile .cab files and will install third-party .cab...
Install Applications with Microsoft Synchronization Software When you only have a few computers to update with applications, you can copy files using Microsoft synchronization software. This procedure assumes that Microsoft synchronization software is installed on your PC and is up and running. 1.
Note: Software downloads can be accessed through the Technical Support Downloads Portal at https://hsmftp.honeywell.com. Note that you will need to create an account to download any Honeywell software. After you have located these items, you can update your mobile computer using SmartSystems.
Page 114
4. Create an account if you have not already created one. You must log in to download the software. 5. Install the Honeywell Download Manager tool on your PC prior to trying to download any files. 6. Locate your computer model in the directory (Computer Devices > Handheld >...
Page 115
6. Install the battery and then press the Power button. The update process begins. The computer may restart several times. When the update is complete, the Autoflash Complete message appears. 7. Place the mobile computer in Hibernate mode. 8. Remove the microSD card. If you do not remove the microSD card, the update process repeats each time the computer restarts.
CHAPTER TROUBLESHOOT AND MAINTAIN THE COMPUTER Use this chapter to find answers to any problems you may encounter while using the 75 Series computer. You will also find information on routine maintenance. About the Dashboard The dashboard is designed to provide proactive monitoring of your mobile computer to prevent downtime.
Note: If you send the computer in for service, it is your responsibility to save the computer data and its configuration. Honeywell is only responsible for ensuring that the hardware matches the original configuration when repairing or replacing the computer.
Page 119
Follow the next procedure to verify available access points and networks, check signal strength, and view other diagnostics. If you need to contact Honeywell Product Support, this information can be helpful in troubleshooting wireless network connection issues. 1. Tap Start > ISpyWiFi to launch the application.
d. (Optional) Change the name of the saved log file, the folder where you want the file saved, the content type (log or text), and the location. e. Tap OK. 802.1x Security Problems Use this section to find possible solutions to 802.1x security problems. Problem Possible Solution The mobile computer indicates that it...
Problems Reading Bar Codes You can troubleshoot problems that prevent you from reading bar codes, such as the appropriate symbology not being enabled. Before you call Honeywell Technical Support, look for your problem in the next table, and try the possible solutions.
Problems Using the Computer You can troubleshoot general problems while using the computer. Before you call Honeywell Technical Support, look for your problem in the next table, and try the possible solutions. Problem Possible Solution You tap the screen and nothing Align the touch screen.
Online Technical Support Additional troubleshooting resources are available on the Honeywell website. 1. Go to www.honeywellaidc.com. 2. Select Working With Us and then Technical Support. 3. From the Contact Technical Support page, you can access our: •...
How to Locate Your Configuration Number and Operating System Version Before you call Honeywell Technical Support, you need to know the configuration number and operating system version of your computer. 1. Press information button on keypad to open the Dashboard.
Note: Cold booting the computer does not guarantee that cached disk data will be saved, so transactional data may be lost during the reset. All other data, such as configuration and network settings, is preserved. Press and hold the Power button for approximately 8 seconds until the screen •...
Page 126
Caution: There are no user-serviceable parts inside the computer. Opening the computer will void the warranty and may cause damage to the internal components. Note: Honeywell recommends that you leave the battery installed when you clean the computer as described. 1. Press the Power button and select Suspend.
APPENDIX SPECIFICATIONS Computer Agency Information All 75 Series mobile computers meet or exceed the requirements of all applicable standards organizations for safe operation. The best way to ensure safe operation is to use the mobile computer according to the agency guidelines on the product regulatory sheet, quick start guide and in this user guide.
This section lists the physical and environmental specifications for the computer. Note: Product data sheets are available for download at www.honeywellaidc.com. CN75/CN75e Parameter Specification Physical Dimensions (Battery Included) Length (CN75) 16.9 cm (6.65 in) Length (CN75e) 19.5 cm (7.66 in) Width 8.0 cm (3.16 in) Depth 3.4 cm (1.34 in)
+/-15 kV air discharge, +/-8 kV direct discharge Sealant rating IP67 The CN75 and CN75e mobile computers with non-incendive (NI) certification comply with the following specifications for North America and Canada regions only. Location Suitable for use in Division 2 locations Safety cULus Listing - ISA/ANSI 12.12.01...
Parameter Specification Power and Electrical Rechargeable Li-ion battery pack Model 1001AB01 (PN 318-046-031) (Standard Model) Rechargeable Li-ion battery pack Model 1001AB01 (PN 318-046-032) (Cold Storage Model) Nominal output and capacity 3.7 VDC, 5200 mAh (19.2 Wh) Environment Standard Model Operating temperature -20°C to 60°C (-4°F to 140°F) Storage temperature -20°C to 60°C (-4°F to 140°F)
The 75 Series offers these high-performance imager options. Parameter Specification Imager EA30 (CN75/CN75e only) EA30 High-Performance Motion-Tolerant 2D Imager with (up to 500 in/s) white LED illumination, red laser aimer and framer optimized for all lighting conditions. Capable of scanning all common 1D and 2D bar codes, including 1D as small as 4 mils and 2D as small as 6.6 mils.
Supported Bar Code Symbologies Code 128/GS1-128 Matrix 2 of 5 TLC 39 EA30 Extended Reading Range These typical reading distances are measured in an office environment (250 lux) for the EA30 standard model with Extended Reading Range activated. Extended Reading Range is enabled by default. 0"...
EX25 Minimum Reading Distance Minimum reading distances are measured in the dark (0 lux). The following graphic does not include the 0.24 cm (0.09 in) setback for the CK75. 144” 160” 128” 112” 176” 0” 16” 32” 48” 64” 80” 96”...
EX25 Typical Reading Distance (1D) Typical reading distances are measured in an office environment (200 lux). The following graphics do not include the 0.24 cm (0.09 in) setback for the CK75. 80” 120” 160” 200” 240” 280” 320” 360” 400” 440”...
N5603 Extended Range Reading Distances Red Illumination Monochrome and Monocolor Sensors - Guaranteed Specifications Minimum reading distances are measured in the dark (0 lux). Symbology Near Distance Far Distance Delta 5 mil Code39/128 14.7 cm/5.8 in 22.4 cm/8.8 in 7.6 cm/3.0 in 7.5 mil Code 39/128 11.2 cm/4.4 in 33.2 cm/13 in...
Page 139
Red Illumination Monochrome and Monocolor Sensors - Typical Specifications Minimum reading distances are measured at 535 lux. Symbology Near Distance Far Distance Delta 10 mil Code 39/128 6.1 cm/2.4 in 44.2 cm/17.4 in 38.1 cm/15.0 in 15 mil Code 39/128 3.8 cm/1.5 in 54.9 cm/21.6 in 51.1 cm/20.1in...
APPENDIX DEFAULT SETTINGS - ENTERPRISE SETTINGS APP Data Collection Settings This section lists all default settings for the internal scanner and connected Bluetooth scanners, the camera, and the optional magnetic stripe reader. Note: Camera settings in this section apply only if you are using the camera to read bar codes.
Magstripe Reader Settings This section lists the default settings used for an optional magnetic stripe reader accessory. Magstripe Reader (MSR) Settings Default Enable Magstripe Reader Reader Model Enable USB MSR autodetect Disable Communications Settings This section lists the default settings for the 802.11 and WWAN radios, the Ethernet adapter, and power for the Bluetooth radio.
Page 151
Profile Setting Default Transmit Key Key1 Key 1 None Key 2 None Key 3 None Key 4 None Prompt for Credentials Disabled User Name anonymous User Password ****** Inner Authentication-TTLS MS-Chapv2 Anonymous name None Inner EAP EAP/MDS Inner Authentication - PEAP EAP/MS-Chapv2 InnerAuthenticationFAST EAP/Token Card...
Device Settings This section lists default settings for computer-specific features such as the backlight, good read behavior, or power management. Backlight Display or Keypad Setting Default Display Brightness Dim backlight after (on power) Never Keypad Keypad backlight Always off Brightness (Battery power) Brightness (External power) Features Disabled by Policy Features Disabled by Policy State...
Keypad Keypad Setting Default Button Remapping Center scan button Scanner Left side upper button: Notes Left side lower button Scanner Flashlight timeout 1 minute Right side upper button Volume up Right side lower button Volume down Green/Orange keys lock options Press twice to lock Language Language Setting...
Page 155
Setting Default Disable bar code scan Enable Show option in Profile Settings Enable bar code scan Enable document image Power Always on Enable Show option in Profile Settings Maximize battery life Normal Scanning 1D bar codes optimized Enable Show option in Profile Settings Bright sunlight Reflective labels Standard...
USB Setting Default USB function driver ActiveSync RNDIS client PrintPad PrintPad Setting Default PrintPad Disable GPS Settings This section lists default settings for the GPS feature. GPS Setting Default Enable Bread Crumbing Disable Fixed Interval GPS On or Off GPS OFF gpsOneXTRA Disable GLONASS...
SmartSystems Information Default Setting Information Device Notes: None specified Device Monitor Settings This section lists the default settings for how the mobile computer monitors the network Device Health Controls Device Health Controls Setting Default Enable Health Data Collection Enable Device Health Application Enable Blue Light Off for Ready-to-Work Set Rule File Location...
Device Wipe Device Wipe Setting Default Enable Wipe Disabled Interval (in days) Virtual Wedge This section lists default settings for the virtual wedge. The virtual wedge sends scanned data to your application as keyboard input. Virtual Wedge Setting Default Enable Virtual Wedge Enabled Virtual Wedge Method Adapt to Application...
Licenses of Third Party Software ================================ This product contains software provided by third parties, which may include the below listed components. The Honeywell product that includes this file does not necessarily use all of the third party software components referred to below. .. contents::...
Page 160
Subject to the terms and conditions of this Agreement, Altera grants to you a worldwide, nonexclusive, perpetual license (with the right to grant sublicenses, and authorize sublicensees to sublicense further) to use, copy, prepare derivative works based on, and distribute the Programs and derivative works thereof, provided that any distribution or sublicense is subject to the same terms and conditions that you use for distribution of your own comparable software products.
Page 161
any patents relating to inventions or discoveries made through use of or access to the Programs or derivative works thereof, or that are necessary for the use of the Programs, you will not bring any claim for infringement thereof against Altera or any direct or indirect licensee of Altera in connection with or use of the Programs or derivative works thereof.
Page 162
License Text (MIT License) -------------------------- << Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the “Software”), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:...
Page 163
* Copyright (c) 1998-2017 The OpenSSL Project. All rights reserved. * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
Page 164
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;...
Page 165
* Copyright remains Eric Young’s, and as such any Copyright notices in * the code are not to be removed. * If this package is used in a product, Eric Young should be given attribution * as the author of the parts of the library used. * This can be in the form of a textual message at program startup or * in documentation (online or textual) provided with the package.
Page 166
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY * SUCH DAMAGE.
Page 167
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA (this copy of the license is in COPYING file) Alternatively, this software may be distributed, used, and modified under the terms of BSD license:...
Page 168
Licenses of Third Party Software ================================ This product contains software provided by third parties, which may include the below listed components. The Honeywell product that includes this file does not necessarily use all of the third party software components referred to below. .. contents::...
Page 169
// or implied warranty. I accept no liability for any // damage or loss of business that this software may cause.> License Text (Public Domain) -------------------------- << Public domain code is not subject to any license. >> Package(s) using Favorites Multiview license ============================ * <Code Project - Favorites MultiView>...
Page 170
-------------------------- << // Copyright (C) 1998 by J?g K?ig // All rights reserved // // This file is part of the completely free tetris clone "CGTetris". // // This is free software. // You may redistribute it by any means providing it is not sold for profit // without the authors written consent.
Page 171
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT. IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR ANYONE DISTRIBUTING THE SOFTWARE BE LIABLE FOR ANY DAMAGES OR OTHER LIABILITY, WHETHER IN CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER...
Page 172
Package(s) using Code Project Open License 1.02 ============================ * <Code Project - Fancy controls> <No copyright provided. Header info: created: 2001/10/25 author: Massimo Colurcio homepage: http://www.softhor.com/developmentarea email: m.colurcio@softhor.com> * <Code Project - Transparent group box> <No copyright provided> License Text (Code Project Open License 1.02) -------------------------- <<...
Page 173
License THE WORK (AS DEFINED BELOW) IS PROVIDED UNDER THE TERMS OF THIS CODE PROJECT OPEN LICENSE ("LICENSE"). THE WORK IS PROTECTED BY COPYRIGHT AND/OR OTHER APPLICABLE LAW. ANY USE OF THE WORK OTHER THAN AS AUTHORIZED UNDER THIS LICENSE OR COPYRIGHT LAW IS PROHIBITED.
Page 174
License Grant. Subject to the terms and conditions of this License, the Author hereby grants You a worldwide, royalty-free, non-exclusive, perpetual (for the duration of the applicable copyright) license to exercise the rights in the Work as stated below: You may use the standard version of the Source Code or Executable Files in Your own applications.
Page 175
and ensure that anyone receiving such Executable Files and Source Code agrees that the terms of this License apply to such Executable Files and/or Source Code. You may not offer or impose any terms on the Work that alter or restrict the terms of this License or the recipients' exercise of the rights granted hereunder.
Page 176
Subject to the above terms and conditions, this License is perpetual (for the duration of the applicable copyright in the Work). Notwithstanding the above, the Author reserves the right to release the Work under different license terms or to stop distributing the Work at any time; provided, however that any such election will not serve to withdraw this License (or any other license that has been, or is required to be, granted under the terms of this License), and this License will continue in full force and effect unless terminated as stated above.
Page 177
<< The Independent JPEG Group's JPEG software libjpeg this software is based in part on the work of the Independent JPEG Group. README for release 6b of 27-Mar-1998 ==================================== This distribution contains the sixth public release of the Independent JPEG Group's free JPEG software.
Page 178
Permission is hereby granted to use, copy, modify, and distribute this software (or portions thereof) for any purpose, without fee, subject to these conditions: (1) If any part of the source code for this software is distributed, then this README file must be included, with this copyright and no-warranty notice unaltered;...
Page 179
It appears that the arithmetic coding option of the JPEG spec is covered by patents owned by IBM, AT&T, and Mitsubishi. Hence arithmetic coding cannot legally be used without obtaining one or more licenses. For this reason, support for arithmetic coding has been removed from the free JPEG software. (Since arithmetic coding provides only a marginal gain over the unpatented Huffman mode, it is unlikely that very many implementations will support it.) So far as we are aware, there are no patent restrictions on the remaining code.
Page 180
modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.
Page 181
1.3. ''Covered Code'' means the Original Code or Modifications or the combination of the Original Code and Modifications, in each case including portions thereof. 1.4. ''Electronic Distribution Mechanism'' means a mechanism generally accepted in the software development community for the electronic transfer of data. 1.5.
Page 182
Executable, or source code differential comparisons against either the Original Code or another well known, available Covered Code of the Contributor's choice. The Source Code can be in a compressed or archival form, provided the appropriate decompression or de-archiving software is widely available for no charge. 1.12.
Page 183
made, and/or otherwise dispose of: 1) Modifications made by that Contributor (or portions thereof); and 2) the combination of Modifications made by that Contributor with its Contributor Version (or portions of such combination). (c) the licenses granted in Sections 2.2(a) and 2.2(b) are effective on the date Contributor first makes Commercial Use of the Covered Code.
Page 184
3.4. Intellectual Property Matters (a) Third Party Claims. If Contributor has knowledge that a license under a third party's intellectual property rights is required to exercise the rights granted by such Contributor under Sections 2.1 or 2.2, Contributor must include a text file with the Source Code distribution titled "LEGAL'' which describes the claim and the party making the claim in sufficient detail that a recipient will know whom to contact.
Page 185
description of how and where You have fulfilled the obligations of Section 3.2. The notice must be conspicuously included in any notice in an Executable version, related documentation or collateral in which You describe recipients' rights relating to the Covered Code. You may distribute the Executable version of Covered Code or ownership rights under a license of Your choice, which may contain terms different from this License, provided that You are in compliance with the terms of this License and that the license for the Executable version does not attempt to...
Page 186
6.3. Derivative Works. If You create or use a modified version of this License (which you may only do in order to apply it to code which is not already Covered Code governed by this License), You must (a) rename Your license so that the phrases ''Mozilla'', ''MOZILLAPL'', ''MOZPL'', ''Netscape'', "MPL", ''NPL'' or any confusingly similar phrase do not appear in your license (except to note that your license differs from this License) and (b) otherwise make it clear that Your version of the...
Page 187
(b) any software, hardware, or device, other than such Participant's Contributor Version, directly or indirectly infringes any patent, then any rights granted to You by such Participant under Sections 2.1(b) and 2.2(b) are revoked effective as of the date You first made, used, sold, distributed, or had made, Modifications made by that Participant.
Page 188
registered to do business in the United States of America, any litigation relating to this License shall be subject to the jurisdiction of the Federal Courts of the Northern District of California, with venue lying in Santa Clara County, California, with the losing party responsible for costs, including without limitation, court costs and reasonable attorneys' fees and expenses.
Page 189
[NOTE: The text of this Exhibit A may differ slightly from the text of the notices in the Source Code files of the Original Code. You should use the text of this Exhibit A rather than the text found in the Original Code Source Code for Your Modifications.] >>...
Page 190
3. RESTRICTIONS. Software is confidential and copyrighted. Title to Software and all associated intellectual property rights is retained by Sun and/or its licensors. Unless enforcement is prohibited by applicable law, you may not modify, decompile, or reverse engineer Software. You acknowledge that Licensed Software is not designed or intended for use in the design, construction, operation or maintenance of any nuclear facility.
Page 191
and conditions for installation. If additional terms and conditions are not presented on installation, the Software Updates will be considered part of the Software and subject to the terms and conditions of the Agreement. 8. SOFTWARE FROM SOURCES OTHER THAN SUN. You acknowledge that, by your use of optional features of the Software and/or by requesting services that require use of the optional features of the Software, the Software may automatically download, install, and execute software applications from sources other than Sun...
Page 192
accordance with 48 CFR 227.7201 through 227.7202-4 (for Department of Defense (DOD) acquisitions) and with 48 CFR 2.101 and 12.212 (for non-DOD acquisitions). 13. GOVERNING LAW. Any action related to this Agreement will be governed by California law and controlling U.S. federal law. No choice of law rules of any jurisdiction will apply.
Page 193
of running, your Programs, (ii) the Programs add significant and primary functionality to the Software, (iii) you do not distribute additional software intended to replace any component(s) of the Software (unless otherwise specified in the applicable README file), (iv) you do not remove or alter any proprietary legends or notices contained in the Software, (v) you only distribute the Software subject to a license agreement that protects Sun's interests consistent with the terms contained in this Agreement, and (vi) you agree to defend and indemnify Sun...
Page 194
in the Agreement, in addition to the license granted in Paragraph 1 above, Sun hereby grants to you a non-exclusive, nontransferable limited right to reproduce complete and unmodified copies of the Software on electronic media (the "Media") for the sole purpose of inclusion and distribution with your Publication(s), subject to the following terms: (i) You may not distribute the Software on a stand-alone basis;...
Page 195
license identified in the THIRDPARTYLICENSEREADME.txt file, the disclaimer of warranty and limitation of liability provisions in paragraphs 5 and 6 of the Binary Code License Agreement shall apply to all Software in this distribution. For inquiries please contact: Sun Microsystems, Inc., 4150 Network Circle, Santa Clara, California 95054, U.S.A.
Page 196
This software is released into the public domain. You are free to use it in any way you like. This software is provided "as is" with no expressed or implied warranty. I accept no liability for any damage or loss of business that this software may cause. >>...
Page 197
License Text (aesGladman.txt) -------------------------- << The Irrlicht Engine may be compiled to provide support for AES encrypted files. The implementation used by Irrlicht is provided by Dr Brian Gladman. The license for these files (including AES, a PRNG, SHA, and other algorithms) is as follows --------------------------------------------------------------------------- Copyright (c) 2002, Dr Brian Gladman <...
Page 198
and/or fitness for purpose. --------------------------------------------------------------------------- >> License Text (bzip2-license.txt) -------------------------- << This program, "bzip2", the associated library "libbzip2", and all documentation, are copyright (C) 1996-2007 Julian R Seward. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1.
Page 199
DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Page 200
the Irrlicht Engine in your product, you must acknowledge somewhere in your documentation that you've used the IJPG code. It would also be nice to mention that you use the Irrlicht Engine, the zlib, libPng and aesGladman. See the corresponding license files for further informations. It is also possible to disable usage of those additional libraries by defines in the IrrCompileConfig.h header recompiling the engine.
Page 201
conditions: (1) If any part of the source code for this software is distributed, then this README file must be included, with this copyright and no-warranty notice unaltered; and any additions, deletions, or changes to the original files must be clearly indicated in accompanying documentation. (2) If only executable code is distributed, then the accompanying documentation must state that "this software is based in part on the work of the Independent JPEG Group".
Page 202
It is copyright by the Free Software Foundation but is freely distributable. The same holds for its supporting scripts (config.guess, config.sub, ltmain.sh). Another support script, install-sh, is copyright by X Consortium but is also freely distributable. The IJG distribution formerly included code to read and write GIF files. To avoid entanglement with the Unisys LZW patent, GIF reading support has been removed altogether, and the GIF writer has been simplified to produce "uncompressed GIFs".
Page 203
Cosmin Truta libpng versions 1.0.7, July 1, 2000, through 1.2.5 - October 3, 2002, are Copyright (c) 2000-2002 Glenn Randers-Pehrson, and are distributed according to the same disclaimer and license as libpng-1.0.6 with the following individuals added to the list of Contributing Authors Simon-Pierre Cadieux Eric S.
Page 204
Kevin Bracey Sam Bushell Magnus Holmgren Greg Roelofs Tom Tanner libpng versions 0.5, May 1995, through 0.88, January 1996, are Copyright (c) 1995, 1996 Guy Eric Schalnat, Group 42, Inc. For the purposes of this copyright and license, "Contributing Authors" is defined as the following set of individuals: Andreas Dilger Dave Martindale...
Page 205
source or altered source distribution. The Contributing Authors and Group 42, Inc. specifically permit, without fee, and encourage the use of this source code as a component to supporting the PNG file format in commercial products. If you use this source code in a product, acknowledgment is not required but would be appreciated.
Page 206
Licenses of Third Party Software ================================ This product contains software provided by third parties, which may include the below listed components. The Honeywell product that includes this file does not necessarily use all of the third party software components referred to below. .. contents::...
Page 207
* 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in * the documentation and/or other materials provided with the * distribution. * 3. All advertising materials mentioning features or use of this * software must display the following acknowledgment: * “This product includes software developed by the OpenSSL Project * for use in the OpenSSL Toolkit.
Page 208
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED * OF THE POSSIBILITY OF SUCH DAMAGE. * ==================================================================== * This product includes cryptographic software written by Eric Young * (eay@cryptsoft.com).
Page 209
* modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the copyright * notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution.
Page 210
* The licence and distribution terms for any publically available version or * derivative of this code cannot be changed. i.e. this code cannot simply be * copied and put under another distribution licence * [including the GNU Public Licence.] >>...
Page 211
it under the terms of the GNU General Public License version 2 as published by the Free Software Foundation. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
Page 212
LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;...
Page 213
• support services for this software, unless other terms accompany those items. If so, those terms apply. By using the software, you accept these terms. If you do not accept them, do not use the software. If you comply with these license terms, you have the rights below. 1.
Page 214
• indemnify, defend, and hold harmless Microsoft from any claims, including attorneys’ fees, related to the distribution or use of your programs. iii. Distribution Restrictions. You may not • alter any copyright, trademark or patent notice in the Distributable Code; •...
Page 215
5. DOCUMENTATION. Any person that has valid access to your computer or internal network may copy and use the documentation for your internal, reference purposes. 6. Export Restrictions. The software is subject to United States export laws and regulations. You must comply with all domestic and international export laws and regulations that apply to the software.
Page 216
11. Disclaimer of Warranty. The software is licensed “as-is.” You bear the risk of using it. Microsoft gives no express warranties, guarantees or conditions. You may have additional consumer rights under your local laws which this agreement cannot change. To the extent permitted under your local laws, Microsoft excludes the implied warranties of merchantability, fitness for a particular purpose and non- infringement.
Page 217
• tout ce qui est relié au logiciel, aux services ou au contenu (y compris le code) figurant sur des sites Internet tiers ou dans des programmes tiers ; et • les réclamations au titre de violation de contrat ou de garantie, ou au titre de responsabilité...
Page 218
Licenses of Third Party Software ================================ This product contains software provided by third parties, which may include the below listed components. The Honeywell product that includes this file does not necessarily use all of the third party software components referred to below. .. contents:: ============================ * IAIK PKCS#11 Wrapper 1.3...
Page 219
DISCLAIMED. IN NO EVENT SHALL THE LICENSOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Page 220
embedded or function-specific software applications, for example but not limited to: Software embedded in or bundled with industrial control systems, wireless mobile telephones, wireless handheld devices, kiosks, TV/STB, Blu-ray Disc devices, telematics and network control switching equipment, printers and storage management systems, and other related systems are excluded from this definition and not licensed under this Agreement.
Page 221
5. LIMITATION OF LIABILITY. IN NO EVENT SHALL ORACLE BE LIABLE FOR ANY INDIRECT, INCIDENTAL, SPECIAL, PUNITIVE OR CONSEQUENTIAL DAMAGES, OR DAMAGES FOR LOSS OF PROFITS, REVENUE, DATA OR DATA USE, INCURRED BY YOU OR ANY THIRD PARTY, WHETHER IN AN ACTION IN CONTRACT OR TORT, EVEN IF ORACLE HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Page 222
11. SEVERABILITY. If any provision of this Agreement is held to be unenforceable, this Agreement will remain in effect with the provision omitted, unless omission would frustrate the intent of the parties, in which case this Agreement will immediately terminate. 12.
Page 223
the Programs add significant and primary functionality to the Software, (iii) you do not distribute additional software intended to replace any component(s) of the Software, (iv) you do not remove or alter any proprietary legends or notices contained in the Software, (v) you only distribute the Software subject to a license agreement that: (a) is a complete, unmodified reproduction of this Agreement;...
Page 224
SE Development Kit; (iv) The JDK must be reproduced in its entirety and without any modification whatsoever (including with respect to all proprietary notices) and distributed with your Publication subject to a license agreement that is a complete, unmodified reproduction of this Agreement; (v) The Media label shall include the following information: “Copyright [YEAR], Oracle America, Inc.
Page 225
I. SOURCE CODE. Software may contain source code that, unless expressly licensed for other purposes, is provided solely for reference purposes pursuant to the terms of this Agreement. Source code may not be redistributed unless expressly provided for in this Agreement. J.
Page 226
* DirectShow Sample Camera Application for WEC7&WEC2013 DShowTest_WEC2013 Copyright (c) Microsoft Corporation. All rights reserved. * USB Camera Driver for Windows Embedded Compact 2013&WEC 7 USBCameraWEC2013 Copyright (c) Microsoft Corporation. All rights reserved. * GumstixIII SDK 1.1 Copyright (c) Microsoft Corporation. All rights reserved. * Exploring VMR Features on WEC7 2011-10-28 Copyright (c) Microsoft Corporation.
Page 227
(B) Patent Grant- Subject to the terms of this license, including the license conditions and limitations in section 3, each contributor grants you a non- exclusive, worldwide, royalty-free license under its licensed patents to make, have made, use, sell, offer for sale, import, and/or otherwise dispose of its contribution in the software or derivative works of the contribution in the software.
Page 228
(2) If only executable code is distributed, then the accompanying documentation must state that "this software is based in part on the work of the Independent JPEG Group". (3) Permission for use of this software is granted only if the user accepts full responsibility for any undesirable consequences;...
Page 229
to distribute copies of free software (and charge for this service if you wish); that you receive source code or can get it if you want it; that you can change the software and use pieces of it in new free programs; and that you are informed that you can do these things.
Page 230
General Public License. This license, the GNU Lesser General Public License, applies to certain designated libraries, and is quite different from the ordinary General Public License. We use this license for certain libraries in order to permit linking those libraries into non-free programs. When a program is linked with a library, whether statically or using a shared library, the combination of the two is legally speaking a combined work, a derivative of the original library.
Page 231
The precise terms and conditions for copying, distribution and modification follow. Pay close attention to the difference between a "work based on the library" and a "work that uses the library". The former contains code derived from the library, whereas the latter must be combined with the library in order to run.
Page 232
1. You may copy and distribute verbatim copies of the Library's complete source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty; keep intact all the notices that refer to this License and to the absence of any warranty;...
Page 233
These requirements apply to the modified work as a whole. If identifiable sections of that work are not derived from the Library, and can be reasonably considered independent and separate works in themselves, then this License, and its terms, do not apply to those sections when you distribute them as separate works.
Page 234
under Section 2) in object code or executable form under the terms of Sections 1 and 2 above provided that you accompany it with the complete corresponding machine-readable source code, which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange. If distribution of object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place satisfies the requirement to distribute the source code, even...
Page 235
object code for the work under the terms of Section 6. Any executables containing that work also fall under Section 6, whether or not they are linked directly with the Library itself. 6. As an exception to the Sections above, you may also combine or link a "work that uses the Library"...
Page 236
give the same user the materials specified in Subsection 6a, above, for a charge no more than the cost of performing this distribution. d) If distribution of the work is made by offering access to copy from a designated place, offer equivalent access to copy the above specified materials from the same place.
Page 237
8. You may not copy, modify, sublicense, link with, or distribute the Library except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense, link with, or distribute the Library is void, and will automatically terminate your rights under this License. However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance.
Page 238
particular circumstance, the balance of the section is intended to apply, and the section as a whole is intended to apply in other circumstances. It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims;...
Page 239
14. If you wish to incorporate parts of the Library into other free programs whose distribution conditions are incompatible with these, write to the author to ask for permission. For software which is copyrighted by the Free Software Foundation, write to the Free Software Foundation; we sometimes make exceptions for this.
Page 240
PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. END OF TERMS AND CONDITIONS ============================ * Java RCX API pre-alpha-1 Copyright (c) 2002 Graz University of Technology. All rights reserved. License Text : Q Public License 1.0 -------------------------- Copyright (C) 1999 Trolltech AS, Norway. Everyone is permitted to copy and distribute this license document.
Page 241
b. When modifications to the Software are released under this license, a non- exclusive royalty-free right is granted to the initial developer of the Software to distribute your modification in future versions of the Software provided such versions remain available under these terms in addition to any other license(s) of the initial developer.
Page 242
In no event shall the initial developers or copyright holders be liable for any damages whatsoever, including - but not restricted to - lost revenue or profits or other direct, indirect, special, incidental or consequential damages, even if they have been advised of the possibility of such damages, except to the extent invariable law, if any, provides otherwise.
Page 243
NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. ============================ * WOSH Framework - Wide Open Smart Home 2009-10-31 Copyright (c) 2007-2011, WOSH - Wide Open Smart Home by Alessandro Polo -...
Page 244
1.9"Modifications" means any addition to or deletion from the substance or structure of either the Original Code or any previous Modifications. When Covered Code is released as a series of files, a Modification is: A.Any addition to or deletion from the contents of a file containing Original Code or previous Modifications.
Page 245
(d)Notwithstanding Section 2.1(b) above, no patent license is granted: 1) for code that You delete from the Original Code; 2) separate from the Original Code; or 3) for infringements caused by: i) the modification of the Original Code or ii) the combination of the Original Code with other software or devices.
Page 246
(6) months after a subsequent version of that particular Modification has been made available to such recipients. You are responsible for ensuring that the Source Code version remains available even if the Electronic Distribution Mechanism is maintained by a third party. 3.3Description of Modifications.
Page 247
Source Code where You describe recipients' rights or ownership rights relating to Covered Code. You may choose to offer, and to charge a fee for, warranty, support, indemnity or liability obligations to one or more recipients of Covered Code. However, You may do so only on Your own behalf, and not on behalf of the Initial Developer or any Contributor.
Page 248
This License applies to code to which the Initial Developer has attached the notice in Exhibit A and to related Covered Code. 6.Versions of the License. 6.1New Versions. Socialtext, Inc. ("Socialtext") may publish revised and/or new versions of the License from time to time. Each version will be given a distinguishing version number.
Page 249
8.1This License and the rights granted hereunder will terminate automatically if You fail to comply with terms herein and fail to cure such breach within 30 days of becoming aware of the breach. All sublicenses to the Covered Code which are properly granted shall survive any termination of this License.
Page 250
WITHOUT LIMITATION, DAMAGES FOR LOSS OF GOODWILL, WORK STOPPAGE, COMPUTER FAILURE OR MALFUNCTION, OR ANY AND ALL OTHER COMMERCIAL DAMAGES OR LOSSES, EVEN IF SUCH PARTY SHALL HAVE BEEN INFORMED OF THE POSSIBILITY OF SUCH DAMAGES. THIS LIMITATION OF LIABILITY SHALL NOT APPLY TO LIABILITY FOR DEATH OR PERSONAL INJURY RESULTING FROM SUCH PARTY'S NEGLIGENCE TO THE EXTENT APPLICABLE LAW PROHIBITS SUCH LIMITATION.
Page 251
Initial Developer may designate portions of the Covered Code as Multiple- Licensed. Multiple-Licensed means that the Initial Developer permits you to utilize portions of the Covered Code under Your choice of the CPAL or the alternative licenses, if any, specified by the Initial Developer in the file described in Exhibit A. 14.ADDITIONAL TERM: ATTRIBUTION (a)As a modest attribution to the organizer of the development of the Original Code ("Original Developer"), in the hope that its promotional value may help justify the...
Page 252
(d)You acknowledge that all trademarks, service marks and/or trade names contained within the Attribution Information distributed with the Covered Code are the exclusive property of their owners and may only be used with the permission of their owners, or under circumstances otherwise permitted by law or as expressly set out in this License.
Page 253
EXHIBIT B. Attribution Information Attribution Copyright Notice: _______________________ Attribution Phrase (not exceeding 10 words): _______________________ Attribution URL: _______________________ Graphic Image as provided in the Covered Code, if any. Display of Attribution Information is [required/not required] in Larger Works which are defined in the CPAL as a work which combines Covered Code or portions thereof with code not governed by the terms of the CPAL.