Badgedesigner User Guide Lenel® Onguard® 7.4 Badgedesigner User Guide This Guide Is Part 2 of a 2-Document Suite, Item Number DOC-300, Revision 8.007, November 2017

Total Page:16

File Type:pdf, Size:1020Kb

Load more

7.4 BadgeDesigner User Guide Lenel® OnGuard® 7.4 BadgeDesigner User Guide This guide is part 2 of a 2-document suite, item number DOC-300, revision 8.007, November 2017. © 2017 United Technologies Corporation. All rights reserved. Lenel®, OnGuard®, Prism®, BlueDiamond™, and UltraView® are registered trademarks or trademarks of UTC Fire & Security Americas Corporation, Inc. Lenel is a part of UTC Climate, Controls & Security, a unit of United Technologies Corporation. All trademarks are the property of their respective owners. Information in this document is subject to change without notice. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without the prior express written permission of UTC Fire & Security Americas Corporation, Inc., which such permission may have been granted in a separate agreement (i.e., end user license agreement or software license agreement for the particular application). Non-English versions of Lenel documents are offered as a service to our global audiences. We have attempted to provide an accurate translation of the text, but the official text is the English text, and any differences in the translation are not binding and have no legal effect. The software described in this document is furnished under a license agreement and may only be used in accordance with the terms of that agreement. Crystal Reports for Windows is a trademark of Business Objects, S.A. OnGuard includes ImageStream® Graphic Filters. © 2002 eBT International, Inc. (f/k/a Inso Corporation). All rights reserved. ImageStream Graphic Filters and ImageStream are registered trademarks of eBT International, Inc. (f/k/a Inso Corporation). Integral and FlashPoint are trademarks of Integral Technologies, Inc. Portions of this product were created using LEADTOOLS ©1991-2011, LEAD Technologies, Inc. ALL RIGHTS RESERVED. Active Directory, Microsoft, SQL Server, Windows, and Windows Server are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. Oracle is a registered trademark of Oracle International Corporation. Other product names mentioned may be trademarks or registered trademarks of their respective companies and are hereby acknowledged. Table of Contents Introduction . .9 CHAPTER 1 Introduction to BadgeDesigner . 11 Conventions Used in this Documentation . .11 Getting Started . .12 Passwords . 12 Change User Passwords . 12 Error Messages . 13 Accounts . 13 Log In . 14 Single Sign-On . .15 Directory Accounts . 15 Automatic and Manual Single Sign-On . 15 Configure Single Sign-On . 16 Log In Using Automatic Single Sign-On . 16 Log In Using Manual Single Sign-On . 16 Troubleshoot Logging In . .17 Assigning Directory and Internal Accounts to the User . .18 Set User Permissions for BadgeDesigner Access . .18 Log Out of the Application . .19 Exit the Application . .20 CHAPTER 2 BadgeDesigner Main Window . .21 Menus and Toolbars . .21 Menus . 22 Toolbars . 25 BadgeDesigner User Guide 3 Table of Contents How to Use the Toolbars . 27 BadgeDesigner Views . 27 Layout View . 28 Object List View . 29 Sample Data View . 30 Status Bar . 30 Hide/Display the BadgeDesigner Status Bar . 31 Design a Badge . 33 CHAPTER 3 Design a Badge Overview . 35 Designing a Badge . 35 Create and Save Badge Layouts . 35 Set Layout Properties . 35 Using Avery Badge Templates . 35 Managing Badge Layouts . 36 CHAPTER 4 Create, Open and Save Layouts . 37 Create a New Badge Layout . 37 Open an Existing Badge Layout . 37 Save a Badge Layout . 38 Close a Badge Layout . 38 Working with Multiple Layouts . 39 Switch Between Open Layouts . 39 Automatically Minimize and Arrange Open Layouts . 39 Close All Open Layouts . 40 CHAPTER 5 Set Layout Properties and View Options . 41 Layout Form (Page Sub-tab) . 41 Layout Form (Badge Area Sub-tab) . 43 Layout Form (Slotted Neck Cord Hole Sub-tab) . 45 Layout Form (Round Neck Cord Holes Sub-tab) . 46 Load Template Form . 48 Print Media Templates . 48 Editor Form . ..
Recommended publications
  • Symantec Software Datasheet

    Symantec Software Datasheet

    Data Sheet: Endpoint Management Altiris™ Client Management Suite 7.0 Deploy, manage, secure, and troubleshoot Overview The suite delivers tools that are based on the IT The cost of a PC is only a small part of its total cost. Infrastructure Library (ITIL) to help align processes with Nearly 80 percent of the total cost of owning a client industry best practices so you can more efficiently system goes toward the support and maintenance of manage your client systems. the PC. Altiris™ Client Management Suite from Symantec automates time-consuming and redundant tasks to reduce the effort and costs associated with deploying, managing, securing, and troubleshooting client systems so organizations can gain control of their IT environments. Client Management Suite Delivers Client Management Suite ushers in a new generation of systems management by bringing end users, administrators, and key business decision makers Altiris Client Management Suite deploys, manages, secures, and together. The suite helps you align with organizational troubleshoots systems through the entire IT lifecycle. You can manage more technologies, with greater efficiency, on more objectives by providing easy-to-use self-service tools to platforms. users, powerful management tools to IT administrators, and custom dashboards to decision makers. Client Management Suite provides complete visibility into your organization's client systems so you can see Finding extra time is challenging, yet that's what Client what you have, where it's located, and what state it's in. Management Suite is designed to do. Now you can focus The suite's flexible and actionable reporting tools not on key initiatives that can help your business grow.
  • Thomson Reuters Spreadsheet Link User Guide

    Thomson Reuters Spreadsheet Link User Guide

    THOMSON REUTERS SPREADSHEET LINK USER GUIDE MN-212 Date of issue: 13 July 2011 Legal Information © Thomson Reuters 2011. All Rights Reserved. Thomson Reuters disclaims any and all liability arising from the use of this document and does not guarantee that any information contained herein is accurate or complete. This document contains information proprietary to Thomson Reuters and may not be reproduced, transmitted, or distributed in whole or part without the express written permission of Thomson Reuters. Contents Contents About this Document ...................................................................................................................................... 1 Intended Readership ................................................................................................................................. 1 In this Document........................................................................................................................................ 1 Feedback ................................................................................................................................................... 1 Chapter 1 Thomson Reuters Spreadsheet Link .......................................................................................... 2 Chapter 2 Template Library ........................................................................................................................ 3 View Templates (Template Library) ..............................................................................................................................................
  • Strike First

    Strike First

    GET UP TO $ BACK30 THE RISE OF COBRA Via Mail-In Rebate* ONly IN Theaters STRWITH ITKHEE SPEED FIR OFS NOTRTON * Receive $30 via mail-in rebate with the purchase of Norton™ Internet Security 2009 or $20 with the purchase of Norton™ AntiVirus 2009. Offer good for purchases made between 6/21/09 and 10/19/09 at participating retailers. Rebate submissions must be postmarked within 30 days of purchase. Limit one rebate per product per customer. Read below or visit www.norton.com/gijoe for complete Terms and Conditions. To receive your rebate from Symantec, please follow these steps: Terms and Conditions 1. Purchase Norton™ Internet Security 2009 or Norton™ AntiVirus 2009 between 6/21/09 and 10/19/09 • The G.I. Joe rebate offer is valid only for stand-alone, retail (boxed or downloaded) purchases of Norton at a participating retailer (Norton Internet Security 2009 customers receive a $30 Visa® Prepaid Card. Internet Security 2009 and Norton AntiVirus 2009. Purchases must be made between 6/21/09 and Norton AntiVirus 2009 customers receive a $20 Visa Prepaid Card. Purchases made from Office Depot 10/19/09 at a participating retailer. Offer not available with site licenses, trialware, NFRs, products will receive their rebate in the form of a check.). pre-installed or supplied by a manufacturer (OEM), multi-user packs (other than Norton Internet Security 2. Read and complete this rebate request form. Or you can pre-submit your rebate at for 3-users), academic offers, auction purchases, or with any other offer except the upgrade/competitive www.symantecrebates.com.
  • ALGE Displaystudio Manual

    ALGE Displaystudio Manual

    ALGE DisplayStudio Manual DisplayStudio Table of Content 1 General .............................................................................................................................3 2 Getting started...................................................................................................................3 2.1 Main Window ............................................................................................................3 2.2 Tree view for project navigation................................................................................4 3 Lists...................................................................................................................................5 3.1 List Builder................................................................................................................5 3.1.1 Text panel.............................................................................................................6 3.1.2 Animation..............................................................................................................6 3.1.3 List compiling........................................................................................................7 4 Animations and wipes .......................................................................................................7 4.1 Adding animation/wipe to the project........................................................................8 4.2 Animation/wipe editing..............................................................................................8
  • Xcelsius 2008 FP3.1 Fixed Issues

    Xcelsius 2008 FP3.1 Fixed Issues

    SAP BusinessObjects Xcelsius 2008 FP3.1 What's Fixed ■ Xcelsius 2008 FP3.1 2010-03-09 Copyright © 2010 SAP AG. All rights reserved.SAP, R/3, SAP NetWeaver, Duet, PartnerEdge, ByDesign, SAP Business ByDesign, and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP AG in Germany and other countries. Business Objects and the Business Objects logo, BusinessObjects, Crystal Reports, Crystal Decisions, Web Intelligence, Xcelsius, and other Business Objects products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of Business Objects S.A. in the United States and in other countries. Business Objects is an SAP company.All other product and service names mentioned are the trademarks of their respective companies. Data contained in this document serves informational purposes only. National product specifications may vary.These materials are subject to change without notice. These materials are provided by SAP AG and its affiliated companies ("SAP Group") for informational purposes only, without representation or warranty of any kind, and SAP Group shall not be liable for errors or omissions with respect to the materials. The only warranties for SAP Group products and services are those that are set forth in the express warranty statements accompanying such products and services, if any. Nothing herein should be construed as constituting an additional warranty. 2010-03-09 Contents Chapter 1 Welcome to Xcelsius 2008
  • Veritas Backup Reporter 6.5 Installation Guide Veritas Backup Reporter Installation Guide

    Veritas Backup Reporter 6.5 Installation Guide Veritas Backup Reporter Installation Guide

    Veritas Backup Reporter 6.5 Installation Guide Veritas Backup Reporter Installation Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation version 6.5 PN: : (HRO7210)SKU 11132088 Legal Notice Copyright © 2008 Symantec Corporation. All rights reserved. Federal acquisitions: Commercial Software - Government Users Subject to Standard License Terms and Conditions. Actionable Infrastructure™, Active Extensions™, ActiveAdmin™, Anti-Freeze™, Application Saver™, Backup Exec™, Bare Metal Restore™, BindView™, Bloodhound™, Bootguard™, Brightmail™, bv-Admin™, bv-Control™, CarrierScan™, CleanSweep™, ColorScale™, CommandCentral™, Confidence Online™, CrashGuard™, Day-End Sync™, dbAnywhere™, DeepSight™, Defender™, Digital Immune System™, DiskDoubler™, DiskLock™, Drive Image™, Enterprise Security Manager™, Enterprise Vault™, FlashSnap™, FlowChaser™, Ghost Walker™, Ghost™, GoBack™, Healthy PC™, i3™, iCommand™, I-Gear™, Indepth™, Information Integrity™, Intellicrypt™, Intruder Alert™, LiveUpdate™, LiveState™, Mail-Gear™, ManHunt™, ManTrap™, MicroMeasure™, Mobile Update™, NetBackup™, NetProwler™, NetRecon™, Norton™, Norton 360™, Norton AntiSpam™, Norton AntiVirus™, Norton Commander™, Norton Editor™, Norton Guides™, Norton Internet Security™, Norton Mobile Essentials™, Norton Password Security™, Norton SystemWorks™, Norton Utilities™, Norton WinDoctor™, OmniGuard™, OpForce™, PartitionMagic™, pcAnywhere™, PowerQuest™, PowerVPN™, Procomm™, Procomm Plus™,
  • Essential Trends and Dynamics of the Endpoint Security Industry

    Essential Trends and Dynamics of the Endpoint Security Industry

    Essential Trends and Dynamics of the Endpoint Security Industry Lenny Zeltser wrote this paper together with a co-author who chose to remain anonymous. May 2005 This paper examines trends and dynamics of the endpoint security industry, and shows how business strategies of market leaders such as Symantec exemplify these factors. When exploring current developments in the information security marketplace, we stipulate that this sector is beginning to converge with the general IT software industry in response to factors such as the evolution of the industry structure, competitive dynamics, regulatory compliance efforts, and the maturing state of security products. Lenny Zeltser & Co-Author Page 1 Table of Contents Introduction ......................................................................................................................... 2 Characteristics of the Endpoint Security Industry........................................................... 2 Scope of the Industry ............................................................................................................ 2 Industry Size Estimates.........................................................................................................3 Structural Characteristics of the Industry............................................................................... 3 Competitive Dynamics........................................................................................................... 4 Industry Evolution: From 1990 to 2005 ............................................................................
  • Manual Norton Partition Magic 8.0 Full Version for Windows 7

    Manual Norton Partition Magic 8.0 Full Version for Windows 7

    Manual Norton Partition Magic 8.0 Full Version For Windows 7 Norton Partition Magic is an application used to manage hard disks on your computer, that has a If you are a moderator please see our troubleshooting guide. A familiar layout with disk map plus a full User Manual and lots of Help resources From EaseUS: As Partition Magic alternative, EaseUS Partition Master Home and GUID partition table (GPT) disk under Windows 2000/XP/Vista/7/8/8.1/10. If you have a Windows 8/8.1 system, DO NOT manage your partition with this. Supported OS: Windows 10/7/8/vista/XP and Windows Server 2003/2008/2012 Guide & Tips. How to extend system partition But Windows 8 is not supported by Norton Partition Magic), or can not be boot from a bootable CD/DVD. Partition. How to backup photos from iphone4 to icloud server backup windows server 2008 · Ipad compatible backup camera symantec netbackup 7.5 error code 58 Dodge grand caravan everyone the key NTFS partitions, made Source manually copy two components to users whose machines almost completely dead HDD. Magic EaseUS Partition Master is totally free partition manager for home users. Guide & Tips Say, create a new partition to install Windows 7, or extend the full system partition manager software for Windows 7 32 bit and 64 bit and Windows 8. Partition Magic ® is a registered trademark of Symantec Corporation. filemaker pro 12 crack norton partitionmagic 8.05 serial number keylogger for windows Camtasia studio 8 free download for windows 7 32bit vray 3ds max 2010 64 with Powerdvd 10 ultra 3d free download full version sony architect pro 5.2 photoshop lightroom mac serial windows 8 the missing manual captivate 4.
  • Symantec Ghost Solution Suite 2.5

    Symantec Ghost Solution Suite 2.5

    Symantec Ghost Solution Suite 2.5 COURSE DESCRIPTION The Symantec Ghost Solution Suite 2.5 course builds Who Should Attend your knowledge of the Symantec Ghost Solution Suite, This course is for network and system administrators, IT enabling you to deploy systems across your network and managers, IT support personnel, and other network operations maintain client computers effectively and efficiently. staff who are responsible for deploying new computers across their organizations, managing ongoing software and hardware Delivery Method configuration tasks for computers, and retiring outdated Instructor-led training (ILT) computers. Duration Prerequisites Four days You should have working knowledge of network topology, TCP/IP networking, basic network administration; and a Course Objectives conceptual understanding of network design and best practices. By the end of this course, you should be able to: Hands-On • Build boot packages that can be used to create and This course includes practical exercises that enable you to test restore images, connect to a multicast server, or your new skills and begin to transfer them into your working boot to DOS. environment. • Manually create and restore images using the DOS- based graphical user interfaces for both Ghost and DeployCenter. COURSE OUTLINE • Apply best practices for creating a master image file to deploy systems across a network. Computer Lifecycle Management and Symantec Products • • Use the multicasting technologies included in the Overview of Computer Lifecycle Management • Ghost Solution Suite to deploy images to systems Symantec Products for Managing the Computer Lifecycle across a network. • Exercise: Self-assessment • Use Ghost’s command line interface and DeployCenter’s scripting language to automate Ghost Solution Suite Product Overview • image creation and restoration processes.
  • Acronis True Image One-Ups Norton Ghost

    Acronis True Image One-Ups Norton Ghost

    FIRST LOOKS ACRONIS TRUE IMAGE ONE-UPS NORTON GHOST ACRONIS TRUE IMAGE 8, US$49.99; MACROVENTION SDN BHD (03-2169 6202); ADVANCE TECHNICAL CONSULTING SDN BHD (04-646 3526); WEB COMMERCE COMMUNICATIONS LIMITED (03-8996 6788); NETWORK FUSION SDN BHD (03-7728 2778); WWW.ACRONIS.COM.SG; ●●●● he easiest way to back up a out for its Linux-based emergency high-capacity drive is to image CD; it booted quickly and instantly it by creating a copy from which detected other machines in you can restore the entire drive our network. Ghost, by or extract individual files. The contrast, uses Microsoft’s Tleading imaging programs right now are Preboot Environment, Acronis True Image 8.0 and Symantec’s which boots slowly. On our Norton Ghost 9.0. two-network-card system, Both can make full or incremental backups, Ghost took ages to find either on schedule or on demand, while you remote machines and continue working in Windows. Both can sometimes didn’t find them at create and restore backups saved to your all. True Image’s advanced features include an option to set up a “secure zone” in a hidden disk partition for storing backup main drive, to USB or FireWire drives, writable True Image lets you assign a images safely. CDs or DVDs, or any other local or network drive letter to a backup image so drives. Both let you extract one or more you can browse the image’s files lacks these, but its networking worked backed-up files while working in Windows in Explorer or open documents from the File without further configuration on our tests.
  • 2012 Consumer Security Products Performance Benchmarks (Edition 2) Antivirus and Internet Security Windows 7

    2012 Consumer Security Products Performance Benchmarks (Edition 2) Antivirus and Internet Security Windows 7

    2012 Consumer Security Products Performance Benchmarks (Edition 2) Antivirus and Internet Security Windows 7 November 2011 Document: 2012 Consumer Security Products Performance Benchmarks (Edition 2) Authors: M. Baquiran, D. Wren Company: PassMark Software Date: 14 November 2011 Edition: 2 File: antivirus_12-performance-testing-ed2.docx Consumer Internet Security and Antivirus Solutions PassMark Software Table of Contents TABLE OF CONTENTS ......................................................................................................................................... 2 REVISION HISTORY ............................................................................................................................................ 4 REFERENCES ...................................................................................................................................................... 4 EXECUTIVE SUMMARY ...................................................................................................................................... 5 OVERALL SCORE ................................................................................................................................................ 6 PRODUCTS AND VERSIONS ............................................................................................................................... 8 INTERNET SECURITY SOFTWARE .................................................................................................................................. 8 ANTIVIRUS SOFTWARE .............................................................................................................................................
  • Read&Write for Google Chrome™ Quick Reference Guide 02.16

    Read&Write for Google Chrome™ Quick Reference Guide 02.16

    Read&Write for Google Chrome™ Quick Reference Guide 0 2.16 Helpful videos: h ttp://bit.ly/RWGoogleVideos Tech Support Questions: h ttp://support.texthelp.com Docs Tools Description Symbol User Notes Text to Reads text aloud with dual color Place your cursor (or highlight) where Speech highlighting using natural-sounding you wish the text to be spoken. Click male and female voices. this Play button to hear it read aloud. Talking Provides definitions which can be Highlight a word to look up in the Dictionary speech enabled to improve dictionary and click on this icon. Click comprehension and writing. on the definition to have it read. Picture Displays images from Widgit® Click on the Picture Dictionary icon Dictionary Symbols for selected words to help and then select a word or vice versa. support fluency & understanding. An image of the word will be displayed. Word Predicts the word being typed and Click icon to open or close prediction Prediction the next word to be typed. Develops window. As you type, words will be writing skills and helps construct predicted. Hover over word to hear sentences easily. aloud. Click on word or press ctrl + the number next to the word you would like to insert. Fact Finder Helps users to research information Highlight a word or phrase, then click quickly by searching the web for the Fact Finder icon to do a quick relevant information about a topic. Google web search to find background info while reading. Translator Allows single words to be translated Click this button to open the into Spanish, French or Portuguese translator, and select a word to have it and spoken in that language.