(12) United States Patent (10) Patent No.: US 7,191.934 B2 Miller Et Al

Total Page:16

File Type:pdf, Size:1020Kb

(12) United States Patent (10) Patent No.: US 7,191.934 B2 Miller Et Al US007191934B2 (12) United States Patent (10) Patent No.: US 7,191.934 B2 Miller et al. (45) Date of Patent: Mar. 20, 2007 (54) TECHNIQUE FOR CREATING 5,291,399 A 3, 1994 Chaco INCIDENTSPECIFIC CREDENTIALSAT 5,337,361 A 8/1994 Wang et al. THE SCENE OF A LARGE-SCALE INCIDENT 5,343,446 A 8/1994 Simmons et al. OR WMD EVENT 5,393,965 A 2f1995 Bravman et al. 5,399,846 A 3, 1995 Pavlidis et al. 5,406,491 A 4/1995 Lima (75) Inventors: Russell L. Miller, Traverse City, MI 5,459,657 A 10/1995 Wynn et al. (US); Michael A. Whelan, Traverse 5,522,623 A * 6/1996 Soules et al. ................. 283.91 City, MI (US) 5,573.278 A 11/1996 Clemens 5,596,652 A 1/1997 Piatek et al. (73) Assignee: Salamander Technologies, Inc., 5,635,012 A 6/1997 Belluci et al. Traverse City, MI (US) 5,793,882 A 8, 1998 Piatek et al. 5,801,364 A 9, 1998 Kara et al. (*) Notice: Subject to any disclaimer, the term of this 5,995,077 A 11/1999 Wilcox et al. patent is extended or adjusted under 35 U.S.C. 154(b) by 0 days. (Continued) OTHER PUBLICATIONS (21) Appl. No.: 10/892,857 Financial World(R), Srikumar S. Rao, “Tomorrow's Rosetta Stones.” (22) Filed: Jul. 16, 2004 Nov. 22, 1994 (pp. 70-72). (Continued) (65) Prior Publication Data Primary Examiner Michael G. Lee US 2005/OO 1707O A1 Jan. 27, 2005 Assistant Examiner—Edwyn LabaZe (74) Attorney, Agent, or Firm Price, Heneveld, Cooper, Related U.S. Application Data DeWitt & Litton, LLP (60) Provisional application No. 60/488,762, filed on Jul. 21, 2003. (57) ABSTRACT An incident management system includes a check-in com (51) Int. Cl. puter system and a portable data terminal. The check-in G06F 7/00 (2006.01) computer system is utilized to read information from a (52) U.S. Cl. ....................... 235/376; 235/380: 235/487 plurality of pre-existing identification (ID) cards and utilize (58) Field of Classification Search ........ 235/375 377, at least a portion of the information to create an incident 235/380,385, 462.46, 487; 902/47 specific credential for each person responding to an incident. See application file for complete search history. The portable data terminal is configured to read the incident (56) References Cited specific credentials and communicate with the check-in computer system to provide current assignments of person U.S. PATENT DOCUMENTS nel responding to an incident such that the personnel can be 5,113,445 A 5/1992 Wang tracked. 5,243,655 A 9/1993 Wang 5,266,780 A 1 1/1993 Kamata et al. 29 Claims, 4 Drawing Sheets 100 114. 1. CHECK-INPC 106 DISPLAY MEMORY SUBSYSTEM 124 COMMAND PC US 7,191.934 B2 Page 2 U.S. PATENT DOCUMENTS 2004/0078223 A1* 4/2004 Sacco et al. ................... 705/2 2004/010.5529 A1* 6, 2004 Salvucci et al. - - - - - - - - - - - - - - 379/45 6,029,889 2, 2000 Whalen et al. ............. 235,380 6,084,513 T/2000 Stoffer OTHER PUBLICATIONS 6,115,361 9, 2000 Fredericks et al. ......... 370,242 ID Systems, Craig Harmon, “Two-Dimensional Standards and ISO 6,305,605 10, 2001 Goetz et al. ......... ... 235,385 Update.” Nov. 1994 (pp. 22, 24 and 100). 6.421,650 T/2002 Goetz et al. ... ... TOS/3 Traverse City Record Eagle, T.M. Shultz, "GT County Firefighters 6,499,658 12, 2002 Goetz et al. ... 235,385 to Test New Bar Coding Data System.” Jul. 6, 1994 (1 page). 6,751,805 6, 2004 Austion ........................... 2.94 Maryland/DC Firefighter, Brad Schnaidt, “The Fire Service and 6,761,312 T/2004 Piatek et al. ... 235,385 Barcodes-Approaching the 21 Century.” vol. 9, No. 1, Autumn 6,796494 9, 2004 Gonzalo ........ ... 235,380 1994 (pp. 155, 157 and 159). 6,824,065 11, 2004 Boone et al. .. ... 235,492 The New York Times, Barnaby J. Feder, “For Bar Codes, an Added 6,857,210 2, 2005 Santa Cruz .... ... 40,124.06 Dimension.” Apr. 24, 1991 (2 pages). 7,027,955 4, 2006 Markwitz et al. ........... 7O2,187 Automatic I.D. News, Brad Schnaidt, “In the Line of Fire: 2-D Bar 2002.0024507 2, 2002 Boone et al. Codes Track Whose Battling Fires and Provide Rescue Workers 2002/0118118 8, 2002 Myllymaki et al. ...... 340,686.1 with Firefighter's Medical History,” Aug. 1994 (pp. 18-19). 2003/0052788 3, 2003 Kwong-Tai Chung ... 340/573.1 2003/O125998 T/2003 Fortune, Mark Alpert, “Building a Better Bar Code.” Jun. 15, 1992 McKenney et al. ............ 705/7 (1 page). 2003/O196097 10, 2003 Korosec et al. ...... ... 713,185 2003/0225612 12, 2003 DeSimone et al. ........... 705/13 * cited by examiner U.S. Patent Mar. 20, 2007 Sheet 1 of 4 US 7,191.934 B2 st st V N N N V s P -------- a1 d U.S. Patent Mar. 20, 2007 Sheet 3 of 4 US 7,191.934 B2 Co WCo 048 U.S. Patent US 7,191.934 B2 US 7,191.934 B2 1. 2 TECHNIQUE FOR CREATING These and other features, advantages and objects of the INCIDENTSPECIFIC CREDENTIALSAT present invention will be further understood and appreciated THE SCENE OF A LARGE-SCALE INCIDENT by those skilled in the art by reference to the following OR WMD EVENT specification, claims and appended drawings. CROSS-REFERENCE TO RELATED BRIEF DESCRIPTION OF THE DRAWINGS APPLICATION FIG. 1 is an electrical block diagram of an exemplary This application claims the benefit of U.S. Provisional Emergency Management Accountability System (E-MAS), Patent Application Ser. No. 60/488,762, entitled SYSTEM 10 according to one embodiment of the present invention; AND METHOD FOR CREATING INCIDENT SPECIFIC FIG. 1A is a front view of an exemplary E-MAS creden CREDENTIALS AT THE SCENE OF A LARGE-SCALE tial, configured according to one embodiment of the present INCIDENT OR WMD EVENT, filed Jul 21, 2003, the invention; entire disclosure of which is hereby incorporated herein by FIG. 1B is a back view of the E-MAS credential of FIG. reference. 15 1A: FIG. 2 is a block diagram of exemplary E-MAS func BACKGROUND OF THE INVENTION tionality, according to one embodiment of the present inven tion; The present invention is generally directed to manage FIG. 3 is a site accountability block diagram, according to ment of a large-scale incident or weapons of mass destruc tion (WMD) event and, more specifically, to the implemen one aspect of the present invention; and tation of incident-specific credentials for responders to a FIG. 4 is an exemplary command computer system main large-scale incident or WMD event. SCC. The recent Sep. 11, 2001, terrorist attacks have high DETAILED DESCRIPTION OF PREFERRED lighted various deficiencies in how emergency or civilian responders to, or victims of a large-scale incident are 25 EMBODIMENTS tracked at the scene of an incident. In general. Such tracking has been required for both logistics and site security. The According to various embodiments of the present inven current state-of-the-art has been to login personnel or vic tion, incident-specific and time-limited credentials may be tims at one or more staging points. At login, a record of the created to identify various levels of authority with respect to: 30 1) attendance at a site or incident (either global or sector person has been created either using pencil and paper or a specific); 2) performance of specific functions; and 3) pri computerized log. A temporary ID has then been issued or ority of treatment. According to one embodiment of the a designator (e.g., color Sticker, grease pen markings) present invention, incident-specific identifications (IDS)/cre applied to a pre-existing ID to indicate the status of a person dentials are created in the field by copying data from (e.g., approved to be on-site, triage status, etc.). The current 35 pre-existing, machine-readable IDs that the person or victim method is time-consuming, non-standardized and prone to has brought to the site (e.g., a driver's license, a military ID, human error. a Fire-Trax tag, etc.). According to another embodiment of What is needed is a technique that accounts for personnel the present invention, “authorities” and/or “time limits’ may and/or victims at a scene of an incident that is standardized, be incorporated into the credential, e.g., in human-readable efficient and less prone to human error. 40 text and/or in a machine-readable media. It should be SUMMARY OF THE INVENTION appreciated that the “time limits’ may also be thought of as an authorization. According to one embodiment of the present invention, an According to yet another embodiment of the present incident management system includes a check-in computer invention, a biometric is incorporated into the ID (e.g., a system and a portable data terminal. The check-in computer 45 person’s photograph) to positively identify the person. For system reads information from a plurality of pre-existing example, when a firefighter shows up at a staging area of a identification (ID) cards and utilizes at least a portion of the major incident, the firefighter's ID (e.g., including a PDF417 information to create an incident-specific credential for each bar code) is scanned and pertinent data automatically popu person responding to an incident. The portable data terminal lates a standard credential template. The system operator is configured to read the incident-specific credentials and 50 selects the “authority” of the credential by either using a communicate with the check-in computer system to provide system default (e.g., permitted on-scene), and/or qualifying current assignments of personnel responding to an incident the permission based on a sector (e.g., rehabilitation only) Such that the personnel can be tracked.
Recommended publications
  • Design of a Portable Data Collection Procedure System for Processing Space Shuttle Payloads and Main Engines at the Kennedy Space Center
    The Space Congress® Proceedings 1998 (35th) Horizons Unlimited Apr 30th, 1:00 PM Paper Session III-A - Design of a Portable Data Collection Procedure System for Processing Space Shuttle Payloads and Main Engines at the Kennedy Space Center Darcy Miller NASA, Kennedy Space Center John Lekki Nasa, Kennedy Space Center Kevin Jackson Sentel Corporation Mike Kappel Sentel Corporation Loretta Moore Auburn University Follow this and additional works at: https://commons.erau.edu/space-congress-proceedings Scholarly Commons Citation Miller, Darcy; Lekki, John; Jackson, Kevin; Kappel, Mike; and Moore, Loretta, "Paper Session III-A - Design of a Portable Data Collection Procedure System for Processing Space Shuttle Payloads and Main Engines at the Kennedy Space Center" (1998). The Space Congress® Proceedings. 7. https://commons.erau.edu/space-congress-proceedings/proceedings-1998-35th/april-30-1998/7 This Event is brought to you for free and open access by the Conferences at Scholarly Commons. It has been accepted for inclusion in The Space Congress® Proceedings by an authorized administrator of Scholarly Commons. For more information, please contact [email protected]. Design of a Portable Data Collection Procedure System for Processing Space Shuttle Payloads and Main Engines at the Kennedy Space Center Darcy Miller and John Lekki NASA, Kennedy Space Center Kevin Jackson and Mike Kappel SENTEL Corporation Loretta Moore Auburn University Abstract: The Portable Data Collection (PDC) Procedure System is currently being developed to allow Work Authorization Documents (WADs) to be run electronically at the Kennedy Space Cen- ter (KSC). WADs are used throughout KSC to perform various tests, maintenance, and integration tasks, including processing of Space Shuttle Main Engine hardware and Space Shuttle Payloads.
    [Show full text]
  • Now Running Android™
    now running Android™ Honeywell’s new Dolphin® 7800 Android™ rugged EDA pairs the intuitive Google® Android™ operating system with remote device management capabilities and invaluable security features, making the device enterprise ready. Leveraging a field-proven platform, the Dolphin 7800 Android™ revolutionizes the user experience for mobile workers, driving increased productivity. INTERESTED IN A DOLPHIN 7800 ANDROID™ DEMO UNIT? Contact [email protected] to find out about Dolphin 7800 demo opportunities. © 2012 Honeywell International Inc. All rights reserved. MOBILE COMPUTERS In December 2007, Honeywell entered the AIDC space with the acquisition of Hand Held Products. In July 2008, Honeywell acquired another industry leader, Metrologic, to form Honeywell Scanning & Mobility. Honeywell Scanning & Mobility is now a leading manufacturer of high- performance laser- and image-based data collection hardware, including rugged mobile computers and bar code scanners. The product portfo- lio is one of the broadest in the AIDC industry, providing you with solutions for vertical markets such as retail; healthcare; and transportation and logistics. Honeywell complements their innovative products with advanced software, service and professional solutions that enable customers to effectively manage data and assets. SCANPAL® 2 > Easy to read, backlit LCD screen > CCD scan engine > Capable of storing over 50,000 records > 2 ‘AAA’ batteries provide over 100 hours of operation > Easy to use Application Generator and download software > Supports
    [Show full text]
  • 89 Koolertron Rugged Extreme Handheld Mobile Computers, Data
    4/9/2018 Amazon.com : Rugged Extreme Handheld Mobile Computers, Data Terminal With Motorola Symbol 1D Laser Barcode Scanner / GPS / C… Office Products barcode scanner Deliver to Jake EN Hello, Jake 0 SURPRISE 85388 Departments Browsing History Account & Lists Orders Prime Cart Office Products Office Deals Supplies Office Electronics Printers, Ink & Toner Ink & Toner Projectors Pens & Writing Calendars & Planners Your Prime Video membership is expiring Your Prime Video membership will end on April 10, 2018 and you will no longer have access to Prime Video benefits. Continue your membership. Office Products › Office Electronics › Point-of-Sale (POS) Equipment › Bar Code Scanners Cruiser Share Rugged Extreme Handheld Mobile Computers, Data Terminal With Add a Protection Plan: 4-Year Protection for $37.63 Motorola Symbol 1D Laser Barcode 3-Year Protection for $13.09 Scanner / GPS / Camera, Android 5.1 OS, Qualcomm Quad Core CPU, WiFi Add to Cart 802.11 b/g/n 10 customer reviews Turn on 1-Click ordering for this browser | 42 answered questions Price: $499.99 Deliver to Jake - SURPRISE 85388 Get $70 off instantly: Pay $429.99 upon approval for the Amazon Prime Rewards Visa Card. Add to List Only 1 left in stock - order soon. Add to your Dash Buttons Want it tomorrow, April 10? Order within 3 hrs 53 mins and choose One-Day Shipping at checkout. Details Sold by Sinicvision Technology and Fulfilled by Amazon. Other Sellers on Amazon Roll over image to zoom in Gift-wrap available. New (2) from $499.99 Original box. Comes with: 1* handheld device, 1* 3800mAH battery, 1* charger (US standard), 1* USB Have one to sell? Sell on Amazon cable.
    [Show full text]
  • Carolina Population Center University of North Carolina at Chapel Hill 123 W
    Carolina Population Center University of North Carolina at Chapel Hill 123 W. Franklin Street Chapel Hill, NC 27516 Phone: 919-966-7482 Informatics Technology for Use in HIV/AIDS Fax: 919-966-2391 Treatment in Resource-Poor Settings [email protected] www.cpc.unc.edu/measure Michael Rodriguez, Mark Spohr, Theo Lippeveld, Michael Edwards Collaborating Partners: October 2005 Macro International Inc. WP-05-86 11785 Beltsville Drive, Suite 300 Calverton, MD 20705-3119 Phone: 301-572-0200 Fax: 301-572-0999 [email protected] John Snow, Inc. 1616 N. Ft. Myer Drive, 11th Floor Arlington, VA 22209 Phone: 703-528-7474 Fax: 703-528-7480 [email protected] Tulane University 1440 Canal Street, Suite 2200 New Orleans, LA 70112 Phone: 504-584-3655 Fax: 504-584-3653 [email protected] Futures Group International 2605 Meridian Parkway Durham, NC 27713 Phone: 919-313-7722 Fax: 919-313-7523 Funding Agency: U.S. Agency for International Development Washington, DC 20523-3600 Phone: 202-712-4959 KKKKKK This working paper series is made possible by support from the U.S. Agency for International Development (USAID) under Contract No. GPO-A-00-03-00003-00. The opinions expressed are those of the authors, and do not necessarily reflect the views of USAID or the U.S. government. The working papers in this series are produced by MEASURE Evaluation in order to speed the dissemination of information from research studies. Most working papers currently are under review or are awaiting journal publication at a later date. Reprints of published papers are substituted for preliminary versions as they become available.
    [Show full text]
  • 1. Types of Computers Contents
    1. Types of Computers Contents 1 Classes of computers 1 1.1 Classes by size ............................................. 1 1.1.1 Microcomputers (personal computers) ............................ 1 1.1.2 Minicomputers (midrange computers) ............................ 1 1.1.3 Mainframe computers ..................................... 1 1.1.4 Supercomputers ........................................ 1 1.2 Classes by function .......................................... 2 1.2.1 Servers ............................................ 2 1.2.2 Workstations ......................................... 2 1.2.3 Information appliances .................................... 2 1.2.4 Embedded computers ..................................... 2 1.3 See also ................................................ 2 1.4 References .............................................. 2 1.5 External links ............................................. 2 2 List of computer size categories 3 2.1 Supercomputers ............................................ 3 2.2 Mainframe computers ........................................ 3 2.3 Minicomputers ............................................ 3 2.4 Microcomputers ........................................... 3 2.5 Mobile computers ........................................... 3 2.6 Others ................................................. 4 2.7 Distinctive marks ........................................... 4 2.8 Categories ............................................... 4 2.9 See also ................................................ 4 2.10 References
    [Show full text]
  • The Increasing Use of Portable Computing and Communication Devices and Its Impact on the Health of EU Workers
    K E - 3 0 - 1 0 - 3 2 5 - E The increasing use of portable N - C computing and communication devices and its impact on the health of EU workers Are you interested in the publications of the Directorate-General for Employment, Social Affairs and Equal Opportunities? If so, you can download them or take out a free subscription at http://ec.europa.eu/social/publications You are also welcome to sign up to receive the European Commission’s free Social Europe e-newsletter at http://ec.europa.eu/social/e-newsletter http://ec.europa.eu/social/ European Commission The increasing use of portable computing and communication devices and its impact on the health of EU workers European Commission Directorate-General for Employment, Social Affairs and Equal Opportunities Unit F.4 Manuscript completed in December 2009 Neither the European Commission nor any person acting on behalf of the Commission may be held responsible for the use that may be made of the information contained in this publication. For any use or reproduction of photos which are not under European Union copyright, permission must be sought directly from the copyright holder(s). Europe Direct is a service to help you find answers to your questions about the European Union Freephone number (*): 00 800 6 7 8 9 10 11 (*) Certain mobile telephone operators do not allow access to 00 800 numbers or these calls may be billed. More information on the European Union is available on the Internet (http://europa.eu). Cataloguing data can be found at the end of this publication.
    [Show full text]
  • F:RR8 Retail Price List Pdf.RRW
    MicroGram Computers Phone: (02) 4389 8444 Date: 26/07/05 Fax: (02) 4389 8388 Price List Page: 1 Cat No Description RRP Ex GST Inc GST Access Control - RFID Devices 1008142-12 RFID & Finger Print Reader/Controller 1817.27 1999.00 This RFID access controller also has a built in finger print reader as well as a keypad. It is suitable for access control, time recorders etc. 1008145-12 RFID - PC Based Access Control Software 362.73 399.00 This RFID access controller also has a built in finger print reader as well as a keypad. It is suitable for access control, time recorders etc. 1008079-12 RFID Controller 244.55 269.00 This stand-alone single door Controller which will accept inputs from RFID readers, Cat Nos 1008057, 1008080. There is also provision for an alarm loop and a push button connection. It has a card capacity of 9,999 users. Operating Modes - Card only (six digits) or free access using Facility Code (First two digits only). Programmable door release time from 1 to 250 seconds Built-in Watch Dog, the system never hangs Data is protected even after power failure. Programmable alarm loop enable / disable. Access Codes can easily be added or deleted. Supports one RFID reader. 1008082-12 RFID Controller - Electric Door Lock 171.82 189.00 A quality stainless steel, electrically operates lock which is activated by an RFID controller. It has the following features: . Concealed mortise mounting. Slimline styling suits most narrow profile joinery. Continuously rated solenoids. Power reduction module-minimises power consumption and maximises durability.
    [Show full text]
  • Using Palmtop Computers to Collect Plant Data in the Field
    and MEQ portable data terminal (Mars Electronics International, West Chester, Pa. ). Disadvantages associated with some data loggers include relatively small character size (if a screen is present) and limited battery and memory capacity. The absence of note- taking software on many loggers is particularly vexing when factors other than the imposed treatments are sus- pected of influencing the experimen- tal results. Loggers are sometimes used by plant breeders, although specific field observations of plant selections must be converted to numerical rat- orticulturists often col- ings for data collection. using Palmtop lect experimental data in Computers to H the orchard, field, green- Portable computers house, or laboratory by recording each Some horticulturists prefer to use Collect Plant measurement or observation by hand portable computers with standard key- onto a data sheet. Information gath- board formats (QWERTY) as data-en- Data in the Field ered in this manner is then entered try terminals in the field. These devices into a computer file or calculator for are generally smaller (<20 inches on the statistical analysis. Although manual diagonal when opened) and lighter (<10 Laura Lehman-Saladal, recording is uncomplicated and adapt- pounds) than desktop computers. Three 2 3 able to a variety of settings, it can be major classes, in order of largest to K. Hickey , and T. Salada time-consuming and less efficient than smallest, are notebook, subnotebook, other methods of data collection. and palmtop computers. Using a portable computer, data Additional index word. computer Data loggers can be collected for several days or applications One alternative is to use a por- weeks before downloading is required.
    [Show full text]
  • Hitachi Handheld PC PERSONA for Windows CE
    Hitachi HandheldHitachi PC Review PERSONA Vol. 48 for(1999), Windows No. 1 CE 34 Hitachi Handheld PC PERSONA for Windows CE Masaki Kawase OVERVIEW: The market for portable data terminals supporting mobile uses Eiji Matsuda such as data portability and accessing data from outside the office is projected to increase enormously in the coming years. Besides providing Katsufumi Takagishi address book and schedule management for individuals linked to PCs, Mitsuo Taniguchi demand is especially strong for portable machines that can serve as mail terminals for critical communication in pursing business activities and as business terminals that, for example, can be used to prepare and submit business reports as part of a public-relations or business support system. Considering the affinity of this type terminal with Windows*1 PCs and the desire for simple connectivity with the Internet and intranets, Hitachi, Ltd. developed the handheld PC PERSONA that runs the Japanese version of the new operating system Windows CE 2.0 from U.S.-based Microsoft. Intending to make the product faster and more readable and touch-typeable than other machines in its class, the PERSONA comes with a high-speed 100-MHz CPU, large-capacity 16 Mbyte of memory, a large 8.1-inch color display, and an ample keyboard that is conducive to touch typing. In addition, a 33.6-kbit/s high-speed modem, a digital cell phone, and Personal Handyphone System (PHS) datacom interface come as standard equipment, thus making the PERSONA*2 a pleasant-to-use and convenient communications environment for e-mail and other datacom applications.
    [Show full text]
  • Perancangan Dan Implementasi Aplikasi Portable Data Terminal Dengan Metode Pemindai Barcode Barang Gudang Menggunakan Platform Android (Studi Kasus: PT
    Perancangan dan Implementasi Aplikasi Portable Data Terminal Dengan Metode Pemindai Barcode Barang Gudang Menggunakan Platform Android (Studi Kasus: PT. Pura Barutama, Kudus) Artikel Ilmiah Diajukan kepada Fakultas Teknologi Informasi untuk memperoleh Gelar Sarjana Komputer Peneliti: Laksono Aryo Widhiatmono (672012013) Yos Richard Beeh, ST., M.Cs. Ramos Somya, S.Kom., M.Cs. Program Studi Teknik Informatika Fakultas Teknologi Informasi Universitas Kristen Satya Wacana Salatiga Agustus 2016 Perancangan dan Implementasi Aplikasi Portable Data Terminal Dengan Metode Pemindai Barcode Barang Gudang Menggunakan Platform Android (Studi Kasus: PT. Pura Barutama, Kudus) 1Laksono Aryo Widhiatmono, 2Yos Richard Beeh, 3Ramos Somya Fakultas Teknologi Informasi Universitas Kristen Satya Wacana Jl. Diponegoro 52-60, Salatiga 50711, Indonesia Email: 1)[email protected], 2)[email protected], 3)[email protected] Abstract PT. Pura Barutama has many units where each unit has a warehouse. Recording is one of the business processes in the warehouse. There are two ways of recording the goods, the first way is to write the item code on the paper then the officer returned to the recording computer to enter the item code into the system. The second way is with the freighter heading for recording computer to scan the barcode using a laser barcode scanner. It does have a weakness and biting mistake. Applications developed in the form of mobile- based applications with the Android operating system. The system is designed using the method of prototyping with 3 times the evaluation process. The test results showed that the development of portable data terminal can speed up the work of field personnel of the previously written on paper becomes minimal barcode scanning errors.
    [Show full text]
  • MC31XX Series Mobile Computer Integrator Guide
    MC31XX Series Mobile Computer Integrator Guide MC31XX Series Mobile Computer Integrator Guide 72E-124292-02 Revision A May 2010 ii MC31XX Series Mobile Computer Integrator Guide © 2009 by Motorola, Inc. All rights reserved. No part of this publication may be reproduced or used in any form, or by any electrical or mechanical means, without permission in writing from Motorola. This includes electronic or mechanical means, such as photocopying, recording, or information storage and retrieval systems. The material in this manual is subject to change without notice. The software is provided strictly on an “as is” basis. All software, including firmware, furnished to the user is on a licensed basis. Motorola grants to the user a non-transferable and non-exclusive license to use each software or firmware program delivered hereunder (licensed program). Except as noted below, such license may not be assigned, sublicensed, or otherwise transferred by the user without prior written consent of Motorola. No right to copy a licensed program in whole or in part is granted, except as permitted under copyright law. The user shall not modify, merge, or incorporate any form or portion of a licensed program with other program material, create a derivative work from a licensed program, or use a licensed program in a network without written permission from Motorola. The user agrees to maintain Motorola’s copyright notice on the licensed programs delivered hereunder, and to include the same on any authorized copies it makes, in whole or in part. The user agrees not to decompile, disassemble, decode, or reverse engineer any licensed program delivered to the user or any portion thereof.
    [Show full text]
  • The Social Construction of the Laptop Computer and the Emergence of a Type Form ATKINSON, P
    Man in a briefcase: the social construction of the laptop computer and the emergence of a type form ATKINSON, P. <http://orcid.org/0000-0002-6633-7242> Available from Sheffield Hallam University Research Archive (SHURA) at: http://shura.shu.ac.uk/965/ This document is the author deposited version. You are advised to consult the publisher's version if you wish to cite from it. Published version ATKINSON, P. (2005). Man in a briefcase: the social construction of the laptop computer and the emergence of a type form. Journal of design history, 18 (2), 191- 205. Copyright and re-use policy See http://shura.shu.ac.uk/information.html Sheffield Hallam University Research Archive http://shura.shu.ac.uk Man in a Briefcase: the social construction of the laptop computer and the emergence of a type form ©Paul Atkinson 2005 This is a text-only version of a published article. Images have been removed to alleviate copyright problems. References to images appear in bold in square caps. For the full version with images, please see the Journal of Design History , 18(2): 2005: 191-205. [doi:10.1093/jdh/epi024] This is available from: http://jdh.oxfordjournals.org/content/vol18/issue2/index.dtl Abstract Dominant design discourse of the late 1970s and early 1980s presented the introduction of the laptop computer to be the result of ‘inevitable’ progress in a variety of disparate technologies, pulled together to create an unprecedented, revolutionary technological product. While the laptop was a revolutionary product, such a narrative works to dismiss a series of products which predated the laptop but which had much the same aim, and to deny a social drive for such products, which had been in evidence for a number of years before the technology to achieve them was available.
    [Show full text]