Gryphon™ Family General Purpose Handheld Linear Imager Or Laser Bar Code Readers Gryphon I GD4100/GM4100 Gryphon BT4100/ L GD4300

Total Page:16

File Type:pdf, Size:1020Kb

Gryphon™ Family General Purpose Handheld Linear Imager Or Laser Bar Code Readers Gryphon I GD4100/GM4100 Gryphon BT4100/ L GD4300 Gryphon™ Family General Purpose Handheld Linear Imager or Laser Bar Code Readers Gryphon I GD4100/GM4100 Gryphon BT4100/ L GD4300 Product Reference Guide Datalogic ADC, Inc. 959 Terry Street Eugene, OR 97402 USA Telephone: (541) 683-5700 Fax: (541) 345-7140 ©2011-2016 Datalogic, Inc. An Unpublished Work - All rights reserved. No part of the contents of this documentation or the procedures described therein may be reproduced or transmitted in any form or by any means without prior written permission of Datalogic ADC, Inc. or its subsidiaries or affiliates ("Datalogic" or “Datalogic ADC”). Owners of Datalogic products are hereby granted a non- exclusive, revocable license to reproduce and transmit this documentation for the pur- chaser's own internal business purposes. Purchaser shall not remove or alter any propri- etary notices, including copyright notices, contained in this documentation and shall ensure that all notices appear on any reproductions of the documentation. Should future revisions of this manual be published, you can acquire printed versions by contacting your Datalogic representative. Electronic versions may either be downloadable from the Datalogic website (www.datalogic.com) or provided on appropriate media. If you visit our website and would like to make comments or suggestions about this or other Dat- alogic publications, please let us know via the "Contact Datalogic" page. Disclaimer Datalogic has taken reasonable measures to provide information in this manual that is complete and accurate, however, Datalogic reserves the right to change any specification at any time without prior notice. Datalogic and the Datalogic logo are registered trademarks of Datalogic S.p.A. in many countries, including the U.S.A. and the E.U. All other brand and product names may be trademarks of their respective owners. Patents See www.patents.datalogic.com for patent list. Table of Contents INTRODUCTION ................................................................................................................................................................................ 9 About this Manual .......................................................................................................................................................................................... 9 Overview .................................................................................................................................................................................................................................................... 9 Manual Conventions ...........................................................................................................................................................................................................................10 References .....................................................................................................................................................................................................10 Technical Support ........................................................................................................................................................................................10 Datalogic Website Support ...............................................................................................................................................................................................................10 Reseller Technical Support ................................................................................................................................................................................................................10 Telephone Technical Support ..........................................................................................................................................................................................................10 About the Reader .........................................................................................................................................................................................11 The BC40xx™ Radio Base .............................................................................................................................................................................11 Base LEDs .................................................................................................................................................................................................................................................11 Base Button .............................................................................................................................................................................................................................................12 BC40XX UV Counterfeit Detection ..............................................................................................................................................................12 Display ...........................................................................................................................................................................................................14 Battery Safety ...............................................................................................................................................................................................14 Programming the Reader ............................................................................................................................................................................16 Configuration Methods ......................................................................................................................................................................................................................16 SETUP .............................................................................................................................................................................................. 17 Unpacking .....................................................................................................................................................................................................17 Setting Up the Reader ..................................................................................................................................................................................17 Installing the Interface Cable ......................................................................................................................................................................18 Configuring the Base Station ......................................................................................................................................................................20 Changing the Base Station Position ..............................................................................................................................................................................................21 Connecting the Base Station ............................................................................................................................................................................................................22 Connecting the Base when Security Pin is Enabled .................................................................................................................................................................25 Linking the Reader to a Base Station .............................................................................................................................................................................................25 Linking a BT Reader to a PC ..............................................................................................................................................................................................................26 GRYPHON™ I System and Network Layouts ...............................................................................................................................................27 Stand Alone Layouts ...........................................................................................................................................................................................................................27 Interface Selection .......................................................................................................................................................................................29 Setting the Interface ............................................................................................................................................................................................................................29 Customizing Configuration Settings ..........................................................................................................................................................33 Configure Interface Settings ...........................................................................................................................................................................................................33 Global Interface Features ...................................................................................................................................................................................................................33
Recommended publications
  • Master's Thesis Electronic Gatekeeper Using ETHERNET
    University of West Bohemia Faculty of Applied Sciences Department of Computer Science and Engineering Master’s thesis Electronic Gatekeeper using ETHERNET Plzeň 2019 Hamza Elghoul Místo této strany bude zadání práce. Declaration I hereby declare that this master’s thesis is completely my own work and that I used only the cited sources. Plzeň, 2 May 2018 Hamza Elghoul Abstract The aim of this thesis is the analysis and the realization of a budget 2-way communication system using ETHERNET connection, more specific- ally a door intercom station (hereinafter ”Bouncer” or "Gatekeeper"), where it is possible to make voice calls between two CLIENTS, a CALLER and a CALLEE with an acceptable to minimal delay. There are many alternative methods available for implementing such sys- tems, this project will try to compare some of these solutions and choose the most convenient platform according to a number of factors, such as band- width, processing power needed and communication protocols in question. Keywords: VoIP, SIP,SDP, server, client, LAN, ethernet, embedded, audio, raspberry pi Contents Page List of Figures7 1 Preface 10 2 Analysis 11 2.1 Objectives and Requirements................. 11 2.2 Hardware............................ 12 2.2.1 Arduino......................... 12 2.2.2 RaspberryPi 3 Model B................ 13 2.2.3 Banana Pi........................ 14 2.2.4 Orange Pi........................ 15 2.2.5 CubieBoard 2...................... 16 2.2.6 Beagle Bone Black................... 16 2.3 Application........................... 18 2.4 Audio capture and digitalisation................ 19 2.4.1 Signaling Protocols................... 20 2.5 Communication Protocol.................... 23 2.5.1 Session Initiation Protocol............... 23 2.5.2 Real Time Protocol..................
    [Show full text]
  • ITG Barcode Generator
    ITG Barcode Generator Copyright © 2007-2018, IT Genetics. All Rights Reserved. 3 Contents Introduction 5 1 Key Fe.a..t.u..r..e..s......................................................................................................................... 5 2 System.. .R..e..q..u..i.r.e..m...e..n..t.s............................................................................................................ 6 3 Installi.n..g................................................................................................................................ 6 4 What c.a..n.. .y..o..u.. .d..o.................................................................................................................... 6 How to Generate Barcode Labels 7 1 Genera..t.e.. .L..i.s..t........................................................................................................................ 7 2 Forma.t.t.i.n..g.. .B..a..r.c..o..d..e............................................................................................................... 9 Printing Barcodes 9 1 Printin.g.................................................................................................................................. 9 2 Chang..i.n..g.. .P...r.i.n..t.e..r. .S..e..t.t.i.n..g..s.................................................................................................... 11 Selecting Label Type 11 1 Label. .T..y..p..e..s. .S...u..p..p..o..r.t.e..d........................................................................................................ 14 Symbologies
    [Show full text]
  • Barcode Symbology Reference Guide a Guide to Assist with Selecting the Barcode Symbology
    omni-id.com Barcode Symbology Reference Guide A guide to assist with selecting the barcode symbology This document Provides background information pertaining to the major barcode symbologies to allow the reader to understand the features of the codes. Barcode Symbology Reference Guide omni-id.com Contents Introduction 3 Code 128 4 Code 39 4 Code 93 5 Codabar (USD-4, NW-7 and 2OF7 Code) 5 Interleaved 2 of 5 (code 25, 12OF5, ITF, 125) 5 Datamatrix 5 Aztec Codd 6 QR Code 6 PDF-417 Standard and Micro 7 2 Barcode Symbology Reference Guide omni-id.com Introduction This reference guide is intended to provide some guidance to assist with selecting the barcode symbology to be applied to the Omni-ID products during Service Bureau tag commissioning. This document Provides background information pertaining to the major barcode symbologies to allow the reader to understand the features of the codes. This guide provides information on the following barcode symbologies; • Code 128 (1-D) • Code 39 (1-D) • Code 93 (1-D) • Codabar (1-D) • Interleave 2of5 (1-D) • Datamatrix (2-D) • Aztec code (2-D) • PDF417-std and micro (2-D) • QR Code (2-D) 3 Barcode Symbology Reference Guide omni-id.com Code 128 Code 128 is one of the most popular barcode selections. Code 128 provides excellent density for all-numeric data and good density for alphanumeric data. It is often selected over Code 39 in new applications because of its density and because it offers a much larger selection of characters. The Code 128 standard is maintained by AIM (Automatic Identification Manufacturers).
    [Show full text]
  • Download Windows Live Messenger for Linux Ubuntu
    Download windows live messenger for linux ubuntu But installing applications in Ubuntu that were originally made for I found emescene to be the best Msn Messenger for Ubuntu Linux so far. It really gives you the feel as if you are using Windows Live Messenger. Its builds are available for Archlinux, Debian, Ubuntu, Fedora, Mandriva and Windows. At first I found it quite difficult to use Pidgin Internet Messenger on Ubuntu Linux. Even though it allows signing into MSN, Yahoo! Messenger and Google Talk. While finding MSN Messenger for Linux / Ubuntu, I found different emesene is also available and could be downloaded and installed for. At first I found it quite difficult to use Pidgin Internet Messenger on Ubuntu Linux. Even though it allows signing into MSN, Yahoo! Messenger. A simple & beautiful app for Facebook Messenger. OS X, Windows & Linux By downloading Messenger for Desktop, you acknowledge that it is not an. An alternative MSN Messenger chat client for Linux. It allows Linux users to chat with friends who use MSN Messenger in Windows or Mac OS. The strength of. Windows Live Messenger is an instant messenger application that For more information on installing applications, see InstallingSoftware. sudo apt-get install chromium-browser. 2. After the installation is Windows Live Messenger running in LinuxMint / Ubuntu. You can close the. Linux / X LAN Messenger for Debian/Ubuntu LAN Messenger for Fedora/openSUSE Download LAN Messenger for Windows. Windows installer A MSN Messenger / Live Messenger client for Linux, aiming at integration with the KDE desktop Ubuntu: Ubuntu has KMess in its default repositories.
    [Show full text]
  • Product Specifications
    SCANNER L-50 Series CCD - Laser - 2D Imager Highlights tSophisticated ergonomic design with an excellent price-to- performance ratio tIdeal solution for a variety of applications in retail, warehousing, distribution, healthcare, transportation and logistics tAvailable with CCD, laser or 2D Imager barcode scanner tRapidly scans and decodes a wide variety of 1D or 2D barcodes tUSB (HID), RS232 or keyboard wedge interfaces available tReplaceable interface cable tTop panel design allows for customer customization such as logos tDurable and reliable — withstands drops of 5 feet to concrete, IP 42 rating tAvailable in black or white tStand included for hands-free scanning tBacked by a two year warranty L-50 Product Specifications OPERATING INDICATORS SUPPORTED SYMBOLOGIES: SUPPORTED SYMBOLOGIES: CPU: ARM-926EJ-S 400 MHz UPC-A, UPC-A Add-on, UPC-E, UPC-E Add-on, EAN-13, BARCODE (1D): UPC-A, UPC-A Add-on, UPC-E, EAN-13 Add-on, EAN-8, EAN-8 Add-on, Code 39, UPC-E Addon, EAN-13, EAN-13 Add-on, EAN-8, EAN-8 VISUAL: 1 white LED Tri-Optic, NW-7 (Codabar), Industrial 2 of 5, Interleaved Add-on, JAN-8, JAN-13, Code 39, Tri-Optic, Codabar NON-VISUAL: Buzzer 2 of 5, Code 93, Code 128, GS1-128, S-Code, (NW-7), Industrial 2 of 5, Interleaved 2 of 5, S-Code, MSI/Plessey, UK/Plessey, TELEPEN, Matrix 2of5, IATA, Code 93, Code 128, MSI/Plessey, UK/Plessey, OPERATING KEYS Chinese Post Matrix 2of5, IATA, GS1 DataBar, GS1 TELEPEN, Matrix 2 of 5, Chinese Post Matrix 2 of 5, ENTRY OPTIONS: 1 scan key DataBar Limited, GS1 DataBar Expanded, Code 11, Code 11, Korean
    [Show full text]
  • Useful Facts About Barcoding
    Useful Facts about Barcoding When Did Barcodes Begin? (Part 1) A barcode is an optical machine-readable representation of data relating to the object to which it is attached. Originally barcodes represented data by varying the widths and spacing’s of parallel lines and may be referred to as linear or one-dimensional (1D). Later they evolved into rectangles, dots, hexagons and other geometric patterns in two dimensions (2D). Although 2D systems use a variety of symbols, they are generally referred to as barcodes as well. Barcodes originally were scanned by special optical scanners called barcode readers; later, scanners and interpretive software became available on devices including desktop printers and smartphones. Barcodes are on the leading edge of extraordinary things. They have given humans the ability to enter and extract large amounts of data in relatively small images of code. With some of the latest additions like Quick Response (QR) codes and Radio-frequency identification (RFID), it’s exciting to see how these complex image codes are being used for business and even personal use. The original idea of the barcode was first introduced in 1948 by Bernard Silver and Norman Joseph Woodland after Silver overheard the President of a local food chain talking about their need for a system to automatically read product information during checkout. Silver and Woodland took their inspiration from recognizing this rising need and began development on this product so familiar to the world now. After several attempts to create something usable, Silver and Woodland finally came up with their ”Classifying Apparatus and Method” which was patented on October 07, 1952.
    [Show full text]
  • BOLOGNA, ITALY, JUNE 23/26, 2014 FINAL PROGRAM Technically Co
    BOLOGNA, ITALY, JUNE 23/26, 2014 FINAL PROGRAM Technically Co-Sponsored by the IEEE Communications Society 2014 NICATIONS B B O O 5 5 R L 0 R L 0 O O O O s s G O e G O e N a M N a M t A t s A s 2 1 23 JUNE 2014 1 S 4 G R 0 A O L s O I e L a M E t s I ON NETWOKS AND COMMU FL OOR PLA N EUROPEAN CONFERENCE ROOM DA VINCI 20 seats R O O 8 M 0 s M e a E t U s C C I M 5 A R 0 R O C s O O e a M N t I s 1 M 5 A R 0 R O C s O O e a M N t I s 2 2014 R O 3 O 0 M 0 s I e T a A t L s I NICATIONS A R 5 O 3 O 0 / M 8 5 E 0 U s R e O a P t s A 2 ON NETWOKS AND COMMU EUROPEAN CONFERENCE 2014 NICATIONS 26 JUNE B 1 - O 5 R 0 L O O s 25 O e G M - a N t A s 3 4 G R 0 A O L s O I e L a M E ON NETWOKS AND COMMU t s I FLOOR PLANS 24 EUROPEAN CONFERENCE ROOM DA VINCI 20 seats R O O 8 M 0 s M e a E t U s C C I R O O 1 M 2 0 M s A e R a t C s O N I 2014 R O 3 O 0 M 0 s I e T a A t L s I A NICATIONS R 5 3 O 0 O / 8 M 5 0 E 0 U R s O e a P t A s 4 ON NETWOKS AND COMMU EUROPEAN CONFERENCE EUROPEAN CONFERENCE ON NETWOKS AND COMMU NICATIONS 2014 Program SCHEDULE AT A GLANCE Monday 23 June Foyer Italia Bologna1 Bologna2 Marconi1 Marconi2 Meucci Da Vinci Galilei 08:00/09:00 W4 - W5 - Mobile W3 - A Global W6 - Test beds W7 - Fixed- Management of W8 - Advances in T1 - Indoor Cloud Perspective […] W2 - Enablers on for the Networks Mobile 09:00/10:40 Large Scale Wireless Body localization Infrastructures for Shaping the the road to 5G & Convergent Virtualized Area Networks and tracking and Services 5G Era Communications Networks Infrastructures 10:40/11:10 Coffee (Foyer Europa
    [Show full text]
  • Programming Guide 1400 10Th Street Plano, TX 75074 0308 US CCD LR Programming Guide Wasp Barcode Technologies
    Barcode Scanning Made Easy Wasp Barcode Technologies Programming Guide 1400 10th Street Plano, TX 75074 www.waspbarcode.com 0308 US CCD LR Programming Guide Wasp Barcode Technologies Please Read Note: The Wasp® WLR8900 Series Scanners are ready to scan the most popular barcodes out of the box. This manual should only be used to make changes in the configuration of the scanner for specific applications. These scanners do not require software or drivers to operate. The scanner enters data as keyboard data. Please review this manual before scanning any of the programming barcodes in this manual. Tech Tip If you are unsure of the scanner configuration or have scanned the incorrect codes, please scan the default barcode on page 7. This will reset the scanner to its factory settings. Check Version Productivity Solutions for Small Business that Increases Productivity & Profitability • Barcode, data colection solutions • Small business focus • Profitable growth since 1986 • Over 200,000 customers • Business unit of Datalogic SPA © Copyright Wasp Barcode Technologies 2008 No part of this publication may be reproduced or transmitted in any form or by any Wasp® Barcode Technologies means without the written permission of Wasp Barcode Technologies. The information 1400 10th Street contained in this document is subject to change without notice. Plano, TX 75074 Wasp and the Wasp logo are registered trademarks of Wasp Barcode Technologies. All other Phone: 214-547-4100 • Fax: 214-547-4101 trademarks or registered trademarks are the property of their respective owners. www.waspbarcode.com WLR8900_8905Manual0308_sm.A0 6/25/08 3:38 PM Page 1 Table of Contents Chapter 1.
    [Show full text]
  • Instant Messaging
    Instant Messaging Internet Technologies and Applications Contents • Instant Messaging and Presence • Comparing popular IM systems – Microsoft MSN – AOL Instant Messenger – Yahoo! Messenger • Jabber, XMPP and Google Talk ITS 413 - Instant Messaging 2 Internet Messaging •Email – Asynchronous communication: user does not have to be online for message to be delivered (not instant messaging) • Newsgroups • Instant Messaging and Presence – UNIX included finger and talk • Finger: determine the presence (or status) of other users • Talk: text based instant chatting application – Internet Relay Chat (IRC) • Introduced in 1988 as group based, instant chatting service • Users join a chat room • Networks consist of servers connected together, and clients connect via a single server – ICQ (“I Seek You”) • Introduced in 1996, allowing chatting between users without joining chat room • In 1998 America Online (AOL) acquired ICQ and became most popular instant messaging application/network – AIM, Microsoft MSN, Yahoo! Messenger, Jabber, … • Initially, Microsoft and Yahoo! Created clients to connect with AIM servers • But restricted by AOL, and most IM networks were limited to specific clients • Only recently (1-2 years) have some IM networks opened to different clients ITS 413 - Instant Messaging 3 Instant Messaging and Presence • Instant Messaging – Synchronous communications: message is only sent to destination if recipient is willing to receive it at time it is sent •Presence – Provides information about the current status/presence of a user to other
    [Show full text]
  • 520-2D Manual
    Warning: This equipment generates, uses and can radiate radio frequency energy. If not installed and used in accordance with the instruction manual, it may cause interference to radio communications. It has been tested and found to comply with the limits for a Class A computing device pursuant to Subpart J of part 15 of FCC Rules, which are designed to provide reasonable protection against such interference when operated in a commercial environment. Operation of this equipment in a residential area is likely to cause interference in which case the user at his own expense will be required to take whatever measures may be required to correct the interference. This manual contains confidential and proprietary information and is copyrighted. All rights reserved. No part of this manual may be photocopied or reproduced in any form without the prior written consent of Worth Data® Inc. PROPOSITION 65 WARNING: This product, its packaging, and/or components may contain chemicals known to the state of California to cause cancer or birth defects or other reproductive harm Worth Data, Inc. USA Headquarters 623 Swift Street Santa Cruz, CA 95060 USA Phone: 1-800-345-4220 • 831-458-9938 Fax: 831-458-9964 Email: [email protected] www.worthdata.com Table of Contents Introduction Chapter 1 Installation ..................................................................................................................1-1 Components of 520-2D Reader .....................................................................................................................................1-1
    [Show full text]
  • RS507/RS507X Product Reference Guide (En)
    RS507/RS507X Hands-Free Imager Product Reference Guide 72E-120802-06 Copyright © 2020 ZIH Corp. and/or its affiliates. All rights reserved. ZEBRA and the stylized Zebra head are trademarks of ZIH Corp., registered in many jurisdictions worldwide. All other trademarks are the property of their respective owners. COPYRIGHTS & TRADEMARKS: For complete copyright and trademark information, go to www.zebra.com/ copyright. WARRANTY: For complete warranty information, go to www.zebra.com/warranty. END USER LICENSE AGREEMENT: For complete EULA information, go to www.zebra.com/eula. Terms of Use • Proprietary Statement This manual contains proprietary information of Zebra Technologies Corporation and its subsidiaries (“Zebra Technologies”). It is intended solely for the information and use of parties operating and maintaining the equipment described herein. Such proprietary information may not be used, reproduced, or disclosed to any other parties for any other purpose without the express, written permission of Zebra Technologies. • Product Improvements Continuous improvement of products is a policy of Zebra Technologies. All specifications and designs are subject to change without notice. • Liability Disclaimer Zebra Technologies takes steps to ensure that its published Engineering specifications and manuals are correct; however, errors do occur. Zebra Technologies reserves the right to correct any such errors and disclaims liability resulting therefrom. • Limitation of Liability In no event shall Zebra Technologies or anyone else involved in the creation, production, or delivery of the accompanying product (including hardware and software) be liable for any damages whatsoever (including, without limitation, consequential damages including loss of business profits, business interruption, or loss of business information) arising out of the use of, the results of use of, or inability to use such product, even if Zebra Technologies has been advised of the possibility of such damages.
    [Show full text]
  • STEFANO MATTOCCIA Associate Professor
    STEFANO MATTOCCIA Associate Professor, PhD Department of Computer Science and Engineering (DISI) School of Engineering and Architecture, University of Bologna Tel: +39 051 2093860, Fax: +39 051 2093869 Email: [email protected] Home page: http://www.vision.disi.unibo.it/smatt Google Scholar: https://scholar.google.com/citations?user=P954CG8AAAAJ&hl=en EDUCATION ● PhD in Computer Science Engineering, University of Bologna (2002) ● M.S. in Electronic Engineering, University of Bologna (1997) ACADEMIC POSITIONS ● Associate Professor, with scientific habilitation 09/H1 for the role of full professor, Department of Computer Science and Engineering, University of Bologna (Oct. 2015 – present) ● Assistant Professor, Department of Computer Science and Engineering, University of Bologna (Jan. 2004 – Sep. 2015) ● Postdoc Researcher, Department of Computer Science and Engineering, University of Bologna (Feb. 2002 – Dec. 2003) RESEARCH INTERESTS ● Computer vision ● 3D vision ● Machine-learning/deep-learning ● Depth and scene perception from stereo and monocular image ● Domain adaptation ● Embedded computer vision ● Depth sensors fusion RESEARCH GROUP I’m leading a research group, mostly focused on learning-based techniques for depth perception and other cues from images. Members: ● Dr Matteo Poggi, Postdoc researcher ● Fabio Tosi, 3nd year PhD student ● Filippo Aleotti, 3nd year PhD student ● Youmin Zhang, 1st year PhD student awarded with a grant from the China Scholarship Council ● Fan Rizhao, 1st year PhD student awarded with a grant from the China Scholarship Council ● Andrea Conti, Research Fellow/PhD student (Nov 1st 2021) ● Huan Li PhD student (Nov 1st 2021) ● Alessio Mingozzi, Research Fellow Supervised visiting PhD students from China, awarded with a grant from the China Scholarship Council (CSC): ● Chaoqiang Zhao, from East China University of Science and Technology, Shanghai (Oct.
    [Show full text]