Honeywell has announced that a new vehicle-mounted computer, the rugged Thor VM1A is now available in Australia and New Zealand. Built for the company’s Mobility Edge Platform, the Thor VM1A helps forklift operators locate and move products quickly and efficiently throughout distribution centres.
The Thor VM1A vehicle-mounted computer runs on the AndroidTM operating system and features smart dock and field-replaceable front touchscreen and keyboard. This makes servicing or swapping the devices a simple and easy task to minimise downtime.
The mobile computer runs on Honeywell’s Mobility Edge Platform, a unified hardware and software architecture built for Android mobile devices. Devices built on Mobility Edge support multiple versions of Android to provide long-term investment protection by making operating system updates and security fixes a simple and quick process.
“Distribution centres today cannot afford any downtime in their operations. Their forklift operators rely on rugged mobile devices to improve productivity and accuracy without having to move from the driver’s seat,” said Michael Noyes, general manager of Mobility for Honeywell’s Productivity Products business. “We’ve designed the new Thor VM1A to handle the challenges of the modern warehouse. If a forklift is down for maintenance, the device can be easily swapped out and placed on another vehicle so that the operator can be up and running in no time.”
An evolution of the company’s VM1 and CV41 computers – the rugged Thor VM1A is easy to maintain with a field-replaceable front panel and Honeywell’s exclusive SmartDock system allows for quick exchanges between vehicles without having to touch cabling. This minimises downtime and reduces the number of spare parts needed to be kept in inventory. In the event of an issue, customers can reduce maintenance costs as technicians can easily repair a damaged touchscreen and keyboard, rather than sending in the entire computer for service.
The mobile computer is compatible with Honeywell ThorTM accessories, including docks, cables and vehicle mounts, to allow existing customers to deploy the devices without having to make additional hardware investments.
Increasing mandates around the security of personal data have made encryption for every business. Australian businesses are leading the world in the use of encryption to protect backups, payment-related data, and laptops – and yet they still have a long way to go before encryption is both ubiquitous and manageable.
If your last access-control update was even a few years ago, you’re probably more exposed to fraud and exploitation than you’d like to be.
It’s not hard to understand why bot management is critical to maintaining business availability and customer satisfaction – but do you know how to properly deal with bots?
Increasing use of encryption has created new challenges for enterprise security managers. Ever more-sophisticated encryption such as Perfect Forward Secrecy (PFS) protects data and may even boost your Google ranking – but it also provides a haven for malicious code that may use encryption to bypass enterprise security controls.
Why nation-state attacks are everyone’s problem