Solved

BLUETOOTH -- Wireless Barcode Scanner ?

Posted on 2014-11-03
1
195 Views
Last Modified: 2014-11-21
My employees do 300+ scans per day which takes TOO long to work via "camera" scanning.

1. Has anyone used
http://ww1.socketmobile.com/products/chs-series-8.aspx 
or https://serialio.com/products/barcode-scanners ?

2. Do you have any other suggestions ?
0
Comment
Question by:finance_teacher
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 13

Accepted Solution

by:
Michael Machie earned 500 total points
ID: 40420533
We have the Honeywell seen on page one of your second link. It works well but all hand-held scanners can be slow, especially with a distorted bar code.

Are these scans full documents with a bar code or are they just bar code labels of some sort? Mostly these are used in warehouses to scan a bar code on the rack to tell the system you found the right product, but others are used to scan the bar code on a document and file information from the document based on the barcode. Some are used, however rarely, to scan an entire document, which is just silly. It may be better for us to help you knowing what you want your end result to be.
0

Featured Post

Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

This is about my first experience with programming Arduino.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
I've attached the XLSM Excel spreadsheet I used in the video and also text files containing the macros used below. https://filedb.experts-exchange.com/incoming/2017/03_w12/1151775/Permutations.txt https://filedb.experts-exchange.com/incoming/201…
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

726 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question