NOTE: To access the Boot Menu screen, during the system restart, press the P key. The P key functionality is valid only
if you enable the Popup menu option in the BIOS settings.
Imaging Devices with the Dell Wyse USB Imaging Tool
Dell Wyse USB Imaging Tool provides a simple USB imaging solution to help IT and Customer Service staff quickly and easily image
supported devices.
Using the tool’s flexible Windows utility, users can easily:
Configure a USB key to copy or pull firmware from a source device. You can later push to other target devices.
Configure a USB key to update or push firmware that you include on the USB key to target devices to upgrade firmware.
Create replicate or duplicate USB keys containing the original contents for simultaneous usage on target devices by users in
several locations at the same time.
Configuring and Using Peripherals
The thin client has USB ports available on it.
To provide the services through the ports, install the appropriate software for the thin client.
You can install other services and add-ins that are available from the Dell website for free or for a licensing fee.
For more information, see the Dell Wyse Support Site.
You can configure the thin client device to use Bluetooth- enabled Peripherals. For more information, see Device Manager
Bluetooth Connections.
Using TightVNC to Shadow a Thin Client
TightVNC Server starts automatically as a service upon thin client startup. The TightVNC Server service can also be stopped and
started by using the Services window.
1. Log in as an administrator.
2. Click StartControl PanelAdministrative Tools Services, and then select TightVNC Server.
You may also use the TightVNC Server features in StartAll Programs TightVNC Server (Service Mode)
3. To shadow a thin client from a remote machine use the following guidelines:
a. On a remote machine on which TightVNC Viewer is installed, open the New Tight VNC Connection dialog box.
b. Enter the IP address or valid DNS name of the thin client that is shadowed or operated or monitored.
c. Click OK.
The VNC Authentication dialog box is displayed.
d. Enter the Password of the thin client that is shadowed, and then click OK.
This is the Primary Password of the thin client that is shadowed.
The thin client that is shadowed or operated or monitored is displayed for the administrator in a separate window on the
remote machine. Use the mouse and keyboard on the remote machine to operate the thin client just as you would if you were
operating it locally.
TightVNC (Server and Viewer) — Pre-requisites
Before TightVNC Server installation on a remote machine, to access a thin client you must know the following:
Terms of Use | Privacy Policy | DMCA Policy
2006-2020 Rsmanuals.com