
SPECIFICATIONS
Patient Interaction Device Specifications | |
---|---|
Dimensions | 9.5" x 7.5" x 2.0" (L x W x H) |
Weight | 1.77 pounds (2.28 pounds, including cable) |
CPU | 4x ARM® Cortex®-A9 up to 1.2 GHz per core |
GPU | 2D and 3D Graphics Acceleration |
RAM | 2GB |
Storage | 32GB total |
Accelerometer | Yes |
Bluetooth | 4.1+ and LE compatible* |
Front Camera | Optional: 2MP |
Rear Camera | Optional: 5MP with flash |
Ethernet | Yes |
GPS | No |
Headphone Jack | 3.5mm x 1 |
Wi-Fi | 802.11 b/g/n* |
Battery | Two-cell, Inline, 7.4V, 800mAH Lithium Ion Battery Pack |
Storage Conditions | -20º C – 50ºC |
Operating Conditions | 10°C to 49°C (50°F to 120°F), 95% RH |
* Actual range of Bluetooth and Wi-Fi vary per installation. Test the system in an actual installation to ensure that the range is sufficient. | |
Speakers | 2 Watts maximum (capped at 80dB @ 10cm +/- 5dB) x 2 |
Analog/Digital | Mono/Stereo |
Display Dimensions | 7" diagonal |
Display Resolution | 1024x600 |
Aspect Ratio | 16:9 |
Viewing Angle | 80º, symmetrical on both axes |
Shatter Prevention | Corning® Gorilla® Glass |
Backlight Type | LED |
Touchscreen | Multi-touch |
Refresh Rate | 60Hz |
Lamp Life | 20,000 hours (at full brightness) |
Color Depth | 24 bit |
Operating System | Android Pie (9.0.0 – API 28) |
Hardware SDK | Yes |
Hub Specifications | |
---|---|
Dimensions | 6" x 5.75" x 1.75" (L x W x H) |
Connectivity | Nurse Call System Interface |
10/100 External Ethernet (pass-through enabled) x 2 | |
10/100 Internal Ethernet x 1 | |
USB 2.0 expansion port (enumerated on tablet as external USB device) | |
¼" jack for nurse call. Compatible to momentary, normally open, dry contact devices. | |
¼" jack for TV control. Compatible to momentary, normally open, dry contact devices. | |
Mounting | Wall-mount |
Power Supply | 12V External (Included) |
Battery | Two-cell, side-by-side, 7.4V, 800mAH Lithium Ion Battery Pack |
Storage Conditions | -20º C – 50ºC |
Operating Conditions | 10°C to 49°C (50°F to 120°F), 95% RH |
RELEASE NOTES
ANDROID PIE FOR REGO 3.0.2.10.0
CHANGES
- APFR-218 Fix “SystemUI” crash upon enrollment into AirWatch environment
- APFR-215 Configure audio codec microphone bias voltage/resistor settings according to hardware testing results
- APFR-213 Apply November 2021 AOSP security patches
- APFR-214 Apply December 2021 AOSP security patches
- APFR-217 Apply January 2022 AOSP and mandatory security patches
- APFR-220 Update embedded SystemInformation app to version 1.0.19.0
- APFR-221 Apply missing AOSP security patches flagged by latest Android STS compatibility test suite
- APFR-218 Fix SystemUI crash upon enrollment
- APFR-219 Fix constant spinning of Camera HAL if a camera is not connected
- APFR-223 Sync entertainment keypad backlight with button presses
- APFR-227 Apply February 2022 AOSP security patches
- APFR-230 Increase LCD backlight frequency to remove ringing
- APFR-231 Fix reset sequence for touchscreen controller to prevent an inoperable touchscreen upon a ‘cold boot’ sequence
- APFR-234 Apply March 2022 AOSP security patches
- APFR-236 Fix the HubAudioService to make it impervious to interference from Google Play updates
- APFR-238 Increase the processing priority of the HubAudioService to increase audio throughput
- APFR-239 Apply April 2022 AOSP security patches
- APFR-240 Update WiFi chip firmware to latest available revision
- APFR-242 Update SGTL5000 default settings and expose additional controls
- APFR-244 Update SystemInformation app version to 1.0.23.0
- APFR-248 Apply May 2022 AOSP security patches
- APFR-250 Apply June 2022 AOSP security patches
ADDRESSED CVEs
- CVE-2021-0926
- CVE-2021-0933
- CVE-2021-0653
- CVE-2021-0928
- CVE-2021-0650
- CVE-2021-0930
- CVE-2021-0434
- CVE-2021-0931
- CVE-2021-0919
- CVE-2021-0920
- CVE-2021-0924
- CVE-2021-0929
- CVE-2021-1048
- CVE-2021-0970
- CVE-2021-0704
- CVE-2021-0967
- CVE-2021-0964
- CVE-2021-0968
- CVE-2021-0953
- CVE-2021-0963
- CVE-2021-0965
- CVE-2021-0952
- CVE-2021-0971
- CVE-2021-33909
- CVE-2021-38204
- CVE-2021-0961
- CVE-2020-0338
- CVE-2021-39623
- CVE-2021-39618
- CVE-2021-39621
- CVE-2021-39625
- CVE-2021-39626
- CVE-2021-39627
- CVE-2021-39629
- CVE-2021-39634
- CVE-2021-39633
- CVE-2021-39667
- CVE-2021-39706
- CVE-2021-39707
- CVE-2021-39705
- CVE-2021-39803
- CVE-2021-39809
- CVE-2022-39662
- CVE-2022-20114
- CVE-2022-20010
- CVE-2022-20006
- CVE-2022-20138
- CVE-2021-39624
- CVE-2022-20130
- CVE-2022-21027
- CVE-2022-20145
- CVE-2022-20126
- CVE-2022-20133
- CVE-2022-20134
- CVE-2022-20135
- CVE-2022-20142
- CVE-2022-20144
- CVE-2022-20147
- CVE-2022-20123
- CVE-2022-20129
- CVE-2022-20143
- CVE-2022-24958
- CVE-2022-25258
- CVE-2022-20132
- CVE-2022-20136
ANDROID PIE FOR REGO 3.0.2.4.0
CHANGES
- APFR-192 fix an unrecoverable error condition in the HubAudioService
- APFR-190 fix an error in the HubAudioService that may occur when the SGTL5000 codec doesn’t initialize properly
- APFR-202 address Google BTS warnings and failures
- APFR-199 add support for Google EDLA
- APFR-203 update the built-in SystemInformation app to version 1.0.18.0
- APFR-204 apply mandatory functional patches as per Google GTS requirements
- APFR-196 increase default screen timeout value to 2 minutes
- APFR-191 allow the HubAudioService to handle Launcher audio focus requests
- APFR-165 configure the “adaptive brightness” feature to ON by default
- APFR-164 increase the strength of the haptic feedback
- APFR-162 decrease the potential of “memory thrashing” in the HubAudioService
- APFR-194 update WiFi on-chip firmware version to 8.9.0.0.88
- APFR-193 apply July 2021 security patches as per Android Security Bulletin
- APFR-197 apply August 2021 security patches as per Android Security Bulletin
- APFR-198 apply September 2021 security patches as per Android Security Bulletin
- APFR-206 apply October 2021 security patches as per Android Security Bulletin
- APFR-209 configure audio codec and amplifier volume/output gain default settings to maximum allowable values
- APFR-210 fix a memory leak in a the HubAudioService native function
ADDRESSED CVEs
- CVE-2021-0587
- CVE-2021-0601
- CVE-2020-0417
- CVE-2021-0585
- CVE-2021-0586
- CVE-2021-0589
- CVE-2021-0594
- CVE-2021-0600
- CVE-2021-0588
- CVE-2021-0590
- CVE-2021-0596
- CVE-2021-0597
- CVE-2021-0599
- CVE-2021-0604
- CVE-2021-0514
- CVE-2021-0515
- CVE-2021-0603
- CVE-2021-0592
- CVE-2021-0640
- CVE-2021-0646
- CVE-2021-0519
- CVE-2021-0591
- CVE-2021-0593
- CVE-2021-0584
- CVE-2021-0641
- CVE-2021-0642
- CVE-2020-14381
- CVE-2021-3347
- CVE-2021-28375
- CVE-2021-0639
- CVE-2021-0687
- CVE-2021-0595
- CVE-2021-0683
- CVE-2021-0684
- CVE-2021-0688
- CVE-2021-0689
- CVE-2021-0690
- CVE-2021-0598
- CVE-2021-0692
- CVE-2021-0682
- CVE-2021-0695
- CVE-2021-0652
- CVE-2021-0708
- CVE-2021-0651
- CVE-2021-0706
- CVE-2021-0870
- CVE-2020-29368
- CVE-2020-29660
- CVE-2020-10768
- CVE-2021-29647
- CVE-2021-27666