1
The process begins with an event questionaire, which requests details we'll need to provision the database for your event. The Event Scanning Administrator (ESA) enters event details and details about the scanning locations in the database.
2
The next step is for the ESA to enter your event staff members into the database. We'll only need minimal information about those who will be involved with the event's scanning operation, and have a role in using the system.
3
If you want any of your vendors (security, food & beverage, etc.) to have access to the system, the ESA will enter their information into the database. Their roles might be to perform the scanning or to see the counts.
1
Power Users can view all reports for all locations, manage logins for staff and vendors, etc. Power Users are normally someone in your event management staff, but we can also provide those services remotely.
2
Administrators can view certain reports for all locations or a single location (based on their assigned level of access — event or location). Administrators are typically your event staff.
3
Supervisors can view basic reports for one or all locations (based on their assigned level of access). Supervisor roles are normally for staff of the event's security and/or F&B vendor.
4
Operators perform the repetitive task of scanning barcodes, counting things or tracking items. Operators are normally security vendor staff, and are always locked to one location.
1
Tablet with WiFi or cell service using Bluetooth to connect a wireless scanner. Great option when portability is most important.
2
Smartphone with WiFi or cell service using Bluetooth to connect a wireless scanner. The most portable and least intrusive option available.
3
Laptop with WiFi or Ethernet using hardwired pedestal scanner. This is a great option when you have "shore" power and a network line, and reliability is most important.
4
Mobile computers with WiFi or cell service and integrated scanning. This combination works great when you have outdoor gates and must scan lots of people quickly.
1
Users with event-level access will be able to work with all locations at one event. These users can be your own staff and/or any vendor's staff. These reports can help reconcile any vendor billing questions.
2
Users with location-level access will only be able to work with one location. These users can be your own staff and/or any vendor's staff. Operators are restricted to only one location.
3
We can also keep event admins and supervisors informed with hourly email updates. These updates can help security and other vendors respond to areas where traffic is more or less than expected.
Contact Us: 772.240.5740
4
The final event provisioning step is to configure the users roles for the event, as you will see below. The User-Roles setup determines who can do what in the system.