top of page

System Use and Management Tools


The Process:

Starting With System Use

To Check Out:

1st: Tap Checkout Button

2nd: Agree to Terms of Service

3rd: Scan or swipe ID

4th: Enter PIN, Tap Submit

5th: Database Authentication

6th: Hear "CLICK" Remove Device

To Return:

1st: Find Open Bay

2nd: Insert Device Until "CLICK"

3rd: On-Screen Receipt Emailed

anatomy Of a Kiosk-02.png

LaptopsAnytime allows Administrators full control over system settings (Scroll for Details)

Our Satisfied Customers Show How Easy It Is 

To Use Our systems...Click On Videos Below

How It Works: A Primer

Rethinking Kiosk Technology from the Inside Out

FontTicker 8M White.png

Contact Us Today to Discuss Your Project 877-836-3727

Management Overview

Management Overview
Intelligent and Intuitive

Explore With Us Why So Many

Organizations Deploy-N-Manage

Our Kiosk Systems As Their Own! 

• Choose from supported Device Models

   (i.e. Enterprise Laptops and other secondary          devices such as Chromebooks, iPads etc.)                and/or Portable 110V Power Chargers


            Note:  Mix-n-Match different 

                     devices, separated by row


• Choose Secure Authentication Method:

   ILS and/or Active Directory/LDAP or other 


• Choose Free or Free with Overdue Fees                  (controlled within ILS)


• Firewall Protection


• Secure Connection


• Remote Access and Monitoring


• Automatic Recharging Reset to

   Pre-Set State Battery Monitoring


• Web Camera takes photos that are

   saved as part of Event Record


Custom Branding helps bring Kiosks Alive!


Our Technical Team Will Make Your Project A Success With Our Turnkey Systems!

Laptop Checkout

Among all the device choices available, Enterprise Laptop Checkouts are the most popular followed by 110V Portable Power Chargers, Chromebooks and iPads. Tools like Deep Freeze, Microsoft Security Policies and other tools help enhance the automated checkout process. 


Additionally, many of our kiosk administrators incorporate time-out tools like PC Reservation and mirror the desktop environment on the laptops that are checked out via the kiosk system.  


We incorporate Enterprise (and even Ruggedized) Laptops from Apple, Lenovo, Dell, HP, Google, Panasonic Acer and more. Operating systems for these laptops can be a variety of Linux, Apple OS, Microsoft 7, 8, 10 and 11 or a combination of operating systems in a multi-boot platform.   


Google is now involved in the shared use environment at corporate, industrial and educational facilities. Specifically, Google has developed a tool to assist support administrators when they choose to use a Chromebook in a shared user environment. This tool allows the admin to place the Chromebook in Guest-only mode and even allows for auto-updates of the Chrome OS.   


We are delighted to work with Google and incorporate the Chromebook in our kiosks, allowing facilities the ability to take advantage of Google’s unique browser-based OS and lower cost hardware, and lower the overall cost of an automated checkout solution, without sacrificing the user experience.


Note: We support selective Chromebook models.


Apple iPads are becoming very popular in libraries. We have developed our iPad checkout kiosk in a way that allows the facility administrator a worry-free automated checkout and refresh solution.  


Admins have the ability to have the iPads set up with preloaded paid or free apps and updates can be pushed via a remote connection. Our kiosks automatically sync the iPads with Apple Configurator. 


LaptopsAnytime Kiosk Systems can be outfitted with one or multiple devices in the same station (separated by row). Over the last 12+ years we have designed more than 100+ different hardware systems and we build around new devices every day to meet customer needs. 


We work closely with your team to help guide you in the best tools to use in order to enhance the user experience in a safe and secure shared-use environment.  

Device Checkout Options
From Laptops to Chargers and Beyond

New! Portable 110V Power Chargers 

Offering a flexible on-demand solution for portable power. Perfect for end users who bring their own laptops. and need a boost no matter the location.

Can be standalone or part of a larger system

(see photo above).



Device Checkout Options

Customizing Software
Total UI Control and Flexibility 

User Interface Design

Our kiosk software supports the ability to allow the Kiosk Administrator to make changes to the look and feel of the User Interface. These UI changes allow the Admin to adjust the text and graphics shown on the screen in real-time and serves as a valuable tool that allows for team collaboration and feedback, making the setup easy and configurable for all involved. 


User Interface Text

The UI text changes are shown in real-time allowing for the executive team to provide quick feedback. HTML code can be inserted to adjust font size and color to enhance the on-screen text messaging. 


User Interface Graphics

The graphics contained in the UI may also be adjusted to fit the color theme of the facility. This means that logos can be added to enhance branding, backgrounds can be customized, and button colors can be changed. All in all, the Kiosk Admin can make the kiosk a perfect fit for his/her local needs. 

Data transfer.png
Customizing Softwar

Inspired by our Customers

LaptopsAnytime Kiosk Systems support a number of authentication methods to meet the needs of most facilities. Our dedicated programming engineers work with your security, networking, and executive staff to design an authentication method for you. The kiosk can be set up to use a number of different input types or combine input types to add a more robust authentication checkout process. 


The following is a list of the most commonly used input methods:

• Standard Bar Code commonly used by most public libraries

• Magnetic Stripe commonly used by universities 

• RFID Access Badge used by private facilities 

• Simple On-Screen LDAP/AD input credentials and other input types


ILS Authentication (Library-specific)

Using standard SIP-2 protocols, the kiosks operate just like a self-check kiosk to manage authentication of the device checkouts. We work with all ILS companies. ILS checkouts require that the facility set up a device type and rules for that device. 


The kiosk will check out the device via a wired Ethernet SIP-2 connection, allowing the ILS to validate whether the end-user is authorized, apply fines, display blocked status, differentiate patron types and require PIN input for a more secure authentication. 


AD/LDAP Authentication

The kiosk can authenticate members via an Active Directory (AD) or Lightweight Directory Access Protocol (LDAP or LDAPS). This type of authentication can be integrated in the kiosk to validate members and if necessary query other variables such as member type (i.e. Student or Faculty), signed agreement on file, email address and other information needed to sort valid from non-valid users. 

Credit Card Authentication

For a variety of reasons, we do not recommend using credit cards as a method of authenticating users and/or securing checkout of the device in a shared-use environment. Part of this relates to the fact that (a) users have the ability to dispute charges and the credit card companies favor the customer rather than the merchant and (b) rules regarding credit card processing in which the facility can only charge the card for as much as the card was pre-authorized. 


Exclusive Features
Inspired by our Customers

Listed below are some of the most popular features of our Kiosk Systems. As part of the Annual Software License Fee, the facility is provided with regular version updates at no charge. This means that when our innovative software team develops a new feature, you receive it automatically. We encourage you and your team to dream big about new features as some of our best software enhancements have been inspired by customer feedback. 

Focus on Security

Kiosk Operating System

LaptopsAnytime believes in supplying the facility with the strongest secured software possible.  LaptopsAnytime security specialists are always on the lookout for security vulnerabilities.  


We have built our system on one the most widely trusted Linux platforms and regularly run security scans to ensure the system remains secure. For more information on our security features, we encourage you to request a copy of the latest scan or schedule a call with our Linux Security Specialist. 


Security Scans

Our kiosks are regularly scanned and results are provided to the Kiosk Administrator on a quarterly basis. We push down any critical updates automatically and any security and kernal updates are pushed by our security team, allowing your team to focus on the laptops and tablets dispensed.   



We understand security and firewalls are important and we respect that facilities do not want to open the door for anyone, this includes vendors like us.  That’s why we built our system with that in mind.  


We ask that only the public port SSL 443, be open only as an outgoing call.  This will allow our kiosk to call out to the site and get any info it needs. Should we need to access the kiosk for setup or customization, we will ask that you provide us with temporary VPN connection.  

Screen Shot 2021-12-21 at 11.28.03 AM.png

Kiosk Camera

The Kiosk’s camera takes pictures of the user at the time of checkout and any time a device is removed from the kiosk. Further details on this patent-pending security feature can be requested. 


Quick Return Notification

When a device is returned quickly, this feature allows users to provide feedback about the condition of the devices. This patent-pending feature has 6 selectable buttons that describe common issues such as “Laptop does not boot”, “Broken Keyboard”, “Could not connect to WIFI”, and others chosen by the Kiosk Admin. The buttons can also be set to automatically block the bay and notify the admin of the issue, ensuring the next user does not receive the faulty device. 


Multi-Language Capability

The ability to have the kiosk user interface function in the user’s native language is vital to ensure ease of use and understanding for all users. Kiosks allow for English and two other language choices (to be selected by facility) 

Email Receipts 

In an effort to “Go Green,” LaptopsAnytime has programmed its kiosks to email receipts to patrons upon check-in, check-out or both.

Automatic Troubleshooting Notifications 

Our Kiosk System is designed in a modular fashion, so that should the kiosk detect a failure with an electronic component, such as the RFID reader, the Solenoid Relay, or a device failing to eject, the kiosk will intelligently isolate the Smart-Bay allowing the rest of the kiosk to continue operating while notifying the Admin of the issue via email.


This valuable feature allows the Admin and other support team members to remotely diagnose the issue and quickly bring the SmartBay back online. 


The kiosk software runs continuous checks on its hardware to ensure a 99.9% uptime. 

Kiosk Blocklist 

We realize that from time to time users may abuse the privilege of using the Kiosk System. That’s why we allow for the Admin to block a user from kiosk checkouts without having to make changes to the facility's database accounts (e.g. ILS, AD/LDAP). 

Gallery “Smart” Mode

When this “Smart” feature is set up and enabled, user groups are facilitated across the whole kiosk. Device types with programs suited for certain user groups like Students, Faculty, Administrators in Education or Full-time/Part-time/Shift Employees, Independent Contractors, Supervisors etc. in a Work Context or Teens, Children, or Adults in a Library Setting. For example, kiosk admin could configure a kiosk with a combination of 12 iPads (or Laptops) that have 4 devices set up with apps for young children, 4 devices with apps for teens, and 4 devices set up for adults.  


The kiosk has the ability to incorporate a survey page at the completion of the rental, allowing the facility to gain valuable feedback on things like user interface, device preferences, overall kiosk service, and more. 

Excusive Features
Focus on Security
bottom of page