IDS Cameras Help Lessmann GmbH To Make Brushes From Good Wood | Security News

2021-12-23 08:14:42 By : Ms. Jenny zhai

Illustra Edge Cameras With Onboard exacqVision Recording Software Delivers A Complete IP Solution

HID Signo Access Control Readers

ASSA ABLOY's Aperio® wireless technology promotes patient health and safety in hospitals

Milestone Provides Their Video Management System At Nemours Children’s Hospital

Leonardo Brings ELSAG Fixed Plate Hunter LPR Systems To Keep Buildings And Perimeters Secure

Delta Provides Crash Rated Gates To Enhance Security At The Los Angeles International Airport

Providing Frictionless Cloud Video Storage as a Service (VSaaS)

Achieving True Situational Awareness In Operation Centers With Computer Vision & AI

How Are AI And Analytics Changing Physical Security, And What Should We Expect Next?

Securing Unmanned Infrastructure at the Network Edge

14 Success Stories About How Video Technology Is Improving City Life

The Rise of Ethical Facial Recognition

A user always needs and sees them everywhere: in metalworking, on the construction site, in almost every toolbox... the good old hand brush. Whether classic all-purpose brushes or brushes for special applications, the German-based company Lessmann GmbHhas virtually all of them in its range.

The shape is varied, from straight to ergonomic. But they all have one thing in common: The wooden bodies are made exclusively from untreated red beech. Depending on the model, they also have two hanging holes at the end of the handle.

Production is fully automatic and highly rational. To ensure its claim to the excellent quality of the hand brush woods, Lessmann has been relying on classic image processing for many years.

But now "The German Brush Company" has implemented an image processing system from the Bavarian system house Simon IBV GmbH that uses robust IDS industrial cameras and SIMAVIS® H image processing software to detect even barely perceptible tolerance deviations particularly reliably.

A multi-camera system checks the hand-brushed timbers for defects such as cracks, splintering, and size

The brush woods, which are milled fully automatically at a production rate of 1500 pieces per hour, are removed from the milling machine by a timed circulating chain with quiver-shaped receptacles and pushed onto a longitudinal conveyor belt.

A multi-camera system is installed on the conveyor belt, which checks the 2 to 6-row hand-brushed timbers for defects such as cracks, splintering, and size.

"The testing task is particularly demanding because the untreated copper beech varies greatly in its color and grain. For example, cracks cannot always be clearly distinguished from dark grains," explains Daniel Simon, authorized signatory at SIMON IBV.

But the choice of wood type has good reasons: On the one hand, red beech is recommended for the production of hand brushes due to its excellent properties, such as a special degree of hardness. On the other hand, sustainability plays a major role. Lessmann can source the brushwood from the surrounding area and thus both support regional forestry and avoid transport routes.

While the timbers pass through production on a conveyor belt, a total of four IDS cameras of the type GigE uEye FA are triggered by a so-called incremental encoder. This sensor reacts to the belt position so that any change in position of the brush body is detected by the belt movement. The image capture is offset by 2.5 mm per camera, so each camera takes a new image every 10 mm.

The captured images are discarded until the first camera detects that there is a wooden body in the field of view. From this point on, the other three cameras are activated and up to 35 pictures are taken per camera. The number of images is limited by camera 1, as it outputs as soon as no more brush body is visible.

The individual images of the same situation from the four offset cameras are merged into one overall image by the software

The images captured by the IDS cameras are pre-processed and composited simultaneously with the image capture. Thus, during the time of evaluation, the image acquisition, as well as the pre-processing of the next brush, can already take place. The individual images of the same situation from the four offset cameras are cropped, scaled, and merged into one overall image by the software.

The brush bodies are evaluated with differently weighted criteria for each camera. The weighting is done via the test sequence of the evaluation criteria. In the first step, rough geometric factors such as length, width, height, symmetry, and shape deviations are evaluated. The holes in the brush body are checked for position and overlap, followed by a step-by-step surface inspection.

"First, dark areas are segmented and evaluated according to setpoint specifications," explains Matthias Eimer, system integrator at Simon IBV. "After that, deviating discolorations are searched for, singled out, and evaluated according to setpoint specifications."

Even the tolerances for rough spots can be set in the target values and are subsequently evaluated. Only in the last step of the frame-by-frame evaluation do the cameras search for cracks. Finally, the overall result is formed and merged from the individual evaluations of the views. The system checks a total of 32 setpoints, 27 of which alone for compliance with precisely defined tolerance specifications.

The uEye cameras used from the FA family are particularly robust and therefore predestined for use in such a harsh environment as the brush factory. Camera housings, lens tubes, and screwable connectors meet the requirements of protection class IP65/67.

 They are also optimally suited for the multi-camera operation required here due to the integrated image memory, as this decouples the image capture from the image transmission and enables the buffering of images before transmission in this application.

The four CMOS cameras used to deliver almost noise-free, very high-contrast 5 MP images

The GV-5280FA industrial cameras with GigE Vision firmware are equipped with Sony's IMX264 2/3" global shutter CMOS sensor, which also provides excellent image quality, high light sensitivity, and an exceptionally high dynamic range.

The four CMOS cameras used to deliver almost noise-free, very high-contrast 5 MP images. With exactly these features, the camera model recommended itself for use in demanding brush testing.

"The camera has the right resolution, the Sony sensor is very good and the protection class is met," says Daniel Simon, summing up the selection criteria.

IDS cameras are easy to integrate, true to the company motto "It's so easy", as Daniel Simon knows from his many years of cooperation with IDS. The heart of the solution is the solution provider's specially developed software.

SIMAVIS® H is image processing software with which complete solutions can be quickly assembled. This machine vision software is based on ProVision® (former SIEMENS development) and HALCON, comprehensive standard software for industrial image processing with an integrated development environment. This allows individual adaptation to the requirements of testing the wooden brush bodies.

"The check for defects was programmed by us individually by hand, we have a lot of experience in the field of wooden surfaces. The tolerance thresholds can be set by the many set points depending on the feature," Daniel Simon emphasizes. SIMAVIS® H offers an intuitive user interface for the operating personnel of the finished system, including manual and automatic operation with type management, setpoint menu, authorization concept, language switching, statistics module, and much more.

With the new imaging solution, wood defects can now be detected more reliably" "Through the control, automatic further processing is possible. With the new imaging solution, wood defects can now be detected more reliably. The proportion of defective wood bodies classified as good has fallen from around 2 percent to less than 1 percent,” explains Managing Director Jürgen Lessmann.

The subsequent filling of the brush bodies with wire is already fully automatic, and the packaging of the finished hand brushes can be carried out in the future with the help of robotics. Due to the improved control of the wooden bodies, the previously necessary manual quality control of the finished hand brush can be omitted.

Before packing, which is carried out by a SCARA robot, only a brief visual inspection is necessary. This relieves the machine personnel and increases productivity. In this exemplary application, the use of artificial intelligence also offers further potential in the future.

"AI will probably further improve the inspection result, which will allow further automation of production, as manual inspection operations can be eliminated," Jürgen Lessmann predicts. And not only for brushes made of good wood: the multi-camera testing system can be adapted for countless products and materials.

Lessmann GmbH is one of the producers of surface finishing tools in Europe. At its production sites in Oettingen in Bavaria and Solingen in North Rhine-Westphalia, Lessmann has been manufacturing surface tools in the form of technical brushes "Made in Germany" since 1948. State-of-the-art production facilities, consistent quality controls, and permanent tests ensure the high quality of the brushes.

SIMON IBV GmbH is a manufacturer of solutions in the field of industrial image processing. Furthermore, the company is the developer of its standard software for image evaluation as well as the manufacturer of hardware components specially designed for optical inspection systems.

Peter George Shares Evolv's Accomplishments For Q3 2021

Aiphone’s Security Communication Solutions - Configurable IP Video Intercoms

Dahua Provides Surveillance Cameras, NVR And Ethernet Switches To Enhance Security At Pets Corner

Mergers and acquisitions are among the most disruptive forces in the security marketplace. However, they are also both a reality and a growing trend. Whenever there is value to be leveraged, companies tend to enter into business transactions to maximize that value. For the security industry, the result is a continually shifting collection of manufacturer companies seeking new ways to provide value to customers. M&A activity continued unabated in 2021, despite residual industry challenges such as dysfunctional supply chains and lingering consequences of a global pandemic. Here are some of the larger and/or most impactful M&A transactions of 2021. Stanley Black & Decker sells to Securitas Stanley Black & Decker announces an agreement to sell most of its Security assets to Securitas AB for $3.2 billion in cash. The transaction includes Stanley Black & Decker's Commercial Electronic and Healthcare Security business lines.  The businesses carry 2021 forecasted revenues of approximately $1.7 billion. “The business is well-positioned for ongoing growth within Securitas, a global pioneer in the security industry,” says James M. Loree, Stanley Black & Decker's CEO. Openpath’s solution makes businesses more secure with multi-factor authentication Motorola acquires Openpath and Envysion Motorola Solutions adds to its security industry portfolio with the acquisition of Openpath Security Inc.., a cloud-based mobile access control provider. Openpath’s solution makes businesses more secure with multi-factor authentication, enables a contactless entry experience, and can be easily scaled and managed due to its cloud-based architecture. Motorola also announces the acquisition of Envysion, a provider of video security and business analytics solutions for quick-service restaurant and retail industries. Delta Electronics buys March Networks Delta Group, a provider of power and thermal management solutions, purchased 100% of the shares in Infinova (Canada) Ltd., owner of Canadian-based video surveillance and business intelligence company March Networks, from Infinova International Ltd. through its subsidiary Delta International Holding Limited B.V. Following the close of the transaction, it was expected that March Networks will continue to operate from its Canadian headquarters, and the March Networks executive management team will continue to lead the organization. Delta Electronics is also the parent company of VIVOTEK. APi Group acquires Chubb Fire and Security Business APi Group Corp. acquire the Chubb Fire & Security Business from Carrier Global Corporation for an enterprise value of US$ 3.1 billion. Headquartered in the United Kingdom, Chubb has approximately 13,000 employees globally and a sales and service network that spans 17 countries, serving more than 1.5 million customer sites in Europe, Asia Pacific, and Canada. APi Group is a business services provider of safety, specialty, and industrial services in more than 200 locations worldwide. Teledyne Technologies Inc. will acquire FLIR in a cash and stock transaction valued at approximately $8.0 billion Teledyne acquires FLIR Teledyne Technologies Inc. and FLIR Systems, Inc. jointly announced that they have entered into a definitive agreement under which Teledyne will acquire FLIR in a cash and stock transaction valued at approximately $8.0 billion. Jim Cannon, President and Chief Executive Officer of FLIR, said, “We could not be more excited to join forces with Teledyne through this value-creating transaction.” Resideo adds Norfolk Wire and Electronics Resideo Technologies, Inc. acquired privately held Norfolk Wire & Electronics, based in Richmond, Virginia. Norfolk was founded in 1985 and is a regional distributor of security, telecom, network, and audio-video (AV) related products, supplies, and tools. With 11 full-service retail locations and a 43,000 sq. ft. distribution center, Norfolk serves customers across the mid-Atlantic region and will be part of Resideo's ADI Global Distribution business, a wholesale distributor of security, AV, and low-voltage products. Triton acquires ACRE, which acquires Feenics and Matrix Triton Partners acquired ACRE, an end-to-end security solutions provider based in Dallas/USA and Dublin/Ireland. Triton is investing alongside the current management team of ACRE. Weeks later, ACRE acquired cloud-based workplace solutions company Time Data Security (TDS). Later in the year, ACRE announced acquisition of Feenics and Matrix Systems. Feenics brings cloud-based access control solutions brings cloud-based access control solutions to ACRE’s rapidly growing network of global customers while also expanding its portfolio to support the growing demand for cloud-based security solutions. Matrix enables ACRE to expand the addressable market for the company’s technology portfolio. Brivo, Inc. and Crown PropTech Acquisitions have entered into an agreement making Brivo a publicly listed company Brivo becomes publicly traded through the merger Brivo, Inc., a cloud-based access control and smart building technologies company, and Crown PropTech Acquisitions, a publicly traded special purpose acquisition company (SPAC), have entered into a definitive merger agreement that will result in Brivo becoming a publicly listed company. The transaction values the company at a pro forma enterprise value of $808 million. Upon closing, the combined company will operate as Brivo, and its Class A common stock is expected to be listed under the ticker symbol “BRVS.” Nice buys Nortek Security Nice, a global manufacturer of smart home, security, home, and building automation solutions, , acquired Nortek Security & Control from Melrose Industries. Nortek Security & Control is a developer of technology for security, home automation, control, power, AV and entertainment, access control, health, and Artificial Intelligence (AI) systems, for residential and commercial markets. Eagle Eye acquires Uncanny Vision Eagle Eye Networks, a cloud video surveillance solutions company, has acquired Uncanny Vision Solutions, an artificial intelligence (AI) analytics and Solutions Company. The acquisition accelerates the company’s leadership in providing AI and analytics, to make customers’ businesses more efficient and the world a safer place. The acquisition also includes research and development (R&D) capabilities and a new regional office located in Bangalore, India.

In the new era of work, our relationship with the workplace is defined by flexibility and mobility. Employees are working across the home, office, and blended spaces more than ever before, as well as working varied hours to suit the modern work schedule.  This new hybrid workforce model holds the potential for more diverse talent and better productivity, but it also comes with its challenges – one being how to ensure security, health, and safety in the workplace.  Strong and smart security ecosystem While nearly one-third of companies report that they’ve implemented a hybrid model, according to a recent survey by STANLEY Security, many still have much to do to prepare their office for the future.  Building a strong – and smart – security ecosystem is crucial in preparing for the future. As such, businesses should consider technologies that help protect their people, as well as safeguard their assets, optimize their operations, and secure their network. 1)Protect your people  Implementation of a security ecosystem combines health, safety, and security hardware and software solutions seamlessly Nearly 60% of mid-market and enterprise businesses across the UK and US report that the health and safety of their employees and customers are a primary concern when implementing modern and hybrid working models.  This begs the question: How can businesses create a safe and healthy work environment when 59% are planning to bring employees back on-site in some capacity within the next 18 months? The answer lies, in part, in the implementation of a security ecosystem that combines various health, safety, and security hardware and software solutions seamlessly. Integrating platform Nearly half (46%) of business decision-makers say they are interested in adopting an integrated platform such as this. This means integrating traditional and digital security solutions, then leveraging the data and insights they produce to further enhance the workplace experience. Take this example:  With employees and visitors moving in and out of the office at different times, a business may lack oversight of occupancy or density levels, people flow, workspace scheduling, visitor check-in processes, and more. However, with visitor management, access control, and other building/business systems integrated, employees can reserve a workspace for a specific date and time and be granted access to the building. Leveraging AI and machine learning Visitors can pre-register, answer a health screening questionnaire, and receive a mobile credential before arriving. Once the visitor arrives on-site, the system can alert the respective department – all without the close contact typically required for traditional visitor check-in processes. When layering artificial intelligence and machine learning on top of the data, a business may identify trends in people flow and opportunities to optimize congested areas. They may also see that certain rooms within the building get more use than others and leverage these insights to manage their space more effectively.  All of this is powered by a security ecosystem that can help a business better protect its people while realizing other benefits in the process. 2) Safeguard your assets Businesses are concerned about the security of their assets when it comes to the hybrid workforce model Even more, businesses are concerned about the security of their assets when it comes to the hybrid workforce model. About 72% of leaders say this is, in fact, their primary concern with the hybrid approach.  This figure isn’t surprising when you consider the impact of the pandemic, which left many businesses closed either temporarily or permanently, with few people allowed on-site to manage facility operations.  As a result of the pandemic, we saw tech adoption accelerate at an astonishing rate – simply because businesses had to implement cloud and remote technologies to survive during a time when buildings were closed indefinitely.  Remote management and visibility This was particularly true for security solutions, such as cloud video surveillance and cloud access control solutions like wireless IoT-connected locks. Nine out of 10 businesses (91%) report that they have already implemented cloud security technology; of those, nearly half (48%) stated that this was due to the pandemic. These technologies allow for remote management and provide visibility into business operations at the same time. In a retail setting, for example, cloud video surveillance allows businesses to identify and track not only criminal activity, but also foot traffic patterns, peak operating hours, staff shortages, and more.  Loss prevention strategy When integrated with the retailer’s point-of-sale (POS) system, businesses can gain greater insights into their traffic counts, end cap effectiveness, loyalty card activity, and a variety of POS exceptions, such as high-dollar transactions, repeated transactions, excessive returns, employee discounts, and more. For retailers especially, a security ecosystem means a more efficient loss prevention strategy that helps safeguard assets and profits. 3) Optimize your operations The “future of work” is still very much a work in progress, but one thing is clear: Businesses are looking for ways to increase efficiencies, drive cost savings, and, ultimately, optimize their operations – especially now with the challenges posed by price inflation. A relatively untapped opportunity for businesses to achieve these goals lies within their security infrastructure. Security technology and solutions gather incredibly rich data which, when unlocked, can help businesses understand how their buildings are being used, when the busiest times are, where there are highly trafficked areas, and more.  Leveraging cloud video surveillance systems, businesses could identify emerging staff training needs Cloud video surveillance systems For example, by leveraging the insights produced by cloud video surveillance systems, businesses could identify emerging staff training needs, which could ultimately result in improved employee satisfaction and reduced attrition. However, much of this data sits untouched within the infrastructure, leaving businesses unaware of the opportunities in front of them. 44% of businesses that currently use a cloud security system for its primary use say they want to know how else this technology can be utilized, and an additional 20% aren’t even aware that it could be used in other ways. AI and analytics The interest in adoption is promising for the office of the future, especially when we see that the majority of businesses (78%) would consider using AI and analytics technologies to optimize their operations, helping their business to operate more effectively and efficiently.  The increase in adoption of cloud technology – paired with the rise in interest in AI, machine learning, and advanced analytics – could make it possible for businesses to uncover invaluable insights from their security infrastructure and leverage them to adapt and build business resilience. 4) Secure your network Advanced technology help businesses improve their cybersecurity, making it harder for hackers to gain entry With cyber threats becoming more prevalent, businesses are increasingly looking to secure their networks and protect their data. More than half (54%) of those surveyed expressed interest in using AI, machine learning, and advanced analytics to secure their network by identifying and eliminating cybersecurity threats.  Advanced and automated technology can help businesses improve their cybersecurity, making it harder for hackers to gain entry to the larger corporate network. Modern cybersecurity tools that use AI and machine learning can detect anomalies in network traffic or alert and act on suspicious behavior.   Cybersecurity software For example, if an IoT device suddenly begins broadcasting and establishing connections with multiple devices, cybersecurity software could detect this abnormal behavior, send an alert, and suspend traffic or quarantine an endpoint immediately – saving precious time during a potential breach.  A single data breach could result in widespread distrust from workers and customers, potentially leading to decreased business as well as litigation issues. As such, businesses need to take action to update and strengthen their defenses so that they can avoid downtime and continue to operate with peace of mind.  Prepare your business for the future Businesses will continue to look for more ways to extract value out of their existing infrastructure, including their security technology. For many, the tools to do so are already in place, it’s just a matter of unlocking the insights with a security ecosystem.  With such an ecosystem – one that helps protect a business’ people, assets, and network, while optimizing operations – companies can better safeguard the future of their workspaces and usher in the new era of work with confidence. 

Newer facial recognition systems are scalable and provide more accurate results, and the end-user selects the parameters of system performance to suit their own application needs. “We have developed algorithms that can be optimized in various compute environments, whether in a small chip inside an edge device or on a large server device,” says Ido Amidi, Oosto’s Vice President of Products and Business Development. “It all depends on client needs. We can do it all without giving up performance. There is no significant loss in performance across various platforms.” The system’s “containerized environment” operates efficiently in a customer’s IT architecture. Facial recognition implementation Oosto, formerly AnyVision, was founded in 2016 based on deep learning research into facial recognition. The focus has been on how to use face recognition to identify people in real-world scenarios. Products began coming to market in 2017, targeting verticals that involve a need to identify “bad actors” or very important people (VIPs). The implementation of the technology involves the software operating in an on-premise appliance or server The most common implementation of the technology currently involves the software operating in an on-premise appliance or server, with inputs coming from cameras at the edge and outputs going to a network video recorder or access control system. As concepts of the Internet of Things (IoT) trickle down into the security marketplace, edge-based deployments will become more common, supplying real-time actionable information, and avoiding a flood of unstructured video data. Ethical recognition Oosto helps users deploy, set up, and calibrate the system; then, it is managed by the customer based on their needs. Privacy features are built into the system, part of the company’s commitment to “ethical” facial recognition.  The technology, in general, has changed a lot since early implementations a decade or so ago failed to perform as promised. Expanded capabilities are fueled by developments in deep learning. Privacy features Facial recognition can help end-users identify people of interest but is specifically designed not to violate anyone’s privacy. There are no databases or watch lists involved; the user typically compiles their selection of “bad actors” against which facial recognition algorithms can be compared. While Oosto provides a valuable tool, the end-user customer decides how to deploy that tool in their business, says Amidi. Oosto's “liveness detection” deploys algorithms to analyze images from video and/or 3-D cameras Liveness detection Recently, Oosto has adapted the approach to provide access control; too, including “liveness detection” that deploys algorithms to analyze images from video and/or 3-D cameras to ensure a presented face is not a printed image or mask.  Their latest software release is a single platform aimed at recognizing and providing insights into how people behave in physical spaces. New functionality includes the ability to detect unknown individuals entering restricted areas. Neural net algorithm Improved facial recognition functions well even for those wearing masks. A new neural net algorithm improves accuracy when identifying those wearing masks and the system can alert if a person is not wearing a mask (to aid compliance). Expanded video forensics features, designed to expedite investigations, include an ability to do in-depth searches on captured video related to body attributes, the color of clothing, etc. Recognition algorithms How well can Oosto recognize a face among 20 different people on a casino floor? It all depends on variables, such as the number of people, lighting, and angle of view, image quality, and even networking issues. Recognition algorithms are “trained” using data collected from real-world use cases; training takes place in the lab environment. The system can adapt to various lighting conditions, such as in a glass-enclosed lobby in the morning versus in the afternoon. As people enter an area, they may be looking down at their smartphones, for instance, which would mean some of their faces would not be in view. Such variables impact accuracy. Test requirements of a system apply to each specific customer and can be adjusted and tweaked as needed Customizable system Each customer must decide their parameters regarding how to best use the system, with the fewest acceptable number of false alerts, in real-time, and using existing infrastructure. Test requirements of a system apply to each specific customer and the system’s sensitivity and other operational factors can be adjusted and tweaked as needed, including at any time after a system has been installed. Meeting specified application “No customer is alike, so the needs of each customer’s system are unique,” says Amidi. For example, some situations might have a higher tolerance for false alarms, such as when there is an operator available who can make the final decision on whether a face matches. In other situations, such as when there is a missing child, false alerts are a bigger problem, and rapid response is especially of the essence. “What we give customers out of the box applies to any scenario, and customers can tweak the system with the click of a button to meet a specific application,” says Amidi. “We empower our customers to understand the pros and cons so they can react in real-time.” Identity management Oosto can help to enhance the customer experience by identifying important customers Oosto sells through systems integrators and has a partnership program with more than 150 integrators worldwide certified to manage and install systems. Oosto targets Fortune 500-size companies in financial services, gaming, and retail. The system helps to create a safe environment that is devoid of any “bad actors.” Alternatively, Oosto can help to enhance the customer experience by identifying important customers that warrant special treatment. The system also can provide an alert if any unauthorized person enters a restricted zone; that is, anyone who is not an employee, a registered visitor, or a contractor. Understanding technology In many parts of the world, facial recognition is widely accepted and used for applications such as payment and access control. Anxiety about technology, especially in the United States, is based on a lack of understanding. The public needs to “be better educated” on the subject, and Amidi expects the technology to become more socially accepted over time. “It’s a tool, and it needs to be supervised,” says Amidi. “From a technology perspective, we trust the accuracy. It just needs to be better explained.”

Securing Unmanned Infrastructure at the Network Edge

Achieving Frictionless Physical Access Control With AEOS

14 Success Stories About How Video Technology Is Improving City Life

Providing Frictionless Cloud Video Storage as a Service (VSaaS)

ASSA ABLOY's Aperio® wireless technology promotes patient health and safety in hospitals

Herta's Facial Analysis Wins In Copa Libertadores 2021

G4S Plays A Pivotal Role In Securing Guam’s Biggest Industry

Innovative C•CURE Go Reader Mobile App

Alcatraz AI Rock & C•CURE 9000

"IDS Cameras Help Lessmann GmbH To Make Brushes From Good Wood" is one of 2949 in-depth security application and installation case studies featured in this section. Visit regularly for the latest updates on use cases, installations and deployments of security products from IDS Imaging Development Systems GmbH.

SecurityInformed.com - Making The World A Safer Place Copyright © Notting Hill Media Limited 2000 - 2021, all rights reserved Our other sites: SourceSecurity.com | TheBigRedGuide.com | HVACInformed.com | MaritimeInformed.com

Achieving frictionless physical access control with AEOS