Skip to content

How software contributes to the detection of contraband

OD Security manufactures Transmission X-Ray Full body scanners for correctional facilities and prisons, customs and occasionally diamond and gold mines. The scanners scan incoming and outgoing persons for contraband items they carry on and/or in their bodies. The X-ray scanners create the best possible image for operators with minimal amounts of radiation (similar to eating two bananas). Then the operator must assess the image looking for hidden wares. The software for these scanners is the heart of the body scanner system for OD Security and is the important stable foundation with opportunities for differentiation.

IN SHORT

This is the headline

OD Security manufactures Transmission X-Ray Full body scanners for correctional facilities and prisons, customs and occasionally diamond and gold mines.

This is the headline

The software must be reliable and easy to scale both for the individual device and within a network of multiple scanners.

This is the headline

At OD Security, they were not used to requirements and specifications. More recently and during this particular project, they have started to collaborate much more on a project basis and we have formalized and professionalized several things.

More structure in the software

"Basically, every body scanner does the same thing: it's an X-Ray scanner that scans a person and generates a scan image," says Martin van der Kaap, Technical & QA Manager at OD Security. "We supply to organizations that often want to use multiple scanners at the same time or in conjunction with each other. The software has to be reliable both for the individual device and within a network of multiple scanners, and be easy to scale." This was not the case with the older software versions.

The older software version (Delphi) had been developed ad hoc, resulting in a proliferation of code over the years. ICT Group has been working for OD Security for over 10 years, initially mainly by developing in a way that the client specifically requested at the time. In order to deliver larger numbers of systems and to be able to link them to each other, more structure had to be given to the software. That would make it easier to scale up, add new features, reduce testing time and improve security.

"For example, there is a daily, weekly and annual limit on the maximum radiation a person can receive during scans," van der Kaap explains. "If guards work at multiple locations of prison organizations, it is important that the devices are all connected to the same database. The body scanners can then communicate with each other to collectively keep scanning within security standards."

"We supply organizations that often want to use multiple scanners simultaneously or in conjunction with each other. The software has to be reliable both for the individual device and within a network of multiple scanners, and it has to scale easily."

More structure in the approach

"We work on challenging software for clients in all kinds of sectors. Important in this is the plan of action, to work in a structured and planned way. It makes us their 'trusted advisor', based on more than 40 years of experience" says Marco Boeve, Operations Manager at ICT Group. "With OD Security we have been working together for about 10 years and more recently our project-based approach has also become important for them."

That project-based approach was lacking. "At OD Security, we were not used to requirements and specifications. More recently and during this particular project, we started working together in a much more project-oriented way and we formalized and professionalized several things. That was important to us, otherwise the software would never have been developed as it is now," Van der Kaap says. Project-based collaboration was an important part of the new approach. ICT Group made a plan to manage the entire software development process. This made it easier to enter processes earlier and to take on project management. It led to concrete questions and wishes from OD Security, which ICT Group could easily translate into a structured approach.

Software technical helped ICT Group switch from Delphi to C#. In addition, work was done on a standard image so that it would be easier to carry out maintenance. OD Security benefited from this professionalization, both for the specific software and for the entire approach and procedure for developing software.

Source: https://ict.eu/nl/case/betere-software-en-een-duidelijke-roadmap-voor-od-security/

TIPS

This is the headline

The project-based approach was lacking. At OD Security they were not used to requirements and specifications. More recently and during this particular project, they have started to collaborate much more on a project basis and have formalized and professionalized several things. This was important, otherwise the software would never have been developed as it is now.

This is the headline

ICT Group's approach made it easier to get into processes earlier and take on project management. It led to concrete questions and wishes from OD Security, which ICT Group could easily translate into a structured approach.

This is the headline

In addition, work was done on a standard image so that it would be easier to carry out maintenance. OD Security benefited from this professionalization, both for the specific software and for the entire approach and procedure for developing software.

ICT Netherlands

ICT Netherlands

ICT Netherlands is a supplier of total solutions in the field of industrial automation. As an experienced supplier of solutions for industrial technology, ICT wants to make the world a step smarter every day. Our dedicated technical professionals provide our clients with services in the field of consultancy, software development, project-based solutions and managed services.

View Business
Sign up for our newsletter and receive updates.