Menu

Rance Carter

header photo

Bell Moore Group Inc. Review: Viktigheten av å skape verdt verdi

December 4, 2017

Hvordan skaper vi verdi? Eller hvordan definerer vi det?

I virksomhet, skape verdier betyr ganske enkelt gi klienten din en fordel som oppveier betalingen du får i bytte for tjenesten. Slike fordeler innebærer god service og støtte samt gi reell virksomhet utfall som vil maksimere deres potensielle inntekter generasjon.

Bell Moore Group Inc. mener at å skape verdi betyr involverer klienten fullt ut i prosessen. Det er vår oppgave å vurdere deres beste interesse mens ta opp sine problemer og generere reelle forretningsløsninger som vil flytte dem inn i deres fremtidige planer. Bell Moore evne til å skape verdier så vel som andre finansielle og tekniske komponenten har det opprettholdt sitt omdømme i eiendomsbransjen. Firmaet mener at for å få fullstendig tillit til hver klient, må du forstå deres spesifikke krav og hva de Aspire å oppnå i virksomheten.

Bell Moore ble etablert på 1991, firmaets rektorer, Rianne Bell og Lynn Moore, har levert utmerket profesjonell service til mange kunder, inkludert Sentinel Pension i New York, Mab American Property Reit i Australia, Paul Mitchell Trust på Hawaii og Summit Reit i Canada. Videre er de også ansvarlig for å bistå tidligere amerikanske ambassadør merke Erwin i sitt familie-eide investeringsselskap i Charlotte og andre institusjonelle kunder lokalt og nasjonalt.

I en av Bellmoore Group Inc anmeldelse, betaler oppmerksomhet til kunden er viktig. Innlemmer dem i prosessen alle er avgjørende for suksess for operasjonen innen å tilby tredjeparts ledelse, leasing, megling og konsulenttjenester. Gjennom årene har firmaet utnyttet og utviklet hva det krever å skape verdier som vil gagne klienten over tid gir samme verdi selskapet har konsekvent gitt til alle kunder.

TCG Tokyo Consulting Group: Accounting Services, Bookkeeping Japan

August 15, 2017

Upon opening a branch or business abroad, it is crucial for an organization to get its accounting services managed properly right from the start. As part of our integrated services strategy, Tokyo Consulting Group offers accounting services such as bookkeeping and regular or on-demand consulting.

Our main bookkeeping and consulting services consist of the following tasks:

  • Accounting Journal entry & review
  • Employee expense review
  • Sales & Purchases invoice filing, collecting and payment
  • Petty Cash review
  • General ledger and periodical (as needed) trial balance preparation
  • Monthly financial statement preparation

Additionally, our experienced staff can perform all necessary accounting compilation tasks. We have the ability to generate financial statements according Japanese GAAP, US GAAP and under IFRS (International Financial Reporting Standards).

Finally, our staff is acquainted with main ERP systems, such as SAP, and can produce statements and records according to the system requested by our customers.

Thus, our accounting consulting services for foreign businesses in Japan is highly flexible, as the type, frequency, platform and language of the reports can be customized to fit our customers' needs.

Click Here For More Information about TCG

Tokyo MK Taxi: Keeping Up with the Competition

July 5, 2017

In metropolitan areas where a presence of heavy traffic and limited parking spots are a problem, it becomes exceedingly wise to rely on privately hired cars. Taxi and chauffeur companies like Tokyo MK Taxi allows people to sit back and relax in the back seat while a private driver is in charge to get you to your destination with comfort and style.

 

Tokyo MK Taxi is a global company providing taxi and chauffeur services across Japan, Korea and the United States. Having a wide array of car models, Tokyo MK Taxi features Lexus group enthusiasts LS600hL/460 as well as other luxurious vehicles like BMW, Mercedes-Benz, Toyota Hiace and Nissan Fuga Hybrid, the company can definitely cover your car needs and requirements. Having provided taxi and chauffeur service for many years, we have created an application that will meet the needs of our clients when it comes to the online reservation and taxi booking. No matter where you are, you can access our website and book the transportation you need. Plus, we can give you the assurance that our application will work in all circumstance and on all platforms.

 

What's PCS?

 

PCS (Private Chauffeur Service) is a service where MK taxis available for hire in the vicinity of the customer’s location can be searched using a mobile phone (including smartphone) or laptop and the request can be made directly to the driver without going through the call center. Since the request is placed directly to the driver errors that may occur when requesting through the call center can be avoided.

 

In order for Tokyo MK to become one step ahead of the competition, technological development was integrated in order to better serve our clients and expand our client base. If you have any kind of questions about our service, please feel free to contact us via e-mail or by telephone and we will be delighted to help you.

What’s Behind Google’s Secretive Ad-Blocking Policy by Online Security

February 16, 2017

When Google decided in May to stop accepting online ads for short-term, ultra-high-cost personal loans known as payday loans, some people wondered whether the company was acting more like a publisher exercising editorial control than a supposedly neutral search engine.

 

Now that Google’s policy has gone into effect, it’s worth asking: To what extent should the company be a gatekeeper, judging which online ads are okay and which are not? And if the world’s largest Internet search engine is going to be selective about accepting ads, where does it draw the line?

 

The same questions could be applied to Microsoft and Yahoo, which refuse to carry ads for certain types of sensitive content (but still advertise payday loans). Baidu, the world’s second-largest search engine, has been grappling with these issues since earlier this year, when its practice of promoting medical listings without vetting them sparked outrage over a tragedy: a young man with cancer died after receiving an ineffective treatment from a hospital he found through a Baidu ad. The outcry prompted an investigation by China’s Internet regulator, which ordered Baidu to review its ads and remove any that promote unlicensed medical providers.

 

University of Maryland law professor Frank Pasquale says Google has tried to have it both ways: sometimes it portrays itself as a simple utility and a mere conduit of its customers’ ads, but other times it presents itself as a content provider that can and should exercise control over the ads it shows.

 

Whenever Google is accused of abetting or enabling copyright infringement or defamation, it says, ‘We’re just [connecting people] like the phone company does, and you wouldn’t sue the phone company over this,’” says Pasquale. “But when people say, ‘If you’re a common carrier [utility], you should take all ads,’ Google will say, ‘No, we’re like a newspaper and we should have carte blanche over what we publish.’”

 

With payday loan ads, Google is characterizing itself as the watchful online guardian. The company has said it banned the ads to protect its users because “research has shown that these loans can result in unaffordable payment and high default rates.” (Google declined to comment for this story beyond saying that it constantly reviews its AdWords policies and updates them ”when necessary.”)

 

Google also seems to have been influenced by advocacy from a large coalition of civil rights, digital rights, and financial reform organizations. In late 2015, the Leadership Conference on Civil and Human Rights and other groups sent Google reports detailing abuses that often accompany payday loans—among them fraud, unauthorized transactions, and long-term indebtedness. “We said, ‘This is a problem, and we want to talk to you about this,’” says Alvaro Bedoya, the executive director of Georgetown Law’s Center on Privacy & Technology, who participated in the outreach campaign. “There were long conversations with Google and a lot of bringing this research to their attention over the course of a couple of months.”

 

An ongoing inquiry into payday lending by the U.S. government’s Consumer Financial Protection Bureau may have further heightened Google’s interest in predatory lending practices.

 

Consumers might not realize it, but Google—and other ad-supported search engines—have been making editorial decisions about the types of ads they will carry for years. These companies won the right to reject ads they consider objectionable in 2007, when a Delaware district court ruled that constitutional free-speech guarantees don’t apply to search engines since they are for-profit companies and not “state actors.” The decision cited earlier cases that upheld newspapers’ rights to decide which ads to run.

 

Google currently prohibits ads for “dangerous,” “dishonest,” and “offensive” content, such as recreational drugs, weapons, and tobacco products; fake documents and academic cheating services; and hate-group paraphernalia. Google also restricts ads for content it deems legally or culturally sensitive, such as adult-oriented, gambling-related, and political content; alcoholic beverages; and health care and medicine. It may require additional information from these advertisers and limit placement to certain geographical locations.

 

Legal experts aren’t uniformly comfortable with Google’s taking on this role. While the University of Maryland’s Pasquale supports Google’s decision to add online payday loans to its restricted list as a benefit to consumers, University of Connecticut law professor James Kwak thinks Google is overreaching. Given the company’s dominance—it is estimated to have a 55 percent share of the $86.2 billion global market for search ads—Kwak thinks Google is essentially exercising regulatory authority when it bans certain ads and should be subject to scrutiny on the grounds that it might be violating First Amendment protections on free speech.

 

“The question is, ‘When does something have so much control over the dissemination of ideas that it should be treated as part of the government?’” says Kwak. “This is a company with enormous power that’s using that power to affect other industries.”

 

Now that Google has agreed to ban a category of ads, partly on the basis of community advocacy, will people expect it to block other ads that cause public harm? And since Google has committed to policing its payday loan ads, shouldn’t it take responsibility for other potentially unethical ads that it runs?

 

Consider for-profit colleges and services for relief of student debt. Google has not instituted special regulations for such ads even though both entities are widely believed to capitalize on consumers’ confusion and hurt more people than they help.

 

Logan Koepke, an analyst at Upturn, a technology law and policy consultancy that published an influential 2015 report about online payday loans, thinks Google’s decision may set a precedent for consumer advocates to seek to shape companies’ ad policies.

 

Some people aren’t comfortable with Google as the final arbiter on these topics. Kwak, for one, would like to see greater transparency surrounding such decisions. He suggests that Google hire a group of economists or social scientists to identify deceptive products being advertised online, or perhaps work with the CFPB to determine the most exploitative financial products.

Eastern Alliance Insurance Group Review: Fraud Prevention

January 26, 2017

What You Need to Know

Workers' compensation fraud is a big problem. The National Insurance Crime Bureau (a not-for-profit organization that investigates and tracks insurance fraud nationally) asserts that workers' compensation fraud is the fastest-growing insurance scam in the country. The NICB estimates that 10 cents out of every premium dollar is wasted on fraud. That translates into billions of dollars lost to workers' compensation fraud annually. Who pays the tab? We all do.

Education is one of the ways we can combat the problem. At Eastern, we believe the more people know about fraud, the more likely they'll be able to recognize it and report it. One important thing to keep in mind is that workers' compensation fraud is not just perpetrated by employees - employers and medical providers can be guilty of fraud too.

Here are some of the red flags to look for in each group:

Employee Workers' Compensation Fraud

Harry Smith is a welder for a small company. Lately, Harry has received "poor performance" reviews. He's also told some of his co-workers that he and his wife are divorcing and that he will have to be responsible for child support. In the past, he's complained about work stress and back problems. Now, he shows up on Monday and tells HR that he injured his wrist late on Friday afternoon, after everyone else had gone home.*

*Not a real case.

Poor performance reviews.

Harry's walking on thin ice at his job and may be seeking to get whatever he can before the company dismisses him.

Financial difficulties.

That divorce and child support Harry mentioned to his co-workers? Harry may be signaling he needs money fast.

A suspicious prior history.

Harry claims to have had stress and back problems. A prior history of reporting subjective injuries should raise concerns about his claim.

Reporting a work injury on Monday that occurred on the previous Friday.

Harry shows up on Monday, claiming he sustained an injury on the job the previous Friday and that there were no witnesses. Under these circumstances, Harry's injury looks highly questionable.

Other "Red Flags" include an injured employee who:

  • Complains frequently about new job responsibilities or about returning to work
  • Their health doesn't seem to improve
  • Inquires about a "quick settlement"
  • May be retiring, on probation, involved in a labor dispute, disgruntled, or subject to disciplinary action
  • Stays out of work longer than the doctor prescribed
  • Refuses medical tests or examinations to confirm an injury

Employer Workers' Compensation Fraud

The ABC Company is a manufacturing company with 200 workers – but they only claim 180 workers on their payroll. They also classify 75 of those 180 as desk workers, when the reality is only 25 employees primarily work at their desk. The company has submitted workers' compensation claims more than 10 times in the past two years, but they're not very cooperative – they don't respond favorably to queries from the insurance carrier’s claim and risk management staff. Witnesses to their on-the-job injuries are typically listed as: Senior VP, Manager, and Production Chief.*

*Not a real case.
There are several red flags here, but uncovering employer workers' compensation fraud is more complicated than employee fraud. In most cases, this type of fraud is usually discovered by a state fraud investigator.

Misrepresenting payroll.

This is a common example of employer workers' compensation fraud. By reporting lower-than-actual payroll numbers, the employer's premium dollars are reduced.

Misclassifying workers.

Another way employers can fraudulently reduce their premiums is to classify their employees in a less-hazardous class code.

Frequency of claims and lack of cooperation.

A high frequency claims rate and a refusal to cooperate with claim and risk management staff may signal that the employer is defrauding their insurance carrier.

Management witnesses.

Who's going to deny what the boss says, when they are the ones submitting the claims and paying the workers' compensation premiums? Second-guessing management isn't necessarily a standard practice by insurance carriers.

Medical Provider & Medical Facilities Workers Comp Fraud

Dr. Megan Jones is a licensed chiropractor. She sees many workers' compensation cases involving neck and back complaints. Often she schedules her patients for frequent visits over a period of three or more months – no matter how the patient is feeling or what the original injury was. Dr. Jones also shares office space with an acupuncturist and a massage therapist and regularly advises her patients to seek acupuncture and massage therapy for pain and stress relief. Her office manager then bills for all of these treatments under the codes she knows will be paid and won’t trigger an audit and additionally bills patients for the treatments.*

*Not a real case.

Like employer workers' compensation fraud, medical provider fraud is difficult to uncover. Sometimes, providers who commit fraud can go undetected for years.

Excessive treatments.

This is a common act of fraud perpetrated by medical providers to get more money from insurance carriers than they're due.

Unnecessary treatments.

Procedures and therapies that may not be considered "necessary treatments" for workers' compensation injuries are sometimes deliberately miscoded in the hope that the insurance carrier will pay for them without question.

Double-Dipping.

This fraudulent act is when the provider bills both the patient and the insurance carrier for the same treatments.

Eastern Alliance Insurance Group Review: Risk Management Services

January 25, 2017

Eastern's approach to risk management services is simple: reduce your exposure to loss. Our consultative services extend well beyond merely providing hazard identification assessments and submitting recommendations. Our in-house risk management services’ group has years of experience, expertise in workers’ compensation, and an unparalleled focus on you, the client. Eastern handles our consulting activities through five distinct processes:

  • Initial assessment of your organization's needs and culture
  • Joint development of a service plan
  • Review of alternative solutions
  • Implementation of plan
  • Monitoring of results

Eastern provides an online Risk Management Resource Center, featuring a document library and access to Safety.BLR.com. BLR is a safety training and compliance resource site where you can find:

  • Constantly updated safety news, including OSHA standard changes, large violations, current safety news, etc.
  • Federally-mandated and state-specific regulations
  • Downloadable and customizable sample directives, policies, toolbox talks, and MSDS resources
  • Training materials in English and Spanish
  • Information sorted by topic, industry, and format
  • Audio training presentations

Cyber Security: Healthcare Industry Vulnerabilities Give Rise to Cyber Crime

January 15, 2017

In November, at least 35 healthcare facilities in the U.S., U.K. and Canada were targeted by cybercriminals executing Business Email Compromise (BEC) campaigns. The organizations, which included hospitals, specialty care providers, walk-in clinics and pharmaceutical companies, were defrauded by attackers who impersonated executives within the organizations.

Cybercriminals are drawn to and attack the healthcare industry for many reasons, but primarily because they allocate a bulk of their resources to patient care and innovation, which often leaves information security underfunded. However, by becoming educated about BEC scams and the tools available to mitigate this threat, healthcare organizations can drastically reduce email fraud and associated financial losses.

Understanding BEC

BEC is defined by the FBI as a sophisticated email scam that targets businesses working with foreign partners that regularly perform wire transfer payments. As such, BEC scams typically involve an attacker hacking into or spoofing an official business email account to request a fraudulent wire transfer of funds from that business to a bank account the attacker controls.

To pull off their scams without arousing suspicion, fraudsters often conduct research via the targeted company’s website and social media to secure organizational charts that indicate employees’ titles and roles, as well as the chain of command within a company. Some attackers even call their target’s human resources department to obtain personal information about employees that may help them better position their requests for fraudulent payment. With this research in hand, attackers are able to piece together enough intricacies of an organization to understand under what auspices to request the transfer and who the initiating and receiving parties should be.

The main forms of BEC include:

The Bogus Invoice Scheme: Often referred to as “The Supplier Swindle” or “Invoice Modification Scheme,” attackers identify vendor partners of their target and pose as these vendors via email to request payment on an invoice.

CEO Fraud: Known alternately as “Business Executive Scam,” “Masquerading” or “Financial Industry Wire Frauds,” this form of BEC involves a cybercriminal impersonating a member of the executive team within the target organization and using this spoofed email account to initiate a wire transfer to an account the attacker controls.

Account Compromise: This version entails a fraudster hacking into an employee’s email account and sending email requests to multiple vendors for invoice payment to be made to an attacker-controlled account.

Attorney Impersonation: To execute this form of BEC, attackers contact employees within the target company claiming to be a legal entity handling confidential, time-sensitive matters that require a transfer of funds into an account owned by the attacker.

Data Theft: Cybercriminals seek out HR representatives or administrators with access to personal employee information and use this intelligence as a jumping-off point for the aforementioned forms of BEC.

Targeting the Healthcare Industry

As organizations within the healthcare industry place much of their focus and financial resources on patient care and working toward advancements in medicine, they often neglect to allocate the necessary portion of their budgets to cybersecurity. These security vulnerabilities make healthcare organizations the perfect target for BEC scams. For these specific cyberattacks, two main BEC strategies have been identified:

In the first tactic, attackers spoof the “From” field on an email to make it appear as though the email is being sent by an executive while the “Reply To” field contains the attacker’s email address. Although the employee intends to respond to the executive who they believed sent the email, their reply containing sensitive information is actually sent to the attacker.

The second tactic entails fraudsters utilizing a domain name that is similar to that of the targeted healthcare institution — often varying only by one letter that is not readily detectable by the recipient. For example, cybercriminals used this technique on several National Health Service (NHS) institutions with the copycat domains appearing as <name of hospital> co instead of nhs.uk.

In both strategies, attackers utilize a simple subject line conveying a sense of urgency that encourages the recipient of their spoofed email to act quickly. Some examples of the subject lines used in BEC schemes include:

  • Extremely Urgent
  • Treat as Urgent
  • Due Payment
  • Urgent Payment

This push for quick action — coupled with the fact that the email appears to be sent from a high-level member of their company — discourages employees from fully considering and verifying the details of the request. In turn, many inadvertently reply to the attacker, providing them with the account information needed to fraudulently obtain the organization’s funds.

Combatting BEC

Unfortunately, since there are many variations of BEC scams — and fraudsters work hard to create credible, inconspicuous email messages — BEC is particularly difficult to monitor and mitigate without employee awareness of the threat and the advanced cybersecurity solutions. Traditional security software typically does not detect BEC tactics because these spoofed emails don’t contain typical malicious content such as URLS within an email and email attachments.

To combat BEC scams and other emerging threats, healthcare chief information security officers (CISOs) should invest in a comprehensive layered defense that includes an advanced cybersecurity solution that detects and blocks social engineered attacks and advanced malware. These solutions should utilize machine learning to inspect behaviors of socially engineered emails to prevent them from reaching their endpoints.

Additionally, CISOs must develop an executive training program focused on advanced threats. They need to educate employees on the threat of BEC attacks and encourage them to verify all details in an email request for wire transfer, no matter the level of urgency communicated. Employees can also help mitigate the risk of fraudulent transfers by using the Forward function, rather than Reply, to type in their intended recipient’s email address to ensure their response is sent to the correct party.

Finally, healthcare organizations should review their accounting policies and operational controls to validate that proper verification procedures are in place. Employees should use phone confirmation as part of fund transfer request procedures, and vendor payment location changes should have a secondary sign-off system.

With the right tools, employee training and vigilance, most healthcare organizations can substantially diminish the risk of BEC attacks. Ultimately, by investing in the resources up front, they can avoid heavy financial losses in the end.

Security and Risk Online: Cyber Gang of Russia Collected Millions through Fake-Ad Scam

January 4, 2017

abcnews.go.com posted on December 20th, 2016, quoting a firm which specializes in detection of online-ad fraud as saying that a criminal group of Russia is running huge fraud which has been stealing millions of digital advertising dollars per day for the last few months.

It is estimated that billions of dollars were lost in a year due to fake traffic, fraudulent clicks, and various other scams. But there is little motivation to stop it because of the manner the online-advertising market is structured with many layers of middlemen and ad-networks.

In fact, the growth of sophisticated bot-nets and other types of click fraud is one of the reasons why less than half of all Internet ads are even seen by humans, according to a research conducted by comScore in 2013, an online analytics firm.

White Ops, a New York-based firm, has named the operation "Methbot" because of references to meth hidden in the computer code underlying the scam, and said it is the biggest and most profitable fraud operation yet to assault digital advertising. The company said that the scam is believed to originate from Russia using a so-called bot net to fake views of as many as 300 million video ads per day and trick advertisers to pay for views which were never seen by humans.

While Methbot had its own devoted servers running its software, several bot-nets are created out of ordinary PCs owned by innocent victims, who download "malware" or malicious programs from the Internet. Software can be installed in the background by clicking on a link or a popup ad which then captures the computer for different purposes.

As hacking by Russian government dominating headlines all over the world, Michael Triffany, CEO of White Ops, said that this scam is perhaps not being run by the Kremlin although it has massive size and sophistication.

White Ops said that to fight the fraud, it will release known IP addresses associated with Methbot to enable advertisers and their agencies to block them. The company added that it will release a fake domain name and full URL list to show where this phony activity has been taking place.

SC Advisors Facilitates $50 Million Acquisition And Development Deal BETWEEN MOSS PARK PROPERTIES LLLP AND LENNAR HOMES LLC

November 21, 2016

Lennar Homes, LLC, and Moss Park Properties, LLLP (MPP) have completed an acquisition and development contract for 366 acres and the future development of a new master planned community.

This $50 million investment will advance the initial phases of the community with more than 2,000 residential units and supporting retail and commercial development. SC Advisors will serve as the development advisor for the new community, overseeing all planning and major improvements as well as future transactions for MPP.

Haws Corporation tempered water Nevada USA, Singapore on Pulp and Paper Mill Upgrades it’s Emergency Equipment

September 27, 2016

One of the leading manufacturers of corrugated and consumer packaging in North America is committed to exceeding expectations for both its customers and its more than 15,000 employees throughout all facets of the organization.

When a new site safety manager joined the organization, he suspected there were issues with the plant’s emergency response equipment, particularly safety showers and eyewashes.

Following a thorough review of Haws safety shower and eyewash survey results, the safety manager purchased 40 AXION Advantage™ kits to retrofit the majority of the plant’s existing showers and eyewashes, which included product from a variety of companies.

Background

One of the leading manufacturers of corrugated and consumer packaging in North America is committed to exceeding expectations for both its customers and its more than 15,000 employees throughout all facets of the organization. Because the modern pulp and paper mill uses a complex series of processes and technologies, ensuring the safety of workers in its manufacturing facilities – which can be found in North and South America – is always a priority.

Objective

When a new site safety manager joined the organization, he suspected there were issues with the Plant’s emergency response equipment, particularly safety showers and eyewashes. After attending a Haws® presentation at an annual North American safety meeting, he invited Haws to conduct an onsite ANSI emergency shower and eyewash survey, which revealed that just 3% of the facility’s 60+ units were compliant with ANSI Z358.1 Standard. A full 81% were categorized as non-compliant due to multiple violations including significant performance issues and/or improper installation.

Solution

Following a thorough review of Haws safety shower and eyewash survey results, the safety manager purchased 40 AXION Advantage™ kits to retrofit the majority of the plant’s existing showers and eyewashes, which included product from a variety of companies. The AXION technology solved the common problems associated with owning and maintaining emergency equipment, including an overabundance of flow, lack of simultaneous flow to the eyewash heads when the shower is activated, and uneven flow pattern. He also liked that AXION aligned with standard medical protocols for effective eye flushing. AXION is the only product on the market with a revolutionary inverted flow design, giving it superior response capabilities consistent with emergency room procedures and maximum victim comfort.

Result

The AXION Advantage kits solved the flow issues at the plant and brought 95% of its units into compliance, with the remainder waiting on piping adjustments. The single-head design for greater flow reliability was key, and the plant has adopted a standard specification based on the innovative AXION technology. The staff described the Haws shower and eyewash survey as “completely effective” and “extremely useful” in terms of helping them understand the state of their facility’s emergency equipment and greatly improving its level of compliance with ANSI Z358.1 requirements.

About

AXION’s groundbreaking technology continues to change the emergency response landscape by offering the only eye/face wash duplicating the methodology recommended and used by medical professionals. The AXION MSR eye/face wash and shower provide superior safety technology for use in labs, schools and healthcare offices and are available in a variety of configurations and retrofit options. All AXION MSR products are certified by CSA to meet ANSI Z358.1

View older posts »