Welcome!

News Feed Item

Curb the Growing Cases of Food Fraud with a Multi-Disciplinary Approach

No-one likes to be cheated, and certainly not when it comes to what we eat.

DURHAM, N.C., April 14, 2014 /PRNewswire-iReach/ -- Food fraud is a growing concern in the United States. With increase in international incidences like melamine-adulterated infant formula in China and European beef adulterated with horse meat; these instances can no longer be thought of as being remote due to globalized food supply chains. Food Fraud puts whole industries, brands, and public health at risk, and these risks increases because of a general lack of awareness and understanding. To fight food fraud effectively, it is important to bring to light the major factors responsible for the vulnerability of organisations dealing with food chain. The professionals in these disciplines (supply chain managers, packaging scientist) need to apply their expertise to address the perpetrators who are motivated by economic gain. A multi-disciplinary approach is required to understand the problem including how packaging science, supply chain management, and crime science can contribute to solutions.

(Photo: http://photos.prnewswire.com/prnh/20140414/MN01606))

AudioEducator.com is conducting series of audio conferences on topics like food fraud, food safety, food quality, and food defense—to help you shed light on these areas.

Here's a sneak peek of the upcoming conferences:

The Public Health Risks of Food Fraud
Join Douglas C. Moyer, PhD, CPP in this audio session on Wednesday, April 16, 2014, where he will provide participants with a full understanding of Food Fraud as a discipline, the types of fraudsters, and the types of frauds. This will enable a strategic shift from detection and reaction to proactive prevention.

Topics covered in the session:

  • What is Food Fraud and how it differs from more traditional disciplines like Food Quality, Food Safety and Food Defense
  • Expose several common misconceptions, such as: Food Fraud is not the same as economically motivated adulteration (EMA)
  • Know why a multi-disciplinary approach is required to understand the problem including how packaging science, supply chain management, and crime science can contribute to solutions
  • The various types of food fraudsters will be presented along with the different types of Food Fraud and their unique ability to threaten public health
  • This program will illustrate the fundamental shift from detection and response to prevention that is needed to thwart any such opportunities
  • The program culminates with references to the US Food Safety Modernization Act and the impending requirements of Intentional Adulteration (section 106 )
  • International Food Fraud regulations and research are also covered in this presentation

For more information, http://www.audioeducator.com/food-safety/defining-food-safety.html

Storage and Distribution: The Forgotten Food Safety Link
Join Dr. John Ryan in this session on Wednesday, April 23, 2014, where she will provide updates about new FDA rules and provide guidance and standards for the safe and quality control practices needed to protect perishable food products while meeting newly evolving standards and legal requirements.

Topics covered in the session:

  • The 2014 FDA FSMA proposed rules for sanitary transportation of human and animal foods
  • Exemptions from the rules
  • How the FDA works with Homeland Security and Customs and Border Protection
  • Impact to carriers, shippers and receivers
  • Preventive planning and risk reduction
  • Meeting market shelf life and legal sanitation and temperature control requirements
  • Impact to carriers, shippers and receivers
  • Responsibilities of food handlers, drivers and others handling food in distribution and carrier operations
  • Sanitation of tools used in the distribution and transportation operations
  • Trailer and container precool
  • Cost effective tools and techniques critical storage and distribution operations
  • Management responsibilities

For more information, http://www.audioeducator.com/food-safety/forgotten-food-safety-link-04-23-14.html

New Requirements for Imported Food, including the Foreign Supplier Verification Program and the Voluntary Qualified Importer Program
Join Jennifer McEntire in this 60-minute session on Wednesday, April 30, 2014 to get answers to these questions:

  • How do I know if I'm an importer? Do these rules and programs apply to me?
  • If I'm not an importer, does the FSVP give a glimpse into how FDA expects manufacturers control domestic suppliers?
  • What is a "qualified individual" and what does this person need to do?
  • What are the most effective ways to verify suppliers, and what will FDA require?
  • What does the crystal ball tell us about the VQIP
  • When will all of this become effective?

For more information, http://www.audioeducator.com/food-safety/imported-food-04-30-14.html

AudioEducator brings the most compelling list of audio conferences on wide array of healthcare topics—food safety, food fraud, medical coding, billing to CPT changes, E/M Modifiers to OIG work plan, Affordable Care Act to ERISA, RAC updates to fee schedule, Electronic Health Record system to ICD 10 transition, HIPAA and more. Get trained from the comfort of your home or office without spending a penny on travel. Pick a format of your choice for training— live conference/On Demand/ CD/ PDF transcripts and start learning.

We have enabled a special discount of 10%. Use coupon code SAVE10 to get your discount, Applicable on all purchases. For further query you can call our customer support as mention below.

Media Contact: Adam K, Audio Educator, 1-866-458-2965, [email protected]

News distributed by PR Newswire iReach: https://ireach.prnewswire.com

SOURCE Audio Educator

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Extreme Computing is the ability to leverage highly performant infrastructure and software to accelerate Big Data, machine learning, HPC, and Enterprise applications. High IOPS Storage, low-latency networks, in-memory databases, GPUs and other parallel accelerators are being used to achieve faster results and help businesses make better decisions. In his session at 18th Cloud Expo, Michael O'Neill, Strategic Business Development at NVIDIA, focused on some of the unique ways extreme computing is...
Fact: storage performance problems have only gotten more complicated, as applications not only have become largely virtualized, but also have moved to cloud-based infrastructures. Storage performance in virtualized environments isn’t just about IOPS anymore. Instead, you need to guarantee performance for individual VMs, helping applications maintain performance as the number of VMs continues to go up in real time. In his session at Cloud Expo, Dhiraj Sehgal, Product and Marketing at Tintri, sha...
"We do one of the best file systems in the world. We learned how to deal with Big Data many years ago and we implemented this knowledge into our software," explained Jakub Ratajczak, Business Development Manager at MooseFS, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
Traditional IT, great for stable systems of record, is struggling to cope with newer, agile systems of engagement requirements coming straight from the business. In his session at 18th Cloud Expo, William Morrish, General Manager of Product Sales at Interoute, will outline ways of exploiting new architectures to enable both systems and building them to support your existing platforms, with an eye for the future. Technologies such as Docker and the hyper-convergence of computing, networking and...
You want to start your DevOps journey but where do you begin? Do you say DevOps loudly 5 times while looking in the mirror and it suddenly appears? Do you hire someone? Do you upskill your existing team? Here are some tips to help support your DevOps transformation. Conor Delanbanque has been involved with building & scaling teams in the DevOps space globally. He is the Head of DevOps Practice at MThree Consulting, a global technology consultancy. Conor founded the Future of DevOps Thought Leade...
Using new techniques of information modeling, indexing, and processing, new cloud-based systems can support cloud-based workloads previously not possible for high-throughput insurance, banking, and case-based applications. In his session at 18th Cloud Expo, John Newton, CTO, Founder and Chairman of Alfresco, described how to scale cloud-based content management repositories to store, manage, and retrieve billions of documents and related information with fast and linear scalability. He addres...
An edge gateway is an essential piece of infrastructure for large scale cloud-based services. In his session at 17th Cloud Expo, Mikey Cohen, Manager, Edge Gateway at Netflix, detailed the purpose, benefits and use cases for an edge gateway to provide security, traffic management and cloud cross region resiliency. He discussed how a gateway can be used to enhance continuous deployment and help testing of new service versions and get service insights and more. Philosophical and architectural ap...
By 2021, 500 million sensors are set to be deployed worldwide, nearly 40x as many as exist today. In order to scale fast and keep pace with industry growth, the team at Unacast turned to the public cloud to build the world's largest location data platform with optimal scalability, minimal DevOps, and maximum flexibility. Drawing from his experience with the Google Cloud Platform, VP of Engineering Andreas Heim will speak to the architecture of Unacast's platform and developer-focused processes.
Wooed by the promise of faster innovation, lower TCO, and greater agility, businesses of every shape and size have embraced the cloud at every layer of the IT stack – from apps to file sharing to infrastructure. The typical organization currently uses more than a dozen sanctioned cloud apps and will shift more than half of all workloads to the cloud by 2018. Such cloud investments have delivered measurable benefits. But they’ve also resulted in some unintended side-effects: complexity and risk. ...
To Really Work for Enterprises, MultiCloud Adoption Requires Far Better and Inclusive Cloud Monitoring and Cost Management … But How? Overwhelmingly, even as enterprises have adopted cloud computing and are expanding to multi-cloud computing, IT leaders remain concerned about how to monitor, manage and control costs across hybrid and multi-cloud deployments. It’s clear that traditional IT monitoring and management approaches, designed after all for on-premises data centers, are falling short in ...
We are seeing a major migration of enterprises applications to the cloud. As cloud and business use of real time applications accelerate, legacy networks are no longer able to architecturally support cloud adoption and deliver the performance and security required by highly distributed enterprises. These outdated solutions have become more costly and complicated to implement, install, manage, and maintain.SD-WAN offers unlimited capabilities for accessing the benefits of the cloud and Internet. ...
"We focus on SAP workloads because they are among the most powerful but somewhat challenging workloads out there to take into public cloud," explained Swen Conrad, CEO of Ocean9, Inc., in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
Serveless Architectures brings the ability to independently scale, deploy and heal based on workloads and move away from monolithic designs. From the front-end, middle-ware and back-end layers, serverless workloads potentially have a larger security risk surface due to the many moving pieces. This talk will focus on key areas to consider for securing end to end, from dev to prod. We will discuss patterns for end to end TLS, session management, scaling to absorb attacks and mitigation techniques.
The deluge of IoT sensor data collected from connected devices and the powerful AI required to make that data actionable are giving rise to a hybrid ecosystem in which cloud, on-prem and edge processes become interweaved. Attendees will learn how emerging composable infrastructure solutions deliver the adaptive architecture needed to manage this new data reality. Machine learning algorithms can better anticipate data storms and automate resources to support surges, including fully scalable GPU-c...
The vast majority of businesses now use cloud services, yet many still struggle with realizing the full potential of their IT investments. In particular, small and medium-sized businesses (SMBs) lack the internal IT staff and expertise to fully move to and manage workloads in public cloud environments. Speaker Todd Schwartz will help session attendees better navigate the complex cloud market and maximize their technical investments. The SkyKick co-founder and co-CEO will share the biggest challe...