NDC InfraLab e-Series has received Aus-Meat® AMISLC Committee approval following independent testing by SGS to AOAC Methods for meat fat analysis
B-R controls P/L, NDC’s exclusive distributor in Australia for its range of On-Line and At-Line NIR Gauges and Analyzers, recently commissioned SGS Food & Agriculture Laboratory in Queensland, who are a NATA accredited testing laboratory (ISO 17025), to carry out independent testing of NDC’s InfraLab NIR Benchtop Meat Analyser with the aim of receiving Aus-Meat approval.
The resulting report was then submitted for assessment and on the 21st August, Aus-Meat granted its approval of the InfraLab for the measurement of of fat in meat up to CL 50 (chemical lean, equivalent to 50% fat content).
B-R Controls were supported by NDC’s Applications Technical Support group, and SGS performed the tests on 3 separate InfraLab fat analysers provided by NDC.
The reference method used for the fat analysis was:
• AOAC Official Method 991.36 Fat (Crude) in Meat and Meat Products Solvent Extraction (Submersion) Method, AOAC International, 2006
Multiple replicates of meat samples over a wide range of fat values from 5% to 50% were analysed using the AOAC method and the results compared to the reading obtained when analysing the same samples using each of the three NDC InfraLab units.
Extracts from SGS’s report Conclusion confirm:
“The calculated standard deviation of the three instruments compares more than favourably with the results that could be expected using the reference method.”
“The statistical analysis of the data obtained during the testing showed that all three instruments tested produced results on a single sample that had a very low relative standard deviation. Additionally, it was not possible to conclude statistically that any one instrument provided a different result from any other.”
This product is marketed in Ireland by Irish Power & Process.
Short Takes – 12-28-24 – Cyber Geek Edition
-
*PMKID Attacks: Debunking the 802.11r Myth*. NCCGroup.com blog post. Pull
quote: “The PMKID-based attack exploits a weakness in the WPA2
authentication ...
No comments:
Post a Comment