IBM tracks pork chops from pig to plate
Computerworld - Meat suppliers can track a single pig all the way from live animal to pork chop, thanks to new technology from IBM that may limit or prevent disease outbreaks.
Pigs are identified with a barcoded ear tag. That tag helps track various pig parts as they pass through the slaughterhouse and on to the processing plant, the distribution center and finally the package in a grocer's case.
Some trial systems are being installed in slaughterhouses and retail stores in the Chinese province of Shandong. China's interest stems from an outbreak of blue-ear pig disease from 2006 to 2007. The illness doesn't affect humans, but at the time, it led to a pork shortage and sent prices soaring. There was worry that the disease could spread to other pigs around the globe.
IBM's algorithms analyze data and assess risk levels to try to quickly identify problems. For instance, the systems could categorize some shipments from certain suppliers as high risk and then target inspection and testing resources to potential problem areas.
Steven McOrist, a veterinary expert on pigs at the University of Nottingham in England, said that tags on pigs could help monitor the early stages of disease but that other diagnostic tools including blood tests "are still needed" to clarify the actual problem and help determine the best solution.
"Ultimately, the holy grail of this exercise is if you can prevent an outbreak from happening," said Paul Chang, who leads global strategy for emerging technologies at IBM.
This version of this story was originally published in Computerworld's print edition. It was adapted from an article that appeared earlier on Computerworld.com.
Read more about Hardware in Computerworld's Hardware Topic Center.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- 4 Customers who never have to refresh their PCs again This paper illustrates a common theme: the combination of desktop virtualization and thin client computing helps organizations deliver an up-to-date user experience more...
- Mobile Devices: The New Thin Clients Get essential guidance for understanding the role thin clients plus virtual desktops play in the enterprise today.
- Taking Windows Mobile on Any Device Taking Windows applications mobile has many advantages, but the process of identifying a solution is complex. Learn how to solve this complex problem...
- PaaS - Powering a New Era of Business IT Why PaaS has suddenly become relevant and irresistible to many organizations. Dive into the opportunities and considerations associated with using PaaS from an...
- Redefine Your IT Operations: Remote Office IT Has Never Been Simpler Join us to see why PC Pro named Dell PowerEdge VRTX the "2013 Server of the Year." PowerEdge VRTX may be just what...
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well... All Hardware White Papers | Webcasts