The Adventurous Meal

The Adventurous Meal

Saturday 31 October 2015

Food Safety standards at JIC


It is very important for any food industry to follow the food safety standards.

We at JIC follow stringent food safety standards and appropriate control measures have been taken at every step from procuring the raw material till food being served.  

We implemented Food safety management system where operational procedures and food safety procedures are described and implemented to maintain the high level standards of hygiene inside the food production area.

There are basically four potential hazards that are present in the food that coverts food into poison.
They are food Physical Hazard, Chemical Hazard, Microbiological Hazard and Allergens.
JIC adopted unique methods in eliminating the hazards which are already present in the raw food.

Procuring of Raw Materials:

A set procedure is followed in identifying the supplier, who has to fulfill all our requirements mentioned in the policy. When the supplier fulfills all the requirements he will be considered as our approved supplier. Then only the required raw material is procured from them.

Receipt of Raw Materials:

Once the material is received from the supplier Stores Incharge and the Supervisor will check for the quality, production date, expiry date of the product, specifications like brand name and product characteristics etc. HSET Team does a random check on the products for its temperature and product characteristics to ensure hazards are eliminated from the initial stages.








Cleaning and Prewashing:

Once the vegetables are received they are taken through prewash and sanitization process and then to storage. Thus JIC ensures that Physical, Chemical and Microbiological hazards are eliminated to the acceptable level.


Storing of Products:

Food is stored as per the storage requirements. The temperature maintained for different storage are as below.
Dry Store: 18*c to 22*c
Chiller      : +0*c to +5*c
Freezer    : -18*c to -22*c
Checklist is updated at frequently intervals to ensure the temperature is maintained throughout the day.

Thawing and Defrosting

Once the operations department places requisition for non-veg products, the stores department handovers the required quantity and the production department ensures the material received is kept for defrosting.

The temperature, batch number etc., are monitored and recorded regularly to ensure food safety standards are followed.

Pre cleaning or Preparation:

The raw products like rice dal etc., might carry the physical hazards like glass, stones etc., the hazard is completely eliminated through this process under strict supervision in order to ensure food safety.



  Cooking:

 Cooking is the process where the  microbiological hazards are eliminated  completely, JIC ensures adequate temperature of  70 degrees centigrade is reached while cooking  the food.





Production manager and supervisors are allotted to monitor and record the temperature using the probe thermometer.








Hot Holding:
Once the food is cooked dining Incharge ensures the food is picked up from the production on time and to store in food warmers and bain-maries inorder to ensure the temperature is maintained throughout the service.





HACCP committee monitors and update the food safety standards. HSET does regular inspections and conducts audits to ensure high level standards of hygiene is maintained throughout the organization.








Tuesday 27 October 2015

What is a computer virus

We all are familiar about the computer virus, heard about it time and again in our daily lives.
Though we heard about it do we really know what havoc it can create to our computers?  Well it is nothing but a computer program which replicates itself and attaches the copy to other programs in the computer. It causes damage in such a way that it corrupts the data in your computer and is carried forward as an attachment through email and spread the virus to other email addresses in our address book.

These virus spread through email attachments consisting of funny images, videos, etc. Virus can be infected through other sources like online downloads, visiting infected websites, connecting an infected drive, installing unprotected software etc.,

How do we determine that the computer is infected with virus?

-          When the computer runs very slow
-          Your contacts in your address book receives emails which you have not sent
-          Sudden pop ups of various web pages
-           Frequent computer crash

What can be done to protect our computer from these viruses?


-          Make sure to install antivirus and keep it up to date
-          Download software only from trusted sources
-          Keep the computer’s operating system up to date

Always take every care to protect the computer from the potential unknown virus.

Sunday 25 October 2015

Competency Mapping at JIC

At JIC we use competency mapping to identify the capabilities and talents of the personnel with specific job tasks as per our set standards. Their core skills and behavioral requirements to perform the role is analysed, basing on this analysis a job description is designed and resources are aligned to fulfill the competency requirements.

With the help of the competency map it is easy to identify the qualified people and assess their performance.

We follow these approaches to identify the competencies required for the job requirements.


Assessment

This approach helps the management to have an observation to evaluate the performance and potentials of personnel related to specified job requirements. They are asked to perform giving a certain scenario while a trained assessor observes their behavior. These kinds of situations are designed in advance so that their aptitude is assessed and the right person is chosen for the right job.

Interviews

Interview is an effective method to collect the required and relevant information of the prospective employee. Through this interview a firsthand insight of the candidate’s potentials and his behavior is known.

A set of targeted questions are prepared in advance to know the job experience and also to get some clues on the candidate’s outlook, disposition and general motivation.

The result can be compared against the competency map which was created for the job requirement to determine which candidate offers the best match for our organisation’s requirement.

Questionnaire


Our interview questionnaire is another approach for getting the required information about job competencies and work performance. Our various methods used in competency mapping include the common metric questionnaire that focuses on the work requirements and activities. The Functional job analysis describes job roles and description, job position analysis questionnaire that ties job characteristics to human characteristics. 

Interactive Training at JIC

JIC choose the path of excellence and had identified training as a basic tool for the development of its employees.

Our training department plays a major role in educating and developing the employees throughout their journey with JIC. The key control of Training Department is directly linked with the HSE Department (Health and Safety Department).

We integrated Training Department with HSE and named HSET Department (Health and Safety Training Department) where it is directly or indirectly linked with all other departments throughout the organization.

Identify some of the basic major elements which guides or acts as a path in developing the career of its employees through Competency Matrix. This Matrix clearly describes the necessary training to be provided at all levels of employees working within the Organization.

Based on the competency matrix, training department determines the basic training needs of an employee to perform the assigned task. A training calendar has been developed for the year ensuring all the basic topics related to ISO standards (FSMS, EMS and OHSAS) is updated and incorporated in the training calendar. 

A unique Strategy called “EDGE Methodology” is implemented in the training department which ensures the carrier growth of all the employees.

E - EXPLAIN:

Our employees have to undergo three stage induction training:  

a) Human Resource Department - Explains about our organization’s polices, accommodation,
    food,  salary details, Medical facilities, allowances, Insurance policy, Uniform, Dos and Don’ts  
    etc.…

b) HSET Department - Explains about the ISO Standards (FSMS, EMS, OHSAS), policies &      
     procedures implemented in our organization.

c) Operations - Explains about the nature of job to be performed and the procedure to be  
     followed to fulfill the individual task by assigning and setting objectives and targets.

D - Demonstrate:

After the induction the training plan is made by identifying the basic training requirement for employees to completely fulfill his or her task.

Different training tools are used for easy understanding, the below mentioned are some tools used:

1. Video presentation - Unique video presentations are made using our employees while they
     are performing the task.

      2. Pictorial presentation – the slides with maximum pictures for easy understanding are used.

3. Skits - Food safety and Health and safety related live skit sessions are performed.

4. PPT presentations - For the managers and supervisors.

5. Online presentations - Demonstrating the current updates.

6. On Job training: Demonstrating the nature of work more lively.

7. Knowledge Sharing Forums - senior employees share their knowledge to develop the career
    growth of employees.

8. Mock drills - conducting mock drills in various scenarios like Fire, gas Leakage, Chemical  
    Spill etc.…

G-Guide

After the rigorous training of an employee, he or she will be assigned a task under well experienced seniors in the organization, who acts as a guide while performing the given responsibilities.

During the period of guidance from the seniors, training department continuously monitors the performance of the employee through feedback from supervisors, managers and Quality control officers.

E-Empower

Once HSET (Health and Safety Training Department) and Operations Department ensures that the employee is full-fledged to perform the task, he or she will be given full empowerment to work alone without any assistance. Each employee is monitored on their performance by KPI (Key Performance Indicator) and promoted with appraisals.

Conclusion:

Our training department works hard every day trying to make training more engaging by itself to impart the knowledge to all JIC employees thus by creating a culture within the organization to safely perform the  task and reveal or make an employee to identify and develop the potential he or she possess.



Saturday 3 October 2015

Strategic category management


In present days the procurement professionals choose the category management as an effective way to utilize the available data in the market to get an incremental effect on the company sales.


Earlier, spending long hours to get the right outcome within the right timeline was the scenario for the procurement professionals and they would often stop at that point. All the contracts after the completion of the deal are handed over to supplier management team.

What is category management?

A Systematic approach which helps procurement to focus on their specific areas enabling to focus the time and conduct thorough in depth market survey to influence the procurement decisions on behalf of the company.


At JIC we follow the end to end process. Our key activity is to source the product and based on the requirement managing the contract and our relationship with the supplier, which resulted in being more focused on category management.



The negotiations done with the supplier are of mutual benefit. Appropriate training pertaining to the demand and supply requirements is given after getting engaged with the suppliers. This helps them to have a broader perspective of our requirements and supplying it within the timelines specified.


Developing these new competencies helps us and our customers to grow our skills set and broaden our horizons. Applying these competencies helps us to continue to deliver value to our clients in return.















Importance of customer feedback

Customers look for a dynamic and a memorable service, anticipating their needs and be able to resolve it. When the individual problems faced by our customers are addressed they appreciate the initiative and these actions which actually sour the relationship with the service provider will turn into a positive situation.



Understanding that customer feedback is one of the very important tool to identify the food safety and quality hazards in the food industry, we at JIC give utmost priority to our customer feedback on our services rendered to our clients.



We incorporated a very good practice, a regular review of customer complaints which helped to identify the potential food hazards. The customer complaints are reviewed on monthly basis and necessary action is taken to mitigate the complaints. These complaints are categorized into microbiological, chemical, physical, quality and allergens.


These complaints helped us to review the problem areas and work on mitigating the complaints. Being visible and transparent in our business by communicating to the customers about their expectations will build their rapport and trust. This is achieved through increasing the frequency of collecting customer feedback and being proactive in resolving the issues and relate the complaints back to hazard analysis. If we know where we go wrong, it would be easy to control the food safety compliance risks.


Gaining feedback is vital to protecting our reputation. Without this, we will never know who is unhappy with our service and be able to take the steps necessary to tackle areas of poor service and rebuild our relationship with those customers.

Tips for a safe online shopping

  Online shopping is a convenient activity provided few precautionary measures are taken to ensure that the information provided and the money is safe. If you are making an online payment through credit or debit card, you are bound to give the service provider the required details to authorize the payment from your account. Unfortunately the fraudsters get this information by making convincing-looking copies of genuine websites (known as ‘phishing’), through malware that captures users’ login data, by hacking sites to retrieve stored passwords etc., to be safe from these kind of frauds there are many ways.

Here are a few steps to protect yourself when making online purchases:

-          Make sure you buy from a real website:

It is important to check whether website is fake or is it infected domain to redirect the traffic. This information is vital for hackers to get the financial information of the buyer. Check the URL before you make any kind of transaction. To avoid this kind of unpleasant surprise, always purchase from well-known websites only.

-          Access secured websites that protect the information:

Do not make online purchases using credit card from a site where the SSL (Secure sockets layer) encryption is not installed. This can be known when the site URL starts with https:// (instead of http://).  A locked padlock icon appears in the status bar at the bottom of the web browser or next to the URL in the address bar. This appearance depends on the browser used.

-          Never save personal details:

Did you notice that every shopping site asks to create an account, so that you don’t have to fill in the details every time you make an online purchase through that site? For your safety do not save the details on that site as the chances of the site getting hacked is more. It would be an easy access to your details for the hackers. Instead use a password manager that includes automated Web Form Filling.


-         Install Protection:




It is mandatory to have a powerful, effective security solution installed either an Antivirus or a full security suite.

       












          
        
      Secure Internet Access

Do not get connected to unsecured Wi-Fi networks, use only Wi-Fi protected access. If your network is unsecured, it is an easy access for people within the range to know what you are doing.  




Online shopping is very convenient, when you follow the simple steps and be alert.






How to achieve financial goals?

  What is a financial goal?
Goals which revolves around our finances, are usually driven by our future financial needs. These goals should be set considering the facts that are specific and realistic. The goals should be based on short term, mid-term and long term. They help you determine to be efficient and successful.     
Here are a few steps to achieve the financial goals:
Take time to prioritize the spending:
Only two ways to free up the finances to use towards reaching the financial goals, either increase the income or decrease the expenses. One way to decrease the spending is to limit the expenses or purchase only when necessary.
Assess the spending habits:
Avoid unnecessary expenditure, think before you spend. The desire to go for branded and fancy items should be curbed, why go for a higher price when you get the desired item in the less price with the same quality. Buy the items if it required, if you are not sure whether to buy it or not, postpone the purchase of a week. If the requirement still demands they add it in the next month budget and purchase it
Understanding the Financial Situation
Identify the sources of income and financial obligations.
If every financial goal can’t be met, don’t abandon because it is not working. Retrace the steps to this point and reconsider the goals that are set. If necessary make a list and prioritize the goals. 

Thursday 1 October 2015

Importance of computer maintenance

Over a period of time, we might notice that our computer or laptop’s performance is slowing down. The computer or laptop is a precision instrument and needs to be maintained regularly for smooth running. Follow these simple steps to run your computer or laptop smoothly and efficiently.
Disk Cleanup
For a number of reasons including running out of space on your hard drive, you might want to reduc
e the number of files on your disk, or create more free space, if it can be done without harming any of the programs. Use Windows Disk Cleanup wizard to clear space on the hard disk drive.

Follow these instructions to run Disk Clean up:
Click Start and point to All Programs --> Accessories --> System Tools and then click on Disk Cleanup.

Disk Defragmenter

This action consolidates fragmented files and folders on the computer’s hard disk, so that each file occupies a single, contiguous space on the volume. Resulting in the system gaining access to the files and folders on the computer and save new files more efficiently. By consolidating the files and folders, Disk Defragmenter also consolidates the free space, making it less likely that new files with be fragmented.

Follow these instructions to run Disk Defragmenter:


Click Start and point to All Programs --> Accessories --> System Tools and then click on Disk Defragmenter.
Reduce items that Run on Startup
If it takes long time to start up a computer, the first thing to check is everything that starts when the power button is hit. To perform this, click on the “RUN” button and type “msconfig” in the box. Click on the “startup” button, you’ll see that other programs are running which you don’t require to start up with the computer.
Remove Programs which are no longer in use
While preventing every app on the computer from starting with windows, the other programs which is no longer needed should be reviewed and removed. Access the uninstaller tool from the control panel and use it to uninstall the programs which are no longer in use.
Working with Operating System:
There might be a corrupt system file or a virus that the antivirus software did not detect. When this occurs, the computer performance might deteriorate and become unusable. In such instances the hard disk should be reformatted or reinstall the Operating System.  System Restore action can be performed before attempting to reformat the hard drive. This system restore action is used to restore the previous state of the computer.

Follow these instructions to run System Restore Wizard...

Click Start, and then click Help and Support. Click Performance and Maintenance, click Using System Restore to undo changes, and then click Run the System Restore Wizard.
Happy System Maintenance !!!