AUSTRALIAN OFFICIAL JOURNAL of TRADE MARKS 31 May 2007

Total Page:16

File Type:pdf, Size:1020Kb

AUSTRALIAN OFFICIAL JOURNAL of TRADE MARKS 31 May 2007 Vol: 21 , No. 21 31 May 2007 AUSTRALIAN OFFICIAL JOURNAL OF TRADE MARKS Did you know a searchable version of this journal is now available online? It's FREE and EASY to SEARCH. Find it at http://pericles.ipaustralia.gov.au/ols/epublish/content/olsEpublications.jsp or using the "Online Journals" link on the IP Australia home page. The Australian Official Journal of Designs is part of the Official Journal issued by the Commissioner of Patents for the purposes of the Patents Act 1990, the Trade Marks Act 1995 and Designs Act 2003. This Page Left Intentionally Blank (ISSN 0819-1808) AUSTRALIAN OFFICIAL JOURNAL OF TRADE MARKS 31 May 2007 Contents General Information & Notices IR means "International Registration" Amendments and Changes Application/IRs Amended and Changes ...................... 7090 Registrations/Protected IRs Amended and Changed ................ 7091 Registrations Linked ............................... 7087 Applications for Extension of Time ...................... 7090 Applications/IRs Accepted for Registration/Protection .......... 6766 Applications/IRs Filed Nos 1174648 to 1176565 ............................. 6741 Applications/IRs Lapsed, Withdrawn and Refused Lapsed ...................................... 7100 Withdrawn..................................... 7100 Assignments, Transmittals and Transfers .................. 7100 Cancellations of Entries in Register ...................... 7102 Notices ........................................ 7089 Opposition Proceedings ............................. 7087 Removal/Cessation of Protection for Non-use Proceedings ....... 7102 Renewal of Registration/IR ............................ 7102 Trade Marks Registered/Protected ....................... 7088 Trade Marks Removed from the Register/IRs Expired ........... 7103 Trade Marks Restored to Register ....................... 7104 This Page Left Intentionally Blank For Information on the following please see our website: www.ipaustralia.gov.au or contact our Customer Service Network on 1300651010 Editorial enquiries Contact information Freedom of Information ACT Professional Standards Board Sales Requests for Information under Section 194 (c) Country Codes Trade Mark and Designs Hearing Sessions INID (Internationally agreed Numbers for the Indentification of Data) ‘INID’ NUMBERS in use on Australian Trade Mark Documents ‘INID’ is an acronym for Internationally agreed Numbers for the Identification of Data’ (200) Data Concerning the Application. (210) Serial Number of the application. (220) Data of filing the application. (300) Data relating to Priority under the Paris convention. (500) Various Information. (510) List of goods and/or services. (511) Nice Classification of goods and/or services. (540) Reproduction of the mark. (551) Indication of the effect that the mark is a collective mark or a certification mark. (554) Shape mark. (556) Sound mark. (557) Scent mark. (591) Colour mark. (700) Information Concerning Parties Concerned with the Application/Registration. (730) Name and address of the applicant or owner of the registration. (750) Address for service for correspondence. NOTE: Trade marks marked with an asterisk (*) or an IR number are international applications designating Australia Nil notices for this journal issue. This Page Left Intentionally Blank AUSTRALIAN OFFICIAL JOURNAL OF TRADE MARKS 31 May 2007 Proceedings Under The Trade Marks Act 1995 Applications/IRs Filed Nos 1174648 to 1176565 Representations of the trade marks comprised in the following list of applications/international registrations designating Australia may be inspected at the Trade Marks Office , Canberra and in the Trade Marks Sub-Offices at Sydney, Melbourne, Brisbane, Adelaide, Perth and Hobart. The date following the class is that on which the application was filed; in the case of convention applications the country of origin and the date claimed are in parentheses. 10000FT PTY LTD ACN/ARBN 111 160 179 and 1175015 Aesthetics Distribution Pty Ltd ACN/ARBN 118 Krawitz, Ian Cl. 9, 35, 38, 42. 166 457 see American Retro 1800RUBBISH see GBJ Holdings and GILL AFA Pty Ltd ACN/ARBN 067 084 333 Cl. 30. 1176349 GROUP and PHONEWORD MARKETING AFFINITY GROUP INTERNATIONAL PTY LIMITED 1176108 2 for 1 window tinting Cl. 17, 40. 1175415 ACN/ARBN 002 953 504 and AFFINITY REAL 2Vouch Pty Ltd ACN/ARBN 122 033 089 Cl. 35. 1175697 ESTATE PTY LIMITED ACN/ARBN 060 916 485 Cl. 37. 4Cabling Pty Ltd ACN/ARBN 123 035 889 Cl. 9. 1176169 AFFINITY REAL ESTATE PTY LIMITED ACN/ARBN 4D Trading Pty/Ltd ACN/ARBN 100 566 943 Cl. 25. 1175701 060 916 485 see AFFINITY GROUP @once Pty.Ltd. ACN/ARBN 120 571 315 Cl. 38. 1176064 INTERNATIONAL PTY LIMITED ACN/ARBN 002 @once Pty.Ltd. ACN/ARBN 120 571 315 Cl. 42. 1176066 953 504 A & D Mercury Pty Ltd ACN/ARBN 007 556 809 Cl. 1175637 Affymax, Inc. a Delaware corporation (US, 10 Nov 1175104 9. 2006) Cl. 5. A & D Mercury Pty Ltd ACN/ARBN 007 556 809 Cl. 1175638 Agigi Design Pty Ltd as Trustee for the Agigi 1175704 9. Design Trust Cl. 3, 8, 21, 26, 44. A Silent Partner Studio Pty Ltd ACN/ARBN 113 1176400 AGoston Avend Pty Ltd ACN/ARBN 007 453 410 1176372 349 867 Cl. 42. Cl. 30. A.N.E. HOLDINGS PTY LTD ACN/ARBN 108 262 1175900 Ainokitchen (Malaysia) SDN. BHD. Cl. 20. 1174818 077 Cl. 29, 30, 31, 39, 43. Ainsworth Game Technology Cl. 9, 28. 1175720 A.N.E. HOLDINGS PTY LTD ACN/ARBN 108 262 1175901 Ainsworth Game Technology Cl. 9, 28. 1175736 077 Cl. 29, 30, 31, 39, 43. Ainsworth Game Technology Cl. 9, 28. 1175739 AASI Investments Pty Ltd ACN/ARBN 110 597 601 1175073 Ainsworth Game Technology Cl. 9, 28. 1175734 Cl. 35, 36. Al Kafajy, Anne see El Helou, Juliette and Hair AASI Investments Pty Ltd ACN/ARBN 110 597 601 1175075 and Body Pty Ltd ACN/ARBN 078 731 969 Cl. 35, 36. Albany, Tim Cl. 37. 1175048 AASI Investments Pty Ltd ACN/ARBN 110 597 601 1175076 Cl. 35, 36. Alcon, Inc. Cl. 5. 1176253 ABB Grain Ltd ACN/ARBN 084 962 130 Cl. 1, 31, 1176364 Aldemar AG Cl. 4, 7, 9, 11, 35, 36, 37, 39, 40, 41, 1175512 35, 36, 39. 42. (IR 919609) Abdelmalek, Emad Mzlad see McIntyre, Robert Alderson, Michelle Cl. 44. 1175818 Gordon ALDI Foods Pty Ltd ACN/ARBN 086 210 139 Cl. 30. 1176539 ABLATION FRONTIERS, INC. a Delaware 1175967 ALEXANDER MARINE CO LTD Cl. 12. 1175131 corporation (US, 10 Nov 2006) Cl. 10. ALEXANDER MARINE CO LTD Cl. 12. 1175133 ABLATION FRONTIERS, INC. a Delaware 1175968 ALEXANDER MARINE CO LTD Cl. 12. 1175132 corporation (US, 10 Nov 2006) Cl. 10. ALEXANDER MARINE CO LTD Cl. 12. 1175134 Accentus plc (EM, 21 Nov 2006) Cl. 5, 10, 40, 42. 1175401 Alexander, Michael Clarence and Alexander, 1175264 ACEITES ABRIL, S.A. Cl. 29. (IR 919722) 1175535 Noela Maree Cl. 41. ACN 123 157 399 Pty Ltd ACN/ARBN 123 157 399 1176230 Alexander, Noela Maree see Alexander, Michael Cl. 9, 16, 36. Clarence Adair, Renee Cl. 3, 24, 41. 1175053 Alexandria Real Estate Equities, Inc. a Maryland 1175768 Adcock, Jennifer Cl. 41. 1175399 corporation Cl. 35, 36, 37. Adixen Sensistor AB (SE, 25 Sep 2006) Cl. 9. (IR 1175505 Alexandria Real Estate Equities, Inc. a Maryland 1175777 919573) corporation Cl. 35, 36, 37. Adobe Systems Incorporated a Delaware 1176022 Alistair, Cook Cl. 32. 1176196 corporation (US, 22 Dec 2006) Cl. 9. Allco IP Pty Limited ACN/ARBN 122 624 211 Cl. 1175189 Advanced Medical Optics, Inc. a Delaware 1174800 35, 36. corporation Cl. 41. Allco IP Pty Ltd ACN/ARBN 122 624 211 Cl. 35, 36. 1175195 Advanced Medical Optics, Inc. a Delaware 1175101 Allergan, Inc. a Delaware corporation Cl. 5, 10. 1175309 corporation Cl. 5. Allergan, Inc. a Delaware corporation Cl. 5, 10. 1175311 ADVANTAGE PHARMACY PTY LTD ACN/ARBN 1174971 092 158 275 Cl. 3, 5, 35, 44. Allergan, Inc. a Delaware corporation Cl. 5, 10. 1175310 ADVANTAGE PHARMACY PTY LTD ACN/ARBN 1174972 Allergan, Inc. a Delaware corporation Cl. 5, 10. 1175312 092 158 275 Cl. 3, 5, 35, 44. Allfire Enterprises Pty Ltd ACN/ARBN 097 970 280 1175880 Cl. 1, 5. - 6741 - AUSTRALIAN OFFICIAL JOURNAL OF TRADE MARKS 31 May 2007 Alliance Capital Management Pty Ltd Cl. 36. 1175786 Aqi Care Pty Ltd Cl. 28. 1176298 Alllgove International Pty Ltd Cl. 25. 1175001 ARCOS Die Haarprofis Handels GmbH Cl. 26. (IR 1175570 Allport, Suzanne see Thompson, Lynette Betty 893005) Allwright, Simonne Cl. 41. 1174751 Arista Electronics Pty Ltd Cl. 7, 9, 11. 1175209 ALMONDY HOLDING AB Cl. 30. (IR 824930) 1175564 Aristocrat Technologies Australia Pty Ltd 1175380 ACN/ARBN 001 660 715 Cl. 28. Alphapharm Pty Limited ACN/ARBN 002 359 739 1176394 Cl. 5. Aristocrat Technologies Australia Pty Ltd 1176347 ACN/ARBN 001 660 715 Cl. 28. Alphapharm Pty Limited ACN/ARBN 002 359 739 1176397 Cl. 5. Aristocrat Technologies Australia Pty Ltd 1176419 ACN/ARBN 001 660 715 Cl. 28. Alphapharm Pty Limited ACN/ARBN 002 359 739 1176395 Cl. 5. Aristocrat Technologies Australia Pty Ltd 1176430 ACN/ARBN 001 660 715 Cl. 28. Alstom Technology Ltd. Cl. 35, 36, 37, 41, 42. 1176432 Aristocrat Technologies Australia Pty Ltd 1176404 Altro Limited (GB, 19 Sep 2006) Cl. 27. (IR 919283) 1175447 ACN/ARBN 001 660 715 Cl. 28. Amazon Technologies, Inc. (US, 13 Nov 2006) Cl. 1175052 Aristocrat Technologies Australia Pty Ltd 1176341 41. ACN/ARBN 001 660 715 Cl. 28. Amazon Technologies, Inc. (US, 17 Nov 2006) Cl. 1175064 Arla Foods amba Cl. 1, 5, 29, 30, 31, 32. (IR 1175557 35, 42. 731917) Amazon Technologies, Inc. (US, 17 Nov 2006) Cl. 1175631 ARMGO Pharma, Inc. (US, 22 Nov 2006) Cl. 5, 41. 1176248 35, 42. Arnott's Biscuits Limited ACN/ARBN 008 435 729 1175645 Amcor Limited ACN/ARBN 000 017 372 Cl. 16. 1176193 Cl. 30. American Retro and Aesthetics Distribution Pty 1175404 Artese, Adelchi Remo Cl. 43. 1176206 Ltd ACN/ARBN 118 166 457 Cl. 25. Asics Corporation Cl. 25. 1175764 Amgen Inc. A Delaware corporation Cl. 5. 1175306 ASPERMONT LIMITED Cl. 16, 41. 1175756 AMPLEX INDUSTRIES and Nuthall,APand 1175608 Nuthall, R G Cl. 9. ASPERMONT LIMITED Cl. 16, 41. 1175769 AMPLEX INDUSTRIES and Nuthall,APand 1175905 ASPERMONT LIMITED Cl.
Recommended publications
  • SSL/TLS Interception Proxies and Transitive Trust Jeff Jarmoc Dell Secureworks Counter Threat Unit℠ Threat Intelligence
    SSL/TLS Interception Proxies and Transitive Trust Jeff Jarmoc Dell SecureWorks Counter Threat Unit℠ Threat Intelligence Presented at Black Hat Europe – March 14, 2012. Introduction Secure Sockets Layer (SSL) [1] and its successor Transport Layer Security (TLS) [2] have become key components of the modern Internet. The privacy, integrity, and authenticity [3] [4] provided by these protocols are critical to allowing sensitive communications to occur. Without these systems, e- commerce, online banking, and business-to-business exchange of information would likely be far less frequent. Threat actors have also recognized the benefits of transport security, and they are increasingly turning to SSL to hide their activities. Advanced Persistent Threat (APT) attackers [5], botnets [6], and even commodity web attacks can leverage SSL encryption to evade detection. To counter these tactics, organizations are increasingly deploying security controls that intercept end- to-end encrypted channels. Web proxies, data loss prevention (DLP) systems, specialized threat detection solutions, and network intrusion prevention systems (NIPS) offer functionality to intercept, inspect, and filter encrypted traffic. Similar functionality is present in lawful intercept systems and solutions enabling the broad surveillance of encrypted communications by governments. Broadly classified as “SSL/TLS interception proxies,” these solutions act as a “man in the middle,” violating the end-to-end security promises of SSL. This type of interception comes at a cost. Intercepting SSL-encrypted connections sacrifices a degree of privacy and integrity for the benefit of content inspection, often at the risk of authenticity and endpoint validation. Implementers and designers of SSL interception proxies should consider these risks and understand how their systems operate in unusual circumstances.
    [Show full text]
  • Journ. of Intell Prop 7- October, 2013.Pmd
    133 Journal of Intellectual Property. Companies and Intellectual Property Office Dominica VOL. 4 ROSEAU, THURSDAY, OCTOBER 10, 2013 NO. 7 Applications for Trademark Registration ANSA MCAL CHEMICALS LIMITED, a limited liability ANSA MCAL CHEMICALS LIMITED, a limited liability company organized and existing under the laws of company organized and existing under the laws of TRINIDAD AND TOBAGO of NORTH SEA DRIVE, POINT LISAS IN- TRINIDAD AND TOBAGO of NORTH SEA DRIVE, POINT LISAS IN- DUSTRIAL ESTATE, SAVONETTA, TRINIDAD AND TOBAGO has ap- DUSTRIAL ESTATE, SAVONETTA, TRINIDAD AND TOBAGO has ap- plied through their agent, DE FREITAS, DE FREITAS & plied through their agent, DE FREITAS, DE FREITAS & JOHNSON of CHAMBER, 14 CORK STREET, ROSEAU to the JOHNSON of CHAMBER, 14 CORK STREET, ROSEAU to the Companies and Intellectual Property Office for the regis- Companies and Intellectual Property Office for the regis- tration of one trade mark consisting of the following word tration of one trade mark consisting of the following word th and device, based on an application received on the 08th and device, based on an application received on the 08 day of January, 2013. day of January, 2013. in Class 3 that is to say: Bleaching preparations and other substances for laundry use; cleaning, polishing, scouring and abrasive (cleaning) preparations; soaps; perfumery, in Class 3 that is to say: Bleaching preparations and other essential oils, cosmetics, hair lotions; dentifrices. substances for laundry use; cleaning, polishing, scouring and abrasive (cleaning) preparations; soaps; perfumery, No claim is made to the words “Bleach”, “Cloro” and essential oils, cosmetics, hair lotions; dentifrices. “Liquido’.
    [Show full text]
  • HP Laserjet Pro Devices – Installing 2048 Bit SSL Certificates
    Technical white paper HP LaserJet Pro Devices – Installing 2048 bit SSL certificates Table of Contents Disclaimer 2 Introduction 2 Generating a Certificate Signing Request 2 The normal process 2 HP LaserJet Pro devices that support generating a 2048 bit certificate request 4 When the printer cannot generate a Certificate Request for 2048 bit certificates 5 Method 1 – Software supplied by the CA 5 Method 2 – OpenSSL 10 Obtaining a certificate from the CA 12 Installing the Certificate into the Printer 14 Converting the Certificate to the Personal Information Exchange (.PFX) format 15 Method 1 – Software supplied by the CA 15 Method 2 - OpenSSL 20 Installing the new certificate 21 Applicable Products 25 For more information 26 Call to action 26 Disclaimer This document makes reference to certain products and/or services provided by third parties. These references are provided for example and demonstration purposes only and are not intended as an endorsement of any products, services, or companies. Introduction A recent publication of the National Institute of Standards and Technology (NIST Special Publication 800-131A) announced that the use of 1024 bit SSL/TLS certificates is no longer recommended and will be “disallowed” after December 31, 2013. The publication recommends the use of 2048 bit certificates to maintain network security and integrity. As a result, most Certificate Authorities (CAs) will no longer issue 1024 bit certificates. And, most Web browsers will no longer honor such certificates as safe and secure. In order to avoid error messages and the risk of a security breach, systems and devices that rely on the SSL/TLS protocols will need to have 2048 bit Certificates installed.
    [Show full text]
  • Threat Landscape Report – 1St Quarter 2018
    TLP-AMBER Threat Landscape Report – 1st Quarter 2018 (FINAL) V1.0 – 10/04/2018 This quarterly report summarises the most significant direct cyber threats to EU institutions, bodies, and agencies (EU-I or 'Constituents') in Part I, the development of cyber-threats on a broader scale in Part II, and recent technical trends in Part III. KEY FINDINGS Direct Threats • In Europe, APT28 / Sofacy threat actor (likely affiliated to Russia military intelligence GRU) targeted government institutions related to foreign affairs and attendees of a military conference. Another threat actor, Turla (likely affiliated to Russia’s security service FSB) executed a cyber-operation against foreign affairs entities in a European country. • A spear-phishing campaign that targeted European foreign ministries in the end of 2017 was attributed to a China-based threat actor (Ke3chang) which has a long track record of targeting EU institutions (since 2011). As regards cyber-criminality against EU institutions, attempts to deliver banking trojans are stable, ransomware activities are still in decline and cryptojacking on the rise. Phishing lures involve generic matters (’invoice’, ‘payment’, ‘purchase’, ‘wire transfer’, ‘personal banking’, ‘job application’) and more specific ones (foreign affairs issues, European think tanks matters, energy contracts, EU delegation, EU watch keeper). Almost all EU-I are affected by credential leaks (email address | password) on pastebin-like websites. Several credential- harvesting attempts have also been detected. Attackers keep attempting to lure EU-I staff by employing custom methods such as spoofed EU-I email addresses or weaponisation of EU-I documents. Broader Threats • Critical infrastructure. In the energy sector, the US authorities have accused Russian actors of targeting critical infrastructure (including nuclear) for several years and are expecting this to continue in 2018.
    [Show full text]
  • Journal-Notice-July
    Vol. 16 - No. 15 Belmopan, July 29, 2016 1 INTELLECTUAL PROPERTY JOURNAL BELIZE INTELLECTUAL PROPERTYO OFFICE BEL P Vol. 16 - No. 15 Belmopan, July 29, 2016 2 BELIPO’S MISSION STATEMENT “To build a modern intellectual property system that values and protects the vibrant creative culture of Belize” Vol. 16 - No. 15 Belmopan, July 29, 2016 3 CONTENTS Page Numbers TRADEMARKS: APPLICATIONS FOR TRADEMARK REGISTRATION ………………….………………………………………………… 4 - 70 NOTICES OF TRADEMARK RENEWAL ………………………………….……………………………………………….... 71 - 94 NOTICES OF ASSIGNMENT……………………………………………………………………………………………….… 95 - 97 NOTICES OF CHANGE OF ADDRESS OF PROPRIETOR………………………………………………………………….. 98 - 99 NOTICES OF CHANGE OF NAME OF PROPRIETOR………………………………………………………………………. 100 NOTICES OF RECORDAL OF AGENT AND ADDRESS FOR SERVICE………………………………………………….. 101-107 NOTICES OF PUBLICATION CORRECTION……………………………………………………………………………….. 108 NOTICES OF TRADEMARK REGISTRATIONS………………………………………………………………….….….… .. 109-111 PATENTS: NOTICES OF PATENT GRANT……………………………………………………………………………………………… 112 NOTE: CFE - International Classification of the Figurative Elements of Marks under the Vienna Agreement (Sixth Edition) __________ …________ Vol. 16 - No. 15 Belmopan, July 29, 2016 4 APPLICATIONS FOR TRADEMARK REGISTRATION (3rd issue) WHEREAS, the Registrar is in receipt of an application filed on the 22nd day of April, 2015, by Whirlpool Properties, Inc., of 500 Renaissance Drive, Suite 101, Saint Joseph, Michigan, USA 49085, through its agent Glenn D. Godfrey & Company LLP, Attorneys-at- Law, of No. 35 Barrack
    [Show full text]
  • Cyber Security in a Volatile World
    Research Volume Five Global Commission on Internet Governance Cyber Security in a Volatile World Research Volume Five Global Commission on Internet Governance Cyber Security in a Volatile World Published by the Centre for International Governance Innovation and the Royal Institute of International Affairs The copyright in respect of each chapter is noted at the beginning of each chapter. The opinions expressed in this publication are those of the authors and do not necessarily reflect the views of the Centre for International Governance Innovation or its Board of Directors. This work was carried out with the aid of a grant from the International Development Research Centre (IDRC), Ottawa, Canada. The views expressed herein do not necessarily represent those of IDRC or its Board of Governors. This work is licensed under a Creative Commons Attribution — Non-commercial — No Derivatives License. To view this licence, visit (www.creativecommons.org/licenses/ by-nc-nd/3.0/). For re-use or distribution, please include this copyright notice. Centre for International Governance Innovation, CIGI and the CIGI globe are registered trademarks. 67 Erb Street West 10 St James’s Square Waterloo, Ontario N2L 6C2 London, England SW1Y 4LE Canada United Kingdom tel +1 519 885 2444 fax +1 519 885 5450 tel +44 (0)20 7957 5700 fax +44 (0)20 7957 5710 www.cigionline.org www.chathamhouse.org TABLE OF CONTENTS About the Global Commission on Internet Governance . .iv . Preface . v Carl Bildt Introduction: Security as a Precursor to Internet Freedom and Commerce . .1 . Laura DeNardis Chapter One: Global Cyberspace Is Safer than You Think: Real Trends in Cybercrime .
    [Show full text]
  • Carbonated Dairy Beverages: Challenges and Opportunities
    beverages Review Carbonated Dairy Beverages: Challenges and Opportunities Daniel Newbold and Kadri Koppel * Center for Sensory Analysis and Consumer Behavior, Kansas State University, 1310 Research Park Dr, Manhattan, KS 66502, USA; [email protected] * Correspondence: [email protected]; Tel.: +1-785-532-0163 Received: 25 July 2018; Accepted: 28 August 2018; Published: 2 September 2018 Abstract: Yogurt drinks have seen a 66% increase in consumption in the United States over the last five years. Even though there has been an increase in yogurt drink consumption, the market share of drinkable dairy beverages remains small. Carbonated dairy beverages have become increasingly popular in recent years, and innovations in this area could help drive increased consumption of these beverages. Currently traditionally carbonated dairy beverages, like kefir, are the most popular carbonated dairy beverages on the market. Carbonation at appropriate levels in dairy products, especially dairy beverages, has been shown to improve the sensory attributes, quality, and shelf life of these products. Probiotics, which are added to yogurt drinks for their health benefits, are not harmed or negatively affected by carbonation. Several methods have been developed to carbonate dairy beverages in a manufacturing setting, although these methods have not been widely applied to commercially available products. The increased consumption of dairy beverages and the benefits of carbonation upon these beverages means that there are opportunities to develop widely accepted and popular carbonated dairy beverages. The objective of this article was to review available literature on carbonated dairy beverages and to discuss the challenges and opportunities in this area. Keywords: Carbonation; dairy; drinkable yogurt; carbonated yogurt; carbonated beverage 1.
    [Show full text]
  • Culture-Independent Bacterial Community Profiling of Carbon Dioxide Treated Raw Milk
    ÔØ ÅÒÙ×Ö ÔØ Culture-independent bacterial community profiling of carbon dioxide treated raw milk Raquel Lo, Mark S. Turner, Mike Weeks, Nidhi Bansal PII: S0168-1605(16)30308-7 DOI: doi: 10.1016/j.ijfoodmicro.2016.06.015 Reference: FOOD 7262 To appear in: International Journal of Food Microbiology Received date: 1 March 2016 Revised date: 30 May 2016 Accepted date: 14 June 2016 Please cite this article as: Lo, Raquel, Turner, Mark S., Weeks, Mike, Bansal, Nidhi, Culture-independent bacterial community profiling of carbon dioxide treated raw milk, International Journal of Food Microbiology (2016), doi: 10.1016/j.ijfoodmicro.2016.06.015 This is a PDF file of an unedited manuscript that has been accepted for publication. As a service to our customers we are providing this early version of the manuscript. The manuscript will undergo copyediting, typesetting, and review of the resulting proof before it is published in its final form. Please note that during the production process errors may be discovered which could affect the content, and all legal disclaimers that apply to the journal pertain. ACCEPTED MANUSCRIPT Culture-independent bacterial community profiling of carbon dioxide treated raw milk Raquel Lo a, Mark S. Turner a,c, Mike Weeksb, Nidhi Bansal a,* a School of Agriculture and Food Sciences, The University of Queensland, St Lucia, QLD 4072, Australia b Dairy Innovation Australia, Werribee, VIC 3030, Australia c Queensland Alliance for Agriculture and Food Innovation, The University of Queensland, St Lucia, QLD 4072, Australia *Corresponding author. Tel.: +61 7 33651673. E-mail address: [email protected] (N.
    [Show full text]
  • Computer Security EITA25 Department of Electrical and Information Technology Lund University March 12, 2018, 8-13
    Final exam in Computer Security EITA25 Department of Electrical and Information Technology Lund University March 12, 2018, 8-13 • You may answer in either Swedish or English. • If any data is lacking, make (and state) reasonable assumptions. • Use legible hand writing. If your answers cannot be read, you will receive zero points on that problem. • Only pencil and eraser is allowed. • Grading is done as follows. Grade 3 = 20{29 points, Grade 4 = 30{39 points, Grade 5 = 40{50 points. Problem 1. Consider the following permissions on a file in Windows. Determine for each case if Alice, who is member of group Students, can read the file or not. a) User Alice has file permission "write", group Students has file permission "read + write". b) User Alice has file permission "read", group Students is denied permission "read". c) Parent folder has share permission "read" for everyone and file has file permission "write" for Alice. Alice accesses the file over the network. Answer a) Yes b) No c) No (1+1+1 points) Problem 2. Stream ciphers require IVs for practical use. What is an IV and how does it improve the security of stream ciphers? Answer It is a public initialization vector that is unique for each keystream generated under a given key. It is used to make sure that two different plaintexts, p1 and p2, are always encrypted using different keystreams. Adding two ciphertext bits, c1 and c2, encrypted with the same keystream bit, will leak information about the corresponding plaintext bits. i i i i i i i i c1 ⊕ c2 = k1 ⊕ k2 ⊕ p1 ⊕ p2 = p1 ⊕ p2 (3 points) Problem 3.
    [Show full text]
  • 全文本) Acceptance for Registration (Full Version)
    公報編號 Journal No.: 395 公布日期 Publication Date: 29-10-2010 分項名稱 Section Name: 接納註冊 (全文本) Acceptance for Registration (Full Version) 香港特別行政區政府知識產權署商標註冊處 Trade Marks Registry, Intellectual Property Department The Government of the Hong Kong Special Administrative Region 接納註冊 (全文本) 商標註冊處處長已根據《商標條例》(第 559 章)第 42 條,接納下列商標的註冊申請。現根據《商標條 例》第 43 條及《商標規則》(第 559 章附屬法例)第 15 條,公布申請的詳情。 根據《商標條例》第 44 條及《商標規則》第 16 條,任何人擬就下列商標的註冊提出反對,須在本公告 公布日期起計的三個月內,採用表格第 T6 號提交反對通知。(例如,若果公布日期爲 2003 年 4 月 4 日,則該三個月的最後一日爲 2003 年 7 月 3 日。)反對通知須載有反對理由的陳述及《商標規則》第 16(2)條所提述的事宜。反對人須在提交反對通知的同時,將該通知的副本送交有關申請人。 有關商標註冊處處長根據商標條例(第 43 章)第 13 條/商標條例(第 559 章)附表 5 第 10 條所接納的註冊申 請,請到 http://www.gld.gov.hk/cgi-bin/gld/egazette/index.cgi?lang=c&agree=0 檢視電子憲報。 ACCEPTANCE FOR REGISTRATION (FULL VERSION) The Registrar of Trade Marks has accepted the following trade marks for registration under section 42 of the Trade Marks Ordinance (Cap. 559). Under section 43 of the Trade Marks Ordinance and rule 15 of the Trade Marks Rules (Cap. 559 sub. leg.), the particulars of the applications are published. Under section 44 of the Trade Marks Ordinance and rule 16 of the Trade Marks Rules, any person who wishes to oppose the registration of any of these marks shall, within the 3-month period beginning on the date of this publication, file a notice of opposition on Form T6. (For example, if the publication date is 4 April 2003, the last day of the 3-month period is 3 July 2003.) The notice of opposition shall include a statement of the grounds of opposition and the matters referred to in rule 16(2).
    [Show full text]
  • Carbonation and Its Interaction with Other Sensory Modalities
    AN ABSTRACT OF THE THESIS OF Niann-Jou Newton. Yau 'for the degree of Doctor of Philosophy in Food Science and Technology presentedon August 27. 1991. Title: Carbonation and Its Interaction with Other Sensory Modalities Signature redacted for privacy. Abstract approved: rof. Mina R. McDaniel The study of carbonation perception is limited, even though carbonated beverages are very popular. A series of experiments were conducted to determine the sensory properties of carbonation itself and its interaction with other sensory modalities. First, the power functions of carbonation in carbonated spring water were developed by a trained panel using two assessing conditions, swallowing and expectoration. Five carbonation levels, 1.2 2.0. 2.5, 3.0, and 3.9 volumes CO2, were employed. The size of the exponents, 2.79 (swallowing) and 2.65 (expectoration), suggested a sharp increase of perceived carbonation magnitude with increasing concentration. There was no significant difference between exponents resulting from the two assessing conditions. Second, the effects of temperature on carbonation perception in carbonated spring water were determined by use of both a trained panel and a naive panel. Two carbonation levels, 2.4 and 3.0 volumes, and four temperature levels, 30, 10°, 160 and 220C, were employed. Carbonation intensity was perceived to be higher at lower temperatures than at higher temperatures. This effect held true for both trained and naive panels. The temperature effect on carbonation perception, however, was carbonation level dependent. Differences were more evident at the higher carbonation level. Thirdly, the mutual effects of carbonation and tastants (sweetener and acidulant) were determined by a trained panel.
    [Show full text]
  • Security in the Banking & Financial Solutions Sector
    WHITEPAPER 2021 SECURITYSECURITY IN INTHE THE BANKING BANKING & FINANCIAL& FINANCIAL SOLUTIONSSOLUTIONS SECTOR SECTOR WHITEWHITE PAPER PAPER | 2020 | 2020 Table of Contents 1. Executive Summary 3 2. Latest Security Threats in BFSI 5 2.1 Moving to Cloud and Cloud-Based tools 6 2.2 Cryptographic leaks 7 2.3 Exploiting Application Vulnerabilities 7 2.4 Spoofing 8 2.5 ATM Hacks 8 2.6 Phishing and Social Engineering 9 2.7 Work from Home 10 2.8 The Internet of Things (IoT) 10 3. Mitigating Security Threats and Recommendations 11 3.1 Cryptography and Key Management 13 3.2 Identity and Access Management 18 3.3 ATM, IoT and Mobile Application Security 20 3.4 Vulnerability Management 23 3.5 Securing Remote Working and Cloud Platforms 25 3.6 Phishing Attacks Prevention 25 3.7 Containment and Recovery 27 4. Summary 28 4.1 Comments from the Industry 29 5. Positioning 33 Contact 35 Security in the Banking & Financial Solutions Sector 2 1. Executive Summary Real and potential Risks There are increasing risks and technological challenges to data and transaction security in the Banking Financial Services and Insurance industries (BFSI). This paper will examine the types of real and potential attacks being confronted, and the various technologies available for implementation to avoid data breaches, corruption, and theft. While the analyses include the classical and known risks to data and financial transactions, they also look at the exposures evolving in traditional data security, quantum computing, and the trend toward working from home and bringing your own device (BYOD) to enterprise architectures.
    [Show full text]