Feeds

Fujitsu enables the magneto-optical cardiologist

Strange venue for disk-drive launch

  • alert
  • submit to reddit

Internet Security Threat Report 2014

Fujitsu Computer Products of America, Inc. has chosen a rather unusual platform from which to tout its new range of Magneto-Optical (MO) removable drives - the American College of Cardiology's 54th Annual Scientific Session 2005, currently taking place in Orlando, Florida.

Of course, there's a solid reason why Fujitsu is pitching at sawbones, as the blurb explains:

At ACC Fujitsu will showcase the DynaMO® 1300 Pocket drive with DICOM® Viewer. This solution bundles an ultraportable, USB 2.0 bus- powered DynaMO 1300 Pocket drive with DICOM image viewing software, allowing cardiology practitioners to easily transport DICOM images on MO disks from ultrasound systems to notebook PCs and workstations for convenient offline review.

Fujitsu representatives will also demonstrate the robust data storage and transfer capabilities of the DynaMO 2300U2 drive. Ideal for backup and archival of medical records, the DynaMO 2300U2 offers 2.3GB of removable storage capacity and stores data on durable, 3.5-inch MO disks. Increasingly, certain government, state and local regulations require safe, long-term archival of medical records.

Pacemaker and MO diskFair enough, although Fujitsu may not have taken into account surgeons' legendary enthusiasm for a quick round of golf followed by a hearty lunch before deploying the scalpel. Our picture of a pacemaker and removable MO disk demonstrates the possible danger here. We can well imagine the post-op conversation between blood-spattered doc and tearful patient's wife:

Surgeon: Well, Mrs Henderson, I'm afraid the operation didn't quite go according to plan. I have some bad news, but also some good news.
Mrs Henderson: Good God, doctor, tell me the bad news.
Surgeon: Your husband is dead.
Mrs Henderson: And the good news?
Surgeon: He's now fitted with 2.3GB of robust data storage. It's the way he would have wanted it. ®

Related stories

Optical storage: destined for oblivion?
NASA field tests ISS robosurgeon
Surgeon on train saves woman - by email

Beginner's guide to SSL certificates

More from The Register

next story
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
Turnbull should spare us all airline-magazine-grade cloud hype
Box-hugger is not a dirty word, Minister. Box-huggers make the cloud WORK
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
Do you spend ages wasting time because of a bulging rack?
No more cloud-latency tea breaks for you, users! Get a load of THIS
prev story

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Internet Security Threat Report 2014
An overview and analysis of the year in global threat activity: identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.