Feeds

Arctic goes cold on Fusion Supporter

Gadget would have provided 'no end-user benefit', firm admits

Choosing a cloud hosting partner with confidence

Swiss cooler maker Arctic Cooling this week said it wouldn't offering its Fusion Supporter voltage peak suppressor after all. The product, hyped at CeBIT in March this year and later at Computex Taipei, actually delivers "no value" to end-users, and had "no market potential", the company admitted today.

Such an admission is bizarre enough, but Arctic also revealed that it had sold the as-yet-unreleased product to an unnamed "Asian customer" back in July. Presumably, said buyer feels there is some end-user benefit in the Fusion Supporter.

arctic cooling's ill-fated fusion supporter

According to Arctic, the Fusion Supporter used a bank of 91 capacitors used to absorb load peaks and make "continuous recharging possible". However, testing revealed that while the device operated as expected, the end result made little difference to the stability of computer systems it was connected to, Arctic said.

All of which, we'd have thought, Arctic could have learned before it presented the box at CeBIT and Computex. Ho hum... ®

Related review

FSP Booster X3 GPU-friendly power supply

Security for virtualized datacentres

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.