Feeds

Sony pumps cash into gene-wrangling joint venture

Electronics outfit thinks the future is wetware and wants in before the rush

High performance access to file storage

PlayStation purveyor Sony wants to be remembered for more than overpriced electronics and massive data breaches, having just launched a joint venture in the field of genome research.

The electronics giant has teamed up with medical firm M3, in which Sony is already the majority investor, and US biz Illumina, which makes genome-sequencing gear.

The new venture, named P5, will build a “genome information platform” business to sell genome analysis services to research institutions and enterprises in Japan, according to Sony.

It’s also interested in combining genome data with other medical data to support advancements in personalised healthcare, a field imagined to one day offer medical treatments optimised for individuals.

“We aim to facilitate genome research that further advances Japanese medical care, and in the future establish a new service platform for the medical industry," said Tadashi Saito, head of Sony’s medical biz, in a canned statement.

M3 director Itaru Tanimaru was even bolder, claiming that gene diagnosis and treatment could have a greater impact on lives than the internet.

“The current status of the human genome industry is comparable to the internet in the early 1990's, when companies such as Google, Amazon and Facebook had yet to emerge,” he added.

“Going forward, I expect companies and services of this magnitude to also appear in this industry. This three party alliance combines each company's unique strengths and resources, and together we intend to build a service platform that could not have been realised by others.”

Sony CEO Kazuo Hirai has already shown he intends to make the firm’s medical business a major part of its future.

Back in 2012 it invested ¥50bn ($642m) to take a ten per cent stake in ailing digital camera company Olympus, with which it plans to develop new medical equipment. ®

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Nokia offers 'voluntary retirement' to 6,000+ Indian employees
India's 'predictability and stability' cited as mobe-maker's tax payment deadline nears
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
Adrian Mole author Sue Townsend dies at 68
RIP Blighty's best-selling author of the 1980s
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Analysts: Bright future for smartphones, tablets, wearables
There's plenty of good money to be made if you stay out of the PC market
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.