AI In Medicine

Artificial Intelligence, also known as AI, is as ubiquitous as the air we breathe. We trust AI to suggest movies to us, to correct spelling errors in our email or Slack messages, and to help guide us home through GPS.   In other words, we have come to place unequivocal trust in AI.   And…

dicom-a-thon

Our First Ever DICOM-a-thon!

The Connecticut based biotech company, DICOM Director, is hosting a DICOM-a-thon from October 17th to October 24th. During this event, participants learn how to convert a CT scan into a 3D anatomy model using DICOM Director’s Intravision technology. The model is then viewed on a laptop or AR/VR headset.   The main target audience for this event is medical students in their 2nd or 3rd year of study.…

This reality is closer than you think.

More Use Cases for AR

We’re strong believers in Augmented Reality, or AR for short. The software we offer at DICOM Director, like Intravision XR, is infused with this technology because we’ve observed how it improves patient outcomes. Intravision XR allows doctors to view anatomical structures in complete detail. This detail includes the spatial relationships between whole organs themselves and…

Life’s a Breach

It’s very likely that some of your most sensitive information is vulnerable, out there just for the taking. “How is that possible?” You may ask. “I have 2-factor authentication configured on all of my social and business accounts!”. Indeed, the information you manage may be secure, but what about sensitive information pertaining to you, but…

Telemedicine Is Here to Stay!

The New Normal?   Telemedicine has allowed the medical establishment to provide services to patients during a time where a furious demand to shift human-to-human contact to the digital realm exists.   For most patients, telemedicine seems so new and novel, but the telehealth infrastructure to provide medical services remotely has been growing quietly for…

Virtual Reality Adversaries Are On The Prowl

Virtual Reality Hacking

Unwelcome Guests   The frequency, potency, and sophistication of cybersecurity threats continue to surge. Any business which employs digital technology, which is to say all businesses, is vulnerable to the attacks of an assortment of rogue digital adversaries, from individual “hackers” (a misnomer we will confront and clear up) to networks of dissident programmers bound…