recommended reading

Medical Advances From Iraq and Afghanistan Might Help Save Bombing Victims' Limbs

Ambulances wait near the medical tent at the Boston Marathon Monday.

Ambulances wait near the medical tent at the Boston Marathon Monday. // Elise Amendola/AP

The doctors fighting to save the lives — and limbs — of those wounded in the Monday's bombing will have the benefit of recent major advances, many of them results of medical experience during the Iraq and Afghanistan wars, in what is called limb salvaging. The latest casualty figure has 183 injured in the attack (fortunately, 89 have now been released), and at least 10 of them have had a limb amputated, according to CNN. More will probably be added to that toll: at least nine of the 28 people sent to the Brigham and Women's Hospital  have "limb threatening" wounds, according to a hospital spokesman.

"In general due to the advances of microsurgery, it is possible to replant extremities," Dr. Linda Cendales, an assistant professor at Emory told The Atlantic Wire. That is the good news. The bad news is that the procedures can take a very long time and might not be worth it for some. This is how that works:

If the right conditions are met—a big if—then the patient undergoes replantation surgery. First and foremost the patient has to be stabilized. ("Life over limb," Cendales repeated more than once.) At that point, the doctor evaluates the state of the amputated segment, the limb, the type of damage, and the injury. If it's damage the doctors think they can fix, the patient then undergoes hours worth of surgery, in which surgeons mend bones with plates and screws and reconnect tendons, nerves, vessels, and skin. Afterwards, for precision, doctors will then further mend those tissues under a microscope.

Read more on The Atlantic Wire

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.