Feeds

First case of sleep emailing documented

419 scammers pee pants with glee

Seven Steps to Software Security

If you thought drunken email was a unwelcome recipe for embarrassment, now you can worry about the real possibility of emailing while sound asleep.

An upcoming article in the trade journal Sleep Medicine details the exceptional case of a lady insomniac who can compose email messages while catching 40 winks.

The researchers call it the first reported example of "complex nonviolent cognitive behavior," according to The New York Times

The woman in question suffered from severe insomnia and was taking the prescription medicine zolpidem, which is marketed under several brands such as Ambien.

Shortly after her doctor bowed to her request to up her dose — she received a call from a friend asking about the strange email sent the previous night. The patient had no memory of such a message, so checked her outbox only to discover three emails had been sent while she was asleep within eight minutes of each other.

The nocturnal correspondences contained unusual spelling, punctuation, and content, such as a subject line reading "!HELP ME P-LEEEEESE" and an invitation to "dinner & drinks" that asked the recipient to "come TOMORROW AND SORT THIS HELL OUT Out!!!!!!"

Concerned for other deeds she may have done while dozing, she contacted a sleep clinic where she surprised the resident doctors with her surprising cognitively complex sleep emailing ability.

While staying at a relatives house, she was even able to start the unfamiliar computer, enter a user name and password to log in, launch the web browser, access the website, and enter her password to compose and send out her somnambulant messages.

The woman's case, of course, is extraordinary — but its good to know a person can not only kill themselves sleepwalking, they can also murder their social life as well. ®

The Power of One eBook: Top reasons to choose HP BladeSystem

More from The Register

next story
Bad back? Show some spine and stop popping paracetamol
Study finds common pain-killer doesn't reduce pain or shorten recovery
Malaysian Airlines flight MH17 claimed lives of HIV/AIDS cure scientists
Researchers, advocates, health workers among those on shot-down plane
World Solar Challenge contender claims new speed record
One charge sees Sunswift travel 500kms at over 100 km/h
Mwa-ha-ha-ha! Eccentric billionaire Musk gets his PRIVATE SPACEPORT
In the Lone Star State, perhaps appropriately enough
SMELL YOU LATER, LOSERS – Dumbo tells rats, dogs... humans
Junk in the trunk? That's what people have
All those new '5G standards'? Here's the science they rely on
Radio professor tells us how wireless will get faster in the real world
The Sun took a day off last week and made NO sunspots
Someone needs to get that lazy star cooking again before things get cold around here
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.