Feeds

First case of sleep emailing documented

419 scammers pee pants with glee

5 things you didn’t know about cloud backup

If you thought drunken email was a unwelcome recipe for embarrassment, now you can worry about the real possibility of emailing while sound asleep.

An upcoming article in the trade journal Sleep Medicine details the exceptional case of a lady insomniac who can compose email messages while catching 40 winks.

The researchers call it the first reported example of "complex nonviolent cognitive behavior," according to The New York Times

The woman in question suffered from severe insomnia and was taking the prescription medicine zolpidem, which is marketed under several brands such as Ambien.

Shortly after her doctor bowed to her request to up her dose — she received a call from a friend asking about the strange email sent the previous night. The patient had no memory of such a message, so checked her outbox only to discover three emails had been sent while she was asleep within eight minutes of each other.

The nocturnal correspondences contained unusual spelling, punctuation, and content, such as a subject line reading "!HELP ME P-LEEEEESE" and an invitation to "dinner & drinks" that asked the recipient to "come TOMORROW AND SORT THIS HELL OUT Out!!!!!!"

Concerned for other deeds she may have done while dozing, she contacted a sleep clinic where she surprised the resident doctors with her surprising cognitively complex sleep emailing ability.

While staying at a relatives house, she was even able to start the unfamiliar computer, enter a user name and password to log in, launch the web browser, access the website, and enter her password to compose and send out her somnambulant messages.

The woman's case, of course, is extraordinary — but its good to know a person can not only kill themselves sleepwalking, they can also murder their social life as well. ®

Boost IT visibility and business value

More from The Register

next story
Our LOHAN spaceplane ballocket Kickstarter climbs through £8000
Through 25 per cent but more is needed: Get your UNIQUE rewards!
Cutting cancer rates: Data, models and a happy ending?
How surgery might be making cancer prognoses worse
Boffins ID freakish spine-smothered prehistoric critter: The CLAW gave it away
Bizarre-looking creature actually related to velvet worms
CRR-CRRRK, beep, beep: Mars space truck backs out of slippery sand trap
Curiosity finds new drilling target after course correction
SpaceX prototype rocket EXPLODES over Texas. 'Tricky' biz, says Elon Musk
No injuries or near injuries. Flight stayed in designated area
Brit balloon bod Bodnar overflies North Pole
B-64 amateur ultralight payload approaching second circumnavigation
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Scale data protection with your virtual environment
To scale at the rate of virtualization growth, data protection solutions need to adopt new capabilities and simplify current features.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?