Feeds

Boffins dream up Sleeptalking PC standby-mode tech

USB NIC gizmo handles (some) BitTorrent on its own

5 things you didn’t know about cloud backup

Computer boffins at Microsoft Research and UC San Diego have proposed the introduction of "sleep talking" technology, allowing PCs to carry out network tasks such as BitTorrent downloads or VoIP/IM listening while in energy-saving standby mode.

The prototype gumstix-based Somniloquy "sleep talking" network interface

Sniffs your packets while you sleep.

The kit, catchily dubbed Somniloquy, involves putting an always-on low power CPU into a PC's network interface. This little machine runs an embedded OS such as Windows CE or Linux, and has some Flash storage of its own.

"Large numbers of people keep their PCs in awake mode even though the PCs are relatively idle for long blocks of time because they want to stay connected to an internal network or the Internet or both," says Yuvraj Agarwal of UC San Diego. "Most of the tasks that people keep their computers on for — like ensuring remote access and availability for virus scans and backup, maintaining presence on instant messaging (IM) networks, being available for incoming voice-over-IP (VoIP) calls, and file sharing and downloading — can be achieved at much lower power-use levels than regular awake mode."

Agarwal and colleagues from Microsoft Research presented their Somniloquy research and prototypes last week at the USENIX Symposium on Networked Systems Design and Implementation.

According to the developers, the Somniloquy device can either wake up the host PC in response to network events, or handle them itself if suitable code "stubs" are written for it. Examples of application code stubs tested successfully by the team included IM, web downloads and BitTorrent file sharing. With reference to the latter apps, the Somniloquy team note that "a larger flash on the secondary processor allows the PC to sleep longer".

According to Agarwal and Co, "existing solutions for sleep-mode responsiveness such as Wake-On-LAN (WoL) have not proven successful 'in the wild'". They say that their plug-in Somniloquy gear is better because it can handle some apps without waking up the main machine, requires no alterations to its host platform, and can easily be fitted to existing machines using a plug-and-play USB interface.

Agarwal says that use of Somniloquy on a PC which normally stays on would translate to energy savings of "60 to 80 per cent" dependent on usage model. He proposes that the tech could be installed on NICs in future, avoiding the need for the present retrofit USB peripheral.

Full details for those interested are available courtesy of UC San Diego here (PDF). ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
6 Obvious Reasons Why Facebook Will Ban This Article (Thank God)
Clampdown on clickbait ... and El Reg is OK with this
So, Apple won't sell cheap kit? Prepare the iOS garden wall WRECKING BALL
It can throw the low cost race if it looks to the cloud
EE fails to apologise for HUGE T-Mobile outage that hit Brits on Friday
Customer: 'Please change your name to occasionally somewhere'
Time Warner Cable customers SQUEAL as US network goes offline
A rude awakening: North Americans greeted with outage drama
We need less U.S. in our WWW – Euro digital chief Steelie Neelie
EC moves to shift status quo at Internet Governance Forum
BT customers face broadband and landline price hikes
Poor punters won't be affected, telecoms giant claims
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.