Feeds

GE boffins build micro-lungs to cool PC innards

Puffing piezoelectronics outpace fatter fans

High performance access to file storage

Researchers at General Electric has developed a new air-cooling system based on human lungs that's half the size of conventional computer fans but just as effective at keeping things chilly.

GE cooler

You just purse your lips and... (click to enlarge)

The prototype uses 40mm by 40mm thin metal plates which are bonded to ceramic piezoelectronics, dubbed Dual Piezoelectric Cooling Jets (DCJ), that flex like bellows when AC current is applied. The 1mm-thick micro-lungs vibrate at between 100 and 175 hertz, producing a 1mm-wide jet of air coming in and out of the device.

As turbulence flows off the sides of the stream, the cooling area is greatly increased and the speed of the jet is such that the same air isn’t reused. The team demonstrated the system by using it to cool what looks like a Lenovo X1 Carbon Ultrabook, and they say the new system uses less than half the battery power of a conventional fan that's double its width.

The prototype design can cool up to 12-18W and uses less than 240mW to do so, and lack of a DC motor or bearings means it may well last longer, Peter deBock, GE electronics cooling researcher, told The Register. It's also quieter, and the frequency of breaths can be adjusted to suit cooling and manufacturing requirements.

But the interior of a PC case can get pretty dusty, and the enclosed nature of the design looks like it could clog up like the lungs of a chain-smoker. The team tested this, however, and it appears that the air velocity is such that the casing stays clean.

"We tested the devices in Mil-STD-810G sand and dust testing environment. They were blasted with really fine grain dust from many different angles," he said. "After four days we had all six devices still working with no problems."

Obviously this kind of system would work well in the tablet and Ultrabook markets, and anywhere else where size counts. But GE isn’t going to be getting into that business, and has licensed the system to Japanese thermal systems builder Fujikura. ®

High performance access to file storage

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.