Building Aggressively Duty-Cycled Platforms to Achieve Energy Efficiency

Total Page:16

File Type:pdf, Size:1020Kb

Building Aggressively Duty-Cycled Platforms to Achieve Energy Efficiency UNIVERSITY OF CALIFORNIA, SAN DIEGO Building Aggressively Duty-Cycled Platforms to Achieve Energy Efficiency A dissertation submitted in partial satisfaction of the requirements for the degree Doctor of Philosophy in Computer Science (Computer Engineering) by Yuvraj Agarwal Committee in charge: Rajesh Gupta, Chair Paramvir Bahl William Hodgkiss Stefan Savage Alex Snoeren Geoff Voelker 2009 Copyright Yuvraj Agarwal, 2009 All rights reserved. The dissertation of Yuvraj Agarwal is approved, and it is acceptable in quality and form for publication on mi- crofilm and electronically: Chair University of California, San Diego 2009 iii DEDICATION To Dadi, Shyam Babaji, Papa and Ma. iv TABLE OF CONTENTS Signature Page .................................. iii Dedication ..................................... iv Table of Contents ................................. v List of Figures .................................. ix List of Tables ................................... xi Acknowledgements ................................ xii Vita and Publications .............................. xv Abstract of the Dissertation ........................... xvi Chapter 1 Introduction ............................ 1 1.1 Reducing the Energy Consumption of Computing Devices 3 1.2 Using Collaboration to Aggressively Duty-Cycle Platforms 5 1.3 Contributions ........................ 7 1.4 Organization ......................... 8 Chapter 2 Background and Related Work .................. 9 2.1 Mobile Platforms ...................... 9 2.2 Power and Energy ...................... 12 2.2.1 Measuring Power and Energy Consumption .... 13 2.3 Related Work ........................ 14 2.3.1 Power Management in Mobile Devices ....... 14 2.3.2 Power Management in Laptops and Desktop PCs 17 Chapter 3 Radio Collaboration - Cellular and LAN Data Radios ..... 20 3.1 Overview of a VoIP Deployment .............. 23 3.2 Alternatives to VoIP over Wi-Fi Radios .......... 24 3.2.1 Cellular Data vs. Wi-Fi .............. 25 3.2.2 Smartphone Power Measurements ......... 28 3.3 Cell2Notify Architecture .................. 30 3.3.1 Cell2Notify Protocol ................ 32 3.3.2 Connectivity Scenarios ............... 33 3.3.3 Modifications to the VoIP Server ......... 35 3.3.4 Modifications to the Smartphone ......... 36 3.3.5 Other Applications ................. 38 3.3.6 Alternatives to Cell2Notify ............. 38 v 3.4 Implementation ....................... 39 3.4.1 Prototype Cell2Notify Server ............ 40 3.4.2 Prototype Cell2Notify Client ............ 43 3.5 Evaluation .......................... 45 3.5.1 Reduction in Energy Consumption ........ 45 3.5.2 End-to-End Latency ................ 50 3.6 Discussion .......................... 53 3.6.1 Is Caller-ID Spoofing Legal? ............ 54 3.6.2 Handling Spoofed Caller-IDs ............ 54 3.6.3 Concerns of Cellular Operators .......... 55 3.6.4 Deploying Cell2Notify ............... 55 3.7 Related Work – Paging and Wakeup ............ 56 3.8 Summary .......................... 58 Chapter 4 Building a Switching Hierarchy using Collaborative Data Radios 59 4.1 CoolSpots Architecture ................... 60 4.2 Switching Policies ...................... 63 4.2.1 Switching Framework ................ 64 4.2.2 Baseline Policies ................... 65 4.2.3 Bandwidth Policy .................. 66 4.2.4 Cap-Static Policy .................. 66 4.2.5 Cap-Dynamic Policy ................ 67 4.3 Benchmarks ......................... 68 4.3.1 Baseline Benchmarks ................ 69 4.3.2 Streaming Benchmarks ............... 70 4.3.3 Web Traffic Benchmarks .............. 71 4.4 Experimental Setup ..................... 71 4.4.1 Hardware Specifications .............. 73 4.4.2 Energy Measurement ................ 73 4.4.3 Location Configuration ............... 74 4.5 Evaluation .......................... 75 4.5.1 Characterizing Radio Switching .......... 76 4.5.2 Energy Savings for Individual Benchmarks .... 78 4.5.3 Effect of Radio Ranges and Location ....... 79 4.5.4 Discussion ...................... 80 4.6 Summary .......................... 81 Chapter 5 Deploying a Collaborative Radio Infrastructure ........ 83 5.1 SwitchR Architecture .................... 84 5.1.1 Separating the Wi-Fi AP and the Bluetooth Gate- way .......................... 85 5.1.2 Handling Multiple Clients ............. 86 5.2 Switching Mechanism .................... 87 vi 5.2.1 Switching from Wi-Fi to BT ............ 87 5.2.2 Switching from BT to Wi-Fi ............ 88 5.2.3 Handling Mobility .................. 88 5.2.4 Baseline Switching Analysis ............ 89 5.3 Switching Policies ...................... 89 5.3.1 Baseline Policies ................... 91 5.3.2 Cap-Dynamic Policy ................ 91 5.3.3 Multi-Client Policy ................. 92 5.4 Benchmarks ......................... 94 5.4.1 Idle and Transfer .................. 94 5.4.2 Streaming ...................... 95 5.4.3 Web Traffic ..................... 95 5.5 Experimental Setup ..................... 96 5.5.1 Energy Measurement ................ 97 5.5.2 Experimental Design ................ 98 5.6 Evaluation .......................... 99 5.6.1 Media Streaming Applications ...........101 5.7 Related Work – Radio Collaboration ...........105 5.8 Summary ..........................106 Chapter 6 Processor Collaboration - Energy Saving for PCs .......108 6.1 Somniloquy Architecture ..................110 6.1.1 Supporting Stateless Applications: Wakeup Filters 113 6.1.2 Supporting Stateful Applications: Stubs . 114 6.1.3 Quantifying Energy Savings ............117 6.2 Prototype Implementation .................118 6.2.1 Hardware and Software Overview .........118 6.2.2 Three different prototypes .............121 6.2.3 Applications Without Stubs ............123 6.2.4 Applications Using Stubs ..............123 6.3 Evaluation ..........................125 6.3.1 Microbenchmarks – Power, Latency ........126 6.3.2 Somniloquy in Operation ..............128 6.3.3 Application Performance ..............130 6.3.4 Energy Savings using Somniloquy .........134 6.4 Discussion ..........................138 6.4.1 Handling Security Implications ...........138 6.4.2 Alternative Design of Somniloquy .........139 6.5 Related Work – Processor Collaboration .........140 6.6 Summary ..........................143 vii Chapter 7 Conclusions ............................145 7.1 Contributions ........................146 7.1.1 Improving Duty-Cycling using Collaboration . 146 7.1.2 Deployable Prototypes ...............147 7.1.3 Evaluation Results, Platforms and Power Mea- surements ......................148 7.2 Future Work .........................149 7.3 Deploying Somniloquy in Enterprises ...........149 7.3.1 Extending Processor Collaboration ........149 7.3.2 Detailed Energy Accounting by In-situ Measure- ments ........................150 Bibliography ...................................152 viii LIST OF FIGURES Figure 1.1: Power consumption of a Intel-PXA255 processor using slow- down and shutdown. ........................ 5 Figure 2.1: Power consumption of the Stargate[21] mobile platform ..... 10 Figure 2.2: Power consumption of the HTC Tornado smartphone platform . 11 Figure 2.3: Power measurement methodology. ................ 13 Figure 3.1: A typical enterprise VoIP deployment. Incoming calls to the SIP server can be received over the IP network or over the PSTN line. An Analog Telephony Adapter (ATA) acts as a bridge between PTSN and IP networks. ................. 23 Figure 3.2: Power measurements of 1xEVDO, GPRS/EDGE and Wi-Fi in- terfaces for different scenarios. The “Connected and Active” measurements show the power when transmitting 32 Kbps of VoIP traffic over UDP. Note that when active, VoIP over Wi-Fi consumes the least amount of battery power. .......... 26 Figure 3.3: Smartphone power measurement setup .............. 28 Figure 3.4: Steps of the Cell2Notify protocol. ................ 31 Figure 3.5: Our prototype implementation of Cell2Notify. We implement the Cell2Notify server as a combination of a commonly available SIP proxy and an Internet- based VoIP gateway. We emulate a smartphone using a combination of a cellphone that communi- cates with a Wi-Fi equipped laptop using Bluetooth. ...... 41 Figure 3.6: Call logs of three different users. ................. 47 Figure 3.7: Energy consumption using two cards, with and without Cell2Notify for three different users. As expected Cell2Notify saves more energy for lighter usage patterns. ................. 48 Figure 3.8: Energy consumption of a Cingular 2125 with and without Cell2Notify for three users. We assume that the user does not use the smart- phone for any other purpose, but only for making and receiving VoIP calls. ............................. 49 Figure 3.9: Breakdown of various steps of the Cell2Notify protocol in call- setup latency. The right bar shows the expected latency with our proposed optimizations. Even without optimizations, the extra delay is around ten seconds, which is less than two rings. 51 Figure 4.1: Multiple Bluetooth-enabled CoolSpots, inside of a traditional Wi-Fi HotSpot, allow mobile devices to connect other devices through the backbone network. CoolSpots are connected to the backbone network either directly (wired) or through the Wi-Fi network (wireless). ......................... 60 ix Figure 4.2: CoolSpots enables enables radio collaboration on top of individ- ual radio power management techniques such as Bluetooth sniff mode and Wi-Fi PSM. ....................... 61 Figure 4.3: Experimental Setup. The Test Machine (TM) and the Base Sta- tion (BS) are on a cart which can be moved around to
Recommended publications
  • Green Destiny: a 240-Node Compute Cluster in One Cubic Meter
    Green Destiny: A 240-Node Compute Cluster in One Cubic Meter Wu-chun (Wu) Feng Research & Development in Advanced Network Technology (RADIANT) Computer & Computational Sciences Division Los Alamos National Laboratory LA-UR 02-6127 Outline Where is Supercomputing? Architectures from the Top 500. Evaluating Supercomputers Metrics: Performance & Price/Performance An Alternative Flavor of Supercomputing Supercomputing in Small Spaces Æ Bladed Beowulf Architecture of a Bladed Beowulf Performance Metrics Benchmark Results Discussion & Status Conclusion Acknowledgements & Media Coverage Wu-chun Feng http://www.lanl.gov/radiant [email protected] http://sss.lanl.gov Flavors of Supercomputing (Picture Source: Thomas Sterling, Caltech & NASA JPL) Wu-chun Feng http://www.lanl.gov/radiant [email protected] http://sss.lanl.gov 500 400 SIMD Architectures from the 300 Top 500 Supercomputer List 200 100 0 ProcessorSingle Wu-chun Feng [email protected] Jun-93 Nov-93 Jun-94 MPP Nov-94 Jun-95 Nov-95 Jun-96 Constellation SMP Nov-96 Cluster Jun-97 http://www.lanl.gov/radiant Nov-97 http://sss.lanl.gov Jun-98 Nov-98 Jun-99 Nov-99 Jun-00 Nov-00 Jun-01 Nov-01 Jun-02 Metrics for Evaluating Supercomputers Performance Metric: Floating-Operations Per Second (FLOPS) Example: Japanese Earth Simulator Price/Performance Æ Cost Efficiency Metric: Cost / FLOPS Examples: SuperMike, GRAPE-5, Avalon. Wu-chun Feng http://www.lanl.gov/radiant [email protected] http://sss.lanl.gov Performance (At Any Cost) Japanese Earth Simulator ($400M) Performance Price/Perf Peak 40.00 Tflop $10.00/Mflop Linpack 35.86 Tflop $11.15/Mflop n-Body 29.50 Tflop $13.56/Mflop Climate 26.58 Tflop $15.05/Mflop Turbulence 16.40 Tflop $24.39/Mflop Fusion 14.90 Tflop $26.85/Mflop Wu-chun Feng http://www.lanl.gov/radiant [email protected] http://sss.lanl.gov Price/Performance Cost Efficiency LSU’s SuperMike Performance Price/Perf (2002: $2.8M) Linpack 2210 Gflops $1.27/Mflop U.
    [Show full text]
  • Building Blocks for Tomorrow's Mobile App Store
    Building Blocks for Tomorrow’s Mobile App Store by Justin G. Manweiler Department of Computer Science Duke University Date: Approved: Romit Roy Choudhury, Supervisor Jeffrey S. Chase Landon P. Cox Victor Bahl Dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Department of Computer Science in the Graduate School of Duke University 2012 Abstract (0984) Building Blocks for Tomorrow’s Mobile App Store by Justin G. Manweiler Department of Computer Science Duke University Date: Approved: Romit Roy Choudhury, Supervisor Jeffrey S. Chase Landon P. Cox Victor Bahl An abstract of a dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Department of Computer Science in the Graduate School of Duke University 2012 Copyright c 2012 by Justin G. Manweiler All rights reserved Abstract In our homes and in the enterprise, in our leisure and in our professions, mobile computing is no longer merely “exciting;” it is becoming an essential, ubiquitous tool of the modern world. New and innovative mobile applications continue to inform, entertain, and surprise users. But, to make the daily use of mobile technologies more gratifying and worthwhile, we must move forward with new levels of sophistication. The Mobile App Stores of the future must be built on stronger foundations. This dissertation considers a broad view of the challenges and intuitions behind a diverse selection of such new primitives. Some of these primitives will mitigate exist- ing and fundamental challenges of mobile computing, especially relating to wireless communication. Others will take an application-driven approach, being designed to serve a novel purpose, and be adapted to the unique and varied challenges from their disparate domains.
    [Show full text]
  • Service Manual
    , , , , , www.sonyweb.co.uk , www.sonyweb.co.uk , , www.sonyweb.co.uk , www.sonyweb.co.uk , , www.sonyweb.co.uk , www.sonyweb.co.uk , www.sonyweb.co.uk , , www.sonyweb.co.uk , www.sonyweb.co.uk , www.sonyweb.co.uk , www.sonyweb.co.uk , , www.sonyweb.co.uk , www.sonyweb.co.uk , www.sonyweb.co.uk , www.sonyweb.co.uk , www.sonyweb.co.uk , www.sonyweb.co.uk , www.sonyweb.co.uk www.sonyweb.co.uk , www.sonyweb.co.uk , www.sonyweb.co.uk , SERVICE MANUAL www.sonyweb.co.uk , www.sonyweb.co.uk , www.sonyweb.co.uk Ver 1-2002J www.sonyweb.co.uk , www.sonyweb.co.uk , www.sonyweb.co.uk , www.sonyweb.co.uk www.sonyweb.co.uk www.sonyweb.co.uk , , Revision History www.sonyweb.co.uk , www.sonyweb.co.uk , www.sonyweb.co.uk , PCG-GRV550 www.sonyweb.co.uk , www.sonyweb.co.uk , www.sonyweb.co.uk www.sonyweb.co.uk , www.sonyweb.co.uk , www.sonyweb.co.uk , www.sonyweb.co.uk , www.sonyweb.co.uk , www.sonyweb.co.uk www.sonyweb.co.uk , www.sonyweb.co.uk , www.sonyweb.co.uk , www.sonyweb.co.uk , www.sonyweb.co.uk , www.sonyweb.co.uk www.sonyweb.co.uk , www.sonyweb.co.uk , www.sonyweb.co.uk , www.sonyweb.co.uk , www.sonyweb.co.uk , www.sonyweb.co.uk www.sonyweb.co.uk www.sonyweb.co.uk , www.sonyweb.co.uk , , Lineup : PCG-GRV550 www.sonyweb.co.uk , www.sonyweb.co.uk , www.sonyweb.co.uk www.sonyweb.co.uk , www.sonyweb.co.uk , www.sonyweb.co.uk , www.sonyweb.co.uk , www.sonyweb.co.uk , www.sonyweb.co.uk For American Area www.sonyweb.co.uk , www.sonyweb.co.uk , www.sonyweb.co.uk , www.sonyweb.co.uk , www.sonyweb.co.uk , www.sonyweb.co.uk www.sonyweb.co.uk , www.sonyweb.co.uk
    [Show full text]
  • Memorandum in Opposition to Hewlett-Packard Company's Motion to Quash Intel's Subpoena Duces Tecum
    ORIGINAL UNITED STATES OF AMERICA BEFORE THE FEDERAL TRADE COMMISSION ) In the Matter of ) ) DOCKET NO. 9341 INTEL. CORPORATION, ) a corporation ) PUBLIC ) .' ) MEMORANDUM IN OPPOSITION TO HEWLETT -PACKARD COMPANY'S MOTION TO QUASH INTEL'S SUBPOENA DUCES TECUM Intel Corporation ("Intel") submits this memorandum in opposition to Hewlett-Packard Company's ("HP") motion to quash Intel's subpoena duces tecum issued on March 11,2010 ("Subpoena"). HP's motion should be denied, and it should be ordered to comply with Intel's Subpoena, as narrowed by Intel's April 19,2010 letter. Intel's Subpoena seeks documents necessary to defend against Complaint Counsel's broad allegations and claimed relief. The Complaint alleges that Intel engaged in unfair business practices that maintained its monopoly over central processing units ("CPUs") and threatened to give it a monopoly over graphics processing units ("GPUs"). See CompI. iiii 2-28. Complaint Counsel's Interrogatory Answers state that it views HP, the world's largest manufacturer of personal computers, as a centerpiece of its case. See, e.g., Complaint Counsel's Resp. and Obj. to Respondent's First Set ofInterrogatories Nos. 7-8 (attached as Exhibit A). Complaint Counsel intends to call eight HP witnesses at trial on topics crossing virtually all of HP' s business lines, including its purchases ofCPUs for its commercial desktop, commercial notebook, and server businesses. See Complaint Counsel's May 5, 2010 Revised Preliminary Witness List (attached as Exhibit B). Complaint Counsel may also call HP witnesses on other topics, including its PUBLIC FTC Docket No. 9341 Memorandum in Opposition to Hewlett-Packard Company's Motion to Quash Intel's Subpoena Duces Tecum USIDOCS 7544743\'1 assessment and purchases of GPUs and chipsets and evaluation of compilers, benchmarks, interface standards, and standard-setting bodies.
    [Show full text]
  • Understanding Human-Battery Interaction on Mobile Phones
    Understanding Human-Battery Interaction on Mobile Phones Ahmad Rahmati, Angela Qian, and Lin Zhong Department of Electrical & Computer Engineering Rice University, Houston, TX 77005 {rahmati, qangela, lzhong}@rice.edu ABSTRACT human users deal with limited battery lifetime, which we call Mobile phone users have to deal with limited battery lifetime human-battery interaction (HBI). Human-battery interaction is a through a reciprocal process we call human-battery interaction reciprocal process. On one hand, modern mobile phones provide (HBI). We conducted three user studies in order to understand users with indicators of the battery charge level, as well as user HBI and discover the problems in existing mobile phone designs. interfaces for changing power-saving settings, such as display The studies include a large-scale international survey, a one- brightness reduction. We refer to these indicators and user month field data collection including quantitative battery logging interfaces collectively as the battery interface. On the other hand, and qualitative inquiries from ten mobile phone users, and human users can react to the dropping battery charge level by structured interviews with twenty additional mobile phone users. changing the power-saving settings, altering usage patterns, and We evaluated various aspects of HBI, including charging charging the phone. behavior, battery indicators, user interfaces for power-saving Understanding HBI will provide valuable insight into the settings, user knowledge, and user reaction. We find that mobile effectiveness of the battery interface, and how mobile users deal phone users can be categorized into two types regarding HBI and with limited battery lifetime, prioritize and make tradeoffs. often have inadequate knowledge regarding phone power Knowledge regarding HBI will essentially help design better characteristics.
    [Show full text]
  • Annual Report
    ANNUAL REPORT 2019FISCAL YEAR ACM, the Association for Computing Machinery, is an international scientific and educational organization dedicated to advancing the arts, sciences, and applications of information technology. Letter from the President It’s been quite an eventful year and challenges posed by evolving technology. for ACM. While this annual Education has always been at the foundation of exercise allows us a moment ACM, as reflected in two recent curriculum efforts. First, “ACM’s mission to celebrate some of the many the ACM Task Force on Data Science issued “Comput- hinges on successes and achievements ing Competencies for Undergraduate Data Science Cur- creating a the Association has realized ricula.” The guidelines lay out the computing-specific over the past year, it is also an competencies that should be included when other community that opportunity to focus on new academic departments offer programs in data science encompasses and innovative ways to ensure at the undergraduate level. Second, building on the all who work in ACM remains a vibrant global success of our recent guidelines for 4-year cybersecu- the computing resource for the computing community. rity curricula, the ACM Committee for Computing Edu- ACM’s mission hinges on creating a community cation in Community Colleges created a related cur- and technology that encompasses all who work in the computing and riculum targeted at two-year programs, “Cybersecurity arena” technology arena. This year, ACM established a new Di- Curricular Guidance for Associate-Degree Programs.” versity and Inclusion Council to identify ways to create The following pages offer a sampling of the many environments that are welcoming to new perspectives ACM events and accomplishments that occurred over and will attract an even broader membership from the past fiscal year, none of which would have been around the world.
    [Show full text]
  • Transaction / Regular Paper Title
    IEEE TRANSACTIONS ON MOBILE COMPUTING, MANUSCRIPT ID 1 Context-Based Network Estimation for Energy-Efficient Ubiquitous Wireless Connectivity Ahmad Rahmati, Student Member, and Lin Zhong, Member, IEEE Abstract— Context information brings new opportunities for efficient and effective system resource management of mobile devices. In this work, we focus on the use of context information to achieve energy-efficient, ubiquitous wireless connectivity. Our field-collected data show that the energy cost of network interfaces poses a great challenge to ubiquitous connectivity, despite decent availability of cellular networks. We propose to leverage the complementary strengths of Wi-Fi and cellular interfaces by automatically selecting the more efficient one based on context information. We formulate the selection of wireless interfaces as a statistical decision problem. The challenge is to accurately estimate Wi-Fi network conditions without powering up its network interface. We explore the use of different context information, including time, history, cellular network conditions, and device motion, to statistically estimate Wi-Fi network conditions with negligible overhead. We evaluate several context- based algorithms for the estimation and prediction of current and future network conditions. Simulations using field-collected traces show that our network estimation algorithms can improve the average battery lifetime of a commercial mobile phone for an ECG reporting application by 40%, very close to the estimated theoretical upper bound of 42%. Further, our most effective algorithm can predict Wi-Fi availability for one and ten hours into the future with 95% and 90% accuracy, respectively. Index Terms— Network Architecture and Design, Local and Wide-Area Networks. —————————— —————————— 1 INTRODUCTION merging mobile applications in healthcare and mul- energy per MB transfer.
    [Show full text]
  • The Technology Behind Crusoe™ Processors
    The Technology Behind Crusoe™ Processors Low-power x86-Compatible Processors Implemented with Code Morphing™ Software Alexander Klaiber Transmeta Corporation January 2000 The Technology Behind Crusoe™ Processors Property of: Transmeta Corporation 3940 Freedom Circle Santa Clara, CA 95054 USA (408) 919-3000 http://www.transmeta.com The information contained in this document is provided solely for use in connection with Transmeta products, and Transmeta reserves all rights in and to such information and the products discussed herein. This document should not be construed as transferring or granting a license to any intellectual property rights, whether express, implied, arising through estoppel or otherwise. Except as may be agreed in writing by Transmeta, all Transmeta products are provided “as is” and without a warranty of any kind, and Transmeta hereby disclaims all warranties, express or implied, relating to Transmeta’s products, including, but not limited to, the implied warranties of merchantability, fitness for a particular purpose and non-infringement of third party intellectual property. Transmeta products may contain design defects or errors which may cause the products to deviate from published specifications, and Transmeta documents may contain inaccurate information. Transmeta makes no representations or warranties with respect to the accuracy or completeness of the information contained in this document, and Transmeta reserves the right to change product descriptions and product specifications at any time, without notice. Transmeta products have not been designed, tested, or manufactured for use in any application where failure, malfunction, or inaccuracy carries a risk of death, bodily injury, or damage to tangible property, including, but not limited to, use in factory control systems, medical devices or facilities, nuclear facilities, aircraft, watercraft or automobile navigation or communication, emergency systems, or other applications with a similar degree of potential hazard.
    [Show full text]
  • HTC SPV MDA G1 Zdalny Unlock Kodem Po IMEI - Również DESIRE
    GSM-Support ul. Bitschana 2/38, 31-420 Kraków mobile +48 608107455, NIP PL9451852164 REGON: 120203925 www.gsm-support.net HTC SPV MDA G1 zdalny unlock kodem po IMEI - również DESIRE Jest to usługa pozwalająca na zdjęcie simlocka z telefonów HTC / SPV / QTEK / MDA / G1-Google / Xperia poprzez kod - łącznie z najnowszą bazą! Kod podawany jest na podstawie numeru IMEI, modelu oraz sieci, w której jest simlock. Numer IMEI można sprawdzić w telefonie poprzez wybranie na klawiaturze *#06#. Do każdego numeru IMEI przyporządkowany jest jeden kod. W polu na komentarz prosimy podać model, IMEI oraz kraj i nazwę sieci, w której jest załozony simlock. Czas oczekiwania na kod to średnio 2h. Nie zdejmujemy simlocków kodem z HTC Touch HD z sieci Play, HTC Touch Pro z Orange Polska i innych, które wyraźnie są wymienione na samym dole opisu! Usługa obejmuje modele: DOPOD 310 (HTC Oxygen) DOPOD 535 (HTC Voyager) DOPOD 565 (HTC Typhoon) DOPOD 566 (HTC Hurricane) DOPOD 575 (HTC Feeler) DOPOD 577W (HTC Tornado) DOPOD 585 (HTC Amadeus) DOPOD 586 (HTC Hurricane) DOPOD 586W (HTC Tornado) DOPOD 595 (HTC Breeze) DOPOD 686 (HTC Wallaby) DOPOD 696 (HTC Himalaya) DOPOD 696i (HTC Himalaya) DOPOD 699 (HTC Alpine) DOPOD 700 (HTC Blueangel) DOPOD 710 (HTC Startrek) DOPOD 710+ (HTC Startrek) DOPOD 818 (HTC Magician) DOPOD 818 Pro (HTC Prophet) DOPOD 818C (HTC Wave) DOPOD 828 (HTC Magician) DOPOD 828+ (HTC Magician) DOPOD 830 (HTC Prophet) DOPOD 838 (HTC Wizard) DOPOD 838 Pro (HTC Hermes) DOPOD 900 (HTC Universal) DOPOD C500 (HTC Vox) DOPOD C720 (HTC Excalibur) DOPOD C720W
    [Show full text]
  • USCOURTS-Ca9-09-35307-1.Pdf
    Case: 09-35307 01/18/2011 ID: 7614842 DktEntry: 67 Page: 1 of 67 FOR PUBLICATION UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT VANESSA SIMMONDS, Plaintiff-Appellant, v. CREDIT SUISSE SECURITIES (USA) LLC; JPMORGAN CHASE & CO., a Delaware corporation, successor in interest to Hambrecht & Quist and Chase Securities Inc.; BANK OF No. 09-35262 AMERICA CORPORATION, a Delaware D.C. No. 2:07-cv- corporation, successor in interest 01549-JLR to Fleetboston Robertson Stephens, Inc.; ONVIA INC., a Delaware corporation formerly known as Onvia.com Inc.; ROBERTSON STEPHENS, INC.; J.P. MORGAN SECURITIES INC., Defendants-Appellees. In Re: SECTION 16(b) LITIGATION 821 Case: 09-35307 01/18/2011 ID: 7614842 DktEntry: 67 Page: 2 of 67 822 SIMMONDS v. CREDIT SUISSE SECURITIES VANESSA SIMMONDS, Plaintiff-Appellant, v. DEUTSCHE BANK SECURITIES INC.; FOUNDRY NETWORKS INC., Nominal No. 09-35280 Defendant, a Delaware D.C. Nos. corporation; MERRILL LYNCH 2:07-cv-01566-JLR PIERCE FENNER & SMITH 2:07-cv-01549-JLR INCORPORATED; J.P. MORGAN SECURITIES INC., Defendants-Appellees. In Re: SECTION 16(b) LITIGATION VANESSA SIMMONDS, Plaintiff-Appellant, v. MERRILL LYNCH & CO. INC., Defendant, and No. 09-35282 D.C. Nos. FINISAR CORPORATION, Nominal Defendant, a Delaware 2:07-cv-01567-JLR 2:07-cv-01549-JLR corporation; MERRILL LYNCH PIERCE FENNER & SMITH INCORPORATED; J.P. MORGAN SECURITIES INC., Defendants-Appellees. In Re: SECTION 16(b) LITIGATION Case: 09-35307 01/18/2011 ID: 7614842 DktEntry: 67 Page: 3 of 67 SIMMONDS v. CREDIT SUISSE SECURITIES 823 VANESSA SIMMONDS, Plaintiff-Appellant, v. MORGAN STANLEY & CO., No. 09-35285 INCORPORATED; LEHMAN BROTHERS, D.C.
    [Show full text]
  • TRANSMETA BREAKS X86 LOW-POWER BARRIER VLIW Chips Use Hardware-Assisted X86 Emulation by Tom R
    MICROPROCESSOR www.MPRonline.com THE REPORTINSIDER’S GUIDE TO MICROPROCESSOR HARDWARE TRANSMETA BREAKS X86 LOW-POWER BARRIER VLIW Chips Use Hardware-Assisted x86 Emulation By Tom R. Halfhill {2/14/00-01} Like moths drawn to a flame, semiconductor startups seem to find the bright but dangerous glow of the x86 market irresistible. Never mind that companies as resourceful as AMD, Cen- taur, Cyrix, IBM, National Semiconductor, and Rise have all charred their wings in the fires of competition with Intel. More than 120 million x86 chips were with a software envelope that translates x86 binaries into sold in the profitable PC market last year, casting off a warmth native code at run time. that lures newly hatched companies from the darkness. While some companies have used the term “emula- The latest newcomer to emerge from its cocoon is tion” to describe the binary-translation process, Transmeta Transmeta. After nearly five years of unprecedented secrecy, founder Dave Ditzel shuns that term, preferring to describe the Santa Clara–based startup finally unveiled its pair of his company’s method of converting x86 instructions into x86-compatible Crusoe processors at a widely covered VLIW instructions as “code morphing” or simply “transla- media event near Silicon Valley last month. The event tion.” Sometimes this process is called dynamic binary received the same sort of overhyped coverage the U.S. Air recompilation. Transmeta’s code-morphing software cer- Force might attract by flinging open the gates to Area 51. A tainly is more advanced than old-fashioned emulators, large crowd of mainstream and business journalists were which slowly convert one type of binary executable into dazzled by marketing claims about “revolutionary” micro- another by translating one instruction at a time.
    [Show full text]
  • Vertigo: Automatic Performance-Setting for Linux
    USENIX Association Proceedings of the 5th Symposium on Operating Systems Design and Implementation Boston, Massachusetts, USA December 9–11, 2002 THE ADVANCED COMPUTING SYSTEMS ASSOCIATION © 2002 by The USENIX Association All Rights Reserved For more information about the USENIX Association: Phone: 1 510 528 8649 FAX: 1 510 548 5738 Email: [email protected] WWW: http://www.usenix.org Rights to individual papers remain with the author or the author's employer. Permission is granted for noncommercial reproduction of the work for educational or research purposes. This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein. Vertigo: Automatic Performance-Setting for Linux Krisztián Flautner Trevor Mudge [email protected] [email protected] ARM Limited The University of Michigan 110 Fulbourn Road 1301 Beal Avenue Cambridge, UK CB1 9NJ Ann Arbor, MI 48109-2122 Abstract player, game machine, camera, GPS, even the wallet— into a single device. This requires processors that are Combining high performance with low power con- capable of high performance and modest power con- sumption is becoming one of the primary objectives of sumption. Moreover, to be power efficient, the proces- processor designs. Instead of relying just on sleep mode sors for the next generation communicator need to take for conserving power, an increasing number of proces- advantage of the highly variable performance require- sors take advantage of the fact that reducing the clock ments of the applications they are likely to run. For frequency and corresponding operating voltage of the example an MPEG video player requires about an order CPU can yield quadratic decrease in energy use.
    [Show full text]