Feeds

Apple runs with 2-2-2 and 3-2-2

They think the story's all over... It is now

  • alert
  • submit to reddit

The Power of One Brief: Top reasons to choose HP BladeSystem

Apple bans PC SDRAM for users own good

Tim Kowalsky wants to take us to task on Mac SDRAM:

I was disappointed today to see that you published the above story without first checking to make sure you had your facts straight. You've now added an addendum to the bottom of the story that sort of backpedals on your initial claims, but it doesn't really seem to go far enough. (Admit it - you were just plain wrong and you jumped the gun on the story.)

The firmware upgrade does *not* block 2-2-2 memory chips. The fact that Apple ships machines with 3-2-2 chips does not mean that 2-2-2 cannot be used in the machines. What they have blocked are "iffy" memory chips that don't properly identify themselves or have other problems... chips that will likely cause crashes, etc. if installed in a Mac no matter what kind of operating system it is running. This is not entirely unreasonable. Buying memory chips from the lowest priced seller no matter what isn't a good idea - unfortunately some people will do that and then cry when they later have problems.

Having said that, I personally have two 256 mb DIMMs in my G4. Both of them are 2-2-2 memory. I purchased them from an online retailer (Otherworld) who guarantees that their memory will be 100% Mac compatible. Luckily they are also one of the cheapest around, but without that guarantee I would have gone elsewhere. I installed the firmware upgrade and have had absolutely no problems with the chips being recognized in either OS 9.1 or in OS X. When I run the system profiler they are both recognized correctly.

I think that the addendum is perfectly reasonable. Readers who think otherwise can lobby to have Tony Smith thrown into the Vulture Central stocks for the afternoon.

Your point about cheap components is spot on, though.

Eight steps to building an HP BladeSystem

More from The Register

next story
NSA man: 'Tell me about your Turkish connections'
Spooks ask Dabbsy to suggest a nice hotel with pool
Carlos: Slim your working week to just three days of toil
'Midas World' vision suggests you retire later, watch more tellie and buy more stuff
Motorist 'thought car had caught fire' as Adele track came on stereo
'FIRE' caption on dashboard prompts dunderheaded hard shoulder halt
Yahoo! Japan! launches! service! for! the! dead!
If you're reading this email, I am no longer alive
Plucky Rockall podule man back on (proper) dry land
Bold, barmy Brit adventurer Nick Hancock escapes North Atlantic islet
Russia sends SEX-CRAZED GECKOS to SPAAAAACE!
In space... no one can hear you're green...
Brit Rockall adventurer poised to quit islet
Occupation records broken, champagne corks popped
Accused! Yahoo! exec! SUES! her! accuser!, says! sex! harassment! never! happened!
Allegations were for 'financial gain', countersuit claims
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.