Feeds

Apple recalls OS update

My Mac isn't working anymore...

  • alert
  • submit to reddit

Apple has withdrawn the latest update to Mac OS X, 10.2.8, after a few hours. The company doesn't say why, but Ethernet and display problems lead a long list of bugs at MacFixIt.

Apple's knowledge base article for the update advises: "This update is temporarily unavailable. Please check back later."

The update is the first for G3 and G4 owners since 10.2.6 in June. It combines the 10.2.7 update which is available only with the new G5-only desktops and the revamped iMacs and PowerBooks. 10.2.8 includes a fix for the clicking hard disk issue that has affected many iBook owners.

Apple received widespread criticism for shrouding its Bluetooth beta program in secrecy, leading to hundreds of complaints within hours of release of the iSync update. The update required the OS to interoperate with twenty new devices, and critics said an open beta program would have resolved many of these.

The next, major Mac OS X update, codenamed Panther, is scheduled for release before the end of the year, but it will arrive probably sooner

Related Stories

iSync update: beware
On the iSync fiasco that didn't have to happen

Related Products
Buy Apple kit from The Reg store

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.