Feeds

Apple extends iMac G5 warranties

Cover for power and video problems

Security for virtualized datacentres

Apple has extended the warranty period for all first-generation iMac G5 desktops to two years.

Alas, it's not a sign of the company's faith in the machines' manufacturing quality, but a response to problems with their video and power sub-systems and unnamed components within them.

The warranty extension, which provides for the free-of-charge repair of faulty kit, only applies to iMac G5s that have experienced "scrambled or distorted video", or no video at all. Machines that won't start up due to an apparent lack of power are covered by the extension too.

However, Apple notes that "it is possible that your iMac G5 may exhibit video or power issues that are unrelated to the component failure identified by Apple as part of this program and are not covered under this program".

The extension covers machines sold worldwide. The serial numbers of machines that may be susceptible to the problem are:

  • W8435xxxxxx - W8522xxxxxx
  • QP435xxxxxx - QP522xxxxxx
  • CK435xxxxxx - CK522xxxxxx
  • YD435xxxxxx - YD522xxxxxx

All these systems were sold between September 2004 and June 2005. ®

Security for virtualized datacentres

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.