Feeds

Acer sued for shipping Vista-book with GB of memory

Um, where's my graphics mem?

Choosing a cloud hosting partner with confidence

Two Middle Americans have sued Acer over its low-cost Aspire notebooks, claiming that the Taiwanese PC giant pre-installed Windows Vista on machines ill-equipped to run Microsoft's latest OS.

With a lawsuit filed Wednesday in San Francisco, California, two residents of Fostoria, Ohio seek damages and relief from the world's third-largest computer maker after purchasing a sub-$600 Aspire notebook that included Windows Vista Premium and a gigabyte of shared system and graphics memory.

In its official "recommended system requirements," Microsoft recommends that an additional 128MB is required to run the Premium incarnation of its latest desktop operating system.

"A notebook pre-installed with Vista Premium requires access to at least 1GB of system RAM plus 128MB of RAM dedicated to the graphics adaptor to run properly," the suit reads. "Acer's Defective Notebooks are inherently defective in that they do not contain enough RAM to properly run Vista Premium...despite being promoted and sold as a bundled product of both a notebook computer and a premium operating system."

Plaintiffs Lora and Clay Wolph purchased their Acer Aspire 4520-5458 notebook at a Wal-Mart in April 2008. Cost: $568.36. Shortly after purchasing, they discovered that "their computer would not run properly and that it experienced numerous 'crashes,' 'freezing,' and was operating very slowly."

Some unnamed "computer professionals" told the Wolphs that extra memory was needed to effectively run Vista Premium, so they complained to Acer. According to their suit - which seeks class action status - a company support rep responded by pointing out that although Microsoft recommended a 1GB requirement, the "minimum requirement" is only 512MB.

Which is true. Microsoft says that the Premium, Business, and Ultimate editions of Vista will run on 512MB systems - with certain OS features disabled. In the beginning, Redmond called these "Vista Capable" machines, and it's facing a separate lawsuit over this potentially misleading moniker.

Eventually, the Wolphs shelled out an extra $157.40 for more memory "so that their notebook would run as marketed, advertised, promoted, warranted, and/or sold by Acer." No word on whether it actually did. But The Reg can confirm than even with an additional 128MB of memory, Windows Vista is nothing more than a dog. ®

Internet Security Threat Report 2014

More from The Register

next story
Hi-torque tank engines: EXTREME car hacking with The Register
Bentley found in a hedge gets WW2 lump insertion
What's MISSING on Amazon Fire Phone... and why it WON'T set the world alight
You fought hard and you saved and earned. But all of it's going to burn...
Trousers down for six of the best affordable Androids
Stylish Googlephones for not-so-deep pockets
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
Fujitsu CTO: We'll be 3D-printing tech execs in 15 years
Fleshy techie disses network neutrality, helmet-less motorcyclists
prev story

Whitepapers

Go beyond APM with real-time IT operations analytics
How IT operations teams can harness the wealth of wire data already flowing through their environment for real-time operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.