Feeds

iPhone 4 no longer available to UK buyers?

Who says? Apple

Internet Security Threat Report 2014

Ordered your iPhone 4 yet? Tough - you've already missed the boat, if this afternoon's latest missive from Apple is to be believed.

The firm's online emporium has been creaking all day since it started offering the faithful the chance to pre-order the iPhone 4.

One Reg reader reported that it took him just under two hours to order the phone of his dreams. Clearly he has a very understanding boss.

Shortly after lunch though, the more lackadaisical fanbois acting on Apple's 'reserve your iPhone' email got the message below. Yes, 16GB or 32GB, black or white, they're all "unavailable".

iphone 4 sold out?

Luckily, if you race back to the website it appears the not at all obscure object of their desire is available after all.

So, first Apple says the iPhone 4 is available, but declines to put in place a system capable of taking orders. Then it emails its known customers, but they already can't reserve it. Then it makes it available after all.

The genius of Cupertino is clearly beyond our ken. ®

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Seattle children’s accelerates Citrix login times by 500% with cross-tier insight
Seattle Children’s is a leading research hospital with a large and growing Citrix XenDesktop deployment. See how they used ExtraHop to accelerate launch times.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.