Feeds

Apple admits iCloud 'unacceptable', vows to not go titsup again

iYawn 5 maker in 10-hour email outage outrage

Secure remote control for conventional and virtual desktops

Apple has apologised to fanbois hit by an iCloud outage, and described the ten-hour downtime as "not acceptable".

Access to email accounts was the main casualty when the online storage cloud burst last week. Business owners in particular were peeved when they couldn't pick up their e-correspondence for a working day. At the time Apple said that only 1.1 per cent of iCloud users were affected.

The technology giant's support gophers sent out an expression of regret on Friday night:

We apologize for the mail service interruption you recently experienced. Your mail service has been restored, but it is possible you did not receive some of the emails sent to your account between 5pm PDT 10 September and 3am PDT 11 September.

Although Apple's apology only admits to 10 hours of downtime, some punters said the outage lasted a full day. In fact the iPad maker's iCloud support page (now removed) said problems cropped up over two days - though not all users may have been affected during that period.

iCloud outage, screengrab of Apple support page

The support page reported two days of downtime

The grovelling missive offered no explanation for the outage. However, the downtime kicked off the day before the unveiling of the iPhone 5 and the accompanying tweaks to iCloud and iTunes, and it was believed to be the result of behind-the-scenes engineering work on the service. The release of iOS 6, which powers Apple's handheld kit, will spark an increase in iCloud traffic: the fruity devices will synchronise shared photos, music, messages, browser tabs and more data automatically with the online storage system, so punters can access more of their stuff on all their iThings.

Apple promised that its email service will not be interrupted again. It told frustrated fanbois: "We understand this is not acceptable and we are working hard to make sure this does not happen again." ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
Turnbull should spare us all airline-magazine-grade cloud hype
Box-hugger is not a dirty word, Minister. Box-huggers make the cloud WORK
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
Microsoft adds video offering to Office 365. Oh NOES, you'll need Adobe Flash
Lovely presentations... but not on your Flash-hating mobe
prev story

Whitepapers

Free virtual appliance for wire data analytics
The ExtraHop Discovery Edition is a free virtual appliance will help you to discover the performance of your applications across the network, web, VDI, database, and storage tiers.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.