Personal Tech Pipeline | Apple Extends iMac Warranty To Video, Power

White Papers

Sponsor Resources

WebCasts
Free Newsletter GlossaryContact UsAbout Us
Players & CamsPhones & PDAsHome & AutoOnline

August 19, 2005

Apple Extends iMac Warranty To Video, Power



Courtesy of TechWeb News

Apple Computer late Thursday said it was extending the warranty of its first-run iMac G5 desktop computers for a full year because of ongoing power and video problems on some machines.

The warranty extension applies only to iMac G5s sold between September 2004, when the line debuted, and June, 2005, that have scrambled or distorted video, no video, or no power. The affected models feature 17- and 20-inch displays with 1.6GHz and 1.8GHz G5 processors.

iMacs come standard with a year's limited warranty, but the extension will cover repairs to eligible systems "for up to two years from the original date of purchase, even if your iMac G5 is out of warranty," Apple said in the announcement posted on its Web site.

Bad power capacitors have plagued many iMac G5 owners, who haven't hesitated to complain on Apple's support discussions sites. The news of the warranty extension was especially welcomed there.

"This means that Apple is now accepting/recognizing that there is a problem with the iMac G5," said one poster, while on another thread, a user identified as "David Barnes" wrote "Good for Apple."

This isn't the first power-related issue that's forced Apple to make good to its customers. In May, the Cupertino, Calif.-based computer maker recalled faulty batteries on many of its iBook and PowerBook laptops.

E-mail This Story
Print This Story
Reprint This Story




Get the latest Personal Tech news, product info, and trends every week.


Related Content

  Right-click and choose Copy to extract RSS Feed URL  Personal Tech Pipeline's Main RSS Feed
  Right-click and choose Copy to extract RSS Feed URL  Personal Tech Pipeline's Blog RSS Feed



Keeping Up To Date On Enterprise Server Tech?
Review our compilation of columns on server security, database software, and Linux issues.
How to Achieve High Performance Through IT
Learn to achieve high performance by aligning IT to
strategic objectives and solutions to unlock that value.
Using Current Performance to Shape
Future Results

Hear new strategies for improving business
performance and results.

Editor's Picks

Well, Microsoft has "unfolded" its "Origami" ultra-mobile PC platform Thursday. It turned out to be a full-featured PC smaller than a tablet but bigger than a PDA. Are you impressed?
Yes! I want one!
Sort of. We'll see.
No! It's too big for a pocket and too small for real computing. What's the point?


In search of personal tech products? See our new Product Finder, where you'll find personal computing devices, communications solutions, security products, and more.



PERSONAL TECH PIPELINE MARKETPLACE (sponsored links)
Critical Steps for a Successful VoIP Deployment
Enterprises expect voice and data network convergence to reduce management complexity, drive down operating costs, and enable more efficient communications. Use this "how-to" guide to effectively assess the current state of your network.

SEC & HIPAA IM Compliance
Satisfy regulatory and compliance requirements for instant messaging.

Network & Application Performance doc downloads
Free white papers, buyers guide, application notes, industry articles, and more. NetScout's nGenius Solution provides network performance management and application monitoring for complex enterprise networks.

THE EVENT for Email Security, Policy, Compliance
Learn the latest on Email Security, Systems, Technology, Privacy, Policy and Compliance at INBOX: The Email Event, May 31-June 1, 2006. Meet industry leaders and your peers to debate and discuss best practices, products and cost-effective systems.

Security Within - Configuration based Security
Configuration and policy based security systems are a pro-active way to defend against IT security attacks. Click here to request our white papers, "Security Within - Configuration based Security" and "Policy Management vs. Vulnerability Scanning".


Buy a Link Now


Top ten search terms from the TechWeb TechEncyclopedia
How does your pay rate? Check the InformationWeek Salary Survey
Mobilized Solutions Guide: Find and compare solutions for your business
Top Requested White Paper Categories from TechWeb White paper Library
Top ten search terms from the TechWeb TechEncyclopedia