Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Did Apple Really Suggest Dropping Your Computer to Fix It?

Did Apple Really Suggest Dropping Your Computer to Fix It?

Most computers you’ll find in the workplace are PCs that run Windows, but Apple is also a major player in the computing and technology landscape. Apple produces sleek and high-end hardware using efficient operating systems, but it’s not all sunshine and rainbows for Apple products and their users. In fact, at one time, they recommended the most absurd fix for one of their products: slamming it on the desk.

Wait, What?

Normally, we would never advocate for using physical force or violence against your technology. If you feel like this is the only option, call us and we’ll punch your computer for you.

Back to the story, though. In 1982, Apple was at its peak popularity, with Steve Jobs being on the cover of Time magazine and being the first company to reach $1 billion in annual sales. Apple made beautiful products (if you could consider a beige desktop computer beautiful), but it often came at the cost of functionality, with the Apple III being the primary example.

Now, the Apple III, in an attempt to make the device more marketable, had its air vents removed.

Anyone who has used a computer knows just how much heat they can produce. If it’s not properly ventilated, heat can build up in the case, effectively cooking the insides with the heat generated. This is clearly a bad thing and can lead to several issues with the operationality of your tech.

To make the sexiest Apple computer possible, the air vents had to go, along with the internal fans, because without air vents, why would you need them?

With so much heat building up in these devices, parts would expand and get dislodged in the process, leading to operational problems. Keep in mind this computer cost $4,240 in the 1980s, the equivalent of about $14,270 today. This price tag is important to the rest of the story, so keep the figures in mind as you read on.

There are times when the computers would get so hot that the floppy disks in the drive would melt and stop working, leading these incredibly frustrated people who spent thousands of dollars on the Apple III to contact tech support at Apple.

Thankfully, Apple had an answer, and it’s not one that you would think. One engineer at Apple, Daniel Kottke, ran into the issue himself, and in frustration slammed his Apple III on his desk. The force from the impact snapped the warped parts back together and the computer started to work again.

Apple, naturally, used this as an opportunity to support the people who bought their products, recommending that they do the same. Hopefully, they thought, the issue would be resolved with a little bit of force.

Thankfully, Modern Tech Support Has Come a Long Way

This is a funny joke today, but the past forty years have given technicians and professionals countless insights into how best to maintain technology. To learn more about how we can do the same for you, without beating up your computer, contact us at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 30 July 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Efficiency Internet Malware IT Support Privacy Google Email Computer Workplace Tips Phishing IT Services Hosted Solutions Collaboration Users Mobile Device Workplace Strategy Ransomware Small Business Quick Tips Microsoft Backup Cybersecurity Passwords Communication Saving Money Data Backup Smartphone Android Managed Service VoIP Business Management Smartphones Upgrade communications Mobile Devices Disaster Recovery Data Recovery Browser Social Media Productivity Managed IT Services Microsoft Office Windows Current Events AI Tech Term Network Remote Internet of Things Artificial Intelligence Facebook Automation Cloud Computing Holiday Gadgets Covid-19 Server Managed Service Provider Miscellaneous Training Information Remote Work Outsourced IT Compliance Encryption Spam Employee/Employer Relationship Office Windows 10 Business Continuity Data Management Government Bandwidth Windows 10 Wi-Fi Virtualization Blockchain Business Technology IT Support Mobile Office Data Security Two-factor Authentication Vendor Apps Chrome Budget Managed Services Voice over Internet Protocol Apple Networking Mobile Device Management App Gmail BYOD Employer-Employee Relationship Hacker Avoiding Downtime Marketing Conferencing How To BDR WiFi Computing Information Technology HIPAA Access Control Applications Office 365 Tip of the week Computers Augmented Reality Retail Help Desk Storage Password Website Bring Your Own Device Managed IT Services Healthcare Operating System Big Data Virtual Private Network Risk Management Router Health Analytics Office Tips Windows 11 Document Management Monitoring 2FA Excel Scam Data loss Remote Workers Telephone Firewall Going Green Patch Management Save Money Remote Monitoring Cooperation Free Resource End of Support Vulnerability Project Management The Internet of Things Windows 7 Vendor Management Cybercrime Microsoft 365 Physical Security Social Display Solutions Printer Paperless Office Infrastructure Customer Service Money Presentation Holidays Humor Data Storage Smart Technology Supply Chain Wireless Technology Video Conferencing Maintenance Antivirus Managed Services Provider Sports Professional Services Saving Time Mouse Virtual Machines Administration Word Managed IT Service Downloads iPhone Licensing Robot Vulnerabilities Entertainment Safety Data Privacy Settings Wireless Printing Content Filtering Images 101 IT Management Mobility Telephone System VPN Multi-Factor Authentication YouTube Meetings Cost Management Cryptocurrency Computer Repair Employees Virtual Desktop Customer Relationship Management LiFi Integration Data storage User Tip Modem Mobile Security Processor Outlook Hacking Machine Learning Cyber Monday Medical IT Writing Proxy Server Reviews Lenovo Cookies Tactics Development User Hotspot Transportation Small Businesses Virtual Reality Hacks Server Management Mirgation Hypervisor Displays Scary Stories Private Cloud Identity Theft PowerPoint Fun Shopping Superfish Nanotechnology Optimization IP Address Addiction Deep Learning Language Employer/Employee Relationships Outsourcing Twitter Management PCI DSS Chatbots Error Navigation Education Distributed Denial of Service Workplace Social Engineering Gig Economy Screen Reader Service Level Agreement Internet Service Provider Recovery Computing Infrastructure Teamwork Hiring/Firing Remote Computing Regulations Compliance Mobile Computing Hard Drives Identity Evernote Paperless Smart Tech Memes Tablet Co-managed IT Search Bookmark Domains Download Net Neutrality Best Practice Alerts SQL Server Technology Care Alert Business Communications Dark Data Financial Data Managed IT Refrigeration History Buisness File Sharing Connectivity IT IT solutions Break Fix Scams How To Browsers Smartwatch Legal Public Speaking Lithium-ion battery Upload Procurement Business Growth Azure Hybrid Work Notifications Multi-Factor Security Tech Human Resources Social Network Telework Cyber security Travel Entrepreneur IoT Communitications Google Maps Dark Web Cables Cortana CES Techology Trends Supply Chain Management Alt Codes Google Calendar Term Google Apps Customer Resource management FinTech Undo Regulations Downtime Unified Threat Management Star Wars IT Assessment Hosted Solution Microsoft Excel IT Maintenance Data Analysis Unified Threat Management Gamification Flexibility Typing Staff Value Business Intelligence Legislation Shortcuts Network Congestion Organization Social Networking Smart Devices Ransmoware Knowledge Fileless Malware Digital Security Cameras Google Drive User Error Content Remote Working Application Wearable Technology Memory Vendors Comparison Google Play Be Proactive 5G Health IT Motherboard Data Breach Point of Sale IBM Assessment Electronic Health Records Unified Communications Permissions Workforce Experience Directions Videos Google Docs Bitcoin Network Management Wasting Time Threats Running Cable Tech Support Specifications Security Cameras Workplace Strategies Monitors Google Wallet Trend Micro Internet Exlporer Software as a Service Fraud Meta Microchip Username Windows 8 Managing Costs Amazon Laptop Websites Black Friday SSID Drones Competition eCommerce Database Surveillance Virtual Assistant Outsource IT Electronic Medical Records SharePoint IT Technicians Virtual Machine Environment Halloween Media

Blog Archive