Feeds

Quake ripples and Rambus fiasco hit Dell, HP

It appears there's a slight snag to short inventory tails...

  • alert
  • submit to reddit

High performance access to file storage

Although Taiwanese production is now coming back on-stream after the quake, knock-on supply disruption is causing problems for some PC manufacturers. On top of this, the Rambus fiasco also looks like messing up the supply chain. Analysts think Dell has been hit by what you might call Compaq's Revenge. One of Dell's advantages against other PC manufacturers has historically been its build to order model and the short inventory tail associated with it. But go figure - if you don't have a large components inventory, and a prime source of components like Taiwan is knocked out of production for two weeks (the most conservative estimate) then you've probably got trouble. On Friday several analysts warned that Dell might not make its Q3 targets, because of the Taiwan problems, and also noted that the rise in DRAM prices would hit the company disproportionately, as it has several large customers on fixed price deals, and is therefore unable to increase prices to these. Dell itself says it's not yet sure what the quake impact is likely to be. The Register notes that according to a form 144 released by the SEC on Friday, Dell vice chair Mort Topfer had intended to sell 1 million shares on 27 September. HP president Carly Fiorina is more definite about disruption caused by the quake, and on Friday warned of "disruption and delay in some elements of our PC supply chain." At the moment HP is getting supplies, but it and its suppliers are worried about making targets over the next few weeks, particularly as regards ASICs used in HP notebooks. The company is also worried about memory supplies. As well it might be. The Register can't help noticing that the monthly pubs currently hitting the streets include reviews (jolly good ones, too) of HP's new box based on the er, Intel i820. Companies who'd had a commitment to Rambus (hello HP, Compaq, Dell) are having to make a handbrake turn over this one. Lucky old Via. ®

High performance access to file storage

More from The Register

next story
Sorry London, Europe's top tech city is Munich
New 'Atlas of ICT Activity' finds innovation isn't happening at Silicon Roundabout
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.