Feeds

Evidence of accounting chicanery at Dell

Restatements possible

High performance access to file storage

Dell says an audit committee convened to probe its bookkeeping has found evidence of misconduct and accounting errors that may result in restatements to previous financial results. The preliminary finding, which also disclosed potential deficiencies in the company's financial controls, is the latest announcement to raise doubts about the accounting of the cut-rate PC maker.

As a result of the continuing inquiry, Dell said it would not meet an extension of April 18 for filing its Form 10-K for the fiscal year that ended last month. Dell previously secured the extension because it said the investigation was holding things up.

In addition to the internal audit committee, the SEC and the US Attorney's office for the Southern District of New York are also scrutinizing Dell's finances. Once upon the time, Dell said the investigations were unlikely to result in material changes to previously released financial results. It's unclear exactly what is causing Dell to change that assessment now, but a lawsuit filed last month may provide clues. The class action accused Dell of inflating profits by as much as $800m courtesy of kickbacks Intel paid for being the PC maker's exclusive provider of microprocessors.

It's fair to say the past 18 months haven't been Dell's best. In January the company's board ousted Kevin Rollins as CEO following a slow and painful slide in market share and customer satisfaction ratings. A recall of more than four million laptop batteries last year didn't help matters.

Earlier this month, Dell reported a 32-percent drop in annual net income as revenue from desktop and laptop machines declined. Suddenly, the company's direct model of manufacturing isn't looking like such a strategic advantage.

Dell's shares fell more than 2 percent in after hours trading following today's disclosure. They've slipped a little more than 8 percent since the start of the year. ®

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Nokia offers 'voluntary retirement' to 6,000+ Indian employees
India's 'predictability and stability' cited as mobe-maker's tax payment deadline nears
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
Adrian Mole author Sue Townsend dies at 68
RIP Blighty's best-selling author of the 1980s
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Analysts: Bright future for smartphones, tablets, wearables
There's plenty of good money to be made if you stay out of the PC market
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.