Feeds

Moffat leaves IBM after insider trading arrest

New server GM in hunt for top job

Seven Steps to Software Security

Bob Moffat - IBM's top server, storage, and chip exec - has left the company following his arrest for alleged involvement in an insider trading scam.

Moffat was arrested by the FBI on October 16 and charged by the US District Attorneys office in Manhattan, along with five others, in an alleged insider trading scam that allowed hedge funds Galleon Group and New Castle Group to benefit to the tune of more than $20m. The original complaint (PDF) filed on October 16 Danielle Chiesi, of New Castle, indicating that Bob Moffat passed her inside information.

The complaint alleges that Moffat provided information regarding the impending spinoff of Advanced Micro Devices' chip making business and the quarterly financials of IBM and Sun Microsystems ahead of when they became public, thereby helping New Castle engage in insider trading in shares of those companies as well.

On October 19, IBM put Moffat on a temporary leave of absence and tapped Rod Adkins, senior vice president of development and manufacturing for IBM's Systems and Technology Group, to be the temporary head of STG (taking control of the server, storage, and chip lines and their marketing) while retaining his other job managing development and manufacturing operations.

This morning, in an internal announcement to IBM's employees, the company released the following statement: "Rod Adkins, who was named acting head of IBM's Systems and Technology Group on October 19, has been appointed senior vice president of STG. Bob Moffat, who had been placed on leave of absence as a result of a US Federal investigation into his personal activities, is no longer an employee of IBM."

Moffat, as El Reg pointed out earlier this year, was one of the prime candidates to replace Sam Palmisano, IBM's president, chief executive officer, and chairman, in at least one or two of those roles.

It is not clear if Moffat left IBM or was asked to leave. "IBM has a policy of not commenting on the personal issues of current or former employees," explained spokesperson Ed Barbini.

Adkins was also in the hunt for one, two, or three of the top jobs at IBM, and his odds of talking the helm just went up dramatically, particularly if IBM turns its server business around in the coming quarters and the Power7 RISC system and z11 mainframe system launches next year go well. It would not be at all surprising to see one of a handful of executives named president of IBM next year and thereby being anointed the designated successor to Palmisano, much as Palmisano was given that title when Louis Gerstner was approaching retirement. ®

Boost IT visibility and business value

More from The Register

next story
Airbus promises Wi-Fi – yay – and 3D movies (meh) in new A330
If the person in front reclines their seat, this could get interesting
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
Want to beat Verizon's slow Netflix? Get a VPN
Exec finds stream speed climbs when smuggled out
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
US freemium mobile network eyes up Europe
FreedomPop touts 'free' calls, texts and data
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.