NVIDIA 2013 Annual Report Download - page 165

Download and view the complete annual report

Please find page 165 of the 2013 NVIDIA annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 264

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264

21
impairment of relationships with employees, vendors and customers, or the loss of any of our key employees,
vendors or customers or our target's key employees, vendors or customers, as a result of our acquisition or
investment.
We may be required to record a charge to earnings if our goodwill or amortizable intangible assets become impaired,
which could negatively impact our operating results.
Under generally accepted accounting principles in the United States, or U.S. GAAP, we review our amortizable
intangible assets and goodwill for impairment when events or changes in circumstances indicate the carrying value may
not be recoverable. Goodwill is tested for impairment at least annually. The carrying value of our goodwill or amortizable
assets from acquisitions may not be recoverable due to factors such as a decline in stock price and market capitalization,
reduced estimates of future cash flows and slower growth rates in our industry or in any of our reporting units. Estimates
of future cash flows are based on an updated long-term financial outlook of our operations. However, actual performance
in the near-term or long-term could be materially different from these forecasts, which could impact future estimates. For
example, in the most recent impairment test of our Tegra Processor reporting unit, the fair value of the reporting unit only
exceeded its carrying value by 17%. If the future operating results of the Tegra Processor reporting unit are significantly
lower than our estimates, the goodwill assigned to Tegra Processor could be impaired, which would negatively impact our
results of operations.
System security risks, data protection breaches, cyber-attacks and systems integration issues could disrupt our internal
operations, and any such disruption could reduce our expected revenue, increase our expenses, damage our reputation
and adversely affect our stock price.
Experienced computer programmers and hackers may be able to penetrate our security controls and misappropriate or
compromise our confidential information or that of third parties, create system disruptions or cause shutdowns. Computer
programmers and hackers also may be able to develop and deploy viruses, worms and other malicious software programs
that attack our products or otherwise exploit any security vulnerabilities of our products. The costs to us to eliminate or
alleviate malicious software programs and security vulnerabilities could be significant, and our efforts to address these
problems may not be successful and could result in interruptions, delays, cessation of service and loss of existing or potential
customers that may impede our sales, manufacturing, distribution or other critical functions.
We manage and store various proprietary information and sensitive or confidential data relating to our business and
third party business. Breaches of our security measures or the accidental loss, inadvertent disclosure or unapproved
dissemination of proprietary information or sensitive or confidential data about us or our partners or customers, including
the potential loss or disclosure of such information or data as a result of fraud, trickery or other forms of deception, could
expose us, our partners and customers or the individuals affected to a risk of loss or misuse of this information, result in
litigation and potential liability for us, damage our brand and reputation or otherwise harm our business. In addition, the
cost and operational consequences of implementing further data protection measures could be significant. For example, in
July 2012, unauthorized third parties gained access to certain user information on our online forums. We have strengthened
security in an effort to minimize future attacks. However, hackers may continue to target our security controls in the future,
and we cannot guarantee that our security measures will be able to prevent future breaches of our website and/or attacks
on our products.
Portions of our IT infrastructure also may experience interruptions of service or produce errors in connection with
systemic failures, systems integration or migration work that takes place from time to time. We may not be successful in
implementing new systems and transitioning data, which could cause business disruptions and be more expensive, time
consuming, disruptive and resource-intensive. Such disruptions could adversely impact our ability to fulfill orders and
interrupt other processes. Delayed sales, lower margins or lost customers resulting from these disruptions could adversely
affect our financial results, stock price and reputation.