NVIDIA 2015 Annual Report Download - page 94

Download and view the complete annual report

Please find page 94 of the 2015 NVIDIA annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 183

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183

14
System security and data protection breaches, as well as cyber-attacks, could disrupt our operations, reduce our expected
revenue and increase our expenses, which could adversely affect our stock price and damage our reputation.
Security breaches, computer malware and cyber-attacks have become more prevalent and sophisticated in recent years.
These attacks have occurred on our systems in the past and may occur in the future. Experienced computer programmers,
hackers and employees may be able to penetrate our security controls and misappropriate or compromise our confidential
information, or that of our employees or third parties. These attacks may create system disruptions or cause shutdowns.
These hackers may also develop and deploy viruses, worms and other malicious software programs that attack or otherwise
exploit security vulnerabilities in our products. For portions of our IT infrastructure, including business management and
communication software products, we rely on products and services provided by third parties. These providers may also
experience breaches and attacks to their products which may impact our systems. Data security breaches may also result
from non-technical means, such as actions by an employee with access to our systems.
Actual or perceived breaches of our security measures or the accidental loss, inadvertent disclosure or unapproved
dissemination of proprietary information or sensitive or confidential data about us, our partners, our customers or third
parties could expose us, our partners, our customers, third parties or the individuals affected, to a risk of loss or misuse of
this information, resulting in litigation and potential liability, damage to our brand and reputation or other harm to our
business. Our efforts to prevent and overcome these challenges could increase our expenses and may not be successful. We
may experience interruptions, delays, cessation of service and loss of existing or potential customers. Such disruptions could
adversely impact our ability to fulfill orders and interrupt other critical functions. Delayed sales, lower margins or lost
customers as a result of these disruptions could adversely affect our financial results, stock price and reputation.
We depend on third parties and their technology to manufacture, assemble, test and/or package our products, which
reduces our control over product quantity and quality, development, enhancement and product delivery schedule and
could harm our business.
We do not manufacture the silicon wafers used for our GPUs and Tegra processors and do not own or operate a wafer
fabrication facility. Instead, we are dependent on industry-leading foundries, such as Taiwan Semiconductor Manufacturing
Company Limited and Samsung Electronics Co. Ltd., to manufacture our semiconductor wafers using their fabrication
equipment and techniques. Similarly, we do not assemble, test or package our products, but instead rely on independent
subcontractors, such as Advanced Semiconductor Engineering, Inc., BYD Auto Co., Ltd., Hon Hai Precision Industry Co.,
Ltd., JSI Logistics, Ltd., King Yuan Electronics Co. and Siliconware Precision Industries Co. Ltd. We do not have long-
term commitment contracts with these foundries or subcontractors. As a result, we face several significant risks which
could have an adverse effect on our ability to meet customer demands and/or negatively impact our business operations,
gross margin, revenue and/or financial results, including:
a lack of guaranteed supply of wafers and other components and potential higher wafer and component prices due
to supply constraints;
a failure by our foundries to procure raw materials or to provide or allocate adequate manufacturing or test capacity
for our products;
a failure to develop, obtain or successfully implement high quality, leading-edge process technologies, including
transitions to smaller geometry process technologies, needed to manufacture our products profitably or on a timely
basis;
loss of a supplier and additional expense and/or production delays as a result of qualifying a new foundry or
subcontractor and commencing volume production or testing in the event of a loss of or a decision to add or change
a supplier;
a lack of direct control over delivery schedules or product quantity and quality; and