35
Information Technology and the Emerging MegaConsumer: The Case of the PentiumÔ Flaw By Mustafa V. Uzumeri and Charles A. Snyder Department of Management 415 W. Magnolia St. Auburn University, AL 36849 (205) 844-6531 Copyright: January 25, 1995

The Case of the Pentium Flaw - Auburn Universitywebhome.auburn.edu/~uzumemv/research/iso9000/pentwp.doc · Web viewIn 1987, Intel’s 80386 chip exhibited problems in multiplication

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: The Case of the Pentium Flaw - Auburn Universitywebhome.auburn.edu/~uzumemv/research/iso9000/pentwp.doc · Web viewIn 1987, Intel’s 80386 chip exhibited problems in multiplication

Information Technology and the Emerging MegaConsumer:

The Case of the PentiumÔ Flaw

By

Mustafa V. Uzumeri

and

Charles A. Snyder

Department of Management

415 W. Magnolia St.

Auburn University, AL 36849

(205) 844-6531

Copyright: January 25, 1995

Working Paper - Please do not Quote or Cite

Page 2: The Case of the Pentium Flaw - Auburn Universitywebhome.auburn.edu/~uzumemv/research/iso9000/pentwp.doc · Web viewIn 1987, Intel’s 80386 chip exhibited problems in multiplication

Information Technology and the Emerging MegaConsumer:

The Case of the PentiumÔ Flaw

Abstract

In June 1994, Intel Corporation discovered a flaw in its flagship Pentium processor. For divisions

involving a few isolated numbers, the floating point unit (FPU) gave the wrong answer. The case

illustrates a new factor that managers must take into account in planning their relationship with

customers. The Internet and similar electronic networking technologies provide increasingly wide

exposure for any issue that captures the interest of the electronic community. If the object of that interest

is a product flaw, customers’ subjective perception of risk and their ability to mobilize and assert that

perception present an entirely new dimension. Companies must understand the fundamental shifts that

can occur and factor those possibilities into their strategic and tactical planning.

2

Page 3: The Case of the Pentium Flaw - Auburn Universitywebhome.auburn.edu/~uzumemv/research/iso9000/pentwp.doc · Web viewIn 1987, Intel’s 80386 chip exhibited problems in multiplication

BackgroundIn June 1994, Intel Corporation discovered a flaw in its flagship Pentium processor. For divisions

involving a few isolated numbers, the floating point unit (FPU) on the chip would give the wrong answer.

Intel discovered the flaw in the June, 1994. Intel’s tests showed that the error only appeared in the ninth

significant digit of the answer and affected only a minuscule percentage of the possible division

combinations. As a result, Intel concluded that the flaw was trivial. It corrected the error in subsequent

production, but did not list the flaw in its errata sheets to computer makers and it continued to sell

hundreds of thousands of flawed chips that had already been produced.

In early October, Dr. Thomas Nicely, a mathematician at Lynchburg College, found an anomaly

in his calculations. After eliminating other sources of error, Dr. Nicely concluded that the Pentium chip

itself was at fault. After contacting Intel’s technical support service to no effect, he posted an electronic

message to a Compuserve bulletin board asking other Pentium owners if they were aware of the problem.

The flurry of Internet electronic mail and bulletin board postings that followed confirmed the

error. Reporters from the print and electronic media picked up the story and informed the public at large.

This touched off a firestorm of concern. On November 27, 1994, Andrew Grove, CEO of Intel posted an

electronic message to the Internet community that acknowledged the problem, emphasized its minimal

significance and made a qualified offer to replace the Pentium chip for “users of the Pentium processor

who are engaged in work involving heavy duty scientific/floating point calculations.”1 Meanwhile, Intel

worked with Dr. Nicely and other scientists to develop a ‘workaround’ that software developers could

build into their programs to avoid the flawed calculations.

Rather than resolving the matter, Intel’s qualified offer and workaround accelerated the reaction

by Pentium customers. Throughout December, experts participating in Internet discussion groups

proposed a number of scenarios in which Intel’s ‘subtle’ flaw might cause serious computation errors.

Although the plausibility of the scenarios varied widely, their cumulative effect was to raise concern

among the general body of Pentium users. In the face of this debate and increasingly critical worldwide

print and electronic coverage, Intel decided on December 20, 1994 to offer a replacement chip to all of its

customers -- “no questions asked.” Finally, on January 17, 1994, Intel issued a press release stating that it

3

Page 4: The Case of the Pentium Flaw - Auburn Universitywebhome.auburn.edu/~uzumemv/research/iso9000/pentwp.doc · Web viewIn 1987, Intel’s 80386 chip exhibited problems in multiplication

intended to take a one time charge of $475 million against its earnings for the fourth quarter of 1994 to

pay for the replacement program.2

The Unique Case of the Pentium FlawThe Pentium flaw offers a unique research opportunity for several reasons. First, the availability of

archived information on the Internet makes it possible to document the evolution of the analysis of the

problem and its subsequent debate. Second, many of the participants were computer or professionals who

were very precise in their use of language and in the structure of their arguments. They also tended to be

extraordinarily precise and explicit about their assumptions and perceptions.

Third, many of the participants proposed conceptual models to explain both customer reaction to

Intel’s actions and the structures of the risks that the Pentium flaw created. Indeed, many of the

participants described their reasoning in terms that are easily linked to a formal risk assessment model.

This specifically includes Intel, whose initial decision to tolerate the flaw was based on a quantitative

analysis of its customers’ risks. When Intel concluded that these risks were extremely low, it decided that

nothing needed to be done. When alternative analyses caused Intel’s customers to adopt more

conservative risk assessments, they ultimately concluded that something had to be done.

With most examples of large-scale public reaction, the emotional responses can make it difficult

to elicit the underlying decision constructs. In this case, we believe that the systematic

conceptualizations, coupled with the record of broader public reaction, provide a rare insight into those

thought processes. As such, we believe that this case, more than any in recent memory, justifies the

otherwise risky undertaking of proposing a new model based on one set of events.

Based on the events in the Pentium case, this paper proposes a model to explain the intensity of

the customer reactions that assaulted Intel. The proposed model is synthesized from three sources: 1) the

mathematical computation of expected customer loss from a product defect, 2) research on the perception

of technological and environmental risks, and 2) the insights offered by the participants in the Pentium

debate.

4

Page 5: The Case of the Pentium Flaw - Auburn Universitywebhome.auburn.edu/~uzumemv/research/iso9000/pentwp.doc · Web viewIn 1987, Intel’s 80386 chip exhibited problems in multiplication

The Effect of Perceived Product RiskWhatever else they may have disagreed about, the participants in the Pentium debate agreed that

the heart of the issue concerned risk. In fact, the debate largely decomposed into two questions: did the

Pentium flaw expose Pentium owners to undue risks and were those risks large enough that Intel ought to

replace the flawed chips? To create a model of the issues in this debate, it is therefore necessary to define

a perspective on risk. As it turns out, previous studies of risk do not describe the Pentium events very

well.

Marketing scholars, for example, have studied how potential customers perceive risks before they

make a voluntary purchase.3 However, the at-risk Pentium owners had already bought their computers.

They were faced with an involuntary risk after the purchase was complete. Moreover, the Pentium

owners’ perceptions of risk are not as interesting as their reaction and their ability to pressure Intel.

While it was clear that their motivation to react was based on their assessments of risk, the development

of the reaction involved a number of other factors.

Fortunately, there is a well-studied phenomenon where public perceptions of hazards are known to

produce powerful and complex reactions. This is the public reaction to technological and environmental

hazards such as pollution, waste dumps, and nuclear power plants. From this research, policy-makers

have come to recognize that public perceptions play a role that is even more powerful that the imperative

of the “scientific” risk estimate:

Whereas technologically sophisticated analysts employ risk assessment to evaluate hazards, the majority of citizens rely on intuitive risk judgements, typically called “risk perceptions.” For these people, experience with hazards tends to come from the news media, which rather thoroughly documents mishaps and threats occurring throughout the world.4

We have drawn on this research by making an analogy between public reactions to environmental

threats and customer reactions to the Pentium flaw. In effect, we propose to view the Pentium flaw as a

stream of "pollution" that threatened to poison the computing environment of its owners. The following

comment by an active participant in the debate suggests that our perspective is neither original nor

unreasonable:

The industry has correctly intuited that there's a great deal of capacity out there to absorb a steady stream of numerical pollution, especially given how small that stream is, just like a 10% level of CO streaming out of a car exhaust. What the industry has

5

Page 6: The Case of the Pentium Flaw - Auburn Universitywebhome.auburn.edu/~uzumemv/research/iso9000/pentwp.doc · Web viewIn 1987, Intel’s 80386 chip exhibited problems in multiplication

*not* done howver is to compare that capacity to the likely pollution rate and to establish with some reasonable certainty that the several million polluting Pentiums out there will not present a serious hazard over their expected lifetime.5

If one views product defects as "pollution", the reactions of Pentium customers can be studied in

terms of three interrelated factors: the objective calculation of the risks to individual customers, the

subjective perception of those risks, and the new information infrastructure that allowed customers to

forcefully discuss and develop their mutual concerns about those risks. Each of these issues is examined

in turn in the following sections.

Intel’s initial reaction to public reports of the Pentium flaw were predicated on a rational model of

product risk. Figure 1 characterizes this model as a chain of causation between the supplier and the

customer.6

Figure 1 - Risk Assessment for an Individual Customer

The first link in the chain involves the release characteristics of the defect. The second factor

measures how potential customers are exposed to the defects. The third link in the chain characterizes the

consequences that the defect is likely to create for customer activities. For a simple one-to-one sales

transaction, the customer can expect that each defective unit it receives will produce a loss that is the

product of its rate of loss (l) and the defect’s persistence (p). To determine the customer’s overall loss,

this product is multiplied by the number of defective units that the customer can expect to receive. This,

in turn, will depend on the severity (s) of the defects that the supplier produces and the frequency (f) with

which the defects enter the supplier's product stream.

For more complex transactions, where suppliers may sell to many customers, each customer can

expect to suffer a loss that is proportional to its share of the supplier’s defect production. In effect, each

customer may be exposed to a different concentration (c) of defective products. By multiplying these

terms together, each customer could calculate his or her expected loss:7

Loss severity frequency concentration loss rate persistence_

This estimation approach has a critical property that Intel tried to exploit. Since the relationship is

multiplicative, if any of the terms is zero, then the customer loss is zero. In the Pentium case, most terms

6

Page 7: The Case of the Pentium Flaw - Auburn Universitywebhome.auburn.edu/~uzumemv/research/iso9000/pentwp.doc · Web viewIn 1987, Intel’s 80386 chip exhibited problems in multiplication

were soon known. Customers discovered that every Pentium chip was flawed, so the defect frequency

equaled Intel’s Pentium production. Customers learned about the severity first from Dr. Nicely on

October 30 8 and later from Tim Coe of Vitesse Semiconductor on November 28. Coe presented a model

that explained which specific calculations were in error.9 On November 30, Intel published a “white

paper” that confirmed Coe’s model and explained the flaw in detail.10 Since these values remained

constant throughout the debate, everyone ignored them in subsequent discussions. Finally, although the

assumption was later relaxed, participants initially believed that the concentration was the number of

Pentium computers that each customer owned. This left two values for debate: the persistence and the

rate of loss. Initially the discussion assumed that the flaw’s effects were limited to the calculation at hand

(i.e., the persistence p would be small), but this view changed as experts proposed ways that errors could

become embedded in compiled programs. However, the greatest discussion focused on the rate of loss

that the flaw was likely to generate. This was the variable that Intel focused on in its public relations

efforts. It was also the variable that generated the greatest controversy among the discussants.

When Intel’s internal testing found the flaw in June, the company conducted extensive studies to

determine what risk the flaw posed to end-users. Believing that the other risk factors were understood,

this analysis focused on estimating the rate of loss. Intel’s approach is documented in its November 30

“white paper”. Of particular interest is the chapter entitled: “Evaluation Framework to Gauge Impact on

User”, which begins:

The significance of the flaw to an end-user clearly depends on:1. The frequency of occurrence of the reduced precision divide within the application. If the flaw is unlikely to be seen during the practical lifetime of the computer it is of no significance to the user.

2. The (propagated) impact to the end-user when the problem manifests itself.11

From this, Intel concluded that the flaw was very minor. Unfortunately, Intel did not consider how

the rational fears of individual customers would be expressed in a more complex industry, such as

illustrated in Figure 2, where a supplier delivers its product to two different types of customer:

industrial customers and end-users.

Figure 2 - Structure of the Value Chain

7

Page 8: The Case of the Pentium Flaw - Auburn Universitywebhome.auburn.edu/~uzumemv/research/iso9000/pentwp.doc · Web viewIn 1987, Intel’s 80386 chip exhibited problems in multiplication

The supplier is the last organization to add significant value to the product before it passes into

customer hands. Intel is the sole supplier for the Pentium chip. Once a Pentium chip leaves Intel’s

factory, its function and performance cannot be changed. Intel sold large numbers of chips to industrial

customers who assembled computers for end-users. The industrial customers added value in other areas

of the computer, but did not alter the Pentium chip itself. Intel’s industrial customers included both large

computer companies (see Table 1) and smaller assemblers and direct mail marketers. Finally, the

product may pass through various intermediaries such as distributors or retailers who may add value in

the form of services. The other intermediaries played a relatively minor role in the Pentium debate.

CompanyNumber of PCs

Shipped (millions)(a)

% of Sales that are Pentium

(b)

Approx. PentiumSales (millions)a

(a)(b)Compaq 4.46 8.8% 0.39Gateway 2000 1.12 19.0% 0.21Packard Bell 1.52 12.9% 0.20Dell 1.37 14.0% 0.19IBM 3.97 4.0% 0.16HP 1.17 9.6% 0.11AST Research 0.92 7.6% 0.07NEC 1.85 0.8% 0.01Apple 3.85 0.0% 0Toshiba 1.36 0% 0

TOTAL = 1.34 a calculated from entries in original table

Table 1 - Major Assemblers of Pentium Computers in 199412

Intel’s traditional approach to resolving product defects reflected an implicit assumption that the

assembler were responsible for dealing with end-users. It also assumed that detailed knowledge of the

flaw would be restricted to the industrial customers. When millions of computers with flawed Pentiums

passed into the hands of end-users, both of these assumptions were open to question.

Microprocessor defects are not rare in the microprocessor industry. Given the complexity of the

microprocessor, occasional flaws are inevitable and Intel had experienced problems with its two previous

microprocessor generations. In 1987, Intel’s 80386 chip exhibited problems in multiplication and Intel’s

8

Page 9: The Case of the Pentium Flaw - Auburn Universitywebhome.auburn.edu/~uzumemv/research/iso9000/pentwp.doc · Web viewIn 1987, Intel’s 80386 chip exhibited problems in multiplication

80486 chip experienced compatibility problems in January 1990.13,14 When a flaw is discovered during

internal testing or referred by an assembler, it is industry practice for chip manufacturers to publish errata

sheets that warn assemblers of the problem. Normally, access to the errata sheets is subject to non-

disclosure agreements.15 Since the assemblers deal directly with end-users, chip makers assume that the

assemblers will resolve any problems with the public.

When an end-user’s computer has a defective processor, the customer is likely to assume that just

the one chip is bad. They will likely return the product to the assembler or retailer for a replacement. The

customer is unlikely to phone Intel and demand a product recall. As a result, it is only when an industrial

customer or intermediary experiences a pattern of product repairs or returns that the problem is likely to

be identified as a systemic defect.

Under this system, industrial customers and intermediaries aggregate the risk perceptions of end-

users and summarize them for the supplier. Thus, the most urgent demands on suppliers have traditionally

come from industrial customers that serve as a focal point for the aggregated risk perceptions of end-

users.16

When Dr. Nicely found the Pentium flaw, Intel had to abandon its customary responses and search

for an approach that dealt directly with large numbers of end-users. In its initial responses, Intel seems to

have operated on the assumption that it could deal with end-users in the same way that it had dealt with

its industrial customers. Intel published the results of its risk calculations, first informally and later in the

detailed white paper. The white paper concluded that:

The flaw is of no significance in the commercial PC market where the vast majority of Intel processors are installed. Failure rates introduced by this flaw are swamped by rates due to existing hard and soft failure mechanisms in the PC systems. The average PC user is likely to encounter a failure once in 27,000 years due to this flaw, indicating that it is practically impossible for such a user to encounter a problem in the useful lifetime of the product.17

At the same time, Intel acknowledged that “the flaw is of potential significance to a small

minority of users in the financial world” and “a small fraction of PCs are installed for use as

engineering/scientific workstations”, where the flaw could affect “highly numerical applications”. 18 The

white paper supported Andrew Grove’s November 27 announcement that Intel would replace chips for

users who needed high precision in their applications. Mathematicians, engineers, financial modelers and

other “high-risk” groups were targeted as deserving of the replacements. In effect, Intel chose to respond

9

Page 10: The Case of the Pentium Flaw - Auburn Universitywebhome.auburn.edu/~uzumemv/research/iso9000/pentwp.doc · Web viewIn 1987, Intel’s 80386 chip exhibited problems in multiplication

only to those individual end-users who could prove high individual levels of risk. Intel offered to work

with customers individually to help them assess their risk and to replace the chips for those few whose

risks exceeded an unspecified threshold. 19

The Impact of the InternetUnfortunately, Intel’s assumption that customers could be dealt with on an individual basis was

wrong from the outset. Intel’s initial public response ignited a firestorm of protest. Intel had not

recognized that its implicit models of customer pressure did not apply in this situation. The global

electronic network called the Internet had fully revealed the flaw to end users. This destroyed Intel’s

assumption that it could resolve problems with end-users as though they were independent assemblers.

The Internet allowed individual end-users to coordinate a collective response that effectively destroyed

Intel’s ability to deal with them one-at-a-time.

More significantly, this response was amplified by the Internet. To understand this effect, it is

important to understand how quickly the world of electronic networking is growing. Table 2 lists several

indicators of activity on the Internet. The Internet is only one, albeit the largest, of the electronic

networking and electronic mail services that are available to businesses and the public. All of these

services have the capability to support the creation and coordination of extremely large groups that share

a common interest.

DateNumber of

Internet HostsaUsenet Message Traffic (MB/day)b

Usenet Posts(articles/day)

Usenet Groups

late 1988 56,000 4.4 1,933 381late 1993 2,056,000 50 19,362 NAfall 1994 3,500,000+ 190 72,755 >4,500a A host is an Internet address, analogous to a telephone number. Usually, each host is a separate computer, although large computers may support multiple hosts.b MB = megabyte or million bytes

Table 2 - Growth of Internet Activity20

In the case of the Pentium flaw, a particular Internet discussion group, comp.sys.intel, served as

the focal point for a heated and well-informed debate. Comp.sys.intel is one of a collection of discussion

groups collectively referred to as the Usenet. As shown in Table 2, these discussion groups are

10

Page 11: The Case of the Pentium Flaw - Auburn Universitywebhome.auburn.edu/~uzumemv/research/iso9000/pentwp.doc · Web viewIn 1987, Intel’s 80386 chip exhibited problems in multiplication

proliferating extremely rapidly. As they spread, these groups are becoming more specialized and much

more active. In the case of the Pentium flaw, the discussions comp.sys.intel contributed to the furor in at

least four distinctly different ways.

Collective Knowledge

The Internet’s most obvious impact lay in its ability to connect knowledgeable end-users with one

another. Ultimately, this process produced widespread knowledge about the flaw. Otherwise isolated

1 Andrew Grove, in a statement relayed by Richard Wirt, Director Software Technology, Intel Corporation ([email protected]) and posted to Usenet newsgroup comp.sys.intel, November 27 1994 19:31:21 GMT.2 Intel Press Release, January 17, 1994, posted on Intel WWW home page at www.intel.com3 Henthorne, T.L., LaTour, M.S. and Williams, A.J., Risk Reduction and Informal Interpersonal Influence: Industrial marketing perspectives, Akron Business and Economic Review, 21(3) Fall 1990, 46-59.4 Slovic, P., Perception of Risk, Science, v236, April 17, 1987, pp280-285, p280.5 Vaugh Pratt, [email protected], posted to Usenet newsgroup comp.sys.intel, December 26, 1994.6 Covello, V.T. and Merkhofer, M.W., Risk Assessment Methods: Approaches for assessing health and environmental risks, Plenum Press, New York, 1993, pp5-8.7 This can be stated more generally as:

Expected Loss to Customer i E s f E c E l pi i i ( ) ( ) ( ) (1)

where s=severity, f=frequency, ci =concentration at i, li = i’s loss_rate, and pi =persistence at i8 Original email from Thomas Nicely, [email protected], to Andrew Schulman, [email protected], retrieved from Mathworks’WWW Server at www.mathworks.com.9 Tim Coe, [email protected], posted to Usenet newsgroup comp.sys.intel, November 28, 1994.10 Sharanpani, H.P. and Barton, M.L., Statistical Analysis of Floating Point Flaw in the Pentium Ô Processor (1994), Intel Corporation, posted on Intel’s WWW Home Page at www.intel.com., November 30, 1994.11 Sharanpani, H.P. and Barton, M.L., ibid. p1113 Computer Design, July 1987, pp22-3.14 IEEE Spectrum, April 1990, pp8+.15 Crothers, B., Intel changing its tune on revealing chip flaws, Infoworld, 17(2) January 9, 1995, p1.16 Conceptually, we would model this traditional intermediary pressure for remedies as a function similar to the following:

Pressure for Remedy = f MAX c E l pA i i i

i

N A

( )1

(2)

where A industrial customers, each sell to NA end-users.17 Sharanpani, H.P. and Barton, M.L., ibid. p2718 Sharanpani, H.P. and Barton, M.L., ibid. p2719 Conceptually, Intel’s assumption in its white paper can be characeterized by the following model:

11

Page 12: The Case of the Pentium Flaw - Auburn Universitywebhome.auburn.edu/~uzumemv/research/iso9000/pentwp.doc · Web viewIn 1987, Intel’s 80386 chip exhibited problems in multiplication

individuals became collectively aware of the potential risks. They not only learned that their computer

had the flaw, they learned that everyone else’s Pentium computer had it as well. The impact of this

shared awareness was evident early on in messages posted on the Internet.

Weeks before the daily papers or Wall Street got wind of the calculation error in the Pentium chip, the flap over it was gaining momentum in the on-line community. Particularly damning were the jokes, replicated across thousands of electronic mail accounts, ridiculing the Pentium and its errors.

Equally important, the gist of the debate was picked up by mainstream print and electronic media.

A number of reporters at technical publications had developed the habit of monitoring the major bulletin

boards. Indeed, the recipient of Dr. Nicely’s original letter immediately forwarded it to Alex Wolfe of the

Electronic Engineering Times who picked up the story:

Executives at Compaq Computer Corp. and Dell Computer Corp., two large Pentium customers, said they had begun to receive calls from users who had found the error using a test recommended by Nicely.

A spokeswoman for Compaq said the company was referring the calls to Intel. A spokesman for Dell said the company had been contacted recently by Intel and was dealing directly with customers.21

The structure of the reaction is shown in Figure 3. Intel found its decisions were being driven not

by individual customer needs, nor even by its largest industrial customers. Instead, it was been pressured

by a large group of end-users who were collectively aware of the potential risks. The customers in this

group each understand their own risk, but more importantly, they were aware of other members'

experiences with the product. This shared knowledge allowed large numbers of unconnected individuals

to reward or penalize Intel in a concerted fashion.

Figure 3 - "Collective Risk"

Instead of dealing individual end-users, or even assemblers, Intel found itself facing a large group

of collectively well-informed end-users and the assemblers who were fielding their complaints. Worse,

many of these end-users were influential in computer purchase decisions within their organizations.

Pressure for Remedy f MAX c E l pi i i i( ) (3)

21 John Markoff, New York Times, November 24, 1994.

12

Page 13: The Case of the Pentium Flaw - Auburn Universitywebhome.auburn.edu/~uzumemv/research/iso9000/pentwp.doc · Web viewIn 1987, Intel’s 80386 chip exhibited problems in multiplication

Individuals who owned Pentiums and tracked the debate were likely to be “power users” and information

systems decision-makers. As a result, Intel found that it had to deal with a completely different model of

customer pressure, in effect a . It effectively faced a collective response .22

The challenge by the collective response depends on the size of n. In the past, aggregation

mechanisms have been limited and slow, unless the mass media becomes involved. That usually only

happens if a defect poses a threat to public health or safety. The prospect of cyanide-laced Tylenol, or the

potential fire hazard associated with the Ford Pinto’s gas tank placement are examples of the traditional

media-driven collective response. For less threatening defects, the mechanisms have been typically been

product reviews such as the J.D. Power Customer Satisfaction Survey for automobiles and the various

Consumers’ Reports publications. These tend to be slower and have a narrower reach. With the Internet,

however, the value of n became very large, very fast. By late December, a Time magazine article

reported the following:

... customers who had bought - or planned to buy - Pentium-based computers were confused and often angry. Intel admitted last week that tens of thousands of customers have called about the problem.23

Subjective Risk Inflation

As participants got together to discuss the flaw, Intel encountered a second new phenomenon.

Scholars have long recognized that human perceptions of risks are strongly influenced by subjective

factors in their environment. The rational risks associated with product failure have been discussed at

length. However, marketing scholars have noted that product failures can entail a social risk for the

products’ owners. If the purchased product does not meet with peer approval, there is an additional

perceived loss.24 While the degree of this effect is probably impossible to measure, the inter-peer

discussions on the Internet seem to have fostered some of this feeling. One indication may be found in

the statements of individuals who felt compelled to justify their decision not to press for an immediate

replacement:

Please note, though, that I did not send my chip in for a replacement. Why? I really do not need it. I do not use my computer for anything that will be affected in the least.

23 Jackson, D. and Van Tassel, J., When the Chips are Down, Time, December 26, 1994, 144(26) p26.24 Henthorne, T.L., LaTour, M.S. and Williams, A.J., ibid.

13

Page 14: The Case of the Pentium Flaw - Auburn Universitywebhome.auburn.edu/~uzumemv/research/iso9000/pentwp.doc · Web viewIn 1987, Intel’s 80386 chip exhibited problems in multiplication

Therefore I am not worried and don't care. And, as you say, why do it if you don't need it? But if I had any doubts that anything I was doing would be affected, it would make me a lot happier customer knowing that it could be replaced with a non-faulty version.25

Beyond the social concerns, however, there is an extensive psychometric literature suggesting that

individuals tend to inflate the probability and consequences of a hazard if they: a) dread the consequence

of the risk, or b) do not understand the risk. Table 2 lists eighteen factors that Slovic, Fischoff and

Lichtenstein identified as likely to increase public perceptions of the risks associated with environmental

hazards.26

Factors that Increase the Subjective Perception of Environmental Risk

Quotes Illustrating Subjective Considerations in Public Reactions to the Pentium Flaw

Things that caused fear of the consequences:

· The risk could lead to a global catastrophe

· The consequence will occur suddenly

· Many people will be exposed to the risk

· There is little that the individual can do to reduce the threat

· The threat is increasing· The customer did not accept the risk

voluntarily· The customer feels personally

threatened

12/26/94 - A LOT of work will have to be recalculated. Safety, professional integrity and liability are some of the primary reasons. No one whose work or reputation is at stake is pleased at all.27

12/26/94 - The flaw, some experts contend, might affect the accuracy of corporate balance sheets or the calculations that banks make to pay interest to depositors.28

12/28/94 - If an "at risk" expression is compiled, the resulting object programme will produce Pentium errors even when run on a 486 - and until the code is recompiled on a "good" Pentium.29

12/30/94 - When the world's Pentiums ship each other flawed data, a natural question to ask is whether the data processing equivalent of a sustainable and uncontrolled chain reaction is possible.30

Things that make the threat uncertain:

· The threat can’t be seen· People might not know they are

exposed· The consequences can occur long

after the first exposure· It is a risk that people haven’t seen

before· Even the scientists don’t fully

understand it

12/01/94 - To put it simply, if your data happens to cluster in the ranges of the "magic numbers" in the buggy CPU, you will get incorrect results 100% of the time; if your data is never in these regions, you will never have to worry. Now who has time to do a thorough, detailed numerical analysis like this on the input data? Nobody.31

12/14/94 - Ok, so since no application operates at the extreme low-rate end of the range, where Intel seems to think almost everyone lives, and since no application operates at the worst-case high-rate end either, where the doomsayers like to congregate, where *does* the typical application work and

22 One way to model the situation facing Intel would be to consider the pressure to be a function of the size of the collectively aware group:

Pressure for Remedy

f E c l pi i in

( ) (4)

where n is the number of end-users in the largest group that is collectively aware of its own existence.25 Scott Willsey, [email protected], posted to Usenet newsgroup comp.sys.intel, January 18, 1994.26 Slovic, P., Fischhoff, B. And Lichtenstein, S., The psychometric study of risk perception, in Risk Evaluation and Management, edited by V.T. Covello and J. Mumpower, Plenum Press, New York, 1986, p536.

14

Page 15: The Case of the Pentium Flaw - Auburn Universitywebhome.auburn.edu/~uzumemv/research/iso9000/pentwp.doc · Web viewIn 1987, Intel’s 80386 chip exhibited problems in multiplication

play? No one knows. Not me, not you, not Intel.32

12/28/94 - This Pentium problem, on the other hand, is insidious because there *isn't* an obvious problem to the user. How many users do you know of who perform all of a complex spreadsheet's calculations on a different system, or on a pocket calculator, to confirm that the system performed them correctly.33

Table 3 - Examples of Subjective Risk Inflation

The considerations shown on the left side of Table 3 while not central to the Internet discussions,

were clearly in evidence in the discussion.34 By raising these concerns, the participants on the Internet

changed the discussion from Intel’s rational, one-on-one negotiation to a conflict that centered on

subjectively perceived risks.

Intellectual Competition

As the debate evolved, Internet participants began to contribute scenarios by which the flaw could

cause more tangible damage. As each scenario was introduced, the expert participants in the Internet

discussion reviewed it and collectively passed judgment on its inherent plausibility. Once a scenario was

deemed plausible, it rapidly became the baseline against which all subsequent scenarios were evaluated.

The result was a form of game:

Most of the noise has all revolved around "what if" scenarios, the frequency of encountering the error and who can come up with the MSB (Most Significant BUG). Anyone not making similar tribal noises gets flamed. It's like a guppy feeding frenzy.35

This game produced a steady stream of findings, some of which are listed in Table 4. As it

continued, the criticism of Intel by net participants was increasingly founded on the latest and worst

news. To make matters worse, non-experts quickly took ownership of the worst-case scenarios as if their

own risks met the stated criteria. Intel ultimately found itself facing tens of thousands of customers, each

of whom assumed that the worst case scenario could apply to them.36

35 Scott Compton, posted to Usenet newsgroup comp.sys.intel, December 26, 1994.

15

Page 16: The Case of the Pentium Flaw - Auburn Universitywebhome.auburn.edu/~uzumemv/research/iso9000/pentwp.doc · Web viewIn 1987, Intel’s 80386 chip exhibited problems in multiplication

Date Technical FindingEffect on Risk Calculations

Oct 30 Dr. Thomas Nicely finds error in eighth significant digit.37 severity > 0frequency > 0loss_rate > 0

Nov 14 Tim Coe lists an example with an error rate of about 60 parts per million.38

loss_rate é

Nov 30 Intel issues its “White Paper”39 loss_rate êDec 3 Dr. Vaughn Pratt reports numerous examples with errors about 10 parts

per million, but gives a scenario by which these particular divisions occur much more frequently than random in typical computer calculations.40

loss_rate é

Dec 12 IBM halts shipment of computers with the Pentium and issues its own study. They effectively increased the communal estimate of the frequency aspect of the loss rate from one in 27,000 years to one in 24 days, a six orders of magnitude increase!

Intel has said that in purely random situations the likelihood of a customer encountering an error is only once in 27,000 years and that off-the-shelf software is not affected. However, IBM tests indicate that common spreadsheet programs, recalculating for 15 minutes a day, could produce Pentium-related errors as often as once every 24 days. For a customer with 500 Pentium-based PCs, this could result in as many as 20 mistakes a day. 41

loss_rate é

Dec 20 Dr. Pratt reports a conversation with Fred Gustavson of IBM that summarizes a plausible scenario for incorrectly calculated numbers to become permanently embedded in financial programs and databases. This meant that the error was contagious and could occur even on non-Pentium processors!42

loss_rate é persistence éconcentration é

Table 4 - Reports of Significant Technical Findings

27 Scott Compton, posted to Usenet newsgroup comp.sys.intel, December 26, 1994.28 Jackson, D. and Van Tassel, J., When the Chips are Down, Time, December 26, 1994, 144(26) p26.29 Phil Payne, Vice Chair, UK Computer Measurement Group, [email protected], posted to Usenet newsgroup comp.sys.intel, December 28, 1994.30 Vaughn Pratt, [email protected], posted to posted to Usenet newsgroup comp.sys.intel, December 30, 1994.34 These concerns can be represented in a model of customer pressure that replaces objectively determined risk factors ( c, l, and p) with subjective, inflated equivalents (C, L and P):

Pressure for Remedy

f E C L Pi i ii

n

1 (5)

37 Original email from Thomas Nicely, [email protected], to Andrew Schulman, [email protected], retrieved from Mathworks Inc. WWW Server at www.mathworks.com.38 Tim Coe, [email protected], posted to Usenet newsgroup comp.sys.intel, November 28, 1994.39 Sharanpani, H.P. and Barton, M.L., ibid.40 Vaughn Pratt, [email protected], posted to Usenet newsgroup comp.sys.intel, December 3, 1994.

16

Page 17: The Case of the Pentium Flaw - Auburn Universitywebhome.auburn.edu/~uzumemv/research/iso9000/pentwp.doc · Web viewIn 1987, Intel’s 80386 chip exhibited problems in multiplication

Moreover, as the game continued, Intel’s “white paper” began to cause more harm than good. In

hindsight, it was probably unreasonable to expect that Intel’s analysis would be able to anticipate the

flood of scenarios that experts on the Internet subsequently proposed. However, as each new scenario

appeared, Intel’s analysis looked less accurate and more self-serving. It was especially badly hurt when

IBM’s analysis staked out a position that was almost at the other end of the risk spectrum. Even though

IBM was the manufacturer of the PowerPC, a competing chip, and was thought to have a conflict of

interest by many industry participants, its analyses were judged on their merits.

Accelerated Science

The final and most significant factor that intensified the Pentium debate was the fact that the

Internet integrated the popular and the scientific discourse on the Pentium flaw. The Internet made it

possible for the scientific and the lay community to interact while a major technical mystery was being

investigated. When this interaction was combined with the Internet’s ability to bring together a

worldwide collection of experts, a profound synergy was created.

Figure 4 illustrates the unusual relationship that drove public response to the Pentium flaw. As the

examples in Table 4 illustrated, the scientists on the net were able to generate a steady stream of analyses

and experiments that fed the growing public reaction. In a series of more than 60 separate messages,

Stanford’s Vaughn Pratt reported on at least 8 different tests or experiments that he had conducted. 43

Several of these were sufficiently detailed that he might well have been able to publish them under

different circumstances. When combined with the output of other researchers, including those at Intel,

Mathworks, IBM, and SAS Institute, the stream of new findings fueled the growing concern among non-

experts.

Figure 4 - The Synergy of Accelerated Science and Subjective Perceptions

41 IBM Halts Shipments of Pentium-Based Personal Computers Based on Company Research, IBM Press Release, IBM Corporation, Somers, N.Y., Dec. 12, 1994

17

Page 18: The Case of the Pentium Flaw - Auburn Universitywebhome.auburn.edu/~uzumemv/research/iso9000/pentwp.doc · Web viewIn 1987, Intel’s 80386 chip exhibited problems in multiplication

The accelerated science represents an entirely new force in shaping customer reactions to product

defects. Companies have faced public hysteria in the past. Justified or not, traditional electronic and print

media have long been capable of whipping up storms of consumer anxiety. The media has fostered public

concern about cellular telephones that could cause cancer, and pickup trucks with exploding gas tanks.

Generally, however, these storms pass quickly unless credible revelations appear periodically to maintain

public interest. In the case of the Pentium flaw, it was the steady stream of credible new scientific

findings from respected technical sources that not only kept the issue alive, but fanned it to a fever pitch.

Planning for Electronically-Aided Customer ReactionIn many ways, Intel’s experience with the Pentium flaw represents a unique set of circumstances.

Intel’s experience was greatly intensified by factors that won’t be present for most other products. First,

the Pentium chip flaw was present in every unit, but was too subtle for most end-users to find. However,

once the flaw was publicized, an end-user could find it in a few minutes without special equipment.

Second, Intel’s customer base was extremely knowledgeable and was accustomed to participating in

electronic networking well before this issue arose.

It would be unwise, therefore, to suggest that Intel’s experience is likely to be soon repeated for

large numbers of firms. Nonetheless, the infrastructure that supported this customer reaction is becoming

more extensive every day. Sooner or later, conditions will again be right for a similar event to occur. As

one participant put it:

It [the Internet] is diverse, distributed, and lacks focus -- until some event grabs its attention. Then experts in the relevant area seem to flock together and attack the problem with a vengeance!44

In a period of less than six weeks, Intel saw its flagship product fall from a position of total market

dominance to become the butt of jokes. Even more damaged was Intel’s reputation for integrity in

dealing with customers. Given the new factors described in the previous section, it is easy to see why Dr.

Grove made the following statement:

"The past few weeks have been deeply troubling. What we view as an extremely minor technical problem has taken on a life of its own," said Dr. Andrew S. Grove, president and chief executive officer. "Our OEM customers and the retail channel have been

44 Bob Morris, Carleton University, [email protected], posted to Usenet newsgroup comp.sys.intel, December 29, 1994.

18

Page 19: The Case of the Pentium Flaw - Auburn Universitywebhome.auburn.edu/~uzumemv/research/iso9000/pentwp.doc · Web viewIn 1987, Intel’s 80386 chip exhibited problems in multiplication

very supportive during this difficult period, and we are very grateful," Dr. Grove said. "To support them and their customers, we are today announcing a no-questions-asked return policy on the current version of the Pentium processor.” 45

Yet, in hindsight, could any reasonable person have expected that Intel would be able to react

differently? Intel applied response mechanisms that had worked well for it in the past. With no precedent

to guide it, Intel could hardly have anticipated such turbulent market dynamics. To put the challenge in

perspective, Figure 5 illustrates the transition that this acceleration produced and which Intel had to

identify, comprehend and implement in less than a month.

Figure 5 - Shifting Models of Perceived Risk

Intel’s supplier-customer relationship changed from a quiet, one-on-one dialog to a raucous group

meeting, reminiscent of a public hearing to discuss a proposed toxic waste dump. As emerging

information technologies such as the Internet bring groups of experts and lay people together to consider

issues such as this, other firms may find that their assumptions about customer relations and support can

be changed overnight. For companies that view customers in terms of the traditional, rational negotiation

model, the result is likely to be just as unpleasant as it was for Intel. The following statement may be

hyperbole now, but the events associated with the Pentium flaw leave the impression that there may come

a day when it is taken for granted:

The not-so-savvy corporate management who still believe in dictating what should be done are probably horrified at the thought of wronged customers being in instant contact with each other, Intel system vendors, and state & federal agencies, which in the Pentium case, were also impacted. These corporate managers are probably terrified by instant communications between Intel customers, journalists, state & federal government agencies.46

Lessons for the FutureIf Intel’s experience is destined to be repeated, the Pentium case may offer a number of important

information for other firms. In particular, other firms might want to consider some of the following

lessons.

19

Page 20: The Case of the Pentium Flaw - Auburn Universitywebhome.auburn.edu/~uzumemv/research/iso9000/pentwp.doc · Web viewIn 1987, Intel’s 80386 chip exhibited problems in multiplication

Don’t Make Defective Products

The events of associated with the Pentium flaw controversy provide the strongest possible

argument why companies should institute aggressive total quality management approaches. Intel’s $475

million charge against earnings represents a significant “cost of quality!” Once a company finds itself in

the middle of a ‘guppy feeding frenzy’, it is too late. The problem with this approach is that even the best

quality system will fail occasionally. Relying only on prevention would leave a company vulnerable if,

despite its best efforts, a serious defect were to sneak through.

Don’t Expect to Keep Secrets

A common approach is to try to prevent news of the product defect from reaching the public. In

effect, this strategy is designed to ensure that the situation follows the traditional model and does not

become an ‘environmental hazard’ situation. The prevalence of this strategy is evident in the frequent use

of out-of-court settlements and confidentiality agreements in product liability cases.

As the information technology becomes more widespread, this strategy will carry much higher

risks. The technologies that make the environmental hazard model more appropriate also tend to make

secrecy less promising. As expertise assembles in electronic interest groups, it is increasingly likely that

various individuals with partial knowledge of a given problem will interact with one another. A customer

who knows a critical fact may encounter a supplier who knows another. By putting their facts together,

they may deduce enough of the problem to present the issue to the electronic community at large.

Finally, the Internet technology is expanding into the home and there are services on the Internet

that allow individuals to participate anonymously in discussion groups. This offers an ideal forum for

potential ‘whistle-blowers’. They can disclose critical facts to interested parties, yet avoid most of the

risk associated with a public disclosure.

Try to Pre-empt Subjective Risks

A third strategy is to try to prevent customers’ subjective risk perceptions from becoming inflated.

To do this, companies must develop strategies and tactics to attack the two main dimensions of inflated

risk perceptions -- the fear of dreaded consequences and the fear of unknown risks. McNeil Laboratories’

20

Page 21: The Case of the Pentium Flaw - Auburn Universitywebhome.auburn.edu/~uzumemv/research/iso9000/pentwp.doc · Web viewIn 1987, Intel’s 80386 chip exhibited problems in multiplication

response to the Tylenol cyanide poisoning crimes provides a model for reducing subjective risk

perception. When McNeil Laboratories announced the recall of all Tylenol packages, it effectively

eliminated the public’s subjective fears. In the process, it removed the dreaded consequences and

associated uncertainty from the public’s radar screen. When it eventually reintroduced Tylenol in safer

packaging, there was little subjective fear to overcome.

Don’t Second Guess Customers about their Perception of Risk

One of Intel’s worst mistakes was its decision to analyze the defect’s impact on behalf of its

customers. By basing its nondisclosure decision on this analysis, Intel was vulnerable when the Internet

community began hunting for the ‘most significant bug’. Intel’s white paper tried to tell customers what

their risks would be. Once the Internet community began to calculate their own risks and arrived at a

different answer, Intel’s response appeared both arrogant and self-serving. No company, however

resourceful, is likely to match the output that is produced by the Internet’s “accelerated science.” The

electronic community can assemble too many skilled people with different perspectives and expertise. If

there is anything that the company’s analyses have overlooked, a mobilized electronic community is

likely to find it. Then, even small discrepancies will undermine the company’s credibility.

Prepare for the Event

The Intel experience shows that, under the right circumstances, the electronic community can

respond with dramatic speed. When this happens, the affected company will have little or no time to craft

a response. To cope with the situation, the company will have to have a ready strategy that has been

worked out in advance. At the very least, companies will have to be brutally honest with themselves

about the possible consequences of any mistake or defect that might attract the interest of the electronic

community. This will include finding answers to the following questions:

· Are there interest groups in the electronic community that might serve as the nucleus for an intense

public reaction?

· Do these groups attract experts who could conduct independent investigations of the product?

· Is the product susceptible to the subjective fears and perceptions in Table 3? What are the

consequences of possible defects? How quickly will experts understand them?

21

Page 22: The Case of the Pentium Flaw - Auburn Universitywebhome.auburn.edu/~uzumemv/research/iso9000/pentwp.doc · Web viewIn 1987, Intel’s 80386 chip exhibited problems in multiplication

· Has the company considered what effects the potential defect might have on customer activities? Has

the supplier asked its customers what the risks might be?

Future events will undoubtedly recommend additional questions to this list. However, as the Intel

experience shows, there are already good reasons for providers of products and services to pay attention

to the demands that this new environment creates.

ConclusionThis case illustrates a new factor that must be taken into account by managers in planning their

relationships with their customers. The Internet and similar electronic networking technologies provide

vast and rapidly growing exposure for any issue that captures the electronic community’s interest. If the

object of that interest is a product flaw, customers’ subjective perception of risk and their ability to

mobilize and assert that perception take on extraordinary importance. Companies must understand the

new and fundamental shifts that can occur and factor those possibilities into their strategic and tactical

planning.

References

12 Fortune, January 16, 1995, p15.20 Robert Zakon, [email protected], Hobbes Internet Timeline v1.4, last modified September 5, 1994, retrieved from the Internic ftp server at ftp.internic.net.31 Jim Pangburn, [email protected], Fermi National Accelerator Lab, posted to Usenet newsgroup comp.sys.intel, December 1, 1994.32 Vaughn Pratt, [email protected], posted to posted to Usenet newsgroup comp.sys.intel, December 14, 1994.33 Terry Kennedy, Operations Manager, St. Peter’s College, NJ, [email protected], posted to Usenet newsgroup comp.sys.intel, December 28, 1994.36 This pressure on Intel began to resemble the following:

Pressure for Remedy f n MAX E C L Pi i i i[ ( )] (6)

42 Vaughn Pratt, [email protected], posted to Usenet newsgroup comp.sys.intel, December 20, 1994.43 From Vaughn Pratt’s archive of postings to comp.sys.intel, retrieved from the WWW server at boole.stanford.edu, January 8, 1995.45 Intel Press Release, December 20, 1994, posted on Intel WWW home page at www.intel.com. 46 Jerry Leslie, [email protected], posted to Usenet newsgroup comp.sys.intel, December 30, 1994.

22