From Wikipedia, the free encyclopedia
Jump to navigation Jump to search

Super Micro Computer, Inc
IndustryInformation technology
Founded1993; 29 years ago (1993)
  • Charles Liang (President, CEO, Chairman of the Board)
  • Sara Liu (Sr. Vice President of Operations, Treasurer and Director)
United States Edit this on Wikidata
Key people
  • David Weigand (Chief Financial Officer)
  • Don Clegg (Senior Vice President of Worldwide Sales)
  • George Kao (Senior Vice President of Operations)
RevenueIncrease $3.5 billion (2020)

Super Micro Computer, Inc, doing business as Supermicro, is an information technology company based in San Jose, California. Supermicro's headquarters are located in Silicon Valley, with a manufacturing space in the Netherlands and a Science and Technology Park in Taiwan.

Founded by Charles Liang, Wally Liaw and Sara Liu on November 1, 1993, Supermicro specializes in servers, storage, blades, rack solutions, networking devices, server management software and high-end workstations for data center, cloud computing, enterprise IT, big data, high-performance computing (HPC), and embedded markets.[1][2][3] Supermicro is also a manufacturer of high-end motherboards.[4]

In 2016, the company deployed thousands of servers into a single data center[5] and was ranked the 18th fastest growing company on Fortune's Top 100 list of the world’s largest US publicly traded companies in 2016 and the fastest growing IT infrastructure company.


San Jose Mercury News headquarters in 2009.

Green Computing Park[edit]

In 2014, the GCIC Center Tokyo Institute of Technology’s TSUBAME-KFC supercomputer, from Supermicro, was ranked first on the Green 500 list.[6]

In September 2014, Supermicro moved its corporate headquarters to the former Mercury News headquarters in North San Jose, California along Interstate 880, naming the campus Supermicro Green Computing Park. In 2017, the company completed a new 182,000 square-foot manufacturing building on the campus.[7][8] The main building was designed by Warren B. Heid in the modernist style, which was common for commercial buildings in the 1960s, and built by the Carl N. Swenson Company. During the time it served as the Mercury News's headquarters, the main building was expanded from 185,000-square-foot (17,200 m2) to 312,000 square feet (29,000 m2).[9] Until recently, a bronze sculpture, Chandelier by John Jagger, hung from the ceiling of an elliptical loggia at the entrance. The loggia is distinguished by a series of metal columns and the moat that surrounds it.[10][11]

Allegations of compromised hardware[edit]

On October 4, 2018, Bloomberg Businessweek published a report, citing unnamed corporate and governmental sources, which claimed that the Chinese People's Liberation Army had forced Supermicro's Chinese sub-contractors to add microchips with hardware backdoors to its servers. The report claimed that the compromised servers had been sold to U.S. government divisions (including the CIA and Department of Defense) and contractors and at least 30 commercial clients (including Apple).[12] The backdoor was reportedly discovered by Amazon during a review of Elemental Technologies, a Supermicro client that Amazon would acquire in 2015.[12][13][14]

Supermicro denied the report, stating that they had not been contacted by government agencies and were unaware of any investigation. Amazon and Apple also denied the Bloomberg claims, and the article has faced skepticism over its validity.[15][13][16] One of its named sources stated that the attack detailed seemed theoretical and that he "couldn't rationalize in [his] head that this is the approach that anyone could take."[17] FBI director Christopher A. Wray, in testimony before the U.S. Senate Homeland Security and Governmental Affairs Committee, commented, "Be careful what you read."[18] On October 22 Supermicro announced that "despite the lack of any proof that a malicious hardware chip exists" it was reviewing its motherboards for potential spy chips in response to the article.[19]

In 2017, the company's (at the time) newly-constructed manufacturing facility in San Jose was designed to meet LEED gold certification.[7]

On October 9, 2018, Bloomberg issued a second report, alleging that Supermicro-manufactured datacenter servers of an unnamed U.S. telecom firm had been compromised by a hardware implant on an Ethernet connector. The report cited former Israel intelligence officer Yossi Appleboum, who had analyzed and documented the implant. The Bloomberg report did not connect these findings to the previous report.[20][21] Appleboum has since said that his company had found such implants " different vendors, not just Supermicro..."[22]

Supermicro filed a letter with the Securities and Exchange Commission stating that it was "confident" that "no malicious hardware chip had been implanted" during the manufacture of its motherboards. It was also reported that the chief executives of Apple and Amazon Web Services rejected claims about the reports regarding hardware backdoors in Supermicro servers.[23]

In February 2021, Bloomberg Business reported that Supermicro had been compromised since 2011, U.S intelligence keeping it a secret to gather intelligence about China and warning only a small number of potential targets.[24]

Joint venture with FiberHome[edit]

On December 11, 2021, the Dutch radio program Argos aired an episode about European investments in China and how those investments are used to suppress the Uyghur ethnic group in the province of Xinjiang. One of the companies involved is Super Micro Computer B.V., a subsidiary of Supermicro. In 2016, Super Micro Computer B.V. started a joint venture with Fiberhome Telecommunication Technologies Co., Ltd., a Chinese company that is on a U.S. government blacklist for alleged involvement in human rights violations and the suppression, imprisonment and spying on Uyghurs in Xinjiang.[25][26] In November 2021 this joint venture won a contract for supplying servers to Xinjiang Production and Construction Corps, also known as Xinjiang Bingtuan, for 'public safety purposes'.[27] This Chinese government body is associated with the suppression of Uyghurs and the construction of a surveillance system that is being deployed in the Xinjiang province.[28]

Accusations of support for Russian censorship[edit]

In 2021, the Washington Post together with Russian dissident authors Andrei Soldatov and Irina Borogan, accused the company of supplying 30 servers to the Moscow control center for Internet censorship in Russia.[29]


  1. ^ Vance, Ashlee (November 23, 2008). "Super Micro Computer: A One-Man, or at Least One-Family, Powerhouse". New York Times. Retrieved September 2, 2017.
  2. ^ Bailey, Brandon (October 15, 2010). "Charles Liang, founder, Super Micro Computer". Mercury News. Retrieved September 2, 2017.
  3. ^ Morgan, Timothy Prickett (September 12, 2017). "Surfing On Tech Waves With Supermicro". The Next Platform. Retrieved September 2, 2017.
  4. ^ Cutress, Dr. Ian (May 13, 2020). "The Supermicro H11DSi Motherboard Mini-Review: The Sole Dual EPYC Solution". Retrieved September 6, 2021.
  5. ^ Moss, Sebastian (February 7, 2017). "Supermicro puts 30,000+ blades in [Intel's] PUE 1.06 data center". Retrieved September 2, 2017.
  6. ^ "Supermicro Supercomputer Ranked #1 in Green500". Tom's IT Pro. December 4, 2013. Retrieved October 12, 2017.
  7. ^ a b Staff, BF (March 8, 2017). "Supermicro Expands Silicon Valley Manufacturing HQ". Business Facilities. Retrieved October 12, 2017.
  8. ^ "Super Micro opens 182000 square foot expansion near San Jose HQ". Silicon Valley Business Journal. Retrieved October 5, 2018.
  9. ^ "History of 750 Ridder Park Drive". 750 Ridder Park Drive. History San José.
  10. ^ "The Loggia Pendant". 750 Ridder Park Drive. History San José. Retrieved June 18, 2018.
  11. ^ Pizarro, Sal (September 26, 2014). "Pizarro: A bittersweet farewell to the old Mercury News building". San Jose Mercury News. Bay Area News Group.
  12. ^ a b Robertson, Jordan; Riley, Michael (October 4, 2018). "The Big Hack: How China Used a Tiny Chip to Infiltrate U.S. Companies". Bloomberg Businessweek. Archived from the original on October 4, 2018.
  13. ^ a b Osborne, Charlie. "Apple, Amazon deny claims Chinese spies implanted backdoor chips in company hardware: report". ZDNet. Retrieved October 4, 2018.
  14. ^ "Chinese spies reportedly inserted microchips into servers used by Apple, Amazon, and others". The Verge. Retrieved October 4, 2018.
  15. ^ "The Big Hack: Statements From Amazon, Apple, Supermicro, and the Chinese Government". Bloomberg News. October 4, 2018. Retrieved October 4, 2018.
  16. ^ "Bloomberg stands by Chinese chip story as Apple, Amazon ratchet up denials". Ars Technica. Retrieved October 7, 2018.
  17. ^ Osborne, Charlie. "Security researcher source in Supermicro chip hack report casts doubt on story". ZDNet. Retrieved October 9, 2018.
  18. ^
  19. ^ "Supermicro says it's hunting for Chinese spy chips on motherboards". South China Morning Post. October 23, 2018. Retrieved October 23, 2018.
  20. ^ "New evidence of hacked Supermicro hardware found in U.S. telecom". Retrieved October 9, 2018.
  21. ^ "A new twist in Bloomberg's 'spy chip' report implicates U.S. telecom". TechCrunch. Retrieved October 9, 2018.
  22. ^ Kennedy, Patrick (October 9, 2018). "Yossi Appleboum on How Bloomberg is Positioning His Research Against Supermicro". STH. Retrieved October 11, 2018.
  23. ^ Prang, Allison (October 22, 2018). "Super Micro Computer Denies Malicious Chip Report, Says It Is Conducting Review Anyway". Wall Street Journal. ISSN 0099-9660. Retrieved October 24, 2018.
  24. ^ Robertson, Jordan; Riley, Michael (February 12, 2021). "The Long Hack: How China Exploited a U.S. Tech Supplier". Bloomberg Businessweek. Retrieved February 17, 2021.
  25. ^ "Technologie-overdracht aan China". Argos (in Dutch). Retrieved December 12, 2021.
  26. ^ "Addition of Certain Entities to the Entity List; Revision of Existing Entries on the Entity List". Federal Register. Retrieved December 12, 2021.
  27. ^ "Xinjiang Production and Construction Corps Public Security "Internet + Government Service" Platform Project Server Equipment Procurement". Retrieved December 12, 2021.
  28. ^ Eikelenboom, Siem; Bruijn, Annebelle de (September 8, 2021). "Omstreden studies van Erasmus MC-onderzoeker met dna Oeigoeren worden teruggetrokken". Follow the Money (in Dutch). Retrieved December 12, 2021.
  29. ^

External links[edit]