Citrix 2009 Annual Report Download - page 34

Download and view the complete annual report

Please find page 34 of the 2009 Citrix annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 138

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138

expenses defending against such allegations. If our defenses were not successful, we could be subject to
significant damages, enjoined from the distribution of our products that contained the open source software, and
required to comply with the foregoing conditions, which could disrupt the distribution and sale of some of our
products. In addition, if we combine our proprietary software with open source software in a certain manner,
under some open source licenses we could be required to release the source code of our proprietary software,
which could substantially help our competitors develop products that are similar to or better than ours.
In addition to risks related to license requirements, usage of open source software can lead to greater risks
than use of third-party commercial software, as open source licensors generally do not provide warranties or
assurance of title or controls on the origin of the software.
If open source software programmers, many of whom we do not employ, do not continue to develop and
enhance the open source Xen hypervisor, we may be unable to develop new XenServer products, adequately
enhance our existing XenServer products or meet customer requirements for innovation, quality and price of
these Xen products.
We rely to a significant degree on an informal community of independent open source software
programmers to develop and enhance the Xen hypervisor. A relatively small group of software engineers, many
of whom are not employed by us, are primarily responsible for the development and evolution of the Xen
hypervisor, which is the heart of the XenServer virtualization product. If these programmers fail to adequately
further develop and enhance open source technologies, we would have to rely on other parties to develop and
enhance the Xen hypervisor or we would need to develop and enhance the Xen hypervisor with our own
resources. We cannot predict whether further developments and enhancements to these technologies would be
available from reliable alternative sources. In either event, our development expenses could be increased and our
product release and upgrade schedules could be delayed. Moreover, if third-party software programmers fail to
adequately further develop and enhance the Xen hypervisor, the development and adoption of this virtual server
technology could be stifled and our products, including XenServer, could become less competitive. Delays in
developing, completing or shipping new or enhanced products could result in delayed or reduced revenue for
those products and could also adversely affect customer acceptance of those offerings.
We are subject to risks associated with our strategic and technology relationships.
Our business depends on strategic and technology relationships. We cannot assure you that those
relationships will continue in the future.
We rely on strategic or technology relationships with companies such as Microsoft, Wyse Technologies,
Dell, Hewlett-Packard Company, Fujitsu Limited and others. We depend on the entities with which we have
strategic or technology relationships to successfully test our products, to incorporate our technology into their
products and to market and sell those products. We cannot assure you that we will be able to maintain our current
strategic and technology relationships or to develop additional strategic and technology relationships. If any
entities in which we have a strategic or technology relationship are unable to incorporate our technology into
their products or to market or sell those products, our business, results of operations and financial condition could
be materially adversely affected.
If we lose access to third-party licenses, releases of our products could be delayed.
We believe that we will continue to rely, in part, on third-party licenses to enhance and differentiate our
products. Third-party licensing arrangements are subject to a number of risks and uncertainties, including:
undetected errors or unauthorized use of another person’s code in the third party’s software;
disagreement over the scope of the license and other key terms, such as royalties payable;
infringement actions brought by third-party licensees; and
termination or expiration of the license.
26