HP 2007 Annual Report Download - page 41

Download and view the complete annual report

Please find page 41 of the 2007 HP annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 180

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180

any security vulnerabilities of our products. As a result, we could incur significant expenses in addressing problems created
by security breaches of our network and any security vulnerabilities of our products. Moreover, we could lose existing or
potential customers for information technology outsourcing services or other information technology solutions or incur
significant expenses in connection with our customers’ system failures or any actual or perceived security vulnerabilities in
our products. In addition, sophisticated hardware and operating system software and applications that we produce or procure
from third parties may contain defects in design or manufacture, including “bugs” and other problems that could
unexpectedly interfere with the operation of the system. The costs to us to eliminate or alleviate security problems, bugs,
viruses, worms, malicious software programs and security vulnerabilities could be significant, and the efforts to address these
problems could result in interruptions, delays, cessation of service and loss of existing or potential customers that may
impede our sales, manufacturing, distribution or other critical functions.
Portions of our IT infrastructure also may experience interruptions, delays or cessations of service or produce errors in
connection with systems integration or migration work that takes place from time to time. We may not be successful in
implementing new systems and transitioning data, including our current project to consolidate all of our worldwide IT data
centers into six centers, which could cause business disruptions and be more expensive, time consuming, disruptive and
resource-intensive. Such disruptions could adversely impact our ability to fulfill orders and interrupt other processes. Delayed
sales, lower margins or lost customers resulting from these disruptions have adversely affected in the past, and in the future
could adversely affect, our financial results, stock price and reputation.
Any failure by us to manage, complete and integrate acquisitions, divestitures and other significant transactions successfully
could harm our financial results, business and prospects and may result in financial results that are different than expected.
As part of our business strategy, we frequently acquire complementary companies or businesses, divest non-core
businesses or assets, enter into strategic alliances and joint ventures and make investments to further our business
(collectively, “business combination and investment transactions”). In order to pursue this strategy successfully, we must
identify suitable candidates for and successfully complete business combination and investment transactions, some of which
may be large and complex, and manage post-closing issues such as the integration of acquired companies or employees.
Integration and other risks associated with business combination and investment transactions can be more pronounced for
larger and more complicated transactions or if multiple transactions are integrated simultaneously. If we fail to identify and
complete successfully business combination and investment transactions that further our strategic objectives, we may be
required to expend resources to develop products and technology internally, we may be at a competitive disadvantage or we
may be adversely affected by negative market perceptions, any of which may have a material adverse effect on our revenue,
gross margin and profitability.
Integration issues are complex, time-consuming and expensive and, without proper planning and implementation, could
significantly disrupt our business. The challenges involved in integration include:
combining product offerings and entering into new markets in which we are not experienced;
convincing customers and distributors that the transaction will not diminish client service standards or business
focus, preventing customers and distributors from deferring purchasing decisions or switching to other suppliers
(which could result in our incurring additional obligations in order to address customer uncertainty), minimizing
sales force attrition and coordinating sales, marketing and distribution efforts;
consolidating and rationalizing corporate IT infrastructure, which may include multiple legacy systems from various
acquisitions and integrating software code;
27