Autodesk 2010 Annual Report Download - page 118

Download and view the complete annual report

Please find page 118 of the 2010 Autodesk annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 204

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204

We rely on third party technologies and if we are unable to use or integrate these technologies, our product
and service development may be delayed and our operating results negatively impacted.
We rely on certain software that we license from third parties, including software that is integrated with
internally developed software and used in our products to perform key functions. These third-party software
licenses may not continue to be available on commercially reasonable terms, and the software may not be
appropriately supported, maintained or enhanced by the licensors. The loss of licenses to, or inability to support,
maintain and enhance any such software could result in increased costs, or in delays or reductions in product
shipments until equivalent software can be developed, identified, licensed and integrated, which would likely
harm our business.
Disruptions with licensing relationships and third party developers could adversely impact our business.
We license certain key technologies from third parties. Licenses may be restricted in the term or the use of
such technology in ways that negatively affect our business. Similarly, we may not be able to obtain or renew
license agreements for key technology on favorable terms, if at all, and any failure to do so could harm our business.
Our business strategy has historically depended in part on our relationships with third-party developers who
provide products that expand the functionality of our design software. Some developers may elect to support
other products or may experience disruption in product development and delivery cycles or financial pressure
during periods of economic downturn. In particular markets, such disruption have in the past, and would likely in
the future, negatively impact these third-party developers and end users, which could harm our business.
Additionally, technology created by outsourced product development, whether outsourced to third parties or
developed externally and transferred to us through business or technology acquisitions, have certain additional
risks such as effective integration into existing products, adequate transfer of technology know-how and
ownership and protection of transferred intellectual property.
As a result of our strategy of partnering with other companies for product development, our product delivery
schedules could be adversely affected if we experience difficulties with our product development partners.
We partner with certain independent firms and contractors to perform some of our product development
activities. We believe our partnering strategy allows us to, among other things, achieve efficiencies in developing
new products and maintaining and enhancing existing product offerings. Our partnering strategy creates a
dependency on such independent developers. Independent developers, including those who currently develop
products for us in the U.S. and throughout the world, may not be able or willing to provide development support
to us in the future. In addition, use of development resources through consulting relationships, particularly in
non-U.S. jurisdictions with developing legal systems, may be adversely impacted by, and expose us to risks
relating to, evolving employment, export and intellectual property laws. These risks could, among other things,
expose our intellectual property to misappropriation and result in disruptions to product delivery schedules.
We rely on third-parties to provide us with a number of operational services, including hosting and delivery,
certain of our customer services operations as well as some of our operations; any interruption or delay in
service from these third parties, breaches of security or privacy, or failures in data collection could expose us
to liability, harm our reputation and adversely impact our financial performance.
We rely on hosted computer services from third parties for services that we provide our customers and
computer operations for our internal use. As we gather customer data and host certain customer data in third-
party facilities, a security breach could compromise the integrity or availability of customer data. In addition, our
operations could be negatively affected in the event of a security breach, and we could be subject to the loss or
theft of confidential or proprietary information, including source code. Unauthorized access to this data may be
obtained through break-ins, breach of our secure network by an unauthorized party, employee theft or misuse, or
other misconduct.
24