Autodesk 2016 Annual Report Download - page 92

Download and view the complete annual report

Please find page 92 of the 2016 Autodesk annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 196

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196

2016 Form 10-K 20
inadequate local infrastructure;
greater difficulty in protecting intellectual property;
• software piracy; and
other factors beyond our control, including popular uprisings, terrorism, war, natural disasters, and diseases.
Some of our business partners also have international operations and are subject to the risks described above. Even
if we are able to successfully manage the risks of international operations, our business may be adversely affected if our
business partners are not able to successfully manage these risks.
Existing and increased competition and rapidly evolving technological changes may reduce our revenue and profits.
The software industry has limited barriers to entry, and the availability of computing devices with continually
expanding performance at progressively lower prices contributes to the ease of market entry. The industry is presently
undergoing a platform shift from the personal computer to cloud and mobile computing. This shift further lowers barriers
to entry and poses a disruptive challenge to established software companies. The markets in which we compete are
characterized by vigorous competition, both by entry of competitors with innovative technologies and by consolidation of
companies with complementary products and technologies. In addition, some of our competitors in certain markets have
greater financial, technical, sales and marketing, and other resources. Furthermore, a reduction in the number and
availability of compatible third-party applications, or our inability to rapidly adapt to technological and customer
preference changes, including those related to cloud computing, mobile devices, and new computing platforms, may
adversely affect the sale of our products. Because of these and other factors, competitive conditions in the industry are
likely to intensify in the future. Increased competition could result in price reductions, reduced net revenue and profit
margins and loss of market share, any of which would likely harm our business.
We are exposed to fluctuations in currency exchange rates that could negatively impact our financial results and cash
flows.
Because we conduct a substantial portion of our business outside the U.S. and we make certain business and
resource decisions based on assumptions about foreign currency, we face exposure to adverse movements in foreign
currency exchange rates. These exposures may change over time as business practices evolve and economic conditions
change, and they could have a material adverse impact on our financial results and cash flows.
We use derivative instruments to manage a portion of our cash flow exposure to fluctuations in foreign currency
exchange rates. As part of our risk management strategy, we use foreign currency contracts to manage a portion of our
exposures of underlying assets, liabilities, and other obligations, which exist as part of our ongoing business operations.
These foreign currency instruments have maturities that extend for one to twelve months in the future, and provide us
with some protection against currency exposures. However, our attempts to hedge against these risks may not be
completely successful, resulting in an adverse impact on our financial results.
The fluctuations of currencies in which we conduct business can both increase and decrease our overall revenue and
expenses for any given fiscal period. Although our foreign currency cash flow hedge program extends beyond the current
quarter in order to reduce our exposure to foreign currency volatility, we do not attempt to completely mitigate this risk,
and in any case, will incur transaction fees in adopting such hedging programs. Such volatility, even when it increases our
revenues or decreases our expenses, impacts our ability to accurately predict our future results and earnings.
A breach of security in our products, services or computer systems may compromise the integrity of our products or
services, harm our reputation, create additional liability and adversely impact our financial results.
We make significant efforts to maintain the security and integrity of our source code and computer systems. The
risk of a security breach or disruption, particularly through cyber attack or cyber intrusion, including by computer
hackers, foreign governments and cyber terrorists, has increased as the number, intensity and sophistication of attempted
attacks and intrusions from around the world have increased. These threats include but are not limited to identity theft,
unauthorized access, DNS attacks, wireless network attacks, viruses and worms, advanced persistent threat (APT),
application centric attacks, peer-to-peer attacks, phishing, backdoor trojans and distributed denial of service (DDoS)
attacks. Any of the foregoing could attack our products, services or computer systems. Despite significant efforts to create
2016 Annual Report