Computer Associates 2005 Annual Report Download - page 78

Download and view the complete annual report

Please find page 78 of the 2005 Computer Associates annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 166

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166

Table of Contents
example, we rely on “shrink-wrap” or “click-on” licenses which may be unenforceable in whole or in part in some jurisdictions in which
we operate. In addition, patents we have obtained may be circumvented, challenged, invalidated, or designed around by other companies.
Our inability to adequately protect our intellectual property for these or other reasons could adversely affect our business, financial
condition, operating results, and cash flow. Refer to Item 1, “Business – Proprietary Rights,” for additional information.
We may become dependent upon large transactions and the failure to close such transactions could adversely affect our business,
financial condition, operating results, and cash flow.
We have historically been dependent upon large-dollar enterprise transactions with individual customers. As a result of the flexibility
afforded by our Business Model, we anticipate that there will be fewer of these transactions in the future. There can be no assurances,
however, that we will not be reliant on large-dollar enterprise transactions in the future, and the failure to close such transactions could
adversely affect our business, financial condition, operating results, and cash flow.
Our customers’ data centers and IT environments may be subject to hacking or other breaches harming the market perception of the
effectiveness of our products.
If an actual or perceived breach of our customer’ s network security occurs, allowing access to our customers’ data centers or other parts
of their IT environments, regardless of whether the breach is attributable to our products, the market perception of the effectiveness of
our products could be harmed. Because the techniques used by computer hackers to access or sabotage networks change frequently and
may not be recognized until launched against a target, we may be unable to anticipate these techniques. Alleviating any of these
problems could require significant expenditures of our capital and diversion of our resources from development efforts. Additionally,
these efforts could cause interruptions, modifications, delays or cessation of our product licensing, which could cause us to lose existing
or potential customers adversely affecting our business, financial condition, operating results, and cash flow.
Our software products, data centers and IT environments may be subject to hacking or other breaches harming the market perception of
the effectiveness of our products.
Although we believe we have sufficient controls in place to prevent intentional disruptions, we expect to be an ongoing target of attacks
specifically designed to impede the performance of our products. Similarly, experienced computer programmers, or hackers, may
attempt to penetrate our network security or the security of our data centers and IT environments and misappropriate proprietary
information or cause interruptions of our services. If these intentionally disruptive efforts are successful, our activities could be
adversely affected, our reputation and future sales could be harmed, and our business, financial condition, operating results, and cash
flow could be adversely affected.
General economic conditions may lead our customers to delay or forgo technology upgrades which could adversely affect our business,
financial condition, operating results, and cash flow.
Our products are designed to improve the productivity and efficiency of our customers’ information processing resources. However, a
general slowdown in the world economy or a particular region could cause customers to delay or forgo decisions to license new products,
to upgrade their existing environments, or to acquire services, particularly with respect to discretionary spending in the software industry,
which could adversely affect our business, financial condition, operating results, and cash flow.
The use of third-party microcode could negatively impact our product development.
We anticipate ongoing use of microcode or firmware provided by hardware manufacturers. Microcode and firmware are essentially
software programs in hardware form and are, therefore, less flexible than other types of software. We believe that such continued use
will not have a significant impact on our operations and that our products will remain compatible with any changes to such code.
However, there can be no assurance that future technological developments involving such microcode will not have an adverse impact
on our business, financial condition, operating results, and cash flow.
The software business is marked by easy entry and large, entrenched businesses which may lead to increased competition and which
could have a material adverse effect on our business, financial condition, operating results, and cash flow.
Many companies with whom we compete, including IBM, Sun Microsystems, HP, and other large computer manufacturers, have
substantial resources, a larger installed base of customers in any particular market niche, as well as the ability to develop and market
software programs similar to and competitive with the products offered by us. Additionally, these producers can bundle hardware,
software, and services together, which is a disadvantage for us since we do not provide hardware and have far fewer services offerings.
Competitive products are also offered by numerous independent software companies that specialize in specific aspects of the highly
fragmented software industry. Some, like Microsoft, Oracle, and SAP, are the leading developers and vendors in their specialized
markets. In addition, new
41