Computer Associates 2006 Annual Report Download - page 30

Download and view the complete annual report

Please find page 30 of the 2006 Computer Associates annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 172

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172

Application Development systems these solutions enable customers to build custom business applications
in a variety of environments using technology-neutral business process definitions, and to test and deploy
those applications across an evolving IT infrastructure.
Enterprise Reporting and Information Management systems these solutions enable customers to efficiently
and rapidly report on and process business information.
Other solutions these solutions include a wide variety of tools and utilities to optimize the IT environment.
Office of the CTO
The Office of the CTO drives technology strategy across all of the business units and leads research and
development for emerging technologies.
Common Technologies — our Foundation Services and Management Database are technologies common
across CA products that enable our products to work together easily and also to work with other vendors’
management software products to deliver an IT environment that is simpler, more secure, less costly to
maintain, and more agile.
Research — CA Labs drives research in advanced technologies related to management and security by
performing research internally and working with major universities and standard setting bodies. Current areas
of focus include securing and managing on-demand computing, grids, virtualized environments, and service-
oriented architectures.
Emerging Technology Incubator — the Office of the CTO also runs incubator projects to create and bring to
market management and security solutions that enable customer adoption of new technologies. Current
incubation projects focus on management of wireless networks, smart phones, and radio frequency
identification technologies.
Architecture the Office of the CTO is chartered with ensuring that all CA products are implemented
according to a proven and consistent technical architecture. Consistent architecture accelerates our support for
key industry advances, such as the evolution of Service Oriented Architectures and Grid Computing and
Virtualization. Having unified technical architecture also promotes greater product quality and integration
while lowering development costs.
Technological Expertise
Certain aspects of our products and technology are proprietary. We rely on U.S. and foreign intellectual property
laws, including patent, copyright, trademark, and trade secret laws to protect our proprietary rights. As of March 31,
2006, we have received approximately 600 patents worldwide and approximately 1,900 patent applications are
pending worldwide for our technology. However, the extent and duration of protection given to different types of
intellectual property rights vary under different countries’ legal systems. Generally, our U.S. and foreign patents
expire at various times over the next twenty years. While the durations of our patents vary, we believe that the
durations of our patents are adequate. The expiration of any of our patents will not have a material adverse effect on
our business. In some countries, full-scale intellectual property protection for our products and technology may be
unavailable, and/or the laws of other jurisdictions may not protect our proprietary technology rights to the same
extent as the laws of the United States. We also maintain contractual restrictions in our agreements with customers,
employees, and others to protect our intellectual property rights. In addition, we occasionally license software and
technology from third parties, including some competitors, and incorporate them into our own software products.
The source code for our products is protected both as trade secrets and as copyrighted works. Some of our customers
are beneficiaries of a source code escrow arrangement that enables the customer to obtain a contingent, future-
limited right to access our source code. If our source code is accessed, the likelihood of misappropriation or other
misuse of our intellectual property may increase.
We are not aware that our products or technologies infringe on the proprietary rights of third parties. Third parties,
however, may assert infringement claims against us with respect to our products, and any such assertion may require
us to enter into royalty arrangements or result in costly and time-consuming litigation. Although we have a number
10