Computer Associates 2006 Annual Report Download - page 42

Download and view the complete annual report

Please find page 42 of the 2006 Computer Associates annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 172

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172

Our customers’ data centers and IT environments may be subject to hacking or other breaches, harming the
market perception of the effectiveness of our products.
If an actual or perceived breach of our customers’ network security occurs, allowing access to our customers’ data
centers or other parts of their IT environments, regardless of whether the breach is attributable to our products, the
market perception of the effectiveness of our products could be harmed. Because the techniques used by computer
hackers to access or sabotage networks change frequently and may not be recognized until launched against a target,
we may be unable to anticipate these techniques. Alleviating any of these problems could require significant
expenditures of our capital and diversion of our resources from development efforts. Additionally, these efforts
could cause interruptions, delays or cessation of our product licensing, or modification of our software, which could
cause us to lose existing or potential customers, adversely affecting our business, financial condition, operating
results and cash flow.
Our software products, data centers and IT environments may be subject to hacking or other breaches,
harming the market perception of the effectiveness of our products.
Although we believe we have sufficient controls in place to prevent intentional disruptions, we expect to be an
ongoing target of attacks specifically designed to impede the performance of our products. Similarly, experienced
computer programmers, or hackers, may attempt to penetrate our network security or the security of our data centers
and IT environments and misappropriate proprietary information or cause interruptions of our services. If these
intentionally disruptive efforts are successful, our activities could be adversely affected, our reputation and future
sales could be harmed and our business, financial condition, operating results and cash flow could be adversely
affected.
General economic conditions may lead our customers to delay or forgo technology upgrades which could
adversely affect our business, financial condition, operating results and cash flow.
Our products are designed to improve the productivity and efficiency of our customers’ information processing
resources. However, a general slowdown in the world economy or a particular region, particularly with respect to
discretionary spending for software, could cause customers to delay or forgo decisions to license new products, to
upgrade their existing environments or to acquire services, which could adversely affect our business, financial
condition, operating results and cash flow.
The use of third-party microcode could negatively impact our product development.
We anticipate ongoing use of microcode or firmware provided by hardware manufacturers. Microcode and
firmware are essentially software programs embedded in hardware and are, therefore, less flexible than other types
of software. We believe that such continued use will not have a significant impact on our operations and that our
products will remain compatible with any changes to such code. However, there can be no assurance that future
technological developments involving such microcode will not have an adverse impact on our business, financial
condition, operating results and cash flow.
We may lose access to third-party operating systems which would adversely affect future product development.
In the past, certain of our licensees using proprietary operating systems were furnished with “source code”, which
makes the operating system understandable to programmers; “object code”, which directly controls the hardware;
and other technical documentation. Since the availability of source code facilitated the development of systems and
applications software, which must interface with the operating systems, independent software vendors, such as us,
were able to develop and market compatible software. Microsoft, IBM and other vendors have a policy of restricting
the use or availability of the source code for some of their operating systems. To date, this policy has not had a
material effect on us. Some companies, however, may adopt more restrictive policies in the future or impose
unfavorable terms and conditions for such access. These restrictions may, in the future, result in higher research and
development costs for us in connection with the enhancement and modification of our existing products and the
development of new products. Although we do not expect that such restrictions will have this adverse effect, there
22