Tucows 2014 Annual Report Download - page 49

Download and view the complete annual report

Please find page 49 of the 2014 Tucows annual report below. You can navigate through the pages in the report by either clicking on the pages listed below, or by using the keyword search tool below to find specific information within the annual report.

Page out of 202

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202

We may be unable to respond to the rapid technological changes in the industry, and our attempts to respond may
require significant capital expenditures.
The Internet and electronic commerce are characterized by rapid technological change. Sudden changes in user
and customer requirements and preferences, the frequent introduction of new applications and services embodying new
technologies and the emergence of new industry standards and practices could make our applications, services and
systems obsolete. The emerging nature of applications and services in the Internet application and services industry and
their rapid evolution will require that we continually improve the performance, features and reliability of our applications
and services. Our success will depend, in part, on our ability:
to develop and license new applications, services and technologies that address the increasingly sophisticated
and varied needs of our current and prospective customers; and
to respond to technological advances and emerging industry standards and practices on a cost-effective and
timely basis.
The development of applications and services and other proprietary technology involves significant
technological and business risks and requires substantial expenditures and lead-time. We may be unable to use new
technologies effectively or adapt our internally developed technology and transaction- processing systems to customer
requirements or emerging industry standards in a timely manner, or at all. Our internal development teams may also be
unable to keep pace with new technological developments that affect the marketplace for our services. In addition, as we
offer new services and functionality, we will need to ensure that any new services and functionality are well integrated
with our current services, particularly as we offer an increasing number of our services as part of bundled suites. To the
extent that any new services offered by us do not interoperate well with our existing services, our ability to market and
sell those new services would be adversely affected and our revenue level and ability to achieve and sustain profitability
might be harmed. Updating technology internally and licensing new technology from third parties may require us to incur
significant additional capital expenditures.
We could experience system failures and capacity constraints which could diminish our ability to effectively provide
our services and could damage our reputation and harm our operating results.
The availability of our services depends on the continuing operation of our information technology and
communications systems. Any damage to or failure of our systems could result in interruptions in our service, which
could reduce our revenues and profits, and damage our brand. Our systems are vulnerable to damage or interruption from
earthquakes, terrorist attacks, floods, fires, power loss, telecommunications failures, computer viruses, computer denial of
service attacks or other attempts to harm our systems. Some of our data centers are located in areas with a high risk of
major earthquakes. Our data centers are also subject to break-ins, sabotage and intentional acts of vandalism, and to
potential disruptions if the operators of these facilities have financial difficulties. Some of our systems are not fully
redundant, and our disaster recovery planning cannot account for all eventualities. The occurrence of a natural disaster, a
decision to close a facility without adequate notice or other unanticipated problems at our data centers could result in
lengthy interruptions in our service.
Our systems face security risks, and any compromise of the security of these systems could disrupt our business,
damage our reputation and result in the disclosure of confidential information, liability for damages and loss of
customers.
In the ordinary course of our business, we collect and store sensitive data, including intellectual property, our
proprietary business information and that of our customers, suppliers and business partners, and personally identifiable
information of our customers and employees. We have previously been the target of attempted attacks and must monitor
and develop our systems to protect our and our customer’s data from misappropriation. Our ability to securely process
and maintain this information is critical to our business. Despite our security measures, our systems may be vulnerable to
unauthorized access by hackers or others, computer viruses and other disruptive problems. Someone who is able to
Page 4
9
of 20
2
tcx20141231_10k.ht
m
9
/
13
/
201
6
https://www.sec.gov/Archives/edgar/data/909494/000143774915004707/tcx20141231_10...