UNITED STATES
SECURITIES AND EXCHANGE COMMISSION
Washington, D.C. 20549
Form 10-K
(Mark One)
x |
ANNUAL REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 |
For the fiscal year ended June 30, 2016
OR
o |
TRANSITION REPORT PURSUANT TO SECTION 13 OR 15(d) OF THE SECURITIES EXCHANGE ACT OF 1934 |
For the transition period from to .
Commission file number 000-25711
Extreme Networks, Inc.
(Exact name of Registrant as specified in its charter)
Delaware |
|
77-0430270 |
(State or other jurisdiction of incorporation or organization) |
|
(I.R.S. Employer Identification No.) |
|
|
|
145 Rio Robles San Jose, California |
|
95134 |
(Address of principal executive offices) |
|
(Zip Code) |
Registrant’s telephone number, including area code: (408) 579-2800
Securities registered pursuant to Section 12(b) of the Act: None
Securities registered pursuant to Section 12(g) of the Act:
Common stock, $0.001 par value
Indicate by check mark if the registrant is a well-known seasoned issuer, as defined in Rule 405 of the Securities Act. Yes o No x
Indicate by check mark if the registrant is not required to file reports pursuant to Section 13 or Section 15(d) of the Act. Yes o No x
Indicate by check mark whether the registrant (1) has filed all reports required to be filed by Section 13 or 15(d) of the Securities Exchange Act of 1934 during the preceding 12 months (or for such shorter period that the registrant was required to file such reports), and (2) has been subject to such filing requirements for the past 90 days. Yes x No o
Indicate by check mark if disclosure of delinquent filers pursuant to Item 405 of Regulation S-K (§229.405 of this chapter) is not contained herein, and will not be contained, to the best of registrant’s knowledge, in definitive proxy or information statements incorporated by reference in Part III of this Form 10-K or any amendment to this Form 10-K. o
Indicate by check mark whether the registrant has submitted electronically and posted on its corporate Web site, if any, every Interactive Data File required to be submitted and posted pursuant to Rule 405 of Regulation S-T (§229.405 of this chapter) during the preceding 12 months (or for such shorter period that the registrant was required to submit and post such files). Yes x No o
Indicate by check mark whether the registrant is a large accelerated filer, an accelerated filer, a non-accelerated filer, or a smaller reporting company. See definitions of “large accelerated filer,” “accelerated filer” and “smaller reporting company” in Rule 12b-2 of the Exchange Act. (Check One):
Large Accelerated Filer |
o |
|
Accelerated Filer |
x |
Non-Accelerated Filer |
o |
|
Smaller reporting company |
o |
Indicate by check mark whether the registrant is a shell company (as defined in Rule 12b-2 of the Exchange Act). Yes o No x
The aggregate market value of voting stock held by non-affiliates of the Registrant was approximately $302.9 million as of December 31, 2015, the last business day of the Registrant’s most recently completed second fiscal quarter, based upon the per share closing price of the Registrant’s common stock as reported on The NASDAQ Global Market reported on such date. For purposes of this disclosure, shares of common stock held or controlled by executive officers and directors of the registrant and by persons who hold more than 5% of the outstanding shares of common stock have been treated as shares held by affiliates. This calculation does not reflect a determination that certain persons are affiliates of the Registrant for any other purpose.
106,388,401 shares of the Registrant’s Common stock, $.001 par value, were outstanding as of August 26, 2016.
DOCUMENTS INCORPORATED BY REFERENCE
Portions of the registrant's definitive proxy statement for the 2016 Annual Meeting of Stockholders to be filed with the Commission pursuant to Regulation 14A not later than 120 days after the end of the fiscal year covered by this Annual Report on Form 10-K are incorporated herein by reference in Part III of this Annual Report on Form 10-K.
FORM 10-K
INDEX
|
|
|
|
Page |
Forward Looking Statements |
|
|
||
|
|
|
||
|
|
|
1 |
|
|
|
|
|
|
Item 1. |
|
|
1 |
|
|
|
|
|
|
Item 1A. |
|
|
14 |
|
|
|
|
|
|
Item 1B. |
|
|
28 |
|
|
|
|
|
|
Item 2. |
|
|
28 |
|
|
|
|
|
|
Item 3. |
|
|
28 |
|
|
|
|
|
|
Item 4. |
|
|
28 |
|
|
|
|
|
|
|
|
|
29 |
|
|
|
|
|
|
Item 5. |
|
|
29 |
|
|
|
|
|
|
Item 6. |
|
|
31 |
|
|
|
|
|
|
Item 7. |
|
Management’s Discussion and Analysis of Financial Condition and Results of Operations |
|
33 |
|
|
|
|
|
Item 7A. |
|
|
45 |
|
|
|
|
|
|
Item 8. |
|
|
47 |
|
|
|
|
|
|
Item 9. |
|
Changes in and Disagreements With Accountants on Accounting and Financial Disclosure |
|
83 |
|
|
|
|
|
Item 9A. |
|
|
83 |
|
|
|
|
|
|
Item 9B. |
|
|
84 |
|
|
|
|
|
|
|
|
|
85 |
|
|
|
|
|
|
Item 10. |
|
|
85 |
|
|
|
|
|
|
Item 11. |
|
|
85 |
|
|
|
|
|
|
Item 12. |
|
Security Ownership of Certain Beneficial Owners and Management and Related Stockholder Matters |
|
85 |
|
|
|
|
|
Item 13. |
|
Certain Relationships and Related Transactions, and Director Independence |
|
85 |
|
|
|
|
|
Item 14. |
|
|
85 |
|
|
|
|
|
|
|
|
|
86 |
|
|
|
|
|
|
Item 15. |
|
|
86 |
|
|
|
|
|
|
|
87 |
i
Except for historical information contained herein, certain matters included in this annual report on Form 10-K are, or may be deemed to be forward-looking statements within the meaning of Section 21E of the Securities Exchange Act of 1934 and Section 27A of the Securities Act of 1933. The words "will," "may," "designed to," "believe," "should," "anticipate," "plan," "expect," "intend," "estimate" and similar expressions identify forward-looking statements, which speak only as of the date of this annual report. These forward-looking statements are contained principally under Item 1, "Business," and under Item 7, "Management's Discussion and Analysis of Financial Condition and Results of Operations," but may also be in other sections of this annual report on Form 10-K. Because these forward-looking statements are subject to risks and uncertainties, actual results could differ materially from the expectations expressed in the forward-looking statements. Important factors that could cause actual results to differ materially from the expectations reflected in the forward-looking statements include those described in Item 1A, "Risk Factors" and Item 7, "Management's Discussion and Analysis of Financial Condition and Results of Operations." In addition, new risks emerge from time to time and it is not possible for management to predict all such risk factors or to assess the impact of such risk factors on our business. Given these risks and uncertainties, you should not place undue reliance on these forward-looking statements. We undertake no obligation to update or revise these forward-looking statements to reflect subsequent events or circumstances.
Overview
Extreme Networks, Inc., together with its subsidiaries (collectively referred to as “Extreme” and as “we”, “us” and “our”) is a leader in providing software-driven networking solutions for enterprise customers. Providing a combined end-to-end solution from the data center to the access point, Extreme designs, develops and manufactures wired and wireless network infrastructure equipment and develops the software for network management, policy, analytics, security and access controls. We strive to help our customers and partners Connect Beyond the Network by building world-class software and network infrastructure solutions that solve the wide range of problems faced by information technology (“IT”) departments.
The Internet of Things (“IoT”) and the evolution of the cloud have made reliable and secure Internet connections increasingly critical to business success. In this time of rapid changes and market shifts, delivering a focused value proposition based on automation, simplicity, high quality solutions and world class customer support is vitally important. As the volume and the demands of users, applications, data and devices on networks continue to increase, Extreme stands ready to help our customers address the ever-evolving demands of the business.
We seek to differentiate ourselves in the market by delivering a value proposition based on a software-driven approach to network management, control and analytics.
Our key points of differentiation include:
|
· |
End-to-end, wired and wireless solutions. Extreme offers a complete, unified portfolio of software-driven network access technology. We offer the latest in wireless access points for both outdoor and indoor use plus a complete line of switches to cover the campus, right up to and including the data center. |
|
· |
Multi-vendor management from a “single pane of glass”. Extreme offers a single unified management system that is designed to provide visibility and control across the entire network. This can make the network easier to manage and troubleshoot, often with lower operating expenses. Our software can also manage many other vendors’ network devices, enabling our customers to potentially maximize device lifespan. |
|
· |
Software-driven vertical solutions. Extreme’s software-driven solutions are designed to be easily adaptable to vertical solutions in industries such as, healthcare, education, manufacturing, government and hospitality. Extreme solutions are also designed to be well-suited for vertical-specific partners. |
|
· |
Application-aware Quality of Service (“QoS”) and analytics. Extreme has innovative analytic software that enables our customers to see application usage across the network and apply policies that maximize network capabilities. This allows our customers to improve the user experience. |
|
· |
Built-in identity and access control. Extreme’s network access control and identity management are delivered with the wired and wireless hardware. This may reduce the need to add on expensive software or hardware that may require complex compatibility testing. |
|
· |
EZ policy assignment and software-defined networking (“SDN”). ExtremeControl and ExtremeManagement software allow our customers to assign policy across the entire network. The SDN component adds versatility for implementing policies that increase network utilization. |
|
· |
100% in-sourced tech support. Extreme delivers best in class customer support in the industry with 92% first call resolution through a 100% in-sourced support model. |
Extreme sells products primarily through an ecosystem of channel partners which combine our Ethernet, wireless and management and software analytics products with their vertical-specific offerings to create IT solutions for end user customers.
On October 31, 2013, we completed the acquisition of Enterasys Networks, Inc. (“Enterasys”), a privately held provider of wired and wireless network infrastructure and security solutions, whereby Enterasys became our wholly-owned subsidiary. The combined entity immediately became a networking industry leader with more than 14,000 customers. As network switching leaders in enterprise, datacenter and cloud, Extreme and Enterasys together combine and extend their world-class products and technologies to provide customers with some of the most advanced, high performance and open solutions in the market as well as a superb overall customer experience. The combination of Extreme and Enterasys is significant in that it brings together two companies with distinct strengths addressing the key areas of the network, from unified wired and wireless edge, to the enterprise core, to the data center and cloud. With an open software approach, we can drive product innovations and customers will benefit from the increased resources and larger scale.
Industry Background
The networking industry appears to be invigorated by a wave of technological change:
|
· |
Ethernet (wired and wireless) has solidified its role in both public and private networks through its scalability, adaptability and cost-effectiveness. At the same time, the enterprises and service providers expect the technology to follow a price-performance curve that mandates continued innovation by Ethernet vendors. |
|
· |
The mobile workforce has proliferated. Employees expect high-quality and secure access to corporate resources in a Bring Your Own Device ("BYOD") world across a diversity of endpoints such as laptops, tablets, smart phones and wearables, whether they are within the corporate firewall or on-the-go. IT departments focus their investment decisions on this mobile workforce, taking a unified view of wireless access, the campus core and the data center. Networking vendors offer end-to-end solutions that permit IT managers to meet employee expectations and to maximize IT return on investment. |
|
· |
Growing usage of the cloud. Deployment of server virtualization is influencing data center architecture. Enterprises have migrated increasing numbers of applications and services to either private clouds or public clouds offered by third parties. In either case, the network infrastructure must adapt to this new dynamic environment. Intelligence and automation are key if enterprises are to derive maximum benefit from their cloud deployments. Ethernet speeds, scaling from 10 Gigabits per second ("G") to 40G and even 100G, provide the infrastructure for both private and public clouds. In addition, there is growing interest in SDN approaches that may include technologies such as OpenFlow, OpenStack, and CloudStack for increased network agility. |
|
· |
Vendor Consolidation. We believe consolidation of vendors within the Ethernet networking market and between adjacent markets (storage, security, wireless & voice software and applications) continues to gain momentum. In 2015, the Hewlett-Packard Company (“HP”) acquired Aruba, Dell, Inc. acquisition of EMC is expected to close in October 2016 and Brocade Communication Systems acquired Ruckus in May 2016. We believe these acquisitions reflect a realization that customers want end-to-end, integrated networking solutions. Extreme identified this trend in 2013 and address the issue with its acquisition of Enterasys in 2013. Since that time, Extreme has rationalized the roadmap and provided an upgrade path for customers. |
Extreme’s strategy, product portfolio and research and development are closely aligned with what we have identified as the following trends in our industry:
|
· |
Rapid adoption of white box/brite box devices. We believe the transition to white box/brite box is taking place faster than analyst firms had initially predicted. Network decision makers may be able to reduce cost, improve management and enable long-term innovation using brite box switches versus traditional switching approaches. |
|
Ø |
Extreme announced its brite box offering will begin in the first half of FY 2017. |
2
|
· |
Cloud is a revolutionary disrupter in the network switching market. In August 2016, International Data Corporation (“IDC”), forecasts between 2015 through 2020 that private cloud is expected to experience a compound annual growth rate (“CAGR”) of 25.0% while (traditional data center) is expected to experience slow to negative growth. |
|
Ø |
Extreme announced its cloud offering in April of 2016. |
|
· |
SDN is providing more revenue and delivery models to the industry than predicted. |
|
Ø |
Extreme’s SDN offering is innovative and adaptable to a wide range of use cases. |
|
· |
Enterprise adoption of the cloud and open-source options are disrupting traditional license and maintenance business models. |
|
Ø |
Extreme announced cloud offerings in April of 2016 and began participation in the OpenSwitch program in May, 2016. |
|
· |
Growth of wireless devices is expected to continue to outpace hardwire switch growth. |
|
Ø |
Extreme announced its 802.11ac Wave 2 wireless offering in late 2015 and plans to continue to advance its wireless portfolio of indoor and outdoor access points. |
The Extreme Strategy
In today’s BYOD world, the proliferation of mobile users and devices within a campus or across continents has increased the challenge of operating and managing a network. IT has rapidly evolved from a fixed world to a new world of mobility where everything - people, devices, machines and applications - is in motion. IT now supports end-users with smart phones, tablets, laptops and other wireless peripherals as well as their wired workstations. Users know what they need to be productive, and they expect the network to help them achieve productivity, as such, they are beginning to define the services that must be offered for these devices so they are able to work on-the-go. The blurring of work and personal applications that must be supported on the network places increasing security demands on our customers.
Extreme delivers software-driven networking solutions designed for the BYOD world, spanning private cloud data centers, the campus and the mobile infrastructure. Customers deploying our solutions know which users are on the network, what they are requesting and where they are located. They are able to provide customized access to approved resources and content. Our solutions provide granular visibility and control, higher performance and resource security.
Our strategy is to offer differentiated solutions that deliver a stronger value proposition to customers and offer an alternative to single-sourced, highly-proprietary networking equipment from other companies. Our commitment to open standards is manifested by demonstrated interoperability within both enterprise and service provider networks, and the active participation in key industry and standards associations.
Key elements of our strategy include:
|
· |
Enable customers and partners to “Connect Beyond the Network.” Extreme software-driven networking and services-led solutions provide visibility and control across our wired and wireless networking platforms. Our solutions include wired switching, wireless switching, wireless access points and controllers, management software, access control software, analytics software as well as applications and services. In addition, Extreme offers cloud-managed wired and wireless networking solutions that provide additional choice and flexibility with on or off premise software management. These technical capabilities coupled with our award-winning services and support provide a strong value proposition to the following customers and applications: |
|
- |
Enterprises and private cloud data centers use our products to deploy automated next-generation virtualized and high-density infrastructure solutions. |
|
- |
Enterprises and organizations in education, healthcare, manufacturing, hospitality and government agencies use our solutions for their mobile campus and backbone networks. |
|
- |
Enterprises, universities, healthcare and hospitality organizations use our solutions to enable better visibility and control of their data processing and analytics requirements. |
3
|
· |
Extend switching and routing technology leadership. Our technological leadership is based on innovative switching, routing and wireless products, the depth and focus of our market experience and our operating systems - the software that runs on all of our Ethernet switches. Our network operating systems, our primary merchant silicon vendor, and select manufacturing partners, permit us to leverage our engineering investment. We plan to invest in engineering resources to continue to create leading-edge technologies to increase the performance and functionality of our products, and as a direct result, the value of our solution to our current and future customers. We look for maximum synergies from our engineering investment in our targeted verticals. |
|
· |
Expand Wi-Fi technology leadership. Wireless is today’s network access method of choice and every business must deal with scale, density and BYOD challenges. The increase in demand being seen today, fueled by more users with multiple devices, increases the expectation that everything will just work. The network edge landscape is changing as the explosion of mobile devices increases the demand for mobile, transparent and always-on wired to wireless edge services. This new “unified access layer” requires intelligent distributed components to ensure that access control and resiliency of business services are available across the entire infrastructure and manageable from a single console. Our unified access layer portfolio provides intelligence for the wired/wireless edge. |
|
· |
Continue to deliver unified management across the wired/wireless environment from the data center to the mobile edge. Our rich set of integrated management capabilities provides centralized visibility and highly efficient anytime, anywhere control of enterprise wired and wireless network resources. |
|
· |
Offer network-powered business and application analytics. Our network-powered application analytics and optimization solution captures and analyzes context-based data about application traffic to deliver meaningful intelligence about applications, users, locations and devices. This enables the network to become a strategic business asset by enabling the mining of network-based business events and strategic information that help executives make faster and more effective decisions. |
Data can be mined to show how applications are being used enabling a better understanding of user behavior on the network, identifying the level of user engagement and assuring business application delivery to optimize the user experience. Application adoption can be tracked to determine the return on investment associated with new application deployment.
Visibility into network and application performance enables our customers to pinpoint and resolve performance bottlenecks in the infrastructure whether they are caused by the network, application or server. This saves both time and money for the business and ensures critical applications are running at the best possible performance.
|
· |
Support SDN. Networks are built using switches, routers and other devices in a distributed fashion to scale and provide reliability. In this distributed environment, it has become more complex to provide new end-to-end services and applications in a seamless and cost-effective manner. As the business demands more agile and flexible IT services, this has become a focal point for innovation and also for differentiation by vendors that have solved that challenge. To address the simultaneous needs for security, virtualization, manageability, mobility and agility in today´s networks, the concept of SDNs are gaining attention as a viable solution. |
The value of SDN in the enterprise lies specifically in the ability to provide network virtualization and automation of configuration across the entire network/fabric so new services and end systems can be deployed rapidly and operational cost can be minimized.
|
· |
Expand market penetration by targeting high-growth market segments. Within the campus, we focus on the mobile user, leveraging our automation capabilities and tracking wireless local area network (“LAN”) growth. Our data center approach leverages our product portfolio to address the needs of private cloud data center providers. Within the campus we also target the high-growth physical security market, converging technologies such as Internet Protocol (“IP”) video across a common Ethernet infrastructure in conjunction with technology partners. |
|
· |
Leverage and expand multiple distribution channels. We distribute our products through select distributors, a large number of resellers and system-integrators worldwide, and several large strategic partners. We maintain a field sales force to support our channel partners and to sell directly to certain strategic accounts. As an independent Ethernet switch vendor, we seek to provide products that, when combined with the offerings of our channel partners, create compelling solutions for end-user customers. |
4
|
· |
Maintain and extend our strategic relationships. We have established strategic relationships with a number of industry-leading vendors to both provide increased and enhanced routes to market, but also to collaboratively develop unique solutions. |
|
· |
Provide high-quality customer service and support. We seek to enhance customer satisfaction and build customer loyalty through high-quality service and support. This includes a wide range of standard support programs that provide the level of service our customers require, from standard business hours to global 24-hour-a-day, 365-day-a-year real-time response support. |
Products
Our software-driven networking products offer resilient high-performance networking, intelligence and operational simplicity for our customers. We build our products into vertical market solutions for converged campus networks that provide user and device mobility. Data center and cloud administrators are able to virtualize their servers and storage over our high-performance Ethernet infrastructure. Extreme’s management software provides visibility, security and intelligent control from the data center to the edge - all through a single pane of glass.
Our product categories include:
|
· |
Modular Ethernet switching systems. Our ExtremeSwitching products deliver modular or chassis-based Ethernet connectivity solutions for enterprises, data centers and service providers. These products have a range of management and line cards that allow our customers to flexibly configure and re-purpose the systems to meet specific needs. Our chassis products, in conjunction with our operating systems and our centralized management software product, provide the density, performance and reliability required to serve in environments with demanding applications. |
During fiscal year 2016, we announced the industry's highest capacity 100G interfaces for the ExtremeSwitching BDX. Our S-Series and K-Series switching deliver flow-based architecture via our CoreFlow2 technology that enable granular visibility and policy control without impacting performance or user experience. These products scale up to 576 ports with Quad Small Form-factor Pluggable, 10GBase-T and SFP+ connectivity options, with built-in hardware support for 10/100/1000, 1GE, 10GE, 40GE, emerging protocols (IPv6) and large-scale deployment protocols such as Multi-Protocol Label Switching (“MPLS”).
|
· |
Stackable Ethernet switching systems. Our ExtremeSwitching fixed form factor product family delivers Ethernet connectivity for the network edge, aggregation and core. Within the ExtremeSwitching family are products that offer a range of connection speeds (from 100 Megabit to 100 Gigabit), various physical presentations (copper and fiber) and options to deliver PoE or unpowered standard Ethernet ports. As with the our modular chassis switching products, the fixed switching products in conjunction with our operating systems provide the features, performance and reliability required by our customers to deploy, operate and manage converged networking infrastructures. We have recently announced the Summit X440-G2 and X620, which we believe is one of the most cost-effective, feature-rich, enterprise-grade switching platform in the industry. |
|
· |
High density Wi-Fi. In addition to our wired Ethernet switch portfolio, we offer our ExtremeWireless family of wireless access points, centralized management and appliance to enable the deployment of wired-like performance, at scale for high-density in every environment. Our wireless access point products offer both indoor and outdoor 802.11a/b/g/n/ac access points. Proven in the most demanding environments, ExtremeWireless delivers an exceptional experience for BYOD/Mobile users wherever they may roam. |
During the last year, we continued our growth in high-density venue deployments with many new NFL stadiums including the Green Bay Packers, Baltimore Ravens, Carolina Panthers, Jacksonville Jaguars and Cincinnati Bengals. Extreme also signed contracts in the NHL with the Buffalo Sabres and the Detroit Red Wings, in the NBA with the Golden State Warriors and in MLB with the Chicago Cubs.
|
· |
Centralized management software. To provide a central network-wide visibility and control capability, we offer our ExtremeManagement software platform. This platform provides the ability to manage and automate the entire network through a single interface. This means deploy, configure, monitor and support the complete range of Wi-Fi and switching infrastructure and also set network-wide policy to enable our customers to reduce the overall cost of network administration and operations, protect corporate resources and provide a consistent high-quality user experience. |
5
|
· |
Network Access Control (“NAC”) and BYOD management. The ExtremeControl software solution provides a complete standards-based, multi-vendor interoperable pre-connect and post-connect Network Access Control solution for wired and wireless LAN and VPN users. Automated BYOD registration allows users to register their own devices using their credentials with no IT intervention. Guest registration access control features seek to facilitate secure guest networking. ExtremeControl also allows easy integration with other third party network management tools for Mobile Device Management integration, threat response Next Generation Firewall (“NGFW”), Security Information and Event Management (“SIEM”), Intrusion Prevention System (“IPS”) and more. |
|
· |
Application analytics. ExtremeAnalytics is a network-powered application analytics and optimization solution that captures network data, then aggregates, analyzes, correlates and reports on it to enable better decision making and improved business performance. ExtremeAnalytics allows IT operations to optimize the network for each and every application, enhance security for those applications and provide data for business analytics. This empowers IT to turn the network into a strategic business asset that can now provide value to other lines of business, and enable business innovation powered by the network infrastructure. As an example, Extreme was selected as the Official Wi-Fi & Analytics Provider for the NFL, including Super Bowl XLVIII, XLIX, XLVI and XLI. |
|
· |
Cloud-based network management. ExtremeCloud is a resilient and scalable cloud-based network management solution offered by Extreme as a subscription service. The network is the platform of engagement for clients and staff. We have designed ExtremeCloud to provide superior user experience by empowering our customers and the applications that drive their business. The combination of Extreme’s smart wired and wireless edges and the elasticity, resilience and scalability provided via state-of-the-art data centers distributed strategically for worldwide availability, allows our customers to respond to the changing needs of their business at the speed of cloud through a simple, multi-site aware user interface. ExtremeCloud is subscription based to align with new business imperatives. Ease-of-purchasing, provisioning and ongoing operations are at the very core of ExtremeCloud to allow our customers, and their teams, to transform with the business, but without high upfront costs or complex infrastructure changes or software deployments. |
|
· |
Software-defined networks. Extreme’s SDN architecture provides a comprehensive networking solution from the Extreme Wireless edge to the Extreme Switching wired edge to the aggregation and core network layers, and all the way across the data center. Extreme controls the technology and roadmap for the entire infrastructure, which is all managed from a single pane of glass with ExtremeManagement. User and device control enabled by ExtremeControl provides secure, policy-based access to the network. ExtremeAnalytics provides application visibility at Layer 7. |
Competitive alternatives often combine technologies from several vendors resulting in multiple disparate points of management. With Extreme’s SDN architecture, centralized management and visibility and control of the network, the solution truly is greater than the sum of the parts, providing high levels of performance and security with the highest levels of operational efficiency.
Key product functionality includes:
|
· |
Resilient high performance networking. Customers can choose to deploy redundant management and fabric modules, hot swappable line cards, multi-speed stacking across 100 Megabits (“M”)/1G/10G/40G/100G systems, redundant power supplies and fan trays delivering high hardware availability. These deployments are supported by our modular and fault-tolerant network operating systems that spans our complete switching portfolio, unique in the industry. Technologies supported include a variety of Layer 2 (“L2”) resiliency protocols including multi-switch Link Aggregation (“M-LAG”), Ethernet Automatic Protection Switching (“EAPS”), MPLS / Virtual Private LAN Service (“VPLS”) for high service availability, and Layer 3 IPv4 and IPv6 routing protocols for high network availability. |
EAPS is an example of our innovation and allows our customers to configure their network infrastructure so that critical network communications can be rapidly rerouted in the event of a network outage in most topologies. This level of high-speed communications 'reroute' is targeted for mission-critical and demanding applications, including voice and video, and maintains service delivery in the event of network outage.
We further offer a versatile and flexible QoS solution that allows network operators to configure bandwidth for mission-critical applications and in doing so, control the overall experience and the service-level of the communication flows. We have deep experience with communication quality controls, starting with our introduction to the market of the first broad QoS controls for Ethernet to the recent Data Center Bridging protocols for 'lossless' Ethernet that enables traditional storage networks to converge over a common Ethernet infrastructure.
6
We provide L2 extension for data centers through multiple supported technologies that include Virtual Extensible LAN, VPLS and Pseudo-Wire Emulation as well as L2 extension with Generic Routing Encapsulation (“GRE”/L2) and Shortest Path Bridging (“SPB”) (on the S-Series). In addition to GRE/L2 and SPB on our S-Series, we offer innovative traffic optimization for east/west and north/south traffic using Fabric routing and Host routing, respectively. This means we can enable Virtual Machine (“VM”) mobility using Layer 3 Data Center Interconnect, even without L2 stretch. Our unique CoreFlow2 architecture delivers tens of millions of flows for deep visibility and control over users, services and applications to meet the demands of today’s businesses applications.
|
· |
Intelligence. Based on a unified, pervasive and intelligent software foundation, our customers can take advantage of user, machine and application visibility and control for the whole network infrastructure - from data center to edge. |
|
- |
Universal Port automatically detects new devices such as IP phones that plug-in to the network and can assign appropriate power, server and other configurations. The Identity Management engine allows tracking of users based on their login id and host machine, and assigns them to roles based on guest, contractor or employee privilege. |
|
- |
In the data center and cloud, Network Virtualization allows network administrators visibility into VM movement and having virtual port-profiles follow VMs as they move within and across network switches. CLEAR-Flow, our wire-speed security rules engine, helps detect and mitigate traffic anomalies, including denial of service attacks. |
|
- |
ExtremeManagement and ExtremeControl provide centralized visibility and granular control of enterprise network resources end-to-end, to manage, automate and report on the entire network through a single interface. ExtremeControl NAC and ExtremeAnalytics provides comprehensive visibility and policy for multi-vendor environments, providing detailed context that correlates users with their devices, applications, locations and other attributes. These products provide deep network insight and analytics, which can be used for better network optimization, improved security and smarter business decisions. This enables business innovation powered by the network infrastructure and empowers our customers to turn the network into a strategic business asset that can now provide value to other lines of business. |
|
- |
Our Audio-Video Bridging capabilities add intelligence within the network to support the convergence of professional audio and video across Ethernet, while our SDN investments provide a foundation for enhanced automation and orchestration from private cloud to user edge. |
|
· |
Operational simplicity. We provide a unified management system for the entire network providing consistent management across all network segments and devices, making IT operations more efficient and simpler. No matter how many moves, adds or changes occur in your environment, ExtremeManagement keeps everything in view and under control through role-based access controls. ExtremeManagement can manage beyond Extreme switching, routing, and wireless hardware to deliver standards-based control of other vendors’ network equipment. This means faster provisioning, quicker problem resolution, tighter security and reduced IT administration time. |
|
· |
Vertical Market Solutions. Our SDN and services-led solution offerings are solutions targeted at specific high-growth vertical markets. These include Open Fabric, our architecture for open and scalable next-generation data center deployments that offer investment protection and provide a path to SDN. Extreme’s All Ethernet Open Fabric is anchored by our ExtremeSwitching family of products, ExtremeManagement, and where required, products from technology partners. |
In the campus, our intelligent mobile edge offering combines our ExtremeSwitching edge virtual chassis switches, our ExtremeWireless access point and controller portfolio and our ExtremeManagement & Control platform offering user and device identity awareness.
Sales, Marketing and Distribution
We conduct our sales and marketing activities on a worldwide basis through a channel that utilizes distributors, resellers and our field sales organization. As of June 30, 2016, our worldwide sales and marketing organization consisted of 521 employees, including vice presidents, directors, managers, sales representatives, and technical and administrative support personnel. We have domestic sales offices located in 5 states and international sales offices located in 28 countries.
We sell our products primarily through an ecosystem of channel partners who combine our Ethernet, wireless, management and analytics software products with their vertical specific offerings to create compelling information technology solutions for end-user customers. We utilize our field sales organization to support our channel partners and to sell directly to certain end-user customers, including some large global accounts.
7
The details of our sales and distribution channels are as follows:
|
· |
Alliance, Original Equipment Manufacturers ("OEM") and Strategic Relationships. We have active Alliance, OEM & strategic relationships with Barco NV, Ericsson Enterprise AB, Silicon Graphics International, Inc. (acquired by HP), PC HK Ltd., Nokia Siemens Networks and Aviat Networks, Inc. as well as other global industry technology leaders in which our products are qualified to be included into an overall solution or reference architecture. These tested and validated solutions are then marketed and sold by the Alliance, OEM or strategic partners into their specific verticals, market segments and customers as turnkey offerings. |
|
· |
Distributors. We have established several key relationships with leading distributors in the electronics and computer networking industries. Each of our distributors primarily resells our products to resellers. The distributors enhance our ability to sell and provide support to resellers who may benefit from the broad service and product fulfillment capabilities offered by these distributors. Extreme maintained distribution agreements with Westcon Group, Tech Data Corporation and Jenne Corporation on substantially the same material terms as we generally enter into with each of our distributor partners. Distributors are generally given the right to return a portion of inventory to us for the purpose of stock rotation, to claim rebates for competitive discounts and participate in various cooperative marketing programs to promote the sale of our products and services. We defer recognition of revenue on all sales to distributors who maintain inventory of our products until the distributors sell the product, as evidenced by monthly “sales-out” reports that the distributors provide to us, provided other revenue recognition criteria are met. (See “Revenue Recognition” in Item 7. Management’s Discussion and Analysis of Financial Condition and Results of Operations.) |
|
· |
Resellers. We rely on many resellers worldwide that sell directly to the end-user customer. Our resellers include regional networking system resellers, resellers who focus on specific vertical markets, value added resellers, network integrators and wholesale resellers. We provide training and support to our resellers and our resellers generally provide the first level of contact to end-users of our products. Our relationships with resellers are on a non-exclusive basis. Our resellers are not given rights to return inventory and do not automatically participate in any cooperative marketing programs. We generally recognize product revenue from our reseller and end-user customers at the time of shipment, provided other revenue recognition criteria are met. When significant obligations or contingencies remain after products are delivered, such as installation or customer acceptance, revenue and related costs are deferred until such obligations or contingencies are satisfied. (See “Revenue Recognition” in Item 7. Management’s Discussion and Analysis of Financial Condition and Results of Operations.) |
|
· |
Field Sales. Our field sales organization is trained to sell solutions, support and develop leads for our resellers and to establish and maintain key accounts and strategic end-user customers. To support these objectives, our field sales force: |
|
- |
Assists end-user customers in finding solutions to complex network system and architecture problems. |
|
- |
Differentiates the features and capabilities of our products from competitive offerings. |
|
- |
Continually monitors and understands the evolving networking needs of enterprise and service provider customers. |
|
- |
Promotes our products and ensures direct contact with current and potential customers. |
|
- |
Assists our resellers to drive opportunities to closure business. |
Although we compete in many vertical markets, in fiscal year 2016, we have focused on the specific verticals of healthcare, education, manufacturing, government and hospitality, which includes sports and entertainment venues. Years of experience and a track record of success in the verticals we serve enables us to address the following industry-specific problems.
Healthcare:
|
· |
Patient services. In an increasingly competitive healthcare market, ensuring patient and visitor access from a variety of devices to the Internet can be a competitive advantage. We have several medical facilities worldwide that can reference Extreme’s expertise in meeting the challenges of patient services which include: online services, guest Wi-Fi, IoT, wearables and sensors. |
|
· |
The majority of new medical devices are IP-based. Not only are most medical devices monitored through the network, they are regulated by various government agencies across the globe. Extreme has success in meeting this challenge with compliance through its complete wireless and wired product suite overseen by innovative management and analytics. |
|
· |
Clinical workflow has shifted to real-time mobility inside and outside the hospital. Medical professionals often access critical patient records through network connections. Extreme’s reliable and comprehensive technology, including the latest Wave 2 capability, is backed by practical experience in addressing the demanding needs of clinical workflow. |
8
Education:
|
· |
New styles of teaching. Personalized learning, flipped classrooms and competency-based education depend on well-managed high-bandwidth digital content delivery. Extreme has extensive knowledge in smart classroom and large campus environments; both of which are experiencing a growing presence of IoT devices. Our easy-to-manage networks provide the bandwidth necessary to deliver digital content, including emerging styles like virtual and mixed reality, to thousands of students with the speed and quality required. Extreme has demonstrated the ability to provide high density, two-way Internet connectivity so that each student has a rich and uninterrupted educational experience. |
|
· |
Online and technology-based assessment is growing in importance. K-12 is implementing high stakes standardized testing and higher education is moving to BYOD for online mid-term and final exams. ExtremeAnalytics helps ensure tests proceed by providing visibility into the network flow from student device to local school server to remote testing server. |
|
· |
Protecting student privacy, safety and digital freedom. Extreme has built-in access and identity control to protect the safety and privacy of students, faculty and administrators. This all in one offering helps ease the burden on education institutions that have limited IT resources. |
Manufacturing:
|
· |
Operations to meet the fast-changing customer and market requirements. Flexible manufacturing and build-to-order processes place high demands on the network for material and shop floor control. Extreme’s proven technology strives to meet these demands in some of the world’s most demanding manufacturing environments. |
|
· |
Speed, adaptability and innovation are the new currencies in the manufacturing realm. A fast and reliable network can help to accommodate speed. Extreme’s full suite of wired and wireless product and management and analytics software enable agile manufacturing. |
|
· |
Visibility into plant and back office technology performance. Extreme’s management, control and analytics provide end-to-end network visibility from a single console without the need to swap user interfaces. This unique capability is well-suited for plant and back office environments. |
Government:
|
· |
Secure access. Government agencies are being challenged to provide their employees and the citizens they serve with secure, cost-effective, high-speed access to online information and resources. For today’s agencies, high quality video, collaboration, social media, VoIP and multimedia applications have become mission-critical services. These applications have placed unprecedented bandwidth and control demands on existing networks. |
|
· |
Management of new technologies. The increasingly rapid deployment of wireless access, data center virtualization and the adoption of cloud computing have further complicated network management and control. For federal government agencies, the challenge is determining how to deliver secure, seamless, always-on access to these mission-critical services. |
|
· |
Controlling costs. Agencies need to deliver access from laptops, tablets, smartphones and other types of devices, at any time, from any place and from anywhere, while at the same time maximizing efficiencies and cost savings across all areas of the network infrastructure. Extreme provides a rich set of networking solutions that strive to be cost-effective and secure and allow government agencies to meet not only today’s needs, but also to be prepared for future demands. |
Hospitality:
|
· |
Developing a cohesive and enhanced mobile experience. Through real world experience in sports stadiums, where over 70,000 fans actively access the Internet, Extreme has developed the expertise to handle the most demanding venue challenges. Our hospitality experience spans hotels, casinos, theaters, convention centers, vacation destinations and outdoor venues. |
|
· |
Emphasizing the user experience and mobile engagement. Extreme has the ability to monitor applications so that policy to maximize user experience can be implemented in fixed and mobile environments with the same set of management tools from a single pane of glass. |
|
· |
Generating revenue opportunities for the business. Knowing the behaviors of customers and clients is a key to success and Extreme Analytics provides visibility to the usage patterns and traits of network users. |
9
Furthermore, we have decided to focus on the following customer profiles where we believe we can add the most value:
|
· |
Customer size: Those customers with annual revenue of $100 million to $2.5 billion. |
|
· |
Target deployment: Campus deployments with 250 to 5,000 employees or education campuses with 1,000 to 15,000 students. |
|
· |
Target data centers: Data centers with 1,000 servers or less. |
|
· |
Vertical markets: Healthcare, education, manufacturing, government/enterprise, hospitality. |
|
· |
Customer characteristics: Our customers tend to operate in transient environments, such as college campuses, hospitals and sports venues, where BYOD and secure network access and identity control are critical. Their networks must be highly available with the ability to continue operations in the event of a service interruption. Secure access is essential to ensuring the protection of mission-critical systems and confidential information. Often tasked to manage the network with a limited IT staff, our customers appreciate the excellent service and support we strive to provide. |
Customers with 10% of net revenue or greater
The following table sets forth major customers accounting for 10% or more of our net revenue:
|
|
Year Ended |
|
|||||||||
|
|
June 30, 2016 |
|
|
June 30, 2015 |
|
|
June 30, 2014 |
|
|||
Tech Data Corporation |
|
|
17 |
% |
|
|
15 |
% |
|
|
11 |
% |
Westcon Group Inc. |
|
|
14 |
% |
|
|
15 |
% |
|
|
11 |
% |
Jenne |
|
|
14 |
% |
|
* |
|
|
* |
|
* |
Less than 10% of revenue |
International sales
International sales are an important portion of our business. In fiscal 2016, sales to customers outside of the United States accounted for 55% of our consolidated net revenue, compared to 57% in fiscal 2015 and 59% in fiscal 2014. These sales are conducted primarily through foreign-based distributors and resellers managed by our worldwide sales organization. In addition, we have direct sales to end-user customers, including large global accounts. The primary markets for sales outside of the United States are countries in Europe and Asia, as well as Canada, Mexico, Central America and South America. (See “Net Revenue” in Item 7. Management’s Discussion and Analysis of Financial Condition and Results of Operations.)
Marketing
We continue to develop and execute on a number of marketing programs to support the sale and distribution of our products by communicating the value of our solutions to our existing and potential customers, our distribution channels, our resellers and our technology alliance partners. Our marketing efforts include participation in industry tradeshows, conferences and seminars, publication of technical and educational articles in industry journals, communication across social media channels, frequent updates to our publicly available website, promotions, web-based training courses, advertising and public relations. We also submit our products for independent product testing and evaluation.
Backlog
Our products are often sold on the basis of standard purchase orders that are cancelable prior to shipment without significant penalties. In addition, purchase orders are subject to changes in quantities of products and delivery schedules in order to reflect changes in customer requirements and manufacturing capacity. Our business is characterized by seasonal variability in demand and short lead-time orders and delivery schedules. Actual shipments depend on the then-current capacity of our contract manufacturers and the availability of materials and components from our vendors. Although we believe that the orders included in the backlog are firm, all orders are subject to possible rescheduling by customers, cancellations by customers which we may elect to allow without penalty to customer, and further pricing adjustments on orders from distributors. Therefore, we do not believe that our backlog, as of any particular date is necessarily indicative of actual revenue for any future period.
Our product backlog at June 30, 2016, net of anticipated back end rebates for distributor sales, was $26.8 million, compared to $14.8 million at June 30, 2015.
10
Seasonality
Like many of our competitors, we historically have experienced seasonal fluctuations in customer spending patterns, which generally adversely affect our first and third fiscal quarters. This pattern should not be relied upon or be considered indicative of our future performance, however, as it has varied in the past.
Customer Service and Support
Our customers seek high reliability and maximum uptime for their networks. To that extent, we provide the following service offerings:
|
· |
Support services for end-users, resellers and distributors. We meet the service requirements of our customers and channel partners through our Technical Assistance Centers ("TACs"), located in Research Triangle Park ("RTP"), North Carolina; Salem, New Hampshire and Chennai, India. Our TAC engineers and technicians assist in diagnosing and troubleshooting technical issues regarding customer networks. Development engineers work with the TACs to resolve product functionality issues specific to each customer. |
|
· |
Professional services. We provide consultative services to improve customer productivity in all phases of the network lifecycle – planning, design, implementation, operations and optimization management. Our network architects develop and execute customized software and service-led networking solutions for deployment plans to meet individualized network strategies. These activities may include the management and coordination of the design and network configuration, resource planning, staging, logistics, migration and deployment. We also provide customized training and operational best practices manuals to assist customers in the transition and sustenance of their networks. |
|
· |
Education. We offer classes covering a wide range of topics such as installation, configuration, operation, management and optimization – providing customers with the necessary knowledge and experience to successfully deploy and manage our products in various networking environments. Classes may be scheduled and available at numerous locations worldwide. We deliver training using our staff, on-line training classes and authorized training partners. In addition, we make much of our training materials accessible free-of-charge on our internet site for customers and partners to use in self-education. We believe this approach enhances the market’s ability to learn and understand the broad array of advantages of our products. |
Long-Lived Assets
See Note 3 of our Notes to Consolidated Financial Statements in this Annual Report on Form 10-K for more information regarding our long-lived assets.
Manufacturing
We outsource the majority of our manufacturing and supply chain management operations as part of our strategy to maintain global manufacturing capabilities and to reduce our costs. We conduct quality assurance, manufacturing engineering, document control and test development at engineering facilities at Research Triangle Park (“RTP”), North Carolina, Salem, New Hampshire, Toronto, Canada and Chennai, India. This approach enables us to reduce fixed costs and to flexibly respond to changes in market demand. Our end-to-end supply chain, including our three engineering facilities at RTP and Chennai are all ISO 9001 certified.
We use Alpha Networks, Inc. (“Alpha Networks”) headquartered in Hsinchu, Taiwan to design and manufacture our Summit, A-Series, B-Series, C-Series, Stackable products, G-Series, D-Series, I-Series and 800-Series Standalone products and Black Diamond chassis products. Alpha Networks is a global networking Original/Joint Design Manufacturer ("ODM/JDM") leader with core competencies in areas such as Ethernet, LAN/MAN, Wireless, Broadband and VoIP. Alpha Networks manufacturing processes and procedures are ISO 9001 certified.
We use Benchmark Electronics, Inc. ("Benchmark") headquartered in Huntsville, Alabama and Flextronics International ("Flextronics") headquartered in Singapore, to manufacture our S-Series and K-Series chassis products, 7100-Series Stackable products and SSA Standalone products. Benchmark and Flextronics have a significant investment in capital to ensure they have the latest in manufacturing and test technologies and both companies are ISO 9001 certified.
Our wireless access point products are supplied by Senao Electronics ("Senao"), headquartered in Taipei, Taiwan. Senao’s manufacturing processes and procedures are ISO 9001 certified.
11
All of our manufacturers utilize automated testing equipment to perform product testing and burn-in with specified tests. Together we rely upon comprehensive inspection testing and statistical process controls to assure the quality and reliability of our products.
We use a collaborative sales and operations planning forecast of expected demand to determine our material requirements. Lead times for materials and components vary significantly, and depend on factors such as the specific supplier, contract terms and demand for a component at a given time. We order most of our materials and components on an indirect basis through our ODM/JDM, OEMs and contract manufacturers’ (“CMs”). Purchase commitments with all of our manufacturers are generally on a purchase order basis.
Research and Development
The success of our products to date is due in large part to our focus on research and development. We believe that continued success in the marketplace will depend on our ability to develop new and enhanced products employing leading-edge technology. Accordingly, we plan to undertake development efforts with an emphasis on increasing the reliability, performance and features of our family of products, and designing innovative products to reduce the overall network operating costs of customers.
Our product development activities focus on solving the needs of customers in the enterprise campus by providing an end-to-end, wired and wireless network solution from the access edge to the private clouds in targeted verticals. Current activities include the continuing development of our innovative switching technology aimed at extending the capabilities of our products. Our ongoing research activities cover a broad range of areas, including, in particular, 40G and 100G Ethernet, routing, timing and resiliency protocols, open standards interfaces, software defined networks, network security, identity management, data center fabrics, and wireless networking.
We plan to continue to enhance the functionality of our modular operating systems which have been designed to provide high reliability and availability. This allows us to leverage a common operating system across different hardware and network chipsets.
As of June 30, 2016, our research and development organization consisted of 402 employees. Research and development efforts are conducted in several of our locations, including RTP, North Carolina; Salem, New Hampshire, Toronto, Canada and Chennai, India. Our research and development expenses in fiscal years 2016, 2015 and 2014 were $78.7 million, $93.4 million and $77.1 million, respectively.
Intellectual Property
We rely on a combination of patent, copyright, trademark and trade secret laws and restrictions on disclosure to protect our intellectual property rights. As of June 30, 2016, we had 363 issued patents in the United States and 183 patents outside of the United States. The expiration dates of our issued patents in the United States range from 2017 to approximately 2032. Although we have patent applications pending, there can be no assurance that patents will be issued from pending applications or that claims allowed on any future patents will be sufficiently broad to protect our technology. With respect to trademarks, we have a number of pending and registered trademarks in the United States and outside the United States.
We enter into confidentiality, inventions assignment or license agreements with our employees, consultants and other third parties with whom we do business, and control access to, and distribution of, our software, documentation and other proprietary information. In addition, we provide our software products to end-user customers primarily under “shrink-wrap” or "click-through" license agreements. These agreements are not negotiated with or signed by the licensee, and thus these agreements may not be enforceable in some jurisdictions. Despite our efforts to protect our proprietary rights, unauthorized parties may attempt to copy or otherwise obtain and use our products or technology, particularly in foreign countries where the laws may not protect our proprietary rights as fully as in the United States.
Competition
The market for network switches, routers and software (including analytics) which is part of the broader market for networking equipment is extremely competitive and characterized by rapid technological progress, frequent new product introductions, changes in customer requirements and evolving industry standards. We believe the principal competitive factors in this market are:
|
· |
expertise and familiarity with network protocols, network switching/routing/wireless and network management; |
|
· |
expertise and familiarity with application analytics software; |
|
· |
expertise with network operations and management software; |
12
|
· |
product performance, features, functionality and reliability; |
|
· |
price/performance characteristics; |
|
· |
timeliness of new product introductions; |
|
· |
adoption of emerging industry standards; |
|
· |
customer service and support; |
|
· |
size and scope of distribution network; |
|
· |
brand name; |
|
· |
breadth of product offering; |
|
· |
access to customers; and |
|
· |
size of installed customer base. |
We believe we compete with our competitors with respect to many of the foregoing factors. However, the market for network switching solutions is dominated by a few large companies, particularly Brocade Communications Systems, Inc., Cisco Systems, Inc., Dell, Hewlett-Packard Company, Huawei Technologies Co. Ltd., and Juniper Networks Inc. Most of these competitors have longer operating histories, greater name recognition, larger customer bases, broader product lines and substantially greater financial, technical, sales, marketing and other resources.
Restructuring
2015 Restructuring Plan Phase 1
During the fourth quarter of fiscal 2015, we initiated a plan to reduce costs through targeted restructuring activities intended to reduce operating costs and realign our organization in the current competitive environment. We initiated a plan to reduce our worldwide headcount by more than 225 employees, primarily in sales and marketing as well as research and development, consolidate specific global administrative functions, and shift certain operating costs to lower cost regions in the United States, among other actions.
Phase 2
During fiscal 2016, we continued our initiative to realign our operations with a second phase by abandoning excess facilities, primarily in San Jose, California; Salem, New Hampshire; Research Triangle Park, North Carolina in addition to other smaller leased locations. The abandoned facilities represented approximately 32% of the floor space in the aggregate at these locations and included general office and warehouse space. There may be additional abandonments of excess facilities in future periods as we further align our organization to our business and operational needs.
Environmental Matters
We are subject to various environmental and other regulations governing product safety, materials usage, packaging and other environmental impacts in the United States and in various countries where our products are manufactured and sold. We are also subject to regulatory developments, including recent SEC disclosure regulations relating to so-called "conflict minerals," relating to ethically responsible sourcing of the components and materials used in our products. To date, compliance with federal, state, local, and foreign laws enacted for the protection of the environment has had no material effect on our capital expenditures, earnings, or competitive position.
We are committed to energy efficiency in our product lines. Accordingly, we believe this is an area that affords us a competitive advantage for our products in the marketplace. We maintain compliance with various regulations related to the environment, including the Waste Electrical and Electronic Equipment and the Restriction of the Use of Certain Hazardous Substances in Electrical and Electronic Equipment regulations adopted by the European Union. To date, our compliance efforts with various United States and foreign regulations related to the environment has not had a material effect on our operating results.
13
Employees
As of June 30, 2016, we employed 1,378 people, including 521 in sales and marketing, 402 in research and development, 174 in operations, 190 in customer support and services, and 91 in finance and administration. We have never had a work stoppage and no U.S. employees are represented under collective bargaining agreements. We consider our employee relations to be good.
We believe our future success depends on our continued ability to attract, integrate, retain, train and motivate highly qualified employees, and upon the continued service of our senior management and key employees. None of our executive officers or key employees is bound by an employment agreement which mandates that the employee render services for any specific term. The market for qualified personnel is highly competitive.
Organization
We were incorporated in California in May 1996, and reincorporated in Delaware in March 1999. Our corporate headquarters are located at 145 Rio Robles, San Jose, CA 95134 and our telephone number is (408) 579-2800. We electronically file our SEC disclosure reports with the SEC and they are available free of charge at both www.sec.gov and www.extremenetworks.com. The public may also read or copy any materials we file with the Securities Exchange Commission at the SEC’s Public Reference Room at Station Place, 100 F Street, N.E., Washington, DC 20549. The public may obtain information on the operation of the Public Reference Room by calling the SEC at 1-800-SEC-0330.
Our corporate governance guidelines, the charters of our audit committee, our compensation committee and our nominating and corporate governance committee and our code of conduct policy (including code of ethics provisions that apply to our principal executive officer, principal financial officer, controller and senior financial officers) are available on our website at www.extremenetworks.com under “Corporate Governance.” These items are also available to any stockholder who requests them by calling (408) 579-2800.
The following is a list of risks and uncertainties which may have a material and adverse effect on our business, operations, industry, financial condition, results of operations or future financial performance. While we believe we have identified and discussed below the key risk factors affecting our business, there may be additional risks and uncertainties that are not presently known or that are not currently believed to be significant that may adversely affect our business, results of operations, industry, financial position and financial performance in the future
We cannot assure you we will be profitable in the future because a number of factors could negatively affect our financial results.
We have reported losses in each of our two most recent fiscal years. In addition, in years when we reported profits, we were not profitable in each quarter during those years. We anticipate continuing to incur significant sales and marketing, product development and general and administrative expenses. Any delay in generating or recognizing revenue could result in a loss for a quarter or full year. Even if we are profitable, our operating results may fall below our expectations and those of our investors, which could cause the price of our stock to fall.
We may experience challenges or delays in generating or recognizing revenue for a number of reasons and our revenue and operating results have varied significantly in the past and may vary significantly in the future due to a number of factors, including, but not limited to, the following:
|
· |
we are dependent upon obtaining orders during a quarter and shipping those orders in the same quarter to achieve our revenue objectives; |
|
· |
decreases in the prices of the products we sell; |
|
· |
the mix of products sold and the mix of distribution channels through which products are sold; |
|
· |
acceptance provisions in customer contracts; |
|
· |
our ability to deliver installation or inspection services by the end of the quarter; |
|
· |
changes in general and/or specific economic conditions in the networking industry; |
|
· |
seasonal fluctuations in demand for our products and services; |
14
|
· |
a disproportionate percentage of our sales occurring in the last month of the quarter; |
|
· |
our ability to ship products by the end of a quarter; |
|
· |
reduced visibility into the implementation cycles for our products and our customers’ spending plans; |
|
· |
our ability to forecast demand for our products, which in the case of lower-than-expected sales, may result in excess or obsolete inventory in addition to non-cancelable purchase commitments for component parts; |
|
· |
sales to the telecommunications service provider market, which represents a significant source of large product orders, are especially volatile and difficult to forecast; |
|
· |
product returns or the cancellation or rescheduling of orders; |
|
· |
announcements and new product introductions by our competitors; |
|
· |
our ability to develop and support relationships with enterprise customers, service providers and other potential large customers; |
|
· |
our ability to achieve targeted cost reductions; |
|
· |
fluctuations in warranty or other service expenses actually incurred; |
|
· |
our ability to obtain sufficient supplies of sole- or limited-source components for our products on a timely basis; and |
|
· |
increases in the price of the components we purchase. |
Due to the foregoing factors, period-to-period comparisons of our operating results should not be relied upon as an indicator of our future performance.
The global economic environment has and may continue to negatively impact our business and operating results.
The challenges and uncertainty currently affecting global economic conditions may negatively impact our business and operating results in the following ways:
|
· |
customers may delay or cancel plans to purchase our products and services; |
|
· |
customers may not be able to pay, or may delay payment of, the amounts they owe us which may adversely affect our cash flow, the timing of our revenue recognition and the amount of revenue; |
|
· |
increased pricing pressure may result from our competitors aggressively discounting their products; |
|
· |
accurate budgeting and planning will be difficult due to low visibility into future sales; |
|
· |
forecasting customer demand will be more difficult, increasing the risk of either excess and obsolete inventory if our forecast is too high or insufficient inventory to meet customer demand if our forecast is too low; and |
|
· |
our component suppliers and contract manufacturers have been negatively affected by the economy which may result in product delays and changes in pricing and service levels. |
If global economic conditions do not show continued improvement, we believe we could experience material adverse impacts to our business and operating results.
We depend upon international sales for a significant portion of our revenue which imposes a number of risks on our business.
International sales constitute a significant portion of our net revenue. Our ability to grow will depend in part on the expansion of international sales. Our international sales primarily depend on the success of our resellers and distributors. The failure of these resellers and distributors to sell our products internationally would limit our ability to sustain and grow our revenue. There are a number of risks arising from our international business, including:
|
· |
longer accounts receivable collection cycles; |
|
· |
difficulties in managing operations across disparate geographic areas; |
|
· |
difficulties associated with enforcing agreements through foreign legal systems; |
15
|
· |
reduced or limited protection of intellectual property rights, particularly in jurisdictions that have less developed intellectual property regimes, such as China and India; |
|
· |
higher credit risks requiring cash in advance or letters of credit; |
|
· |
potential adverse tax consequences; |
|
· |
compliance with regulatory requirements of foreign countries, including compliance with rapidly evolving environmental regulations; |
|
· |
compliance with U.S. laws and regulations pertaining to the sale and distribution of products to customers in foreign countries, including export controls and the Foreign Corrupt Practices Act; |
|
· |
the payment of operating expenses in local currencies, which exposes us to risks of currency fluctuations. |
|
· |
political and economic turbulence; |
|
· |
terrorism, war or other armed conflict; |
|
· |
compliance with U.S. and other applicable government regulations prohibiting certain end-uses and restrictions on trade with embargoed or sanctioned countries, such as Russia, and with denied parties; and |
|
· |
natural disasters and epidemics; |
Substantially all of our international sales are United States dollar-denominated. The continued strength and future increases in the value of the United States dollar relative to foreign currencies could make our products less competitive in international markets. In the future, we may elect to invoice some of our international customers in local currency, which would expose us to fluctuations in exchange rates between the United States dollar and the particular local currency. If we do so, we may decide to engage in hedging transactions to minimize the risk of such fluctuations.
We have entered into foreign exchange forward contracts to offset the impact of payment of operating expenses in local currencies to some of our operating foreign subsidiaries. However, if we are not successful in managing these foreign currency transactions, we could incur losses from these activities.
We expect the average selling price of our products to decrease, which is likely to reduce gross margin and/or revenue.
The network equipment industry has traditionally experienced an erosion of average selling prices due to a number of factors, including competitive pricing pressures, promotional pricing and technological progress. We anticipate the average selling prices of our products will decrease in the future in response to competitive pricing pressures, excess inventories, increased sales discounts and new product introductions by us or our competitors. We may experience decreases in future operating results due to the erosion of our average selling prices. To maintain our gross margin, we must develop and introduce on a timely basis new products and product enhancements and continually reduce our product costs. Our failure to do so will likely cause our revenue and gross margin to decline.
We may not realize anticipated benefits of past or future acquisitions, divestitures, and strategic investments, and the integration of acquired companies or technologies may negatively impact our business and financial results or dilute the ownership interests of our stockholders.
As part of our business strategy, we review acquisition and strategic investment prospects that we believe would complement our current product offerings, augment our market coverage or enhance our technical capabilities, or otherwise offer growth opportunities. In the event of any future acquisitions, we could:
|
· |
issue equity securities which would dilute current stockholders' percentage ownership; |
|
· |
incur substantial debt; |
|
· |
assume contingent liabilities; or |
|
· |
expend significant cash. |
These actions could have a material adverse effect on our operating results or the price of our common stock.
16
Moreover, even if we do obtain benefits in the form of increased sales and earnings, these benefits may be recognized much later than the time when the expenses associated with an acquisition are incurred. This is particularly relevant in cases where it would be necessary to integrate new types of technology into our existing portfolio and new types of products may be targeted for potential customers with which we do not have pre-existing relationships.
Our ability to realize the anticipated benefits our acquisitions and investment activities also entail numerous risks, including, but not limited to:
|
· |
difficulties in the assimilation and successful integration of acquired operations, technologies and/or products; |
|
· |
unanticipated costs, litigation or other contingent liabilities associated with the acquisition or investment transaction; |
|
· |
incurrence of acquisition- and integration-related costs, goodwill or in-process research and development impairment charges, or amortization costs for acquired intangible assets, that could negatively impact our operating results and financial condition; |
|
· |
the diversion of management's attention from other business concerns; |
|
· |
adverse effects on existing business relationships with suppliers and customers; |
|
· |
risks associated with entering markets in which we have no or limited prior experience; |
|
· |
the potential loss of key employees of acquired organizations and inability to attract or retain other key employees; and |
|
· |
substantial charges for the amortization of certain purchased intangible assets, deferred stock compensation or similar items. |
We may not be able to successfully integrate any businesses, products, technologies, or personnel that we might acquire in the future, and our failure to do so could have a material adverse effect on our business, operating results and financial condition.
Our senior secured credit facilities impose financial and operating restrictions on us.
Our debt instruments impose, and the terms of any future debt may impose, operating and other restrictions on us. These restrictions could affect, and in many respects limit or prohibit, among other items, our ability to:
|
· |
incur additional indebtedness; |
|
· |
create liens; |
|
· |
make investments; |
|
· |
enter into transactions with affiliates; |
|
· |
sell assets; |
|
· |
guarantee indebtedness; |
|
· |
declare or pay dividends or other distributions to stockholders; |
|
· |
repurchase equity interests; |
|
· |
change the nature of our business; |
|
· |
enter into swap agreements; |
|
· |
issue or sell capital stock of certain of our subsidiaries; and |
|
· |
consolidate, merge, or transfer all or substantially all of our assets and the assets of our subsidiaries on a consolidated basis. |
17
The agreements governing our senior secured credit facilities also require us to achieve and maintain compliance with specified financial ratios. A breach of any of these restrictive covenants or the inability to comply with the required financial ratios could result in a default under our debt instruments. If any such default occurs, the lenders under our credit agreement may elect to declare all outstanding borrowings, together with accrued interest and other fees, to be immediately due and payable. The lenders under our credit agreement also have the right in these circumstances to terminate any commitments they have to provide further borrowings. If we are unable to repay outstanding borrowings when due, the lenders under our credit agreement will have the right to proceed against the collateral granted to them to secure the debt. If the debt under our credit agreement were to be accelerated, we cannot give assurance that this collateral would be sufficient to repay our debt.
If we fail to meet our payment or other obligations under our senior secured credit facility, the lenders under such senior secured credit facility could foreclose on, and acquire control of, substantially all of our assets.
Our credit agreement is jointly and severally guaranteed by us and certain of our subsidiaries. Borrowings under our senior secured credit facilities are secured by liens on substantially all of our assets, including the capital stock of certain of our subsidiaries, and the assets of our subsidiaries that are loan party guarantors. If we are unable to repay outstanding borrowings when due, the lenders under our credit agreement will have the right to proceed against this pledged capital stock and take control of substantially all of our assets.
We purchase several key components for products from single or limited sources and could lose sales if these suppliers fail to meet our needs.
We currently purchase several key components used in the manufacturing of our products from single or limited sources and are dependent upon supply from these sources to meet our needs. Certain components such as tantalum capacitors, SRAM, DRAM, and printed circuit boards, have been in the past, and may in the future be, in short supply. We have encountered, and are likely in the future to encounter, shortages and delays in obtaining these or other components, and this could have a material adverse effect on our ability to meet customer orders. Our principal sole-source components include:
|
· |
ASICs - merchant silicon, Ethernet switching, custom and physical interface : |
|
· |
microprocessors; |
|
· |
programmable integrated circuits; |
|
· |
selected other integrated circuits; |
|
· |
custom power supplies; and |
|
· |
custom-tooled sheet metal. |
Our principal limited-source components include:
|
· |
flash memory; |
|
· |
DRAMs and SRAMs; |
|
· |
printed circuit boards; |
|
· |
CAMs; |
|
· |
Connectors; and |
|
· |
Timing circuits (crystals & clocks). |
We use our forecast of expected demand to determine our material requirements. Lead times for materials and components we order vary significantly, and depend on factors such as the specific supplier, contract terms and demand for a component at a given time. If forecasts exceed orders, we may have excess and/or obsolete inventory, which could have a material adverse effect on our operating results and financial condition. If orders exceed forecasts, we may have inadequate supplies of certain materials and components, which could have a material adverse effect on our ability to meet customer delivery requirements and to recognize revenue.
18
Our top ten suppliers accounted for a significant portion of our purchases during the quarter. Given the significant concentration of our supply chain, particularly with certain sole or limited source providers, any significant interruption by any of the key suppliers or a termination of a relationship could temporarily disrupt our operations. Additionally, our operations are materially dependent upon the continued market acceptance and quality of these manufacturers’ products and their ability to continue to manufacture products that are competitive and that comply with laws relating to environmental and efficiency standards. Our inability to obtain products from one or more of these suppliers or a decline in market acceptance of these suppliers’ products could have a material adverse effect on our results of operations, cash flows and liquidity.
Generally, we do not have agreements fixing long-term prices or minimum volume requirements from suppliers. From time to time we have experienced shortages and allocations of certain components, resulting in delays in filling orders. Qualifying new suppliers to compensate for such shortages may be time-consuming and costly, and may increase the likelihood of errors in design or production. In addition, during the development of our products, we have experienced delays in the prototyping of our chipsets, which in turn has led to delays in product introductions. Similar delays may occur in the future. Furthermore, the performance of the components as incorporated in our products may not meet the quality requirements of our customers.
Intense competition in the market for networking equipment could prevent us from increasing revenue and attaining profitability.
The market for network switching solutions is intensely competitive and dominated primarily by Brocade Communications Systems, Inc., Cisco Systems Inc., Dell, Hewlett-Packard Company, Huawei Technologies Co. Ltd., and Juniper Networks, Inc. Most of our competitors have longer operating histories, greater name recognition, larger customer bases, broader product lines and substantially greater financial, technical, sales, marketing and other resources. As a result, these competitors are able to devote greater resources to the development, promotion, sale and support of their products. In addition, they have larger distribution channels, stronger brand names, access to more customers, a larger installed customer base and a greater ability to make attractive offers to channel partners and customers than we do. Some of our customers may question whether we have the financial resources to complete their projects and future service commitments.
For example, we have encountered, and expect to continue to encounter in the future, many potential customers who are confident in and committed to the product offerings of our principal competitors. Accordingly, these potential customers may not consider or evaluate our products. When such potential customers have considered or evaluated our products, we have in the past lost, and expect in the future to lose, sales to some of these customers as large competitors have offered significant price discounts to secure these sales.
The pricing policies of our competitors impact the overall demand for our products and services. Some of our competitors are capable of operating at significant losses for extended periods of time, increasing pricing pressure on our products and services. If we do not maintain competitive pricing, the demand for our products and services, as well as our market share, may decline. From time to time, we may lower the prices of our products and services in response to competitive pressure. When this happens, if we are unable to reduce our component costs or improve operating efficiencies, our revenue and gross margins will be adversely affected.
We may not fully realize the anticipated positive impacts to future financial results from our restructuring efforts.
We have undertaken restructuring efforts in the past to streamline operations and reduce operating expenses. Our ability to achieve the anticipated cost savings and other benefits from our restructuring efforts within expected time frames is subject to many estimates and assumptions, and may vary materially based on factors such as market conditions and the effect of our restructuring efforts on our work force. These estimates and assumptions are subject to significant economic, competitive and other uncertainties, some of which are beyond our control. There can be no assurance that we will fully realize the anticipated positive impacts to future financial results from our current or future restructuring efforts. If our estimates and assumptions are incorrect or if other unforeseen events occur, we may not achieve the cost savings expected from such restructurings, and our business and results of operations could be adversely affected.
19
Industry consolidation may lead to stronger competition and may harm our operating results.
There has been a trend toward industry consolidation in our markets for several years. We expect this trend to continue as companies attempt to strengthen or hold their market positions in an evolving industry and as companies are acquired or are unable to continue operations. For example, some of our current and potential competitors for enterprise data center business have made acquisitions, or announced new strategic alliances, designed to position them with the ability to provide end-to-end technology solutions for the enterprise data center. Companies that are strategic alliance partners in some areas of our business may acquire or form alliances with our competitors, thereby reducing their business with us. We believe industry consolidation may result in stronger competitors that are better able to compete as sole-source vendors for customers. This could lead to more variability in our operating results and could have a material adverse effect on our business, operating results, and financial condition. Furthermore, particularly in the service provider market, rapid consolidation will lead to fewer customers, with the effect that loss of a major customer could have a material impact on results not anticipated in a customer marketplace composed of more numerous participants.
We intend to invest in engineering, sales, services, marketing and manufacturing on a long term basis, and delays or inability to attain the expected benefits may result in unfavorable operating results.
While we intend to focus on managing our costs and expenses, over the long term, we also intend to invest in personnel and other resources related to our engineering, sales, services, marketing and manufacturing functions as we focus on our foundational priorities, such as leadership in our core products and solutions and architectures for business transformation. We are likely to recognize the costs associated with these investments earlier than some of the anticipated benefits and the return on these investments may be lower, or may develop more slowly, than we expect. If we do not achieve the benefits anticipated from these investments, or if the achievement of these benefits is delayed, our operating results may be adversely affected.
Our success is dependent on our ability to continually introduce new products and features that achieve broad market acceptance.
The network equipment market is characterized by rapid technological progress, frequent new product introductions, changes in customer requirements and evolving industry standards. If we do not regularly introduce new products in this dynamic environment, our product lines will become obsolete. These new products must be compatible and inter-operate with products and architectures offered by other vendors. We have and may in the future experience delays in product development and releases, and such delays have and could in the future adversely affect our ability to compete and our operating results.
When we announce new products or product enhancements or end of sale existing products that have the potential to replace or shorten the life cycle of our existing products, customers may defer or cancel orders for our existing products. These actions could have a material adverse effect on our operating results by unexpectedly decreasing sales, increasing inventory levels of older products and exposing us to greater risk of product obsolescence.
Even if we introduce new switching products, alternative technologies could achieve widespread market acceptance and displace the Ethernet technology on which we have based our product architecture. For example, developments in routers and routing software could significantly reduce demand for our products. As a result, we may not be able to achieve widespread market acceptance of our current or future products.
If we do not successfully anticipate technological shifts, market needs and opportunities, and develop products and product enhancements that meet those technological shifts, needs and opportunities, or if those products are not made available in a timely manner or do not gain market acceptance, we may not be able to compete effectively and our ability to generate revenues will suffer.
We cannot guarantee that we will be able to anticipate future technological shifts, market needs and opportunities or be able to develop new products or product enhancements to meet such technological shifts, needs or opportunities in a timely manner or at all. For example, the move from traditional network infrastructures towards SDN has been receiving considerable attention. In our view, it will take several years to see the full impact of SDN, and we believe the successful products and solutions in this market will combine hardware and software elements together. If we fail to anticipate market requirements or fail to develop and introduce new products or product enhancements to meet those needs in a timely manner, it could cause us to lose customers, and such failure could substantially decrease or delay market acceptance and sales of our present and future products, which would significantly harm our business, financial condition, and results of operations. Even if we are able to anticipate, develop, and commercially introduce new products and enhancements, there can be no assurance that new products or enhancements will achieve widespread market acceptance.
20
The cloud networking market is still in its early stages and is rapidly evolving. If this market does not evolve as we anticipate or our target end customers do not adopt our cloud networking solutions, we may not be able to compete effectively, and our ability to generate revenue will suffer.
The cloud networking market is still in its early stages. The market demand for cloud networking solutions has increased in recent years as end customers have deployed larger networks and have increased the use of virtualization and cloud computing. Our success may be impacted by our ability to provide successful cloud networking solutions that address the needs of our channel partners and end customers more effectively and economically than those of other competitors or existing technologies. If the cloud networking solutions market does not develop in the way we anticipate, if our solutions do not offer significant benefits compared to competing legacy network switching products or if end customers do not recognize the benefits that our solutions provide, then our potential for growth in this cloud market could be adversely affected.
Claims of infringement by others may increase and the resolution of such claims may adversely affect our operating results.
Our industry is characterized by the existence of a large number of patents and frequent claims and related litigation regarding patents, copyrights (including rights to “open source” software), and other intellectual property rights. Because of the existence of a large number of patents in the networking field, the secrecy of some pending patents and the issuance of new patents at a rapid pace, it is not possible to determine in advance if a product or component might infringe the patent rights of others. Because of the potential for courts awarding substantial damages, the lack of predictability of such awards, and the high legal costs associated with the defense of such patent infringement matters that would be expended to prove lack of infringement, it is not uncommon for companies in our industry to settle even potentially unmeritorious claims for very substantial amounts. Furthermore, the entities with whom we have or could have disputes or discussions include entities with extensive patent portfolios and substantial financial assets. These entities are actively engaged in programs to generate substantial revenue from their patent portfolios and are seeking or may seek significant payments or royalties from us and others in our industry.
Litigation resulting from claims that we are infringing the proprietary rights of others has resulted and could in the future result in substantial costs and a diversion of resources, and could have a material adverse effect on our business, financial condition and results of operations. We previously received notices from entities alleging that we were infringing their patents, and have been party to patent litigation in the past.
Without regard to the merits of these or any other claims, an adverse court order or a settlement could require us, among other actions, to:
|
· |
stop selling our products that incorporate the challenged intellectual property; |
|
· |
obtain a royalty bearing license to sell or use the relevant technology, and that license may not be available on reasonable terms or available at all; |
|
· |
pay damages; |
|
· |
redesign those products that use the disputed technology; or |
|
· |
face a ban on importation of our products into the United States. |
In addition, our products include so-called “open source” software. Open source software is typically licensed for use at no initial charge, but imposes on the user of the open source software certain requirements to license to others both the open source software as well as modifications to the open source software under certain circumstances. Our use of open source software subjects us to certain additional risks for the following reasons:
|
· |
open source license terms may be ambiguous and may result in unanticipated obligations regarding the licensing of our products and intellectual property; |
|
· |
open source software cannot be protected under trade secret law; |
|
· |
suppliers of open-source software do not provide the warranty, support and liability protections typically provided by vendors who offer proprietary software; and |
|
· |
it may be difficult for us to accurately determine the developers of the open source code and whether the acquired software infringes third-party intellectual property rights. |
21
We believe even if we do not infringe the rights of others, we will incur significant expenses in the future due to defense of legal claims, disputes or licensing negotiations, though the amounts cannot be determined. These expenses may be material or otherwise adversely affect our operating results.
Our operating results may be negatively affected by defending or pursuing claims or lawsuits.
We have in the past, currently are and will likely in the future pursue or be subject to claims or lawsuits in the normal course of our business. In addition to the risks related to the intellectual property lawsuits described above, we are currently parties to other litigation as described in Part II, Item 8. Financial Statements and Supplementary Data. Regardless of the result, litigation can be expensive, lengthy and disruptive to normal business operations. Moreover, the results of complex legal proceedings are difficult to predict. An unfavorable resolution of a lawsuit in which we are a defendant could result in a court order against us or payments to other parties that would have an adverse affect on our business, results of operations or financial condition. Even if we are successful in prosecuting claims and lawsuits, we may not recover damages sufficient to cover our expenses incurred to manage, investigate and pursue the litigation. In addition, subject to certain limitations, we may be obligated to indemnify our current and former customers, suppliers, directors, officers and employees in certain lawsuits. We may not have adequate insurance coverage to cover all of our litigation costs and liabilities.
If we fail to protect our intellectual property, our business could suffer.
We rely on a combination of patent, copyright, trademark and trade secret laws and restrictions on disclosure to protect our intellectual property rights. However, we cannot ensure that the actions we have taken will adequately protect our intellectual property rights or that other parties will not independently develop similar or competing products that do not infringe on our patents. We generally enter into confidentiality, invention assignment or license agreements with our employees, consultants and other third parties with whom we do business, and control access to and distribution of our intellectual property and other proprietary information. Despite our efforts to protect our proprietary rights, unauthorized parties may attempt to copy or otherwise misappropriate or use our products or technology, which would adversely affect our business.
When our products contain undetected errors, we may incur significant unexpected expenses and could lose sales.
Network products frequently contain undetected errors when new products or new versions or updates of existing products are released to the marketplace. In the past, we have experienced such errors in connection with new products and product updates. We have experienced component problems in prior years that caused us to incur higher than expected warranty, service costs and expenses, and other related operating expenses. In the future, we expect that, from time to time, such errors or component failures will be found in new or existing products after the commencement of commercial shipments. These problems may have a material adverse effect on our business by causing us to incur significant warranty, repair and replacement costs, diverting the attention of our engineering personnel from new product development efforts, delaying the recognition of revenue and causing significant customer relations problems. Further, if products are not accepted by customers due to such defects, and such returns exceed the amount we accrued for defective returns based on our historical experience, our operating results would be adversely affected.
Our products must successfully inter-operate with products from other vendors. As a result, when problems occur in a network, it may be difficult to identify the sources of these problems. The occurrence of system errors, whether or not caused by our products, could result in the delay or loss of market acceptance of our products and any necessary revisions may cause us to incur significant expenses. The occurrence of any such problems would likely have a material adverse effect on our business, operating results and financial condition.
Our dependence on a few manufacturers for our manufacturing requirements could harm our operating results.
We primarily rely on our manufacturing partners; Alpha Networks, Inc. headquartered in Hsinchu, Taiwan; Senao Networks, Inc. headquartered in Taoyuan, Taiwan; Benchmark Electronics headquartered in Huntsville, Alabama and select other partners to manufacture our products. We have experienced delays in product shipments from our manufacturing partners in the past, which in turn delayed product shipments to our customers. These or similar problems may arise in the future, such as delivery of products of inferior quality, delivery of insufficient quantity of products, or the interruption or discontinuance of operations of a manufacturer, any of which could have a material adverse effect on our business and operating results. In addition, any natural disaster or business interruption to our manufacturing partners could significantly disrupt our business. While we maintain strong relationships with our manufacturing partners, our agreements with these manufacturers are generally of limited duration and pricing, quality and volume commitments are negotiated on a recurring basis. The failure to maintain continuing agreements with our manufacturing partners could adversely affect our business. We intend to introduce new products and product enhancements, which will require that we rapidly achieve volume production by coordinating our efforts with those of our suppliers and contract manufacturers.
22
As part of our cost-reduction efforts, we will need to realize lower per unit product costs from our manufacturing partners by means of volume efficiencies and the utilization of manufacturing sites in lower-cost geographies. However, we cannot be certain when or if such price reductions will occur. The failure to obtain such price reductions would adversely affect our operating results.
We must continue to develop and increase the productivity of our indirect distribution channels to increase net revenue and improve our operating results.
Our distribution strategy focuses primarily on developing and increasing the productivity of our indirect distribution channels. If we fail to develop and cultivate relationships with significant channel partners, or if these channel partners are not successful in their sales efforts, sales of our products may decrease and our operating results could suffer. Many of our channel partners also sell products from other vendors that compete with our products. Our channel partners may not continue to market or sell our products effectively or to devote the resources necessary to provide us with effective sales, marketing and technical support. We may not be able to successfully manage our sales channels or enter into additional reseller and/or distribution agreements. Our failure to do any of these could limit our ability to grow or sustain revenue.
Our operating results for any given period have and will continue to depend to a significant extent on large orders from a relatively small number of channel partners and other customers. For example, sales through our top three distributors accounted for 46% of our net sales in the third quarter of fiscal 2016. However, we do not have binding purchase commitments from any of them. A substantial reduction or delay in sales of our products to a significant reseller, distributor or other customer could harm our business, operating results and financial condition because our expense levels are based on our expectations as to future revenue and to a large extent are fixed in the short term. Under specified conditions, some third-party distributors are allowed to return products to us and unexpected returns could adversely affect our results.
The sales cycle for our products is long and we may incur substantial non-recoverable expenses or devote significant resources to sales that do not occur when anticipated.
The purchase of our products represent a significant strategic decision by a customer regarding its communications infrastructure. The decision by customers to purchase our products is often based on the results of a variety of internal procedures associated with the evaluation, testing, implementation and acceptance of new technologies. Accordingly, the product evaluation process frequently results in a lengthy sales cycle, typically ranging from three months to longer than a year, and as a result, our ability to sell products is subject to a number of significant risks, including risks that:
|
· |
budgetary constraints and internal acceptance reviews by customers will result in the loss of potential sales; |
|
· |
there may be substantial variation in the length of the sales cycle from customer to customer, making decisions on the expenditure of resources difficult to assess; |
|
· |
we may incur substantial sales and marketing expenses and expend significant management time in an attempt to initiate or increase the sale of products to customers, but not succeed; |
|
· |
if a sales forecast from a specific customer for a particular quarter is not achieved in that quarter, we may be unable to compensate for the shortfall, which could harm our operating results; and |
|
· |
downward pricing pressures could occur during the lengthy sales cycle for our products. |
Our revenues may decline as a result of changes in public funding of educational institutions.
A portion of our revenues comes from sales to both public and private K-12 educational institutions. Public schools receive funding from local tax revenue, and from state and federal governments through a variety of programs, many of which seek to assist schools located in underprivileged or rural areas. The funding for a portion of our sales to educational institutions comes from a federal funding program known as the E-Rate program. E-Rate is a program of the Federal Communications Commission that subsidizes the purchase of approved telecommunications, Internet access, and internal connection costs for eligible public educational institutions. The E-Rate program, its eligibility criteria, the timing and specific amount of federal funding actually available and which Wi-Fi infrastructure and product sectors will benefit, are uncertain and subject to final federal program approval and funding appropriation continues to be under review by the Federal Communications Commission and there can be no assurance that this program or its equivalent will continue, and as a result, our business may be harmed. Furthermore, if state or local funding of public education is significantly reduced because of legislative or policy changes or by reductions in tax revenues due to changing economic conditions, our sales to educational institutions may be negatively impacted by these changed conditions. Any reduction in spending on information technology systems by educational institutions would likely materially and adversely affect our business and results of operations. This is a specific example of the many factors which add additional uncertainty to our future revenue from our education end-customers.
23
To successfully manage our business or achieve our goals, we must attract, retain, train, motivate, develop and promote key employees, and failure to do so can harm us.
Our success depends to a significant degree upon the continued contributions of our key management, engineering, sales and marketing, service and operations personnel, many of whom would be difficult to replace. We do not have employment contracts with these individuals that mandate that they render services for any specific term, nor do we carry life insurance on any of our key personnel. We have experienced and may in the future experience significant turnover in our executive personnel. In addition, retention has generally become more difficult for us, in part because the exercise price of most of the stock options granted to many of our employees is above the market price. As a result, we experienced high levels of attrition. We believe our future success will also depend in large part upon our ability to attract and retain highly skilled managerial, engineering, sales and marketing, service, finance and operations personnel. The market for these personnel is competitive, and we have had difficulty in hiring employees, particularly engineers, in the time-frame we desire.
Companies in the networking industry whose employees accept positions with competitors frequently claim that competitors have engaged in unfair hiring practices. We have from time to time been involved in claims like this with other companies and, although to date they have not resulted in material litigation, we do not know whether we will be involved in additional claims in the future. We could incur substantial costs in litigating any such claims, regardless of the merits.
Failure to successfully expand our sales and support teams or educate them in regard to technologies and our product families may harm our operating results.
The sale of our products and services requires a concerted effort that is frequently targeted at several levels within a prospective customer's organization. We may not be able to increase net revenue unless we expand our sales and support teams in order to address all of the customer requirements necessary to sell our products.
We cannot assure you that we will be able to successfully integrate employees into our company or to educate and train current and future employees in regard to rapidly evolving technologies and our product families. A failure to do so may hurt our revenue growth and operating results.
Failure of our products to comply with evolving industry standards and complex government regulations may adversely impact our business.
If we do not comply with existing or evolving industry standards and government regulations, we may not be able to sell our products where these standards or regulations apply. The network equipment industry in which we compete is characterized by rapid changes in technology and customers' requirements and evolving industry standards. As a result, our success depends on:
|
· |
the timely adoption and market acceptance of industry standards, and timely resolution of conflicting U.S. and international industry standards; and |
|
· |
our ability to influence the development of emerging industry standards and to introduce new and enhanced products that are compatible with such standards. |
In the past, we have introduced new products that were not compatible with certain technological standards, and in the future, we may not be able to effectively address the compatibility and interoperability issues that arise as a result of technological changes and evolving industry standards.
Our products must also comply with various U.S. federal government regulations and standards defined by agencies such as the Federal Communications Commission, standards established by governmental authorities in various foreign countries and recommendations of the International Telecommunication Union. In some circumstances, we must obtain regulatory approvals or certificates of compliance before we can offer or distribute our products in certain jurisdictions or to certain customers. Complying with new regulations or obtaining certifications can be costly and disruptive to our business.
If we do not comply with existing or evolving industry standards or government regulations, we will not be able to sell our products where these standards or regulations apply, which may prevent us from sustaining our net revenue or achieving profitability.
24
If we do not adequately manage and evolve our financial reporting and managerial systems and processes, our ability to manage and grow our business may be harmed.
Our ability to successfully implement our business plan and comply with regulations requires an effective planning and management process. We need to continue improving our existing, and implement new, operational and financial systems, procedures and controls. We need to ensure that any businesses acquired are appropriately integrated in our financial systems. Any delay in the implementation of, or disruption in the integration of acquired businesses, or delay and disruption in the transition to, new or enhanced systems, procedures or controls, could harm our ability to record and report financial and management information on a timely and accurate basis, or to forecast future results.
Changes in the effective tax rate including from the release of the valuation allowance recorded against our net U.S. deferred tax assets, or adverse outcomes resulting from examination of our income or other tax returns or change in ownership, could adversely affect our results.
Our future effective tax rates may be volatile or adversely affected by changes in our business or U.S. or foreign tax laws, including: the partial or full release of the valuation allowance recorded against our net U.S. deferred tax assets; expiration of or lapses in the research and development tax credit laws; transfer pricing adjustments; tax effects of stock-based compensation; or costs related to restructuring. In addition, we are subject to the examination of our income tax returns by the Internal Revenue Service and other tax authorities. Although we regularly assess the likelihood of adverse outcomes resulting from these examinations to determine the adequacy of our provision for income taxes, there is no assurance that such determinations by us are in fact adequate. Changes in our effective tax rates or amounts assessed upon examination of our tax returns may have a material, adverse impact on our cash flows and our financial condition.
Our future effective tax rate in particular could be adversely affected by a change in ownership pursuant to U.S. Internal Revenue Code Section 382. If a change in ownership occurs, it may limit our ability to utilize our net operating losses to offset our U.S. taxable income. If U.S. taxable income is greater than the change in ownership limitation, we will pay a higher rate of tax with respect to the amount of taxable income that exceeds the limitation. This could have a material adverse impact on our results of operations. On April 26, 2012, we adopted an Amended and Restated Rights Agreement to help protect our assets (the “Rights Agreement”). In general, this does not allow a stockholder to acquire more than 4.95% of our outstanding common stock without a waiver from our board of directors, who must take into account the relevant tax analysis relating to potential limitation of our net operating losses. The Rights Agreement is effective through May 31, 2017.
Provisions in our charter documents and Delaware law and our adoption of a stockholder rights plan may delay or prevent an acquisition of Extreme, which could decrease the value of our Common Stock.
Our certificate of incorporation and bylaws and Delaware law contain provisions that could make it more difficult for a third party to acquire us without the consent of our Board of Directors. Delaware law also imposes some restrictions on mergers and other business combinations between us and any holder of 15% or more of our outstanding common stock. In addition, our Board of Directors has the right to issue preferred stock without stockholder approval, which could be used to dilute the stock ownership of a potential hostile acquirer. Although we believe these provisions of our certificate of incorporation and bylaws and Delaware law will provide for an opportunity to receive a higher bid by requiring potential acquirers to negotiate with our Board of Directors, these provisions apply even if the offer may be considered beneficial by some of our stockholders.
Our Rights Agreement provides that if a single stockholder (or group) acquires more than 4.95% of our outstanding common stock without a waiver from our Board of Directors, each holder of one share of our common stock (other than the stockholder or group who acquired in excess of 4.95% of our common stock) may purchase a fractional share of our preferred stock that would result in substantial dilution to the triggering stockholder or group. Accordingly, although this plan is designed to prevent any limitation on the utilization of our net operating losses by avoiding issues raised under Section 382 of the U.S. Internal Revenue Code, the Rights Agreement could also serve as a deterrent to stockholders wishing to effect a change of control.
Compliance with laws, rules and regulations relating to corporate governance and public disclosure may result in additional expenses.
Federal securities laws, rules and regulations, as well as NASDAQ Stock Market rules and regulations, require companies to maintain extensive corporate governance measures, impose comprehensive reporting and disclosure requirements, set strict independence and financial expertise standards for audit and other committee members and impose civil and criminal penalties for companies and their Chief Executive Officers, Chief Financial Officers and directors for securities law violations. These laws, rules and regulations and the interpretation of these requirements are evolving, and we are making investments to evaluate current practices and to continue to achieve compliance, which investments may have a material impact on the Company’s financial condition.
25
Our headquarters and some significant supporting businesses are located in Northern California and other areas subject to natural disasters that could disrupt our operations and harm our business.
Our corporate headquarters are located in Silicon Valley in Northern California. Historically, this region as well as our R&D centers in North Carolina and New Hampshire have been vulnerable to natural disasters and other risks, such as earthquakes, fires, floods and tropical storms, which at times have disrupted the local economy and posed physical risks to our property. We have contract manufacturers located in Taiwan where similar natural disasters and other risks may disrupt the local economy and pose physical risks to our property and the property of our contract manufacturer.
In addition, the continued threat of terrorism and heightened security and military action in response to this threat, or any future acts of terrorism, may cause further disruptions to the economies of the U.S. and other countries. If such disruptions result in delays or cancellations of customer orders for our products, our business and operating results will suffer.
We currently do not have redundant, multiple site capacity in the event of a natural disaster, terrorist act or other catastrophic event. In the event of such an occurrence, our business would suffer.
Our stock price has been volatile in the past and our stock price may significantly fluctuate in the future.
In the past, our common stock price has fluctuated significantly. This could continue as we or our competitors announce new products, our results or those of our customers or competition fluctuate, conditions in the networking or semiconductor industry change, or when investors, change their sentiment toward stocks in the networking technology sector.
In addition, fluctuations in our stock price and our price-to-earnings multiple may make our stock attractive to momentum, hedge or day-trading investors who often shift funds into and out of stock rapidly, exacerbating price fluctuations in either direction, particularly when viewed on a quarterly basis.
We rely on the availability of third-party licenses.
Some of our products are designed to include software or other intellectual property, including open source software, licensed from third parties. It may be necessary in the future to seek or renew licenses relating to various aspects of these products. There can be no assurance that the necessary licenses would be available on acceptable terms, if at all. The inability to obtain certain licenses or other rights or to obtain such licenses or rights on favorable terms, could have a material adverse effect on our business, operating results, and financial condition. Moreover, the inclusion in our products of software or other intellectual property licensed from third parties on a nonexclusive basis could limit our ability to protect our proprietary rights in our products. Further, the failure to comply with the terms of any license, including free open source software, may result in our inability to continue to use such license. Our inability to maintain or re-license any third-party licenses required in our products or our inability to obtain third-party licenses necessary to develop new products and product enhancements, could require us, if possible, to develop substitute technology or obtain substitute technology of lower quality or performance standards or at a greater cost, any of which could delay or prevent product shipment and harm our business, financial condition, and results of operations.
System security risks, data protection breaches, and cyber-attacks could compromise our proprietary information, disrupt our internal operations and harm public perception of our products, which could adversely affect our business.
In the ordinary course of business, we store sensitive data, including intellectual property, our proprietary business information and that of our customers, suppliers and business partners on our networks. The secure maintenance of this information is critical to our operations and business strategy. Increasingly, companies, including Extreme Networks, are subject to a wide variety of attacks on their networks on an ongoing basis. Despite our security measures, Extreme Networks' information technology and infrastructure may be vulnerable to penetration or attacks by computer programmers and hackers, or breached due to employee error, malfeasance or other disruptions. Any such breach could compromise our networks, creating system disruptions or slowdowns and exploiting security vulnerabilities of our products, and the information stored on our networks could be accessed, publicly disclosed, lost or stolen, which could subject us to liability to our customers, suppliers, business partners and others, and cause us reputational and financial harm. In addition, sophisticated hardware and operating system software and applications that we produce or procure from third parties may contain defects in design or manufacture, including "bugs" and other problems that could unexpectedly interfere with the operation of our networks.
26
If an actual or perceived breach of network security occurs in our network or in the network of a customer of our networking products, regardless of whether the breach is attributable to our products, the market perception of the effectiveness of our products could be harmed. In addition, the economic costs to us to eliminate or alleviate cyber or other security problems, bugs, viruses, worms, malicious software systems and security vulnerabilities could be significant and may be difficult to anticipate or measure. Because the techniques used by computer programmers and hackers, many of whom are highly sophisticated and well-funded, to access or sabotage networks change frequently and generally are not recognized until after they are used, we may be unable to anticipate or immediately detect these techniques. This could impede our sales, manufacturing, distribution or other critical functions, which could adversely affect our business.
Market conditions and changes in the industry could lead to discontinuation of our products or businesses resulting in asset impairments.
In response to changes in industry and market conditions, we may be required to strategically realign our resources and consider restructuring, disposing of, or otherwise exiting businesses. Any decision to limit investment in or dispose of or otherwise exit businesses may result in the recording of special charges, such as inventory and technology-related write-offs, workforce reduction costs, charges relating to consolidation of excess facilities, or claims from third parties who were resellers or users of discontinued products. Our estimates with respect to the useful life or ultimate recoverability of our carrying basis of assets, including purchased intangible assets, could change as a result of such assessments and decisions. Although in certain instances, our supply agreements allow us the option to cancel, reschedule, and adjust our requirements based on our business needs prior to firm orders being placed, our loss contingencies may include liabilities for contracts that we cannot cancel with contract manufacturers and suppliers. Further, our estimates relating to the liabilities for excess facilities are affected by changes in real estate market conditions.
If our products do not effectively inter-operate with our customers’ networks and result in cancellations and delays of installations our business could be harmed.
Our products are designed to interface with our customers’ existing networks, each of which have different specifications and utilize multiple protocol standards and products from other vendors. Many of our customers’ networks contain multiple generations of products that have been added over time as these networks have grown and evolved. Our products must inter-operate with many or all of the products within these networks as well as future products in order to meet our customers’ requirements. If we find errors in the existing software or defects in the hardware used in our customers’ networks, we may need to modify our software networking solutions to fix or overcome these errors so that our products will inter-operate and scale with the existing software and hardware, which could be costly and could negatively affect our business, financial condition, and results of operations. In addition, if our products do not inter-operate with those of our customers’ networks, demand for our products could be adversely affected or orders for our products could be canceled. This could hurt our operating results, damage our reputation, and seriously harm our business and prospects.
Regulations related to conflict minerals may cause us to incur additional expenses and could limit the supply and increase the costs of certain metals used in the manufacturing of our products.
As a public company, we are subject to requirements under the Dodd-Frank Wall Street Reform and Consumer Protection Act of 2010, or the Dodd-Frank Act, and the regulations adopted by the SEC as a result of the Dodd-Frank Act, that will require us to perform certain reasonable country of origin inquiry and diligence exercises, and disclose and report on our diligence process and efforts to ascertain whether or not our products may contain “conflict minerals” mined from the Democratic Republic of the Congo or adjoining countries. The implementation of these new requirements could adversely affect the sourcing, availability and pricing of the materials used in the manufacture of components used in our products. In addition, we will incur additional costs to comply with these disclosure requirements, including costs related to conducting ongoing diligence procedures and, if applicable, potential changes to products, processes or sources of supply as a consequence of such activities. We may also face reputational harm if we determine that certain of our products contain minerals not determined to be conflict-free or if we are unable to alter our products, processes or sources of supply to avoid such materials. In such an event, we may also face difficulties in satisfying customers if we are unable to verify that any conflict minerals used in our products are not sourced from the covered countries or are not done so by conflict free certified refiners and smelters.
We have liabilities for real estate leases in excess of what is necessary for our current business.
We have real estate leases that we are currently trying to sublease or that we have had to write-off their cost. Until such time that we are able to sublease these properties, or the current leases expire, we may incur financial liabilities for real estate leases significantly in excess of what is necessary for our current business.
27
The results of the United Kingdom's referendum on withdrawal from the European Union may have a negative effect on global economic conditions, financial markets and our business.
In June 2016, a majority of voters in the United Kingdom elected to withdraw from the European Union in a national referendum. The referendum was advisory, and the terms of any withdrawal are subject to a negotiation period that could last at least two years after the government of the United Kingdom formally initiates a withdrawal process. Nevertheless, the referendum has created significant uncertainty about the future relationship between the United Kingdom and the European Union, including with respect to the laws and regulations that will apply as the United Kingdom determines which European Union laws to replace or replicate in the event of a withdrawal. The referendum has also given rise to calls for the governments of other European Union member states to consider withdrawal. These developments, or the perception that any of them could occur, have had and may continue to have a material adverse effect on global economic conditions and the stability of global financial markets, and may significantly reduce global market liquidity and restrict the ability of key market participants to operate in certain financial markets. Any of these factors could depress economic activity and restrict our access to capital, which could have a material adverse effect on our business, financial condition and results of operations and reduce the price of our securities.
Item 1B. Unresolved Staff Comments
None.
We started leasing our current headquarters, which is located in San Jose, California, in June 2013. We also lease office space and executive suites in various other geographic locations domestically and internationally for research & development, sales and service personnel and administration. Our aggregate lease expense for fiscal year 2016 was $8.5 million.
At June 30, 2016, the significant facilities that we leased were as follows:
Location |
|
Use |
|
Size |
|
|
|
|
|
|
(in square feet) |
|
|
San Jose, California |
|
Principal administrative, sales and marketing facilities |
|
|
57,600 |
|
Research Triangle Park, North Carolina |
|
Research and development, sales and administrative offices |
|
|
54,530 |
|
Salem, New Hampshire |
|
Research and development, sales and marketing and administrative offices |
|
|
197,300 |
|
Chennai, India |
|
Research and development facilities |
|
|
43,839 |
|
Shannon, Ireland |
|
Administrative offices |
|
|
26,100 |
|
The information set forth under the heading “Legal Proceedings” in Note 5, Commitments, Contingencies and Leases, in Notes to Consolidated Financial Statements in Item 8 of Part II of this Annual Report on Form 10-K, is incorporated herein by reference.
Item 4. Mine Safety Disclosures
Not Applicable
28
Item 5. Market for Registrant’s Common Equity, Related Stockholder Matters and Issuer Purchases of Equity Securities
Common Stock Market Prices and Dividends
Our common stock trades on the NASDAQ Global Market and commenced trading on NASDAQ on April 9, 1999 under the symbol “EXTR.” The following table sets forth the high and low sales prices as reported by NASDAQ. Such prices represent prices between dealers, do not include retail mark-ups, mark-downs or commissions and may not represent actual transactions.
Stock Prices |
|
High |
|
|
Low |
|
||
Fiscal year ended June 30, 2016: |
|
|
|
|
|
|
|
|
First quarter |
|
$ |
3.56 |
|
|
$ |
2.13 |
|
Second quarter |
|
$ |
4.42 |
|
|
$ |
3.34 |
|
Third quarter |
|
$ |
3.99 |
|
|
$ |
2.35 |
|
Fourth quarter |
|
$ |
3.78 |
|
|
$ |
3.08 |
|
Fiscal year ended June 30, 2015: |
|
|
|
|
|
|
|
|
First quarter |
|
$ |
5.38 |
|
|
$ |
4.24 |
|
Second quarter |
|
$ |
4.85 |
|
|
$ |
3.01 |
|
Third quarter |
|
$ |
3.60 |
|
|
$ |
2.70 |
|
Fourth quarter |
|
$ |
3.25 |
|
|
$ |
2.41 |
|
As of August 22, 2016, there were 217 stockholders of record of our common stock. Because many of our shares of common stock are held by brokers and other institutions on behalf of stockholders, we are unable to estimate the total number of stockholders represented by these record holders. We have never declared or paid cash dividends on our capital stock and do not anticipate paying any cash dividends in the foreseeable future.
We had authority granted by our Board of Directors to repurchase up to $75 million which were to be purchased over a three year period starting October 1, 2012 and ending on October 1, 2015. Since the inception of the program, 4.1 million shares of common stock have been repurchased at a total purchase price of $14.5 million, none of which was repurchased in fiscal 2015 or 2016.
Certain information regarding our equity compensation plan(s) as required by Part II is incorporated by reference from our definitive Proxy Statement to be filed with the Securities and Exchange Commission in connection with the solicitation of proxies for our 2016 Annual Meeting of Stockholders not later than 120 days after the end of the fiscal year covered by this report.
29
STOCK PRICE PERFORMANCE GRAPH
Set forth below is a stock price performance graph comparing the annual percentage change in the cumulative total return on our common stock with the cumulative total returns of the CRSP Total Return Index for The NASDAQ Stock Market (U.S. companies) and the NASDAQ Computer Manufacturers Securities for the period commencing July 3, 2011 and ending on June 30, 2016. The comparisons in the graph below are based on historical data and are not intended to forecast the possible future performance of our common stock.
Comparison of Five-Year Cumulative Total Returns
Performance Graph for Extreme Networks, Inc.
Prepared by CRSP (www.crsp.uchicago.edu), Center for Research in Security Prices, Booth School of Business, The University of Chicago. Used with permission. All rights reserved.
30
Item 6. Selected Financial Data
The following table sets forth selected consolidated financial data for each of the fiscal years ended June 30, 2016, 2015, 2014, 2013 and 2012 derived from the Company’s audited financial statements (in thousands, except per share amounts). These tables should be reviewed in conjunction with the Consolidated Financial Statements in Item 8 and related Notes, as well as Item 7, “Management’s Discussion and Analysis of Financial Condition and Results of Operations.” Historical results may not be indicative of future results.
|
|
Year Ended |
|
|||||||||||||||||
|
|
June 30, |
|
|||||||||||||||||
|
|
2016(1) |
|
|
2015(2) |
|
|
2014(3) |
|
|
2013(4) |
|
|
2012(5) |
|
|||||
Consolidated Statements of Operations Data: |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Net revenues |
|
$ |
528,389 |
|
|
$ |
552,940 |
|
|
$ |
519,554 |
|
|
$ |
299,343 |
|
|
$ |
322,722 |
|
Operating income (loss) |
|
$ |
(25,550 |
) |
|
$ |
(62,994 |
) |
|
$ |
(50,232 |
) |
|
$ |
10,852 |
|
|
$ |
13,909 |
|
Net income (loss) |
|
$ |
(31,884 |
) |
|
$ |
(71,643 |
) |
|
$ |
(57,310 |
) |
|
$ |
9,673 |
|
|
$ |
15,872 |
|
Net income (loss) per share – basic |
|
$ |
(0.31 |
) |
|
$ |
(0.72 |
) |
|
$ |
(0.60 |
) |
|
$ |
0.10 |
|
|
$ |
0.17 |
|
Net income (loss) per share – diluted |
|
$ |
(0.31 |
) |
|
$ |
(0.72 |
) |
|
$ |
(0.60 |
) |
|
$ |
0.10 |
|
|
$ |
0.17 |
|
Shares used in per share calculation – basic |
|
|
103,074 |
|
|
|
99,000 |
|
|
|
95,515 |
|
|
|
93,954 |
|
|
|
93,451 |
|
Shares used in per share calculation – diluted |
|
|
103,074 |
|
|
|
99,000 |
|
|
|
95,515 |
|
|
|
95,044 |
|
|
|
94,490 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
As of |
|
|||||||||||||||||
|
|
June 30, |
|
|||||||||||||||||
|
|
2016 |
|
|
2015 |
|
|
2014 |
|
|
2013 |
|
|
2012 |
|
|||||
Consolidated Balance Sheets Data: |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Cash and cash equivalents, short-term investments and marketable securities |
|
$ |
94,122 |
|
|
$ |
76,225 |
|
|
$ |
105,882 |
|
|
$ |
205,613 |
|
|
$ |
153,515 |
|
Inventories |
|
$ |
40,989 |
|
|
$ |
58,014 |
|
|
$ |
57,109 |
|
|
$ |
16,167 |
|
|
$ |
26,609 |
|
Total assets |
|
$ |
374,849 |
|
|
$ |
428,660 |
|
|
$ |
526,432 |
|
|
$ |
311,424 |
|
|
$ |
284,590 |
|
Deferred revenue, net |
|
$ |
94,860 |
|
|
$ |
99,782 |
|
|
$ |
97,677 |
|
|
$ |
41,454 |
|
|
$ |
39,328 |
|
Total debt |
|
$ |
55,500 |
|
|
$ |
66,875 |
|
|
$ |
121,563 |
|
|
$ |
— |
|
|
$ |
— |
|
Other long-term liabilities |
|
$ |
13,328 |
|
|
$ |
10,264 |
|
|
$ |
8,595 |
|
|
$ |
1,507 |
|
|
$ |
643 |
|
Common stock and capital in excess of par value |
|
$ |
884,706 |
|
|
$ |
865,382 |
|
|
$ |
845,364 |
|
|
$ |
821,425 |
|
|
$ |
970,743 |
|
Accumulated deficit |
|
$ |
(791,740 |
) |
|
$ |
(759,856 |
) |
|
$ |
(688,213 |
) |
|
$ |
(630,903 |
) |
|
$ |
(640,576 |
) |
(1) |
Fiscal 2016 net loss and net loss per share includes acquisition and integrations costs of $1.1 million, amortization of intangibles of $17.0 million and a restructuring charge of $11.0 million. |
(2) |
Fiscal 2015 net loss and net loss per share includes acquisition and integrations costs of $10.2 million, amortization of intangibles of $17.9 million and a restructuring charge of $9.8 million. |
(3) |
Fiscal 2014 net loss and net loss per share includes acquisition and integration costs of $25.7 million, amortization of intangibles of $16.7 million and a restructuring charge of $0.5 million. |
(4) |
Fiscal 2013 net income and net income per share includes a gain on sale of facilities of $11.5 million, a restructuring charge of $6.8 million and a charge for litigation settlement, net of $2.0 million. |
(5) |
Fiscal 2012 net income and net income per share includes a restructuring charge of $1.6 million and a litigation settlement gain of $0.1 million and $1.9 million cumulative translation adjustments gain from the liquidation of our Japanese subsidiary. |
31
Quarterly Financial Data (Unaudited)
Quarterly results for the years ended June 30, 2016 and 2015 are as follow (in thousands, except per share amounts):
|
|
June 30, |
|
|
March 31, |
|
|
December 31, |
|
|
September 30, |
|
||||
|
|
2016(1) |
|
|
2016(2) |
|
|
2015(3) |
|
|
2015(4) |
|
||||
Net revenues |
|
$ |
139,617 |
|
|
$ |
124,886 |
|
|
$ |
139,305 |
|
|
$ |
124,581 |
|
Gross profit |
|
$ |
72,675 |
|
|
$ |
62,720 |
|
|
$ |
70,275 |
|
|
$ |
65,118 |
|
Net loss |
|
$ |
(2,340 |
) |
|
$ |
(10,784 |
) |
|
$ |
(7,234 |
) |
|
$ |
(11,526 |
) |
Net loss per share – basic |
|
$ |
(0.02 |
) |
|
$ |
(0.10 |
) |
|
$ |
(0.07 |
) |
|
$ |
(0.11 |
) |
Net loss per share – diluted |
|
$ |
(0.02 |
) |
|
$ |
(0.10 |
) |
|
$ |
(0.07 |
) |
|
$ |
(0.11 |
) |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
June 30, |
|
|
March 31, |
|
|
December 31, |
|
|
September 30, |
|
||||
|
|
2015(5) |
|
|
2015(6) |
|
|
2014(7) |
|
|
2014(8) |
|
||||
Net revenues |
|
$ |
149,870 |
|
|
$ |
119,590 |
|
|
$ |
147,208 |
|
|
$ |
136,274 |
|
Gross profit |
|
$ |
76,327 |
|
|
$ |
57,724 |
|
|
$ |
75,162 |
|
|
$ |
70,527 |
|
Net loss |
|
$ |
(15,657 |
) |
|
$ |
(23,548 |
) |
|
$ |
(13,105 |
) |
|
$ |
(19,330 |
) |
Net loss per share – basic |
|
$ |
(0.16 |
) |
|
$ |
(0.24 |
) |
|
$ |
(0.13 |
) |
|
$ |
(0.20 |
) |
Net loss per share – diluted |
|
$ |
(0.16 |
) |
|
$ |
(0.24 |
) |
|
$ |
(0.13 |
) |
|
$ |
(0.20 |
) |
(1) |
Net loss and net loss per share include the effect of amortization of intangibles of $4.1 million and a restructuring charge of $1.0 million. |
(2) |
Net loss and net loss per share include the effect of amortization of intangibles of $4.1 million and a restructuring charge of $1.4 million. |
(3) |
Net loss and net loss per share include the effect of acquisition and integration costs of $0.8 million, amortization of intangibles of $4.3 million and a restructuring charge of $3.0 million. |
(4) |
Net loss and net loss per share include the effect of acquisition and integration costs of $0.3 million, amortization of intangibles of $4.5 million and a restructuring charge of $5.6 million. |
(5) |
Net loss and net loss per share include the effect of acquisition and integration costs of $0.9 million, amortization of intangibles of $4.5 million and a restructuring charge of $9.8 million. |
(6) |
Net loss and net loss per share include the effect of acquisition and integration costs of $1.7 million and amortization of intangibles of $4.5 million. |
(7) |
Net loss and net loss per share include the effect of acquisition and integration costs of $3.5 million and amortization of intangibles of $4.5 million. |
(8) |
Net loss and net loss per share include the effect of acquisition and integration costs of $4.1 million and amortization of intangibles of $4.5 million. |
Quarterly and year-to-date computations of per share amounts are made independently. Therefore, the sum of per share amounts for the quarters may not agree with the per share amounts for the year.
32
Item 7. Management’s Discussion and Analysis of Financial Condition and Results of Operations
Business Overview
The following discussion should be read with the Consolidated Financial Statements and the related notes in Item 8 of Part II of this Report.
The following discussion is based upon our Consolidated Financial Statements included elsewhere in this Report, which have been prepared in accordance with U.S. generally accepted accounting principles, or U.S. GAAP. In the course of operating our business, we routinely make decisions as to the timing of the payment of invoices, the collection of receivables, the manufacturing and shipment of products, the fulfillment of orders, the purchase of supplies, and the building of inventory and spare parts, among other matters. Each of these decisions has some impact on the financial results for any given period. In making these decisions, we consider various factors including contractual obligations, customer satisfaction, competition, internal and external financial targets and expectations, and financial planning objectives. For further information about our critical accounting policies and estimates, see “Critical Accounting Policies and Estimates” section included in this “Management's Discussion and Analysis of Financial Condition and Results of Operations.”
Extreme is a leading provider of network infrastructure equipment and offer related maintenance contracts for extended warranty and maintenance to our enterprise, data center and service provider customers. We were incorporated in California in May 1996, and reincorporated in Delaware in March 1999. Our corporate headquarters are located in San Jose, California. Substantially all of our revenue is derived from the sale of our networking equipment and related maintenance contracts.
Restructuring
During the fourth quarter of fiscal 2015, we implemented a plan to reduce costs through targeted restructuring activities intended to reduce operating costs and realign our organization in the current competitive environment. We initiated a plan to reduce our worldwide headcount by more than 225 employees, primarily in sales and marketing as well as research and development, consolidate specific global administrative functions, and shift certain operating costs to lower cost regions, among other actions.
During fiscal 2016, we continued our initiative to realign our operations with a second phase by abandoning excess facilities, primarily in San Jose, California; Salem, New Hampshire; Research Triangle Park, North Carolina in addition to other smaller leased locations. Such facilities represented approximately 32% of the floor space in the aggregate at these locations and included general office and warehouse space. We may terminate or choose not to renew leases for excess facilities in future periods as we further align our organization to our business and operational needs.
Amendment to Rights Agreement
On April 26, 2012, we entered into an Amended and Restated Rights Agreement between the Company and Computershare Shareholder Services LLC as the rights agent (the “Restated Rights Plan”). The Restated Rights Plan governs the terms of each right (“Right”) that has been issued with respect to each share of our Common Stock. Each Right initially represents the right to purchase one one-thousandth of a share of our Preferred Stock. The Restated Rights Plan replaces in its entirety the Rights Agreement, dated as of April 27, 2001, as subsequently amended, between us and Mellon Investor Services LLC (the “Prior Rights Plan”).
The Board adopted the Restated Rights Plan to preserve the value of our deferred tax assets, including our net operating loss carry forwards, with respect to our ability to fully use tax benefits to offset future income which may be limited if we experience an “ownership change” for purposes of Section 382 of the Internal Revenue Code of 1986, as amended as a result of ordinary buying and selling of our common stock. Following its review of the terms of the plan, the Board decided it was necessary and in the best interests of us and our stockholders to enter into the Restated Rights Plan. The Restated Rights Plan incorporates the Prior Rights Plan and the amendments thereto into a single agreement and extended the term of the Prior Rights Plan to April 30, 2013. Each year since 2013 our Board and shareholders have approved an amendment providing for a one year extension of the term of the Restated Rights Plan. Our Board of Directors unanimously approved an amendment to the Restated Rights Plan on May 5, 2016 to extend the Restated Rights Plan through May 31, 2017, subject to ratification by a majority of the stockholders of the Company at the next annual shareholders meeting, expected to be held on November 18, 2016.
33
Results of Operations
Our operations and financial performance during fiscal 2016, achieved the following results:
|
· |
Net revenue of $528.4 million, a decrease of 4.4% from fiscal 2015 net revenue of $552.9 million. |
|
· |
Product revenue of $395.5 million, a decrease of 5.4% from fiscal 2015 product revenue of $418.0 million. |
|
· |
Service revenue of $132.9 million, a decrease of 1.5% from fiscal 2015 service revenue of $134.9 million. |
|
· |
Total gross margin of 51.2% of net revenue in fiscal 2016, compared to 50.6% in fiscal 2015. |
|
· |
Restructuring charge of $11.0 million, for excess facilities and contract termination. |
|
· |
Operating loss of $25.6 million, a decrease in the operating loss of $37.4 million from fiscal 2015. |
|
· |
Net loss was $31.9 million in fiscal 2016, a decrease of $39.8 million from a net loss of $71.6 million in fiscal 2015. |
|
· |
Cash flow provided by operating activities was $30.4 million, compared to cash flow provided by operating activities of $37.4 million in fiscal 2015, a decrease of $7.1 million. Cash and cash equivalents were $94.1 million as of June 30, 2016, an increase of $17.9 million compared to fiscal 2015. |
Net Revenue
The following table presents net product and service revenue for the fiscal years 2016, 2015 and 2014 (dollars in thousands):
|
|
Year Ended |
|
|
Year Ended |
|
||||||||||||||||||||||||||
|
|
June 30, 2016 |
|
|
June 30, 2015 |
|
|
$ Change |
|
|
% Change |
|
|
June 30, 2015 |
|
|
June 30, 2014 |
|
|
$ Change |
|
|
% Change |
|
||||||||
Net Revenues: |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Product |
|
$ |
395,464 |
|
|
$ |
418,046 |
|
|
$ |
(22,582 |
) |
|
|
(5.4 |
)% |
|
$ |
418,046 |
|
|
$ |
411,761 |
|
|
$ |
6,285 |
|
|
|
1.5 |
% |
Percentage of net revenue |
|
|
74.8 |
% |
|
|
75.6 |
% |
|
|
|
|
|
|
|
|
|
|
75.6 |
% |
|
|
79.3 |
% |
|
|
|
|
|
|
|
|
Service |
|
|
132,925 |
|
|
|
134,894 |
|
|
|
(1,969 |
) |
|
|
(1.5 |
)% |
|
|
134,894 |
|
|
$ |
107,793 |
|
|
|
27,101 |
|
|
|
25.1 |
% |
Percentage of net revenue |
|
|
25.2 |
% |
|
|
24.4 |
% |
|
|
|
|
|
|
|
|
|
|
24.4 |
% |
|
|
20.7 |
% |
|
|
|
|
|
|
|
|
Total net revenues |
|
$ |
528,389 |
|
|
$ |
552,940 |
|
|
$ |
(24,551 |
) |
|
|
(4.4 |
)% |
|
$ |
552,940 |
|
|
$ |
519,554 |
|
|
$ |
33,386 |
|
|
|
6.4 |
% |
Product revenue decreased $22.6 million or 5.4% for the year-ended June 30, 2016, compared to the corresponding period of fiscal 2015. The decrease in sales was primarily due to an increase in competitive pricing pressure on lower volumes of chassis (modular) based products due to market shifts towards fixed products which are generally lower cost and are capable of rapidly adapting to changes and needs of the marketplace. The growth in the fixed products was not sufficient to offset the modular product decline and to a lesser extent, to the strengthening of the United States Dollar in nearly all geographical regions.
Product revenue increased $6.3 million or 1.5% for the year-ended June 30, 2015, compared to the corresponding period of fiscal 2014. The fiscal 2015 period reflects increased product shipments and customers as a result of our acquisition of Enterasys, whereas the fiscal 2014 period only reflects eight months of sales subsequent to the October 31, 2013 acquisition date. However, the increase in sales was partially offset by declines of customer spending across each geographical region and an increase in customer discounts. The decline in customer spending was partially due to the significant strengthening of the United States Dollar in all geographical areas and the entrance of competitors in regions where we have a strong presence, specifically in Asia Pacific and EMEA regions.
Service revenue decreased $2.0 million or 1.5% for the year-ended June 30, 2016 compared to the corresponding period of fiscal 2015 due to a decrease in service maintenance contracts and professional service and training revenues. Partially offsetting the decrease were lower purchase accounting charges related to deferred service revenues which decreased $1.6 million for the year-ended June 30, 2016, to $1.5 million from $3.1 million in the corresponding period of fiscal 2015.
Service revenue increased $27.1 million or 25.1% for the year-ended June 30, 2015 compared to the corresponding period of fiscal 2014 due to an increase in service maintenance contracts and professional service and training revenues due to our acquisition of Enterasys. Purchase accounting charges related to deferred service revenues decreased $2.2 million for the year-ended June 30, 2015, to $3.1 million from $5.3 million in the corresponding period of fiscal 2014.
34
We operate in three regions: Americas, which includes the United States, Canada, Mexico, Central America and South America; EMEA, which includes Europe, Russia, Middle East, and Africa; and APAC which includes Asia Pacific, South Asia, Japan and Australia. The following table presents the total net revenue geographically for the fiscal years 2016, 2015 and 2014 (dollars in thousands):
|
|
Year Ended |
|
|
Year Ended |
|
||||||||||||||||||||||||||
Net Revenues |
|
June 30, 2016 |
|
|
June 30, 2015 |
|
|
$ Change |
|
|
% Change |
|
|
June 30, 2015 |
|
|
June 30, 2014 |
|
|
$ Change |
|
|
% Change |
|
||||||||
Americas: |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
United States |
|
$ |
237,933 |
|
|
$ |
238,748 |
|
|
$ |
(815 |
) |
|
|
(0.3 |
)% |
|
$ |
238,748 |
|
|
$ |
211,734 |
|
|
$ |
27,014 |
|
|
|
12.8 |
% |
Other |
|
|
44,455 |
|
|
|
31,931 |
|
|
|
12,524 |
|
|
|
39.2 |
% |
|
|
31,931 |
|
|
|
45,790 |
|
|
|
(13,859 |
) |
|
|
(30.3 |
)% |
Total Americas |
|
|
282,388 |
|
|
|
270,679 |
|
|
|
11,709 |
|
|
|
4.3 |
% |
|
|
270,679 |
|
|
|
257,524 |
|
|
|
13,155 |
|
|
|
5.1 |
% |
Percentage of net revenue |
|
|
53.4 |
% |
|
|
49.0 |
% |
|
|
|
|
|
|
|
|
|
|
49.0 |
% |
|
|
49.6 |
% |
|
|
|
|
|
|
|
|
EMEA |
|
|
196,588 |
|