Valuation of Opera Software Ole Martin Veitberg Braaten Fredrik Lundin

Total Page:16

File Type:pdf, Size:1020Kb

Valuation of Opera Software Ole Martin Veitberg Braaten Fredrik Lundin Valuation of Opera Software Ole Martin Veitberg Braaten Fredrik Lundin Supervisor: Poul Kjær Number of pages: 119 Characters: 272,399 Standard Pages: 120 Submission date: 12.05.2016 Master Thesis - Copenhagen Business School, 2016 Cand. Merc Finance and Accounting Executive Summary 1. Executive Summary Opera Software er et norsk selskap grunnlagt i 1994, og senere børsnotert på Oslo Børs i 2004. Det er et selskap som har vært gjennom store forandringer, som følge av en teknologisk drevet industri, men også grunnet høy frekvens av oppkjøp som har influert Operas produktsammensetning. Dagens Opera leverer et økosystem av teknologiske løsninger innen nettlesere, datakompresjon og mobilreklame for forbrukere, operatører, annonsører og utgivere. Mobilreklame er den dominerende i form av inntjening, hvilket den har vært fra og med 2014. Industrien er preget av høy konkurranse blant mindre nisjeaktører, men også fra kjente navn som Facebook, Google, Yahoo med flere. Sammenlignet med peers har Opera historisk levert gode resultater, men fra og med 2014 har de opplevd en nedgang i avkastning på den investerte kapital. Mye av årsaken til denne nedgangen kan forklares med Operas satsning innen mobilreklame og oppkjøpet av blant annet AdColony i 2014. Operas aksjekurs har i senere tid også vært meget volatil. I perioden mellom februar og august 2015 har selskapet kommet med intet mindre enn to resultatvarsler, innløsninger av ledelsesopsjoner på tidspunkter som i beste fall kan karakteriseres som tvilsomme, samt at selskapet annonserte at de utforsker strategiske muligheter. Forfatterne er av den oppfatning at selskapet sliter med omdømmet ovenfor investorer, hvilket også gjenspeiles i den relative verdsettelsen. Målet med avhandlingen er å estimere en indre verdi av egenkapitalen i Opera. Forskjellige verdivurderingsmetoder har blitt benyttet, hvor hovedvekten av de fundamentale verdiestimatene er begrunnet i residualinntjenings-prinsippet. Metodene skiller seg fra hverandre i måten risikojusteringen er foretatt, hvor det ene verdiestimatet er beregnet ved en mer tradisjonell risikojustering i nevneren med en selskapsspesifikk risikojustering på 5.6% som tillegges den estimerte risikofrie rentestrukturen. Den andre metoden er mer utradisjonell og foretar risikojusteringen i telleren med kovariansen mellom en estimert konsumindeks og residualinntjeningen til Opera, samt i hvilken grad industriens residualinntjeningsavkast vedvarer over tid. Dette skal gi et lavere valuation error enn standard verdsettelsesmetoder. Den mer tradisjonelle risikojusteringsmetoden resulterer i et verdiestimat på egenkapitalen til Opera på NOK 34,5 per aksje mot den utradisjonelle på NOK 64,8. Ved å inndra den relative verdsettelse, både ved et handels- og oppkjøpsscenario og variasjoner i beregning av terminalverdi, finner forfatterne med stor sannsynlighet, at verdien av Operas egenkapital ligger mellom NOK 25,9 og NOK 92. Når det er sagt, tillegges den utradisjonelle metoden mest vekt, som gir et verdiestimat på NOK 64,8 per aksje. Per 9. februar 2016 handles Opera til NOK 48,8, hvilket implisitt betyr en feilprising i markedet på 25%, hvor markedet underpriser Opera sammenlignet med vårt estimat. Page 3 of 171 Table of Contents 2. Table of Contents 1. Executive Summary ........................................................................................................................ 3 2. Table of Contents ........................................................................................................................... 4 3. Introduction ................................................................................................................................... 6 3.1 Context and Motivation..................................................................................................................... 6 3.2 Problem Statement ........................................................................................................................... 7 3.3 Methodology ................................................................................................................................... 10 3.4 Assumptions and Limitations .......................................................................................................... 12 4. Introduction to Opera ................................................................................................................... 13 4.1 Introduction to Opera Software’s History ....................................................................................... 13 4.2 Historical Events and Share Price Developments ............................................................................ 14 4.3 Company Description ...................................................................................................................... 15 4.4 Organization .................................................................................................................................... 18 4.5 Ad Tech Industry .............................................................................................................................. 18 5. Theory .......................................................................................................................................... 22 5.1 Strategic Frameworks ...................................................................................................................... 22 5.2 Valuation Methods .......................................................................................................................... 27 5.3 Estimation of Term Structure .......................................................................................................... 32 6. Strategic Analysis .......................................................................................................................... 35 6.1 STEEPLE ............................................................................................................................................ 35 6.2 Porter’s Five Forces ......................................................................................................................... 46 6.3 VRIO ................................................................................................................................................. 58 7. Financial Analysis .......................................................................................................................... 64 7.1 Reclassification of Financial Statements ......................................................................................... 64 7.2 Industry Time-series Analysis .......................................................................................................... 68 7.3 Industry Cross-sectional Analysis .................................................................................................... 77 Page 4 of 171 Table of Contents 7.4 Opera´s Historical Performance ...................................................................................................... 78 8. SWOT ........................................................................................................................................... 83 9. Forecasting ................................................................................................................................... 84 9.1 Sales Growth .................................................................................................................................... 85 9.2 Profit Margin (PM) ........................................................................................................................... 91 9.3 Asset Turnover (ATO) ...................................................................................................................... 93 10. Estimation of Risk-Adjustments ................................................................................................. 95 10.1 Estimation of Term-Structure .......................................................................................................... 95 10.2 Estimation of Company-Specific Risk Premium ............................................................................... 97 10.3 Estimation of Risk-Adjustments for CCAPM .................................................................................. 108 11. Valuation ................................................................................................................................ 109 11.1 APV Approach ................................................................................................................................ 109 11.2 CCAPM Approach .......................................................................................................................... 110 11.3 Relative Valuation .......................................................................................................................... 111 11.4 Valuation Summary ....................................................................................................................... 114 12. Sensitivity ............................................................................................................................... 116 13. Discussion ............................................................................................................................... 118 14. Conclusion .............................................................................................................................. 119 15. Thesis
Recommended publications
  • Open 1-Matthewdering-Thesis.Pdf
    The Pennsylvania State University The Graduate School ANDROID MARKET: LARGE SCALE RECONSTRUCTION AND ANALYSIS A Thesis in Computer Science and Engineering by Matthew Dering c 2014 Matthew Dering Submitted in Partial Fulfillment of the Requirements for the Degree of Master of Science May 2014 The thesis of Matthew Dering was reviewed and approved∗ by the following: Patrick McDaniel Professor of Computer Science and Engineering Thesis Advisor Sencun Zhu Associate Professor of Computer Science and Engineering Raj Acharya Professor of Computer Science and Engineering Department Chair ∗Signatures are on file in the Graduate School. Abstract Smartphones have experienced a boom over the last 10 years. Currently a user is left to trust their device manufacturer when installing applications. In this paper we outline our suite of applications that are designed to provide us and users information about applications leveraging a reversed API for the Google Play market, working in concert with several analysis tools, some of our own design. In order to gather as complete of a picture of the market as possible, we propose a method for recreating the market in its entirety. Using this procured data, we present an overview of how two popular Android features are used in the real world: Permissions and Libraries. We find that there is a large correlation between library use and Permission use, which represents a security concern. iii Table of Contents List of Figures vi List of Tables vii Acknowledgments viii Chapter 1 Introduction 1 1.1 Introduction . 1 1.2 Google Play Market . 2 1.3 Privileges . 4 1.4 Design .
    [Show full text]
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • Chapter # 1 Introduction
    Chapter # 1 Introduction Mobile applications (apps) have been gaining rising popularity dueto the advances in mobile technologies and the large increase in the number of mobile users. Consequently, several app distribution platforms, which provide a new way for developing, downloading, and updating software applications in modern mobile devices, have recently emerged. To better understand the download patterns, popularity trends, and development strategies in this rapidly evolving mobile app ecosystem, we systematically monitored and analyzed four popular third-party Android app marketplaces. Our study focuses on measuring, analyzing, and modeling the app popularity distribution, and explores how pricing and revenue strategies affect app popularity and developers’ income. Our results indicate that unlike web and peer-to-peer file sharing workloads, the app popularity distribution deviates from commonly observed Zipf-like models. We verify that these deviations can be mainly attributed to a new download pattern, to which we refer as the clustering effect. We validate the existence of this effect by revealing a strong temporal affinity of user downloads to app categories. Based on these observations, we propose a new formal clustering model for the distribution of app downloads, and demonstrate that it closely fits measured data. Moreover, we observe that paid apps follow a different popularity distribution than free apps, and show how free apps with an ad-based revenue strategy may result in higher financial benefits than paid apps. We believe that this study can be useful to appstore designers for improving content delivery and recommendation systems, as well as to app developers for selecting proper pricing policies to increase their income.
    [Show full text]
  • HTTP Cookie - Wikipedia, the Free Encyclopedia 14/05/2014
    HTTP cookie - Wikipedia, the free encyclopedia 14/05/2014 Create account Log in Article Talk Read Edit View history Search HTTP cookie From Wikipedia, the free encyclopedia Navigation A cookie, also known as an HTTP cookie, web cookie, or browser HTTP Main page cookie, is a small piece of data sent from a website and stored in a Persistence · Compression · HTTPS · Contents user's web browser while the user is browsing that website. Every time Request methods Featured content the user loads the website, the browser sends the cookie back to the OPTIONS · GET · HEAD · POST · PUT · Current events server to notify the website of the user's previous activity.[1] Cookies DELETE · TRACE · CONNECT · PATCH · Random article Donate to Wikipedia were designed to be a reliable mechanism for websites to remember Header fields Wikimedia Shop stateful information (such as items in a shopping cart) or to record the Cookie · ETag · Location · HTTP referer · DNT user's browsing activity (including clicking particular buttons, logging in, · X-Forwarded-For · Interaction or recording which pages were visited by the user as far back as months Status codes or years ago). 301 Moved Permanently · 302 Found · Help 303 See Other · 403 Forbidden · About Wikipedia Although cookies cannot carry viruses, and cannot install malware on 404 Not Found · [2] Community portal the host computer, tracking cookies and especially third-party v · t · e · Recent changes tracking cookies are commonly used as ways to compile long-term Contact page records of individuals' browsing histories—a potential privacy concern that prompted European[3] and U.S.
    [Show full text]
  • Peer-To-Peer Protocol and Application Detection Support
    Peer-to-Peer Protocol and Application Detection Support This appendix lists all the protocols and applications currently supported by Cisco ASR 5500 ADC. • Supported Protocols and Applications, page 1 Supported Protocols and Applications This section lists all the supported P2P protocols, sub-protocols, and the applications using these protocols. Important Please note that various client versions are supported for the protocols. The client versions listed in the table below are the latest supported version(s). Important Please note that the release version in the Supported from Release column has changed for protocols/applications that are new since the ADC plugin release in August 2015. This will now be the ADC Plugin Build number in the x.xxx.xxx format. The previous releases were versioned as 1.1 (ADC plugin release for December 2012 ), 1.2 (ADC plugin release for April 2013), and so on for consecutive releases. New in this Release This section lists the supported P2P protocols, sub-protocols and applications introduced in the ADC Plugin release for December 1, 2017. ADC Administration Guide, StarOS Release 21.6 1 Peer-to-Peer Protocol and Application Detection Support New in this Release Protocol / Client Client Version Group Classification Supported from Application Release 6play 6play (Android) 4.4.1 Streaming Streaming-video ADC Plugin 2.19.895 Unclassified 6play (iOS) 4.4.1 6play — (Windows) BFM TV BFM TV 3.0.9 Streaming Streaming-video ADC Plugin 2.19.895 (Android) Unclassified BFM TV (iOS) 5.0.7 BFM — TV(Windows) Clash Royale
    [Show full text]
  • The Art, Science, and Engineering of Fuzzing: a Survey
    1 The Art, Science, and Engineering of Fuzzing: A Survey Valentin J.M. Manes,` HyungSeok Han, Choongwoo Han, Sang Kil Cha, Manuel Egele, Edward J. Schwartz, and Maverick Woo Abstract—Among the many software vulnerability discovery techniques available today, fuzzing has remained highly popular due to its conceptual simplicity, its low barrier to deployment, and its vast amount of empirical evidence in discovering real-world software vulnerabilities. At a high level, fuzzing refers to a process of repeatedly running a program with generated inputs that may be syntactically or semantically malformed. While researchers and practitioners alike have invested a large and diverse effort towards improving fuzzing in recent years, this surge of work has also made it difficult to gain a comprehensive and coherent view of fuzzing. To help preserve and bring coherence to the vast literature of fuzzing, this paper presents a unified, general-purpose model of fuzzing together with a taxonomy of the current fuzzing literature. We methodically explore the design decisions at every stage of our model fuzzer by surveying the related literature and innovations in the art, science, and engineering that make modern-day fuzzers effective. Index Terms—software security, automated software testing, fuzzing. ✦ 1 INTRODUCTION Figure 1 on p. 5) and an increasing number of fuzzing Ever since its introduction in the early 1990s [152], fuzzing studies appear at major security conferences (e.g. [225], has remained one of the most widely-deployed techniques [52], [37], [176], [83], [239]). In addition, the blogosphere is to discover software security vulnerabilities. At a high level, filled with many success stories of fuzzing, some of which fuzzing refers to a process of repeatedly running a program also contain what we consider to be gems that warrant a with generated inputs that may be syntactically or seman- permanent place in the literature.
    [Show full text]
  • Meteor: Seeding a Security-Enhancing Infrastructure for Multi-Market Application Ecosystems
    Meteor: Seeding a Security-Enhancing Infrastructure for Multi-market Application Ecosystems David Barrera William Enck Paul C. van Oorschot School of Computer Science Department of Computer Science School of Computer Science Carleton University North Carolina State University Carleton University Abstract—Application markets providing one-click software in- Bouncer [16]).1 Second, it provides a means to remotely stallation have become common to smartphones and are emerging uninstall distributed apps later identified as malicious. These on desktop platforms. Until recently, each platform has had only remote uninstalls (or “kill switches” [6], [5]) provide faster one market; however, social and economic pressures have resulted in multiple-market ecosystems. Multi-market environments limit, clean-up than traditional antivirus software, as they push and in some cases eliminate, valuable security characteristics actions to devices and do not require definition updates or provided by the market model, including kill switches and resource intensive scanning. Finally, search results display developer name consistency. We outline a novel approach to consistent developer names for applications. Once a developer retaining single-market security semantics while enabling the has registered with the market, controls exist such that no flexibility and independence of a multi-market environment. We propose Meteor as a security-enhancing application installation other developer can easily distribute applications under that framework that leverages information (e.g., app statistics, expert developer name. Hence, consumers have some assurance that ratings, developer history) from a configurable set of security all applications provided by “John Smith” are provided by the information sources. We build a proof-of-concept Android ap- same John Smith.
    [Show full text]
  • Freedom: Engineering a State-Of-The-Art DOM Fuzzer
    FreeDom: Engineering a State-of-the-Art DOM Fuzzer Wen Xu Soyeon Park Taesoo Kim Georgia Institute of Technology Georgia Institute of Technology Georgia Institute of Technology [email protected] [email protected] [email protected] ABSTRACT ACM Reference Format: The DOM engine of a web browser is a popular attack surface and Wen Xu, Soyeon Park, and Taesoo Kim. 2020. FreeDom: Engineering a State- has been thoroughly fuzzed during its development. A common of-the-Art DOM Fuzzer. In Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security (CCS ’20), November 9–13, 2020, approach adopted by the latest DOM fuzzers is to generate new Virtual Event, USA. ACM, New York, NY, USA, 16 pages. https://doi.org/10. inputs based on context-free grammars. However, such a generative 1145/3372297.3423340 approach fails to capture the data dependencies in the inputs of a DOM engine, namely, HTML documents. Meanwhile, it is unclear whether or not coverage-guided mutation, which is well-known to 1 INTRODUCTION be effective in fuzzing numerous software, still remains to beeffec- A DOM (Document Object Model) engine is a core component of tive against DOM engines. Worse yet, existing DOM fuzzers cannot every modern web browser, which is responsible for displaying adopt a coverage-guided approach because they are unable to fully HTML documents in an interactive window on an end-user device. support HTML mutation and suffer from low browser throughput. Considering its giant code base and extraordinary complexity, a To scientifically understand the effectiveness and limitations of DOM engine has always been one of the largest bug sources in a web the two approaches, we propose FreeDom, a full-fledged cluster- browser.
    [Show full text]
  • RSA Adaptive Authentication
    RSA Adaptive Authentication (Hosted) Data Gathering Techniques Guide Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA, the RSA Logo and EMC are either registered trademarks or trademarks of EMC Corporation in the United States and/or other countries. All other trademarks used herein are the property of their respective owners. For a list of RSA trademarks, go to www.rsa.com/legal/trademarks_list.pdf. License agreement This software and the associated documentation are proprietary and confidential to EMC, are furnished under license, and may be used and copied only in accordance with the terms of such license and with the inclusion of the copyright notice below. This software and the documentation, and any copies thereof, may not be provided or otherwise made available to any other person. No title to or ownership of the software or documentation or any intellectual property rights thereto is hereby transferred. Any unauthorized use or reproduction of this software and the documentation may be subject to civil and/or criminal liability. This software is subject to change without notice and should not be construed as a commitment by EMC. Note on encryption technologies This product may contain encryption technology. Many countries prohibit or restrict the use, import, or export of encryption technologies, and current use, import, and export regulations should be followed when using, importing or exporting this product. Distribution Use, copying, and distribution of any EMC software described in this publication requires an applicable software license. EMC believes the information in this publication is accurate as of its publication date.
    [Show full text]
  • Appendix a the Ten Commandments for Websites
    Appendix A The Ten Commandments for Websites Welcome to the appendixes! At this stage in your learning, you should have all the basic skills you require to build a high-quality website with insightful consideration given to aspects such as accessibility, search engine optimization, usability, and all the other concepts that web designers and developers think about on a daily basis. Hopefully with all the different elements covered in this book, you now have a solid understanding as to what goes into building a website (much more than code!). The main thing you should take from this book is that you don’t need to be an expert at everything but ensuring that you take the time to notice what’s out there and deciding what will best help your site are among the most important elements of the process. As you leave this book and go on to updating your website over time and perhaps learning new skills, always remember to be brave, take risks (through trial and error), and never feel that things are getting too hard. If you choose to learn skills that were only briefly mentioned in this book, like scripting, or to get involved in using content management systems and web software, go at a pace that you feel comfortable with. With that in mind, let’s go over the 10 most important messages I would personally recommend. After that, I’ll give you some useful resources like important websites for people learning to create for the Internet and handy software. Advice is something many professional designers and developers give out in spades after learning some harsh lessons from what their own bitter experiences.
    [Show full text]
  • Iphone Apps by Downloads How to Download Apps on Iphone: the Complete Guide! You Don’T Know How to Install Apps on Your Iphone, but You Want to Learn How
    iphone apps by downloads How To Download Apps On iPhone: The Complete Guide! You don’t know how to install apps on your iPhone, but you want to learn how. There are more than two million apps in your iPhone’s App Store, most of which help you get more out of your iPhone. In this article, I’ll show you how to download apps on your iPhone ! The content of this article has been updated for iOS 11, the most recent version of iPhone software. Apple introduced a new App Store layout with iOS 11, so if you’re running an older software version, your iPhone may look slightly different. If you haven’t already, I strongly recommend updating your iPhone! What Are Apps On My iPhone? Apps, which is short for applications, are programs you install on your iPhone. There are apps for fun games, organizing your work or personal life, and your favorite email service or social media platform. How To Download Apps On iPhone. Unlock your iPhone using your passcode, Touch ID, or Face ID. Open the App Store app. Find the app you want to download by browsing the Today, Games, or Apps section, or search for the app using the Search tab. Once you’ve found the app you want to download, tap Get to the right of the app. Confirm the installation by entering your passcode or using Touch ID. If you have an iPhone X, double-click the side button to activate Face ID and confirm the installation. Now, the app will begin installing on your iPhone.
    [Show full text]
  • Kik Messenger Remains a Contender in Messaging App Space
    ← Distimo iOS App Update: Publications, Ad Tracking, Metrics and More Leo’s Fortune Follows Monument Valley, Generates Over 50% of Total Revenue in First 7 Days → Kik Messenger Remains a Contender in Messaging App Space Posted on May 14, 2014 by Scott Reyburn It’s been a wild year so far in the global mobile messaging app space. With many more months left in 2014, the dust has yet to settle on the messaging app battlefield. Major messaging app players have been acquired, funded or added a significant amount of new features in 2014. In February, Japanese Internet giant Rakuten acquired messaging app provider Viber Media for $900 million. A few days later, Facebook purchased mobile messaging service WhatsApp for $19 billion. The following month, U.S. IPO-bound Albiaba from China led the latest round of funding for messaging service Tango, investing $215 million of the $280 million in the round. In early May, ephemeral photo messaging startup Snapchat added a text chat component to its mobile app. The new text messaging feature put Snapchat in the same realm as messaging app juggernauts such as Facebook Messenger and WhatsApp. One messaging app that has kept developing new features is Kik Messenger from Watlerloo, Ontario-based Kik Interactive. We flipped through estimated downloads data from Distimo AppIQ to benchmark Kik’s Sign up Sign in current foothold in theAnalytics messaging appAppIQ space. Conversion tracking API ResourcesLeaderboards App Trends Publications Blog The first nugget of data that stood out to us was Kik’s total global downloads share on the Apple App Store in Saudi Arabia (above).
    [Show full text]