akin securityanalysispresentation2014 1p80bsk
TRANSCRIPT
8/16/2019 Akin SecurityAnalysisPresentation2014 1p80bsk
http://slidepdf.com/reader/full/akin-securityanalysispresentation2014-1p80bsk 1/50
!"#$%&'( *+,-(.&.*/&+ !,(%,/0 12343
5&+,+#" 6,7 89+:"%"+#";+&<"%.&'( 9: 4"-,=,%"
u ust 22, 2014
8/16/2019 Akin SecurityAnalysisPresentation2014 1p80bsk
http://slidepdf.com/reader/full/akin-securityanalysispresentation2014-1p80bsk 2/50
!
!"#$%&'()! +')%)$'%, -%)%./0/)&1 2%,#%&'()1 +'3/"45)$(0/1 /&$6
!
7+8 5)9&'&#&/:9 ;/9(#;$/9! <%0%"(;%):9 ;/9(#;$/9 =>(&/ &?%& 5 @(;;(A/" B;(0
<%0%"(;%):9 &%3()(0C ') &?/ )/3& B/A 9,'"/96D
!
E/$?)(,(.C
! !3$/,
! F,((0@/;.
! 7%G'&%,5H1 +%$&I/&
J
8/16/2019 Akin SecurityAnalysisPresentation2014 1p80bsk
http://slidepdf.com/reader/full/akin-securityanalysispresentation2014-1p80bsk 3/50
! >+'%&+.&# <,-$,'&9+K L/,%&/9 &?/ M%,#/ (B %) %99/& &( '&9')&;')9'$ $?%;%$&/;'9&'$9K '&9 $%G%$'&C &( ./)/;%&/ $%9? N(A9%)" &?/ ;'9O ') &?/ $%9? N(A96 5) '&:9 0(9& $(00() B(;01')&;')9'$ M%,#/ '9 $(0G#&/" A'&? % "'9$(#)&/" $%9? N(A
M%,#%&'()1 A'&? &?/ M%,#/ (B %) %99/& @/'). &?/ G;/9/)&M%,#/ (B /3G/$&/" B#&#;/ $%9?N(A9 () &?%& %99/&6
! ?"-,'&<" <,-$,'&9+K !9&'0%&/9 &?/ M%,#/ (B %) %99/& @C,((O'). %& &?/ G;'$'). (B P$(0G%;%@,/P %99/&9 ;/,%&'M/ &( %$(00() M%;'%@,/ ,'O/ /%;)').91 $%9?N(A91 @((O M%,#/ (;
9%,/96! 89+'&+@"+' #-,&A <,-$,'&9+K Q9/9 (G&'() G;'$'). 0("/,9
&( 0/%9#;/ &?/ M%,#/ (B %99/&9 &?%& G;/9/)& (G&'()4,'O/$?%;%$&/;'9&'$96
R
8/16/2019 Akin SecurityAnalysisPresentation2014 1p80bsk
http://slidepdf.com/reader/full/akin-securityanalysispresentation2014-1p80bsk 4/50
! E?/ #9/ (B M%,#%&'() 0("/,9 ') ')M/9&0/)&"/$'9'()9 ='6/61 ') "/$'9'()9 () A?'$? %99/&9 %;/#)"/; M%,#/" %)" A?'$? %;/ (M/; M%,#/"D %;/
@%9/" #G()! % G/;$/G&'() &?%& 0%;O/&9 %;/ ')/S$'/)& %)" 0%O/
0'9&%O/9 ') %99/99'). M%,#/! %) %99#0G&'() %@(#& ?(A %)" A?/) &?/9/
')/S$'/)$'/9 A',, ./& $(;;/$&/"!
5) %) /S$'/)& 0%;O/&1 &?/ 0%;O/& G;'$/ '9 &?/@/9& /9&'0%&/ (B M%,#/6 E?/ G#;G(9/ (B %)CM%,#%&'() 0("/, '9 &?/) &?/ T#9&'U$%&'() (B &?'9M%,#/6
V
8/16/2019 Akin SecurityAnalysisPresentation2014 1p80bsk
http://slidepdf.com/reader/full/akin-securityanalysispresentation2014-1p80bsk 5/50
! B2,' &. &'K 5) "'9$(#)&/" $%9? N(A M%,#%&'()1 &?/ M%,#/ (B %) %99/&'9 &?/ G;/9/)& M%,#/ (B &?/ /3G/$&/" $%9? N(A9 () &?/ %99/&6
! 12&-9.9C2&#,- D,.&.K !M/;C %99/& ?%9 %) ')&;')9'$ M%,#/ &?%& $%) @//9&'0%&/"1 @%9/" #G() '&9 $?%;%$&/;'9&'$9 ') &/;09 (B $%9? N(A91
.;(A&? %)" ;'9O6!
>+:9%A,'&9+ E""F"FK E( #9/ "'9$(#)&/" $%9? N(A M%,#%&'()1 C(#)//"! &( /9&'0%&/ &?/ ,'B/ (B &?/ %99/&! &( /9&'0%&/ &?/ $%9? N(A9 "#;'). &?/ ,'B/ (B &?/ %99/&! &( /9&'0%&/ &?/ "'9$(#)& ;%&/ &( %GG,C &( &?/9/ $%9? N(A9 &( ./&
G;/9/)& M%,#/! G,%/"' >+"H#&"+#(K -%;O/&9 %;/ %99#0/" &( 0%O/ 0'9&%O/9 ')
G;'$'). %99/&9 %$;(99 &'0/1 %)" %;/ %99#0/" &( $(;;/$& &?/09/,M/9(M/; &'0/1 %9 )/A ')B(;0%&'() $(0/9 (#& %@(#& %99/&96
W
8/16/2019 Akin SecurityAnalysisPresentation2014 1p80bsk
http://slidepdf.com/reader/full/akin-securityanalysispresentation2014-1p80bsk 6/50
! I')$/ <7+ M%,#%&'()1 "()/ ;'.?&1 '9 @%9/" #G() %)%99/&’9 B#)"%0/)&%,91 '& 9?(#," @/ ,/99 /3G(9/" &(0%;O/& 0(("9 %)" G/;$/G&'()96
!
5B .((" ')M/9&(;9 @#C @#9')/99/91 ;%&?/; &?%) 9&($O9=&?/ X%;;/) F#Y/& %"%./D1 "'9$(#)&/" $%9? N(AM%,#%&'() '9 &?/ ;'.?& A%C &( &?')O %@(#& A?%& C(# %;/./&&'). A?/) C(# @#C %) %99/&6
!
<7+ M%,#%&'() B(;$/9 C(# &( &?')O %@(#& &?/#)"/;,C'). $?%;%$&/;'9&'$9 (B &?/ U;01 %)" #)"/;9&%)"'&9 @#9')/996 5B )(&?'). /,9/1 '& @;').9 C(# B%$/ &( B%$/A'&? &?/ %99#0G&'()9 C(# %;/ 0%O'). A?/) C(# G%C %.'M/) G;'$/ B(; %) %99/&6
Z
8/16/2019 Akin SecurityAnalysisPresentation2014 1p80bsk
http://slidepdf.com/reader/full/akin-securityanalysispresentation2014-1p80bsk 7/50
! I')$/ '& '9 %) %&&/0G& &( /9&'0%&/ ')&;')9'$ M%,#/1 '& ;/[#';/9 B%;0(;/ /3G,'$'& ')G#&9 %)" ')B(;0%&'() &?%) (&?/; M%,#%&'()%GG;(%$?/9
! E?/9/ ')G#&9 %)" ')B(;0%&'() %;/ )(& (),C )('9C =%)" "'S$#,& &(
/9&'0%&/D1 @#& $%) @/ 0%)'G#,%&/" @C &?/ %)%,C9& &( G;(M'"/ &?/$()$,#9'() ?/ (; 9?/ A%)&96 !"# %&'()*+ ,- *"# '.'(+/* *"#. 0#1,2#/' -&.1*),. ,- ",3 3#(( "# ,4 /"# 1'. ")5# *"# 2'.)6&('*),.7
! 5) %) ')&;')9'$ M%,#%&'() 0("/,1 &?/;/ '9 )( .#%;%)&// &?%& %)C&?').A',, /0/;./ %9 #)"/; (; (M/; M%,#/"6 E?#91 '& '9 G(99'@,/ ') % <7+M%,#%&'() 0("/,1 &( U)" /M/;C 9&($O ') % 0%;O/& &( @/ (M/; M%,#/"6
E?'9 $%) @/ % G;(@,/0 B(;! /[#'&C ;/9/%;$? %)%,C9&91 A?(9/ T(@ '& '9 &( B(,,(A 9/$&(;9 %)" 0%O/;/$(00/)"%&'()9 () &?/ 0(9& #)"/; %)" (M/; M%,#/" 9&($O9 ') &?%&9/$&(;
! /[#'&C G(;&B(,'( 0%)%./;91 A?( ?%M/ &( @/ B#,,C =(; $,(9/ &( B#,,CD')M/9&/" ') /[#'&'/9
\
8/16/2019 Akin SecurityAnalysisPresentation2014 1p80bsk
http://slidepdf.com/reader/full/akin-securityanalysispresentation2014-1p80bsk 8/50
! 8& &?/ ;'9O (B 9&%&'). &?/ (@M'(#91 &?'9 %GG;(%$?'9 "/9'.)/" B(; #9/ B(; %99/&9 =U;09D &?%& "/;'M/&?/'; M%,#/ B;(0 &?/'; $%G%$'&C &( ./)/;%&/ $%9?
N(A9 ') &?/ B#&#;/6!
5& A(;O9 @/9& B(; ')M/9&(;9 A?( /'&?/;! ?%M/ % ,(). &'0/ ?(;']()1 %,,(A'). &?/ 0%;O/& &'0/ &(
$(;;/$& '&9 M%,#%&'() 0'9&%O/9 %)" B(; G;'$/ &( ;/M/;& &(“&;#/” M%,#/ (;
!
%;/ $%G%@,/ (B G;(M'"'). &?/ $%&%,C9& )//"/" &( 0(M/G;'$/ &( M%,#/1 %9 A(#," @/ &?/ $%9/ 'B C(# A/;/ %)%$&'M'9& ')M/9&(; (; % G(&/)&'%, %$[#';/; (B &?/ A?(,/U;0
^
8/16/2019 Akin SecurityAnalysisPresentation2014 1p80bsk
http://slidepdf.com/reader/full/akin-securityanalysispresentation2014-1p80bsk 9/50
! B2,' &. &'IK E?/ M%,#/ (B %)C %99/& $%) @/ /9&'0%&/" @C ,((O'). %&?(A &?/ 0%;O/& G;'$/9“9'0',%;” (;‘$(0G%;%@,/” %99/&96
! 12&-9.9C2&#,- D,.&.K E?/ ')&;')9'$ M%,#/ (B %) %99/& '9 '0G(99'@,/=(; $,(9/ &( '0G(99'@,/D &( /9&'0%&/6 E?/ M%,#/ (B %) %99/& '9A?%&/M/; &?/ 0%;O/& '9 A',,'). &( G%C B(; '& =@%9/" #G() '&9$?%;%$&/;'9&'$9D
! >+:9%A,'&9+ E""F"FK E( "( % ;/,%&'M/ M%,#%&'()1 C(# )//"! %) '"/)&'$%, %99/&1 (; % .;(#G (B $(0G%;%@,/ (; 9'0',%; %99/&9! % 9&%)"%;"']/" 0/%9#;/ (B M%,#/ =') /[#'&C1 &?'9 '9 (@&%')/" @C "'M'"').
&?/ G;'$/ @C % $(00() M%;'%@,/1 9#$? %9 /%;)').9 (; @((O M%,#/D
!
%)" 'B &?/ %99/&9 %;/ )(& G/;B/$&,C $(0G%;%@,/1 M%;'%@,/9 &( $()&;(, B(;&?/ "'Y/;/)$/9! G,%/"' >+"H#&"+#(K _;'$'). /;;(;9 0%"/ %$;(99 9'0',%; (;
$(0G%;%@,/ %99/&9 %;/ /%9'/; &( 9G(&1 /%9'/; &( /3G,('& %)" %;/0#$? 0(;/ [#'$O,C $(;;/$&/"6
`
8/16/2019 Akin SecurityAnalysisPresentation2014 1p80bsk
http://slidepdf.com/reader/full/akin-securityanalysispresentation2014-1p80bsk 10/50
! L/,%&'M/ M%,#%&'() '9 0#$? 0(;/ ,'O/,C &( ;/N/$& 0%;O/& G/;$/G&'()9 %)"0(("9 &?%) "'9$(#)&/" $%9? N(A M%,#%&'()6 E?'9 $%) @/ %) %"M%)&%./A?/) '& '9 '0G(;&%)& &?%& &?/ G;'$/ ;/N/$& &?/9/ G/;$/G&'()9 %9 '9 &?/ $%9/A?/)
!
&?/ (@T/$&'M/ '9 &( 9/,, %) %99/& %& &?%& G;'$/ &("%C =5_a1 -b8D
! ')M/9&'). ()“0(0/)�” @%9/" 9&;%&/.'/9!
X'&? ;/,%&'M/ M%,#%&'()1 &?/;/ A',, %,A%C9 @/ % 9'.)'U$%)& G;(G(;&'() (B9/$#;'&'/9 &?%& %;/ #)"/; M%,#/" %)" (M/; M%,#/"6
! I')$/ G(;&B(,'( 0%)%./;9 %;/ T#"./" @%9/" #G() ?(A &?/C G/;B(;0 () %
;/,%&'M/ @%9'9 =&( &?/ 0%;O/& %)" (&?/; 0()/C 0%)%./;9D1 ;/,%&'M/M%,#%&'() '9 0(;/ &%',(;/" &( &?/'; )//"9
! L/,%&'M/ M%,#%&'() ./)/;%,,C ;/[#';/9 ,/99 /3G,'$'& ')B(;0%&'() &?%)"'9$(#)&/" $%9? N(A M%,#%&'()6
cd
8/16/2019 Akin SecurityAnalysisPresentation2014 1p80bsk
http://slidepdf.com/reader/full/akin-securityanalysispresentation2014-1p80bsk 11/50
! 8 G(;&B(,'( &?%& '9 $(0G(9/" (B 9&($O9 A?'$? %;/ #)"/; M%,#/" () %;/,%&'M/ @%9'9 0%C 9&',, @/ (M/;M%,#/"1 /M/) 'B &?/ %)%,C9&9’ T#".0/)&9%;/ ;'.?&6 5& '9 T#9& ,/99 (M/;M%,#/" &?%) (&?/; 9/$#;'&'/9 ') &?/ 0%;O/&6
! L/,%&'M/ M%,#%&'() '9 @#',& () &?/ %99#0G&'() &?%& 0%;O/&9 %;/ $(;;/$& ')
&?/ %..;/.%&/1 @#& 0%O/ 0'9&%O/9 () ')"'M'"#%, 9/$#;'&'/96 E( &?/ "/.;//&?%& 0%;O/&9 $%) @/ (M/; (; #)"/; M%,#/" ') &?/ %..;/.%&/1 ;/,%&'M/M%,#%&'() A',, B%',
! L/,%&'M/ M%,#%&'() 0%C ;/[#';/ ,/99 ')B(;0%&'() ') &?/ A%C ') A?'$? 0(9&
%)%,C9&9 %)" G(;&B(,'( 0%)%./;9 #9/ '&6 e(A/M/;1 &?'9 '9 @/$%#9/ '0G,'$'&
%99#0G&'()9 %;/ 0%"/ %@(#& (&?/; M%;'%@,/9 =&?%& A(#," ?%M/ @//);/[#';/" ') % "'9$(#)&/" $%9? N(A M%,#%&'()D6 E( &?/ /3&/)& &?%& &?/9/'0G,'$'& %99#0G&'()9 %;/ A;(). &?/ ;/,%&'M/ M%,#%&'() A',, %,9( @/ A;().6
cc
8/16/2019 Akin SecurityAnalysisPresentation2014 1p80bsk
http://slidepdf.com/reader/full/akin-securityanalysispresentation2014-1p80bsk 12/50
! E?'9 %GG;(%$? '9 /%9'/9& &( #9/ A?/)!
&?/;/ %;/ % ,%;./ )#0@/; (B %99/&9 $(0G%;%@,/ &( &?/ ()/ @/').M%,#/"
! &?/9/ %99/&9 %;/ G;'$/" ') % 0%;O/&!
&?/;/ /3'9&9 9(0/ $(00() M%;'%@,/ &?%& $%) @/ #9/" &(9&%)"%;"']/ &?/ G;'$/
! E?'9 %GG;(%$? &/)"9 &( A(;O @/9& B(; ')M/9&(;9!
A?( ?%M/ ;/,%&'M/,C 9?(;& &'0/ ?(;']()9!
%;/ T#"./" @%9/" #G() % ;/,%&'M/ @/)$?0%;O =&?/ 0%;O/&1 (&?/;
G(;&B(,'( 0%)%./;9 B(,,(A'). &?/ 9%0/ ')M/9&0/)& 9&C,/ /&$6D!
$%) &%O/ %$&'()9 &?%& $%) &%O/ %"M%)&%./ (B &?/ ;/,%&'M/0'9G;'$').f B(; ')9&%)$/1 % ?/"./ B#)" $%) @#C &?/ #)"/; M%,#/"%)" 9/,, &?/ (M/; M%,#/" %99/&9
cJ
8/16/2019 Akin SecurityAnalysisPresentation2014 1p80bsk
http://slidepdf.com/reader/full/akin-securityanalysispresentation2014-1p80bsk 13/50
! aG&'()9 ?%M/ 9/M/;%, B/%&#;/9! E?/C "/;'M/ &?/'; M%,#/ B;(0 %) #)"/;,C'). %99/&1
A?'$? ?%9 M%,#/
!
E?/ G%C(Y () % $%,, =G#&D (G&'() ($$#;9 (),C 'B &?/M%,#/ (B &?/ #)"/;,C'). %99/& '9 .;/%&/; =,/99/;D &?%)%) /3/;$'9/ G;'$/ &?%& '9 9G/$'U/" %& &?/ &'0/ &?/(G&'() '9 $;/%&/"6 5B &?'9 $()&')./)$C "(/9 )(& ($$#;1
&?/ (G&'() '9 A(;&?,/996! E?/C ?%M/ % U3/" ,'B/
! 8)C 9/$#;'&C &?%& 9?%;/9 &?/9/ B/%&#;/9 $%) @/M%,#/" %9 %) (G&'()6
cR
8/16/2019 Akin SecurityAnalysisPresentation2014 1p80bsk
http://slidepdf.com/reader/full/akin-securityanalysispresentation2014-1p80bsk 14/50
You are offered a black box that converts $1.00 into$1.10 with absolute certainty. Interest rates arecurrently at 20%. How much should you be willing
to pay for the box?
NPV Analysis: NothingNPV = -1 + (1.1/1.2) = $(0.083)
Real Option Analysis: The box is not valuable rightnow. But it may be valuable in the future if and wheninterest rates fall below 10%.
cV
8/16/2019 Akin SecurityAnalysisPresentation2014 1p80bsk
http://slidepdf.com/reader/full/akin-securityanalysispresentation2014-1p80bsk 15/50
! <7+ B;%0/A(;O
! 5.)(;/9 (G&'()9 /0@/""/" ') G;(T/$&9
!
L/%, (G&'()9! aG&'() &( "/,%C
! 7?%)./ &'0/ A/ ')M/9& ') G;(T/$&
! aG&'() &( /3G%)"g$()&;%$&
! 5)$;/%9/ (; "/$;/%9/ 9$%,/ (B G;(T/$&
! aG&'() &( %@%)"()
! I?#& "(A) %) G;(T/$&
cW
8/16/2019 Akin SecurityAnalysisPresentation2014 1p80bsk
http://slidepdf.com/reader/full/akin-securityanalysispresentation2014-1p80bsk 16/50
Is there
Uncertaintyand will welearn more
about itover time?
Can we
refocus ourstrategyonce welearnedmore
YES
NO
Not anoption
Uncertainty Flexibility
YES
NO
A bet
Option
cZ
8/16/2019 Akin SecurityAnalysisPresentation2014 1p80bsk
http://slidepdf.com/reader/full/akin-securityanalysispresentation2014-1p80bsk 17/50
Value of AsStrike Price
Call Option
Put Option
c\
8/16/2019 Akin SecurityAnalysisPresentation2014 1p80bsk
http://slidepdf.com/reader/full/akin-securityanalysispresentation2014-1p80bsk 18/50
! ![#'&C ') % "//G,C &;(#@,/" U;0 4 % U;0 A'&? )/.%&'M//%;)').9 %)" ?'.? ,/M/;%./ 4 $%) @/ M'/A/" %9 %) (G&'() &(,'[#'"%&/ &?%& '9 ?/," @C &?/ 9&($O?(,"/;9 (B &?/ U;062'/A/" %9 9#$?1 '& '9 % $%,, (G&'() () &?/ %99/&9 (B &?/ U;06
!
E?/ ;/9/;M/9 (A)/" @C )%&#;%, ;/9(#;$/ U;09 $%) @/M'/A/" %9 $%,, (G&'()9 () &?/ #)"/;,C'). ;/9(#;$/1 9')$/&?/ U;0 $%) "/$'"/ A?/&?/; %)" ?(A 0#$? (B &?/;/9(#;$/ &( /3&;%$& B;(0 &?/ ;/9/;M/1
!
E?/ G%&/)& (A)/" @C % U;0 (; %) /3$,#9'M/ ,'$/)9/ '99#/"
&( % U;0 $%) @/ M'/A/" %9 %) (G&'() () &?/ #)"/;,C').G;("#$& =G;(T/$&D6 E?/ U;0 (A)9 &?'9 (G&'() B(; &?/"#;%&'() (B &?/ G%&/)&6
! E?/ ;'.?&9 G(99/99/" @C % U;0 &( /3G%)" %) /3'9&').')M/9&0/)& ')&( )/A 0%;O/&9 (; )/A G;("#$&96
c^
8/16/2019 Akin SecurityAnalysisPresentation2014 1p80bsk
http://slidepdf.com/reader/full/akin-securityanalysispresentation2014-1p80bsk 19/50
! aG&'() G;'$'). 0("/,9 %,,(A #9 &( M%,#/ %99/&9 &?%& A/(&?/;A'9/ A(#," )(& @/ %@,/ &( M%,#/6 +(; ')9&%)$/1/[#'&C ') "//G,C &;(#@,/" U;09 %)" &?/ 9&($O (B %
90%,,1 @'(4&/$?)(,(.C U;0 =A'&? )( ;/M/)#/9 %)"G;(U&9D %;/ "'S$#,& &( M%,#/ #9'). "'9$(#)&/" $%9?N(A %GG;(%$?/9 (; A'&? 0#,&'G,/96 E?/C $%) @/ M%,#/"#9'). (G&'() G;'$').6
! aG&'() G;'$'). 0("/,9 G;(M'"/ #9 B;/9? ')9'.?&9 ')&(&?/ ";'M/;9 (B M%,#/6 5) $%9/9 A?/;/ %) %99/& '9 "/;'M').'& M%,#/ B;(0 '&9 (G&'() $?%;%$&/;'9&'$91 B(; ')9&%)$/10(;/ ;'9O (; M%;'%@','&C $%) ')$;/%9/ M%,#/ ;%&?/; &?%)"/$;/%9/ '&6
c`
8/16/2019 Akin SecurityAnalysisPresentation2014 1p80bsk
http://slidepdf.com/reader/full/akin-securityanalysispresentation2014-1p80bsk 20/50
! X?/) ;/%, (G&'()9 =A?'$? ')$,#"/9 &?/ )%&#;%, ;/9(#;$/(G&'()9 %)" &?/ G;("#$& G%&/)&9D %;/ M%,#/"1 0%)C (B &?/')G#&9 B(; &?/ (G&'() G;'$'). 0("/, %;/ "'S$#,& &( (@&%')6+(; ')9&%)$/1 G;(T/$&9 "( )(& &;%"/ %)" &?#9 ./&&'). %$#;;/)& M%,#/ B(; % G;(T/$& (; % M%;'%)$/ 0%C @/ % "%#)&').&%9O6
!
E?/ (G&'() G;'$'). 0("/,9 "/;'M/ &?/'; M%,#/ B;(0 %)#)"/;,C'). %99/&6 E?#91 &( "( (G&'() G;'$').1 C(# U;9& )//"&( M%,#/ &?/ %99/&96 5& '9 &?/;/B(;/ %) %GG;(%$? &?%& '9 %)%""/)"#0 &( %)(&?/; M%,#%&'() %GG;(%$?6
! +')%,,C1 &?/;/ '9 &?/ "%)./; (B "(#@,/ $(#)&'). %99/&96E?#91 %) %)%,C9& A?( #9/9 % ?'.?/; .;(A&? ;%&/ ')"'9$(#)&/" $%9? N(A M%,#%&'() B(; % G?%;0%$/#&'$%, U;0@/$%#9/ '& ?%9 M%,#%@,/ G%&/)&9 A(#," @/ "(#@,/ $(#)&').&?/ G%&/)&9 'B ?/ M%,#/9 &?/ G%&/)&9 %9 (G&'()9 %)" %""9&?/0 () &( ?'9 "'9$(#)&/" $%9? N(A M%,#/6
Jd
8/16/2019 Akin SecurityAnalysisPresentation2014 1p80bsk
http://slidepdf.com/reader/full/akin-securityanalysispresentation2014-1p80bsk 21/50
! X?',/ &?/;/ %;/ ?#)";/"9 (B M%,#%&'() 0("/,9 %)"0/&;'$9 %;(#)"1 &?/;/ %;/ (),C &?;// M%,#%&'()%GG;(%$?/9K! 5)&;')9'$ M%,#%&'() =#9#%,,C1 @#& )(& %,A%C9 % <7+ M%,#%&'()D
! L/,%&'M/ M%,#%&'()
! 7()&')./)& $,%'0 M%,#%&'()! E?/ &?;// %GG;(%$?/9 $%) C'/," "'Y/;/)& /9&'0%&/9 (B
M%,#/ B(; &?/ 9%0/ %99/& %& &?/ 9%0/ G(')& ') &'0/6!
E( &;#,C .;%9G M%,#%&'()1 C(# ?%M/ &( @/ %@,/ &(#)"/;9&%)" %)" #9/ %,, &?;// %GG;(%$?/96 E?/;/ '9 %&'0/ %)" % G,%$/ B(; /%$? %GG;(%$?1 %)" O)(A').A?/) &( #9/ /%$? ()/ '9 % O/C G%;& (B 0%9&/;').M%,#%&'()6
Jc
8/16/2019 Akin SecurityAnalysisPresentation2014 1p80bsk
http://slidepdf.com/reader/full/akin-securityanalysispresentation2014-1p80bsk 22/50
! X?'$? ()/9h! 7(9&1 @#"./& ,'0'&%&'()9!
</G,(C0/)& N/3'@','&C!
E;%')'). &?/ $,'/)&/,/!
L/9/%;$? #9/
! _//; #9/!
5)"#9&;C #9/!
-'99'). ,')O9
! aM/;%,, /Y/$&'M/)/99
JJ
8/16/2019 Akin SecurityAnalysisPresentation2014 1p80bsk
http://slidepdf.com/reader/full/akin-securityanalysispresentation2014-1p80bsk 23/50
! F,((0@/;.K cW` =ZciD! -(;)').9&%;K `J =RZiD!
7%G'&%, 5HK W^ =JJiD!
E/,/0/&K R^ =cViD!
+%$&I/&K RV =cRiD
8M/;%./ L/9(#;$/ Q9/ =jDK c6W
I(#;$/K L'9/ <'9G,%C
8/16/2019 Akin SecurityAnalysisPresentation2014 1p80bsk
http://slidepdf.com/reader/full/akin-securityanalysispresentation2014-1p80bsk 24/50
8/16/2019 Akin SecurityAnalysisPresentation2014 1p80bsk
http://slidepdf.com/reader/full/akin-securityanalysispresentation2014-1p80bsk 25/50
! I&%&'). &?/ ')M/9&0/)& G(,'$C! LLEEkQ
! </U)'). &?/ $;'&/;'% B(; % 9/$#;'&C #)'M/;9/ %)" %
@/)$?0%;O!
I(;&9 (; 9/$#;'&C 9$;//)9! _'(&;(9O' 9$(;/1 /&$6
! 8)%,C]'). &?/ 9?(;& ,'9&!
![#'&C ;/9/%;$? ;/G(;&! E?/ G'&$? %)" &?/ "/$'9'() 0%O').
! !3/$#&'()
! 899/99'). G/;B(;0%)$/
JW
8/16/2019 Akin SecurityAnalysisPresentation2014 1p80bsk
http://slidepdf.com/reader/full/akin-securityanalysispresentation2014-1p80bsk 26/50
! !HI ') F,((0@/;.! 7(0G%)C I$;//)'). ') 7%G5H!
-(9&,C $()9'9&/)& (#&$(0/9! I0%,, "/U)'&'()%, "'Y/;/)$/9
! 7?%,,/)./K 7#9&(0 @/)$?0%;O'). A'&?G/;'("'$ ;/9/&96
! Q9/ &?/ ;'$? !E+ #)'M/;9/ &( G'$O % G;(G/;@/)$?0%;O
JZ
8/16/2019 Akin SecurityAnalysisPresentation2014 1p80bsk
http://slidepdf.com/reader/full/akin-securityanalysispresentation2014-1p80bsk 27/50
J\
8/16/2019 Akin SecurityAnalysisPresentation2014 1p80bsk
http://slidepdf.com/reader/full/akin-securityanalysispresentation2014-1p80bsk 28/50
! 2%;'(#9 %" ?($ (; (@T/$&'M/ 0/&;'$96!
_'(&;(9O' I$(;/K a)/ G(')& 'B % 9&($O G%99/9 /%$? &/9& %)" ]/;( 'B '& "(/9):&6 E?/0%3'0#0 9$(;/ '9 `6J3 E"' >+#9A"K F(&&(0 ,')/6 I$(;/ c 'B ,%9& C/%; )/& ')$(0/ '9 G(9'&'M/6K3 LC"%,'&+@ 8,.2 5-9=K 8 @/&&/; /%;)').9 .%#./6 I$(;/ c 'B ,%9& C/%; $%9? N(A '9 G(9'&'M/6M3 ?"'$%+ L+ *.."'.K -/%9#;/9 _;(U&%@','&C6 I$(;/ c 'B ,%9& C/%; La8 /3$//"9 G;'(;4C/%; La86
N3
O$,-&'( 9: P,%+&[email protected] X%;)9 (B 8$$(#)&'). E;'$O96 I$(;/ c 'B ,%9& C/%; (G/;%&'). $%9? N(A/3$//"9 )/& ')$(0/6
Q3 69+@RS"%A 4"7' <.3 *.."'.K 59 </@& "/$;/%9').h I$(;/ c 'B &?/ ;%&'( (B ,().4&/;0 "/@& &(%99/&9 '9 "(A) B;(0 &?/ C/%;4%.( M%,#/6 =5B kE< '9 ]/;( @#& %99/&9 %;/ ')$;/%9').1 9$(;/ c%)CA%C6D
T3 8$%%"+' ?,'&9K -/%9#;/9 ')$;/%9'). A(;O'). $%G'&%,6 I$(;/ c 'B 7L ?%9 ')$;/%9/" B;(0 &?/G;'(; C/%;6
U3 !2,%". L$'.',+F&+@K 8 -/%9#;/ (B G(&/)&'%, "',#&'()6 I$(;/ c 'B &?/ )#0@/; (B 9?%;/9(#&9&%)"'). '9 )( .;/%&/; &?%) &?/ C/%;4%.( U.#;/6
V3 W%9.. G,%@&+K 8 0/%9#;/ (B '0G;(M'). $(0G/&'&'M/ G(9'&'()6 I$(;/ c 'B B#,,4C/%; l-/3$//"9 &?/ G;'(;4C/%; l-6
X3 *.."' S$%+9<"%K -/%9#;/9 G;("#$&'M'&C6 I$(;/ c 'B &?/ G/;$/)&%./ ')$;/%9/ ') 9%,/9 /3$//"9&?/ G/;$/)&%./ ')$;/%9/ ') &(&%, %99/&96
J^
8/16/2019 Akin SecurityAnalysisPresentation2014 1p80bsk
http://slidepdf.com/reader/full/akin-securityanalysispresentation2014-1p80bsk 29/50
J`
8/16/2019 Akin SecurityAnalysisPresentation2014 1p80bsk
http://slidepdf.com/reader/full/akin-securityanalysispresentation2014-1p80bsk 30/50
! 5)"#9&;C %)%,C9'9! +')%)$'%, 9&%&/0/)& %)%,C9'9!
8)%,C9&9: /9&'0%&/9 %)" ;/$(00/)"%&'()9!
<7+ (; ;/,%&'M/ M%,#%&'()
! F,((0@/;. =m<7+D %)" 7%G'&%,5H =<7+D !3$/,&/0G,%&/9
!
7(;G(;%&/ .(M/;)%)$/! -b8 %)" G;'M%&/ /[#'&C
! 8$&'M'9& ')M/9&(;9
Rd
8/16/2019 Akin SecurityAnalysisPresentation2014 1p80bsk
http://slidepdf.com/reader/full/akin-securityanalysispresentation2014-1p80bsk 31/50
Rc
8/16/2019 Akin SecurityAnalysisPresentation2014 1p80bsk
http://slidepdf.com/reader/full/akin-securityanalysispresentation2014-1p80bsk 32/50
RJ
8/16/2019 Akin SecurityAnalysisPresentation2014 1p80bsk
http://slidepdf.com/reader/full/akin-securityanalysispresentation2014-1p80bsk 33/50
RR
8/16/2019 Akin SecurityAnalysisPresentation2014 1p80bsk
http://slidepdf.com/reader/full/akin-securityanalysispresentation2014-1p80bsk 34/50
RV
8/16/2019 Akin SecurityAnalysisPresentation2014 1p80bsk
http://slidepdf.com/reader/full/akin-securityanalysispresentation2014-1p80bsk 35/50
RW
8/16/2019 Akin SecurityAnalysisPresentation2014 1p80bsk
http://slidepdf.com/reader/full/akin-securityanalysispresentation2014-1p80bsk 36/50
RZ
8/16/2019 Akin SecurityAnalysisPresentation2014 1p80bsk
http://slidepdf.com/reader/full/akin-securityanalysispresentation2014-1p80bsk 37/50
R\
8/16/2019 Akin SecurityAnalysisPresentation2014 1p80bsk
http://slidepdf.com/reader/full/akin-securityanalysispresentation2014-1p80bsk 38/50
R^
8/16/2019 Akin SecurityAnalysisPresentation2014 1p80bsk
http://slidepdf.com/reader/full/akin-securityanalysispresentation2014-1p80bsk 39/50
R`
8/16/2019 Akin SecurityAnalysisPresentation2014 1p80bsk
http://slidepdf.com/reader/full/akin-securityanalysispresentation2014-1p80bsk 40/50
Vd
8/16/2019 Akin SecurityAnalysisPresentation2014 1p80bsk
http://slidepdf.com/reader/full/akin-securityanalysispresentation2014-1p80bsk 41/50
Vc
8/16/2019 Akin SecurityAnalysisPresentation2014 1p80bsk
http://slidepdf.com/reader/full/akin-securityanalysispresentation2014-1p80bsk 42/50
VJ
8/16/2019 Akin SecurityAnalysisPresentation2014 1p80bsk
http://slidepdf.com/reader/full/akin-securityanalysispresentation2014-1p80bsk 43/50
VR
8/16/2019 Akin SecurityAnalysisPresentation2014 1p80bsk
http://slidepdf.com/reader/full/akin-securityanalysispresentation2014-1p80bsk 44/50
! F,((0@/;. =_aLED %)" 7%G'&%,5H =_(;&B(,'(8)%,C&'$9D G;(M'"/ "/&%',/" G/;B(;0%)$/
/M%,#%&'() %)" $%))/" ;/G(;&'). (G&'()96!
_/;B(;0%)$/ %&&;'@#&'() 9%&'9B%$&(;C () @(&?G,%&B(;09
! F,((0@/;.:9 _aLE B#)$&'() G;(M'"/9 0(;/&((,96
! E;%"/ /3/$#&'() %)" G(;&B(,'( 0%')&/)%)$/
%;/ G;(@,/0%&'$ ') @(&? G,%&B(;09
VV
8/16/2019 Akin SecurityAnalysisPresentation2014 1p80bsk
http://slidepdf.com/reader/full/akin-securityanalysispresentation2014-1p80bsk 45/50
VW
8/16/2019 Akin SecurityAnalysisPresentation2014 1p80bsk
http://slidepdf.com/reader/full/akin-securityanalysispresentation2014-1p80bsk 46/50
VZ
8/16/2019 Akin SecurityAnalysisPresentation2014 1p80bsk
http://slidepdf.com/reader/full/akin-securityanalysispresentation2014-1p80bsk 47/50
V\
8/16/2019 Akin SecurityAnalysisPresentation2014 1p80bsk
http://slidepdf.com/reader/full/akin-securityanalysispresentation2014-1p80bsk 48/50
V^
8/16/2019 Akin SecurityAnalysisPresentation2014 1p80bsk
http://slidepdf.com/reader/full/akin-securityanalysispresentation2014-1p80bsk 49/50
! >( %#&(0%&/" $(;;/$&'()9 B(; "'M'"/)"91 9G,'&91/&$6
! >( %#&(0%&/" $(;;/$&'() B(; $(;G(;%&/ %$&'()91
0/;./;9 %)" %$[#'9'&'()91 &%O/(M/;91 /&$6!
>( $(9&4/Y/$&'M/ G(;&B(,'( %$$(#)&'). G,%&B(;0%M%',%@,/6
! 50G,'$%&'()9K!
-%)#%, $%,'@;%&'() &( @;(O/;%./ ;/G(;&9 ;/[#';/"G/;'("'$%,,C6
! _;(@%@,C &(( $?%,,/).'). B(; 9&#"/)&9 &( G/;B(;0 &?'9$%,'@;%&'() A'&?(#& B%$#,&C %"M'9/;:9 (M/;9'.?&6
V`
8/16/2019 Akin SecurityAnalysisPresentation2014 1p80bsk
http://slidepdf.com/reader/full/akin-securityanalysispresentation2014-1p80bsk 50/50
h