Attached files
file | filename |
---|---|
8-K - WIDEPOINT CORP | v194825_8k.htm |
EX-99.1 - WIDEPOINT CORP | v194825_ex99-1.htm |
WidePoint
Corporation
Second
Quarter 2010 Earnings Conference Call
August
16, 2010
Operator:
Good day,
ladies and gentlemen. Thank you for standing by. Welcome
to the WidePoint Corporation Second Quarter 2010 Earnings Conference
Call. During today’s presentation all parties will be in a
listen-only mode. Following the presentation the conference will be
opened for questions. If you have a question, please press the star
followed by the one on your touchtone phone. Please press star, zero
for operator assistance at any time, and for participants using speaker
equipment it may be necessary to pick up your handset before making your
selection. I would now like to turn the conference over to our host,
Mr. Brett Maas of Hayden Investor Relations. Please go ahead,
sir.
Brett Maas:
Thank you, operator. With
me today are WidePoint’s Chairman and CEO, Steve Komar, Chief Financial Officer,
Jim McCubbin, and Daniel Turissini, WidePoint’s Chief Technology
Officer. Steve will be providing an overview of the second quarter
results, Jim will be providing additional financial details, and Daniel will be
discussing opportunities in the cyber security segment, then we will open the
call to questions from participants.
I’ll begin by reminding you that this
conference call contains forward-looking statements that are made pursuant to
the Safe Harbor Provisions of the Private Securities Litigation Reform Act of
1995. Forward-looking statements involve risks, uncertainties, and
assumptions as described from time to time in the registration statements and
reports, and other periodic reports filed with the Securities and Exchange
Commission. All statements other than statements of historical facts,
which address the company’s expectations for its future with respect to
financial performance or operating strategy can be identified as a
forward-looking statement.
These statements are based upon the
current beliefs and expectations of the company’s management and are subject to
significant risks and uncertainties. Actual results may differ from
those described in the forward-looking statements. Those
forward-looking statements involve certain risks and uncertainties and are
subject to change, and based on various factors, many of which are beyond the
company’s control. We caution investors that these forward-looking
statements speak only as to the date hereof. The company hereby
expressly disclaims any obligation or undertaking to release publicly any
updates or revisions to any such statements to reflect any change in the
company’s expectations or any change of events, conditions, or circumstances in
which our statements were based.
I would now like to turn the call over
to WidePoint’s Chairman and Chief Executive Officer, Steve Komar, for opening
remarks. Steve, the floor is yours.
Steven
Komar: Thank
you, Brett, and good day to everyone who has joined us today. On
behalf of the WidePoint management team, I’d like to welcome you all to the
company’s second quarter 2010 investor call, and to thank you for your
commitment and continued interest in our business building
efforts. For those of you who may be new to our quarterly calls,
WidePoint is an information technology solutions provider, featuring products
and services targeted primarily to the government sector, with a strategic
emphasis on cyber security and wireless mobility solutions offered to government
agencies and the organizations and individuals that must interact with those
various arms of government.
With that as background, today it is
my distinct pleasure to report that the second quarter of 2010 was our seventh
consecutive quarter with positive bottom line net income results, reflecting
steadily improving gross margins, and a refreshed revenue growth
trajectory. Our revenues grew over 20% versus the year-ago second
quarter, led by strong improvement in our cyber security and consulting
segments.
Our second quarter revenues totaled
12.5 million, an anticipated by satisfying jump, sequentially up from our first
quarter 2010 result of 11.2 million, lending credence, we believe, to our
projections for even stronger revenue and profitability performance during the
second half of 2010.
Also during the second quarter we
continued to demonstrate our ability to leverage our fixed infrastructure so
that more of each additional dollar of revenue passes through to gross profit
and ultimately to net income. This is evidenced in your
year-over-year increase in gross margin, now up to 24% from the year-ago 21%;
also, a 33% increase in operating margin and a 65% increase in net
income.
We remained confident that we can
continue to grow our revenue as we have already been awarded or have bid on
projects which will enable us to grow in the 20 to 30% range on the top line for
the full year 2010. As we move forward we expect this to translate
into accelerating profitability and net income as a result of the fixed cost
leveraging that is a key feature of our managed services business
models.
I’ll keep my usual business overview
discussion brief today as we have invited Dan Turissini to join us to provide an
important analysis and assessment of developments and opportunities in the cyber
security market, and to help you better understand why we feel so strongly about
this business segment’s importance to the future of WidePoint. And of
course, as always, I will leave the more detailed discussion and analysis of the
financial metrics to Jim McCubbin, realizing full well the importance of that
information to many of you.
Summarizing the business’ outlook and
potential, we believe we are very well positioned and competitively
differentiated in two growth segments, characterized by government initiatives
to secure and protect the nation’s communications and high risk infrastructure
on one hand and the across-the-board search for efficiency and cost reduction on
the other. Importantly we do not believe that our growth initiatives
are in areas that the government is targeting for budget reductions or
in-sourcing efforts, and we do not expect any meaningful impact from those
efforts on our business direction and goals. On the contrary, the
federal government is increasingly recognizing the imperative need to secure its
IT infrastructure, and better control access to government networks and
facilities.
Based on the long-term relationships
and support to many of our customers, we believe our successful track record, as
well as our technical expertise, gives us credibility with our current client
base and positions us well to successful bid on follow-on contracts and to
compete for new programs and new customers, effectively diversifying our revenue
base. As a case in point, we increased absolute revenues at two of
our top three customers: the Transportation Safety Administration and
the Washington Headquarter Service of the Department of Defense, even while the
overall revenue concentration of these top three customers declined to 44% of
our total revenue in the second quarter of 2010, from a much higher level of 68%
in a year-ago.
With that I’d like to turn the call
over to Dan Turissini, WidePoint’s Chief Technology Officer, and the executive
who drives our cyber security initiatives, for an assessment of activity and
developments in that strategic segment, and of course, the company’s positioning
to take advantage of those growth opportunities. Dan, the floor is
yours.
Daniel
Turissini:
Thanks,
Steve. Good afternoon. For those of you who do not know me
my name is Dan Turissini, WidePoint’s Chief Technology Officer. I’d
like to take a few minutes of your time to provide with a general overview of
WidePoint’s cyber security business segment.
Since I last addressed our executive
committee, we have enhanced our unique position in this space, so I’d like to
bring you up to speed on what we have accomplished and how complements have
positioned us within this growth market.
The term “cyber security” is
increasingly highlighted in the news; not surprising, as our daily lives have
been changed by the growth of the Internet, Wikileaks, and the growing threat to
privacy in our nation’s infrastructure. Cyber security involves
protecting our nation’s electronic infrastructure and the information
transactions on that infrastructure by preventing, detecting, responding to
attacks on the network that tie them all together. In addition to the
billions of dollars moving over the Internet each day, an exponentially growing
number of other forms of transactions are occurring that include, as examples,
the monetary management of communications, electrical grids and water supply,
medical and other privacy related transactions, as well as business
transactions, sensitive not only to industry but also to national
security.
Over the last two years an increasing
number of sophisticated cyber attacks have occurred worldwide. We
have begun to witness non-state nations using cyber attacks for political
warfare. The persistent threats are evolving and changing, in many
ways too fast for traditional threat detection and remediation efforts to keep
pace. At WidePoint we have been collaborating with various federal
agencies to ensure that our solutions adequately address cyber threat
prevention, with a keen focus in identity management, electronic transaction
protection, and trusted privilege management. I’m proud to share that
our unique posture in these areas has poised us for a major contributor in the
cyber security efforts in this country and worldwide.
WidePoint’s trusted suite of services
provides authoritative verification and validation of entities and identities of
various transactions and attributes. We have maintained full
compliance with all government regulatory requirements, allowing both government
and commercial customers the highest levels of assurance of the identities of
the persons and devices they are transacting with, as well as the attributes
that those entities possess, permitting them to participate in those
activities.
Strong identity in attribute
management, which has been our vision and focus for over 15 years, has resulted
in WidePoint becoming one of the leading providers of preventive cyber security
solutions. We offer a wide range of solutions from fully managed,
end-to-end solutions based on our certified and accredited environment, to
turn-key solutions in which we support an organization’s existing infrastructure
with our back-end services.
The key to our successes has been our
diligence and subject matter expertise surrounding highly scalable, secure
environments based on federally approved cryptographic and buyer-metric
infrastructures that allows organizations to identify and trust persons and end
points on the ’net. Presently an increasing number of federal agency,
businesses, associations, and individuals who wish to conduct electronic
business and services with the federal government, the Department of Defense,
and each other are using our certified digital credentials. In fact,
WidePoint is the only trusted third party who has successfully demonstrated the
convergence of physical and logical security across various
domains.
Today, WidePoint has developed
more—delivered more than 2.5 million digital credentials that currently support
trusted transactions in citizen-to-government, citizen-to-business,
business-to-business, business-to-government, and government-to-government
transactions that contain sensitive information needed to contract for goods or
services, to verify the identity of electronic mail correspondence, verify the
identity of web-based application servers, and to verify the integrity of
software and documents, to name a few. As today’s instant access
world matures, increased ubiquity in these types of activities will continually
result in increasing demand for the WidePoint solution set.
This year we have witnessed a
significant expansion in the adoption of our services as well as interest in how
we can mature our capabilities to the next level. We are adding
additional trusted authoritative source capability, allowing us to provide more
trusted attribute information to our existing customer base, while attracting
customers in other markets who are tackling similar issues. These
include healthcare, first responder, and energy markets. These
enhancements are market driven to meet diverse business scenarios with common
cyber threat concerns. This is an exciting time providing me with the
opportunity to share with you some of the recent successes and the potential
they hold for the future.
In July we announced the success of
the first comprehensive demonstration of a common authentication and validation
of our federated credentials and the military common access cards at any
location. This real-time, online demonstration showcased a system
that significantly reduces cost and increases security, positioning WidePoint to
roll out its credentials and services to individuals and organizations needing
physical or virtual access to military bases and other secure resources
worldwide. WidePoint offers the only enterprise-wide capability of
this kind that potentially includes over 40 million persons. Although
in the early stages of roll-out, this opportunity holds great promise as we
negotiate the implementation of this capability around the globe.
We have enjoyed continued growth in
the Transportation Worker Identification Credentialing program, TWIC, which
supports the identification and verification of maritime workers around the
United States. Launched a little over two years ago, our digital
certificates have been injected into the identity credentials of over one and a
half million maritime workers, and has been considered for expansion into other
critical transportation worker communities. In fact, while visiting
ports in Florida, New York, and Maryland this year, I was happy to see everybody
sporting a shiny new TWIC.
We have also witnessed a continued
acceleration of the adoption of our software base credentials as the Department
of Defense and other federal agencies have recommitted to their requirement for
the use of digital signatures. The widest adoptions have been in the
contract management area, where user name and password access is being replaced
by digital signatures to protect and assure the validity of contract
actions. Both the General Services Administration and the Defense
Logistics Agency have primed this adoption by offering digital signature
certificates to small businesses and individual consultants paid for by the
government. I invite you to visit eoffers.orc.com and follow the
green arrows.
Digital signature will ultimately
provide an addressable market opportunity of millions of persons utilizing our
credentials to do business with the government and beyond. We have
also rolled out a new project that supports a deployed cyber security solution
in a mobile environment for a major DOD program. A solution will be
used to manage end points that are not fixed to a single IP address, and are
able to roam across various networks providing secure remote access to mission
critical applications to a mobile workforce. While we’re not in a
position to discuss details, we have recently secured a multimillion dollar
award for this that will further broaden our cyber security portfolio and
bolster second half revenues with growing recurring revenue opportunities for
years to come.
WidePoint has strengthened our
position in the nation’s first responder marketplace. In addition to
the emergency response, disaster management, law enforcement, attribute
management, and accountability offerings, a $2 million Q2 award for the roll-out
of a crime scene information system from Delaware State University has
resulted in a significant addition to our revenue base and cyber
portfolio. Built around our core cyber security infrastructure, this
new WidePoint solution set allows first responders the ability to protect crime
information with non-reputable digital signature at the crime scene, providing a
trusted chain of custody of the evidential information process, all leveraging
our federally compliant credentials.
With a potential market focus of
over—of every first responder organization in the country with successful
demonstration of this unique offering provides WidePoint the cornerstone for
what we believe will be widespread adoption.
Finally we have recently expanded our
cyber security expertise into two private sector markets. Within the
social networking market, WidePoint now offers a secure community portal option,
initially focused protecting data in motion or collaboration with a global
provider, offers encryption, digital signature, and non-repudiation capability
for users that desire a protected social network experience. We have
also entered into the mortgage banking market in collaboration with a group of
industry users that will leverage our digital signature and encryption solution
to address a significant, growing mortgage (inaudible).
Together, these opportunities
demonstrate our ability to scale our federally compliant capabilities into a
widespread commercial marketplace, getting us closer to our vision of citizen
focused, electronic commerce protected by WidePoint solution
set. Federal and media increased cyber security awareness has
resulted in a busy six months for WidePoint. With the establishment
of a presidential cyber tsar and the newly formed cyber command with the
Department of Defense, all evidence suggests that business will continue to
grow. We also expect that the recent government direction to treat
cyber as a new warfare domain will accelerate attention in this serious threat,
as it will be treated with the same emphasis as land, sea, air, and space
warfare. At CTO I will continue to focus WidePoint towards building
upon strengths we have developed in our tools, people, and
solutions. WidePoint will continue to leverage our expertise into new
and expanding markets, as well as enhance our capability in response to the ever
growing opportunities addressable within our cyber security
segment.
Thank you, and now I turn you back
over to Steve.
Steven
Komar: Thanks,
Dan. I’m hopeful that the perspectives and vision that you’ve offered
are as intriguing and exciting to our investors and analysts as they are to
us.
We asked Dan to join us today because,
as we’ve mentioned on this call, we are seeing tremendous growth and real demand
for our cyber security solutions. You’ve seen some of the
announcements regarding this segment, and I assure you there are several more to
come as we move to capture new, incremental, and wrap-around
opportunities.
And now I’d like to turn it over to
Jim McCubbin for a more detailed run-through of our financial
performance. Jim, the mic is yours.
James
McCubbin:
Hello, everyone, and thanks for listening
in. We had a nice second quarter and we are actually anticipating a
better third quarter. Most of our financial metrics continue to
improve in the second quarter of 2010, demonstrating that the growth in
profitability strategy that we have been pursuing since the end of 2008 is
developing the momentum that we had expected.
Revenue for the three months ended
June 30, 2010 increased approximately 20% to 12.5 million from 10.4 million in
last year’s comparable period. This was primarily due to growth in
our cyber security solutions and consulting segments.
In our cyber security solutions
segment, revenue grew 86% to 2.5 million in the second quarter of 2010 as a
result of expanding credential sales driven by the DOD’s push requiring
contractors to have credentials to access their systems, a contract award by the
Delaware State University to our Advanced Response Concepts subsidiary, and
continuing support for work under the TSA’s TWIC program. Looking at
the third—at the third quarter and second half we anticipate this segment will
continue to grow as a result of a multimillion dollar award we recently were
awarded by an agency within the Department of Defense, as well as our ongoing
belief that we will continue to see a growing trend in the issuances of
credentials to DOD contractors.
Consulting revenues grew 59% to 3.1
million, materially as a result of growth in awards by federal agencies in
support of various efforts we have ongoing in several IT based
initiatives. While this area has always been a bit variable, we are
looking forward to continued growth in the government sector somewhat mitigated
by weakness in our commercial sector, but overall still supporting an upward
bias.
The wireless mobility segment revenue
decreased 3% to 6.9 million, but this decline was predominantly the result of a
one-time equipment sale of about $500,000 that occurred in the second quarter of
2009, of which we were able to make up approximately half of that in new, higher
margin recurring services. Excluding that one-time equipment item in
the year-ago period, wireless mobility management segment revenue grew about
5%. Unfortunately, awards for this segment came late in the second
quarter and most of the billing did not occur until July of 2010.
Looking forward into the second half
for this segment, we believe we have a change in the mix that emphasizes less
billable calling minutes and more fees associated with higher margin services
that our software provides in regards to optimization, inventory management, and
the other related services that we provide on a fee basis. While we
believe that this may retard or reduce revenues slightly in the second half for
this segment, we would like to point out it should show greater margins and we
believe will continue to post positive growth to the bottom
line.
As a result of our revenue growth our
gross profit for the three months was 2.9 million for a 24% gross margin as
compared to a gross profit of 2.2 million or 21% gross margin a year
ago. Overall, our gross margin was higher in the second quarter of
2010, predominantly due to higher margins associated with a greater mix of cyber
security segment solutions. We see this continuing in the second half
of 2010. In looking at our total operating expenses, we saw an
increase of 28% to 2.4 million for the quarter ended June 30, 2010 compared to
1.9 million for the year-ago period. Operating expenses as a
percentage of sales increased about 100 basis points to 19% from 18% in the
year-ago period due to increases in both sales and marketing and in G&A
expenses. These costs increased as a result of investments we made in
sales and marketing, as well as the results of some one-time expenses related to
personnel on the bench waiting for security clearances and some bonus income
attributable to 2009 performance that were paid out in the second quarter of the
year. These represented approximately $200,000 that will not recur in
the third quarter, and bringing the percentage bias or basis of our SG&A
cost in line, and we’re anticipating improving in the future.
As a result of the positive
performance in our financial model, which I’ve just described, we posted
approximate operating income of $511,000 in the second quarter, up approximately
60% compared to operating income of approximately 319,000 in the second quarter
last year. Net income was approximately 413,000, up 65% compared to
net income of approximately 251,000 in the year-ago period. We
anticipate our earnings shall continue to improve in the second half of the year
and we are looking for improved performance in the third quarter.
Looking forward to the balance of the
year we reiterate our goal to increase consolidated revenues by approximately
20% or more for the calendar year 2010 to expand gross margins and operating
margins, generate gross margins in the range of 22 to 26% with the upward bias
we believe being able to be met, and operating margins in the range of 6 to 8%,
and to maintain or decrease selling and SG&A cost as a percentage of total
revenue, which has the net effect to grow our net income.
As an aside, I would also like
everyone to know that we will be attending the Rodman conference in September
and the Craig-Hallum conference in October, and we are working on setting up a
couple of non-deal road shows during the same timeframe, to expand the awareness
of what we are doing at WidePoint, especially given the positive operational
performance we believe we can continue to demonstrate.
With that, I’d like to turn it back to
Steve.
Steven
Komar: Thank
you, Jim. Overall, we remain on solid ground and on track to achieve
our goals for 2010, and I’d like to reiterate where we see our revenue growth
and how we’ll achieve continued and accelerating profitability.
We’re strategically focused on growing
our government sector and commercial market businesses in the wireless mobility
management and cyber security services segments. We intend to do that
by expanding our customer base, targeting high growth segments of the market,
solidifying our infrastructure to support this growth, and attracting training
and retaining highly skilled professionals. We have built solid,
long-term relationships with our customers and an outstanding reputation within
the federal government. This is helping us to expand our market share
with other agencies and also with vendors, contractors, and increasingly with
state and city municipalities. As we add the additional features and
offerings that were summarized by Dan, we should be in a unique position to
cross out our array of solutions to our existing customers and to meet new
market demand. We continue to expect steady growth in government,
budgeted IT spending, and the outsourcing of key components of various
processes, such as identity management services and mobile telecom expense
management services.
In addition, we will selectively
pursue strategic acquisitions of businesses that can cost effectively broaden
our expertise and service offerings. As a team the management remains
committed to continuing with the execution of our strategy throughout the
remainder of 2010 and beyond.
I’d like to thank you again for your
attention and continued interest. If I can get the operator, I would
like to now open the call to questions.
Operator: Thank
you, sir. We will begin the question-and-answer
session. As a reminder, if you have a question, please press star,
followed by the one, on your touch tone phone. If you would like to
withdraw your question, please press the star, followed by the two, and if
you’re using speaker equipment you will need to lift the handset before making
your selection. And our first question is from the line of Sam
Donaldson (sp?). Please go ahead.
Sam Donaldson: Gentlemen,
congratulations again on a very solid quarter, really good
quarter. I’m particularly heartened to hear that with government
cut-back in spending, not where we are involved, because of course that’s a big
concern. And Dan’s presentation about the future of cyber security
was, again, particularly upbeat as far as I was concerned.
Jim, I noticed under the asset sheet
we’ve lost, what, some assets, gross assets, particularly the cash and cash
equivalents. What was driving that?
James McCubbin:
We just had a lot of investments we made in deferred revenue and
revenues. Actually, in the third quarter you’re going to see the
inverse of that happen and all of a sudden us collect all that cash, and you’ll
see the cash swing up. Just the normal process of investing in your
business as you grow your revenues. It just pressured cash a little
bit but more than—we had more than enough cash, and now you’ll just see the
swing back in September.
Sam
Donaldson: All
right, well that’s good. Well again, congratulations, gentlemen. I
think this is a winning course, but again, I’ve always sort of felt
that.
Steven
Komar: Thank
you, Sam. We really appreciate your support and we’ve been waiting
for a long time for break-out kind of news as well, and we’re seeing it now, and
we’re really quite excited about it. So thank you.
Operator:
Thank you, and our next question is from the line of Mark Jordan with Noble
Financial. Please go ahead.
Mark
Jordan:
Good afternoon, gentlemen. I’d like to ask two questions
in the cyber area. First one relates to, can you give us an overview
of the customer base/contract base you have in the cyber
business? And then secondly, talk a little bit about the terms of
revenue. How are revenues realized? Is this a licensing or
a service model, and therefore with the servicing models, is it tied to
credentials issued/used or you know, just how, how do you build that revenue
base?
James
McCubbin:
Hi, Mark. How are you? This is Jim. And your first
question, the mix of contracts that we have in place, some of them with—straight
with vendors and government entities as well as just with
individuals. So it’s not tied to just specifically government
contracts. With that, I can give you an example of we have a software
contract which is with Delaware State University, and that’s just straight
software revenue recognition on a percent completion for us delivering it over a
timeframe. Yet, at the same time on the credentialing under the ECA
program or ASIS programs, we’re recognizing those credentials as we deliver them
on the revenue mix.
So they’re very different—two
different animals. We’re not just providing one solution or one
solution set. We’re providing, as Dan went into, a myriad of
different solutions to a myriad of different people. Does that help
you understand a little bit of the mix though? Or do you
want—
Mark
Jordan: Well—just,
carry it one step further. If you were to look at the revenue mix,
what percent of it would be tied to software development/licensing and what
percent would be derived from, should we call, production—credential production
activity?
James
McCubbin:
Yeah, less than 10% at this time. It
would probably be really related to the software at this time. You’re
going to see that mix change over time. Right now a lot of the mix is
going to supporting the credential issuance. Just so you also
understand, under, like the TWIC program, we’re providing something different
than just credentials. We’re providing a back room infrastructure for
the use of the roll out of those credentials in those TWIC cards through
Lockheed Martin. Where on the ECA and ASIS side, we’re providing them
directly to contractors. So, again, it’s really
dependent.
One of the things that Dan has been so
successful in building this out is offering solutions that fit almost
anybody’s profile of their need. So flexibility has really helped us
position ourselves through either resellers, through partners, and/or directly
performing the whole ball of wax.
Mark
Jordan: Okay. One
last question related to this and I’ll pass it off for the phone. So
if you have a credentialing individual, to the extent that you have that
million and a half maritime people, do you get paid every time that identity is
authenticated? Or, do you get paid as you establish the initial
credentialing of the individual?
James
McCubbin: Well,
Dan’s going to answer this one.
Daniel
Turissini:
Actually, we have both
models. Right now on the primary contract with Lockheed Martin we get paid as
the credentials are issued. On the other end, we’re working with the
ports and some of the other relying parties, people that use the
card. And we’re getting paid on the validation of that credential
every time it is used. So it’s set up so that we can get revenues
split between the user groups, distribute across the user groups, but for each
individual type of use.
Mark
Jordan: Okay. Thank
you very much.
James
McCubbin: Thanks,
Mark.
Daniel
Turissini:
Thank you, Mark.
Operator: Thank
you. And ladies and gentlemen, if there are any additional questions,
please press star, followed by the one, at this time. As a reminder,
if you’re using speaker equipment you’ll need to lift the handset before making
your selection. And our next question is from the line of Fred
Milligan with Sanders Morris Harris Group. Please go
ahead.
Fred
Milligan: It’s
Sanders. That’s Sanders Morris. Senders is somebody
else. Good afternoon, guys.
Male
Speaker: Hi,
Fred.
Fred
Milligan: The
wireless business, my impression is that this is to grow by adding new agencies
or departments of the government onto it, okay, rather than just organic growth
in terms of current business. Is that the case? And what’s
happening there?
James
McCubbin: Well,
on the wireless, that is the case, one, is to grow it within by adding
agencies. But we’re also positioning ourselves to add state and local
municipalities that we’ve—which we’ve recently added, as well as we’re starting
to dabble in the commercial segments. What we have not released yet
is that we have added a commercial client as well as we’re in the pilot phase
with several agencies or departments of some of the states. On the
federal side, things that delay it a little bit as awards came out at the end of
July. So some of that really didn’t hit the second quarter, but we’ll
see some of it hitting in the third quarter. More importantly though
is one of our contracts expired on the refill of the minutes while we still
continued with handling the—all the optimization and all the higher margin
cost. This is a little bit of a shift for us as we try to shift away
our model into some of the higher margin work, because that tended to water down
the true picture of what the company performs its margin and modeling
as.
So that had a little impact on the
second half top line, but not on the bottom line because we’re going to see
margins improve and our bottom line improve, actually on lesser
revenues. It’s just us tweaking our model as we look forward to where
we want to see that revenue and as we try to shift our margins to a much higher
level.
Steven
Komar: The
only thing I would add to that, I would add to that is that there is a timing
factor here in terms of the fact that we do have some organic growth but we are
dependent on the penetration of new agencies. And I think that when
there’s a delay, be it three months or four months, we see a little flattening
in the revenue stream. But as Jim mentioned, we also think from a
modeling perspective, we’re moving into the higher margin future business, and
that we’re pretty pleased about.
Fred
Milligan: I’ve
read several articles about security of wireless phones. Are you
fellows involved in any of this, and if so, can you detail what it might
be?
James
McCubbin: I
don’t know that I can detail it for you. There are some very exciting
things happening in the industry and we are looking—
Fred
Milligan: How
about in the company?
James
McCubbin: And
we are looking at—we are collaborating with a couple of groups. We’re
still in negotiation phases, but we are looking at using our credentials within
secure smart phones. There are a couple of brand new chips out there
that we’re going to try to leverage. As a matter of fact I have a
meeting next week with one of the vendors, and it is our—one of our focuses and
one of our goals to move towards that credential, that smart credential being
embedded in your smart phone or smart device.
Fred
Milligan: Okay. Now,
so you are growing—you have some commercial business, and is there any state
business at this point?
James
McCubbin: Yes. We
do have some state business and we are in the process of adding some new pilots
as part of our penetration strategy as well.
Fred
Milligan: Would
it be fair to ask about growth in the second half sequentially over the first
half, quarter-by-quarter being somewhere around 4 to 5%?
James
McCubbin: I’m
sorry. Are you talking on a segment basis or are you talking about
total company?
Fred
Milligan: Total
company.
James
McCubbin: All
right, total company, in the first quarter we had forecast we were going to be
in the $11 million range, which we were. Coming into the second
quarter we forecast we were going to be somewhere in the $12 million
range. Right now things look promising for us to be somewhere in the
third quarter in the $13 plus million range, especially given the contract award
we’ve had by an agency within the DOD for some work that we’ve already commenced
that will be going through the rest of the year. And then with the
remainder flowing into the fourth quarter, we’re trying to build the business
around that 20% revenue growth run rate. We believe right now based
on everything that we have we are on track for that 48 to $52 million revenue
range. But more importantly, it’s hitting the target that both Sidoti
and Craig-Hallum put out on the bottom line. Fred, what’s really nice
is in the third quarter you’ll see this demonstrated, you’re going to see some
really nice positive bottom line performance.
Fred
Milligan: Okay,
thank you very much, and congratulations.
James
McCubbin: Thank
you.
Steven
Komar: Thank
you. Appreciate that.
Operator: Thank
you. And as a reminder, ladies and gentlemen, if there are any
additional questions, please press star, one at this time. One
moment, please. And I’m showing no further questions in the queue at
this time. Please continue.
Steven
Komar: In
that case, a couple of final comments, if you will. We’d like to let
you know that we appreciate your questions and your ongoing interest in
WidePoint. And we look forward to the opportunity to update everyone
after our second—our third quarter 2010 results probably released in
mid-November, and I think that it will be a pleasant experience for all of
us. Until then, thank you and have a
pleasant evening.
Operator: Ladies
and gentlemen, this concludes the WidePoint Corporation Second Quarter 2010
Earnings Conference Call. Thank you for your
participation. You may now disconnect.