SBJ, when you say methinks, I laugh- because I really believe you do not...think, that is.
You remind me of the guy who recited the diatonic scale and can't get past the third scale, mi, because he is so stuck on himself. Do, re, mi, mi, mi ad infinitum.
No nasty stuff re Samsung and Wave other than changing opportunities.
As to Apple and their killer cyber cell as you call it, I am underwhelmed.
Remember it is easy to get caught up in the self absorbed cult of "me". Self appointed masters of the universe rarely are, and burn out rapidly to be discarded as unnoticed casualties by the real players.
So put away your card deck, lock up your crystal ball, and prepare yourself this moment for sayton's eventual fall.
Why I respond to these classless Napoleonic complex comments is beyond me but it reminds me of what my dad told me. "Son that soldier is as full of bumf as a Christmas goose." OK, he didn't say bumf but you catch his career M/SGT drift; he did not suffer fools and braggarts easily.
That said, I do not manage other peoples money and would never fault someone for taking a profit, but please tone it down a notch Richie Rich, unless the Donald moves into the White House your braggadocio is so yesterday, hoss.
Well that was an interesting post. Decry name calling and then call board members weak minded and poor losers? Make a statement like "the knowledge they bought a loser company" when it hit a 52 week high.
Go look n the mirror.
"Senators want DHS to have NSA-like defensive cyber powers
A bipartisan group of six senators introduced the Federal Information Security Management Reform Act of 2015 to give DHS the clout it’s been lacking over the last five years and, in some respects, put it on par with the National Security Agency".... from Federal News Radio today
Perhaps this will allow greater consideration for WYY technical solutions and management solutions to be Johnny Appleseeded into other agencies. WYY has a good working relationship with DHS and were patient and understanding through the whole BPA dispute which turned out well with one of the main reasons stated by DHS was how iSys/WYY managed their business.
With all the talk of Shared Service Solutions floating around as the map for the future of cybersecurity in the federal space there is continued reason for optimism. Too bad it took the OPM breach to wake up Washington to the fact they do not need to burn down every haystack to find the needle.
Each agency may have a strictly different set of issues but they all need to share the common means and goals and have them enforced since they are all interconnected and the weakest link is often what is attacked so policies and procedures should be relatively standard, concise, trainable, and enforced throughout the federal domain.
WYY is entering this new cyber milieu with the wind at its back and should push to profitability and beyond before end of year or sooner. f Coast Guard comes on too quick and with too much of a rush tat might suck up some resources but that is not a ad problem to have.
I'd be interested in starting to watch head count as this ramps to full speed, my bet is we see some more strong players attracted to the Widepoint story leaving the large players for more challenging and rewarding career opportunities.
"But, how does one truly know?"
You continue to prevaricate like a latter day Pinocchio uttering misstatements and outright untruths. Have not heard of an Apple-Like future as you contend coming from anyone. I have not seen anyone state that it's too secret. Have not seen evidence of a lack of a patent having anything at all to do with success in this type of endeavor.
Is there a "secret sauce" as I contend? Yeah there is and it has nothing to do with patents, nothing to do with subterfuge, and everything to do with the combination of services, hard working employees, forthright and strong management, and being in the right place at the right time with the right combination to take advantage on the playing field as it unfolds. WYY has a strong trust component, a strong work ethic, clear goals and measurements, and excellent credentials for having first rate technology and management within the federal space. That's the secret sauce, Skippy. But, how does one truly know...indeed; you do not seem to know, and yet you constantly harangue on the subject of WYY. Insufferable you are laddie pup, simply insufferable.
Been rumored for some time that there would be some good talent available several months ago it was mentioned as an aside that there would be some sales and tech talent coming available in the coming months.
Think it is a good sign for the company. I agree with your previous comments Fred that we need some more visible change/thought leaders.
ilovelowprices • 42 minutes ago
"CoD is not real. It is just an ambiguous name for a common method. I mean, where else would the certificate go? C'mon man, any number of companies have the capability to perform this standardized service"
Well that's a tall tale, so you just drive down Pennsylvania Ave. and they throw certs through your open window? You actually have very little knowledge of this space and how to capture share and you have started to prove that with great regularity.
If all this is just a fig newton of our collective imagination why are they installing this capability on devices of major mobile makers? If it is so easy to do why can't they do it themselves? Sometimes the secret sauce stains your shirt skippy. Go clean up
Lot of talk about machine to machine hacks should be coming out. This is a relatively unexplored and extremely risk filled arena. With the ever increasing reliance on machine decision making in order to render greater efficiencies, faster execution, operate in risk filled environmental conditions, we are ceding our decisions to relatively unsecure systems that can be easily hacked.
Critical infrastructure from roads and highways, to power plants, to airplanes, to missiles, to ground based vehicles, to life support systems, to monitoring and security for physical access, data, and the like are all subject to being manipulated by unauthorized meddlers.
With all the recent talk about drones it is just a matter of time before drone hacks interrupt or put at risk security or commercial flight pattern command and control.
Many entrenched systems would be rather expensive to entirely toss out, but they could be reprogrammed to use a CoD like structure to deny access to unauthorized users either programmatically or through introduction of security and identity credentialing via an sd card, chip, or other storage device that would deny access to unauthorized personnel.
I look for this to be a bigger target in the and one that WYY may have some interesting solutions to put into place.
I just gave it a thumbs down. When you predict an exact number such as 68% with no basis for the prediction and expect other owners to accept it at face value and do not call it a WAG, you are looking to be questioned or perhaps just looking for attention. That's my reason. Your 68% had no explained basis in fact- so off with your head.
Have no idea why/who caused this to be reused at this point. However the contents point out some noteworthy details to keep in mind.
1. "what we are most excited about is the beginning of recognizing revenues from our next-generation identity management services in the second quarter. These combined opportunities should lay the groundwork for us to meet our revenue targets for 2015 of approximately 50% revenue growth."
2. Quicker update in DHS ICE revenues for Q1 will also carry over into Q2
3. Q2 begins to see impact from revenues from handset rollout from Kyocera, LG, Samsung
4. Possible revenues from AT&T banking client- extent unknown
So for me it serves as a reminder that they threw more of the expenses in Q1 and will recognize gains in revenues going forward from those efforts (costs).
Serves to illustrate plan on track, hints at Coast Guard talks proceeding, better expense control, margins to increase unless Coast Guard portion of BPA is fast tracked. All in all good news from my prospective as we enter earnings season.
Now if we can just get CTSO to peak and then NeoGenomics, which is not doing too badly and I suspect could also get taken out ala CLRT.
We both know one can never predict stocks with any certainty, but I think WYY still has a ways to run into next year and beyond if not taken out too soon, again like Clarient was by GE a few years back. If we move north of 5 we need to call HNMF and get him involved!
Best to you and your family and enjoy your retirement.
I believe the Google effect was part and parcel to the action last Friday. Given that assumption I also think we see some action around Tuesday if Apple reports a good quarter.
We should have an interesting Q3 and Q4.
"If CoD is so great, where is the company's guarantee against breach?"
This isn't "As Seen On TV" "QVC" or "HSN" where offers of double your money back and drop the last payment and guaranteed for life are rife as part of their marketing strategery.
Let me put it to you simply, there are no guarantees where the human element is the most pernicious weakness in the security. Do you understand that? How would one guarantee that you, government employee Auntie Shareholder, will not give your device and password to the next Chicom honeytrap that offers you something to get ahead (pun intended)? Until the device is compromised or a malicious pattern unfolds, you've figuratively given away the store and must wait for the pattern to emerge that relegates the device and access creds worthless and are auto-revoked from the device and access manager.
You look for a panacea where one does not exist. It's because you're Auntie Anti, antishareholder. Besides your clearance would only be for ASOTV, QVC, or HSN, so in the end little would be lost.
As to your comment to curley that $20 million is per quarter is not close to full revenue projection for the BPA, please recall that the largest component of the award will be the Coast Guard, as yet unsigned, but shortly expected on board; and that revenue (the greatest component of the BPA) will necessarily be pushed into a shorter time period increasing its effect.
Figures lie and liars figure but the facts have a way of righting themselves whatever attempt to bowl them over with half truths and innuendo.
Larger entrenched companies that acquire others are usually concerned with making efficiencies to their operations, be it in HR, accounting, purchasing, etcetera where they seek out economies of scale to leverage the purchase through assimilating the new purchase into the old company. WYY is not a large entrenched firm, it is a microcap.
Small companies such as WidePoint do not have the overhead structure to seek these types of benefits to any great degree so your saving theory is largely a canard posited to make some other argument and in WYY's case untrue for WYY and other smaller companies that grow through acquisition.
They acquire to pick up key components to further a business strategy and not to save on copy paper. Do you really thing they acquired Soft-ex to save a couple of bucks on business cards or was it to gain a share in a market they were targeting?
Sooo, they purchased iSys, llc and that has garnered returns and is a linchpin in future strategies; they purchased ORC, which provided needed intellectual capital and an instant government cert credibility; they acquired Soft-ex to bridge into the international markets. They bought other components to have commercial presence and not be totally reliant on US federal opportunity.
Have all these very small purchases been incredibly successful...nope, we are rarely 100% successful. Have they been able to parlay their most recent purchases into a cohesive game plan that has created a hybrid company that offers unique solutions in both the federal and commercial space both here and abroad and has attracted significant enough attention to potential future cash flows to raise eyebrows of potential acquirers?
You betcha Red Ryder!
By living in the past we usually doom ourselves to compounding past errors. By engaging the future and using the knowledge gained from the past, we furnish ourselves with new opportunity based upon a combination of new ideas and lessons learned.
Hope they haven't hired "Brownie" back or they will be communicating with semaphores and talking thru tin cans. FEMA was never that big of a deal and I would not be surprised if they came on. Of course I don't have your contacts hawk but bow to your superior insight on this.
It also would not surprise me that there are other agencies ready to join the fray on WYY's side.
I always thought that Fred was ticked off about some of the things that did not work out for WYY a few years back. Fred please let us know if that is the case.
This is a different company. When they entered into the whole regimen to make a lot of cash on issuing certs thru SETECS or some equally arcane venture that did not pay out, there were some tough times for this company, and they could have easily folded it and started anew after some previous ventures did not go as expected. Instead they stuck with it, learned their lessons and did not abandon shareholders and start up another company. This was laudatory not damnable.
Now we sit in a much better position with a company that has an international footprint, government credibility, and a new twist to solve some long standing problems. I contend they are well managed and have learned the lessons that time and events foists upon us all.
I am ready to capitalize on this investment before too much longer and the current management team has my full and unfettered support. They don't make the big bucks in the WYY corporate henhouse, they are shareholders, as such their payday comes when ours does and this is the way I like to see stakeholders vested whether in the boardroom or main street.
antishareholder • 12 minutes 29 seconds ago 7-17-15 Stated I his post
"What he is saying is that there is no money to be made in the "products" (actually services only) Widepoint provides. Low margin business only. Thus, the ever rising cost of goods sold outpacing revenue."
So sorry auntieshareholder,, he of the I delete my posts frequently circle of posters, I see no posts that fit your interpretation in this thread. Thanks for trying to obfuscate what others are saying. Next time provide original thought.
WYY is more of a value but we should all remember that WYY is not strictly a cyber security play. I realize that is shibboleth to many as WYY has benefitted from the cyber security craze of late, but the company is different than most of the other cyber plays. Personally I think that the cyber component of WYY's offerings is more "tip of the spear" wrto identity and certification and preventive in nature if certain common sense practices and protocols are followed and less predictive and after the fact as many of the cyber security firms in the space.
This leads to less technological outlay, smaller market cap at the initial stage we are in and a greater reliance on managing than moat building. Again in my opinion, I think that the greatest threat to our to protecting our data is also the most difficult to manage and tat is the human element threat posed by the users of the systems in place. One can build moats, raise fences, and install tripwires to ascertain when the moats have been bridged and the fences have been scaled but it is more difficult to manage the privileged user in any data protection scheme.
So while it is critical to build the moats wide and deep and the fences high, it is also critical in this internet of everything to funnel choice into a manageable corral that can be monitored and controlled. Essentially what WYY does thru iSYS on the TLM side, thru ORC on the cert side, which gives us the hybrid that is WidePoint.
What they are with CoD is device agnostic, they are platform agnostic to a great extent, and they can use their tech on existing systems from planes, to trains, to automobiles and mobile communication devices.
When managed properly, WYY can take the worry out of device securitization for a lot of commercial, governmental, and institutional entities that are not set up to manage their own systems in this ever-changing threat landscape.