Click here to close now.

Welcome!

Cloud Expo Authors: Pat Romanski, Elizabeth White, William Schmarzo, Liz McMillan, Dana Gardner

News Feed Item

Peak Positioning Files Third Quarter Financial Results

MONTREAL, QUEBEC -- (Marketwire) -- 11/23/12 -- Peak Positioning Technologies Inc. ("Peak") (TSX VENTURE:PKK) today announced its financial results and reviewed highlights for the three-month period ended September 30, 2012.

Third Quarter Financial Highlights:


--  Gross royalties generated totalled $90,000, which translated into
    revenue recognition of $46,000 for the period and an additional $44,000
    of deferred revenue to be recognized in future periods 
--  R&D expenditures of $167,000 before tax credits 
--  Total expenses of $769,000 including $320,000 of shared expenses in
    China 
--  Net loss of $742,000 
--  $300,000 gross, in combination of debt and new equity capital raised. 

Third Quarter Operating Highlights:


--  December launch date set for AiNia release to China Unicom consumers in
    China 
--  Finalized new service offering for North America incorporating both
    AiNia features and proprietary HomeWavea security solution 

"The evolution of our venture in China took another major step forward in the third quarter", said Johnson Joseph, Peak's President and CEO. "Important work by Peak and LongKey's development teams to make the AiNia platform appealing to Chinese consumers is now complete and AiNia is expected to be launched in December by China Unicom, which has an install base of over 230 million mobile customers. This will officially open the door for us to the mobile consumer space in China and exponentially increases our revenue-producing potential", he stated.

Third Quarter Financial Results Summary

Peak recognized $45,923 of gross royalty revenues for the three months ended September 30, 2012 compared to $2,326 in the comparable period of 2011. Net royalties (after deducting amortization of other assets, which is a non-cash expense) amounted to $26,788, compared to $2,326 in the prior year period. The royalty flows for the period stem from Peak's agreement with LongKey-Hong Kong Ltd. (LongKey).

Expenses for the three-month period ended September 30, 2012 amounted to $742,329 compared to $360,502 in the comparable period of 2011. The increase in 2012 expenses was principally due to a $230,190 contribution to new offices shared with LongKey in China as well as a $90,000 contribution to LongKey's mobile lab.

The third quarter expenses included R&D expenditures of $166,760 compared to $111,155 in the comparable period of 2011. These costs are before deducting investment tax credits, which are accounted for on an annual basis only.

The net loss for the three month period ending September 30, 2012 was $742,329 compared to $358,176 in the comparable period of 2011.

During the third quarter Peak raised $300,000 gross, in a combination of debt and new equity capital.

Further details on the Company's third quarter 2012 financial results can be found in the Unaudited Consolidated Financial Statements and Management's Discussion and Analysis (MD&A) for the three- and nine-month periods ended September 30, 2012 and 2011, which are available at www.sedar.com.

Peak also announces the closing of a private placement in the amount of $94,000 through the sale of 1,175,000 units priced at $0.08 each. Each unit consists of one common shares and one half (1/2) of one common share purchase warrant which entitles the holder to purchase one common share at the price of $0.15 each for twelve months. All securities issued are subject to a four-month-and-one-day hold period. Proceeds will be used for general working capital purposes and for the continued development of Peak's mobile applications. In connection with the private placement a finder's fee of 8% of the gross proceeds was paid to a non related third party.

About Peak Positioning Technologies Inc.:

Peak Positioning Technologies Inc. (TSX VENTURE:PKK), is a Canadian software developer for smartphones and other mobile computing devices, conducting business primarily in China and North America. In association with its partner, LongKey-Hong Kong Ltd, the company has developed a suite of applications for mobile devices that includes: cloud-based calendar, e-mail and contacts synchronization, automated device configuration, and HomeWavea mobility security. While LongKey markets the applications in China through its partnerships with major Chinese telecommunication companies and banks, Peak plans to similarly market the applications for its own account in North America. For more information: http://www.peakpositioning.com.

About LongKey-Hong Kong Ltd.:

LongKey-Hong Kong Ltd., through its subsidiary LongKey Software Technology Ltd., provides a wide range of IT solutions, business management applications, and mobile applications based on its proprietary Unified Information Services Platform (UISP). LongKey's applications are distributed to end-users in China by some of China's largest telecom and banking entities. For more information: http://www.longkeysoft.com.

Forward-Looking Statements / Information

This news release may include certain forward-looking information, including statements relating to business and operating strategies, plans and prospects for revenue growth, using words including "anticipate", "believe", "could", "expect", "intend", "may", "plan", "potential", "project", "seek", "should", "will", "would" and similar expressions, which are intended to identify a number of these forward-looking statements. Forward-looking information reflects current views with respect to current events and is not a guarantee of future performance and is subject to risks, uncertainties and assumptions. The Company undertakes no obligation to publicly update or review any forward-looking information contained in this news release, except as may be required by applicable laws, rules and regulations. Readers are urged to consider these factors carefully in evaluating any forward-looking information.

Neither the TSX Venture Exchange nor its Regulation Services Provider (as that term is defined in the policies of the TSX Venture Exchange) accepts responsibility for the adequacy or accuracy of this release.

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

@CloudExpo Stories
The 5th International DevOps Summit, co-located with 17th International Cloud Expo – being held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA – announces that its Call for Papers is open. Born out of proven success in agile development, cloud computing, and process automation, DevOps is a macro trend you cannot afford to miss. From showcase success stories from early adopters and web-scale businesses, DevOps is expanding to organizations of all sizes, including the...
The OpenStack cloud operating system includes Trove, a database abstraction layer. Rather than applications connecting directly to a specific type of database, they connect to Trove, which in turn connects to one or more specific databases. One target database is Postgres Plus Cloud Database, which includes its own RESTful API. Trove was originally developed around MySQL, whose interfaces are significantly less complicated than those of the Postgres cloud database. In his session at 16th Cloud...
Over the years, a variety of methodologies have emerged in order to overcome the challenges related to project constraints. The successful use of each methodology seems highly context-dependent. However, communication seems to be the common denominator of the many challenges that project management methodologies intend to resolve. In this respect, Information and Communication Technologies (ICTs) can be viewed as powerful tools for managing projects. Few research papers have focused on the way...
As the world moves from DevOps to NoOps, application deployment to the cloud ought to become a lot simpler. However, applications have been architected with a much tighter coupling than it needs to be which makes deployment in different environments and migration between them harder. The microservices architecture, which is the basis of many new age distributed systems such as OpenStack, Netflix and so on is at the heart of CloudFoundry – a complete developer-oriented Platform as a Service (PaaS...
SAP is delivering break-through innovation combined with fantastic user experience powered by the market-leading in-memory technology, SAP HANA. In his General Session at 15th Cloud Expo, Thorsten Leiduck, VP ISVs & Digital Commerce, SAP, discussed how SAP and partners provide cloud and hybrid cloud solutions as well as real-time Big Data offerings that help companies of all sizes and industries run better. SAP launched an application challenge to award the most innovative SAP HANA and SAP HANA...
With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo in Silicon Valley. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be! Internet of @ThingsExpo, taking place Nov 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 17th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading in...
The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long development cycles that produce software that is obsolete at launch. DevOps may be disruptive, but it is essential. The DevOps Summit at Cloud Expo – to be held June 3-5, 2015, at the Javits Center in New York City – will expand the DevOps community, enable a wide...
P2P RTC will impact the landscape of communications, shifting from traditional telephony style communications models to OTT (Over-The-Top) cloud assisted & PaaS (Platform as a Service) communication services. The P2P shift will impact many areas of our lives, from mobile communication, human interactive web services, RTC and telephony infrastructure, user federation, security and privacy implications, business costs, and scalability. In his session at @ThingsExpo, Robin Raymond, Chief Architect...
There is no question that the cloud is where businesses want to host data. Until recently hypervisor virtualization was the most widely used method in cloud computing. Recently virtual containers have been gaining in popularity, and for good reason. In the debate between virtual machines and containers, the latter have been seen as the new kid on the block – and like other emerging technology have had some initial shortcomings. However, the container space has evolved drastically since coming on...
Explosive growth in connected devices. Enormous amounts of data for collection and analysis. Critical use of data for split-second decision making and actionable information. All three are factors in making the Internet of Things a reality. Yet, any one factor would have an IT organization pondering its infrastructure strategy. How should your organization enhance its IT framework to enable an Internet of Things implementation? In his session at Internet of @ThingsExpo, James Kirkland, Chief Ar...
The 17th International Cloud Expo has announced that its Call for Papers is open. 17th International Cloud Expo, to be held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA, brings together Cloud Computing, APM, APIs, Microservices, Security, Big Data, Internet of Things, DevOps and WebRTC to one location. With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding bu...
Cloud Expo, Inc. has announced today that Andi Mann returns to DevOps Summit 2015 as Conference Chair. The 4th International DevOps Summit will take place on June 9-11, 2015, at the Javits Center in New York City. "DevOps is set to be one of the most profound disruptions to hit IT in decades," said Andi Mann. "It is a natural extension of cloud computing, and I have seen both firsthand and in independent research the fantastic results DevOps delivers. So I am excited to help the great team at ...
All major researchers estimate there will be tens of billions devices - computers, smartphones, tablets, and sensors - connected to the Internet by 2020. This number will continue to grow at a rapid pace for the next several decades. With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo, June 9-11, 2015, at the Javits Center in New York City. Learn what is going on, contribute to the discussions, and ensure that your enter...
In a recent research, analyst firm IDC found that the average cost of a critical application failure is $500,000 to $1 million per hour and the average total cost of unplanned application downtime is $1.25 billion to $2.5 billion per year for Fortune 1000 companies. In addition to the findings on the cost of the downtime, the research also highlighted best practices for development, testing, application support, infrastructure, and operations teams.
The security devil is always in the details of the attack: the ones you've endured, the ones you prepare yourself to fend off, and the ones that, you fear, will catch you completely unaware and defenseless. The Internet of Things (IoT) is nothing if not an endless proliferation of details. It's the vision of a world in which continuous Internet connectivity and addressability is embedded into a growing range of human artifacts, into the natural world, and even into our smartphones, appliances, a...
There is no doubt that Big Data is here and getting bigger every day. Building a Big Data infrastructure today is no easy task. There are an enormous number of choices for database engines and technologies. To make things even more challenging, requirements are getting more sophisticated, and the standard paradigm of supporting historical analytics queries is often just one facet of what is needed. As Big Data growth continues, organizations are demanding real-time access to data, allowing immed...
Enterprises are fast realizing the importance of integrating SaaS/Cloud applications, API and on-premises data and processes, to unleash hidden value. This webinar explores how managers can use a Microservice-centric approach to aggressively tackle the unexpected new integration challenges posed by proliferation of cloud, mobile, social and big data projects. Industry analyst and SOA expert Jason Bloomberg will strip away the hype from microservices, and clearly identify their advantages and d...
Container frameworks, such as Docker, provide a variety of benefits, including density of deployment across infrastructure, convenience for application developers to push updates with low operational hand-holding, and a fairly well-defined deployment workflow that can be orchestrated. Container frameworks also enable a DevOps approach to application development by cleanly separating concerns between operations and development teams. But running multi-container, multi-server apps with containers ...
Software Development Solution category in The 2015 American Business Awards, and will ultimately be a Gold, Silver, or Bronze Stevie® Award winner in the program. More than 3,300 nominations from organizations of all sizes and in virtually every industry were submitted this year for consideration. "We are honored to be recognized as a leader in the software development industry by the Stevie Awards judges," said Steve Brodie, CEO of Electric Cloud. "We introduced ElectricFlow and our Deploy app...
What do a firewall and a fortress have in common? They are no longer strong enough to protect the valuables housed inside. Like the walls of an old fortress, the cracks in the firewall are allowing the bad guys to slip in - unannounced and unnoticed. By the time these thieves get in, the damage is already done and the network is already compromised. Intellectual property is easily slipped out the back door leaving no trace of forced entry. If we want to reign in on these cybercriminals, it's hig...