Welcome!

News Feed Item

Technical Communications Corporation Reports Results for the Fiscal Quarter Ended December 28, 2013

Technical Communications Corporation (NasdaqCM:TCCO) today announced its results for the first quarter of its 2014 fiscal year. For the quarter ended December 28, 2013, the Company reported net income of $184,000 or $0.10 per share, on revenue of $2,509,000, compared to a net loss of $(310,000), or $(0.17) per share, on revenue of $1,597,000 for the quarter ended December 29, 2012.

Commenting on corporate performance, Carl H. Guild, Jr., President and Chief Executive Officer of TCC, said, “During the quarter, we shipped the balance of our large production contract to the U.S. Army Communications and Electronics Command to upgrade the DSD 72A-SP military bulk encryption system currently in use by the Government of Egypt. We also received $955,000 in orders for our DSP 9000 radio encryption system from a U.S. radio manufacturer for deployment into Afghanistan.”

“Our traditional government products continue to be in demand and sales of these products accounted for the majority of revenues during the quarter. At the same time, we continue to ramp up marketing efforts for our new secure voice and data products, and have had positive market response to date.”

“Revenues for the balance of fiscal 2014 are difficult to predict due to delays in the award of certain foreign and domestic procurements currently in process. We nevertheless remain confident that the release of our new data and voice products will result in improved future revenue and profitability.”

During fiscal 2014 the Company is focusing technical efforts on three principal areas: development of solutions that meet the needs of original equipment manufacturers; product enhancements that include expanded features, planned capability and applications growth; and custom solutions that tailor our products to meet the unique needs of our customers.

About Technical Communications Corporation

For over 50 years, TCC has specialized in superior-grade secure communications systems and customized solutions, supporting our CipherONE® best-in-class criteria, to protect highly sensitive voice, data and video transmitted over a wide range of networks. Government entities, military agencies and corporate enterprises in 115 countries have selected TCC's proven security to protect their communications. Learn more: www.tccsecure.com.

Statements made in this press release or as may otherwise be incorporated by reference herein constitute “forward-looking statements” within the meaning of the Private Securities Litigation Reform Act of 1995. Forward-looking statements include but are not limited to statements regarding anticipated operating results, future earnings, and the ability to achieve growth and profitability. Such forward-looking statements involve known and unknown risks, uncertainties and other factors, including but not limited to the effect of foreign political unrest; domestic and foreign government policies and economic conditions; future changes in export laws or regulations; changes in technology; the ability to hire, retain and motivate technical, management and sales personnel; the risks associated with the technical feasibility and market acceptance of new products; changes in telecommunications protocols; the effects of changing costs, exchange rates and interest rates; and the Company's ability to secure adequate capital resources. Such risks, uncertainties and other factors could cause the actual results, performance or achievements of the Company, or industry results, to be materially different from any future results, performance or achievements expressed or implied by such forward-looking statements. For a more detailed discussion of the risks facing the Company, see the Company’s filings with the Securities and Exchange Commission, including its Form 10-K for the fiscal year ended September 28, 2013 and the “Risk Factors” section included therein.

 

Technical Communications Corporation

 

 

 

         

Condensed consolidated income statements

 

Quarter Ended
(Unaudited)

         

12/28/2013

     

12/29/2012

 
Net sales       $ 2,509,000     $ 1,597,000  
Gross profit         1,720,000       1,102,000  
S, G & A expense         707,000       778,000  
Product development costs         762,000       855,000  
Operating income (loss)         251,000       (532,000 )
Income tax expense (benefit)         73,000       (214,000 )
Net income (loss)         184,000       (310,000 )
Net income (loss) per share:              
Basic       $ 0.10     $ (0.17 )
Diluted       $ 0.10     $ (0.17 )
 

         

Condensed consolidated balance sheets

 

       

12/28/2013
(Unaudited)

   

9/28/2013
(derived from audited
financial statements)

Cash and marketable securities       $ 6,190,000     $ 4,581,000
Accounts receivable, net         294,000       1,376,000
Inventory         2,214,000       2,619,000
Deferred & refundable income taxes         1,546,000       1,618,000
Other current assets        

158,000

     

225,000

Total current assets         10,402,000      

10,419,000

Marketable securities         1,454,000       1,463,000
Property and equipment, net        

434,000

     

469,000

               
Total assets      

$

12,290,000

   

$

12,351,000

               
Accounts payable         214,000       262,000
Accrued expenses and other current liabilities        

436,000

     

667,000

Total current liabilities         650,000       929,000
Total stockholders’ equity        

11,640,000

     

11,422,000

Total liabilities and stockholders’ equity      

$

12,290,000

   

$

12,351,000

 

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Docker containers have brought great opportunities to shorten the deployment process through continuous integration and the delivery of applications and microservices. This applies equally to enterprise data centers as well as the cloud. In his session at 20th Cloud Expo, Jari Kolehmainen, founder and CTO of Kontena, discussed solutions and benefits of a deeply integrated deployment pipeline using technologies such as container management platforms, Docker containers, and the drone.io Cl tool. H...
Kubernetes is a new and revolutionary open-sourced system for managing containers across multiple hosts in a cluster. Ansible is a simple IT automation tool for just about any requirement for reproducible environments. In his session at @DevOpsSummit at 18th Cloud Expo, Patrick Galbraith, a principal engineer at HPE, discussed how to build a fully functional Kubernetes cluster on a number of virtual machines or bare-metal hosts. Also included will be a brief demonstration of running a Galera MyS...
Leading companies, from the Global Fortune 500 to the smallest companies, are adopting hybrid cloud as the path to business advantage. Hybrid cloud depends on cloud services and on-premises infrastructure working in unison. Successful implementations require new levels of data mobility, enabled by an automated and seamless flow across on-premises and cloud resources. In his general session at 21st Cloud Expo, Greg Tevis, an IBM Storage Software Technical Strategist and Customer Solution Architec...
Amazon started as an online bookseller 20 years ago. Since then, it has evolved into a technology juggernaut that has disrupted multiple markets and industries and touches many aspects of our lives. It is a relentless technology and business model innovator driving disruption throughout numerous ecosystems. Amazon’s AWS revenues alone are approaching $16B a year making it one of the largest IT companies in the world. With dominant offerings in Cloud, IoT, eCommerce, Big Data, AI, Digital Assista...
In his session at Cloud Expo, Alan Winters, U.S. Head of Business Development at MobiDev, presented a success story of an entrepreneur who has both suffered through and benefited from offshore development across multiple businesses: The smart choice, or how to select the right offshore development partner Warning signs, or how to minimize chances of making the wrong choice Collaboration, or how to establish the most effective work processes Budget control, or how to maximize project result...
The Founder of NostaLab and a member of the Google Health Advisory Board, John is a unique combination of strategic thinker, marketer and entrepreneur. His career was built on the "science of advertising" combining strategy, creativity and marketing for industry-leading results. Combined with his ability to communicate complicated scientific concepts in a way that consumers and scientists alike can appreciate, John is a sought-after speaker for conferences on the forefront of healthcare science,...
"We work around really protecting the confidentiality of information, and by doing so we've developed implementations of encryption through a patented process that is known as superencipherment," explained Richard Blech, CEO of Secure Channels Inc., in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
In his keynote at 19th Cloud Expo, Sheng Liang, co-founder and CEO of Rancher Labs, discussed the technological advances and new business opportunities created by the rapid adoption of containers. With the success of Amazon Web Services (AWS) and various open source technologies used to build private clouds, cloud computing has become an essential component of IT strategy. However, users continue to face challenges in implementing clouds, as older technologies evolve and newer ones like Docker c...
Personalization has long been the holy grail of marketing. Simply stated, communicate the most relevant offer to the right person and you will increase sales. To achieve this, you must understand the individual. Consequently, digital marketers developed many ways to gather and leverage customer information to deliver targeted experiences. In his session at @ThingsExpo, Lou Casal, Founder and Principal Consultant at Practicala, discussed how the Internet of Things (IoT) has accelerated our abilit...
As organizations shift towards IT-as-a-service models, the need for managing and protecting data residing across physical, virtual, and now cloud environments grows with it. Commvault can ensure protection, access and E-Discovery of your data – whether in a private cloud, a Service Provider delivered public cloud, or a hybrid cloud environment – across the heterogeneous enterprise. In his general session at 18th Cloud Expo, Randy De Meno, Chief Technologist - Windows Products and Microsoft Part...
Data is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at Cloud Expo, Ed Featherston, a director and senior enterprise architect at Collaborative Consulting, discussed the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.
In IT, we sometimes coin terms for things before we know exactly what they are and how they’ll be used. The resulting terms may capture a common set of aspirations and goals – as “cloud” did broadly for on-demand, self-service, and flexible computing. But such a term can also lump together diverse and even competing practices, technologies, and priorities to the point where important distinctions are glossed over and lost.
When shopping for a new data processing platform for IoT solutions, many development teams want to be able to test-drive options before making a choice. Yet when evaluating an IoT solution, it’s simply not feasible to do so at scale with physical devices. Building a sensor simulator is the next best choice; however, generating a realistic simulation at very high TPS with ease of configurability is a formidable challenge. When dealing with multiple application or transport protocols, you would be...
Detecting internal user threats in the Big Data eco-system is challenging and cumbersome. Many organizations monitor internal usage of the Big Data eco-system using a set of alerts. This is not a scalable process given the increase in the number of alerts with the accelerating growth in data volume and user base. Organizations are increasingly leveraging machine learning to monitor only those data elements that are sensitive and critical, autonomously establish monitoring policies, and to detect...
Two weeks ago (November 3-5), I attended the Cloud Expo Silicon Valley as a speaker, where I presented on the security and privacy due diligence requirements for cloud solutions. Cloud security is a topical issue for every CIO, CISO, and technology buyer. Decision-makers are always looking for insights on how to mitigate the security risks of implementing and using cloud solutions. Based on the presentation topics covered at the conference, as well as the general discussions heard between sessio...