Welcome!

News Feed Item

Phorm Corporation Limited: Interim Results for the Six Months Ended 30 June 2014

SINGAPORE -- (Marketwired) -- 08/22/14 -- Phorm Corporation Limited (AIM: PHRM)

Phorm Corporation Limited
("Phorm" or the "Company")
Interim Results for the six months ended 30 June 2014

Phorm (AIM: PHRM), a leading internet personalisation technology company, today announces its unaudited interim results for the six months ended 30 June 2014.

Highlights:

  • Gross revenue $0.5m (2013: $0.03m)

  • Operating Losses $22.8m (2013: $24.3m)

  • Losses after taxation $23.0m (2013: $24.8m)

  • Loss per share was $0.04 (2013: $0.18)

  • During the first 6 months of the year, average monthly cash burn excluding financing activity was $3.6m (2013: $2.6m)

For further information please contact:

Phorm Corporation Limited
Andy Croxson (analysts and investors)                   +44 (0) 203 397 6001

UK Investors
----------------------------------------------------------------------------
Mirabaud Securities LLP (Broker)                        +44 20 7321 2508
----------------------------------------------------------------------------
Jason Woollard
Peter Krens

Strand Hanson Limited (Nominated Adviser)               +44 20 7409 3494
James Harris
Matthew Chandler
James Dance

US Investors
----------------------------------------------------------------------------
Lippert/Heilshorn and Associates (Investor Relations)   +1 212 838 3777
----------------------------------------------------------------------------
John Heilshorn

Chairman and Chief Executive Officer's Statement

I am pleased to present the group's unaudited interim results for the six month period to 30 June 2014. The unaudited consolidated results show that the group's financial loss narrowed in the six months ended 30 June 2014 compared to the equivalent period in 2013. This reflects the fact that Phorm is now entering the revenue growth phase of its business.

Phorm is now in the fortunate position of having set the foundations for achieving substantial growth. As set out in the Company's previous financial statements, revenue growth is a function of the interaction between deployed internet service provider ("ISP") users, partnerships which bring us inventory in the form of advertising requests, and advertising campaigns sold and successfully delivered. Accordingly, users, advertising requests and advertising campaigns are the fundamental drivers of revenue.

Users

The Company's technology is currently deployed with 10 ISPs worldwide, compared to only 1 ISP a year ago. We therefore have a substantially greater number of users than this point last year. In late June 2014, we announced that peak daily unique users had grown from approximately 0.8m to 37.8m and this figure is currently in excess of 40m.

Advertising requests
The access to inventory, which we currently enjoy, grew from 22.3bn requests in H2 2013 to 67.3bn by the end of H1 2014 and this growth trend is continuing as more publishers join Phorm's network.

Advertising campaigns

The number of advertising impressions served has similarly increased, from approximately 0.8bn impressions in H2 2013 to 2.6bn by the end of H1 2014. Our advertising campaign pipeline is continuing to strengthen and the total value of the opportunity pipeline (defined as specific campaign opportunities that are currently being discussed with advertising and agency partners) has grown to over $2m, which demonstrates advertiser confidence in our proposition and the performance of our system.

As we continue to bring these campaigns online, the imperative is to ensure that the performance, that we are able to secure for advertisers, matches or exceeds the groundbreaking performance levels which we achieved in Turkey as announced to the market in late September 2013. Achieving sufficient user numbers, to run multiple, large-scale commercial campaigns, remains an important goal in Turkey and it is expected that this situation will improve over time.

Our system is extremely powerful, yet complicated. In order to operate it successfully in China, which is substantially larger in scale than Turkey, we need to deliver rapidly on a number of fronts including: recruitment, sales management, advertising operations, performance management and data science.

In terms of recruitment, a key challenge in China is recruiting and training world class staff who can acquire the operational experience necessary in a very short period of time. This includes staff in advertising sales, advertising operations, technical ISP sales, network deployment and senior local management.

Sales staff need to be trained up to explain the benefits of a product which we believe is truly different from anything which the industry has so far encountered. They then need to go through the process of meeting with and educating clients on our proposition and taking them through to the order stage. We are seeing encouraging responses so far as manifested by the significant sales pipeline, which has developed in a short space of time.

Similarly, the range of options available for utilising the power of the system to reach the client's desired audience to an unprecedented degree also means that the appropriate level of staff in advertising operations needs to be recruited and trained accordingly. In addition, we have been focusing on developing a management model, which allows us to supervise operations from our operations centre and thereby upscale significantly, efficiently and effectively.

The scale at which we are now operating in China makes it critical that we measure performance in real time and optimise our performance across numerous campaigns, time zones and language barriers. We are now running both test campaigns with new customers and full commercial campaigns with advertisers, who have rebooked following positive results. As the test campaigns with new customers come to their conclusion, the extent to which we have managed their performance will dictate the propensity of advertisers to renew their custom and increase scale, making this function critical. Performance management is now a dominant focus within the group.

Looking ahead, we are developing a number of statistical techniques and software technologies, which will allow us to automate much of the performance management process. We expect some of these efforts to bear fruit within the coming months. We currently anticipate this to replace manual performance management as the most critical resource allocation within the business.

In summary, growth rates achieved so far have been very significant and we expect them to accelerate. Comparing H1 2013 to H1 2014, we have seen a 44 fold increase in peak daily unique users, a 42 fold increase in advertising requests and a 18 fold increase in revenues. Simply extrapolating those growth rates moving forward would lead us to highly respectable large scale revenues. However, we believe that, based upon what we currently have in hand and in our pipeline, rates of growth should in fact accelerate further, particularly as current test campaigns convert into full-scale commercial campaigns.

We have made good progress in the first half of 2014 and the group is now well positioned for the remainder of the year as we seek to build on our achievements to date.

Kent Ertugrul
Chairman & Chief Executive Officer
22 August 2014

Click on, or paste the following link into your web browser, to view the associated PDF document.
http://www.rns-pdf.londonstockexchange.com/rns/8116P_1-2014-8-22.pdf

For further information please contact:

Phorm Corporation Limited
Andy Croxson (analysts and investors)
+44 (0) 203 397 6001

UK Investors
Mirabaud Securities LLP (Broker)
+44 20 7321 2508
Jason Woollard
Peter Krens

Strand Hanson Limited (Nominated Adviser)
+44 20 7409 3494
James Harris
Matthew Chandler
James Dance

US Investors
Lippert/Heilshorn and Associates (Investor Relations)
+1 212 838 3777
John Heilshorn

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
In his session at 18th Cloud Expo, Sagi Brody, Chief Technology Officer at Webair Internet Development Inc., will focus on real world deployments of DDoS mitigation strategies in every layer of the network. He will give an overview of methods to prevent these attacks and best practices on how to provide protection in complex cloud platforms. He will also outline what we have found in our experience managing and running thousands of Linux and Unix managed service platforms and what specifically c...
We're entering the post-smartphone era, where wearable gadgets from watches and fitness bands to glasses and health aids will power the next technological revolution. With mass adoption of wearable devices comes a new data ecosystem that must be protected. Wearables open new pathways that facilitate the tracking, sharing and storing of consumers’ personal health, location and daily activity data. Consumers have some idea of the data these devices capture, but most don’t realize how revealing and...
Peak 10, Inc., has announced the implementation of IT service management, a business process alignment initiative based on the widely adopted Information Technology Infrastructure Library (ITIL) framework. The implementation of IT service management enhances Peak 10’s current service-minded approach to IT delivery by propelling the company to deliver higher levels of personalized and prompt service. The majority of Peak 10’s operations employees have been trained and certified in the ITIL frame...
Many private cloud projects were built to deliver self-service access to development and test resources. While those clouds delivered faster access to resources, they lacked visibility, control and security needed for production deployments. In their session at 18th Cloud Expo, Steve Anderson, Product Manager at BMC Software, and Rick Lefort, Principal Technical Marketing Consultant at BMC Software, will discuss how a cloud designed for production operations not only helps accelerate developer...
trust and privacy in their ecosystem. Assurance and protection of device identity, secure data encryption and authentication are the key security challenges organizations are trying to address when integrating IoT devices. This holds true for IoT applications in a wide range of industries, for example, healthcare, consumer devices, and manufacturing. In his session at @ThingsExpo, Lancen LaChance, vice president of product management, IoT solutions at GlobalSign, will teach IoT developers how t...
SYS-CON Events announced today the Docker Meets Kubernetes – Intro into the Kubernetes World, being held June 9, 2016, in conjunction with 18th Cloud Expo | @ThingsExpo, at the Javits Center in New York, NY. Register for 'Docker Meets Kubernetes Workshop' Here! This workshop led by Sebastian Scheele, co-founder of Loodse, introduces participants to Kubernetes (container orchestration). Through a combination of instructor-led presentations, demonstrations, and hands-on labs, participants learn ...
SYS-CON Events announced today that Ericsson has been named “Gold Sponsor” of SYS-CON's @ThingsExpo, which will take place on June 7-9, 2016, at the Javits Center in New York, New York. Ericsson is a world leader in the rapidly changing environment of communications technology – providing equipment, software and services to enable transformation through mobility. Some 40 percent of global mobile traffic runs through networks we have supplied. More than 1 billion subscribers around the world re...
In the world of DevOps there are ‘known good practices’ – aka ‘patterns’ – and ‘known bad practices’ – aka ‘anti-patterns.' Many of these patterns and anti-patterns have been developed from real world experience, especially by the early adopters of DevOps theory; but many are more feasible in theory than in practice, especially for more recent entrants to the DevOps scene. In this power panel at @DevOpsSummit at 18th Cloud Expo, moderated by DevOps Conference Chair Andi Mann, panelists will dis...
A critical component of any IoT project is the back-end systems that capture data from remote IoT devices and structure it in a way to answer useful questions. Traditional data warehouse and analytical systems are mature technologies that can be used to handle large data sets, but they are not well suited to many IoT-scale products and the need for real-time insights. At Fuze, we have developed a backend platform as part of our mobility-oriented cloud service that uses Big Data-based approache...
Increasing IoT connectivity is forcing enterprises to find elegant solutions to organize and visualize all incoming data from these connected devices with re-configurable dashboard widgets to effectively allow rapid decision-making for everything from immediate actions in tactical situations to strategic analysis and reporting. In his session at 18th Cloud Expo, Shikhir Singh, Senior Developer Relations Manager at Sencha, will discuss how to create HTML5 dashboards that interact with IoT devic...
The increasing popularity of the Internet of Things necessitates that our physical and cognitive relationship with wearable technology will change rapidly in the near future. This advent means logging has become a thing of the past. Before, it was on us to track our own data, but now that data is automatically available. What does this mean for mHealth and the "connected" body? In her session at @ThingsExpo, Lisa Calkins, CEO and co-founder of Amadeus Consulting, will discuss the impact of wea...
There is an ever-growing explosion of new devices that are connected to the Internet using “cloud” solutions. This rapid growth is creating a massive new demand for efficient access to data. And it’s not just about connecting to that data anymore. This new demand is bringing new issues and challenges and it is important for companies to scale for the coming growth. And with that scaling comes the need for greater security, gathering and data analysis, storage, connectivity and, of course, the...
We’ve worked with dozens of early adopters across numerous industries and will debunk common misperceptions, which starts with understanding that many of the connected products we’ll use over the next 5 years are already products, they’re just not yet connected. With an IoT product, time-in-market provides much more essential feedback than ever before. Innovation comes from what you do with the data that the connected product provides in order to enhance the customer experience and optimize busi...
Artificial Intelligence has the potential to massively disrupt IoT. In his session at 18th Cloud Expo, AJ Abdallat, CEO of Beyond AI, will discuss what the five main drivers are in Artificial Intelligence that could shape the future of the Internet of Things. AJ Abdallat is CEO of Beyond AI. He has over 20 years of management experience in the fields of artificial intelligence, sensors, instruments, devices and software for telecommunications, life sciences, environmental monitoring, process...
The IETF draft standard for M2M certificates is a security solution specifically designed for the demanding needs of IoT/M2M applications. In his session at @ThingsExpo, Brian Romansky, VP of Strategic Technology at TrustPoint Innovation, will explain how M2M certificates can efficiently enable confidentiality, integrity, and authenticity on highly constrained devices.