Welcome!

News Feed Item

O2 Secure Wireless, Inc. Announces Completion of 1-for-1000 Reverse Split of Common Shares

ST. AUGUSTINE, Fla., Dec. 7, 2012 /PRNewswire/ -- O2 Secure Wireless, INC. (Pink Sheets: OTOW.PK - News) – announces today that the Company has filed a Supplemental Information Disclosure Statement with the OTC Markets confirming FINRA's approval of the Company's requested 1 for 1000 reverse stock split. The approved reverse stock split will be effective upon markets' opening on December 10, 2012.

The Company's common stock will continue to be traded on the Pink Sheets under the symbol "OTOW", with a "D" added, which has been placed at the end of the trading symbol, and will remain for 20 trading days to indicate the reverse stock split has occurred. The new CUSIP number it now trades under is: 67107C203. O2 Secure Wireless' Supplemental Information Disclosure Statement is currently posted for review at http://www.otcmarkets.com/stock/OTOW/filings. See Corporate website for additional information.

The reverse split consolidated every one thousand common shares into one common share, no par value per share. The number of authorized common shares has been reduced to eighty million but the authorized preferred shares will not be affected by the reverse split. In respect to the underlying common shares associated with any derivative securities, such as warrants, options and convertible notes, the conversion and exercise prices and number of common shares issued will be adjusted in accordance to the 1:1000 ratio. A reverse stock split reduces the number of a corporation's shares in an attempt to increase the value of its stock or its earnings per share. It is anticipated that this action will establish a higher market price for the Company's common shares and reduce per share transaction fees as well as expand the potential market for investors who were previously hindered by trading limitations.

As a result of the reverse stock split, the number of the Company's common shares outstanding will be reduced from 2,465,939,418 to approximately 2,465,939 shares, subject to rounding up of all fractional shares to the nearest whole share.

We are effectuating this reverse stock split in order to be able to access the previously announced drawdown line of credit in an amount of $5,000,000. On September 21, 2012, we entered in a Reg A Equity Financing Agreement (the "Agreement") with AGS Capital Group, LLC ("AGS"), whereby AGS shall provide us a $5,000,000 drawdown line of credit (the "Line of Credit") under Reg A of the Securities Act of 1933.  In order to have access to the Line of Credit, we must effectuate the reverse stock split.  This is true because at our current price per share the discount to the closing price of our common stock we will be selling shares for under the Liner of Credit would effectively result in the funds we could call being negligible.  Additionally, pursuant to the Agreement, we must reserve sufficient shares to cover the amount of the Line of Credit.  The Line of Credit will be used for the Development of its Building Projects domestically and abroad.  The Line of Credit will enable the Company to access the working capital required to undertake the projects that will in turn enable the Company to begin generating substantial revenues, while keeping the stock structure in tack creating a truly advantageous opportunity for our shareholders to prosper.

"We are pleased to have completed this reverse split which was required in order to be able to access a drawdown line of credit in an amount of $5,000,000," stated Val Kazia, President, O2 Secure Wireless, Inc. He continues: "It is our expectation that the higher split-adjusted stock price will make it possible for the shares to be traded in many environments where corporate limitations previously hindered such activity. We expect this to broaden our potential audience and shareholder base, and ultimately enhance our shareholder valuation to better reflect the value of the Company, as we continue to expand our operation."

About O2 Secure Wireless: O2 Secure Wireless is responsible for the development of wireless Internet facilities across the U.S. The company's recent merger with Earthcom Service Inc. has triggered a stream of investment into underserved markets, including flat rate pre-paid wireless telecom services in developing countries, and the current O2USA MasterCard facility.

Safe Harbor Act: This release may contain "forward-looking statements" within the meaning of Section 27A of the Securities Act of 1933, as amended, and Section 21E the Securities Exchange Act of 1934, as amended and such forward-looking statements are made pursuant to the safe harbor provisions of the Private Securities Litigation Reform Act of 1995. "Forward-looking statements" describe future expectations, plans, results, or strategies and are generally preceded by words such as "may," "future," "plan" or "planned," "will" or "should," "expected," "anticipates," "draft," "eventually" or "projected." You are cautioned that such statements are subject to a multitude of risks and uncertainties that could cause future circumstances, events, or results to differ materially from those projected in the forward-looking statements, including the risks that actual results may differ materially from those projected in the forward-looking statements as a result of various factors, and other risks identified in a company's annual report.

For more information visit our website: www.o2securewireless.com, or contact
Investor Relations: 855-222-0221

SOURCE O2 Secure Wireless, Inc.

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Organizations planning enterprise data center consolidation and modernization projects are faced with a challenging, costly reality. Requirements to deploy modern, cloud-native applications simultaneously with traditional client/server applications are almost impossible to achieve with hardware-centric enterprise infrastructure. Compute and network infrastructure are fast moving down a software-defined path, but storage has been a laggard. Until now.
Adding public cloud resources to an existing application can be a daunting process. The tools that you currently use to manage the software and hardware outside the cloud aren’t always the best tools to efficiently grow into the cloud. All of the major configuration management tools have cloud orchestration plugins that can be leveraged, but there are also cloud-native tools that can dramatically improve the efficiency of managing your application lifecycle. In his session at 18th Cloud Expo, ...
Contextual Analytics of various threat data provides a deeper understanding of a given threat and enables identification of unknown threat vectors. In his session at @ThingsExpo, David Dufour, Head of Security Architecture, IoT, Webroot, Inc., discussed how through the use of Big Data analytics and deep data correlation across different threat types, it is possible to gain a better understanding of where, how and to what level of danger a malicious actor poses to an organization, and to determ...
Extreme Computing is the ability to leverage highly performant infrastructure and software to accelerate Big Data, machine learning, HPC, and Enterprise applications. High IOPS Storage, low-latency networks, in-memory databases, GPUs and other parallel accelerators are being used to achieve faster results and help businesses make better decisions. In his session at 18th Cloud Expo, Michael O'Neill, Strategic Business Development at NVIDIA, focused on some of the unique ways extreme computing is...
Digital transformation has increased the pace of business creating a productivity divide between the technology haves and have nots. Managing financial information on spreadsheets and piecing together insight from numerous disconnected systems is no longer an option. Rapid market changes and aggressive competition are motivating business leaders to reevaluate legacy technology investments in search of modern technologies to achieve greater agility, reduced costs and organizational efficiencies. ...
CI/CD is conceptually straightforward, yet often technically intricate to implement since it requires time and opportunities to develop intimate understanding on not only DevOps processes and operations, but likely product integrations with multiple platforms. This session intends to bridge the gap by offering an intense learning experience while witnessing the processes and operations to build from zero to a simple, yet functional CI/CD pipeline integrated with Jenkins, Github, Docker and Azure...
Fact: storage performance problems have only gotten more complicated, as applications not only have become largely virtualized, but also have moved to cloud-based infrastructures. Storage performance in virtualized environments isn’t just about IOPS anymore. Instead, you need to guarantee performance for individual VMs, helping applications maintain performance as the number of VMs continues to go up in real time. In his session at Cloud Expo, Dhiraj Sehgal, Product and Marketing at Tintri, sha...
"We do one of the best file systems in the world. We learned how to deal with Big Data many years ago and we implemented this knowledge into our software," explained Jakub Ratajczak, Business Development Manager at MooseFS, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
Traditional IT, great for stable systems of record, is struggling to cope with newer, agile systems of engagement requirements coming straight from the business. In his session at 18th Cloud Expo, William Morrish, General Manager of Product Sales at Interoute, will outline ways of exploiting new architectures to enable both systems and building them to support your existing platforms, with an eye for the future. Technologies such as Docker and the hyper-convergence of computing, networking and...
Containers, microservices and DevOps are all the rage lately. You can read about how great they are and how they’ll change your life and the industry everywhere. So naturally when we started a new company and were deciding how to architect our app, we went with microservices, containers and DevOps. About now you’re expecting a story of how everything went so smoothly, we’re now pushing out code ten times a day, but the reality is quite different.
The hierarchical architecture that distributes "compute" within the network specially at the edge can enable new services by harnessing emerging technologies. But Edge-Compute comes at increased cost that needs to be managed and potentially augmented by creative architecture solutions as there will always a catching-up with the capacity demands. Processing power in smartphones has enhanced YoY and there is increasingly spare compute capacity that can be potentially pooled. Uber has successfully ...
Using new techniques of information modeling, indexing, and processing, new cloud-based systems can support cloud-based workloads previously not possible for high-throughput insurance, banking, and case-based applications. In his session at 18th Cloud Expo, John Newton, CTO, Founder and Chairman of Alfresco, described how to scale cloud-based content management repositories to store, manage, and retrieve billions of documents and related information with fast and linear scalability. He addres...
You want to start your DevOps journey but where do you begin? Do you say DevOps loudly 5 times while looking in the mirror and it suddenly appears? Do you hire someone? Do you upskill your existing team? Here are some tips to help support your DevOps transformation. Conor Delanbanque has been involved with building & scaling teams in the DevOps space globally. He is the Head of DevOps Practice at MThree Consulting, a global technology consultancy. Conor founded the Future of DevOps Thought Leade...
When building large, cloud-based applications that operate at a high scale, it’s important to maintain a high availability and resilience to failures. In order to do that, you must be tolerant of failures, even in light of failures in other areas of your application. “Fly two mistakes high” is an old adage in the radio control airplane hobby. It means, fly high enough so that if you make a mistake, you can continue flying with room to still make mistakes. In his session at 18th Cloud Expo, Lee A...