Welcome!

News Feed Item

BGI-Shenzhen Extends Tender Offer for Complete Genomics, Inc.

SHENZHEN, China, Dec. 28, 2012 /PRNewswire/ -- BGI-Shenzhen ("BGI") announced today that it, through its wholly owned subsidiary Beta Acquisition Corporation,  has extended its all cash tender offer (the "Offer") to purchase all outstanding shares of common stock of Complete Genomics, Inc. (NASDAQ: GNOM) ("Complete") to 12:00 am ET on Monday, January 7, 2013. The Offer was previously scheduled to expire at 12:00 am ET on Monday, December 31, 2012. 

Except for the extension of the Offer expiration date, all other terms and conditions of the Offer remain unchanged.  The Depositary for the Offer has indicated that, as of the close of business on December 28, 2012, approximately 17,822,265 shares, or approximately 50%, of common stock of Complete have been validly tendered in and not withdrawn from the Offer, including shares of common stock of Complete subject to guaranteed delivery procedures.

BGI's financial advisor is Citi, and its legal counsel is O'Melveny & Myers LLP. Complete's financial adviser is Jefferies & Company, and its legal counsel is Latham & Watkins LLP.

Stockholders with questions about the Offer or who need assistance with tendering their shares of common stock of Complete, may call the Information Agent, Innisfree M&A Incorporated, toll-free, at (888) 750-5834.

FORWARD-LOOKING STATEMENTS

Certain statements either contained in or incorporated by reference into this document are forward-looking statements that involve risks and uncertainty. Future events regarding the proposed transactions and both the BGI's and Complete's actual results could differ materially from the forward-looking statements. Factors that might cause such a difference include, but are not limited to, statements regarding the combined companies' plans following, and the expected completion of, the proposed acquisition. These forward-looking statements involve certain risks and uncertainties that could cause actual results to differ materially from those indicated in such forward-looking statements and generally include statements that are predictive in nature and depend upon or refer to future events or conditions. Risks and uncertainties include the ability of BGI and Complete to complete the transactions contemplated by the merger agreement, including the parties' abilities to satisfy the conditions to the consummation of the proposed acquisition; the possibility of any termination of the merger agreement; the timing of the Offer and the subsequent merger; uncertainties as to how many of Complete's stockholders will tender their shares of common stock in the Offer; the possibility that various other conditions to the consummation of the Offer or the subsequent merger may not be satisfied or waived, including that a governmental entity may prohibit, delay or refuse to grant approval for the consummation of the acquisition; other uncertainties pertaining to the business of Complete or BGI; legislative and regulatory activity and oversight; the continuing global economic uncertainty and other risks detailed in Complete's public filings with the Securities and Exchange Commission (the "SEC") from time to time, including Complete's most recent Annual Report on Form 10-K for the year ended December 31, 2011, Quarterly Reports on Form 10-Q and its subsequently filed SEC reports, each as filed with the SEC, which contains and identifies important factors that could cause actual results to differ materially from those contained in the forward-looking statements. The reader is cautioned not to unduly rely on these forward-looking statements. Each of Complete and BGI expressly disclaims any intent or obligation to update or revise publicly these forward-looking statements except as required by law.

ADDITIONAL INFORMATION

This press release is neither an offer to purchase nor a solicitation of an offer to sell shares of Complete. BGI and Beta Acquisition Corporation filed a tender offer statement with the SEC on September 25, 2012, and mailed an offer to purchase, forms of letter of transmittal and related documents to Complete's stockholders. Complete filed a solicitation/recommendation statement on Schedule 14D-9 with the SEC on September 25, 2012, and mailed the Schedule 14D-9 to Complete's stockholders . These documents, as they may be amended from time to time, contain important information about the Offer and stockholders of Complete are urged to read them carefully.

Investors may obtain a free copy of these documents and other relevant documents filed with the SEC through the website maintained by the SEC at www.sec.gov. In addition, investors and stockholders will be able to obtain free copies of these materials filed by Complete by contacting Investor Relations by telephone at (650) 943-2788, by mail at Complete Genomics, Inc., Investor Relations, 2071 Stierlin Court, Mountain View, California 94043, or by going to Complete's Investor Relations page on its corporate website at www.completegenomics.com.

MEDIA INQUIRIES

For BGI-Shenzhen:

In the U.S.:
Jason Golz
Brunswick Group
Tel: (415) 671-7676
[email protected]

In China:
Elizabeth Liang
Brunswick Group
Tel: +852 3512 5000 
[email protected]

 

SOURCE BGI-Shenzhen

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Identity is in everything and customers are looking to their providers to ensure the security of their identities, transactions and data. With the increased reliance on cloud-based services, service providers must build security and trust into their offerings, adding value to customers and improving the user experience. Making identity, security and privacy easy for customers provides a unique advantage over the competition.
There are several IoTs: the Industrial Internet, Consumer Wearables, Wearables and Healthcare, Supply Chains, and the movement toward Smart Grids, Cities, Regions, and Nations. There are competing communications standards every step of the way, a bewildering array of sensors and devices, and an entire world of competing data analytics platforms. To some this appears to be chaos. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, Bradley Holt, Developer Advocate a...
SYS-CON Events announced today that Niagara Networks will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Niagara Networks offers the highest port-density systems, and the most complete Next-Generation Network Visibility systems including Network Packet Brokers, Bypass Switches, and Network TAPs.
SYS-CON Events announced today that Secure Channels will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. The bedrock of Secure Channels Technology is a uniquely modified and enhanced process based on superencipherment. Superencipherment is the process of encrypting an already encrypted message one or more times, either using the same or a different algorithm.
If you’re responsible for an application that depends on the data or functionality of various IoT endpoints – either sensors or devices – your brand reputation depends on the security, reliability, and compliance of its many integrated parts. If your application fails to deliver the expected business results, your customers and partners won't care if that failure stems from the code you developed or from a component that you integrated. What can you do to ensure that the endpoints work as expect...
So, you bought into the current machine learning craze and went on to collect millions/billions of records from this promising new data source. Now, what do you do with them? Too often, the abundance of data quickly turns into an abundance of problems. How do you extract that "magic essence" from your data without falling into the common pitfalls? In her session at @ThingsExpo, Natalia Ponomareva, Software Engineer at Google, provided tips on how to be successful in large scale machine learning...
In his general session at 18th Cloud Expo, Lee Atchison, Principal Cloud Architect and Advocate at New Relic, discussed cloud as a ‘better data center’ and how it adds new capacity (faster) and improves application availability (redundancy). The cloud is a ‘Dynamic Tool for Dynamic Apps’ and resource allocation is an integral part of your application architecture, so use only the resources you need and allocate /de-allocate resources on the fly.
If you had a chance to enter on the ground level of the largest e-commerce market in the world – would you? China is the world’s most populated country with the second largest economy and the world’s fastest growing market. It is estimated that by 2018 the Chinese market will be reaching over $30 billion in gaming revenue alone. Admittedly for a foreign company, doing business in China can be challenging. Often changing laws, administrative regulations and the often inscrutable Chinese Interne...
Enterprise IT has been in the era of Hybrid Cloud for some time now. But it seems most conversations about Hybrid are focused on integrating AWS, Microsoft Azure, or Google ECM into existing on-premises systems. Where is all the Private Cloud? What do technology providers need to do to make their offerings more compelling? How should enterprise IT executives and buyers define their focus, needs, and roadmap, and communicate that clearly to the providers?
Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security ha...
More and more companies are looking to microservices as an architectural pattern for breaking apart applications into more manageable pieces so that agile teams can deliver new features quicker and more effectively. What this pattern has done more than anything to date is spark organizational transformations, setting the foundation for future application development. In practice, however, there are a number of considerations to make that go beyond simply “build, ship, and run,” which changes ho...
Using new techniques of information modeling, indexing, and processing, new cloud-based systems can support cloud-based workloads previously not possible for high-throughput insurance, banking, and case-based applications. In his session at 18th Cloud Expo, John Newton, CTO, Founder and Chairman of Alfresco, described how to scale cloud-based content management repositories to store, manage, and retrieve billions of documents and related information with fast and linear scalability. He addres...
SYS-CON Events announced today that Commvault, a global leader in enterprise data protection and information management, has been named “Bronze Sponsor” of SYS-CON's 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Commvault is a leading provider of data protection and information management solutions, helping companies worldwide activate their data to drive more value and business insight and to transform moder...
SYS-CON Events announced today that eCube Systems, a leading provider of middleware modernization, integration, and management solutions, will exhibit at @DevOpsSummit at 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. eCube Systems offers a family of middleware evolution products and services that maximize return on technology investment by leveraging existing technical equity to meet evolving business needs. ...
The many IoT deployments around the world are busy integrating smart devices and sensors into their enterprise IT infrastructures. Yet all of this technology – and there are an amazing number of choices – is of no use without the software to gather, communicate, and analyze the new data flows. Without software, there is no IT. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists will look at the protocols that communicate data and the emerging data analy...