|By Business Wire||
|January 2, 2013 07:06 AM EST||
Tessera Technologies, Inc. (NASDAQ: TSRA) (the “Company” or “we”) announced today that its Tessera, Inc. and Invensas Corporation subsidiaries each entered into new eight-year patent license agreements with SK hynix Inc.
“We are delighted that these new and broader agreements build on our long-standing and positive relationship with SK hynix, which has become the first DRAM manufacturer to reach agreements that give it access to both our Tessera, Inc. and our Invensas Corporation patent portfolios,” said Robert A. Young, chief executive officer and president, Tessera Technologies, Inc. “Multi-year agreements like these benefit our customers with secure pricing and provide us with running royalties that fund new innovations.”
The companies did not disclose the specific financial terms of the agreements, under which SK hynix will make a one-time payment and pay running royalties. The agreement will result in an increase in the Company’s recurring royalty revenues from SK hynix beginning in Q2 2013 because the Company reports royalties one quarter in arrears. The Company and SK hynix also agreed to dismiss the antitrust lawsuit pending in California state court. The Company is neither updating its financial guidance nor providing additional financial guidance in connection with this milestone.
“Our business is connecting patented ideas to manufacturers, like SK hynix,” said Young. “SK hynix now can make optimal decisions for its customers with the benefit of licenses to more than 1,200 issued patents in the Tessera, Inc. and Invensas Corporation portfolios.”
Safe Harbor Statement
This press release contains forward-looking statements, which are made pursuant to the safe harbor provisions of the Private Securities Litigation Reform Act of 1995. Forward-looking statements involve risks and uncertainties that could cause actual results to differ significantly from those projected, particularly with respect to the effects and duration of the new agreements with SK hynix, the strength of the Company’s IP business and its patents, and future payments and running royalties and the funding and value of new innovations. Material factors that may cause results to differ from the statements made include the plans or operations relating to the Company's businesses; market or industry conditions; changes in patent laws, regulation or enforcement, or other factors that might affect the Company’s ability to protect or realize the value of its intellectual property; the expiration of license agreements and the cessation of related royalty income; the failure, inability or refusal of licensees to pay royalties; initiation, delays, setbacks or losses relating to the Company’s intellectual property or intellectual property litigations, or invalidation or limitation of key patents; the timing and results, which are not predictable and may vary in any individual proceeding, of any ICC ruling or award, including in the Amkor arbitration; fluctuations in operating results due to the timing of new license agreements and royalties, or due to legal costs; the risk of a decline in demand for semiconductor and camera module products; failure by the industry to use technologies covered by the Company’s patents; the expiration of the Company’s patents; the Company’s ability to successfully complete and integrate acquisitions of businesses, including the integration by DigitalOptics Corporation (“DOC”) of its recently acquired camera module manufacturing facility in Zhuhai, China; the risk of loss of, or decreases in production orders from, customers of acquired businesses; financial and regulatory risks associated with the international nature of the Company’s businesses; failure of the Company’s products to achieve technological feasibility or profitability; failure to successfully commercialize the Company’s products; changes in demand for the products of the Company’s customers; limited opportunities to license technologies and sell products due to high concentration in the markets for semiconductors and related products and camera modules; the impact of competing technologies on the demand for the Company’s technologies and products; failure by DOC to become a vertically integrated camera module supplier; and the reliance on a limited number of suppliers for the components used in the manufacture of DOC products. You are cautioned not to place undue reliance on the forward-looking statements, which speak only as of the date of this release. The Company's filings with the Securities and Exchange Commission, including its Annual Report on Form 10-K for the year ended Dec. 31, 2011, and its Quarterly Report on Form 10-Q for the quarter ended Sept. 30, 2012, include more information about factors that could affect the Company's financial results. The Company assumes no obligation to update information contained in this press release. Although this release may remain available on the Company's website or elsewhere, its continued availability does not indicate that the Company is reaffirming or confirming any of the information contained herein.
About Tessera Technologies, Inc.
Tessera Technologies, Inc. is a holding company with operating subsidiaries in two segments: Intellectual Property and DigitalOptics. The Intellectual Property business, comprised of engineering, licensing, account administration and litigation teams, generates revenue from manufacturers that use its patented ideas. The DigitalOptics business delivers innovation in imaging and optics with products and capabilities that enable expanded functionality in increasingly smaller devices. DigitalOptics’ miniaturized camera module solutions provide cost-effective, high-quality camera features, including Micro Electro Mechanical Systems (“MEMS”)-based autofocus, extended depth of field (“EDoF”), zoom, image enhancement and optical image stabilization. DigitalOptics also offers customized micro-optic lenses from diffractive and refractive optical elements to integrated micro-optical subassemblies. For more information call 1.408.321.6000 or visit www.tessera.com.
Tessera, Tessera, Inc., the Tessera logo, DigitalOptics Corporation, and Invensas Corporation are trademarks or registered trademarks of affiliated companies of Tessera Technologies, Inc. in the United States and other countries. All other company, brand and product names may be trademarks or registered trademarks of their respective companies.
Many private cloud projects were built to deliver self-service access to development and test resources. While those clouds delivered faster access to resources, they lacked visibility, control and security needed for production deployments. In their session at 18th Cloud Expo, Steve Anderson, Product Manager at BMC Software, and Rick Lefort, Principal Technical Marketing Consultant at BMC Software, will discuss how a cloud designed for production operations not only helps accelerate developer...
May. 6, 2016 07:00 PM EDT Reads: 1,405
In his session at 18th Cloud Expo, Sagi Brody, Chief Technology Officer at Webair Internet Development Inc., will focus on real world deployments of DDoS mitigation strategies in every layer of the network. He will give an overview of methods to prevent these attacks and best practices on how to provide protection in complex cloud platforms. He will also outline what we have found in our experience managing and running thousands of Linux and Unix managed service platforms and what specifically c...
May. 6, 2016 06:15 PM EDT Reads: 1,430
Much of the value of DevOps comes from a (renewed) focus on measurement, sharing, and continuous feedback loops. In increasingly complex DevOps workflows and environments, and especially in larger, regulated, or more crystallized organizations, these core concepts become even more critical. In his session at @DevOpsSummit at 18th Cloud Expo, Andi Mann, Chief Technology Advocate at Splunk, will show how, by focusing on 'metrics that matter,' you can provide objective, transparent, and meaningfu...
May. 6, 2016 06:00 PM EDT Reads: 1,261
trust and privacy in their ecosystem. Assurance and protection of device identity, secure data encryption and authentication are the key security challenges organizations are trying to address when integrating IoT devices. This holds true for IoT applications in a wide range of industries, for example, healthcare, consumer devices, and manufacturing. In his session at @ThingsExpo, Lancen LaChance, vice president of product management, IoT solutions at GlobalSign, will teach IoT developers how t...
May. 6, 2016 06:00 PM EDT Reads: 869
As enterprises around the world struggle with their digital transformation efforts, many are finding that innovative digital teams are moving much faster than their hidebound IT organizations. Rather than struggling to convince traditional IT to get with the digital program, executives are taking advice from IT research firm Gartner, and encouraging existing IT to continue in their desultory ways. However, many CIOs are realizing the dangers of following Gartner’s advice. The central challenge ...
May. 6, 2016 06:00 PM EDT Reads: 354
A critical component of any IoT project is the back-end systems that capture data from remote IoT devices and structure it in a way to answer useful questions. Traditional data warehouse and analytical systems are mature technologies that can be used to handle large data sets, but they are not well suited to many IoT-scale products and the need for real-time insights. At Fuze, we have developed a backend platform as part of our mobility-oriented cloud service that uses Big Data-based approache...
May. 6, 2016 05:30 PM EDT Reads: 843
The pace of innovation, vendor lock-in, production sustainability, cost-effectiveness, and managing risk… In his session at 18th Cloud Expo, Dan Choquette, Founder of RackN, will discuss how CIOs are challenged finding the balance of finding the right tools, technology and operational model that serves the business the best. He will discuss how clouds, open source software and infrastructure solutions have benefits but also drawbacks and how workload and operational portability between vendors...
May. 6, 2016 05:00 PM EDT Reads: 361
Cloud Object Storage is effectively infinitely scalable and boasts the lowest total costs. But cloud SLAs and T&Cs are traditionally optimized for huge customers like Netflix, so applications demanding better confidentiality or higher availability typically can’t reap the benefits of public cloud storage. In his session at 18th Cloud Expo, Don Martin, CTO of Security First Corp, will provide an overview of innovative technologies available today – secret sharing and information dispersal algori...
May. 6, 2016 05:00 PM EDT Reads: 375
We're entering the post-smartphone era, where wearable gadgets from watches and fitness bands to glasses and health aids will power the next technological revolution. With mass adoption of wearable devices comes a new data ecosystem that must be protected. Wearables open new pathways that facilitate the tracking, sharing and storing of consumers’ personal health, location and daily activity data. Consumers have some idea of the data these devices capture, but most don’t realize how revealing and...
May. 6, 2016 04:00 PM EDT Reads: 886
As the rapid adoption of containers continues, companies are finding that they lack the operational tools to understand the behavior of applications deployed in these containers, and how to identify issues in their application infrastructure. For example, how are multiple containers within an application impacting each other’s performance? If an application’s service is degraded, which container is to blame? In the case of an application outage, what was the root cause of the outage?
May. 6, 2016 04:00 PM EDT Reads: 1,214
When it comes to IoT in the enterprise, namely the commercial building and hospitality markets, a benefit not getting the attention it deserves is energy efficiency, and IoT's direct impact on a cleaner, greener environment when installed in smart buildings. Until now clean technology was offered piecemeal and led with point solutions that require significant systems integration to orchestrate and deploy. There didn't exist a 'top down' approach that can manage and monitor the way a Smart Buildi...
May. 6, 2016 03:15 PM EDT Reads: 304
Cloud-based NCLC (No-code/low code) application builder platforms empower everyone in the organization to quickly build applications and executable processes that broaden access, deepen collaboration, and enhance transparency for all team members. Line of business owners (LOBO) and operations managers know best their part of the business and their processes. IT departments are beginning to leverage NCLC platforms to empower and enable LOBOs to lead the innovation, transform the organization, an...
May. 6, 2016 03:00 PM EDT Reads: 350
Unless you don’t use the internet, don’t live in California, or haven’t been paying attention to the recent news… you should be aware that self-driving cars are on their way to becoming a reality. I have seen them – they are real. If you believe in the future reality of self-driving cars, then continue reading on. If you don’t believe in the future possibilities, then I am not sure what to do to convince you other than discuss the very real changes that will roll out with the consumer producti...
May. 6, 2016 02:15 PM EDT Reads: 921
There is an ever-growing explosion of new devices that are connected to the Internet using “cloud” solutions. This rapid growth is creating a massive new demand for efficient access to data. And it’s not just about connecting to that data anymore. This new demand is bringing new issues and challenges and it is important for companies to scale for the coming growth. And with that scaling comes the need for greater security, gathering and data analysis, storage, connectivity and, of course, the...
May. 6, 2016 01:45 PM EDT Reads: 1,379
The IETF draft standard for M2M certificates is a security solution specifically designed for the demanding needs of IoT/M2M applications. In his session at @ThingsExpo, Brian Romansky, VP of Strategic Technology at TrustPoint Innovation, will explain how M2M certificates can efficiently enable confidentiality, integrity, and authenticity on highly constrained devices.
May. 6, 2016 01:00 PM EDT Reads: 1,424