Welcome!

News Feed Item

CyrusOne Inc. Prices Initial Public Offering of Common Stock

Cincinnati Bell Inc. (NYSE:CBB) announced today that CyrusOne Inc., its wholly owned subsidiary that owns and operates Cincinnati Bell’s data center business, has priced the previously announced initial public offering of 16,500,000 shares of its common stock at a price to the public of $19.00 per share. All of the shares of common stock are being offered by CyrusOne. The underwriters have been granted an option to purchase up to 2,475,000 additional shares of common stock from CyrusOne at the initial public offering price, less underwriting discounts and commissions. CyrusOne’s common stock has been approved for listing on the NASDAQ Global Select Market under the symbol “CONE,” subject to official notice of issuance.

Upon completion of this offering, Cincinnati Bell expects to effectively own approximately 72% of CyrusOne through its interests in the outstanding shares of common stock of CyrusOne and its interests in the common units of limited partnership interest of CyrusOne’s operating partnership, CyrusOne LP, which are exchangeable into shares of common stock of CyrusOne.

Morgan Stanley, BofA Merrill Lynch, Deutsche Bank Securities and Barclays are acting as joint-bookrunners for the offering. Citigroup, KeyBanc Capital Markets, RBS and UBS Investment Bank are acting as co-managers.

A registration statement relating to these securities has been declared effective by the SEC. The offering will be made only by means of a prospectus. A copy of the final prospectus relating to these securities will be filed with the SEC and may be obtained, when available, by contacting Morgan Stanley & Co. LLC, Attention: Prospectus Department, 180 Varick Street, 2nd Floor, New York, New York 10014, by telephone at +1 (866) 718-1649 or by email at [email protected]; BofA Merrill Lynch, Attention: Prospectus Department, 222 Broadway, New York, New York 10038 or by email at [email protected]; Deutsche Bank Securities Inc., Attention: Prospectus Group, 60 Wall Street, New York, New York 10005-2836, by telephone at +1 (800) 503-4611 or by email at [email protected]; or Barclays, c/o Broadridge Financial Solutions, 1155 Long Island Avenue, Edgewood, New York 11717, by telephone at +1 (888) 603-5847 or by email at [email protected].

This news release shall not constitute an offer to sell, or the solicitation of an offer to buy, these securities, nor shall there be any sale of these securities in any state or jurisdiction in which such offer, solicitation or sale would be unlawful prior to registration or qualification under the securities laws of any such state or jurisdiction.

Forward-Looking Statements
This release contains forward-looking statements regarding future events and our future results that are subject to the “safe harbor” provisions of the Private Securities Litigation Reform Act of 1995. All statements, other than statements of historical facts, are statements that could be deemed forward-looking statements. These statements are based on current expectations, estimates, forecasts, and projections about the industries in which we operate and the beliefs and assumptions of our management. Words such as “expects,” “anticipates,” “predicts,” “projects,” “intends,” “plans,” “believes,” “seeks,” “estimates,” “continues,” “endeavors,” “strives,” “may,” variations of such words and similar expressions are intended to identify such forward-looking statements. In addition, any statements that refer to projections of our future financial performance, our anticipated growth and trends in our businesses, and other characterizations of future events or circumstances are forward-looking statements. Readers are cautioned these forward-looking statements are based on current expectations and assumptions that are subject to risks and uncertainties, which could cause our actual results to differ materially and adversely from those reflected in the forward-looking statements. Factors that could cause or contribute to such differences include, but are not limited to, those discussed in this release and those discussed in other documents we file with the SEC. More information on potential risks and uncertainties is available in our recent filings with the SEC, including Cincinnati Bell’s Form 10-K report, Form 10-Q reports and Form 8-K reports. Actual results may differ materially and adversely from those expressed in any forward-looking statements. We undertake no obligation to revise or update any forward-looking statements for any reason.

About Cincinnati Bell Inc.
With headquarters in Cincinnati, Ohio, Cincinnati Bell Inc. (NYSE:CBB) provides integrated communications solutions – including local, long distance, data, Internet, entertainment and wireless services – that keep residential and business customers in Greater Cincinnati and Dayton connected with each other and with the world. In addition, Cincinnati Bell provides best-in-class data center colocation services to its enterprise customers through its facilities with fully redundant power and cooling solutions that are currently located in the Midwest, Texas, London and Singapore. Complementing the colocation products, Cincinnati Bell also offers complex information technology solutions like managed services and technology staffing.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
There will be new vendors providing applications, middleware, and connected devices to support the thriving IoT ecosystem. This essentially means that electronic device manufacturers will also be in the software business. Many will be new to building embedded software or robust software. This creates an increased importance on software quality, particularly within the Industrial Internet of Things where business-critical applications are becoming dependent on products controlled by software. Qua...
Continuous testing helps bridge the gap between developing quickly and maintaining high quality products. But to implement continuous testing, CTOs must take a strategic approach to building a testing infrastructure and toolset that empowers their team to move fast. Download our guide to laying the groundwork for a scalable continuous testing strategy.
As companies gain momentum, the need to maintain high quality products can outstrip their development team’s bandwidth for QA. Building out a large QA team (whether in-house or outsourced) can slow down development and significantly increases costs. This eBook takes QA profiles from 5 companies who successfully scaled up production without building a large QA team and includes: What to consider when choosing CI/CD tools How culture and communication can make or break implementation
SYS-CON Events has announced today that Roger Strukhoff has been named conference chair of Cloud Expo and @ThingsExpo 2016 Silicon Valley. The 19th Cloud Expo and 6th @ThingsExpo will take place on November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. "The Internet of Things brings trillions of dollars of opportunity to developers and enterprise IT, no matter how you measure it," stated Roger Strukhoff. "More importantly, it leverages the power of devices and the Interne...
"We formed Formation several years ago to really address the need for bring complete modernization and software-defined storage to the more classic private cloud marketplace," stated Mark Lewis, Chairman and CEO of Formation Data Systems, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Machine Learning helps make complex systems more efficient. By applying advanced Machine Learning techniques such as Cognitive Fingerprinting, wind project operators can utilize these tools to learn from collected data, detect regular patterns, and optimize their own operations. In his session at 18th Cloud Expo, Stuart Gillen, Director of Business Development at SparkCognition, discussed how research has demonstrated the value of Machine Learning in delivering next generation analytics to imp...
Most organizations prioritize data security only after their data has already been compromised. Proactive prevention is important, but how can you accomplish that on a small budget? Learn how the cloud, combined with a defense and in-depth approach, creates efficiencies by transferring and assigning risk. Security requires a multi-defense approach, and an in-house team may only be able to cherry pick from the essential components. In his session at 19th Cloud Expo, Vlad Friedman, CEO/Founder o...
Organizations planning enterprise data center consolidation and modernization projects are faced with a challenging, costly reality. Requirements to deploy modern, cloud-native applications simultaneously with traditional client/server applications are almost impossible to achieve with hardware-centric enterprise infrastructure. Compute and network infrastructure are fast moving down a software-defined path, but storage has been a laggard. Until now.
"We host and fully manage cloud data services, whether we store, the data, move the data, or run analytics on the data," stated Kamal Shannak, Senior Development Manager, Cloud Data Services, IBM, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
With over 720 million Internet users and 40–50% CAGR, the Chinese Cloud Computing market has been booming. When talking about cloud computing, what are the Chinese users of cloud thinking about? What is the most powerful force that can push them to make the buying decision? How to tap into them? In his session at 18th Cloud Expo, Yu Hao, CEO and co-founder of SpeedyCloud, answered these questions and discussed the results of SpeedyCloud’s survey.
In addition to all the benefits, IoT is also bringing new kind of customer experience challenges - cars that unlock themselves, thermostats turning houses into saunas and baby video monitors broadcasting over the internet. This list can only increase because while IoT services should be intuitive and simple to use, the delivery ecosystem is a myriad of potential problems as IoT explodes complexity. So finding a performance issue is like finding the proverbial needle in the haystack.
With the proliferation of both SQL and NoSQL databases, organizations can now target specific fit-for-purpose database tools for their different application needs regarding scalability, ease of use, ACID support, etc. Platform as a Service offerings make this even easier now, enabling developers to roll out their own database infrastructure in minutes with minimal management overhead. However, this same amount of flexibility also comes with the challenges of picking the right tool, on the right ...
The Internet of Things will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform. In his session at @ThingsExpo, Craig Sproule, CEO of Metavine, demonstrated how to move beyond today's coding paradigm and shared the must-have mindsets for removing complexity from the develo...
SYS-CON Events announced today that MangoApps will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. MangoApps provides modern company intranets and team collaboration software, allowing workers to stay connected and productive from anywhere in the world and from any device.
The IETF draft standard for M2M certificates is a security solution specifically designed for the demanding needs of IoT/M2M applications. In his session at @ThingsExpo, Brian Romansky, VP of Strategic Technology at TrustPoint Innovation, explained how M2M certificates can efficiently enable confidentiality, integrity, and authenticity on highly constrained devices.