|By Business Wire||
|March 5, 2013 11:05 AM EST||
Lexington Technology Group, Inc., an intellectual property management firm that has announced plans to merge with Document Security Systems, Inc. (NYSE MKT: DSS) pursuant to a pending merger transaction anticipated to close in the second quarter of 2013, announced today that it has made a strategic investment in VirtualAgility, Inc., a developer of user-friendly programming platforms that facilitate the creation of sophisticated business applications without programming or coding.
“LTG’s investment in VirtualAgility reflects our commitment to supporting operating businesses that hold strong IP rights,” said Jeff Ronaldi, CEO of Lexington Technology Group. “The stake complements our acquisition of Bascom Research, LLC in 2012, and it will be relevant to DSS, particularly to its AuthentiGuard® product line, which will benefit from the VirtualAgility’ collaborative development tools.”
The investment provides LTG with a minority stake in VirtualAgility, and the potential opportunity to expand its ownership in VirtualAgility over time, under DSS’s umbrella, once the proposed merger is completed. The VirtualAgility investment provides LTG with the opportunity to participate in VirtualAgility’s future growth and performance, including its pending patent litigation recently filed in the U.S. Federal District Court, Eastern District of Texas, VirtualAgility v. Salesforce.com et al., Civil Action No.2 , 2:13-CV-00011. VirtualAgility’s leading edge inventions are protected by five issued U.S. patents and multiple trade secrets. The company also has several additional patents pending on innovative systems and methodologies.
“VirtualAgility is delighted to be able to avail itself of a value-added investor like Lexington Technology Group that also can provide significant operating experience,” said Stuart Rudolph, President and CEO of VirtualAgility. “We are looking forward to the prospect of helping DSS expand its leadership in authentication and anti-counterfeit solutions as well as continue to grow VirtualAgility.”
About Lexington Technology Group
Lexington Technology Group, Inc. is an intellectual property management firm that invests business experience, legal expertise and capital to monetize pioneering inventions. LTG’s goal is to identify and capitalize on opportunities for return, while rewarding highly qualified innovators. The firm typically engages with companies that have identified important innovations but that may lack the experience, relationships or capital to succeed on their own, and have not been fairly rewarded in the marketplace. LTG’s initiatives contribute to an intellectual property market that enables innovators to benefit from their discoveries and investors to profit from prudent risk. LTG’s management team is comprised of experienced patent managers and strategists that have collectively generated over $1 billion licenses, settlements and damages awards to date. www.lex-tg.com
VirtualAgility, Inc. provides a user-configurable platform that allows persons who are not specialists in information technology (IT) to create sophisticated, integrated applications easily and efficiently. VirtualAgility’s intuitive and cost-efficient development and deployment system for processing information and supporting management of collaborative activities is protected under patents and trade secrets. www.VirtualAgility.com
Document Security Systems, Inc. (NYSE MKT: DSS) develops and provides patented anti-counterfeiting, anti-fraud, authentication and brand protection technologies that are employed by governments, leading corporations and financial institutions. DSS works closely with clients, including Fortune 500 companies, to design proprietary technology solutions that deter unauthorized scanning and copying, and facilitate authentication of printed documents and packaging. DSS product solutions are protected under United States and foreign patent law and under trade secrets. www.DSSsecure.com
Important Additional Information Will Be Filed with the SEC
This communication does not constitute an offer to sell or the solicitation of an offer to buy any securities of DSS, or Lexington or the solicitation of any vote or approval. In connection with the proposed transaction, DSS has filed with the SEC a Registration Statement on Form S-4 containing a preliminary proxy statement/prospectus. The preliminary proxy statement/prospectus contains important information about DSS, Merger Sub, Lexington, the transaction contemplated by the Merger Agreement and related matters. DSS will mail or otherwise deliver the proxy statement/prospectus to its stockholders once it is final. Prospective investors and security holders of DSS and Lexington are urged to read carefully the proxy statement/prospectus relating to the Merger (including any amendments or supplements thereto) in its entirety when it is available, because it will contain important information about the proposed transaction.
Prospective investors and security holders of DSS will be able to obtain free copies of the proxy statement/prospectus for the proposed Merger (when it is available) and other documents filed with the SEC by DSS through the website maintained by the SEC at www.sec.gov. In addition, Prospective investors and security holders of DSS and Lexington will be able to obtain free copies of the proxy statement/prospectus for the proposed Merger (when it is available) by contacting Document Security Systems, Inc., Attn.: Philip Jones, Chief Financial Officer, at First Federal Plaza, 28 East Main Street, Suite 1525, Rochester, New York 14614, or by e-mail at [email protected]. Prospective investors and security holders of Lexington will also be able to obtain free copies of the proxy statement/prospectus for the Merger (when it is available) by contacting Lexington Technology Group, Inc., Attn.: Jennifer Buckley, 375 Park Avenue 26th Floor, New York, NY 10152, or by e-mail at [email protected].
DSS and Lexington, and their respective directors and certain of their executive officers, may be deemed to be participants in the solicitation of proxies in respect of the transactions contemplated by the agreement between DSS, Merger Sub and Lexington. Information regarding DSS’s directors and executive officers is contained in DSS’s Definitive Proxy Statement on Schedule 14A prepared in connection with its 2012 Annual Meeting of Stockholders, which was filed with the SEC on April 18, 2012. Information regarding Lexington’s directors and officers and a more complete description of the interests of DSS’s directors and officers in the proposed transaction will be available in the final proxy statement/prospectus that will be filed by DSS with the SEC in connection with the proposed transaction.
Cautionary Note Regarding Forward-Looking Statements
Statements in this press release regarding the proposed transaction between DSS and Lexington Technology Group; the expected timetable for completing the transaction; the potential value created by the proposed Merger for DSS’s and Lexington Technology Group’s stockholders; the potential of the combined companies’ technology platform; our respective or combined ability to raise capital to fund our combined operations and business plan; the continued listing of DSS's or the combined company’s securities on the NYSE MKT; market acceptance of DSS products and services; our collective ability to maintain or protect our intellectual property rights through litigation or otherwise; Lexington Technology Group’s limited operating history, competition from other industry competitors with greater market presence and financial resources than those of DSS’s; our ability to license and monetize the patents owned by Lexington Technology Group; potential new legislation or regulation related to enforcing patents; the complexity and costly nature of acquiring patent or other intellectual property assets; the combined company’s management and board of directors; and any other statements about DSS’ or Lexington Technology Group’s management teams’ future expectations, beliefs, goals, plans or prospects constitute forward-looking statements within the meaning of the Private Securities Litigation Reform Act of 1995. Any statements that are not statements of historical fact (including statements containing the words "believes," "plans," "could," "anticipates," "expects," "estimates," "plans," "should," "target," "will," "would" and similar expressions) should also be considered to be forward-looking statements. There are a number of important factors that could cause actual results or events to differ materially from those indicated by such forward-looking statements, including: the risk that DSS and Lexington Technology Group may not be able to complete the proposed transaction; the inability to realize the potential value created by the proposed Merger for DSS’s and Lexington Technology Group’s stockholders; our respective or combined inability to raise capital to fund our combined operations and business plan; DSS’s or the combined company’s inability to maintain the listing of our securities on the NYSE MKT; the potential lack of market acceptance of DSS’s products and services; our collective inability to protect our intellectual property rights through litigation or otherwise; competition from other industry competitors with greater market presence and financial resources than those of DSS’s; our inability to license and monetize the patents owned by Lexington Technology Group; and other risks and uncertainties more fully described in DSS’s Annual Report on Form 10-K for the year ended December 31, 2011 and its Quarterly Reports on Form 10-Q for the quarters ended March 31, 2012, June 30, 2012, and September 30, 2012, each as filed with the SEC, as well as the other filings that DSS makes with the SEC. Investors and stockholders are also urged to read the risk factors set forth in the proxy statement/prospectus carefully when they are available.
In today's enterprise, digital transformation represents organizational change even more so than technology change, as customer preferences and behavior drive end-to-end transformation across lines of business as well as IT. To capitalize on the ubiquitous disruption driving this transformation, companies must be able to innovate at an increasingly rapid pace. Traditional approaches for driving innovation are now woefully inadequate for keeping up with the breadth of disruption and change facin...
Nov. 27, 2015 01:30 AM EST Reads: 446
The cloud. Like a comic book superhero, there seems to be no problem it can’t fix or cost it can’t slash. Yet making the transition is not always easy and production environments are still largely on premise. Taking some practical and sensible steps to reduce risk can also help provide a basis for a successful cloud transition. A plethora of surveys from the likes of IDG and Gartner show that more than 70 percent of enterprises have deployed at least one or more cloud application or workload. Y...
Nov. 27, 2015 01:00 AM EST Reads: 452
PubNub has announced the release of BLOCKS, a set of customizable microservices that give developers a simple way to add code and deploy features for realtime apps.PubNub BLOCKS executes business logic directly on the data streaming through PubNub’s network without splitting it off to an intermediary server controlled by the customer. This revolutionary approach streamlines app development, reduces endpoint-to-endpoint latency, and allows apps to better leverage the enormous scalability of PubNu...
Nov. 27, 2015 01:00 AM EST Reads: 298
Microservices are a very exciting architectural approach that many organizations are looking to as a way to accelerate innovation. Microservices promise to allow teams to move away from monolithic "ball of mud" systems, but the reality is that, in the vast majority of organizations, different projects and technologies will continue to be developed at different speeds. How to handle the dependencies between these disparate systems with different iteration cycles? Consider the "canoncial problem"...
Nov. 27, 2015 01:00 AM EST Reads: 418
Growth hacking is common for startups to make unheard-of progress in building their business. Career Hacks can help Geek Girls and those who support them (yes, that's you too, Dad!) to excel in this typically male-dominated world. Get ready to learn the facts: Is there a bias against women in the tech / developer communities? Why are women 50% of the workforce, but hold only 24% of the STEM or IT positions? Some beginnings of what to do about it! In her Day 2 Keynote at 17th Cloud Expo, San...
Nov. 27, 2015 01:00 AM EST Reads: 544
Apps and devices shouldn't stop working when there's limited or no network connectivity. Learn how to bring data stored in a cloud database to the edge of the network (and back again) whenever an Internet connection is available. In his session at 17th Cloud Expo, Ben Perlmutter, a Sales Engineer with IBM Cloudant, demonstrated techniques for replicating cloud databases with devices in order to build offline-first mobile or Internet of Things (IoT) apps that can provide a better, faster user e...
Nov. 27, 2015 12:45 AM EST Reads: 392
Container technology is shaping the future of DevOps and it’s also changing the way organizations think about application development. With the rise of mobile applications in the enterprise, businesses are abandoning year-long development cycles and embracing technologies that enable rapid development and continuous deployment of apps. In his session at DevOps Summit, Kurt Collins, Developer Evangelist at Built.io, examined how Docker has evolved into a highly effective tool for application del...
Nov. 27, 2015 12:00 AM EST Reads: 332
I recently attended and was a speaker at the 4th International Internet of @ThingsExpo at the Santa Clara Convention Center. I also had the opportunity to attend this event last year and I wrote a blog from that show talking about how the “Enterprise Impact of IoT” was a key theme of last year’s show. I was curious to see if the same theme would still resonate 365 days later and what, if any, changes I would see in the content presented.
Nov. 26, 2015 10:00 PM EST Reads: 392
Cloud computing delivers on-demand resources that provide businesses with flexibility and cost-savings. The challenge in moving workloads to the cloud has been the cost and complexity of ensuring the initial and ongoing security and regulatory (PCI, HIPAA, FFIEC) compliance across private and public clouds. Manual security compliance is slow, prone to human error, and represents over 50% of the cost of managing cloud applications. Determining how to automate cloud security compliance is critical...
Nov. 26, 2015 04:00 PM EST Reads: 382
Internet of @ThingsExpo, taking place June 7-9, 2016 at Javits Center, New York City and Nov 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with the 18th International @CloudExpo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world and ThingsExpo New York Call for Papers is now open.
Nov. 26, 2015 03:30 PM EST Reads: 525
With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo 2016 in New York and Silicon Valley. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be! Internet of @ThingsExpo, taking place Nov 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 17th Cloud Expo and will feature technical sessions from a rock star conference faculty ...
Nov. 26, 2015 03:15 PM EST Reads: 521
We are rapidly moving to a brave new world of interconnected smart homes, cars, offices and factories known as the Internet of Things (IoT). Sensors and monitoring devices will touch every part of our lives. Let's take a closer look at the Internet of Things. The Internet of Things is a worldwide network of objects and devices connected to the Internet. They are electronics, sensors, software and more. These objects connect to the Internet and can be controlled remotely via apps and programs. ...
Nov. 26, 2015 02:15 PM EST Reads: 499
Today air travel is a minefield of delays, hassles and customer disappointment. Airlines struggle to revitalize the experience. GE and M2Mi will demonstrate practical examples of how IoT solutions are helping airlines bring back personalization, reduce trip time and improve reliability. In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect with GE, and Dr. Sarah Cooper, M2Mi’s VP Business Development and Engineering, explored the IoT cloud-based platform technologies driving t...
Nov. 26, 2015 01:00 PM EST Reads: 392
SYS-CON Events announced today that Alert Logic, Inc., the leading provider of Security-as-a-Service solutions for the cloud, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. Alert Logic, Inc., provides Security-as-a-Service for on-premises, cloud, and hybrid infrastructures, delivering deep security insight and continuous protection for customers at a lower cost than traditional security solutions. Ful...
Nov. 26, 2015 01:00 PM EST Reads: 291
We all know that data growth is exploding and storage budgets are shrinking. Instead of showing you charts on about how much data there is, in his General Session at 17th Cloud Expo, Scott Cleland, Senior Director of Product Marketing at HGST, showed how to capture all of your data in one place. After you have your data under control, you can then analyze it in one place, saving time and resources.
Nov. 26, 2015 12:00 PM EST Reads: 151