Welcome!

News Feed Item

Lexington Technology Group, Inc. Makes an Equity Investment in VirtualAgility, Inc., a Collaborative Applications Developer

Lexington Technology Group, Inc., an intellectual property management firm that has announced plans to merge with Document Security Systems, Inc. (NYSE MKT: DSS) pursuant to a pending merger transaction anticipated to close in the second quarter of 2013, announced today that it has made a strategic investment in VirtualAgility, Inc., a developer of user-friendly programming platforms that facilitate the creation of sophisticated business applications without programming or coding.

“LTG’s investment in VirtualAgility reflects our commitment to supporting operating businesses that hold strong IP rights,” said Jeff Ronaldi, CEO of Lexington Technology Group. “The stake complements our acquisition of Bascom Research, LLC in 2012, and it will be relevant to DSS, particularly to its AuthentiGuard® product line, which will benefit from the VirtualAgility’ collaborative development tools.”

The investment provides LTG with a minority stake in VirtualAgility, and the potential opportunity to expand its ownership in VirtualAgility over time, under DSS’s umbrella, once the proposed merger is completed. The VirtualAgility investment provides LTG with the opportunity to participate in VirtualAgility’s future growth and performance, including its pending patent litigation recently filed in the U.S. Federal District Court, Eastern District of Texas, VirtualAgility v. Salesforce.com et al., Civil Action No.2 , 2:13-CV-00011. VirtualAgility’s leading edge inventions are protected by five issued U.S. patents and multiple trade secrets. The company also has several additional patents pending on innovative systems and methodologies.

“VirtualAgility is delighted to be able to avail itself of a value-added investor like Lexington Technology Group that also can provide significant operating experience,” said Stuart Rudolph, President and CEO of VirtualAgility. “We are looking forward to the prospect of helping DSS expand its leadership in authentication and anti-counterfeit solutions as well as continue to grow VirtualAgility.”

About Lexington Technology Group

Lexington Technology Group, Inc. is an intellectual property management firm that invests business experience, legal expertise and capital to monetize pioneering inventions. LTG’s goal is to identify and capitalize on opportunities for return, while rewarding highly qualified innovators. The firm typically engages with companies that have identified important innovations but that may lack the experience, relationships or capital to succeed on their own, and have not been fairly rewarded in the marketplace. LTG’s initiatives contribute to an intellectual property market that enables innovators to benefit from their discoveries and investors to profit from prudent risk. LTG’s management team is comprised of experienced patent managers and strategists that have collectively generated over $1 billion licenses, settlements and damages awards to date. www.lex-tg.com

About VirtualAgility

VirtualAgility, Inc. provides a user-configurable platform that allows persons who are not specialists in information technology (IT) to create sophisticated, integrated applications easily and efficiently. VirtualAgility’s intuitive and cost-efficient development and deployment system for processing information and supporting management of collaborative activities is protected under patents and trade secrets. www.VirtualAgility.com

About DSS

Document Security Systems, Inc. (NYSE MKT: DSS) develops and provides patented anti-counterfeiting, anti-fraud, authentication and brand protection technologies that are employed by governments, leading corporations and financial institutions. DSS works closely with clients, including Fortune 500 companies, to design proprietary technology solutions that deter unauthorized scanning and copying, and facilitate authentication of printed documents and packaging. DSS product solutions are protected under United States and foreign patent law and under trade secrets. www.DSSsecure.com

Important Additional Information Will Be Filed with the SEC

This communication does not constitute an offer to sell or the solicitation of an offer to buy any securities of DSS, or Lexington or the solicitation of any vote or approval. In connection with the proposed transaction, DSS has filed with the SEC a Registration Statement on Form S-4 containing a preliminary proxy statement/prospectus. The preliminary proxy statement/prospectus contains important information about DSS, Merger Sub, Lexington, the transaction contemplated by the Merger Agreement and related matters. DSS will mail or otherwise deliver the proxy statement/prospectus to its stockholders once it is final. Prospective investors and security holders of DSS and Lexington are urged to read carefully the proxy statement/prospectus relating to the Merger (including any amendments or supplements thereto) in its entirety when it is available, because it will contain important information about the proposed transaction.

Prospective investors and security holders of DSS will be able to obtain free copies of the proxy statement/prospectus for the proposed Merger (when it is available) and other documents filed with the SEC by DSS through the website maintained by the SEC at www.sec.gov. In addition, Prospective investors and security holders of DSS and Lexington will be able to obtain free copies of the proxy statement/prospectus for the proposed Merger (when it is available) by contacting Document Security Systems, Inc., Attn.: Philip Jones, Chief Financial Officer, at First Federal Plaza, 28 East Main Street, Suite 1525, Rochester, New York 14614, or by e-mail at [email protected]. Prospective investors and security holders of Lexington will also be able to obtain free copies of the proxy statement/prospectus for the Merger (when it is available) by contacting Lexington Technology Group, Inc., Attn.: Jennifer Buckley, 375 Park Avenue 26th Floor, New York, NY 10152, or by e-mail at [email protected].

DSS and Lexington, and their respective directors and certain of their executive officers, may be deemed to be participants in the solicitation of proxies in respect of the transactions contemplated by the agreement between DSS, Merger Sub and Lexington. Information regarding DSS’s directors and executive officers is contained in DSS’s Definitive Proxy Statement on Schedule 14A prepared in connection with its 2012 Annual Meeting of Stockholders, which was filed with the SEC on April 18, 2012. Information regarding Lexington’s directors and officers and a more complete description of the interests of DSS’s directors and officers in the proposed transaction will be available in the final proxy statement/prospectus that will be filed by DSS with the SEC in connection with the proposed transaction.

Cautionary Note Regarding Forward-Looking Statements

Statements in this press release regarding the proposed transaction between DSS and Lexington Technology Group; the expected timetable for completing the transaction; the potential value created by the proposed Merger for DSS’s and Lexington Technology Group’s stockholders; the potential of the combined companies’ technology platform; our respective or combined ability to raise capital to fund our combined operations and business plan; the continued listing of DSS's or the combined company’s securities on the NYSE MKT; market acceptance of DSS products and services; our collective ability to maintain or protect our intellectual property rights through litigation or otherwise; Lexington Technology Group’s limited operating history, competition from other industry competitors with greater market presence and financial resources than those of DSS’s; our ability to license and monetize the patents owned by Lexington Technology Group; potential new legislation or regulation related to enforcing patents; the complexity and costly nature of acquiring patent or other intellectual property assets; the combined company’s management and board of directors; and any other statements about DSS’ or Lexington Technology Group’s management teams’ future expectations, beliefs, goals, plans or prospects constitute forward-looking statements within the meaning of the Private Securities Litigation Reform Act of 1995. Any statements that are not statements of historical fact (including statements containing the words "believes," "plans," "could," "anticipates," "expects," "estimates," "plans," "should," "target," "will," "would" and similar expressions) should also be considered to be forward-looking statements. There are a number of important factors that could cause actual results or events to differ materially from those indicated by such forward-looking statements, including: the risk that DSS and Lexington Technology Group may not be able to complete the proposed transaction; the inability to realize the potential value created by the proposed Merger for DSS’s and Lexington Technology Group’s stockholders; our respective or combined inability to raise capital to fund our combined operations and business plan; DSS’s or the combined company’s inability to maintain the listing of our securities on the NYSE MKT; the potential lack of market acceptance of DSS’s products and services; our collective inability to protect our intellectual property rights through litigation or otherwise; competition from other industry competitors with greater market presence and financial resources than those of DSS’s; our inability to license and monetize the patents owned by Lexington Technology Group; and other risks and uncertainties more fully described in DSS’s Annual Report on Form 10-K for the year ended December 31, 2011 and its Quarterly Reports on Form 10-Q for the quarters ended March 31, 2012, June 30, 2012, and September 30, 2012, each as filed with the SEC, as well as the other filings that DSS makes with the SEC. Investors and stockholders are also urged to read the risk factors set forth in the proxy statement/prospectus carefully when they are available.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Video experiences should be unique and exciting! But that doesn’t mean you need to patch all the pieces yourself. Users demand rich and engaging experiences and new ways to connect with you. But creating robust video applications at scale can be complicated, time-consuming and expensive. In his session at @ThingsExpo, Zohar Babin, Vice President of Platform, Ecosystem and Community at Kaltura, discussed how VPaaS enables you to move fast, creating scalable video experiences that reach your aud...
All clouds are not equal. To succeed in a DevOps context, organizations should plan to develop/deploy apps across a choice of on-premise and public clouds simultaneously depending on the business needs. This is where the concept of the Lean Cloud comes in - resting on the idea that you often need to relocate your app modules over their life cycles for both innovation and operational efficiency in the cloud. In his session at @DevOpsSummit at19th Cloud Expo, Valentin (Val) Bercovici, CTO of Soli...
"Once customers get a year into their IoT deployments, they start to realize that they may have been shortsighted in the ways they built out their deployment and the key thing I see a lot of people looking at is - how can I take equipment data, pull it back in an IoT solution and show it in a dashboard," stated Dave McCarthy, Director of Products at Bsquare Corporation, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
What happens when the different parts of a vehicle become smarter than the vehicle itself? As we move toward the era of smart everything, hundreds of entities in a vehicle that communicate with each other, the vehicle and external systems create a need for identity orchestration so that all entities work as a conglomerate. Much like an orchestra without a conductor, without the ability to secure, control, and connect the link between a vehicle’s head unit, devices, and systems and to manage the ...
An IoT product’s log files speak volumes about what’s happening with your products in the field, pinpointing current and potential issues, and enabling you to predict failures and save millions of dollars in inventory. But until recently, no one knew how to listen. In his session at @ThingsExpo, Dan Gettens, Chief Research Officer at OnProcess, discussed recent research by Massachusetts Institute of Technology and OnProcess Technology, where MIT created a new, breakthrough analytics model for ...
IoT is rapidly changing the way enterprises are using data to improve business decision-making. In order to derive business value, organizations must unlock insights from the data gathered and then act on these. In their session at @ThingsExpo, Eric Hoffman, Vice President at EastBanc Technologies, and Peter Shashkin, Head of Development Department at EastBanc Technologies, discussed how one organization leveraged IoT, cloud technology and data analysis to improve customer experiences and effici...
Everyone knows that truly innovative companies learn as they go along, pushing boundaries in response to market changes and demands. What's more of a mystery is how to balance innovation on a fresh platform built from scratch with the legacy tech stack, product suite and customers that continue to serve as the business' foundation. In his General Session at 19th Cloud Expo, Michael Chambliss, Head of Engineering at ReadyTalk, discussed why and how ReadyTalk diverted from healthy revenue and mor...
The 20th International Cloud Expo has announced that its Call for Papers is open. Cloud Expo, to be held June 6-8, 2017, at the Javits Center in New York City, brings together Cloud Computing, Big Data, Internet of Things, DevOps, Containers, Microservices and WebRTC to one location. With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding business opportunity. Submit your speaking proposal ...
In this strange new world where more and more power is drawn from business technology, companies are effectively straddling two paths on the road to innovation and transformation into digital enterprises. The first path is the heritage trail – with “legacy” technology forming the background. Here, extant technologies are transformed by core IT teams to provide more API-driven approaches. Legacy systems can restrict companies that are transitioning into digital enterprises. To truly become a lead...
"MathFreeOn.com is a line coding platform for engineers and scientists. When they want to solve an engineering problem and they have to use software - they have to pay a lot of money for licenses - but with MathFreeOn you don't have to pay a lot of money. Just go to our site and write the code and you can check the result right away," explained Simon Lee, CMO of MathFreeOn, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Cla...
You have great SaaS business app ideas. You want to turn your idea quickly into a functional and engaging proof of concept. You need to be able to modify it to meet customers' needs, and you need to deliver a complete and secure SaaS application. How could you achieve all the above and yet avoid unforeseen IT requirements that add unnecessary cost and complexity? You also want your app to be responsive in any device at any time. In his session at 19th Cloud Expo, Mark Allen, General Manager of...
The Internet of Things (IoT) promises to simplify and streamline our lives by automating routine tasks that distract us from our goals. This promise is based on the ubiquitous deployment of smart, connected devices that link everything from industrial control systems to automobiles to refrigerators. Unfortunately, comparatively few of the devices currently deployed have been developed with an eye toward security, and as the DDoS attacks of late October 2016 have demonstrated, this oversight can ...
In his session at 19th Cloud Expo, Claude Remillard, Principal Program Manager in Developer Division at Microsoft, contrasted how his team used config as code and immutable patterns for continuous delivery of microservices and apps to the cloud. He showed how the immutable patterns helps developers do away with most of the complexity of config as code-enabling scenarios such as rollback, zero downtime upgrades with far greater simplicity. He also demoed building immutable pipelines in the cloud ...
As data explodes in quantity, importance and from new sources, the need for managing and protecting data residing across physical, virtual, and cloud environments grow with it. Managing data includes protecting it, indexing and classifying it for true, long-term management, compliance and E-Discovery. Commvault can ensure this with a single pane of glass solution – whether in a private cloud, a Service Provider delivered public cloud or a hybrid cloud environment – across the heterogeneous enter...
Bert Loomis was a visionary. This general session will highlight how Bert Loomis and people like him inspire us to build great things with small inventions. In their general session at 19th Cloud Expo, Harold Hannon, Architect at IBM Bluemix, and Michael O'Neill, Strategic Business Development at Nvidia, discussed the accelerating pace of AI development and how IBM Cloud and NVIDIA are partnering to bring AI capabilities to "every day," on-demand. They also reviewed two "free infrastructure" pr...