|By Business Wire||
|March 5, 2013 11:05 AM EST||
Lexington Technology Group, Inc., an intellectual property management firm that has announced plans to merge with Document Security Systems, Inc. (NYSE MKT: DSS) pursuant to a pending merger transaction anticipated to close in the second quarter of 2013, announced today that it has made a strategic investment in VirtualAgility, Inc., a developer of user-friendly programming platforms that facilitate the creation of sophisticated business applications without programming or coding.
“LTG’s investment in VirtualAgility reflects our commitment to supporting operating businesses that hold strong IP rights,” said Jeff Ronaldi, CEO of Lexington Technology Group. “The stake complements our acquisition of Bascom Research, LLC in 2012, and it will be relevant to DSS, particularly to its AuthentiGuard® product line, which will benefit from the VirtualAgility’ collaborative development tools.”
The investment provides LTG with a minority stake in VirtualAgility, and the potential opportunity to expand its ownership in VirtualAgility over time, under DSS’s umbrella, once the proposed merger is completed. The VirtualAgility investment provides LTG with the opportunity to participate in VirtualAgility’s future growth and performance, including its pending patent litigation recently filed in the U.S. Federal District Court, Eastern District of Texas, VirtualAgility v. Salesforce.com et al., Civil Action No.2 , 2:13-CV-00011. VirtualAgility’s leading edge inventions are protected by five issued U.S. patents and multiple trade secrets. The company also has several additional patents pending on innovative systems and methodologies.
“VirtualAgility is delighted to be able to avail itself of a value-added investor like Lexington Technology Group that also can provide significant operating experience,” said Stuart Rudolph, President and CEO of VirtualAgility. “We are looking forward to the prospect of helping DSS expand its leadership in authentication and anti-counterfeit solutions as well as continue to grow VirtualAgility.”
About Lexington Technology Group
Lexington Technology Group, Inc. is an intellectual property management firm that invests business experience, legal expertise and capital to monetize pioneering inventions. LTG’s goal is to identify and capitalize on opportunities for return, while rewarding highly qualified innovators. The firm typically engages with companies that have identified important innovations but that may lack the experience, relationships or capital to succeed on their own, and have not been fairly rewarded in the marketplace. LTG’s initiatives contribute to an intellectual property market that enables innovators to benefit from their discoveries and investors to profit from prudent risk. LTG’s management team is comprised of experienced patent managers and strategists that have collectively generated over $1 billion licenses, settlements and damages awards to date. www.lex-tg.com
VirtualAgility, Inc. provides a user-configurable platform that allows persons who are not specialists in information technology (IT) to create sophisticated, integrated applications easily and efficiently. VirtualAgility’s intuitive and cost-efficient development and deployment system for processing information and supporting management of collaborative activities is protected under patents and trade secrets. www.VirtualAgility.com
Document Security Systems, Inc. (NYSE MKT: DSS) develops and provides patented anti-counterfeiting, anti-fraud, authentication and brand protection technologies that are employed by governments, leading corporations and financial institutions. DSS works closely with clients, including Fortune 500 companies, to design proprietary technology solutions that deter unauthorized scanning and copying, and facilitate authentication of printed documents and packaging. DSS product solutions are protected under United States and foreign patent law and under trade secrets. www.DSSsecure.com
Important Additional Information Will Be Filed with the SEC
This communication does not constitute an offer to sell or the solicitation of an offer to buy any securities of DSS, or Lexington or the solicitation of any vote or approval. In connection with the proposed transaction, DSS has filed with the SEC a Registration Statement on Form S-4 containing a preliminary proxy statement/prospectus. The preliminary proxy statement/prospectus contains important information about DSS, Merger Sub, Lexington, the transaction contemplated by the Merger Agreement and related matters. DSS will mail or otherwise deliver the proxy statement/prospectus to its stockholders once it is final. Prospective investors and security holders of DSS and Lexington are urged to read carefully the proxy statement/prospectus relating to the Merger (including any amendments or supplements thereto) in its entirety when it is available, because it will contain important information about the proposed transaction.
Prospective investors and security holders of DSS will be able to obtain free copies of the proxy statement/prospectus for the proposed Merger (when it is available) and other documents filed with the SEC by DSS through the website maintained by the SEC at www.sec.gov. In addition, Prospective investors and security holders of DSS and Lexington will be able to obtain free copies of the proxy statement/prospectus for the proposed Merger (when it is available) by contacting Document Security Systems, Inc., Attn.: Philip Jones, Chief Financial Officer, at First Federal Plaza, 28 East Main Street, Suite 1525, Rochester, New York 14614, or by e-mail at [email protected]. Prospective investors and security holders of Lexington will also be able to obtain free copies of the proxy statement/prospectus for the Merger (when it is available) by contacting Lexington Technology Group, Inc., Attn.: Jennifer Buckley, 375 Park Avenue 26th Floor, New York, NY 10152, or by e-mail at [email protected].
DSS and Lexington, and their respective directors and certain of their executive officers, may be deemed to be participants in the solicitation of proxies in respect of the transactions contemplated by the agreement between DSS, Merger Sub and Lexington. Information regarding DSS’s directors and executive officers is contained in DSS’s Definitive Proxy Statement on Schedule 14A prepared in connection with its 2012 Annual Meeting of Stockholders, which was filed with the SEC on April 18, 2012. Information regarding Lexington’s directors and officers and a more complete description of the interests of DSS’s directors and officers in the proposed transaction will be available in the final proxy statement/prospectus that will be filed by DSS with the SEC in connection with the proposed transaction.
Cautionary Note Regarding Forward-Looking Statements
Statements in this press release regarding the proposed transaction between DSS and Lexington Technology Group; the expected timetable for completing the transaction; the potential value created by the proposed Merger for DSS’s and Lexington Technology Group’s stockholders; the potential of the combined companies’ technology platform; our respective or combined ability to raise capital to fund our combined operations and business plan; the continued listing of DSS's or the combined company’s securities on the NYSE MKT; market acceptance of DSS products and services; our collective ability to maintain or protect our intellectual property rights through litigation or otherwise; Lexington Technology Group’s limited operating history, competition from other industry competitors with greater market presence and financial resources than those of DSS’s; our ability to license and monetize the patents owned by Lexington Technology Group; potential new legislation or regulation related to enforcing patents; the complexity and costly nature of acquiring patent or other intellectual property assets; the combined company’s management and board of directors; and any other statements about DSS’ or Lexington Technology Group’s management teams’ future expectations, beliefs, goals, plans or prospects constitute forward-looking statements within the meaning of the Private Securities Litigation Reform Act of 1995. Any statements that are not statements of historical fact (including statements containing the words "believes," "plans," "could," "anticipates," "expects," "estimates," "plans," "should," "target," "will," "would" and similar expressions) should also be considered to be forward-looking statements. There are a number of important factors that could cause actual results or events to differ materially from those indicated by such forward-looking statements, including: the risk that DSS and Lexington Technology Group may not be able to complete the proposed transaction; the inability to realize the potential value created by the proposed Merger for DSS’s and Lexington Technology Group’s stockholders; our respective or combined inability to raise capital to fund our combined operations and business plan; DSS’s or the combined company’s inability to maintain the listing of our securities on the NYSE MKT; the potential lack of market acceptance of DSS’s products and services; our collective inability to protect our intellectual property rights through litigation or otherwise; competition from other industry competitors with greater market presence and financial resources than those of DSS’s; our inability to license and monetize the patents owned by Lexington Technology Group; and other risks and uncertainties more fully described in DSS’s Annual Report on Form 10-K for the year ended December 31, 2011 and its Quarterly Reports on Form 10-Q for the quarters ended March 31, 2012, June 30, 2012, and September 30, 2012, each as filed with the SEC, as well as the other filings that DSS makes with the SEC. Investors and stockholders are also urged to read the risk factors set forth in the proxy statement/prospectus carefully when they are available.
President Obama recently announced the launch of a new national awareness campaign to "encourage more Americans to move beyond passwords – adding an extra layer of security like a fingerprint or codes sent to your cellphone." The shift from single passwords to multi-factor authentication couldn’t be timelier or more strategic. This session will focus on why passwords alone are no longer effective, and why the time to act is now. In his session at 19th Cloud Expo, Chris Webber, security strateg...
Oct. 28, 2016 12:02 PM EDT
In past @ThingsExpo presentations, Joseph di Paolantonio has explored how various Internet of Things (IoT) and data management and analytics (DMA) solution spaces will come together as sensor analytics ecosystems. This year, in his session at @ThingsExpo, Joseph di Paolantonio from DataArchon, will be adding the numerous Transportation areas, from autonomous vehicles to “Uber for containers.” While IoT data in any one area of Transportation will have a huge impact in that area, combining sensor...
Oct. 28, 2016 12:00 PM EDT Reads: 1,227
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, will discuss how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team a...
Oct. 28, 2016 12:00 PM EDT Reads: 933
SYS-CON Events announced today that Tintri Inc., a leading producer of VM-aware storage (VAS) for virtualization and cloud environments, will present at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Tintri VM-aware storage is the simplest for virtualized applications and cloud. Organizations including GE, Toyota, United Healthcare, NASA and 6 of the Fortune 15 have said “No to LUNs.” With Tintri they manag...
Oct. 28, 2016 12:00 PM EDT Reads: 3,685
As companies adopt the cloud-to-streamline workflow, deployment hasn’t been very seamless because of IT concerns surrounding security risks. The cloud offers many benefits, but protecting and securing information can be tricky across multiple cloud providers and remains IT’s overall responsibility. In his session at 19th Cloud Expo, Simon Bain, CEO of SearchYourCloud, will address security compliance issues associated with cloud applications and how document-level encryption is critical for sup...
Oct. 28, 2016 12:00 PM EDT Reads: 425
DevOps is speeding towards the IT world like a freight train and the hype around it is deafening. There is no reason to be afraid of this change as it is the natural reaction to the agile movement that revolutionized development just a few years ago. By definition, DevOps is the natural alignment of IT performance to business profitability. The relevance of this has yet to be quantified but it has been suggested that the route to the CEO’s chair will come from the IT leaders that successfully ma...
Oct. 28, 2016 11:45 AM EDT Reads: 16,667
Join IBM November 2 at 19th Cloud Expo at the Santa Clara Convention Center in Santa Clara, CA, and learn how to go beyond multi-speed it to bring agility to traditional enterprise applications. Technology innovation is the driving force behind modern business and enterprises must respond by increasing the speed and efficiency of software delivery. The challenge is that existing enterprise applications are expensive to develop and difficult to modernize. This often results in what Gartner calls...
Oct. 28, 2016 11:30 AM EDT Reads: 203
We are always online. We access our data, our finances, work, and various services on the Internet. But we live in a congested world of information in which the roads were built two decades ago. The quest for better, faster Internet routing has been around for a decade, but nobody solved this problem. We’ve seen band aid approaches like CDNs that attack a niche's slice of static content part of the Internet, but that’s it. It does not address the dynamic services-based Internet of today. It doe...
Oct. 28, 2016 11:30 AM EDT Reads: 2,107
Although it has gained significant traction in the consumer space, IoT is still in the early stages of adoption in enterprises environments. However, many companies are working on initiatives like Industry 4.0 that includes IoT as one of the key disruptive technologies expected to reshape businesses of tomorrow. The key challenges will be availability, robustness and reliability of networks that connect devices in a business environment. Software Defined Wide Area Network (SD-WAN) is expected to...
Oct. 28, 2016 11:00 AM EDT Reads: 2,274
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...
Oct. 28, 2016 11:00 AM EDT Reads: 360
Bert Loomis was a visionary. This general session will highlight how Bert Loomis and people like him inspire us to build great things with small inventions. In their general session at 19th Cloud Expo, Harold Hannon, Architect at IBM Bluemix, and Michael O'Neill, Strategic Business Development at Nvidia, will discuss the accelerating pace of AI development and how IBM Cloud and NVIDIA are partnering to bring AI capabilities to "every day," on-demand. They will also review two "free infrastruct...
Oct. 28, 2016 10:32 AM EDT Reads: 235
The Internet of Things (IoT), in all its myriad manifestations, has great potential. Much of that potential comes from the evolving data management and analytic (DMA) technologies and processes that allow us to gain insight from all of the IoT data that can be generated and gathered. This potential may never be met as those data sets are tied to specific industry verticals and single markets, with no clear way to use IoT data and sensor analytics to fulfill the hype being given the IoT today.
Oct. 28, 2016 10:30 AM EDT Reads: 2,957
@ThingsExpo has been named the Top 5 Most Influential M2M Brand by Onalytica in the ‘Machine to Machine: Top 100 Influencers and Brands.' Onalytica analyzed the online debate on M2M by looking at over 85,000 tweets to provide the most influential individuals and brands that drive the discussion. According to Onalytica the "analysis showed a very engaged community with a lot of interactive tweets. The M2M discussion seems to be more fragmented and driven by some of the major brands present in the...
Oct. 28, 2016 09:15 AM EDT Reads: 11,630
Fact: storage performance problems have only gotten more complicated, as applications not only have become largely virtualized, but also have moved to cloud-based infrastructures. Storage performance in virtualized environments isn’t just about IOPS anymore. Instead, you need to guarantee performance for individual VMs, helping applications maintain performance as the number of VMs continues to go up in real time. In his session at Cloud Expo, Dhiraj Sehgal, Product and Marketing at Tintri, wil...
Oct. 28, 2016 09:00 AM EDT Reads: 2,037
Enterprises have been using both Big Data and virtualization for years. Until recently, however, most enterprises have not combined the two. Big Data's demands for higher levels of performance, the ability to control quality-of-service (QoS), and the ability to adhere to SLAs have kept it on bare metal, apart from the modern data center cloud. With recent technology innovations, we've seen the advantages of bare metal erode to such a degree that the enhanced flexibility and reduced costs that cl...
Oct. 28, 2016 08:30 AM EDT Reads: 722