|By PR Newswire||
|January 10, 2014 03:47 PM EST||
CALGARY, Jan. 10, 2014 /CNW/ - Caspian Energy Inc. (the "Corporation" or "Caspian") (NEX: CEK.H) is pleased to announce that it has reached agreement with the holders ("Holders") of its amended and restated secured convertible debentures each dated July 8, 2011 (the "Debentures") to amend the Debentures. The Conversion Price (as defined in the Debentures) will be amended to the price such that, if all outstanding Debentures are converted (the "Conversion"), the common shares (the "Common Shares") of the Corporation issued upon the Conversion would represent approximately eighty-two and one half percent (82.5%) of the issued and outstanding Common Shares. Caspian shareholders holding Common Shares immediately prior to the Conversion will hold the remaining approximately 17.5% of the Common Shares. Following the Conversion all debt owed to the Holders will have been paid. The deemed price of the Common Shares to be issued on the Conversion will be calculated at a discount from the closing price of the Common Shares on the NEX of $0.02 on January 9, 2014.
In addition, there will be a consolidation ("Consolidation") of the Common Shares on the basis of up to ten pre-Consolidation Common Shares for each post-Consolidation Common Share. The precise Consolidation ratio will be determined at the time of the shareholder meeting to be called to approve the Conversion and Consolidation.
The Conversion contemplated is subject to satisfaction to a number of conditions prior to February 20, 2014 including:
|(A) the approval by holders of a majority of the disinterested holders of the Common Shares voted in person or by proxy at the Meeting (as defined below) in respect of the completion of the Conversion (the "Conversion Approval");|
|(B) the approval by holders of two thirds of the Common Shares voting in person or by proxy at the Meeting, and the filing, of articles of amendment of the Corporation to give effect to, a consolidation of the Common Shares on the basis of up to ten for one (such basis to be determined by the Corporation at the time of the Meeting) (the "Consolidation Approval");|
|(C) the approval by the NEX board of the TSX Venture Exchange ("NEX") of the issuance of the Common Shares pursuant to the Conversion and related matters; and|
|(D) signed resignations and releases from at least two of the current directors of Caspian at the time of the Conversion. There is currently one vacancy on the Caspian board. The three vacancies will be filled by appointees of the Holders after implementation of the Conversion.|
Caspian and the Holders have also agreed to amend the terms of Caspian's previously announced extension agreement dated November 26, 2013 (the "Extension Agreement") with the Holders. Pursuant to the Extension Agreement, the Corporation was granted a remedial period providing it with further time to pay all amounts owing under the Debentures. Caspian and the Holders have agreed to execute a further extension agreement (the "Amended Extension Agreement") pursuant to which the Holders will agree to extend the remedial period to the earlier of (i) February 20, 2014 or (ii) the earlier of the following dates if they occur:
|(A) January 15, 2014, if Caspian fails to execute and deliver a formal amendment to the terms of the Debentures to provide for the Conversion;|
|(B) January 15, 2014, if Caspian fails to deliver to the Holders lock-up agreements executed by each of the Corporation's directors confirming that he/she shall vote his/her common shares in favour of the Conversion Approval and the Consolidation Approval at any shareholders' meeting convened to consider such matters (the "Lock-up Agreements"); and|
|(C) January 29, 2014, if Caspian fails to mail to the shareholders of the Corporation an information circular recommending the Conversion Approval and the Consolidation Approval and providing for a shareholders' meeting to consider and approve such matters (the "Meeting").|
A special meeting of shareholders of the Corporation has been called for February 19, 2014 to consider the Conversion Approval and Consolidation Approval The shareholder vote on the Conversion will be conducted excluding votes of interested shareholders. The Conversion and Consolidation are also subject to the approval of NEX.
This news release contains "forward-looking information" within the meaning of applicable Canadian securities legislation which we refer to herein, collectively, as "forward-looking information". Generally, forward-looking information can be identified by the use of forward-looking terminology such as "plans", "expects", or "does not expect", "is expected", "budget", "scheduled", "estimates", "forecasts", "intends", "anticipates", or "does not anticipate", or "believes" or variations of such words and phrases or state that certain actions, events or results "may", "could", "would", "might", or "will be taken", "occur", or "be achieved". Caspian's actual performance, developments and/or results may differ materially from any or all of the forward-looking statements. Further information which may cause results to differ materially from those projected in the forward-looking statements is contained in Caspian's filings with Canadian securities regulatory authorities. All material assumptions used in making forward-looking information are based on management's knowledge of current business conditions and expectations of future business conditions and trends Although Caspian believes the assumptions used to make such statements are reasonable at this time and has attempted to identify in its continuous disclosure documents important factors that could cause actual results to differ materially from those contained in forward-looking information, there may be other factors that cause results not to be as anticipated, estimated or intended, including the failure of the Corporation to obtain NEX and shareholder approval, and the ability of the Corporation to meet any of the criteria set forth in the Amended Extension Agreement or amendments to the Debentures. There can be no assurance that such information will prove to be accurate, as actual results and future events could differ materially from those anticipated in such information. Accordingly, readers should not place undue reliance on forward-looking information. The Corporation does not undertake to update any forward-looking information, except in accordance with applicable securities laws.
SOURCE Caspian Energy Inc.
SYS-CON Events announced today that SoftLayer, an IBM Company, has been named “Gold Sponsor” of SYS-CON's 18th Cloud Expo, which will take place on June 7-9, 2016, at the Javits Center in New York, New York. SoftLayer, an IBM Company, provides cloud infrastructure as a service from a growing number of data centers and network points of presence around the world. SoftLayer’s customers range from Web startups to global enterprises.
May. 5, 2016 05:00 PM EDT Reads: 1,262
Many private cloud projects were built to deliver self-service access to development and test resources. While those clouds delivered faster access to resources, they lacked visibility, control and security needed for production deployments. In their session at 18th Cloud Expo, Steve Anderson, Product Manager at BMC Software, and Rick Lefort, Principal Technical Marketing Consultant at BMC Software, will discuss how a cloud designed for production operations not only helps accelerate developer...
May. 5, 2016 05:00 PM EDT Reads: 1,355
A critical component of any IoT project is the back-end systems that capture data from remote IoT devices and structure it in a way to answer useful questions. Traditional data warehouse and analytical systems are mature technologies that can be used to handle large data sets, but they are not well suited to many IoT-scale products and the need for real-time insights. At Fuze, we have developed a backend platform as part of our mobility-oriented cloud service that uses Big Data-based approache...
May. 5, 2016 04:00 PM EDT Reads: 755
Peak 10, Inc., has announced the implementation of IT service management, a business process alignment initiative based on the widely adopted Information Technology Infrastructure Library (ITIL) framework. The implementation of IT service management enhances Peak 10’s current service-minded approach to IT delivery by propelling the company to deliver higher levels of personalized and prompt service. The majority of Peak 10’s operations employees have been trained and certified in the ITIL frame...
May. 5, 2016 04:00 PM EDT Reads: 1,177
trust and privacy in their ecosystem. Assurance and protection of device identity, secure data encryption and authentication are the key security challenges organizations are trying to address when integrating IoT devices. This holds true for IoT applications in a wide range of industries, for example, healthcare, consumer devices, and manufacturing. In his session at @ThingsExpo, Lancen LaChance, vice president of product management, IoT solutions at GlobalSign, will teach IoT developers how t...
May. 5, 2016 03:45 PM EDT Reads: 704
As the rapid adoption of containers continues, companies are finding that they lack the operational tools to understand the behavior of applications deployed in these containers, and how to identify issues in their application infrastructure. For example, how are multiple containers within an application impacting each other’s performance? If an application’s service is degraded, which container is to blame? In the case of an application outage, what was the root cause of the outage?
May. 5, 2016 03:00 PM EDT Reads: 1,165
Digital payments using wearable devices such as smart watches, fitness trackers, and payment wristbands are an increasing area of focus for industry participants, and consumer acceptance from early trials and deployments has encouraged some of the biggest names in technology and banking to continue their push to drive growth in this nascent market. Wearable payment systems may utilize near field communication (NFC), radio frequency identification (RFID), or quick response (QR) codes and barcodes...
May. 5, 2016 02:45 PM EDT Reads: 1,057
SYS-CON Events announced today that CollabNet (www.collabnet.com) a global leader in enterprise software development and delivery solutions that help customers create high-quality applications at speed, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. The CEO of CollabNet Flint Brenton will also present about DevOps challenges in today’s global, open, and heterogeneous world of software development.
May. 5, 2016 02:39 PM EDT Reads: 253
SYS-CON Events announced today that Peak 10, Inc., a national IT infrastructure and cloud services provider, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. Peak 10 provides reliable, tailored data center and network services, cloud and managed services. Its solutions are designed to scale and adapt to customers’ changing business needs, enabling them to lower costs, improve performance and focus inter...
May. 5, 2016 02:30 PM EDT Reads: 1,482
Much of the value of DevOps comes from a (renewed) focus on measurement, sharing, and continuous feedback loops. In increasingly complex DevOps workflows and environments, and especially in larger, regulated, or more crystallized organizations, these core concepts become even more critical. In his session at @DevOpsSummit at 18th Cloud Expo, Andi Mann, Chief Technology Advocate at Splunk, will show how, by focusing on 'metrics that matter,' you can provide objective, transparent, and meaningfu...
May. 5, 2016 02:30 PM EDT Reads: 1,200
We're entering the post-smartphone era, where wearable gadgets from watches and fitness bands to glasses and health aids will power the next technological revolution. With mass adoption of wearable devices comes a new data ecosystem that must be protected. Wearables open new pathways that facilitate the tracking, sharing and storing of consumers’ personal health, location and daily activity data. Consumers have some idea of the data these devices capture, but most don’t realize how revealing and...
May. 5, 2016 01:45 PM EDT Reads: 749
In the world of DevOps there are ‘known good practices’ – aka ‘patterns’ – and ‘known bad practices’ – aka ‘anti-patterns.' Many of these patterns and anti-patterns have been developed from real world experience, especially by the early adopters of DevOps theory; but many are more feasible in theory than in practice, especially for more recent entrants to the DevOps scene. In this power panel at @DevOpsSummit at 18th Cloud Expo, moderated by DevOps Conference Chair Andi Mann, panelists will dis...
May. 5, 2016 01:30 PM EDT Reads: 1,130
The demand for organizations to expand their infrastructure to multiple IT environments like the cloud, on-premise, mobile, bring your own device (BYOD) and the Internet of Things (IoT) continues to grow. As this hybrid infrastructure increases, the challenge to monitor the security of these systems increases in volume and complexity. In his session at 18th Cloud Expo, Stephen Coty, Chief Security Evangelist at Alert Logic, will show how properly configured and managed security architecture can...
May. 5, 2016 01:30 PM EDT Reads: 575
There is an ever-growing explosion of new devices that are connected to the Internet using “cloud” solutions. This rapid growth is creating a massive new demand for efficient access to data. And it’s not just about connecting to that data anymore. This new demand is bringing new issues and challenges and it is important for companies to scale for the coming growth. And with that scaling comes the need for greater security, gathering and data analysis, storage, connectivity and, of course, the...
May. 5, 2016 12:30 PM EDT Reads: 1,313
The IETF draft standard for M2M certificates is a security solution specifically designed for the demanding needs of IoT/M2M applications. In his session at @ThingsExpo, Brian Romansky, VP of Strategic Technology at TrustPoint Innovation, will explain how M2M certificates can efficiently enable confidentiality, integrity, and authenticity on highly constrained devices.
May. 5, 2016 12:30 PM EDT Reads: 1,349