|By Business Wire||
|January 16, 2014 07:05 AM EST||
Tessera Technologies, Inc. (NASDAQ: TSRA) (the “Company” or “Tessera”) announced today that it is restructuring its DigitalOptics business (“DOC”) to cease its remaining manufacturing operations and refocus efforts on monetizing DOC technologies, including solutions for imaging and MEMS technologies. The changes announced today will enable the Company to return its focus to its core IP business, will substantially reduce the Company’s operating costs, and provide the Company with a path to improved financial performance and profitability.
These actions are the culmination of an in-depth review of strategic alternatives for DOC that was conducted in conjunction with the Company’s financial advisors, the newly reconstituted board of directors and the new senior management team. The Company expects to take restructuring, impairment and other exit charges of approximately $50 million to $55 million, with approximately 75% of that charge in the fourth quarter of 2013 and the remainder in the first half of 2014. As a result of the restructuring, the Company expects its quarterly DOC related operating expenses to be reduced by approximately $17 million, realized in full by the third quarter of 2014.
Tom Lacey, Tessera’s chief executive officer, commented, “After an exhaustive process of exploring multiple options, we have decided to cease DOC manufacturing operations and focus our resources in DOC on continuing to operate our image enhancement business, while also exploring new ways to realize value from our extensive DOC intellectual property portfolio, including a sale, licensing or other means. While the strategic process ultimately did not lead to a sale of the mems|cam business, we achieved solid proof of concept by demonstrating working mems|cam camera modules, including shipping pre-production units that generated substantial customer interest. We strongly believe that there is significant value in the related intellectual property that has been developed, including our camera module, MEMS, and image enhancement technologies. Additionally, we continue to believe our mems|cam technology is unique and novel and may be incorporated into mobile devices in the future. To that end, we intend to maintain a small team of MEMS engineers to further the mems|cam technology and pursue possible avenues to unlock the value of this powerful technology.”
Continued Lacey, “I wish to sincerely thank the many talented and passionate employees who have contributed towards the development of the DOC’s mems|cam technology and products. I look forward to continuing to drive our world-class image enhancement business to further develop and commercialize our market-leading imaging technology, intellectual property and products, many of which have been employed by leading smartphone manufacturers around the world. I remain optimistic about our future and the many opportunities ahead.”
Tessera will hold a conference call at 5:30 A.M. Pacific (8:30 A.M. Eastern) today. To access the call in the U.S., please dial (888) 723-9308, and for international callers dial (706) 643-3789, approximately 10 minutes prior to the start of the conference call. The conference call will also be broadcast live over the Internet and available for replay for 90 days at www.tessera.com. In addition, a replay of the call will be available via telephone for two business days, beginning two hours after the call. To listen to the telephone replay in the U.S., please dial (855) 859-2056. International callers please dial (404) 537-3406. Enter access code 35876836.
Safe Harbor Statement
This document contains forward-looking statements, which are made pursuant to the safe harbor provisions of the Private Securities Litigation Reform Act of 1995. Forward-looking statements involve risks and uncertainties that could cause actual results to differ significantly from those projected, particularly with respect to the change in DOC business strategy; the Company’s ability to monetize the DOC intellectual property portfolio and technology, through a sale, licensing or other means; the Company’s intention regarding DOC’s image enhancement business and mems|cam business, and the Company’s efforts to monetize its imaging and/or MEMS technology; the possibility that mems|cam technology will be incorporated into mobile devices in the future; the expected charges and cash expenditures from the restructuring; and the timing of the restructuring; the Company’s ability to reduce its costs and the estimated amount of future reductions in operating expense. Material factors that may cause results to differ from the statements made include the plans or operations relating to the Company's businesses; any need to spend more cash and/or incur greater charges than anticipated in connection with the DOC restructuring, workforce reduction, facility closures and related activities; any need to undertake further restructuring activities; market or industry conditions; changes in patent laws, regulation or enforcement, or other factors that might affect the Company's ability to protect or realize the value of its intellectual property; the expiration of license agreements and the cessation of related royalty income; the failure, inability or refusal of licensees to pay royalties; initiation, delays, setbacks or losses relating to the Company's intellectual property or intellectual property litigations, or invalidation or limitation of key patents; the timing and results, which are not predictable and may vary in any individual proceeding, of any ICC ruling or award, including in the Amkor arbitration; fluctuations in operating results due to the timing of new license agreements and royalties, or due to legal costs; the risk of a decline in demand for semiconductor and products utilizing DOC technologies; failure by the industry to use technologies covered by the Company's patents; the expiration of the Company's patents; the Company's ability to successfully complete and integrate acquisitions of businesses; the risk of loss of, or decreases in production orders from, customers of acquired businesses; financial and regulatory risks associated with the international nature of the Company's businesses; failure of the Company's products to achieve technological feasibility or profitability; failure to successfully commercialize the Company's products; changes in demand for the products of the Company's customers; limited opportunities to license technologies and sell products due to high concentration in the markets for semiconductors and related products and camera modules; and the impact of competing technologies on the demand for the Company's technologies and products. You are cautioned not to place undue reliance on the forward-looking statements, which speak only as of the date of this release. The Company's filings with the Securities and Exchange Commission, including its Annual Report on Form 10-K for the year ended Dec. 31, 2012, and its Quarterly Report on Form 10-Q for the quarter ended Sept. 30, 2013, include more information about factors that could affect the Company's financial results. The Company assumes no obligation to update information contained in this press release. Although this release may remain available on the Company's website or elsewhere, its continued availability does not indicate that the Company is reaffirming or confirming any of the information contained herein.
About Tessera Technologies, Inc.
Tessera Technologies, Inc. is a holding company with operating subsidiaries in two segments: Intellectual Property and DigitalOptics. Our Intellectual Property segment, managed by Tessera Intellectual Property Corp., generates revenue from manufacturers and other implementers that use our technology. Our DigitalOptics business delivers innovation in imaging systems for smartphones. For more information call 1.408.321.6000 or visit www.tessera.com.
Tessera, the Tessera logo, DOC, the DOC logo, and Invensas Corporation are trademarks or registered trademarks of affiliated companies of Tessera Technologies, Inc. in the United States and other countries. All other company, brand and product names may be trademarks or registered trademarks of their respective companies.
In his session at 18th Cloud Expo, Sagi Brody, Chief Technology Officer at Webair Internet Development Inc., will focus on real world deployments of DDoS mitigation strategies in every layer of the network. He will give an overview of methods to prevent these attacks and best practices on how to provide protection in complex cloud platforms. He will also outline what we have found in our experience managing and running thousands of Linux and Unix managed service platforms and what specifically c...
May. 6, 2016 06:15 PM EDT Reads: 1,420
Much of the value of DevOps comes from a (renewed) focus on measurement, sharing, and continuous feedback loops. In increasingly complex DevOps workflows and environments, and especially in larger, regulated, or more crystallized organizations, these core concepts become even more critical. In his session at @DevOpsSummit at 18th Cloud Expo, Andi Mann, Chief Technology Advocate at Splunk, will show how, by focusing on 'metrics that matter,' you can provide objective, transparent, and meaningfu...
May. 6, 2016 06:00 PM EDT Reads: 1,251
trust and privacy in their ecosystem. Assurance and protection of device identity, secure data encryption and authentication are the key security challenges organizations are trying to address when integrating IoT devices. This holds true for IoT applications in a wide range of industries, for example, healthcare, consumer devices, and manufacturing. In his session at @ThingsExpo, Lancen LaChance, vice president of product management, IoT solutions at GlobalSign, will teach IoT developers how t...
May. 6, 2016 06:00 PM EDT Reads: 856
As enterprises around the world struggle with their digital transformation efforts, many are finding that innovative digital teams are moving much faster than their hidebound IT organizations. Rather than struggling to convince traditional IT to get with the digital program, executives are taking advice from IT research firm Gartner, and encouraging existing IT to continue in their desultory ways. However, many CIOs are realizing the dangers of following Gartner’s advice. The central challenge ...
May. 6, 2016 06:00 PM EDT Reads: 293
A critical component of any IoT project is the back-end systems that capture data from remote IoT devices and structure it in a way to answer useful questions. Traditional data warehouse and analytical systems are mature technologies that can be used to handle large data sets, but they are not well suited to many IoT-scale products and the need for real-time insights. At Fuze, we have developed a backend platform as part of our mobility-oriented cloud service that uses Big Data-based approache...
May. 6, 2016 05:30 PM EDT Reads: 837
The pace of innovation, vendor lock-in, production sustainability, cost-effectiveness, and managing risk… In his session at 18th Cloud Expo, Dan Choquette, Founder of RackN, will discuss how CIOs are challenged finding the balance of finding the right tools, technology and operational model that serves the business the best. He will discuss how clouds, open source software and infrastructure solutions have benefits but also drawbacks and how workload and operational portability between vendors...
May. 6, 2016 05:00 PM EDT Reads: 321
Cloud Object Storage is effectively infinitely scalable and boasts the lowest total costs. But cloud SLAs and T&Cs are traditionally optimized for huge customers like Netflix, so applications demanding better confidentiality or higher availability typically can’t reap the benefits of public cloud storage. In his session at 18th Cloud Expo, Don Martin, CTO of Security First Corp, will provide an overview of innovative technologies available today – secret sharing and information dispersal algori...
May. 6, 2016 05:00 PM EDT Reads: 310
As the rapid adoption of containers continues, companies are finding that they lack the operational tools to understand the behavior of applications deployed in these containers, and how to identify issues in their application infrastructure. For example, how are multiple containers within an application impacting each other’s performance? If an application’s service is degraded, which container is to blame? In the case of an application outage, what was the root cause of the outage?
May. 6, 2016 04:00 PM EDT Reads: 1,212
We're entering the post-smartphone era, where wearable gadgets from watches and fitness bands to glasses and health aids will power the next technological revolution. With mass adoption of wearable devices comes a new data ecosystem that must be protected. Wearables open new pathways that facilitate the tracking, sharing and storing of consumers’ personal health, location and daily activity data. Consumers have some idea of the data these devices capture, but most don’t realize how revealing and...
May. 6, 2016 04:00 PM EDT Reads: 871
When it comes to IoT in the enterprise, namely the commercial building and hospitality markets, a benefit not getting the attention it deserves is energy efficiency, and IoT's direct impact on a cleaner, greener environment when installed in smart buildings. Until now clean technology was offered piecemeal and led with point solutions that require significant systems integration to orchestrate and deploy. There didn't exist a 'top down' approach that can manage and monitor the way a Smart Buildi...
May. 6, 2016 03:15 PM EDT Reads: 263
Cloud-based NCLC (No-code/low code) application builder platforms empower everyone in the organization to quickly build applications and executable processes that broaden access, deepen collaboration, and enhance transparency for all team members. Line of business owners (LOBO) and operations managers know best their part of the business and their processes. IT departments are beginning to leverage NCLC platforms to empower and enable LOBOs to lead the innovation, transform the organization, an...
May. 6, 2016 03:00 PM EDT Reads: 301
Unless you don’t use the internet, don’t live in California, or haven’t been paying attention to the recent news… you should be aware that self-driving cars are on their way to becoming a reality. I have seen them – they are real. If you believe in the future reality of self-driving cars, then continue reading on. If you don’t believe in the future possibilities, then I am not sure what to do to convince you other than discuss the very real changes that will roll out with the consumer producti...
May. 6, 2016 02:15 PM EDT Reads: 914
There is an ever-growing explosion of new devices that are connected to the Internet using “cloud” solutions. This rapid growth is creating a massive new demand for efficient access to data. And it’s not just about connecting to that data anymore. This new demand is bringing new issues and challenges and it is important for companies to scale for the coming growth. And with that scaling comes the need for greater security, gathering and data analysis, storage, connectivity and, of course, the...
May. 6, 2016 01:45 PM EDT Reads: 1,375
The IETF draft standard for M2M certificates is a security solution specifically designed for the demanding needs of IoT/M2M applications. In his session at @ThingsExpo, Brian Romansky, VP of Strategic Technology at TrustPoint Innovation, will explain how M2M certificates can efficiently enable confidentiality, integrity, and authenticity on highly constrained devices.
May. 6, 2016 01:00 PM EDT Reads: 1,415
In the world of DevOps there are ‘known good practices’ – aka ‘patterns’ – and ‘known bad practices’ – aka ‘anti-patterns.' Many of these patterns and anti-patterns have been developed from real world experience, especially by the early adopters of DevOps theory; but many are more feasible in theory than in practice, especially for more recent entrants to the DevOps scene. In this power panel at @DevOpsSummit at 18th Cloud Expo, moderated by DevOps Conference Chair Andi Mann, panelists will dis...
May. 6, 2016 12:45 PM EDT Reads: 1,190