Welcome!

News Feed Item

ChinaEdu Corporation Announces Extraordinary General Meeting of Shareholders

BEIJING, March 14, 2014 /PRNewswire/ -- ChinaEdu Corporation (NASDAQ: CEDU) (the "Company"), a leading online educational services provider in China, today announced that it has called an extraordinary general meeting of shareholders (the "EGM"), to be held on April 18, 2014, at 2:00 p.m. (Beijing time), at 4th Floor-A, GeHua Building, QinglongHutong No 1, Dongcheng District, Beijing, China, to consider and vote on, among others, the proposal to authorize and approve the previously announced Agreement and Plan of Merger, dated December 31, 2013 (the "Merger Agreement"), among the Company, ChinaEdu Holdings Limited and ChinaEdu Merger Sub Limited ("Merger Sub") and the plan of merger required to be filed with the Registrar of Companies of the Cayman Islands, substantially in the form attached as Appendix I to the Merger Agreement (the "Plan of Merger") and the transactions contemplated thereby, including the Merger (as defined below).  

Pursuant to the Merger Agreement and the Plan of Merger, Merger Sub will be merged with and into the Company (the "Merger") with the Company continuing as the surviving corporation. If completed, the Merger would result in the Company becoming a privately-held company and its American depositary shares (the "ADSs") would no longer be listed on NASDAQ and the American depositary shares program for the ADSs would be terminated. The Company's board of directors recommends that the shareholders and ADS holders vote FOR, among others, the proposal to approve the Merger Agreement, the Plan of Merger and the transactions completed thereby, including the Merger.

Shareholders of record at the close of business in the Cayman Islands on March 31, 2014 will be entitled to vote at the EGM and any adjourned or postponed meeting thereof. The record date for ADS holders entitled to instruct The Bank of New York Mellon, the ADS depositary, to vote the shares represented by the ADSs is the close of business in New York City on March 17, 2014. Additional information regarding the EGM and the Merger Agreement can be found in the Transaction Statement on Schedule 13E-3 and the proxy statement attached as Exhibit (a)-(1) thereto, as amended, filed with the U.S. Securities and Exchange Commission (the "SEC"), which can be obtained from the SEC's website (www.sec.gov). INVESTORS AND SHAREHOLDERS ARE URGED TO READ CAREFULLY AND IN THEIR ENTIRETY THESE MATERIALS AND OTHER MATERIALS FILED WITH OR FURNISHED TO THE SEC WHEN THEY BECOME AVAILABLE, AS THEY WILL CONTAIN IMPORTANT INFORMATION ABOUT THE COMPANY, THE PROPOSED MERGER AND RELATED MATTERS.

This announcement is neither a solicitation of a proxy, an offer to purchase nor a solicitation of an offer to sell any securities and it is not a substitute for any proxy statement or other filings that have been or will be made with the SEC. Shareholders who have questions about the proposed Merger should contact MacKenzie Partners, Inc. at (800) 322-2885 (toll-free in North America) or +1-212-929-5500 (collect).

About ChinaEdu Corporation

ChinaEdu Corporation is an educational services provider in China, incorporated as an exempted limited liability company in the Cayman Islands. Established in 1999, the Company's primary business is to provide comprehensive services to the online degree programs of leading Chinese universities. These services include academic program development, technology services, enrollment marketing, student support services and finance operations. The Company's other lines of businesses include the operation of private primary and secondary schools, online interactive tutoring services and providing marketing, support for international and elite curriculum programs and online learning community for adult students.

The Company believes it is the largest service provider to online degree programs in China in terms of the number of higher education institutions that are served and the number of student enrollments supported. The Company currently has entered into collaborative alliances with 13 universities, ranging from 15 to 50 years in length. The Company has also entered into technology agreements with 8 universities. Besides, ChinaEdu performs recruiting services for 23 universities through a nationwide learning center network.

Safe Harbor: Forward-Looking Statements

Certain statements contained in this announcement may be viewed as "forward-looking statements" within the meaning of Section 27A of the U.S. Securities Act of 1933, as amended, and Section 21E of the U.S. Securities Exchange Act of 1934, as amended, and as defined in the U.S. Private Securities Litigation Reform Act of 1995. These forward-looking statements can be identified by terminology such as "if," "will," "expected," and similar statements. Forward-looking statements involve inherent risks, uncertainties and assumptions. Risks, uncertainties and assumptions include: uncertainties as to how the Company's shareholders will vote at the meeting of shareholders; the possibility that competing offers will be made; the possibility that debt financing may not be available; the possibility that various closing conditions for the transaction may not be satisfied or waived; and other risks and uncertainties discussed in documents filed with the SEC by the Company, as well as the Schedule 13E-3 transaction statement and the proxy statement to be filed by the Company. These forward-looking statements reflect the Company's expectations as of the date of this press release. You should not rely upon these forward-looking statements as predictions of future events. The Company undertakes no ongoing obligation, other than that imposed by law, to update these statements.

For further information, please contact:

Helen Plummer
Senior Investor Relations Coordinator
ChinaEdu Corporation
Phone: +1 908-442-9395
E-mail: [email protected]

Simon Mei
Chief Financial Officer
ChinaEdu Corporation
Phone: +86 10 8418-7301
E-mail: [email protected]

SOURCE ChinaEdu Corporation

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Web Real-Time Communication APIs have quickly revolutionized what browsers are capable of. In addition to video and audio streams, we can now bi-directionally send arbitrary data over WebRTC's PeerConnection Data Channels. With the advent of Progressive Web Apps and new hardware APIs such as WebBluetooh and WebUSB, we can finally enable users to stitch together the Internet of Things directly from their browsers while communicating privately and securely in a decentralized way.
WebRTC is about the data channel as much as about video and audio conferencing. However, basically all commercial WebRTC applications have been built with a focus on audio and video. The handling of “data” has been limited to text chat and file download – all other data sharing seems to end with screensharing. What is holding back a more intensive use of peer-to-peer data? In her session at @ThingsExpo, Dr Silvia Pfeiffer, WebRTC Applications Team Lead at National ICT Australia, looked at differ...
Adding public cloud resources to an existing application can be a daunting process. The tools that you currently use to manage the software and hardware outside the cloud aren’t always the best tools to efficiently grow into the cloud. All of the major configuration management tools have cloud orchestration plugins that can be leveraged, but there are also cloud-native tools that can dramatically improve the efficiency of managing your application lifecycle. In his session at 18th Cloud Expo, ...
Security, data privacy, reliability and regulatory compliance are critical factors when evaluating whether to move business applications from in-house client hosted environments to a cloud platform. In her session at 18th Cloud Expo, Vandana Viswanathan, Associate Director at Cognizant, In this session, will provide an orientation to the five stages required to implement a cloud hosted solution validation strategy.
The security needs of IoT environments require a strong, proven approach to maintain security, trust and privacy in their ecosystem. Assurance and protection of device identity, secure data encryption and authentication are the key security challenges organizations are trying to address when integrating IoT devices. This holds true for IoT applications in a wide range of industries, for example, healthcare, consumer devices, and manufacturing. In his session at @ThingsExpo, Lancen LaChance, vic...
With the proliferation of both SQL and NoSQL databases, organizations can now target specific fit-for-purpose database tools for their different application needs regarding scalability, ease of use, ACID support, etc. Platform as a Service offerings make this even easier now, enabling developers to roll out their own database infrastructure in minutes with minimal management overhead. However, this same amount of flexibility also comes with the challenges of picking the right tool, on the right ...
With all the incredible momentum behind the Internet of Things (IoT) industry, it is easy to forget that not a single CEO wakes up and wonders if “my IoT is broken.” What they wonder is if they are making the right decisions to do all they can to increase revenue, decrease costs, and improve customer experience – effectively the same challenges they have always had in growing their business. The exciting thing about the IoT industry is now these decisions can be better, faster, and smarter. Now ...
"Splunk basically takes machine data and we make it usable, valuable and accessible for everyone. The way that plays in DevOps is - we need to make data-driven decisions to delivering applications," explained Andi Mann, Chief Technology Advocate at Splunk and @DevOpsSummit Conference Chair, in this SYS-CON.tv interview at @DevOpsSummit at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Security, data privacy, reliability, and regulatory compliance are critical factors when evaluating whether to move business applications from in-house, client-hosted environments to a cloud platform. Quality assurance plays a vital role in ensuring that the appropriate level of risk assessment, verification, and validation takes place to ensure business continuity during the migration to a new cloud platform.
In his session at @DevOpsSummit at 19th Cloud Expo, Robert Doyle, lead architect at eCube Systems, will examine the issues and need for an agile infrastructure and show the advantages of capturing developer knowledge in an exportable file for migration into production. He will introduce the use of NXTmonitor, a next-generation DevOps tool that captures application environments, dependencies and start/stop procedures in a portable configuration file with an easy-to-use GUI. In addition to captur...
Who are you? How do you introduce yourself? Do you use a name, or do you greet a friend by the last four digits of his social security number? Assuming you don’t, why are we content to associate our identity with 10 random digits assigned by our phone company? Identity is an issue that affects everyone, but as individuals we don’t spend a lot of time thinking about it. In his session at @ThingsExpo, Ben Klang, Founder & President of Mojo Lingo, discussed the impact of technology on identity. Sho...
Fact is, enterprises have significant legacy voice infrastructure that’s costly to replace with pure IP solutions. How can we bring this analog infrastructure into our shiny new cloud applications? There are proven methods to bind both legacy voice applications and traditional PSTN audio into cloud-based applications and services at a carrier scale. Some of the most successful implementations leverage WebRTC, WebSockets, SIP and other open source technologies. In his session at @ThingsExpo, Da...
A critical component of any IoT project is what to do with all the data being generated. This data needs to be captured, processed, structured, and stored in a way to facilitate different kinds of queries. Traditional data warehouse and analytical systems are mature technologies that can be used to handle certain kinds of queries, but they are not always well suited to many problems, particularly when there is a need for real-time insights.
In his session at DevOps Summit, Tapabrata Pal, Director of Enterprise Architecture at Capital One, will tell a story about how Capital One has embraced Agile and DevOps Security practices across the Enterprise – driven by Enterprise Architecture; bringing in Development, Operations and Information Security organizations together. Capital Ones DevOpsSec practice is based upon three "pillars" – Shift-Left, Automate Everything, Dashboard Everything. Within about three years, from 100% waterfall, C...
You think you know what’s in your data. But do you? Most organizations are now aware of the business intelligence represented by their data. Data science stands to take this to a level you never thought of – literally. The techniques of data science, when used with the capabilities of Big Data technologies, can make connections you had not yet imagined, helping you discover new insights and ask new questions of your data. In his session at @ThingsExpo, Sarbjit Sarkaria, data science team lead ...