Welcome!

News Feed Item

Peak Sets Closing Agenda for Quickable.com Acquisition

MONTREAL, QUEBEC -- (Marketwired) -- 05/15/14 -- Peak Positioning Technologies Inc. (TSX VENTURE: PKK) ("Peak" or the "Company") today announced that it has concluded its due diligence, has filed the necessary documents with the TSX Venture exchange related to its planned acquisition of the assets associated with Quickable marketplace, and has set a closing agenda to close on the transaction on June 13, 2014.

Peak and Quick Technologies LLC ("Quick Tech"), the current owner of Quickable, are working diligently to draft and execute the necessary legal documents to officially transfer the Quickable assets to Peak. As compensation for the Quickable assets, Quick Tech will receive from Peak, at the closing of the transaction, CAD$200,000 in cash, CAD$200,000 in interest-free promissory notes and 20 million Peak shares at a deemed price of CAD$0.05 per share for a total consideration at closing of CAD$1.4 million. Quick Tech will also receive 5% of the top-line revenues generated by the Quickable.com assets through the end of calendar year 2016 up to a maximum of CAD$600,000 in cash, bringing the total compensation payable to Quick Tech for the Quickable.com assets to CAD$2 million.

"We view Quickable as a key component of our strategic plan going forward, particularly for its potential in the fast-growing Chinese mobile e-commerce market", said Johnson Joseph, President and CEO of Peak. "With that in mind, we strongly believe that this transaction is structured in a way that creates a win-win situation for both Peak and Quick Tech, and that it will ultimately bring significant value to all Peak shareholders", concluded Mr. Joseph.

Debt Settlement with Newfield Partners LLC

Peak also announced that it has settled a "shares for debt" transaction with Newfield Partners LLC ("Newfield"). On May 12, 2014, Peak issued 1,670,040 common shares to Newfield at a deemed price of $0.05 per share to repay $83,502 worth of short-term notes payable to Newfield, which matured on April 30, 2014.

Pursuant to Policy 5.9 of the TSXV and Multilateral Instrument 61-101 Respecting protection of minority security holders in special transactions ("MI 61-101"), the debt settlement transaction constitutes a "related party transaction" as Newfield is controlled by Mr. David Kugler (the "Related Party"), who is a member of Peak's Board of Director. In reviewing the applicable valuation requirements under MI 61-101, Peak has determined that the exemption set out in subsection 5.5 (c) of MI 61-101 is applicable since the transaction is a distribution of securities of Peak to the Related Party for cash consideration. In addition, subsection 5.7(b) provides that a transaction meeting such criteria is also exempt from the minority shareholder approval requirement. Peak has not filed a material change report 21 days prior to the closing of the debt settlement transaction as no agreement to that effect was in place at that time.

About Peak Positioning Technologies Inc.:

Peak Positioning Technologies Inc. ("Peak"), (TSX VENTURE: PKK), is a management company whose wholly-owned subsidiary, Peak Positioning Corporation provides Web development services and develops mobile software platforms destined to mobile network operators worldwide. Peak aims to deliver value to its shareholders by assembling a portfolio of high-growth projects and companies in mobile, mobile e-Commerce, and Web development in North America and China. For more information: http://www.peakpositioning.com

Forward-Looking Statements / Information

This news release may include certain forward-looking information, including statements relating to business and operating strategies, plans and prospects for revenue growth, using words including "anticipate", "believe", "could", "expect", "intend", "may", "plan", "potential", "project", "seek", "should", "will", "would" and similar expressions, which are intended to identify a number of these forward-looking statements. Forward-looking information reflects current views with respect to current events and is not a guarantee of future performance and is subject to risks, uncertainties and assumptions. The Company undertakes no obligation to publicly update or review any forward-looking information contained in this news release, except as may be required by applicable laws, rules and regulations. Readers are urged to consider these factors carefully in evaluating any forward-looking information.

The TSX Venture Exchange has in no way passed upon the merits of this transaction and has neither approved nor disapproved the contents of this press release. Neither the TSX Venture Exchange, Inc. nor its Regulation Service Provider (as that term is defined under the policies of the TSX Venture Exchange) accepts responsibility for the adequacy or accuracy of the contents of this press release.

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
Between 2005 and 2020, data volumes will grow by a factor of 300 – enough data to stack CDs from the earth to the moon 162 times. This has come to be known as the ‘big data’ phenomenon. Unfortunately, traditional approaches to handling, storing and analyzing data aren’t adequate at this scale: they’re too costly, slow and physically cumbersome to keep up. Fortunately, in response a new breed of technology has emerged that is cheaper, faster and more scalable. Yet, in meeting these new needs they...
Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security ha...
An IoT product’s log files speak volumes about what’s happening with your products in the field, pinpointing current and potential issues, and enabling you to predict failures and save millions of dollars in inventory. But until recently, no one knew how to listen. In his session at @ThingsExpo, Dan Gettens, Chief Research Officer at OnProcess, discussed recent research by Massachusetts Institute of Technology and OnProcess Technology, where MIT created a new, breakthrough analytics model for s...
When it comes to cloud computing, the ability to turn massive amounts of compute cores on and off on demand sounds attractive to IT staff, who need to manage peaks and valleys in user activity. With cloud bursting, the majority of the data can stay on premises while tapping into compute from public cloud providers, reducing risk and minimizing need to move large files. In his session at 18th Cloud Expo, Scott Jeschonek, Director of Product Management at Avere Systems, discussed the IT and busin...
"We are the public cloud providers. We are currently providing 50% of the resources they need for doing e-commerce business in China and we are hosting about 60% of mobile gaming in China," explained Yi Zheng, CPO and VP of Engineering at CDS Global Cloud, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at D...
Keeping pace with advancements in software delivery processes and tooling is taxing even for the most proficient organizations. Point tools, platforms, open source and the increasing adoption of private and public cloud services requires strong engineering rigor - all in the face of developer demands to use the tools of choice. As Agile has settled in as a mainstream practice, now DevOps has emerged as the next wave to improve software delivery speed and output. To make DevOps work, organization...
"We are a custom software development, engineering firm. We specialize in cloud applications from helping customers that have on-premise applications migrating to the cloud, to helping customers design brand new apps in the cloud. And we specialize in mobile apps," explained Peter Di Stefano, Vice President of Marketing at Impiger Technologies, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
"We're a cybersecurity firm that specializes in engineering security solutions both at the software and hardware level. Security cannot be an after-the-fact afterthought, which is what it's become," stated Richard Blech, Chief Executive Officer at Secure Channels, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
In this strange new world where more and more power is drawn from business technology, companies are effectively straddling two paths on the road to innovation and transformation into digital enterprises. The first path is the heritage trail – with “legacy” technology forming the background. Here, extant technologies are transformed by core IT teams to provide more API-driven approaches. Legacy systems can restrict companies that are transitioning into digital enterprises. To truly become a lead...
In IT, we sometimes coin terms for things before we know exactly what they are and how they’ll be used. The resulting terms may capture a common set of aspirations and goals – as “cloud” did broadly for on-demand, self-service, and flexible computing. But such a term can also lump together diverse and even competing practices, technologies, and priorities to the point where important distinctions are glossed over and lost.
Video experiences should be unique and exciting! But that doesn’t mean you need to patch all the pieces yourself. Users demand rich and engaging experiences and new ways to connect with you. But creating robust video applications at scale can be complicated, time-consuming and expensive. In his session at @ThingsExpo, Zohar Babin, Vice President of Platform, Ecosystem and Community at Kaltura, discussed how VPaaS enables you to move fast, creating scalable video experiences that reach your aud...
All clouds are not equal. To succeed in a DevOps context, organizations should plan to develop/deploy apps across a choice of on-premise and public clouds simultaneously depending on the business needs. This is where the concept of the Lean Cloud comes in - resting on the idea that you often need to relocate your app modules over their life cycles for both innovation and operational efficiency in the cloud. In his session at @DevOpsSummit at19th Cloud Expo, Valentin (Val) Bercovici, CTO of Soli...
"Once customers get a year into their IoT deployments, they start to realize that they may have been shortsighted in the ways they built out their deployment and the key thing I see a lot of people looking at is - how can I take equipment data, pull it back in an IoT solution and show it in a dashboard," stated Dave McCarthy, Director of Products at Bsquare Corporation, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
What happens when the different parts of a vehicle become smarter than the vehicle itself? As we move toward the era of smart everything, hundreds of entities in a vehicle that communicate with each other, the vehicle and external systems create a need for identity orchestration so that all entities work as a conglomerate. Much like an orchestra without a conductor, without the ability to secure, control, and connect the link between a vehicle’s head unit, devices, and systems and to manage the ...