|By Marketwired .||
|May 27, 2014 10:06 AM EDT||
OTTAWA, CANADA -- (Marketwired) -- 05/27/14 -- Wi-LAN Inc. ("WiLAN" or the "Company") (TSX:WIN)(NASDAQ:WILN) today announced that its Board of Directors has approved the adoption of a normal course issuer bid ("NCIB") to purchase for cancellation up to 11,676,510 issued and outstanding common shares ("Shares") representing approximately 10% of the 116,765,100 Shares in the public float as of May 25, 2014 through the facilities of the Toronto Stock Exchange ("TSX") and other Canadian trading platforms.
The NCIB is subject to obtaining requisite regulatory approvals including filing notice with the TSX. The NCIB is expected to commence on May 29, 2014 after WiLAN receives regulatory approval and will expire on May 28, 2015.
As of May 25, 2014 the total number of issued and outstanding Shares was 119,974,315. The average daily trading volume for the six months ending on May 25, 2014 was 462,572 Shares. Daily purchases will be limited to 115,643 Shares, other than block purchase exceptions. During any of the Company's blackout periods, purchases under the NCIB may continue under an automatic securities purchase plan between WiLAN and its broker which will be put in place during the NCIB.
WiLAN and its Board of Directors believe that this NCIB is in the best interests of its shareholders and the repurchases made under this NCIB will be made, in part, to offset the dilutive effect of Shares expected to be issued upon the exercise of stock options under the Company's stock option plan.
The actual number of Shares purchased, the timing of purchases and the price at which the Shares are bought will depend on future market conditions and on potential alternative uses for WiLAN's cash resources. Any purchases will be subject to trading restrictions and will be made by WiLAN at the prevailing market price of the Shares at the time of purchase.
For the past twelve months, WiLAN has repurchased an aggregate of 1,461,800 Shares at a weighted average price of $3.7660 per Share.
WiLAN, founded in 1992, is a leading technology innovation and licensing company. WiLAN has licensed its intellectual property to over 280 companies worldwide. Inventions in our portfolio have been licensed by companies that manufacture or sell a wide range of communication and consumer electronics products including 3G and 4G handsets, Wi-Fi-enabled laptops, Wi-Fi and broadband routers, xDSL infrastructure equipment, cellular base stations and digital TV receivers. For more information: www.wilan.com.
This news release contains forward-looking statements and forward-looking information within the meaning of the U.S. Private Securities Litigation Reform Act of 1995 and other United States and Canadian securities laws. The phrases "is subject to obtaining requisite regulatory approvals", "is expected to commence", "will expire", "may continue", "which will be put in place", "will be made", "expected to be issued", "believe", "will depend on future market conditions", "potential alternative uses of WiLAN's cash resources", "will be subject to trading restrictions", "will be made by WiLAN at the prevailing market price of the Shares at the time of purchase", and similar terms and phrases are intended to identify these forward-looking statements. Forward-looking statements and forward-looking information are based on estimates and assumptions made by WiLAN in light of its experience and its perception of historical trends, current conditions, expected future developments and the expected effects of new business strategies, as well as other factors that WiLAN believes are appropriate in the circumstances. Many factors could cause WiLAN's actual performance or achievements to differ materially from those expressed or implied by the forward-looking statements or forward-looking information. Such factors include, without limitation, the risks described in WiLAN's February 3, 2014 annual information form for the year ended December 31, 2013 (the "AIF"). Copies of the AIF may be obtained at www.sedar.com or www.sec.gov. WiLAN recommends that readers review and consider all of these risk factors and notes that readers should not place undue reliance on any of WiLAN's forward-looking statements. WiLAN has no intention and undertakes no obligation to update or revise any forward-looking statements or forward-looking information, whether as a result of new information, future events or otherwise, except as required by law.
All trademarks and brands mentioned in this release are the property of their respective owners.
For Media or Investor inquiries, please contact:
Director, Investor Relations
E: [email protected]
Enterprises have been using both Big Data and virtualization for years. Until recently, however, most enterprises have not combined the two. Big Data's demands for higher levels of performance, the ability to control quality-of-service (QoS), and the ability to adhere to SLAs have kept it on bare metal, apart from the modern data center cloud. With recent technology innovations, we've seen the advantages of bare metal erode to such a degree that the enhanced flexibility and reduced costs that cl...
Oct. 27, 2016 11:15 AM EDT Reads: 523
All clouds are not equal. To succeed in a DevOps context, organizations should plan to develop/deploy apps across a choice of on-premise and public clouds simultaneously depending on the business needs. This is where the concept of the Lean Cloud comes in - resting on the idea that you often need to relocate your app modules over their life cycles for both innovation and operational efficiency in the cloud. In his session at @DevOpsSummit at19th Cloud Expo, Valentin (Val) Bercovici, CTO of So...
Oct. 27, 2016 11:15 AM EDT Reads: 2,226
Intelligent machines are here. Robots, self-driving cars, drones, bots and many IoT devices are becoming smarter with Machine Learning. In her session at @ThingsExpo, Sudha Jamthe, CEO of IoTDisruptions.com, will discuss the next wave of business disruption at the junction of IoT and AI, impacting many industries and set to change our lives, work and world as we know it.
Oct. 27, 2016 11:00 AM EDT Reads: 190
With an estimated 50 billion devices connected to the Internet by 2020, several industries will begin to expand their capabilities for retaining end point data at the edge to better utilize the range of data types and sheer volume of M2M data generated by the Internet of Things. In his session at @ThingsExpo, Don DeLoach, CEO and President of Infobright, discussed the infrastructures businesses will need to implement to handle this explosion of data by providing specific use cases for filterin...
Oct. 27, 2016 11:00 AM EDT Reads: 3,047
Security, data privacy, reliability, and regulatory compliance are critical factors when evaluating whether to move business applications from in-house, client-hosted environments to a cloud platform. Quality assurance plays a vital role in ensuring that the appropriate level of risk assessment, verification, and validation takes place to ensure business continuity during the migration to a new cloud platform.
Oct. 27, 2016 11:00 AM EDT Reads: 2,083
In past @ThingsExpo presentations, Joseph di Paolantonio has explored how various Internet of Things (IoT) and data management and analytics (DMA) solution spaces will come together as sensor analytics ecosystems. This year, in his session at @ThingsExpo, Joseph di Paolantonio from DataArchon, will be adding the numerous Transportation areas, from autonomous vehicles to “Uber for containers.” While IoT data in any one area of Transportation will have a huge impact in that area, combining sensor...
Oct. 27, 2016 11:00 AM EDT Reads: 1,138
In his session at Cloud Expo, Robert Cohen, an economist and senior fellow at the Economic Strategy Institute, will provide economic scenarios that describe how the rapid adoption of software-defined everything including cloud services, SDDC and open networking will change GDP, industry growth, productivity and jobs. This session will also include a drill down for several industries such as finance, social media, cloud service providers and pharmaceuticals.
Oct. 27, 2016 10:30 AM EDT Reads: 2,076
DevOps is speeding towards the IT world like a freight train and the hype around it is deafening. There is no reason to be afraid of this change as it is the natural reaction to the agile movement that revolutionized development just a few years ago. By definition, DevOps is the natural alignment of IT performance to business profitability. The relevance of this has yet to be quantified but it has been suggested that the route to the CEO’s chair will come from the IT leaders that successfully ma...
Oct. 27, 2016 10:30 AM EDT Reads: 16,635
We are always online. We access our data, our finances, work, and various services on the Internet. But we live in a congested world of information in which the roads were built two decades ago. The quest for better, faster Internet routing has been around for a decade, but nobody solved this problem. We’ve seen band aid approaches like CDNs that attack a niche's slice of static content part of the Internet, but that’s it. It does not address the dynamic services-based Internet of today. It doe...
Oct. 27, 2016 10:15 AM EDT Reads: 2,036
Ask someone to architect an Internet of Things (IoT) solution and you are guaranteed to see a reference to the cloud. This would lead you to believe that IoT requires the cloud to exist. However, there are many IoT use cases where the cloud is not feasible or desirable. In his session at @ThingsExpo, Dave McCarthy, Director of Products at Bsquare Corporation, will discuss the strategies that exist to extend intelligence directly to IoT devices and sensors, freeing them from the constraints of ...
Oct. 27, 2016 10:15 AM EDT Reads: 3,212
What happens when the different parts of a vehicle become smarter than the vehicle itself? As we move toward the era of smart everything, hundreds of entities in a vehicle that communicate with each other, the vehicle and external systems create a need for identity orchestration so that all entities work as a conglomerate. Much like an orchestra without a conductor, without the ability to secure, control, and connect the link between a vehicle’s head unit, devices, and systems and to manage the ...
Oct. 27, 2016 10:15 AM EDT Reads: 1,398
DevOps is being widely accepted (if not fully adopted) as essential in enterprise IT. But as Enterprise DevOps gains maturity, expands scope, and increases velocity, the need for data-driven decisions across teams becomes more acute. DevOps teams in any modern business must wrangle the ‘digital exhaust’ from the delivery toolchain, "pervasive" and "cognitive" computing, APIs and services, mobile devices and applications, the Internet of Things, and now even blockchain. In this power panel at @...
Oct. 27, 2016 09:15 AM EDT Reads: 2,156
By now most people have either created their configuration management solution or are just embarking on this journey. In his session at @DevOpsSummit at 19th Cloud Expo, Marco Ceppi, a DevOps Engineer working at Canonical, will discuss how to take configuration management to the next level with modelling and orchestration. He will also discuss how and why people are moving from a machine-centric view to a service/application-oriented view of deployments, and how you can leverage the knowledge a...
Oct. 27, 2016 09:00 AM EDT Reads: 2,050
@ThingsExpo has been named the Top 5 Most Influential M2M Brand by Onalytica in the ‘Machine to Machine: Top 100 Influencers and Brands.' Onalytica analyzed the online debate on M2M by looking at over 85,000 tweets to provide the most influential individuals and brands that drive the discussion. According to Onalytica the "analysis showed a very engaged community with a lot of interactive tweets. The M2M discussion seems to be more fragmented and driven by some of the major brands present in the...
Oct. 27, 2016 08:45 AM EDT Reads: 11,585
In the 21st century, security on the Internet has become one of the most important issues. We hear more and more about cyber-attacks on the websites of large corporations, banks and even small businesses. When online we’re concerned not only for our own safety but also our privacy. We have to know that hackers usually start their preparation by investigating the private information of admins – the habits, interests, visited websites and so on. On the other hand, our own security is in danger bec...
Oct. 27, 2016 08:15 AM EDT Reads: 527