Welcome!

News Feed Item

Veraz Petroleum Ltd. and Momentus Energy Corp. Amend Arrangement Agreement and Announce Intention to Adjourn and Postpone Shareholder Meetings

CALGARY, ALBERTA -- (Marketwired) -- 06/18/14 -- Veraz Petroleum Ltd. ("Veraz") (TSX VENTURE: VRZ.H) and Momentus Energy Corp. ("Momentus") announce they have amended the previously announced arrangement agreement between them so as to extend the outside date by which Momentus shall acquire Veraz by way of reverse take-over pursuant to a plan of arrangement (the "Reverse Take-Over") in accordance with such agreement from June 30, 2014 to July 31, 2014. The purpose of the extension is to facilitate the completion of Momentus' previously announced private placement of subscription receipts, it being a condition to completion of the Reverse Take-Over that Momentus raise minimum aggregate gross proceeds of $11 million pursuant to the private placement.

In connection with such extension, Veraz intends to conduct the annual business to be conducted at its annual and special meeting of shareholders to be held on June 20, 2014, and then adjourn the meeting to 10:00 a.m. (Calgary time) on July 17, 2014, at which time it will conduct the special business related to the approval of the Reverse Take-Over and the related consolidation and name change, all as described in the joint information circular and proxy statement of Veraz and Momentus dated May 14, 2014 (the "Circular"). The date, time and place of the adjourned meeting will be confirmed in a further press release to be issued following the adjournment of the meeting on June 20, 2014.

In addition, Momentus announces that it has postponed its special meeting of shareholders to be held to approve the Reverse Take-Over until 9:00 a.m. (Calgary time) on July 17, 2014 at the office of Dentons Canada LLP, Suite 1500, 850 - 2nd Street S.W., Calgary, Alberta.

The directors of each of Veraz and Momentus have unanimously approved the Reverse Take-Over and continue to recommend that their respective shareholders vote in favour thereof.

Shareholders of Veraz and Momentus who have not voted or wish to change their vote with respect to the Reverse Take-Over and any related matters may do so by following the instructions set forth on the proxy or voting instruction form provided to them. A shareholder may also revoke a previously voted proxy with an instrument in writing, including another proxy, signed by the shareholder and delivered to Veraz or Momentus, as applicable. In order to revoke a proxy previously delivered by an intermediary or its agent, on their behalf, beneficial shareholders should carefully follow any revocation instructions set forth on the voting instruction form provided to them by their intermediary or agent.

Disclaimer

Completion of the Reverse Take-Over is subject to a number of conditions, including TSX Venture Exchange ("TSXV") acceptance and disinterested shareholder approval. The Reverse Take-Over cannot close until the required shareholder approval is obtained. There can be no assurance that the Reverse Take-Over will be completed as proposed or at all.

Investors are cautioned that, except as disclosed in the Circular prepared in connection with the Reverse Take-Over, any information released or received with respect to the Reverse Take-Over may not be accurate or complete and should not be relied upon. Trading in the securities of Veraz should be considered highly speculative.

The TSXV in no way passed upon the merits of the proposed Reverse Take-Over and has neither approved nor disapproved the contents of this press release.

Forward Looking Statements

This press release contains certain statements which constitute forward-looking statements or information ("forward-looking statements"), including statements regarding the anticipated adjournment of the Veraz shareholder meeting, the anticipated time and date of such adjourned meeting, and the anticipated date, time and place of the postponed meeting of Momentus shareholders. Such forward-looking statements are subject to numerous risks and uncertainties, some of which are beyond Momentus' and Veraz's control, including the ability of Momentus and Veraz to satisfy the conditions to completion of the Reverse Take-Over, and the successful completion of Momentus' private placement. Although Momentus and Veraz believe that the expectations in their respective forward-looking statements are reasonable, they are based on factors and assumptions concerning future events which may prove to be inaccurate. Those factors and assumptions are based upon currently available information. Such statements are subject to known and unknown risks, uncertainties and other factors that could influence actual results or events and cause actual results or events to differ materially from those stated, anticipated or implied in the forward-looking statements. As such, readers are cautioned not to place undue reliance on the forward-looking statements, as no assurance can be provided as to future results, levels of activity or achievements. The forward-looking statements contained in this document are made as of the date of this document and, except as required by applicable law, neither Veraz or Momentus undertake any obligation to publicly update or to revise any of the forward-looking statements, whether as a result of new information, future events or otherwise. The forward-looking statements contained in this press release are expressly qualified by this cautionary statement.

Neither the TSX Venture Exchange nor its Regulation Services Provider (as that term is defined in the policies of the TSX Venture Exchange) accepts responsibility for the adequacy or accuracy of this release.

Contacts:
Momentus Energy Corp.
Paul Starnino
President and Chief Executive Officer
(403) 862-2143

Veraz Petroleum Ltd.
Paul Baay
Chairman of the Board
(403) 619-8407

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
Digital Initiatives create new ways of conducting business, which drive the need for increasingly advanced security and regulatory compliance challenges with exponentially more damaging consequences. In the BMC and Forbes Insights Survey in 2016, 97% of executives said they expect a rise in data breach attempts in the next 12 months. Sixty percent said operations and security teams have only a general understanding of each other’s requirements, resulting in a “SecOps gap” leaving organizations u...
In his session at 21st Cloud Expo, Raju Shreewastava, founder of Big Data Trunk, provided a fun and simple way to introduce Machine Leaning to anyone and everyone. He solved a machine learning problem and demonstrated an easy way to be able to do machine learning without even coding. Raju Shreewastava is the founder of Big Data Trunk (www.BigDataTrunk.com), a Big Data Training and consulting firm with offices in the United States. He previously led the data warehouse/business intelligence and Bi...
While some developers care passionately about how data centers and clouds are architected, for most, it is only the end result that matters. To the majority of companies, technology exists to solve a business problem, and only delivers value when it is solving that problem. 2017 brings the mainstream adoption of containers for production workloads. In his session at 21st Cloud Expo, Ben McCormack, VP of Operations at Evernote, discussed how data centers of the future will be managed, how the p...
Cell networks have the advantage of long-range communications, reaching an estimated 90% of the world. But cell networks such as 2G, 3G and LTE consume lots of power and were designed for connecting people. They are not optimized for low- or battery-powered devices or for IoT applications with infrequently transmitted data. Cell IoT modules that support narrow-band IoT and 4G cell networks will enable cell connectivity, device management, and app enablement for low-power wide-area network IoT. B...
Extreme Computing is the ability to leverage highly performant infrastructure and software to accelerate Big Data, machine learning, HPC, and Enterprise applications. High IOPS Storage, low-latency networks, in-memory databases, GPUs and other parallel accelerators are being used to achieve faster results and help businesses make better decisions. In his session at 18th Cloud Expo, Michael O'Neill, Strategic Business Development at NVIDIA, focused on some of the unique ways extreme computing is...
Transformation Abstract Encryption and privacy in the cloud is a daunting yet essential task for both security practitioners and application developers, especially as applications continue moving to the cloud at an exponential rate. What are some best practices and processes for enterprises to follow that balance both security and ease of use requirements? What technologies are available to empower enterprises with code, data and key protection from cloud providers, system administrators, inside...
The Internet of Things will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform and how we integrate our thinking to solve complicated problems. In his session at 19th Cloud Expo, Craig Sproule, CEO of Metavine, demonstrated how to move beyond today's coding paradigm and sh...
With the proliferation of both SQL and NoSQL databases, organizations can now target specific fit-for-purpose database tools for their different application needs regarding scalability, ease of use, ACID support, etc. Platform as a Service offerings make this even easier now, enabling developers to roll out their own database infrastructure in minutes with minimal management overhead. However, this same amount of flexibility also comes with the challenges of picking the right tool, on the right ...
What are the new priorities for the connected business? First: businesses need to think differently about the types of connections they will need to make – these span well beyond the traditional app to app into more modern forms of integration including SaaS integrations, mobile integrations, APIs, device integration and Big Data integration. It’s important these are unified together vs. doing them all piecemeal. Second, these types of connections need to be simple to design, adapt and configure...
Traditional on-premises data centers have long been the domain of modern data platforms like Apache Hadoop, meaning companies who build their business on public cloud were challenged to run Big Data processing and analytics at scale. But recent advancements in Hadoop performance, security, and most importantly cloud-native integrations, are giving organizations the ability to truly gain value from all their data. In his session at 19th Cloud Expo, David Tishgart, Director of Product Marketing ...
More and more companies are looking to microservices as an architectural pattern for breaking apart applications into more manageable pieces so that agile teams can deliver new features quicker and more effectively. What this pattern has done more than anything to date is spark organizational transformations, setting the foundation for future application development. In practice, however, there are a number of considerations to make that go beyond simply “build, ship, and run,” which changes how...
Cloud computing delivers on-demand resources that provide businesses with flexibility and cost-savings. The challenge in moving workloads to the cloud has been the cost and complexity of ensuring the initial and ongoing security and regulatory (PCI, HIPAA, FFIEC) compliance across private and public clouds. Manual security compliance is slow, prone to human error, and represents over 50% of the cost of managing cloud applications. Determining how to automate cloud security compliance is critical...
Traditional IT, great for stable systems of record, is struggling to cope with newer, agile systems of engagement requirements coming straight from the business. In his session at 18th Cloud Expo, William Morrish, General Manager of Product Sales at Interoute, will outline ways of exploiting new architectures to enable both systems and building them to support your existing platforms, with an eye for the future. Technologies such as Docker and the hyper-convergence of computing, networking and...
Adding public cloud resources to an existing application can be a daunting process. The tools that you currently use to manage the software and hardware outside the cloud aren’t always the best tools to efficiently grow into the cloud. All of the major configuration management tools have cloud orchestration plugins that can be leveraged, but there are also cloud-native tools that can dramatically improve the efficiency of managing your application lifecycle. In his session at 18th Cloud Expo, ...
Contextual Analytics of various threat data provides a deeper understanding of a given threat and enables identification of unknown threat vectors. In his session at @ThingsExpo, David Dufour, Head of Security Architecture, IoT, Webroot, Inc., discussed how through the use of Big Data analytics and deep data correlation across different threat types, it is possible to gain a better understanding of where, how and to what level of danger a malicious actor poses to an organization, and to determin...