On July 1, 2013, DSS approved a merger with Lexington Technology Group (LTG) to form DSS Technology Management. The combined company seeks to commercialize and enforce patented technologies within owned operating businesses and investments. DSS Technology Management currently has patent portfolios and litigation matters relating to data structures, user-configurable platforms, and digital anti-counterfeiting. DSS Brand Management focuses on transitioning security printing, packaging and plastics businesses to higher margin opportunities including the AuthentiGuard digital authentication product. Key 2013 strategic goals and milestones include initial AuthentiGuard sales, improving financial results through higher margin products, achieving milestones in current litigation matters, and adding 2-4 new technology investments.
On July 1, 2013, Document Security Systems (DSS) approved a merger with Lexington Technology Group. As a result, Lexington became a wholly-owned subsidiary of DSS and was renamed DSS Technology Management. DSS Technology Management focuses on commercializing and enforcing patented technologies within owned operating businesses and investments across various technology verticals including counterfeit detection, digital authentication, and cloud computing. DSS also operates businesses focused on packaging, printing, and secure IDs and aims to transition these businesses toward higher margin opportunities including the sale of its new digital authentication product AuthentiGuard.
The document is an investor presentation by DSS (Document Security Systems) providing an overview of the company. It summarizes that DSS commercializes patented technologies, has historically focused on anti-counterfeiting, and is now expanding into digital security products. It provides financial highlights on revenue growth and cash position. It outlines DSS' strategic goals to manage its intellectual property portfolio, commercialize new digital products, and improve profitability in manufacturing.
Plaintiffs developed proprietary performance metrics software to track document reviewer performance. They licensed this software to Defendants from 2007-2008. Defendants then terminated the relationship and have been using the software without authorization since, profiting $28 million. Plaintiffs are suing Defendants for copyright infringement, unfair competition, misappropriation of trade secrets, breach of contract and other claims.
The document discusses implementing a public key infrastructure (PKI) strategy. It outlines various considerations for companies including their security needs, possible implementation options of building or outsourcing their PKI, and the benefits of cross-certification which allows different PKIs to trust each other. The conclusion recommends companies clearly define their identity, regulatory, partnership, and interoperability needs to determine the best PKI approach.
This document is a proposal submitted by PCMJ Security Services in response to RFP Number 427.04-107-08 from the State Government Department of Finance and Administration for information security assessment services. The proposal outlines PCMJ's team members and certifications, as well as details about the company's experience, policies, and approach to performing the security assessment and developing policy frameworks for the State if selected for the project.
Orange Legal Technologies provides electronic discovery services including collection, analysis, processing, review, and production of electronic documents and data. It has a proprietary web-accessible platform called OneO that integrates these services, allowing clients to analyze, process, and review data online from a centralized repository. The company has over 40 of the top 200 US law firms as clients and offices in 4 locations, led by an experienced management team with over 136 combined years in the industry.
FTI Technology provided software and on-site services to a large public company facing a potential antitrust matter. FTI professionals deployed to the company's headquarters to conduct a secure internal audit using FTI's e-discovery software. Through processing, culling and analytics features, the data was rapidly assessed, reducing the review set in half. This fast and cost-effective analysis helped the company's legal team develop their strategy.
This document discusses advanced electronic records management and outlines several key points:
1. It describes the need for integration between records management (RM) and information technology (IT) staff and outlines some common barriers between the two disciplines.
2. It identifies various legal requirements that impact federal information and electronic records management, such as the Federal Records Act, Clinger-Cohen Act, and E-Government Act.
3. It provides guidance on how to recognize where RM requirements can be inserted into the planning, development, and implementation of information systems using the Systems Development Life Cycle as a framework.
On July 1, 2013, Document Security Systems (DSS) approved a merger with Lexington Technology Group. As a result, Lexington became a wholly-owned subsidiary of DSS and was renamed DSS Technology Management. DSS Technology Management focuses on commercializing and enforcing patented technologies within owned operating businesses and investments across various technology verticals including counterfeit detection, digital authentication, and cloud computing. DSS also operates businesses focused on packaging, printing, and secure IDs and aims to transition these businesses toward higher margin opportunities including the sale of its new digital authentication product AuthentiGuard.
The document is an investor presentation by DSS (Document Security Systems) providing an overview of the company. It summarizes that DSS commercializes patented technologies, has historically focused on anti-counterfeiting, and is now expanding into digital security products. It provides financial highlights on revenue growth and cash position. It outlines DSS' strategic goals to manage its intellectual property portfolio, commercialize new digital products, and improve profitability in manufacturing.
Plaintiffs developed proprietary performance metrics software to track document reviewer performance. They licensed this software to Defendants from 2007-2008. Defendants then terminated the relationship and have been using the software without authorization since, profiting $28 million. Plaintiffs are suing Defendants for copyright infringement, unfair competition, misappropriation of trade secrets, breach of contract and other claims.
The document discusses implementing a public key infrastructure (PKI) strategy. It outlines various considerations for companies including their security needs, possible implementation options of building or outsourcing their PKI, and the benefits of cross-certification which allows different PKIs to trust each other. The conclusion recommends companies clearly define their identity, regulatory, partnership, and interoperability needs to determine the best PKI approach.
This document is a proposal submitted by PCMJ Security Services in response to RFP Number 427.04-107-08 from the State Government Department of Finance and Administration for information security assessment services. The proposal outlines PCMJ's team members and certifications, as well as details about the company's experience, policies, and approach to performing the security assessment and developing policy frameworks for the State if selected for the project.
Orange Legal Technologies provides electronic discovery services including collection, analysis, processing, review, and production of electronic documents and data. It has a proprietary web-accessible platform called OneO that integrates these services, allowing clients to analyze, process, and review data online from a centralized repository. The company has over 40 of the top 200 US law firms as clients and offices in 4 locations, led by an experienced management team with over 136 combined years in the industry.
FTI Technology provided software and on-site services to a large public company facing a potential antitrust matter. FTI professionals deployed to the company's headquarters to conduct a secure internal audit using FTI's e-discovery software. Through processing, culling and analytics features, the data was rapidly assessed, reducing the review set in half. This fast and cost-effective analysis helped the company's legal team develop their strategy.
This document discusses advanced electronic records management and outlines several key points:
1. It describes the need for integration between records management (RM) and information technology (IT) staff and outlines some common barriers between the two disciplines.
2. It identifies various legal requirements that impact federal information and electronic records management, such as the Federal Records Act, Clinger-Cohen Act, and E-Government Act.
3. It provides guidance on how to recognize where RM requirements can be inserted into the planning, development, and implementation of information systems using the Systems Development Life Cycle as a framework.
The impact of regulatory compliance on DBA(latest)Craig Mullins
The document discusses how increasing regulatory compliance is impacting database administration. It outlines several key regulations and how they influence data quality, long-term data retention, database security, auditing, and controls over database administration procedures. Compliance is driving the need for improved data management practices to ensure data is properly protected, retained, and accessible over time. Failure to comply can result in significant fines or prosecution.
Why Have A Digital Investigative InfrastructureKevin Wharram
The document discusses the need for digital investigative infrastructure. It outlines the costs of data breaches, how data is stolen, and challenges in protecting data. Methods of data theft include portable storage devices, email, and exploiting vulnerabilities. The document recommends following an incident response plan if data is compromised, and describes how the EnCase digital investigative platform can help conduct thorough forensic investigations across the network to identify security incidents and data policy violations.
Lance Michalson provides an overview of ICT regulatory compliance in South Africa. He discusses the current legal compliance landscape and examples of compliance issues and technology legal risks. Key pieces of ICT legislation in South Africa are also examined, including the stages of developing an act of parliament. Issues related to privacy, monitoring communications, and critical databases are also summarized.
Positive id PositiveID Corporation (OTCBB:PSID) Conference PresentationInvestorideas.com
PositiveID Corporation (OTCBB:PSID) develops unique medical devices and molecular diagnostic systems, focused primarily on diabetes management, rapid medical testing and airborne bio-threat detection. Its wholly-owned subsidiary, MFS, is focused on the development of microfluidic systems for automated preparation of and performance of biological assays.
Protecting Intellectual Property and Data Loss Prevention (DLP)Arpin Consulting
Protecting Intellectual Property and Data Loss Prevention (DLP) – what makes your business unique, different, valuable, and attracts clients and customers - presented at the Boston Business Alliance 9/23/09
This document discusses information security professional certifications. It describes the DoD Directive 8570.01 that requires DoD personnel and contractors to obtain security certifications. The directive is being replaced by DoDD 8140.01, which identifies new cybersecurity roles. Popular vendor-neutral certifications include those from (ISC)2 like the CISSP, and GIAC certifications offered through the SANS Institute. Vendor-specific certifications also exist.
Learn if you’ve got the right security strategy, and investment plan, to protect your organization and ensure regulatory compliance with the General Data Protection Regulation (GDPR). Watch now here: https://symc.ly/2VMNHIm
Pci compliance without compensating controls how to take your mainframe out ...Ulf Mattsson
The document advertises a complimentary webinar about achieving PCI compliance on mainframes without using compensating controls. It discusses how PCI DSS v2.0 requires all stored cardholder data to be identified, protected, or deleted. Using new mainframe data discovery and tokenization tools, organizations can now quickly discover and map cardholder data in the mainframe, tokenize it, and permanently eliminate it from scope of PCI compliance. The webinar will cover new PCI DSS v2.0 requirements, automated mainframe data discovery, and how the combination of discovery and tokenization can support ongoing PCI compliance without impacting performance or existing SLAs.
Implant Sciences (OTCQB:IMSC) is the leader in next generation Explosives Trace Detection (ETD), and established counter-terrorism technology that detects and identifies threats from the small amounts left behind after a person handles explosives. Implant Sciences' security solutions are used worldwide for aviation, public transport, customs, air cargo, critical infrastructure, ports/ borders, and emergency response. The Company has thousands of units deployed to over 50 countries, and its trace detectors have been successfully used at the Sochi Olympics, Beijing Olympics, the Universiade Games, and the Special Olympics.
In January 2013, the Company became only the third ETD manufacturer, and the sole American-owned company, to have product approval from the US Transportation Security Administration. With advanced capabilities including superior sensitivity, automatic internal calibration, rapid clear-down, ush button maintenance, and administration of trace detection. Company's handheld QS-H150 and desktop QS-B220 simplify the use, maintenance, and administration of trace detection. www.implantsciences.com
Global Finance, Inc. (GFI) is a financial company that manages thousands of accounts across North America and employs over 1,600 people. As the Computer Security Manager, you are responsible for protecting GFI's information systems and data. However, the CEO believes IT can be outsourced to cut costs, leading to budget and staff cuts that concern the COO. You must address security issues to convince the CEO of the value an internal IT department provides.
Security 360, LLC is a veteran-owned small business that provides cyber security solutions and information assurance consulting services. It is headquartered in Maryland and has over 25 years of experience supporting government agencies. It offers services such as penetration testing, vulnerability assessments, secure application development, and compliance with standards like FISMA and NIST. The company works with clients in industries like government, healthcare, and financial services to address challenges like implementing security requirements and maintaining compliance.
IRJET- Secured Real Estate Transactions using Blockchain TechnologyIRJET Journal
This document discusses using blockchain technology to improve security and transparency in real estate transactions. It begins with an introduction to blockchain and its key characteristics of decentralization, immutability, and auditability. These traits could help reduce costs and improve efficiency in the real estate industry by establishing a secure and permanent record of transactions. The document then reviews related work applying blockchain to real estate and discusses how a blockchain-based system could structure real estate transactions with improved traceability and data integrity. Challenges of early adoption are also noted.
Evolving regulations are changing the way we think about tools and technologyUlf Mattsson
Discover the latest in RegTech and stay up-to-date on compliance tools and best practices.
The move to digital has meant that many organizations have had to rethink legacy systems.
They need to put the customer first, focus on the Customer Experience and Digital Experience Platforms.
They also need to understand the latest in RegTech and solutions for hybrid cloud.
We will discuss Regtech for the financial industry and related technologies for compliance.
We will discuss new International Standards, tools and best practices for financial institutions including PCI v4, FFIEC, NACHA, NIST, GDPR and CCPA.
We will discuss related technologies for Data Security and Privacy, including data de-identification, encryption, tokenization and the new API Economy.
Sans Tech Paper Hardware Vs Software Encryptionharshadthakar
This document compares software-based disk encryption and hardware-based disk encryption using Seagate Secure. It discusses barriers to adoption of encryption, how software-based encryption works by using the CPU for encryption/decryption, and how hardware-based encryption moves this functionality into the hard disk drive. A hands-on evaluation of software-based encryption and Seagate Secure found that hardware-based encryption had significantly better performance since it offloads encryption/decryption from the CPU.
The document discusses access controls, which are processes that protect resources by only allowing authorized users to use them. It covers physical and logical access controls and the four components of access control: identification, authentication, authorization, and accountability. Authentication methods like passwords, tokens, and biometrics are described. Formal access control models like discretionary access control and mandatory access control are also summarized.
Emerging application and data protection for multi cloudUlf Mattsson
Emerging Application and Data Protection for Multi-Cloud
Personal data privacy will be the most prominent issue affecting how businesses gather, store, process, and disclose data in public cloud. Businesses have been inundated with information on what recent privacy laws like GDPR and CCPA require, but many are still trying to figure out how to comply with them on a practical level. Many companies are focusing on data privacy from the legal and security side, which are foundational, but are missing the focus on data. The good news is that these data privacy regulations compel businesses to get a handle on personal data - how they get it, where they get it from, which systems process it, where it goes internally and externally, etc. In other words, the new norms of data privacy require proactive data management, which enables organizations to extract real business value from their data, improve the customer experience, streamline internal processes, and better understand their customers. The new Verizon Data Breach Investigations Report (DBIR) provides perspectives on how Criminals simply shift their focus and adapt their tactics to locate and steal the data they find to be of most value. This session will discuss Emerging Application and Data Protection for Multi-cloud and review Differential privacy, Tokenization, Homomorphic encryption, and Privacy-preserving computation.
GDPR is a European Union regulation that protects personal data and privacy. It applies to DNA project administrators and requires them to respect members' rights such as access to personal data. Project admins should minimize risks of complaints by informing members of personal data held, obtaining consent, and responding promptly to requests. If a data breach or complaint occurs, project admins should consider notifying the DNA testing company.
This document provides an overview of North American Palladium's Lac des Iles mine. It summarizes that the mine has increased proven and probable reserves to 1.3 million ounces of palladium through 2019. It also notes 57 million tonnes of measured and indicated resources beyond reserves, and 15.7 million tonnes of inferred resources. The presentation outlines plans to increase mining rates to 5,000 tonnes per day by the end of 2014 in order to lower costs and extend the mine life.
NAP is a primary palladium producer with its LDI mine in Ontario, Canada. It has a clear strategy to increase production at LDI to 170,000-175,000 ounces in 2014 while lowering costs to $450/ounce. LDI provides leverage to rising palladium prices driven by constrained mine supply and growing demand for palladium from the automotive sector. NAP has additional upside from exploration and development at LDI to leverage its existing infrastructure. The presentation provides an overview of NAP's assets and investment opportunity.
The impact of regulatory compliance on DBA(latest)Craig Mullins
The document discusses how increasing regulatory compliance is impacting database administration. It outlines several key regulations and how they influence data quality, long-term data retention, database security, auditing, and controls over database administration procedures. Compliance is driving the need for improved data management practices to ensure data is properly protected, retained, and accessible over time. Failure to comply can result in significant fines or prosecution.
Why Have A Digital Investigative InfrastructureKevin Wharram
The document discusses the need for digital investigative infrastructure. It outlines the costs of data breaches, how data is stolen, and challenges in protecting data. Methods of data theft include portable storage devices, email, and exploiting vulnerabilities. The document recommends following an incident response plan if data is compromised, and describes how the EnCase digital investigative platform can help conduct thorough forensic investigations across the network to identify security incidents and data policy violations.
Lance Michalson provides an overview of ICT regulatory compliance in South Africa. He discusses the current legal compliance landscape and examples of compliance issues and technology legal risks. Key pieces of ICT legislation in South Africa are also examined, including the stages of developing an act of parliament. Issues related to privacy, monitoring communications, and critical databases are also summarized.
Positive id PositiveID Corporation (OTCBB:PSID) Conference PresentationInvestorideas.com
PositiveID Corporation (OTCBB:PSID) develops unique medical devices and molecular diagnostic systems, focused primarily on diabetes management, rapid medical testing and airborne bio-threat detection. Its wholly-owned subsidiary, MFS, is focused on the development of microfluidic systems for automated preparation of and performance of biological assays.
Protecting Intellectual Property and Data Loss Prevention (DLP)Arpin Consulting
Protecting Intellectual Property and Data Loss Prevention (DLP) – what makes your business unique, different, valuable, and attracts clients and customers - presented at the Boston Business Alliance 9/23/09
This document discusses information security professional certifications. It describes the DoD Directive 8570.01 that requires DoD personnel and contractors to obtain security certifications. The directive is being replaced by DoDD 8140.01, which identifies new cybersecurity roles. Popular vendor-neutral certifications include those from (ISC)2 like the CISSP, and GIAC certifications offered through the SANS Institute. Vendor-specific certifications also exist.
Learn if you’ve got the right security strategy, and investment plan, to protect your organization and ensure regulatory compliance with the General Data Protection Regulation (GDPR). Watch now here: https://symc.ly/2VMNHIm
Pci compliance without compensating controls how to take your mainframe out ...Ulf Mattsson
The document advertises a complimentary webinar about achieving PCI compliance on mainframes without using compensating controls. It discusses how PCI DSS v2.0 requires all stored cardholder data to be identified, protected, or deleted. Using new mainframe data discovery and tokenization tools, organizations can now quickly discover and map cardholder data in the mainframe, tokenize it, and permanently eliminate it from scope of PCI compliance. The webinar will cover new PCI DSS v2.0 requirements, automated mainframe data discovery, and how the combination of discovery and tokenization can support ongoing PCI compliance without impacting performance or existing SLAs.
Implant Sciences (OTCQB:IMSC) is the leader in next generation Explosives Trace Detection (ETD), and established counter-terrorism technology that detects and identifies threats from the small amounts left behind after a person handles explosives. Implant Sciences' security solutions are used worldwide for aviation, public transport, customs, air cargo, critical infrastructure, ports/ borders, and emergency response. The Company has thousands of units deployed to over 50 countries, and its trace detectors have been successfully used at the Sochi Olympics, Beijing Olympics, the Universiade Games, and the Special Olympics.
In January 2013, the Company became only the third ETD manufacturer, and the sole American-owned company, to have product approval from the US Transportation Security Administration. With advanced capabilities including superior sensitivity, automatic internal calibration, rapid clear-down, ush button maintenance, and administration of trace detection. Company's handheld QS-H150 and desktop QS-B220 simplify the use, maintenance, and administration of trace detection. www.implantsciences.com
Global Finance, Inc. (GFI) is a financial company that manages thousands of accounts across North America and employs over 1,600 people. As the Computer Security Manager, you are responsible for protecting GFI's information systems and data. However, the CEO believes IT can be outsourced to cut costs, leading to budget and staff cuts that concern the COO. You must address security issues to convince the CEO of the value an internal IT department provides.
Security 360, LLC is a veteran-owned small business that provides cyber security solutions and information assurance consulting services. It is headquartered in Maryland and has over 25 years of experience supporting government agencies. It offers services such as penetration testing, vulnerability assessments, secure application development, and compliance with standards like FISMA and NIST. The company works with clients in industries like government, healthcare, and financial services to address challenges like implementing security requirements and maintaining compliance.
IRJET- Secured Real Estate Transactions using Blockchain TechnologyIRJET Journal
This document discusses using blockchain technology to improve security and transparency in real estate transactions. It begins with an introduction to blockchain and its key characteristics of decentralization, immutability, and auditability. These traits could help reduce costs and improve efficiency in the real estate industry by establishing a secure and permanent record of transactions. The document then reviews related work applying blockchain to real estate and discusses how a blockchain-based system could structure real estate transactions with improved traceability and data integrity. Challenges of early adoption are also noted.
Evolving regulations are changing the way we think about tools and technologyUlf Mattsson
Discover the latest in RegTech and stay up-to-date on compliance tools and best practices.
The move to digital has meant that many organizations have had to rethink legacy systems.
They need to put the customer first, focus on the Customer Experience and Digital Experience Platforms.
They also need to understand the latest in RegTech and solutions for hybrid cloud.
We will discuss Regtech for the financial industry and related technologies for compliance.
We will discuss new International Standards, tools and best practices for financial institutions including PCI v4, FFIEC, NACHA, NIST, GDPR and CCPA.
We will discuss related technologies for Data Security and Privacy, including data de-identification, encryption, tokenization and the new API Economy.
Sans Tech Paper Hardware Vs Software Encryptionharshadthakar
This document compares software-based disk encryption and hardware-based disk encryption using Seagate Secure. It discusses barriers to adoption of encryption, how software-based encryption works by using the CPU for encryption/decryption, and how hardware-based encryption moves this functionality into the hard disk drive. A hands-on evaluation of software-based encryption and Seagate Secure found that hardware-based encryption had significantly better performance since it offloads encryption/decryption from the CPU.
The document discusses access controls, which are processes that protect resources by only allowing authorized users to use them. It covers physical and logical access controls and the four components of access control: identification, authentication, authorization, and accountability. Authentication methods like passwords, tokens, and biometrics are described. Formal access control models like discretionary access control and mandatory access control are also summarized.
Emerging application and data protection for multi cloudUlf Mattsson
Emerging Application and Data Protection for Multi-Cloud
Personal data privacy will be the most prominent issue affecting how businesses gather, store, process, and disclose data in public cloud. Businesses have been inundated with information on what recent privacy laws like GDPR and CCPA require, but many are still trying to figure out how to comply with them on a practical level. Many companies are focusing on data privacy from the legal and security side, which are foundational, but are missing the focus on data. The good news is that these data privacy regulations compel businesses to get a handle on personal data - how they get it, where they get it from, which systems process it, where it goes internally and externally, etc. In other words, the new norms of data privacy require proactive data management, which enables organizations to extract real business value from their data, improve the customer experience, streamline internal processes, and better understand their customers. The new Verizon Data Breach Investigations Report (DBIR) provides perspectives on how Criminals simply shift their focus and adapt their tactics to locate and steal the data they find to be of most value. This session will discuss Emerging Application and Data Protection for Multi-cloud and review Differential privacy, Tokenization, Homomorphic encryption, and Privacy-preserving computation.
GDPR is a European Union regulation that protects personal data and privacy. It applies to DNA project administrators and requires them to respect members' rights such as access to personal data. Project admins should minimize risks of complaints by informing members of personal data held, obtaining consent, and responding promptly to requests. If a data breach or complaint occurs, project admins should consider notifying the DNA testing company.
This document provides an overview of North American Palladium's Lac des Iles mine. It summarizes that the mine has increased proven and probable reserves to 1.3 million ounces of palladium through 2019. It also notes 57 million tonnes of measured and indicated resources beyond reserves, and 15.7 million tonnes of inferred resources. The presentation outlines plans to increase mining rates to 5,000 tonnes per day by the end of 2014 in order to lower costs and extend the mine life.
NAP is a primary palladium producer with its LDI mine in Ontario, Canada. It has a clear strategy to increase production at LDI to 170,000-175,000 ounces in 2014 while lowering costs to $450/ounce. LDI provides leverage to rising palladium prices driven by constrained mine supply and growing demand for palladium from the automotive sector. NAP has additional upside from exploration and development at LDI to leverage its existing infrastructure. The presentation provides an overview of NAP's assets and investment opportunity.
NAP operates the Lac des Iles mine in Ontario, Canada, one of only two primary palladium mines in the world. The presentation provides an overview of NAP's operations including:
1) Guidance for 2014 of producing 170-175k ounces of palladium at a cash cost of $550/ounce, declining to $450/ounce in Q4.
2) An updated life of mine plan extending the mine life to 2019 with proven and probable reserves of 1.3 million ounces of palladium.
3) Exploration and development upside from existing infrastructure with a $10 million exploration budget to expand resources at depth and along strike.
4) Q1 2014 results that exceeded guidance with
NAP is an investment opportunity in the palladium market. It owns the Lac des Iles mine, one of only two primary palladium mines globally. The mine is undergoing an expansion to increase production and reduce costs per ounce. Palladium fundamentals are strong due to constrained supply and increasing demand from the automotive sector. NAP offers production growth through the mine expansion and exploration upside on its properties.
NAP is an investment opportunity in the palladium market. It owns the Lac des Iles mine, one of only two primary palladium mines globally. The mine is undergoing an expansion to increase production and reduce costs per ounce. Palladium fundamentals are strong due to constrained supply and increasing demand from the automotive sector. NAP offers production growth through the mine expansion and exploration upside on its properties.
NIRI Capital Social Media and Investor Relations - January 6, 2010Darrell Heaps
Slides from a presentation I gave to the NIRI Capital Area Chapter on Jan 6, 2010. Some of the slides are repetitive from previous presentations. Includes an overview of the recent trends of how social media is being used for investor relations.
NAP's Lac des Iles mine is a world-class palladium asset that is nearing completion of an expansion to increase production. The expansion targets reaching approximately 4,000 tonnes per day by 2014 through utilization of a new shaft and bulk mining methods. This is expected to lower costs and increase profitability. Additionally, there is significant exploration and development upside to leverage existing infrastructure including at depth, laterally, and through evaluation of a new mining method. The document outlines NAP's investment proposition including production growth, leverage to rising palladium prices, attractive jurisdiction, and development/exploration upside at Lac des Iles.
- Palladium prices are forecasted to reach historical highs of up to $1,000/oz due to a supply deficit. Demand has historically exceeded mine supply and is expected to continue growing.
- Mine supply is constrained and unable to match rising demand. Over 80% of global mine supply comes from Russia and South Africa, which are high-risk jurisdictions.
- Only 6.3 million ounces of palladium are produced annually worldwide from mines. Major producers in Russia and South Africa have shown constrained production.
NAP's Lac des Iles mine in Ontario, Canada is one of only two primary palladium mines in the world. The presentation discusses expanding production at LDI through mine expansion projects which offer production growth and decreasing cash costs. It also notes significant development and exploration upside at LDI and other properties to complement existing mill capacity and infrastructure. Management is experienced and aims to reduce risks through projects at LDI, which has been producing palladium for 20 years.
This investor presentation provides an overview of North American Palladium Ltd. (NAP) and its Lac des Iles palladium mine in Ontario, Canada. Some key points:
- The palladium market is expected to remain in deficit due to growing demand from automotive sector and constrained supply from Russia and South Africa.
- NAP's LDI mine is a world-class asset with significant exploration upside potential to increase reserves and resources.
- In 2014, NAP aims to increase production to 170,000-175,000 ounces of palladium at a lower cash cost of $450/ounce by the fourth quarter through expanding mining rates and operational improvements.
- NAP has a strong balance
This investor presentation provides an overview of North American Palladium Ltd.'s Lac des Iles palladium mine in Ontario, Canada. Some key points:
- The palladium market is expected to remain in deficit due to constrained global supply and growing demand from the automotive sector.
- Lac des Iles is a world-class asset with significant exploration potential. Production is increasing while costs are decreasing.
- In 2014, guidance includes producing 170,000-175,000 ounces of palladium at a cash cost of around $550/ounce, declining to $450/ounce by Q4.
- Exploration drilling continues to show promise in expanding the Offset Zone resource at depth and along strike.
The document is an investor presentation for North American Palladium. It discusses NAP's investment case including its clear growth strategy to increase palladium production and lower costs through expanding its LDI mine. As one of only two primary palladium producers, NAP is uniquely positioned to benefit from constrained mine supply and rising demand driven by global vehicle production growth. NAP operates in a low-risk jurisdiction with exploration upside and excess milling capacity to accelerate production from new discoveries.
The document discusses North American Palladium's investment case and provides an overview of the company. It summarizes that NAP operates the Lac des Iles mine, one of only two primary palladium mines in the world. NAP is undergoing an expansion to increase palladium production to over 250,000 ounces annually at reduced cash costs below $300 per ounce. The Lac des Iles mine has additional exploration upside and excess milling capacity to support future production growth.
Legacy Education Alliance, Inc. is a leading international provider of practical education on topics such as personal finance, entrepreneurship, real estate, and financial markets. It operates globally through brands such as Rich Dad Education and has served over 2 million students. While its flagship brand is based on Robert Kiyosaki's Rich Dad Poor Dad, it is diversifying its offerings through new brands and markets. The company sees opportunities for growth through expanding its online courses and presence in international markets like South Africa and Hong Kong.
The document is an investor presentation for a mining company that discusses the investment case for palladium. It notes that global palladium supply is constrained, with over 80% coming from Russia and South Africa, which face operating challenges. Demand is growing, led by the automotive sector where palladium is used in catalytic converters. Stricter emissions regulations are driving increased palladium loadings in converters. The company is well positioned to benefit from these supply and demand fundamentals as a primary palladium producer.
The document provides an overview of North American Palladium's Lac des Iles palladium mine in Ontario, Canada. It discusses the constrained global palladium supply outlook and growing demand drivers. NAP's Lac des Iles mine is a world-class asset with significant exploration potential and excess processing capacity. The mine is forecast to increase production to over 200,000 ounces of palladium per year while lowering costs, leveraging existing infrastructure. Drilling programs aim to expand reserves and resources in high priority areas of the mine.
Fiscal Third Quarter 2013 Investor PresentationThor_Industries
This presentation discusses Thor Industries, the world's largest manufacturer of RVs. It notes that Thor has a diversified product range including travel trailers, fifth wheels, motorhomes, buses, and ambulances. The presentation highlights Thor's strong market leadership position in RVs and buses. It also summarizes Thor's financial performance, competitive advantages, and outlook. Key points include record sales and profits in fiscal year 2012, optimism from dealers about consumer demand, and Thor's focus on continued growth and margin expansion.
This 3-sentence summary provides the high-level information from the investor presentation document:
Multiplus is a growing loyalty network in Brazil with around 9 million members as of 3Q11, connecting individuals and companies through a network of partnerships that allows members to collect and redeem points across various programs. The company has an innovative business model that generates profit from points selling and expiration, requires low capital expenditures, and aims to diversify its gross billings and redemptions away from over-reliance on its major partner TAM Airlines through expanding its partnerships network. Multiplus intends for this strategy to lead to long term margin expansion as it increases the average unit price of points and decreases the average unit cost of rewards.
- Castle Peak Mining is a Canadian exploration company focused on advancing gold projects in Ghana's Ashanti Belt.
- The company has an experienced management team with a track record of success in Ghana and owns strategic land packages adjacent to producing mines.
- Castle Peak is currently funded to conduct quality exploration with $12 million in market capitalization and strategic partnerships providing $4 million in investment.
- The presentation provides an overview of Castle Peak Mining's projects and credentials to identify new resources through systematic exploration in Ghana.
This document provides an investor presentation for Hospitality Properties Trust for Q4 2015. It summarizes HPT's diversified portfolio of 302 hotels and 193 travel centers across the US, operated under leading brands like Marriott, Intercontinental, and Travel Centers of America. It highlights recent portfolio renovation activity and notes that HPT's hotel portfolio has outperformed industry RevPAR growth for the past 12 quarters. Financial metrics like coverage, EBITDA, and FFO are improving. Examples of specific properties in the portfolio are also provided.
A Non-Confidential Slide Deck for CSR-Support and its dba Cyber Support Solutions. We have a proprietary solution to stop Data Breaches and allow personal liberties from the same computer terminal.
The document discusses a proposed merger between Document Security Systems (DSS) and Lexington Technology Group (LTG). DSS provides anti-counterfeiting technologies and owns several patents, while LTG focuses on patent holding, management, and monetization. The merger is expected to close on July 1, 2013 and combine DSS's security technologies and IP portfolio with LTG's expertise in patent licensing and enforcement. The combined company plans to leverage its security patents and LTG's experience to expand licensing opportunities. Management profiles of the combined leadership team are provided.
This document provides an overview of Document Security Systems, Inc. (DSS), a company that acquires, develops, produces, and licenses innovative technologies founded on strong intellectual property. DSS focuses on three verticals: brand protection, software and internet, and hardware and peripherals. It has a growing portfolio of over 150 patents and patent applications and is pursuing several patent infringement cases. The presentation outlines DSS's business model, technology portfolio, financial performance, and growth opportunities in intellectual property licensing and commercializing its anti-counterfeiting products.
CIO priorities and Data Virtualization: Balancing the Yin and Yang of the ITDenodo
Watch here: https://bit.ly/3iGMsH6
Today’s CIOs carry a paradoxical responsibility of balancing the yin and yang of the Business – IT interface. That is, "Backroom IT’s quest for Stability" with the “Frontline Business’ need for Agility".
A paradox that is no longer optional, but is essential. A paradox that defines the business competitiveness, business survival, and business sustainability. Also enables the visibility to the fuzzy future.
“Trusted Data Foundation with Data Virtualization” provides a powerful ammunition in the hands of the CIO, to effectively balance these Yin and Yang at the speed of the business. In a trusted, compliant, auditable, flexible and regulated fashion.
Find out more on how you can enhance the competitive edge for your business in the CIO special webinar from COMPEGENCE and DENODO.
VetsAmerica Vets GWAC Team CapabilitiesVetsAmerica
The document provides an overview of the capabilities available through the VetsAmerica GWAC contract. It describes the contract terms and lists 22 major capability areas such as systems design and development, telecommunications and networking, information security and assurance, and program and project management. These capabilities are offered through a team of 36 companies, over half of which are veteran-owned small businesses. The team brings extensive federal government experience and aims to develop unique, customized solutions that leverage agencies' existing infrastructure and strengthen end user experiences.
Linda Lopez Resume 20170130 IT SecurityLinda Lopez
Linda Lopez has over 20 years of experience in IT security, compliance, and application engineering. She has a proven track record of increasing security and reducing risk and costs at previous employers. Her core competencies include application, infrastructure, and data security compliance, Oracle application engineering, and business process reengineering. She holds certifications in CISA, MCSE, and MCP.
Maris-Tech is a leading B2B provider of intelligent video transmission technology, founded by veterans of the Israel technology sector with extensive electrical engineering and imaging experience. Our products are designed to meet the growing demands of commercial and tactical applications, delivering high-performance, compact, low power and low latency solutions to companies worldwide, including leading electro-optical payload, RF datalink and unmanned platform manufacturers as well as defense, HLS, and communication companies.
The document discusses the risks associated with big data, including increased data production leading to higher costs of replication and storage, evolving privacy and security regulations, and growing litigation and discovery obligations. It notes that most of the significant risks and costs of big data are not clearly visible and addresses challenges in areas like existing infrastructure, regulatory compliance, contracting, data retention, and eDiscovery.
Veronica E. Fornash has over 30 years of experience as an IT professional with expertise in software development, system integration, and project management. She has worked in various industries including finance, insurance, and healthcare. Her technical skills include languages like COBOL, SQL, and C++, and software like CICS, DB2, and Microsoft Office. She currently works as a Technology Assistant Vice President at JPMorgan Chase where she manages projects and acts as a technical lead.
Rohit Devgun has over 15 years of experience as an IT project manager, delivering projects on-time and on-budget across industries including banking, payments, insurance, and finance. He has strong skills in project management, change management, communication, payments systems, and learning new technologies such as Java/J2EE, web services, and IBM middleware.
The document summarizes the global eDiscovery market. Key points include:
- eDiscovery solutions help organizations facilitate business processes by allowing them to exchange, review, collect, and preserve electronically stored information.
- Increasing mobile device usage, regulatory compliance needs, and a focus on reducing legal costs are driving demand for eDiscovery solutions.
- Vendors are focusing on partnerships, mergers, and acquisitions to expand their footprints and integrate new technologies into their solutions.
- North America currently dominates the market but Asia Pacific is expected to see strong growth in the coming years.
This document contains a professional summary for Amit Kumar Jha, including details about his 13 years of experience in information technology roles focused on enterprise data management, data modeling, and application development using technologies like Markit EDM, Riversand MDM, and Microsoft .NET. It provides an overview of his technical skills and experience working on projects for clients like Delaware Investments, Citi Group, ING Investment Management, and others.
Ciso round table on effective implementation of dlp & data securityPriyanka Aash
The document discusses an effective implementation of data loss prevention (DLP) and data security. It covers key factors like the evolving threat landscape, business drivers for DLP, common challenges, and approaches to solve data security issues. An effective methodology is proposed, including identifying critical data and channels, deploying suitable policies, monitoring incidents, and establishing governance through continuous review and improvement. Critical success factors include business involvement, a phased implementation approach, and repeating the plan-do-check-act cycle periodically. The expected project outcomes are protection of critical channels, improved data tracking and awareness, and happier customers and auditors.
SPEED, LLC is a startup company that has developed a patented load-balancing algorithm to increase bandwidth and efficiency in data centers. The algorithm reduces packet latency, minimizes bottlenecks, and cuts energy costs by 35%. SPEED's target market is telecommunications providers and their initial focus is the southeast US market. The business plan outlines SPEED's management team, sales and marketing strategy, and financial projections, which anticipate $1.5 million in sales in year 1 and being acquired for profit within 5 years.
A successful data governance capability requires a strategy to align regulatory drivers and technology enhancement initiatives with business needs and objectives, taking into account the organizational, technological and cultural changes that will need to take place.
This resume is for Narendra Kolla, who currently works as a Technology Lead at Infosys Technologies Limited. He has over 12 years of experience working on various projects for clients like Experian, Aon Hewitt, MetLife, and LTCP. Some of the key technologies and skills listed in his resume include Java, J2EE, SQL, Oracle, Struts, and various software development processes.
HI Team,
I am looking for a job change. I am having 5+ years of development and 1 year of Pen testing Experience. I am looking for Hyderabad location. Details below
Relevant IT Experience: 5.7 Years
Web application security testing Exp : 1 year
Contact number: 9742855955
Notice period: 90 days (Negotiable)
Current Location: Bangalore
Preferred Location: Hyderabad
Thanks,
Raju
Intecracy Group is one of the leading professional groups of companies specialized in project and business consulting, the development of complex software solutions and project integration management of software solutions for corporate clients, governmental agencies, NGOs and startups.
Regulation and Compliance in the Data Driven EnterpriseDenodo
This document discusses regulation and compliance in data-driven enterprises. It outlines Hortonworks' capabilities for addressing compliance requirements like GDPR through its Hortonworks DataPlane service and open source building blocks. Key capabilities include data discovery, classification, lineage, access controls, and monitoring to enable features like consent management, data subject rights, and breach reporting. The presentation concludes by thanking the audience.
ZIGRAM is a data technology organization that operates in the Data Asset space.
Our team is made up of professionals from varied domains like data science, technology, sales, risk, analytics, financial services, research, and business consulting.
Our aim is to deliver value to clients by Building Solutions, Developing Data Assets, and Managing Projects across use cases - thereby boosting revenues and reducing the cost of doing business, in a data-driven world.
Presentation Clayton Valley, NevadaFrom Drilling to PEA in under 2 YearsCompany Spotlight
The document summarizes Cypress Development Corp's Clayton Valley lithium project in Nevada. Key points include:
- A Preliminary Economic Assessment shows promising economics including a 32.7% IRR and $1.45 billion NPV.
- Measured and indicated resources total 8.9 million tonnes LCE with additional inferred resources.
- The project has the potential for low-cost production due to favorable geology and metallurgy.
- Upcoming catalysts in 2019 include a metallurgical study and prefeasibility study to further de-risk the project.
Aben Resources has made a new high-grade gold discovery at its flagship Forrest Kerr project in BC's Golden Triangle region. The region is known for major gold deposits and saw $100 million in exploration spending in 2017. Recent improvements have made the Forrest Kerr project more accessible via new roads. Aben's technical team has reinterpreted historical data and identified additional exploration targets. The project covers over 23,000 hectares of prospective geology along the Forrest Kerr fault zone that is similar to other major deposits in the Golden Triangle.
Aben Resources has discovered high-grade gold zones at its Forrest Kerr project in British Columbia's Golden Triangle. The first hole of the 2018 drill program intersected four separate high-grade gold zones within 190 metres, including 331.0 g/t Au over 1.0 metre. Aben plans to expand drilling at the Boundary North Zone and test other gold anomalies identified through soil sampling. The company also holds the Justin project in Yukon and Chico project in Saskatchewan near recent discoveries.
Cypress Development Corp. owns lithium claims in Clayton Valley, Nevada near Albemarle's Silver Peak lithium mine. A preliminary economic assessment found the project could have a 32.7% IRR and $1.45 billion NPV. The project would extract lithium from claystone using leaching and have average annual production of 24,042 tonnes of lithium carbonate over 40 years. Capital costs are estimated at $482 million to build a 15,000 tonne per day operation.
The document discusses Aben Resources Ltd., a gold exploration company with projects in British Columbia's Golden Triangle region and other areas of Western Canada. It provides an overview of Aben's management team and directors, flagship Forrest Kerr project, recent drilling results showing new high-grade gold discoveries, and its strategy to advance exploration through 2018. The document also briefly outlines Aben's other projects including the Chico gold project in Saskatchewan and Justin gold project in Yukon.
Cypress Development Corp. owns the Clayton Valley lithium project in Nevada. Drilling in 2017 intersected lithium-bearing claystone averaging 921 ppm Li over 77 meters thick. A maiden resource estimate calculated 3.287 million tonnes of lithium carbonate equivalent in the indicated category and 2.916 million tonnes LCE in inferred. Metallurgical tests show the claystone is acid leachable and able to recover over 80% of the lithium. Cypress plans additional drilling, engineering studies, and permitting to advance the project towards production.
- Aben Resources has three highly prospective gold projects in Western Canada including its flagship Forrest Kerr Project in BC's Golden Triangle region, which had recent drilling success expanding the Boundary North Zone.
- Management has over 100 years of combined experience in Western Canada and a proven track record of success.
- The projects have significant historic work identifying high-grade gold and robust discovery potential remains.
Cypress Development Corp. owns the Clayton Valley lithium project in Nevada. Drilling in 2017 intersected lithium-bearing claystone averaging 921 ppm Li over 77 meters. A maiden resource estimate classified over 1.3 million tonnes of lithium carbonate equivalent as indicated and inferred. Metallurgical testing shows the claystone is leachable with over 80% lithium recovery. Cypress aims to advance the project with engineering studies and further drilling to define resources with the goal of becoming a domestic lithium producer for the growing battery market.
The document provides forward-looking statements and discusses risks associated with such statements. It notes that some statements may be deemed forward-looking and lists factors that could cause actual results to differ from forward-looking statements. The document also identifies the qualified person for the technical information as Cornell McDowell and provides Aben's trading symbols and recent share information.
The document provides an overview of Aben Resources Ltd., a mineral exploration company with gold projects in Western Canada. It summarizes Aben's three key projects - Forrest Kerr in BC's Golden Triangle region with recent drill results discovering the Boundary Zone, Chico in Saskatchewan near producing mines, and Justin in Yukon's White Gold district. It outlines the management team's expertise and provides company details like shares outstanding and trading symbols.
- Cypress Development Corp owns the Clayton Valley lithium project in Nevada located near Albemarle's Silver Peak lithium brine operation.
- Drilling in 2017 encountered lithium mineralization averaging 921 ppm Li over 77 meters in 14 holes drilled.
- Metallurgical tests show the claystone is acid leachable with over 80% lithium extraction possible.
- Cypress aims to define a resource estimate in 2018 and advance the project with feasibility studies to develop a lithium operation.
The document discusses forward-looking statements and provides disclaimers about them. It introduces the qualified person for the technical information presented. It also lists Aben's trading symbols and recent share information including price and market capitalization.
1) Cypress Development Corp owns the Clayton Valley lithium project located next to Albemarle's Silver Peak mine in Nevada. Drilling in 2017 intersected lithium-bearing claystone averaging over 900 ppm Li to a depth of over 100 meters.
2) A maiden resource estimate classified over 1.5 million tonnes of lithium carbonate equivalent as indicated and inferred. Metallurgical testing shows the claystone is acid leachable to extract over 80% of the lithium.
3) The project is located in a strategic location to supply the growing lithium-ion battery market in the US, with lithium demand accelerating due to the increased production of electric vehicles globally.
TerraX Minerals is a Canadian mineral exploration company focused on exploring and developing its 100% owned 772 square km Yellowknife City Gold project located adjacent to the city of Yellowknife, Northwest Territories. The project covers high-grade Archean gold districts and has had multiple high-grade gold discoveries. TerraX has a strong management team with experience discovering and developing gold deposits and low exploration costs due to the project's excellent infrastructure and year-round access near Yellowknife.
This document discusses forward-looking statements and provides information about Aben Resources Ltd., including its stock symbols, shares outstanding, recent share price, market capitalization, and three gold exploration projects in Western Canada. It summarizes the management team's experience and the company's investment highlights. Specifically, it owns the Forrest Kerr gold project in British Columbia's Golden Triangle region, which saw successful drilling results in 2017 that led to a new discovery called the North Boundary zone.
Cypress Development Corp owns lithium claystone deposits in Clayton Valley, Nevada near Albemarle's Silver Peak lithium mine. Drilling in 2017 encountered lithium mineralization averaging 921 ppm Li over 77 meters in 14 holes. Metallurgical tests show the claystone is acid leachable with up to 80% lithium extraction. Cypress plans additional drilling, process engineering, and a preliminary economic assessment in 2018 to advance the project. The company sees potential for the project given growing lithium demand from electric vehicles and batteries.
TerraX Minerals is a Canadian mineral exploration company focused on exploring its 100% owned 772 square km Yellowknife City Gold project located near Yellowknife, Northwest Territories. The project covers high-grade Archean gold districts with known deposits and past producers. TerraX has made multiple high-grade gold discoveries on the property and identified several high-priority targets for further exploration and drilling. The company has a strong management team with experience discovering and developing deposits in the region.
Cypress Development Corp owns lithium claystone deposits in Clayton Valley, Nevada that have the potential to be a significant lithium resource. Drilling in 2017 encountered mineralization averaging 921 ppm lithium over 77 meters thick in 14 drill holes. Metallurgical testing shows the claystone is acid leachable with up to 80% lithium extraction. Cypress plans additional drilling, metallurgical testing, and a preliminary economic assessment in 2018 to further define the resource potential.
Cypress Development Corp owns lithium claystone deposits in Clayton Valley, Nevada near Albemarle's Silver Peak lithium mine. Drilling in 2017 encountered mineralization averaging 921 ppm lithium over 77 meters thick in 14 drill holes. Metallurgical tests show the claystone is acid leachable with up to 80% lithium extraction. Cypress plans additional drilling, metallurgical testing, and a preliminary economic assessment in 2018 to evaluate the project's potential.
Cypress Development Corp is exploring for lithium resources in Clayton Valley, Nevada. Recent drilling has encountered lithium-bearing claystone up to 112 meters below surface, with grades averaging over 800 ppm lithium. Metallurgical testing indicates 80% of the lithium can be extracted using a weak sulfuric acid solution. Cypress plans additional drilling in 2018 and expects to publish a initial lithium resource estimate in Q1 2018 to advance the project towards a preliminary economic assessment. The project is located near existing lithium production and infrastructure to be a potential new supply of lithium for the growing battery market.
SATTA MATKA DPBOSS KALYAN MATKA RESULTS KALYAN CHART KALYAN MATKA MATKA RESULT KALYAN MATKA TIPS SATTA MATKA MATKA COM MATKA PANA JODI TODAY BATTA SATKA MATKA PATTI JODI NUMBER MATKA RESULTS MATKA CHART MATKA JODI SATTA COM INDIA SATTA MATKA MATKA TIPS MATKA WAPKA ALL MATKA RESULT LIVE ONLINE MATKA RESULT KALYAN MATKA RESULT DPBOSS MATKA 143 MAIN MATKA KALYAN MATKA RESULTS KALYAN CHART
The Most Inspiring Entrepreneurs to Follow in 2024.pdfthesiliconleaders
In a world where the potential of youth innovation remains vastly untouched, there emerges a guiding light in the form of Norm Goldstein, the Founder and CEO of EduNetwork Partners. His dedication to this cause has earned him recognition as a Congressional Leadership Award recipient.
𝐔𝐧𝐯𝐞𝐢𝐥 𝐭𝐡𝐞 𝐅𝐮𝐭𝐮𝐫𝐞 𝐨𝐟 𝐄𝐧𝐞𝐫𝐠𝐲 𝐄𝐟𝐟𝐢𝐜𝐢𝐞𝐧𝐜𝐲 𝐰𝐢𝐭𝐡 𝐍𝐄𝐖𝐍𝐓𝐈𝐃𝐄’𝐬 𝐋𝐚𝐭𝐞𝐬𝐭 𝐎𝐟𝐟𝐞𝐫𝐢𝐧𝐠𝐬
Explore the details in our newly released product manual, which showcases NEWNTIDE's advanced heat pump technologies. Delve into our energy-efficient and eco-friendly solutions tailored for diverse global markets.
SATTA MATKA DPBOSS KALYAN MATKA RESULTS KALYAN CHART KALYAN MATKA MATKA RESULT KALYAN MATKA TIPS SATTA MATKA MATKA COM MATKA PANA JODI TODAY BATTA SATKA MATKA PATTI JODI NUMBER MATKA RESULTS MATKA CHART MATKA JODI SATTA COM INDIA SATTA MATKA MATKA TIPS MATKA WAPKA ALL MATKA RESULT LIVE ONLINE MATKA RESULT KALYAN MATKA RESULT DPBOSS MATKA 143 MAIN MATKA KALYAN MATKA RESULTS KALYAN CHART
Discover the Beauty and Functionality of The Expert Remodeling Serviceobriengroupinc04
Unlock your kitchen's true potential with expert remodeling services from O'Brien Group Inc. Transform your space into a functional, modern, and luxurious haven with their experienced professionals. From layout reconfiguration to high-end upgrades, they deliver stunning results tailored to your style and needs. Visit obriengroupinc.com to elevate your kitchen's beauty and functionality today.
❼❷⓿❺❻❷❽❷❼❽ Dpboss Matka Result Satta Matka Guessing Satta Fix jodi Kalyan Final ank Satta Matka Dpbos Final ank Satta Matta Matka 143 Kalyan Matka Guessing Final Matka Final ank Today Matka 420 Satta Batta Satta 143 Kalyan Chart Main Bazar Chart vip Matka Guessing Dpboss 143 Guessing Kalyan night
During the budget session of 2024-25, the finance minister, Nirmala Sitharaman, introduced the “solar Rooftop scheme,” also known as “PM Surya Ghar Muft Bijli Yojana.” It is a subsidy offered to those who wish to put up solar panels in their homes using domestic power systems. Additionally, adopting photovoltaic technology at home allows you to lower your monthly electricity expenses. Today in this blog we will talk all about what is the PM Surya Ghar Muft Bijli Yojana. How does it work? Who is eligible for this yojana and all the other things related to this scheme?
NIMA2024 | De toegevoegde waarde van DEI en ESG in campagnes | Nathalie Lam |...BBPMedia1
Nathalie zal delen hoe DEI en ESG een fundamentele rol kunnen spelen in je merkstrategie en je de juiste aansluiting kan creëren met je doelgroep. Door middel van voorbeelden en simpele handvatten toont ze hoe dit in jouw organisatie toegepast kan worden.
The report *State of D2C in India: A Logistics Update* talks about the evolving dynamics of the d2C landscape with a particular focus on how brands navigate the complexities of logistics. Third Party Logistics enablers emerge indispensable partners in facilitating the growth journey of D2C brands, offering cost-effective solutions tailored to their specific needs. As D2C brands continue to expand, they encounter heightened operational complexities with logistics standing out as a significant challenge. Logistics not only represents a substantial cost component for the brands but also directly influences the customer experience. Establishing efficient logistics operations while keeping costs low is therefore a crucial objective for brands. The report highlights how 3PLs are meeting the rising demands of D2C brands, supporting their expansion both online and offline, and paving the way for sustainable, scalable growth in this fast-paced market.
The Steadfast and Reliable Bull: Taurus Zodiac Signmy Pandit
Explore the steadfast and reliable nature of the Taurus Zodiac Sign. Discover the personality traits, key dates, and horoscope insights that define the determined and practical Taurus, and learn how their grounded nature makes them the anchor of the zodiac.
Satta matka fixx jodi panna all market dpboss matka guessing fixx panna jodi kalyan and all market game liss cover now 420 matka office mumbai maharashtra india fixx jodi panna
Call me 9040963354
WhatsApp 9040963354
Cover Story - China's Investment Leader - Dr. Alyce SUmsthrill
In World Expo 2010 Shanghai – the most visited Expo in the World History
https://www.britannica.com/event/Expo-Shanghai-2010
China’s official organizer of the Expo, CCPIT (China Council for the Promotion of International Trade https://en.ccpit.org/) has chosen Dr. Alyce Su as the Cover Person with Cover Story, in the Expo’s official magazine distributed throughout the Expo, showcasing China’s New Generation of Leaders to the World.
Adani Group's Active Interest In Increasing Its Presence in the Cement Manufa...Adani case
Time and again, the business group has taken up new business ventures, each of which has allowed it to expand its horizons further and reach new heights. Even amidst the Adani CBI Investigation, the firm has always focused on improving its cement business.
2. Cautionary Note Regarding
Forward-Looking Statements
Effective on July 1, 2013, Lexington Technology Group, Inc. (“LTG”) became a wholly-owned subsidiary of Document Security
Systems, Inc. (“DSS” or “Company”). Effective on August 2, 2013, LTG changed its name to DSS Technology Management, Inc.
Forward-looking statements that may be contained in this presentation, including, without limitation, statements related to the
Company’s plans, strategies, objectives, expectations, potential value, intentions and adequacy of resources, are made pursuant
to the safe harbor provisions of the Private Securities Litigation Reform Act and contain words such as “believes”, “anticipates”,
“expects”, “plans”, “intends” and similar words and phrases. These forward-looking statements are subject to risks and
uncertainties that could cause actual results to differ materially from the results projected in any forward-looking statement. In
addition to the factors specifically noted in the forward-looking statements, other important factors, risks and uncertainties that
could result in those differences include, but are not limited to, those disclosed in the “Risk Factors” section of the Company’s
Quarterly Report on Form 10-Q for the quarter ended June 30, 2013, filed with the Securities and Exchange Commission on
August 13, 2013. Forward-looking statements that may be contained in this presentation are being made as of the date of its
release, and the Company assumes no obligation to update the forward-looking statements, or to update the reasons why
actual results could differ from those projected in the forward-looking statements.
2
3. On July 1, 2013, DSS approved a merger with Lexington Technology Group
DSS Merger Overview
NYSE MKT: DSS
>100 employees
R&D leader anti-counterfeit and
authentication technology
Historic difficulty in licensing and
enforcing its intellectual property
Highly experienced technology licensing
and enforcement specialist
Prior investments in Internet/social
media and enterprise software firms
(1) Source: CapitalIQ as of August 8, 2013.
Market Cap ~$80MM1
Commercializes and enforces patented
technology within owned operating
businesses and investments
Current Technology Verticals:
Counterfeit and fraud detection
Digital authentication
RFID/access control
Cloud computing
Enterprise software
Internet/social media
3
4. DSS 2Q13 Highlights
DSS Existing Business:
2Q13 revenue of $4.3 million; Y/Y increase 17%
Gross profit of $1.6 million; Y/Y increase 22%
Gross margin: 38%, Y/Y increase of 400 bps
Licensing & Digital gross margin: 84%, Y/Y decrease of 200 bps
Adjusted EBITDA: -$0.17 million; Y/Y improvement of 65%
Initial financial restructuring -- equipment lease buyout
LTG Existing Business:
Two key settlements announced in Bascom investment at 4 & 5% effective royalty
rates
Balance Sheet:
Healthy cash balance post merger: ~$6.5M (8/1/13)
4
5. DSS Tech
Management:
IP Licensing &
Enforcement
Bascom Research & VirtualAgility investments
Existing DSS technology licensing & disputes
Pipeline investments
DSS Brand
Management:
Digital AuthentiGuard digital
Cloud computing, hosting and security
Integration of Bascom & VirtualAgility
Packaging Custom and security- enhanced packaging
Plastics Custom and security-enhanced plastic IDs
Printing Security Printing
DSS Combined Organizational Structure
5
6. 2013 Strategic Goals & Milestones
Initial sales of DSS AuthentiGuard
anticipated in 2013
Continued revenue growth and
transition to higher margin products
Improved financial results and
profitability
Bascom Research
- Markman hearing Q413
- Potential additional filings
- Potential additional settlements further
establishing royalty rate (4-5%)
VirtualAgility:
- Markman hearing April 2014
- Jury selection November 2014
Coupons.com:
- Discovery Q3-Q413
Pipeline:
- 2-4 new investments by end of Q413
DSS Technology Management DSS Brand Management
Shift business to higher margin activity
to achieve CY2014 positive EBITDA
Build portfolio to 7-10 investments
and achieve specific milestones
Goal:
Milestones:
6
7. DSS Management Profiles
Will Rosellini, Chief Executive OfficerJeff Ronaldi - Chief Executive Officer
Over 25 years of experience in company
formation and management at UUNET,
Concentric Networks, SPX, etc.
Leader in IP enforcement with significant
verdicts against Microsoft, Genzyme and
Citrix
Robert Bzdick - President
Leads DSS Brand Management
25 years of successful entrepreneurial
experience; founder and CEO of Premier
Packaging Corp. prior to DSS acquisition
Appointed CEO of DSS November 2012
prior to merge with Lexington Technology
Group.
Peter Hardigan - Chief Operating Officer
Previously COO Lexington Technology
Group, CFO & Head of Investment
Management at IP Navigation; Principal &
leader of IP transactions at Charles River
Associates in NYC and Frankfurt
Phillip Jones - Chief Financial Officer
DSS CFO since 2009, Controller and
Principal Accounting Officer since 2005
Held financial management positions at
American Fiber Systems and at Zapata
Corporation where he was involved in the
successful spin-off and IPO of Zapata’s
internet subsidiary
7
8. Industry Landscape – IP Monetization
Technology Expertise
Enforcement
Generalist
(No Tech R&D)
Specialist
(Active Tech R&D)
“Stick” Licensing
Commercialization
Buying Group
“Carrot” Licensing
8
9. How is DSS Different from a
Patent Assertion Entity?
Value Added Investment vs Typical Patent Assertion
Aligns interests by working with
company management to commercialize
and enforce the technology
Investment in the underlying business
provides equity upside from
commercialization
Willingness to face trial and seek
injunctions to protect competitive
position
Narrow focus on litigation value often at
the expense of the underlying business:
- Demand assignment of assets
- Provide no operating capital
- Limit inventor participation
No ability to seek injunctive relief to
protect franchise
Potential reputational and regulatory
issues
9
10. DSS Technology Management
Current IP Licensing & Enforcement
Portfolio
# Patents/
Applications Technology Milestones Current Defendants
6 /4 Data structure used to build
social networks and use thereof
Cases filed: 10/4/2012
2 Settlements to date at 4 &
5% effective royalty rate
Markman Hearing: 10/02/2013
Trial: 2014-2015*
5 / 5 User-configurable platforms
used to create sophisticated,
integrated applications
Cases filed: January 4th 2013
Markman: April 2014
Trial: after November 2014
12/9 Digital and physical Anti-
Counterfeit and Anti-
duplication technology
5 digital applications filed in
2012-2013
Patents should issue 2015-16
Breach of
Contract
Unauthorized use of proprietary
design for protecting printed
coupons provided under NDA
Filed 10/24/2011
Discovery stage Q3-Q4 13
Trial TBD
*Estimate based on estimates from PriceWaterhouseCoopers 2012 Litigation report for the Northern District of California (Bascom Research) and the Eastern
District of Texas (VirtualAgility).
Note: LTG has made a minority investment in VirtualAgility. VirtualAgility owns the patents in suit and is engaged in the litigation filed in the Eastern District of Texas.
N/A – Numerous
Commercial Licensees
10
11. DSS Technology Management
Bascom Research Investment Overview
Bascom Research is a wholly-owned subsidiary of LTG,
based in Virginia, led by Tom Bascom, President & CTO
The patented technology covers the ability to link, search,
and provide selective access to information
Bascom Research filed patent infringement lawsuits against
six defendants, has announced two settlements, and
currently has two cases pending (against Facebook and
LinkedIn) in the US District for the Northern District of
California.
A Markman Hearing in the California case is scheduled for
October 2nd, 2013
Bascom Research Investment
Tom Bascom is the founder of Linkspace, a
pioneering software company established
in 2001 in McLean, VA
The Inventor
Current Defendants
Previous Defendants
Linkspace’s products include Found Engine® and suite of
products, Semantic Correlation Server™ and Tag and Connect™,
which work together to organize information and close the
gaps on and across networks and portals
Prior to Linkspace, Tom was Program Manager for Raytheon
and Northrup Grumman’s ballistic missile defense program and
Manager for NASA’s Mission to Planet Earth at Goddard Space
Flight Center
Commercialization at DSS
Development in DSS Digital Group
11
12. DSS Technology Management
VirtualAgility, Inc. Investment Overview
VirtualAgility Investment
DSS has a minority equity interest in VirtualAgility (“VA”)
and has options to acquire additional equity interests
VA owns five US patents and a number of pending
applications that cover a user-configurable platform that
allows persons who are not specialists in information
technology (IT) to create sophisticated, integrated
applications
VA filed a patent infringement lawsuit against nine
defendants, currently pending in the US District for the
Eastern District of Texas. (TXED-2-13-cv-00011)
A Markman Hearing in the Texas case is scheduled for April,
2014 and jury selection November 2014
VA’s Clients include US Homeland Security, Customs and Border
Patrol, and Air Force, and international government agencies on
issues involving public safety, crisis management and business
resiliency and continuity
Stuart has received many awards and distinctions for practical
innovation, product excellence and entrepreneurship. Prior to
VIrtualAgility he was Director at Scitex America, where he
helped launch the first Commercial Digital Cameras and CCD
technology for desktop color imaging
Stuart Rudolph is the founder, President
and CEO of VirtualAgility, a pioneering
enterprise software company established in
1998 and based in Winchester, MA
Current Defendants
The Inventor
Commercialization at DSS
DSS Digital and Virtual Agility resell each others services
DSS Digital is working to incorporate VirtualAgility into the
AuthentiGuard portal and will host the VirtualAgility
application.
12
13. DSS Technology Management
DSS Existing Technology Portfolio
DSS IP Portfolios
Core document security portfolio: 9 patent families; 12 pending applications
Digital and cloud portfolio: 5 patent applications; additional concepts in development
Commercial licensing relationships with many national and international brands (e.g. RR
Donnelly)
Current IP Enforcement
Coupons.com:
Claim for breach of contract based on unauthorized use of DSS technology for
secure coupons by Coupons.com
Case is in the discovery stage in Western District of NY
Discovery completion anticipated to in Q42013
Additional enforcement actions under assessment
13
14. Acquisition Strategy:
Acquire ownership of new IP assets that build value in existing DSS businesses or expand
DSS product lines
Acquire or invest in new companies that meet our investment criteria
Technology agnostic, with priority focus on verticals with substantial commercial growth
potential
Pipeline sources:
Personal relationships / word of mouth
Investors: VC’s, hedge funds, private equity managers, and other IP investors
Universities and research institutions
Service providers: bankers, lawyers, brokers & other intermediaries
DSS Technology Management
Investment Pipeline
14
15. 1. MarketsandMarkets.com Research Report.
2. GCCCP – United Nations World Intellectual Property Organization.
DSS Brand Management:
Digital Overview
Counterfeiting Marketplace
$1 trillion global losses1 ($250 billion in US2)
Security expected to grow to $79 billion in 20141
Large portion of counterfeit occurs by color copying or scanning packaging/QR codes
Key Markets:
- Pharmaceuticals & Cosmetics
- Apparel & other high value consumer goods
DSS Digital Solutions
Technology leadership (>20 years) in protecting against copy & scan duplication
Key DSS products:
- AuthentiGuard digital (Protects Packaging)
- Cloud services
15
16. The Prism Mark The Application The Portal
Three Key Components Work Together to Provide Authentication,
Investigative Data Capture, Reporting and Marketing Data Capture
DSS Digital: AuthentiGuard®
Authentication marker, using
covert Prism technology, that
once read unlocks encrypted
information to the app user and
resists copying and scanning
Manage marks, users, access to the
system with complete reporting and
fully customizable and capable of
integrating into existing systems
The app authenticates marking
in real-time with full reporting,
GPS tracking, data storage and
more
16
17. DSS Digital: AuthentiGuard® App
The Power of Authentication in Your Hand –
Making Product Verification and Tracking Effortless
Distributed and controlled through a smartphone App
Simultaneously authenticates and reads alphanumeric, linear or
2D codes
GPS locator
Security look-ups (local or cloud)
Information storage
History of valid & invalid products
Photo evidence capabilities
Result distribution via SMS, email, etc.
Fully customizable
17
18. DSS Brand Management:
Growth and Profitability Improvement
Commercial Focus: Transition to Higher Margin Sales
Sales of AuthentiGuard
Transition of Print, Packaging and Plastics to higher margin opportunities
Finance: use of capital to improve financing cost and efficiency
Improved borrowing costs (Operating Lease Buyout)
Selective investment in manufacturing technology
Operations & HR
• Apply operations principles from Packaging Group
• Pay for profitability
18
19. DSS Historical Financials
* Adjusted EBITDA is a non-GAAP financial performance measurement. Adjusted EBITDA is calculated by adding back to net income (loss) interest expense, income taxes, depreciation and amortization
expense as further adjusted to add back stock-based compensation expense and non-recurring items, such as gain on the change in fair value of derivative liability in 2011 and costs related to the Company's
potential merger with Lexington Technology Group, which were incurred in 2012.
$ in thousands 2010 2011 2012 2012 vs 2011
Revenue
Packaging 5,753 5,940 9,428 59%
Plastic IDs and Cards 2,291 2,769 2,966 7%
Licensing & Digital Solutions 641 1,447 1,826 26%
Printing 4,697 3,227 2,895 (10%)
Total Revenue 13,382 13,383 17,115 28%
Operating Expense 7,581 7,646 9,502 24%
Net Loss (3,463) (3,222) (4,281) NM
Adjusted EBITDA* (2,212) (2,309) (1,314) NM
19
20. 2013 Strategic Goals & Milestones
Initial sales of DSS AuthentiGuard
anticipated Q313
Continued revenue growth and
transition to higher margin products
Improved financial results and
profitability
Bascom Research
- Markman hearing Q413
- Potential additional filings
- Potential additional settlements further
establishing royalty rate (4-5%)
VirtualAgility:
- Markman hearing April 2014
- Jury selection November 2014
Coupons.com:
- Discovery Q3-Q413
Pipeline:
- 2-4 new investments by end of Q413
DSS Technology Management DSS Brand Management
Shift business to higher margin activity
to achieve CY2014 positive EBITDA
Build portfolio to 7-10 investments
and achieve specific milestones
Goal:
Milestones:
20