SYS-CON MEDIA Authors: Adrian Bridgwater, Carmen Gonzalez, Dana Gardner, Elizabeth White, Yeshim Deniz

News Feed Item

Dassault Systèmes Extends Tender Offer for Accelrys until April 28, 2014

Regulatory News:

Dassault Systèmes (Paris:DSY)(Euronext Paris: #13065, DSY.PA), the 3DEXPERIENCE Company, world leader in 3D design software, 3D Digital Mock Up and Product Lifecycle Management (PLM) solutions announces the extension of the tender offer by its wholly owned indirect subsidiary, 3DS Acquisition Corp., to purchase all outstanding shares of Accelrys, Inc. (NASDAQ: ACCL) (Accelrys) common stock at an offer price of $12.50 per share in cash, without interest and subject to any required withholding of taxes. Dassault Systèmes and Accelrys have agreed that the expiration date of the tender offer will be extended until midnight, New York City time, at the end of the day on Monday, April 28, 2014, unless otherwise extended or terminated. Except for the extension of the tender offer, all other terms and conditions of the tender offer remain unchanged.

Computershare Trust Company, N.A., the depositary for the tender offer, has advised that as of midnight, New York City time, at the end of the day on April 22, 2014, approximately 41,978,808 shares of Accelrys common stock (excluding 235,598 shares of Accelrys common stock subject to notices of guaranteed delivery) had been validly tendered and not validly withdrawn pursuant to the tender offer, representing approximately 75.2 percent of the outstanding shares of Accelrys common stock.

Dassault Systèmes is extending the tender offer because the condition relating to receipt of written confirmation that the Committee on Foreign Investment in the United States (CFIUS) has completed its investigation of the acquisition of Accelrys by Dassault Systèmes and determined that there are no unresolved national security concerns was not satisfied by the previously scheduled expiration date of the tender offer. CFIUS is required to complete its investigation by May 8, 2014, but CFIUS may complete its investigation sooner. Dassault Systèmes continues to believe the acquisition of Accelrys by Dassault Systèmes does not raise national security concerns.

Important notices

This release does not constitute, nor does it form part of, any offer or invitation to buy, sell, exchange or otherwise dispose of, or any issuance, or any solicitation of any offer to sell or issue, exchange or otherwise dispose of any securities. On February 13, 2014, Dassault Systèmes filed with the U.S. Securities and Exchange Commission (SEC) a tender offer statement on Schedule TO regarding the tender offer described in this press release. The stockholders of Accelrys are strongly advised to read the tender offer statement (as updated and amended) filed by Dassault Systèmes because it contains important information that Accelrys' stockholders should consider before tendering their shares. The tender offer statement and other documents filed by Dassault Systèmes and Accelrys with the SEC are available for free at the SEC’s website (http://www.sec.gov) and may be obtained at no charge by directing a request by mail to Innisfree M&A Incorporated, 501 Madison Avenue, 20th Floor, New York, New York, 10022 or by calling +1(888) 750-5834.

This release contains forward-looking statements. These forward looking statements involve known and unknown risks, uncertainties and other factors, many of which are outside of the control of Dassault Systèmes, are difficult to predict and may cause actual outcomes to differ significantly from any future outcomes expressed or implied in the forward-looking statements in this release. While Dassault Systèmes believes that the assumptions made and the expectations reflected in this release are reasonable, no assurance can be given that such assumptions or expectations will prove to have been correct and no guarantee of whatsoever nature is assumed in this respect. The uncertainties include, inter alia, the timing of the completion, and outcome, of the CFIUS investigation, the risk of a change in general economic conditions and government and regulatory actions. These known, unknown and uncertain factors are not exhaustive, and other factors, whether known, unknown or unpredictable, could cause the group’s actual results or ratings to differ materially from those assumed hereinafter. Dassault Systèmes undertakes no obligation to update or revise the forward-looking statements in this release whether as a result of new information, future events or otherwise.

For all questions relating to the tender offer, please call Innisfree M&A Incorporated at +1 (888) 750-5834.

About Dassault Systèmes

Dassault Systèmes, the 3DEXPERIENCE Company, provides business and people with virtual universes to imagine sustainable innovations. Its world-leading solutions transform the way products are designed, produced, and supported. Dassault Systèmes’ collaborative solutions foster social innovation, expanding possibilities for the virtual world to improve the real world. The group brings value to over 190,000 customers of all sizes, in all industries, in more than 140 countries.

CATIA, SOLIDWORKS, SIMULIA, DELMIA, ENOVIA, GEOVIA, EXALEAD, NETVIBES, 3DSWYM and 3D VIA are registered trademarks of Dassault Systèmes or its subsidiaries in the US and/or other countries.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
WebRTC defines no default signaling protocol, causing fragmentation between WebRTC silos. SIP and XMPP provide possibilities, but come with considerable complexity and are not designed for use in a web environment. In his session at @ThingsExpo, Matthew Hodgson, technical co-founder of the Matrix.org, discussed how Matrix is a new non-profit Open Source Project that defines both a new HTTP-based standard for VoIP & IM signaling and provides reference implementations.
The security devil is always in the details of the attack: the ones you've endured, the ones you prepare yourself to fend off, and the ones that, you fear, will catch you completely unaware and defenseless. The Internet of Things (IoT) is nothing if not an endless proliferation of details. It's the vision of a world in which continuous Internet connectivity and addressability is embedded into a growing range of human artifacts, into the natural world, and even into our smartphones, appliances, a...
In his session at WebRTC Summit, Peter Dunkley, Technical Director at Acision, will look at creating interactive communications via the web by adding messaging, file transfer, and group communication (group chat and audio/video conferencing) into the web experience. He will also discuss potential applications of this technology in areas including B2B, B2C, P2P, and gaming. Peter Dunkley is Technical Director at Acision. He graduated from The University of Edinburgh in 2000 with a BSc (Hons) in ...
What if, during a snow emergency, an on-the-ground sensor could automatically trigger a relevant emergency notification related to snowfall and road impact. And then, after it’s triggered, that notification is delivered intelligently to individuals based on an extensive set of rules designed to alert the most available and capable responders. This “what if” question about “smart highways” is short-sighted. We are already there, and we are only getting started. While mainstream attention is pai...
There are 182 billion emails sent every day, generating a lot of data about how recipients and ISPs respond. Many marketers take a more-is-better approach to stats, preferring to have the ability to slice and dice their email lists based numerous arbitrary stats. However, fundamentally what really matters is whether or not sending an email to a particular recipient will generate value. Data Scientists can design high-level insights such as engagement prediction models and content clusters that a...
In his session at 16th Cloud Expo, Simone Brunozzi, VP and Chief Technologist of Cloud Services at VMware, will review the changes that the cloud computing industry has gone through over the last five years and share insights into what the next five will bring. He will chronicle the challenges enterprise companies are facing as they move to the public cloud. He will delve into the “Hybrid Cloud” space and explain why every CIO should consider ‘hybrid cloud’ as part of their future strategy to a...
The Internet of Things is not new. Historically, smart businesses have used its basic concept of leveraging data to drive better decision making and have capitalized on those insights to realize additional revenue opportunities. So, what has changed to make the Internet of Things one of the hottest topics in tech? In his session at @ThingsExpo, Chris Gray, Director, Embedded and Internet of Things, discussed the underlying factors that are driving the economics of intelligent systems. Discover ...
Avnet, Inc. has announced that it ranked No. 4 on the InformationWeek Elite 100 – a list of the top business technology innovators in the U.S. Avnet was recognized for the development of an innovative cloud-based training system that serves as the foundation for Avnet Academy – the company’s education and training organization focused on technical training around top IT vendor technologies. The development of this system allowed Avnet to quickly expand its IT-related training capabilities around...
SYS-CON Media announced today that @WebRTCSummit Blog, the largest WebRTC resource in the world, has been launched. @WebRTCSummit Blog offers top articles, news stories, and blog posts from the world's well-known experts and guarantees better exposure for its authors than any other publication. @WebRTCSummit Blog can be bookmarked ▸ Here @WebRTCSummit conference site can be bookmarked ▸ Here
Scott Jenson leads a project called The Physical Web within the Chrome team at Google. Project members are working to take the scalability and openness of the web and use it to talk to the exponentially exploding range of smart devices. Nearly every company today working on the IoT comes up with the same basic solution: use my server and you'll be fine. But if we really believe there will be trillions of these devices, that just can't scale. We need a system that is open a scalable and by using ...
A new definition of Big Data & the practical applications of the defined components & associated technical architecture models This presentation introduces a new definition of Big Data, along with the practical applications of the defined components and associated technical architecture models. In his session at Big Data Expo, Tony Shan will start with looking into the concept of Big Data and tracing back the first definition by Doug Laney, and then he will dive deep into the description of 3V...
Why does developer experience matters, what makes for a great developer experience and what is the relationship between developer experience and the broader field of user experience? Software developers are gaining more influence over the purchase decisions of technologies with which they must build on and with which they must integrate. For example, the success of Amazon Web Services, Heroku and MongoDB has been driven primarily by individual software developers choosing to use these tools, ra...
The cloud has transformed how we think about software quality. Instead of preventing failures, we must focus on automatic recovery from failure. In other words, resilience trumps traditional quality measures. Continuous delivery models further squeeze traditional notions of quality. Remember the venerable project management Iron Triangle? Among time, scope, and cost, you can only fix two or quality will suffer. Only in today's DevOps world, continuous testing, integration, and deployment upend...
Cloud and Big Data present unique dilemmas: embracing the benefits of these new technologies while maintaining the security of your organization's assets. When an outside party owns, controls and manages your infrastructure and computational resources, how can you be assured that sensitive data remains private and secure? How do you best protect data in mixed use cloud and big data infrastructure sets? Can you still satisfy the full range of reporting, compliance and regulatory requirements? In...
There are lots of challenges in IoT around secure, scalable and business friendly infrastructure for enterprises. For large corporations, IoT implementations are one of the top priorities of the decade. All industries are seeing a competitive need to sustain by investing in IoT initiatives. The value addition comes from improved customer service, innovative product and additional revenue streams. The data from these IP-connected devices can be leveraged for a variety of business applica...