Feeds

Investor dumps SCO

But the money is ours, says SCO

  • alert
  • submit to reddit

Securing Web Applications Made Simple and Scalable

The major speculator backing The SCO Group's legal jihad against Linux wants its money back. Marin County, California-based equity fund BayStar Capital invested $20m in SCO back in October, confident that the Utah firm had a strong legal case. Now Baystar says SCO has breached the agreement and wants to redeem its investment, which takes the form of 20,000 shares of SCO's Series A Convertible Preferred Stock. SCO doesn't agree, and wants to hang on to the cash. The terms were amended in February.

SCO says that BayStar alleges that SCO breached Sections 2(b)(v) 2(b)(viii) and 3(g) of the February agreement, but doesn't know more specifics. The sections detail obligations for "representations and warranties" and public disclosure. Shares in the Utah company fell 13 per cent today on the news. SCO admitted in October that the focus on its litigation had already damaged its traditional Unix on Intel business. SCO reported that at the end of the quarter ending 31 January, the company had $57.94m in cash and cash equivalents - down $6m from the previous quarter - and $6.67m in securities. Liability in the form of Series A stock was valued at $29.67m.

"Our funds have never taken part in toxic or death spiral convertible financings of any sort," BayStar's managing partner Lawrence Goldfarb wrote in a letter to the Financial Times last month. He wasn't talking about SCO, but critics will judge the metaphors to be appropriate. ®

Related stories

Judge stays Red Hat vs SCO
SCO vs. IBM vs. SCO: Is the end in sight?
SCO lifts skirt but investors recoil
Microsoft encouraged anti-Linux investment shock!
SCO shares keep on sliding

Build a business case: developing custom apps

More from The Register

next story
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
Airbus promises Wi-Fi – yay – and 3D movies (meh) in new A330
If the person in front reclines their seat, this could get interesting
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
Want to beat Verizon's slow Netflix? Get a VPN
Exec finds stream speed climbs when smuggled out
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.