Get Started for Free Contexxia identifies hard-to-find pieces of information in SEC filings. No more highlighters, no more redlining, no more poring over huge documents.

Pursuant to the Company’s Certificate of Incorporation, the Company has authorized 2,000,000 shares of $0.001 par value Preferred Stock.  The Company has designated 250,000 of the 2,000,000 shares as Series B Preferred Stock. The Series B Preferred Stock dividend is cumulative and accruing at the rate of ten percent (10%) per annum.  The dividend shall be paid in common stock of the Company at the current market price.  No dividend may be paid on common shares so long as the Series B Preferred Stock dividend is outstanding. Each Series B preferred share, valued at $10 per Series B preferred share, shall be convertible into a number of common shares at the previous average of the 5 Trading day closing price as reported by OTC Pink, equal to a value of $11.5.  The conversion right is only available when the common shares are trading at above $.006. At any time prior to the second anniversary of issuance, the Company may redeem, in whole or in part, the Series B Preferred Stock at an amount equal to 115% of purchase price on not less than thirty (30) days nor more than sixty (60) days’ written notice. 


GES has developed and deployed proprietary Registration software, which was designed specifically to authenticate and register voters. This proprietary software functions as a data storage and retrieval registration system by cross-referencing eligibility status within a control voter database. In a mail ballot election, the voter’s ID barcode, QR code, or signature on the Business Reply Envelope, can be scanned and the status of that voter is identified. If the voter is not eligible to vote or another ballot for that individual has already been registered in the system, that ballot is marked VOID and removed from the count. In an in-person election, the voter provides their name for look-up in the system. If they have not voted, a signature box pops up on the screen, the voter signs an electronic signature pad and the digital signature is captured next to their name. If a voter tries to vote more than once, an alert will pop up indicating that the voter has already registered, and the voter will not receive an additional ballot. Because we account for every single ballot, the system has multiple reporting options, which include the list of valid envelopes and list of voters whose ballot was void, detailing the reason. Once the voter is authenticated, the identifiers are removed to ensure a secret vote and the ballot is scanned for tabulation.


GES developed proprietary Scanning and Tabulation election software. This software features advanced OMR/OCR/Barcode scanning and tabulation system featuring de-skewing, de-speckling and image correction. The computer hardware was designed to run without Internet or Wi-Fi access and is hard wired, ensuring complete security. The system allows for triple-auditing capabilities, which are; electronically generated tabulation results, .jpeg imaging and storage, and the original physical ballot. This advancement gives GES the ability to tabulate elections faster and more efficiently. As experts in paper/mail ballot elections, GES began deploying this system in our elections in the third quarter of 2017 and it has been operating flawlessly.


GES encryption software uses AES 256 with a cryptographic key using a RSA elliptic curve of 4096, which is used to encrypt the communication of the client and the GES server, as well all client data hosted in the server. A six-digit security code, delivered to the voter’s email address provided by the client, must be validated by the prospective voter in order to authenticate the identity of the voter before the voter may access the ballot. After validating the voter, the voter then votes anonymously, so that the identity of the voter and the ballot cast can never be matched.

The GES voting platform verifies that the users does not use the back and forward browser button, a safe mechanism against tampering. Distributed denial of service DDoS protection tools help secure websites and applications and prevent DDoS attacks, which bombard websites with traffic traditionally delivered via “botnets" that are created by networked endpoints connected via malware. The DDoS software protection provides always-on detection and automatic inline mitigations that minimize application downtime and latency.


Step 4 - System Integration Testing; Executes tests on all components of a system configured as if the system was deployed

Step 5 - Functional Configuration Audit; Examines submitted test data and conducts additional testing to verify submitted system hardware and software described in the documents submitted to the Elections Assistance Commission and the Department of Homeland Security