|By Marketwired .||
|December 11, 2012 08:55 AM EST|
VANCOUVER, BC -- (Marketwire) -- 12/11/12 --
TEUTON RESOURCES CORP.
202-2187 Oak Bay Avenue
Victoria, BC V8R 1G1
Phone: (604) 682-3680 Fax: 682-3992
Toll Free: 1-800-879-2333
Teuton Resources Corp. ("Teuton") ("TUO"-TSX-V) ("TFE"-Frankfurt) ("TEUTF"-OTC BB) has received a progress report from Brigade Resources, a Hunter Dickinson company, detailing results of the 2012 exploration program on the Tennyson property. During the past field season Brigade carried out geological mapping, geochemical sampling, magnetic surveys, IP surveys, petrographic work and re-logging of all historical drill holes. Cost of the program was approximately $1 million.
In the Executive Summary of the progress report, Brigade geologists stated: "The current program has shown that at least two high-temperature porphyry-style hydrothermal centres are exposed at the Tennyson Deposit Area (TDA), namely at the Tennyson North Cu-Au Zone [TNZ] and the Tennyson Southeast Cu-Au Zone (TSEZ). A study of 19 historic drill holes (3,589m) intersecting the TNZ indicates widespread porphyry-style copper-gold mineralization over a 400 x 200 x 175m area. The TSEZ has similar alteration and mineralization characteristics to the TNZ, returned identical copper-gold surface rock chip results, and is essentially untested by drilling. Important indications of high-temperature porphyry-style alteration and mineralization have also been identified during re-logging of drill holes in the Tennyson Southwest Au Zone (TSWZ), as well as in most 1986 holes drilled between the TNZ and TSWZ. Both the TNZ and TSWZ display a clear magnetic signature that is believed to have been brought about by the presence of hydrothermal magnetite within these systems, relative to unmagnetic host rocks. As such, magnetic surveying has been of utility in target identification, and moreover, such targets appear to correlate well with alteration pattern observed at surface, as well as geochemical anomalism. The area in between the TNZ and TSEZ, and including the TSWZ, contains deposit-grade to highly anomalous gold values, and is interpreted as a peripheral gold halo, locally with epithermal gold-silver veins, immediately surrounding the porphyry-style copper-gold hydrothermal centre. The area of mineralization and alteration at the TDA is open at depth, and towards, the north, west and south underneath permanent snow and ice.
Further exploration during the 2012 field program has indicated that pervasive hydrothermal alteration extends into an area of exposed rock west of the TDA. In addition, observations east of the TDA have identified epithermal veins, locally containing gold, and local mineralized zones with a significant polymetallic signature coincident with magnetic and chargeable geophysical anomalies at depth. The results east and west of the TDA are permissive of porphyry-style mineralization extending at depth in both directions.
Reconnaissance mapping and prospecting discovered an important pervasive hydrothermally altered mineral occurrence about 1.3 km north of the TNZ which returned consistently anomalous gold and copper values.
All observations from the 2012 program indicate that the property has significant potential to host a large copper-gold porphyry system."
Dino Cremonese, P.Eng., President of Teuton Resources Corp., commented as follows: "Work by Brigade has confirmed our belief that the Tennyson property may host a large porphyry copper-gold deposit. During the summer program Brigade also discovered at least two more areas with such potential, wholly contained within the property boundaries. The next step is a comprehensive drill program to determine the size of the copper-gold systems."
Brigade Resources has also purchased the adjacent Tide property for $3 million. The Tide property lies between the Tennyson and the end of the Granduc mining road, and would have to be crossed to provide road access to the Tennyson copper-gold zones.
The Qualified Person for the purposes of this news release is D. Cremonese, P.Eng. Mr. Cremonese, P.Eng. has not independently verified the work of the Brigade exploration team.
Brigade Resources is earning a 50% interest in the Tennyson property by completing expenditures of $6 million over three years. Upon Brigade fulfilling its first interest, it may acquire Teuton's remaining 50% interest by issuing such number of shares to Teuton that reflects a 50% project interest based on Brigade's market capitalization and attributable project value.
Illustrations from Brigade's progress report can be found within the company's website. www.teuton.com, under the Tennyson Property heading.
"Dino Cremonese, P.Eng."
President, Teuton Resources Corp.
If you would like to be added to Teuton's news distribution list, please send your email address to [email protected].
This news release includes certain forward-looking statements concerning the future performance of our business, its operations and its financial performance and condition, as well as management's objectives, strategies, beliefs and intentions. Forward-looking statements are frequently identified by such words as "may", "will", "plan", "expect", "anticipate", "estimate", "intend" and similar words referring to future events and results. Forward-looking statements are based on the current opinions and expectations of management. All forward-looking information is inherently uncertain and subject to a variety of assumptions, risks and uncertainties, including the speculative nature of mineral exploration and development, fluctuating commodity prices, competitive risks and the availability of financing, as described in more detail in our recent securities filings available at www.sedar.com. Actual events or results may differ materially from those projected in the forward looking-statements and we caution against placing undue reliance thereon. Teuton Resources Corp. does have an ongoing obligation to disclose material information, as it becomes available.
The TSX Venture Exchange has neither approved nor disapproved the information contained herein.
This announcement is distributed by Thomson Reuters on behalf of Thomson Reuters clients. The owner of this announcement warrants that:
(i) the releases contained herein are protected by copyright and other applicable laws; and
(ii) they are solely responsible for the content, accuracy and originality of the information contained therein.
Source: Teuton Resources Corp. via Thomson Reuters ONE
We're entering the post-smartphone era, where wearable gadgets from watches and fitness bands to glasses and health aids will power the next technological revolution. With mass adoption of wearable devices comes a new data ecosystem that must be protected. Wearables open new pathways that facilitate the tracking, sharing and storing of consumers’ personal health, location and daily activity data. Consumers have some idea of the data these devices capture, but most don’t realize how revealing and...
May. 6, 2016 04:00 PM EDT Reads: 848
As the rapid adoption of containers continues, companies are finding that they lack the operational tools to understand the behavior of applications deployed in these containers, and how to identify issues in their application infrastructure. For example, how are multiple containers within an application impacting each other’s performance? If an application’s service is degraded, which container is to blame? In the case of an application outage, what was the root cause of the outage?
May. 6, 2016 04:00 PM EDT Reads: 1,205
When it comes to IoT in the enterprise, namely the commercial building and hospitality markets, a benefit not getting the attention it deserves is energy efficiency, and IoT's direct impact on a cleaner, greener environment when installed in smart buildings. Until now clean technology was offered piecemeal and led with point solutions that require significant systems integration to orchestrate and deploy. There didn't exist a 'top down' approach that can manage and monitor the way a Smart Buildi...
May. 6, 2016 03:15 PM EDT Reads: 228
Cloud-based NCLC (No-code/low code) application builder platforms empower everyone in the organization to quickly build applications and executable processes that broaden access, deepen collaboration, and enhance transparency for all team members. Line of business owners (LOBO) and operations managers know best their part of the business and their processes. IT departments are beginning to leverage NCLC platforms to empower and enable LOBOs to lead the innovation, transform the organization, an...
May. 6, 2016 03:00 PM EDT Reads: 253
As enterprises around the world struggle with their digital transformation efforts, many are finding that innovative digital teams are moving much faster than their hidebound IT organizations. Rather than struggling to convince traditional IT to get with the digital program, executives are taking advice from IT research firm Gartner, and encouraging existing IT to continue in their desultory ways. However, many CIOs are realizing the dangers of following Gartner’s advice. The central challenge ...
May. 6, 2016 02:42 PM EDT Reads: 247
Unless you don’t use the internet, don’t live in California, or haven’t been paying attention to the recent news… you should be aware that self-driving cars are on their way to becoming a reality. I have seen them – they are real. If you believe in the future reality of self-driving cars, then continue reading on. If you don’t believe in the future possibilities, then I am not sure what to do to convince you other than discuss the very real changes that will roll out with the consumer producti...
May. 6, 2016 02:15 PM EDT Reads: 910
Cloud Object Storage is effectively infinitely scalable and boasts the lowest total costs. But cloud SLAs and T&Cs are traditionally optimized for huge customers like Netflix, so applications demanding better confidentiality or higher availability typically can’t reap the benefits of public cloud storage. In his session at 18th Cloud Expo, Don Martin, CTO of Security First Corp, will provide an overview of innovative technologies available today – secret sharing and information dispersal algori...
May. 6, 2016 02:02 PM EDT Reads: 249
There is an ever-growing explosion of new devices that are connected to the Internet using “cloud” solutions. This rapid growth is creating a massive new demand for efficient access to data. And it’s not just about connecting to that data anymore. This new demand is bringing new issues and challenges and it is important for companies to scale for the coming growth. And with that scaling comes the need for greater security, gathering and data analysis, storage, connectivity and, of course, the...
May. 6, 2016 01:45 PM EDT Reads: 1,373
The IETF draft standard for M2M certificates is a security solution specifically designed for the demanding needs of IoT/M2M applications. In his session at @ThingsExpo, Brian Romansky, VP of Strategic Technology at TrustPoint Innovation, will explain how M2M certificates can efficiently enable confidentiality, integrity, and authenticity on highly constrained devices.
May. 6, 2016 01:00 PM EDT Reads: 1,410
In the world of DevOps there are ‘known good practices’ – aka ‘patterns’ – and ‘known bad practices’ – aka ‘anti-patterns.' Many of these patterns and anti-patterns have been developed from real world experience, especially by the early adopters of DevOps theory; but many are more feasible in theory than in practice, especially for more recent entrants to the DevOps scene. In this power panel at @DevOpsSummit at 18th Cloud Expo, moderated by DevOps Conference Chair Andi Mann, panelists will dis...
May. 6, 2016 12:45 PM EDT Reads: 1,186
See storage differently! Storage performance problems have only gotten worse and harder to solve as applications have become largely virtualized and moved to a cloud-based infrastructure. Storage performance in a virtualized environment is not just about IOPS, it is about how well that potential performance is guaranteed to individual VMs for these apps as the number of VMs keep going up real time. In his session at 18th Cloud Expo, Dhiraj Sehgal, in product and marketing at Tintri, will discu...
May. 6, 2016 12:30 PM EDT Reads: 1,217
trust and privacy in their ecosystem. Assurance and protection of device identity, secure data encryption and authentication are the key security challenges organizations are trying to address when integrating IoT devices. This holds true for IoT applications in a wide range of industries, for example, healthcare, consumer devices, and manufacturing. In his session at @ThingsExpo, Lancen LaChance, vice president of product management, IoT solutions at GlobalSign, will teach IoT developers how t...
May. 6, 2016 12:00 PM EDT Reads: 841
The pace of innovation, vendor lock-in, production sustainability, cost-effectiveness, and managing risk… In his session at 18th Cloud Expo, Dan Choquette, Founder of RackN, will discuss how CIOs are challenged finding the balance of finding the right tools, technology and operational model that serves the business the best. He will discuss how clouds, open source software and infrastructure solutions have benefits but also drawbacks and how workload and operational portability between vendors...
May. 6, 2016 11:57 AM EDT Reads: 271
So, you bought into the current machine learning craze and went on to collect millions/billions of records from this promising new data source. Now, what do you do with them? Too often, the abundance of data quickly turns into an abundance of problems. How do you extract that "magic essence" from your data without falling into the common pitfalls? In her session at @ThingsExpo, Natalia Ponomareva, Software Engineer at Google, will provide tips on how to be successful in large scale machine lear...
May. 6, 2016 10:30 AM EDT Reads: 1,597
SYS-CON Events announced today that Peak 10, Inc., a national IT infrastructure and cloud services provider, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. Peak 10 provides reliable, tailored data center and network services, cloud and managed services. Its solutions are designed to scale and adapt to customers’ changing business needs, enabling them to lower costs, improve performance and focus inter...
May. 6, 2016 10:00 AM EDT Reads: 1,531