Click here to close now.


News Feed Item

Alpha Minerals Inc.: First Drill Holes for Winter Drill Program at PLS Intersect 21m and 37m of Near Surface Uranium Mineralization

VANCOUVER, BRITISH COLUMBIA -- (Marketwire) -- 02/07/13 -- Alpha Minerals Inc. (TSX VENTURE:AMW) ("Alpha" or "the Company"), and its Joint Venture partner Fission Energy Corp. are pleased to announce the results of the first two holes of the Winter 2013 exploration program at the Patterson Lake South (PLS) property. Both holes were drilled at a 15m step-out to the west of hole PLS12-024 (12.5m @ 2.49% U3O8: see news release dated Nov. 12, 2012).

--  PLS13-027 - 37.0m continuous mineralization; total intervals greater
    than 9999 cps - 4.35m 
--  PLS13-026 - 21.0m continuous mineralization; total intervals greater
    than 9999 cps - 0.75m 

Results include:

Hole PLS13-027: 37.0m wide interval of well-developed mineralization (60.5 - 97.5m) including intermittent intervals totaling 4.35m of radioactivity greater than 9999cps. PLS13-027 was drilled 15m grid west of hole PLS12-024 and 10m grid south of PLS13-026.

Hole PLS13-026: 21.0m wide interval of strong mineralization (63.0 - 84.0m) including intermittent intervals totaling 0.75m of radioactivity greater than 9999cps. PLS13-026 was drilled 15m grid west of PLS12-024.

The updated location map of these drill holes is to be posted on the Alpha Minerals website.

As was the case with previous drill results from the fall 2012 program (holes PLS12-022, 023, 024 and 025), the mineralization occurs at shallow depth in basement rocks. The strongly radioactive intervals occur within a broader region of moderate radioactivity that extend above the Archean basement into the overlying sandstone and extends downward into the basement.

Key Technical Details:

--  A thin layer of sandstone (possibly Devonian age) is present immediately
    above the unconformity in both holes. Mineralization extends up into
    this horizon. 
--  Both holes are comprised of alternating pelite and graphitic pelite
    basement lithology with weak to strong clay and chlorite alteration.
    Narrow pegmatite intrusions are common throughout. Some strongly
    mineralized zones are characterized with intense hematite and chlorite

Hole Summary

                                  (i) Mineralization (greater than 300 cps /
                                                               0.5M minimum)
                                   From - To                                
Hole ID   Grid Line    Az   Dip           (m)  Width (m)        CPS Max Peak
PLS13-026      025W     0   -90  63.0 - 84.0       21.0   306 - greater than
                                 88.5 - 90.0        1.5           320 - 1900
PLS13-027      025W     0   -90  60.5 - 97.5       37.0   180 - greater than
                                     106.0 -        0.5                  660

Hole ID     Sandstone From - To (m)           Depth (m)      Total Depth (m)
PLS13-026              59.9 - 63.8                63.8                172.8 
PLS13-027            56.39 - 62.30                62.3                255.1 

Natural gamma radiation in drill core that is reported in this news release was measured in counts per second (cps) using a hand held Exploranium GR-110G total count gamma-ray scintillometer. The reader is cautioned that scintillometer readings are not directly or uniformly related to uranium grades of the rock sample measured, and should be used only as a preliminary indication of the presence of radioactive materials. The degree of radioactivity within the mineralized intervals is highly variable and associated with visible pitchblende mineralization. All intersections are down-hole, core interval measurements and true thickness is yet to be determined.

An ongoing field program is in progress. These first two drill holes are part of work focusing on the discovery area with 15 meter step outs to establish the width and strike of the newly discovered zone. A second drill is operating from lake ice and is drilling for possible extensions of the 2012 discovery to the east. The first drill hole on the ice has been completed and is currently being logged.

These first two holes were radiometrically logged using a Mount Sopris 2PGA-1000 Natural Gamma probe, which reached its off scale limits in drill hole PLS 13-027.

Split core samples from the mineralized section of core will be taken continuously through the mineralized intervals and submitted to SRC Geoanalytical Laboratories (an SCC ISO/IEC 17025: 2005 Accredited Facility) of Saskatoon for analysis, which includes U3O8 (wt %) and fire assay for gold. All samples sent for analysis will include a 63 element ICP-OES, uranium by fluorimetry and boron. Assay results will be released when received.

Further updates will be provided.

Patterson Lake South Property

The 31,039 hectare PLS project is a 50%/50% Joint Venture held by Fission Energy Corp. and Alpha Minerals Inc (AMW). Fission is the Operator. PLS is accessible by road with primary access from all-weather Highway 955, which runs north to the former Cluff Lake mine, (greater than 60M lbs of U3O8 produced), and passes through the nearby UEX-Areva Shea Creek discoveries located 50km to the north, currently under active exploration and development.

The technical information in this news release has been prepared in accordance with the Canadian regulatory requirements set out in National Instrument 43-101, and reviewed on behalf of the company by Ben Ainsworth, P.Eng. BC/SK, President and CEO for Alpha, a Qualified Person.

On behalf of the Board of Directors of Alpha Minerals Inc.

Ben Ainsworth, President, CEO and Director

Please refer to the Alpha Minerals Inc. website ( for further and updated information.

This press release contains "forward-looking information" that is based on Alpha's current expectations, estimates, forecasts and projections. This forward-looking information includes, among other things, statements with respect to Alpha's development plans. The words "will", "anticipated", "plans" or other similar words and phrases are intended to identify forward-looking information.

Forward-looking information is subject to known and unknown risks, uncertainties and other factors that may cause Alpha's actual results, level of activity, performance or achievements to be materially different from those expressed or implied by such forward-looking information. Such factors include, but are not limited to: uncertainties related exploration and development; the ability to raise sufficient capital to fund exploration and development; changes in economic conditions or financial markets; increases in input costs; litigation, legislative, environmental and other judicial, regulatory, political and competitive developments; technological or operational difficulties or inability to obtain permits encountered in connection with exploration activities; and labour relations matters. This list is not exhaustive of the factors that may affect our forward-looking information. These and other factors should be considered carefully and readers should not place undue reliance on such forward-looking information. Alpha disclaims any intention or obligation to update or revise forward-looking information, whether as a result of new information, future events or otherwise.

Neither the TSX Venture Exchange nor its Regulation Services Provider (as that term is defined in the policies of the TSX Venture Exchange) accepts responsibility for the adequacy or accuracy of this release.

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
Today’s connected world is moving from devices towards things, what this means is that by using increasingly low cost sensors embedded in devices we can create many new use cases. These span across use cases in cities, vehicles, home, offices, factories, retail environments, worksites, health, logistics, and health. These use cases rely on ubiquitous connectivity and generate massive amounts of data at scale. These technologies enable new business opportunities, ways to optimize and automate, al...
There are many considerations when moving applications from on-premise to cloud. It is critical to understand the benefits and also challenges of this migration. A successful migration will result in lower Total Cost of Ownership, yet offer the same or higher level of robustness. Migration to cloud shifts computing resources from your data center, which can yield significant advantages provided that the cloud vendor an offer enterprise-grade quality for your application.
Cloud computing delivers on-demand resources that provide businesses with flexibility and cost-savings. The challenge in moving workloads to the cloud has been the cost and complexity of ensuring the initial and ongoing security and regulatory (PCI, HIPAA, FFIEC) compliance across private and public clouds. Manual security compliance is slow, prone to human error, and represents over 50% of the cost of managing cloud applications. Determining how to automate cloud security compliance is critical...
Manufacturing has widely adopted standardized and automated processes to create designs, build them, and maintain them through their life cycle. However, many modern manufacturing systems go beyond mechanized workflows to introduce empowered workers, flexible collaboration, and rapid iteration. Such behaviors also characterize open source software development and are at the heart of DevOps culture, processes, and tooling.
Containers are revolutionizing the way we deploy and maintain our infrastructures, but monitoring and troubleshooting in a containerized environment can still be painful and impractical. Understanding even basic resource usage is difficult - let alone tracking network connections or malicious activity. In his session at DevOps Summit, Gianluca Borello, Sr. Software Engineer at Sysdig, will cover the current state of the art for container monitoring and visibility, including pros / cons and li...
In their session at DevOps Summit, Asaf Yigal, co-founder and the VP of Product at, and Tomer Levy, co-founder and CEO of, will explore the entire process that they have undergone – through research, benchmarking, implementation, optimization, and customer success – in developing a processing engine that can handle petabytes of data. They will also discuss the requirements of such an engine in terms of scalability, resilience, security, and availability along with how the archi...
In his session at DevOps Summit, Bryan Cantrill, CTO at Joyent, will demonstrate a third path: containers on multi-tenant bare metal that maximizes performance, security, and networking connectivity.
SYS-CON Events announced today that VividCortex, the monitoring solution for the modern data system, will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. The database is the heart of most applications, but it’s also the part that’s hardest to scale, monitor, and optimize even as it’s growing 50% year over year. VividCortex is the first unified suite of database monitoring tools specifically desi...
The IoT market is on track to hit $7.1 trillion in 2020. The reality is that only a handful of companies are ready for this massive demand. There are a lot of barriers, paint points, traps, and hidden roadblocks. How can we deal with these issues and challenges? The paradigm has changed. Old-style ad-hoc trial-and-error ways will certainly lead you to the dead end. What is mandatory is an overarching and adaptive approach to effectively handle the rapid changes and exponential growth.
DevOps has often been described in terms of CAMS: Culture, Automation, Measuring, Sharing. While we’ve seen a lot of focus on the “A” and even on the “M”, there are very few examples of why the “C" is equally important in the DevOps equation. In her session at @DevOps Summit, Lori MacVittie, of F5 Networks, will explore HTTP/1 and HTTP/2 along with Microservices to illustrate why a collaborative culture between Dev, Ops, and the Network is critical to ensuring success.
The Internet of Things (IoT) is growing rapidly by extending current technologies, products and networks. By 2020, Cisco estimates there will be 50 billion connected devices. Gartner has forecast revenues of over $300 billion, just to IoT suppliers. Now is the time to figure out how you’ll make money – not just create innovative products. With hundreds of new products and companies jumping into the IoT fray every month, there’s no shortage of innovation. Despite this, McKinsey/VisionMobile data...
The APN DevOps Competency highlights APN Partners who demonstrate deep capabilities delivering continuous integration, continuous delivery, and configuration management. They help customers transform their business to be more efficient and agile by leveraging the AWS platform and DevOps principles.
The buzz continues for cloud, data analytics and the Internet of Things (IoT) and their collective impact across all industries. But a new conversation is emerging - how do companies use industry disruption and technology enablers to lead in markets undergoing change, uncertainty and ambiguity? Organizations of all sizes need to evolve and transform, often under massive pressure, as industry lines blur and merge and traditional business models are assaulted and turned upside down. In this new da...
Containers are changing the security landscape for software development and deployment. As with any security solutions, security approaches that work for developers, operations personnel and security professionals is a requirement. In his session at @DevOpsSummit, Kevin Gilpin, CTO and Co-Founder of Conjur, will discuss various security considerations for container-based infrastructure and related DevOps workflows.
As-a-service models offer huge opportunities, but also complicate security. It may seem that the easiest way to migrate to a new architectural model is to let others, experts in their field, do the work. This has given rise to many as-a-service models throughout the industry and across the entire technology stack, from software to infrastructure. While this has unlocked huge opportunities to accelerate the deployment of new capabilities or increase economic efficiencies within an organization, i...