|By Marketwired .||
|January 23, 2014 06:30 PM EST||
VANCOUVER, BRITISH COLUMBIA -- (Marketwired) -- 01/23/14 -- Pistol Bay Mining Inc. (TSX VENTURE: PST) ("the Company") is pleased to announce that it has closed the non-brokered private placement announced on January 14th 2014.
A total of 4,000,200 units will be issued as non flow-through units at a price of $0.06 per unit for total proceeds of $240,012. Each unit will consist of one common share and one share purchase warrant. Each warrant will entitle the holder to purchase one additional common share of the Company at a price of $0.10 per share for 18 months from the date of closing.
Shares, warrants and any shares issued upon exercise of the warrants are subject to a hold period of four months expiring May 24th 2014. The proceeds of the private placement will be used for general working capital.
The following insiders participated in the private placement: Doug McFaul, 180,500 units and Dave John Ramesh Bissoondatt 50,000 units.
Finders' fees: Leede Financial Markets Inc. - $2,800.20 cash and 46,670 Broker warrants, Global Securities Corp. - $4,431 cash and 73,850 Broker Warrants and Canaccord Genuity Corp. - $4,800 cash and 80,000 Broker warrants. Each Broker Warrant is convertible into units of the Company at an exercise price of $0.06 until expiration on July 23rd 2015. Each unit comprises one share and one warrant exercisable at $0.10 per share for 18 months from the date of closing.
The Company further announces that pursuant to its stock option plan, the Company has granted incentive stock options to its directors, officers, consultants, and employees to purchase in the total of 650,000 common shares in the capital stock of the company, subject to regulatory approval, exercisable for a period of five years, at a price of $0.105 per share.
About Pistol Bay Mining Inc. (TSX VENTURE: PST) is a diversified Junior Canadian Mineral Exploration Company with a focus on graphite, precious and base metal properties in North America..
For additional information please contact Charles Desjardins at Pistol Bay Mining Inc. or visit www.pistolbaymining.com.
On Behalf of the Board of Directors, PISTOL BAY MINING INC.
Charles Desjardins, President and Director
Neither the TSX Venture Exchange nor its Regulation Services Provider (as that term is defined in the policies of the TSX Venture Exchange) accepts responsibility for the adequacy or accuracy of this release.
This report contains forward looking statements. Resource estimates, unless specifically noted, are considered speculative. Any and all other resource or reserve estimates are historical in nature, and should not be relied upon. By their nature, forward looking statements involve risk and uncertainties because they relate to events and depend on factors that will or may occur in the future. Actual results may vary depending upon exploration activities, industry production, commodity demand and pricing, currency exchange rates, and, but not limited to, general economic factors. Cautionary Note to US investors: The U.S. Securities and Exchange Commission specifically prohibits the use of certain terms, such as "reserves" unless such figures are based upon actual production or formation tests and can be shown to be economically and legally producible under existing economic and operating conditions.
Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security ha...
Sep. 28, 2016 08:15 AM EDT Reads: 534
"We have several customers now running private clouds. They're not as large as they should be but it's getting there. The adoption challenge has been pretty simple. Look at the world today of virtualization vs cloud," stated Nara Rajagopalan, CEO of Accelerite, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Sep. 28, 2016 08:00 AM EDT Reads: 2,408
An IoT product’s log files speak volumes about what’s happening with your products in the field, pinpointing current and potential issues, and enabling you to predict failures and save millions of dollars in inventory. But until recently, no one knew how to listen. In his session at @ThingsExpo, Dan Gettens, Chief Research Officer at OnProcess, will discuss recent research by Massachusetts Institute of Technology and OnProcess Technology, where MIT created a new, breakthrough analytics model f...
Sep. 28, 2016 08:00 AM EDT Reads: 2,049
Sep. 28, 2016 07:45 AM EDT Reads: 2,254
Sep. 28, 2016 07:45 AM EDT Reads: 2,242
Sep. 28, 2016 07:30 AM EDT Reads: 2,872
Sep. 28, 2016 07:30 AM EDT Reads: 2,901
Sep. 28, 2016 07:00 AM EDT Reads: 2,685
Sep. 28, 2016 07:00 AM EDT Reads: 3,458
Sep. 28, 2016 07:00 AM EDT Reads: 2,878
Sep. 28, 2016 07:00 AM EDT Reads: 3,359
Sep. 28, 2016 07:00 AM EDT Reads: 2,086
Sep. 28, 2016 07:00 AM EDT Reads: 2,239
The Jevons Paradox suggests that when technological advances increase efficiency of a resource, it results in an overall increase in consumption. Writing on the increased use of coal as a result of technological improvements, 19th-century economist William Stanley Jevons found that these improvements led to the development of new ways to utilize coal. In his session at 19th Cloud Expo, Mark Thiele, Chief Strategy Officer for Apcera, will compare the Jevons Paradox to modern-day enterprise IT, e...
Sep. 28, 2016 07:00 AM EDT Reads: 2,260
Your business relies on your applications and your employees to stay in business. Whether you develop apps or manage business critical apps that help fuel your business, what happens when users experience sluggish performance? You and all technical teams across the organization – application, network, operations, among others, as well as, those outside the organization, like ISPs and third-party providers – are called in to solve the problem.
Sep. 28, 2016 06:00 AM EDT Reads: 2,625