Welcome!

News Feed Item

Colossus Minerals Inc. Announces Creditor Approval of Proposal

TORONTO, ONTARIO -- (Marketwired) -- 02/25/14 -- Colossus Minerals Inc. ("Colossus" or the "Company") is pleased to announce that the resolution (the "Resolution") approving the Company's amended proposal (the "Proposal") pursuant to the Bankruptcy and Insolvency Act (Canada) (the "BIA") was approved by the requisite majority of creditors at the meeting of creditors held today.

Pursuant to the requirements of the BIA and the proposal trustee, Duff & Phelps Canada Restructuring Inc. (the "Proposal Trustee"), the Colossus intends to seek an order from the Ontario Superior Court of Justice (Commercial List) approving the Proposal (the "Order") at a hearing to take place on March 13, 2014. Implementation of the Proposal is subject to receipt of the Order and to satisfaction or waiver of certain other conditions precedent set forth in the Proposal.

Assuming satisfaction or waiver of the conditions within the expected time frames, the Company anticipates implementing the Proposal in March 2014.

All inquiries regarding the Proposal and BIA proceeding should be directed to the Proposal Trustee (Noah Goldstein, 416-932-6207). A copy of the Proposal, as approved, will be available on the website of the Proposal Trustee at http://www.duffandphelps.com/intl/en-ca/Pages/RestructuringCases.aspx?caseId=941.

Cautionary Statement Regarding Forward-Looking Information

Forward-looking statements in this press release include statements regarding the ability of the Company to implement the Proposal or otherwise complete the transactions contemplated hereby, obtain financing or if obtained to obtain on commercially reasonable terms, the timing and nature of future exploration and development programs that are dependent on projections that may change as drilling continues, or if unexpected ground conditions are encountered. The Company does not currently have any mineral properties that are in production or that contain a reserve as defined by National Instrument 43-101. In addition, areas of exploration potential are identified which will require additional drilling to determine whether or not they contain similar mineralization to areas that have been explored in more detail. Significant additional drilling is required at Serra Pelada to fully understand system size.

Except for statements of historical fact relating to Colossus, certain statements in this press release relating but not limited to the Company's exploration and development plans, activities and intentions, constitute "forward-looking information" within the meaning of the Securities Act (Ontario) or "forward-looking statements" within the meaning of the United States Private Litigation Reform Act of 1995. These forward-looking statements represent management's best judgment based on current facts and assumptions that management considers reasonable. Forward-looking statements are frequently characterized by words such as "target", "plan", "expect", "project", "intend", believe", "anticipate" and other similar words, or statements that certain events or conditions "appear to", "may" or "will" occur. Forward-looking statements are based on the opinions and estimates of management at the date the statements are made, and are subject to a variety of risks and uncertainties and other factors that could cause actual events or results to differ materially from those projected in the forward-looking statements. The factors include but are not limited to risks related to the timing and completion of the transactions on the terms described herein (if at all), the Company's relationship with COOMIGASP and/or those seeking to control it, the joint venture operation, actual results of exploration activities, the inherent risks involved in the exploration and development of mineral properties, changes in project parameters as plans continue to be refined, delays in obtaining government approvals, the uncertainties of project cost overruns or unanticipated costs and expenses, uncertainties relating to the availability and costs of financing needed in the future, the uncertainties inherent to conducting business in Brazil and the rest of Latin America, the availability of equipment and supplies, unexpected adverse climate conditions, the reliance on only a few key members of management, as well as those factors discussed in the section entitled "Risk Factors" in the Company's most recent Annual Information Form which has been filed with Canadian provincial securities regulatory authorities and other regulatory filings which are posted on SEDAR at www.sedar.com. Unless required by law, Colossus undertakes no obligation to update forward-looking statements if circumstances or management's estimates or opinions should change. The reader is cautioned not to place undue reliance on forward-looking statements.

Contacts:
Colossus Minerals Inc.
[email protected]

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
The revocation of Safe Harbor has radically affected data sovereignty strategy in the cloud. In his session at 17th Cloud Expo, Jeff Miller, Product Management at Cavirin Systems, discussed how to assess these changes across your own cloud strategy, and how you can mitigate risks previously covered under the agreement.
In his session at 21st Cloud Expo, Raju Shreewastava, founder of Big Data Trunk, provided a fun and simple way to introduce Machine Leaning to anyone and everyone. He solved a machine learning problem and demonstrated an easy way to be able to do machine learning without even coding. Raju Shreewastava is the founder of Big Data Trunk (www.BigDataTrunk.com), a Big Data Training and consulting firm with offices in the United States. He previously led the data warehouse/business intelligence and Bi...
Digital Initiatives create new ways of conducting business, which drive the need for increasingly advanced security and regulatory compliance challenges with exponentially more damaging consequences. In the BMC and Forbes Insights Survey in 2016, 97% of executives said they expect a rise in data breach attempts in the next 12 months. Sixty percent said operations and security teams have only a general understanding of each other’s requirements, resulting in a “SecOps gap” leaving organizations u...
Cell networks have the advantage of long-range communications, reaching an estimated 90% of the world. But cell networks such as 2G, 3G and LTE consume lots of power and were designed for connecting people. They are not optimized for low- or battery-powered devices or for IoT applications with infrequently transmitted data. Cell IoT modules that support narrow-band IoT and 4G cell networks will enable cell connectivity, device management, and app enablement for low-power wide-area network IoT. B...
While some developers care passionately about how data centers and clouds are architected, for most, it is only the end result that matters. To the majority of companies, technology exists to solve a business problem, and only delivers value when it is solving that problem. 2017 brings the mainstream adoption of containers for production workloads. In his session at 21st Cloud Expo, Ben McCormack, VP of Operations at Evernote, discussed how data centers of the future will be managed, how the p...
Transformation Abstract Encryption and privacy in the cloud is a daunting yet essential task for both security practitioners and application developers, especially as applications continue moving to the cloud at an exponential rate. What are some best practices and processes for enterprises to follow that balance both security and ease of use requirements? What technologies are available to empower enterprises with code, data and key protection from cloud providers, system administrators, inside...
Extreme Computing is the ability to leverage highly performant infrastructure and software to accelerate Big Data, machine learning, HPC, and Enterprise applications. High IOPS Storage, low-latency networks, in-memory databases, GPUs and other parallel accelerators are being used to achieve faster results and help businesses make better decisions. In his session at 18th Cloud Expo, Michael O'Neill, Strategic Business Development at NVIDIA, focused on some of the unique ways extreme computing is...
The Internet of Things will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform and how we integrate our thinking to solve complicated problems. In his session at 19th Cloud Expo, Craig Sproule, CEO of Metavine, demonstrated how to move beyond today's coding paradigm and sh...
With the proliferation of both SQL and NoSQL databases, organizations can now target specific fit-for-purpose database tools for their different application needs regarding scalability, ease of use, ACID support, etc. Platform as a Service offerings make this even easier now, enabling developers to roll out their own database infrastructure in minutes with minimal management overhead. However, this same amount of flexibility also comes with the challenges of picking the right tool, on the right ...
What are the new priorities for the connected business? First: businesses need to think differently about the types of connections they will need to make – these span well beyond the traditional app to app into more modern forms of integration including SaaS integrations, mobile integrations, APIs, device integration and Big Data integration. It’s important these are unified together vs. doing them all piecemeal. Second, these types of connections need to be simple to design, adapt and configure...
Traditional on-premises data centers have long been the domain of modern data platforms like Apache Hadoop, meaning companies who build their business on public cloud were challenged to run Big Data processing and analytics at scale. But recent advancements in Hadoop performance, security, and most importantly cloud-native integrations, are giving organizations the ability to truly gain value from all their data. In his session at 19th Cloud Expo, David Tishgart, Director of Product Marketing ...
More and more companies are looking to microservices as an architectural pattern for breaking apart applications into more manageable pieces so that agile teams can deliver new features quicker and more effectively. What this pattern has done more than anything to date is spark organizational transformations, setting the foundation for future application development. In practice, however, there are a number of considerations to make that go beyond simply “build, ship, and run,” which changes how...
Cloud computing delivers on-demand resources that provide businesses with flexibility and cost-savings. The challenge in moving workloads to the cloud has been the cost and complexity of ensuring the initial and ongoing security and regulatory (PCI, HIPAA, FFIEC) compliance across private and public clouds. Manual security compliance is slow, prone to human error, and represents over 50% of the cost of managing cloud applications. Determining how to automate cloud security compliance is critical...
Traditional IT, great for stable systems of record, is struggling to cope with newer, agile systems of engagement requirements coming straight from the business. In his session at 18th Cloud Expo, William Morrish, General Manager of Product Sales at Interoute, will outline ways of exploiting new architectures to enable both systems and building them to support your existing platforms, with an eye for the future. Technologies such as Docker and the hyper-convergence of computing, networking and...
Contextual Analytics of various threat data provides a deeper understanding of a given threat and enables identification of unknown threat vectors. In his session at @ThingsExpo, David Dufour, Head of Security Architecture, IoT, Webroot, Inc., discussed how through the use of Big Data analytics and deep data correlation across different threat types, it is possible to gain a better understanding of where, how and to what level of danger a malicious actor poses to an organization, and to determ...