Welcome!

News Feed Item

Bold Ventures Inc. and KWG Resources Inc.: Black Horse Drilling Update

TORONTO, ONTARIO -- (Marketwired) -- 03/27/14 -- Bold Ventures Inc. (TSX VENTURE:BOL) ("Bold") and KWG Resources Inc. (TSX VENTURE:KWG) ("KWG") are pleased to report that the 5,000 metre drilling program which commenced January 18th has been completed. The program met its objective of extending the Black Horse chromite deposit to depth.

A total of six holes were drilled during the program: three on the Black Horse deposit and three on an untested gravity anomaly known as the C-6 target, one kilometer northeast of the Black Horse. It should be noted that further work, at depth, in the vicinity of the C-6 target remains to be accomplished in order to adequately test the nickel potential in this vicinity.

FN-14-038, the first hole at the C-6 target was drilled south to north and intersected low grade chromite mineralization from 73.77 metres to 107.20 metres totalling 33.4 metres (109.7 ft). Chromite was also intersected closer to surface in highly sheared rock with low core recovery. The hole was terminated in granite.

A second hole, FN-14-039, was collared 100 metres (328 ft) to the south, and drilled north underneath hole FN-14-038. After passing through some volcanic rock, the hole intersected a major shear zone from 116 to 265 metres for a total interval of 149 metres (488.7 ft), with abundant quartz-carbonate veining and trace sulphides. This is the northeastern extension of the JJJ zone first recognized on the Noront property where it contains elevated gold values, and which was drilled through many times during the 2013 Black Horse drilling campaign. Beyond the shear zone, the hole intersected pyroxenite with minor chromite and was also terminated in granite.

The third hole at the C-6 target, FN-14-041, was collared 105 metres (344.4 ft) to the east. It encountered the JJJ shear zone from 71.5 metres to 175.5 metres totalling 104 metres (341.1 ft) which was followed by pyroxenite to the end of the hole at 365 metres (1197.2 ft). The pyroxenite in this hole is not that of the east-west oriented Ring of Fire intrusion, but is rather a north-south dyke discernible from its faint gravity anomaly with a coincidental magnetic high that could be interpreted to be a feeder dyke to the Ring of Fire intrusion.

The objective of drilling the Black Horse chromite deposit was to expand the inferred resource category to depth. Three holes were completed:

FN-14-040 is a 1233 metre (4044.2 ft) hole in the central portion, southwest of the deep intercept of hole FN-10-026 drilled by Fancamp Exploration Ltd. in 2011; FN-14-042C is a 1131 metre (3709.7 ft) hole drilled near the western claim boundary; and FN-14-043 is an 850 metre (2788 ft) hole that targeted, at a shallower depth, the midpoint between the other two holes. All three holes intersected chromite mineralization:

Hole FN-14-040 intersected chromite mineralization from 1041.67 metres to 1181.47 metres totalling 139.8 metres (358.6 ft), including a massive to semi-massive interval from 1099.5 metres to 1181.47 metres for a total interval of 82.0 metres (269.0 ft);

Hole FN-14-042C encountered chromite from 903.7 metres to 1070.96 metres totalling 167.3 metres (548.8 ft) containing mixed massive, semi-massive, and heavily disseminated intervals;

Hole FN-14-043 intersected heavily disseminated semi-massive and massive chromite from 712.59 metres to 800.52 metres for an interval of 87.93 metres (288.4 ft) including a massive unit from 756.25 metres to 790.06 metres for an interval of 33.81 metres (111 ft).

True widths of the intervals quoted in this release are not discernable at the present time. The core has been sampled and submitted to Actlabs, Thunder Bay for assay. The data from the assays will be added to the inferred resource estimate model with a view to updating the resource estimate.

M. J. (Moe) Lavigne, P. Geo., Vice-President of Exploration & Development for KWG, is the Qualified Person that has reviewed and approved the contents of this release.

About Bold Ventures:

Bold has interests in various mineral properties located in and around the Ring of Fire Area of Northern Ontario and in the Atikokan area of Northwestern Ontario. Additionally, Bold is exploring five base and precious metals properties in the Abitibi Greenstone belt of Northwestern Quebec.

About KWG:

KWG has a 30% interest in the Big Daddy chromite deposit and the right to earn 80% of the Black Horse chromite occurrence where inferred resources have been defined. KWG also owns 100% of Canada Chrome Corporation which has staked claims and conducted a $15 million surveying and soil testing program for the engineering and construction of a railroad to the Ring of Fire from Exton, Ontario.

Neither TSX Venture Exchange nor its Regulation Services Provider (as that term is defined in the policies of the TSX Venture Exchange) accepts responsibility for the adequacy or accuracy of this release.

Cautionary Note Regarding Forward-Looking Statements: This Press Release contains forward-looking statements that involve risks and uncertainties, which may cause actual results to differ materially from the statements made. When used in this document, the words "may", "would", "could", "will", "intend", "plan", "anticipate", "believe", "estimate", "expect" and similar expressions are intended to identify forward-looking statements. Such statements reflect our current views with respect to future events and are subject to such risks and uncertainties. Many factors could cause our actual results to differ materially from the statements made, including those factors discussed in filings made by us with the Canadian securities regulatory authorities. Should one or more of these risks and uncertainties, such actual results of current exploration programs, the general risks associated with the mining industry, the price of gold and other metals, currency and interest rate fluctuations, increased competition and general economic and market factors, occur or should assumptions underlying the forward looking statements prove incorrect, actual results may vary materially from those described herein as intended, planned, anticipated, or expected. We do not intend and do not assume any obligation to update these forward-looking statements, except as required by law. Shareholders are cautioned not to put undue reliance on such forward-looking statements.

Contacts:
Bold Ventures Inc.
Richard Nemis
CEO and President
416-864-1456

Bold Ventures Inc.
David Graham
Executive Vice-President
416-864-1456
www.boldventuresinc.com

http://www.facebook.com/kwgresourcesinc
http://twitter.com/kwgresources
http://www.youtube.com/KWGresources
http://www.flickr.com/photos/kwgresources

Contacts:
KWG Resources Inc.
Bruce Hodgman
Vice-President
416-642-3575
[email protected]

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
SYS-CON Events announced today that IBM has been named “Diamond Sponsor” of SYS-CON's 21st Cloud Expo, which will take place on October 31 through November 2nd 2017 at the Santa Clara Convention Center in Santa Clara, California.
In his Opening Keynote at 21st Cloud Expo, John Considine, General Manager of IBM Cloud Infrastructure, will lead you through the exciting evolution of the cloud. He'll look at this major disruption from the perspective of technology, business models, and what this means for enterprises of all sizes. John Considine is General Manager of Cloud Infrastructure Services at IBM. In that role he is responsible for leading IBM’s public cloud infrastructure including strategy, development, and offering ...
Coca-Cola’s Google powered digital signage system lays the groundwork for a more valuable connection between Coke and its customers. Digital signs pair software with high-resolution displays so that a message can be changed instantly based on what the operator wants to communicate or sell. In their Day 3 Keynote at 21st Cloud Expo, Greg Chambers, Global Group Director, Digital Innovation, Coca-Cola, and Vidya Nagarajan, a Senior Product Manager at Google, will discuss how from store operations...
In a recent survey, Sumo Logic surveyed 1,500 customers who employ cloud services such as Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). According to the survey, a quarter of the respondents have already deployed Docker containers and nearly as many (23 percent) are employing the AWS Lambda serverless computing framework. It’s clear: serverless is here to stay. The adoption does come with some needed changes, within both application development and operations. Tha...
Infoblox delivers Actionable Network Intelligence to enterprise, government, and service provider customers around the world. They are the industry leader in DNS, DHCP, and IP address management, the category known as DDI. We empower thousands of organizations to control and secure their networks from the core-enabling them to increase efficiency and visibility, improve customer service, and meet compliance requirements.
In his session at 21st Cloud Expo, Michael Burley, a Senior Business Development Executive in IT Services at NetApp, will describe how NetApp designed a three-year program of work to migrate 25PB of a major telco's enterprise data to a new STaaS platform, and then secured a long-term contract to manage and operate the platform. This significant program blended the best of NetApp’s solutions and services capabilities to enable this telco’s successful adoption of private cloud storage and launchi...
Join IBM November 1 at 21st Cloud Expo at the Santa Clara Convention Center in Santa Clara, CA, and learn how IBM Watson can bring cognitive services and AI to intelligent, unmanned systems. Cognitive analysis impacts today’s systems with unparalleled ability that were previously available only to manned, back-end operations. Thanks to cloud processing, IBM Watson can bring cognitive services and AI to intelligent, unmanned systems. Imagine a robot vacuum that becomes your personal assistant tha...
Transforming cloud-based data into a reportable format can be a very expensive, time-intensive and complex operation. As a SaaS platform with more than 30 million global users, Cornerstone OnDemand’s challenge was to create a scalable solution that would improve the time it took customers to access their user data. Our Real-Time Data Warehouse (RTDW) process vastly reduced data time-to-availability from 24 hours to just 10 minutes. In his session at 21st Cloud Expo, Mark Goldin, Chief Technolo...
The next XaaS is CICDaaS. Why? Because CICD saves developers a huge amount of time. CD is an especially great option for projects that require multiple and frequent contributions to be integrated. But… securing CICD best practices is an emerging, essential, yet little understood practice for DevOps teams and their Cloud Service Providers. The only way to get CICD to work in a highly secure environment takes collaboration, patience and persistence. Building CICD in the cloud requires rigorous ar...
Cloud Expo, Inc. has announced today that Andi Mann and Aruna Ravichandran have been named Co-Chairs of @DevOpsSummit at Cloud Expo Silicon Valley which will take place Oct. 31-Nov. 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. "DevOps is at the intersection of technology and business-optimizing tools, organizations and processes to bring measurable improvements in productivity and profitability," said Aruna Ravichandran, vice president, DevOps product and solutions marketing...
Gemini is Yahoo’s native and search advertising platform. To ensure the quality of a complex distributed system that spans multiple products and components and across various desktop websites and mobile app and web experiences – both Yahoo owned and operated and third-party syndication (supply), with complex interaction with more than a billion users and numerous advertisers globally (demand) – it becomes imperative to automate a set of end-to-end tests 24x7 to detect bugs and regression. In th...
The session is centered around the tracing of systems on cloud using technologies like ebpf. The goal is to talk about what this technology is all about and what purpose it serves. In his session at 21st Cloud Expo, Shashank Jain, Development Architect at SAP, will touch upon concepts of observability in the cloud and also some of the challenges we have. Generally most cloud-based monitoring tools capture details at a very granular level. To troubleshoot problems this might not be good enough.
With major technology companies and startups seriously embracing Cloud strategies, now is the perfect time to attend 21st Cloud Expo October 31 - November 2, 2017, at the Santa Clara Convention Center, CA, and June 12-14, 2018, at the Javits Center in New York City, NY, and learn what is going on, contribute to the discussions, and ensure that your enterprise is on the right path to Digital Transformation.
We all know that end users experience the Internet primarily with mobile devices. From an app development perspective, we know that successfully responding to the needs of mobile customers depends on rapid DevOps – failing fast, in short, until the right solution evolves in your customers' relationship to your business. Whether you’re decomposing an SOA monolith, or developing a new application cloud natively, it’s not a question of using microservices – not doing so will be a path to eventual b...
In the fast-paced advances and popularity in cloud technology, one of the most critical factors revolves around concerns for security of your critical data. How to assure both your company and your customers they can confidently trust and utilize your cloud environment is most often top on the list. There is a method to evaluating and providing security that exceeds conventional modes of protecting data both within the cloud as well externally on mobile and other devices. With the public failure...