Welcome!

News Feed Item

Bold Ventures Inc. and KWG Resources Inc.: Black Horse Drilling Update

TORONTO, ONTARIO -- (Marketwired) -- 03/27/14 -- Bold Ventures Inc. (TSX VENTURE:BOL) ("Bold") and KWG Resources Inc. (TSX VENTURE:KWG) ("KWG") are pleased to report that the 5,000 metre drilling program which commenced January 18th has been completed. The program met its objective of extending the Black Horse chromite deposit to depth.

A total of six holes were drilled during the program: three on the Black Horse deposit and three on an untested gravity anomaly known as the C-6 target, one kilometer northeast of the Black Horse. It should be noted that further work, at depth, in the vicinity of the C-6 target remains to be accomplished in order to adequately test the nickel potential in this vicinity.

FN-14-038, the first hole at the C-6 target was drilled south to north and intersected low grade chromite mineralization from 73.77 metres to 107.20 metres totalling 33.4 metres (109.7 ft). Chromite was also intersected closer to surface in highly sheared rock with low core recovery. The hole was terminated in granite.

A second hole, FN-14-039, was collared 100 metres (328 ft) to the south, and drilled north underneath hole FN-14-038. After passing through some volcanic rock, the hole intersected a major shear zone from 116 to 265 metres for a total interval of 149 metres (488.7 ft), with abundant quartz-carbonate veining and trace sulphides. This is the northeastern extension of the JJJ zone first recognized on the Noront property where it contains elevated gold values, and which was drilled through many times during the 2013 Black Horse drilling campaign. Beyond the shear zone, the hole intersected pyroxenite with minor chromite and was also terminated in granite.

The third hole at the C-6 target, FN-14-041, was collared 105 metres (344.4 ft) to the east. It encountered the JJJ shear zone from 71.5 metres to 175.5 metres totalling 104 metres (341.1 ft) which was followed by pyroxenite to the end of the hole at 365 metres (1197.2 ft). The pyroxenite in this hole is not that of the east-west oriented Ring of Fire intrusion, but is rather a north-south dyke discernible from its faint gravity anomaly with a coincidental magnetic high that could be interpreted to be a feeder dyke to the Ring of Fire intrusion.

The objective of drilling the Black Horse chromite deposit was to expand the inferred resource category to depth. Three holes were completed:

FN-14-040 is a 1233 metre (4044.2 ft) hole in the central portion, southwest of the deep intercept of hole FN-10-026 drilled by Fancamp Exploration Ltd. in 2011; FN-14-042C is a 1131 metre (3709.7 ft) hole drilled near the western claim boundary; and FN-14-043 is an 850 metre (2788 ft) hole that targeted, at a shallower depth, the midpoint between the other two holes. All three holes intersected chromite mineralization:

Hole FN-14-040 intersected chromite mineralization from 1041.67 metres to 1181.47 metres totalling 139.8 metres (358.6 ft), including a massive to semi-massive interval from 1099.5 metres to 1181.47 metres for a total interval of 82.0 metres (269.0 ft);

Hole FN-14-042C encountered chromite from 903.7 metres to 1070.96 metres totalling 167.3 metres (548.8 ft) containing mixed massive, semi-massive, and heavily disseminated intervals;

Hole FN-14-043 intersected heavily disseminated semi-massive and massive chromite from 712.59 metres to 800.52 metres for an interval of 87.93 metres (288.4 ft) including a massive unit from 756.25 metres to 790.06 metres for an interval of 33.81 metres (111 ft).

True widths of the intervals quoted in this release are not discernable at the present time. The core has been sampled and submitted to Actlabs, Thunder Bay for assay. The data from the assays will be added to the inferred resource estimate model with a view to updating the resource estimate.

M. J. (Moe) Lavigne, P. Geo., Vice-President of Exploration & Development for KWG, is the Qualified Person that has reviewed and approved the contents of this release.

About Bold Ventures:

Bold has interests in various mineral properties located in and around the Ring of Fire Area of Northern Ontario and in the Atikokan area of Northwestern Ontario. Additionally, Bold is exploring five base and precious metals properties in the Abitibi Greenstone belt of Northwestern Quebec.

About KWG:

KWG has a 30% interest in the Big Daddy chromite deposit and the right to earn 80% of the Black Horse chromite occurrence where inferred resources have been defined. KWG also owns 100% of Canada Chrome Corporation which has staked claims and conducted a $15 million surveying and soil testing program for the engineering and construction of a railroad to the Ring of Fire from Exton, Ontario.

Neither TSX Venture Exchange nor its Regulation Services Provider (as that term is defined in the policies of the TSX Venture Exchange) accepts responsibility for the adequacy or accuracy of this release.

Cautionary Note Regarding Forward-Looking Statements: This Press Release contains forward-looking statements that involve risks and uncertainties, which may cause actual results to differ materially from the statements made. When used in this document, the words "may", "would", "could", "will", "intend", "plan", "anticipate", "believe", "estimate", "expect" and similar expressions are intended to identify forward-looking statements. Such statements reflect our current views with respect to future events and are subject to such risks and uncertainties. Many factors could cause our actual results to differ materially from the statements made, including those factors discussed in filings made by us with the Canadian securities regulatory authorities. Should one or more of these risks and uncertainties, such actual results of current exploration programs, the general risks associated with the mining industry, the price of gold and other metals, currency and interest rate fluctuations, increased competition and general economic and market factors, occur or should assumptions underlying the forward looking statements prove incorrect, actual results may vary materially from those described herein as intended, planned, anticipated, or expected. We do not intend and do not assume any obligation to update these forward-looking statements, except as required by law. Shareholders are cautioned not to put undue reliance on such forward-looking statements.

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
There are 66 million network cameras capturing terabytes of data. How did factories in Japan improve physical security at the facilities and improve employee productivity? Edge Computing reduces possible kilobytes of data collected per second to only a few kilobytes of data transmitted to the public cloud every day. Data is aggregated and analyzed close to sensors so only intelligent results need to be transmitted to the cloud. Non-essential data is recycled to optimize storage.
"I think that everyone recognizes that for IoT to really realize its full potential and value that it is about creating ecosystems and marketplaces and that no single vendor is able to support what is required," explained Esmeralda Swartz, VP, Marketing Enterprise and Cloud at Ericsson, in this SYS-CON.tv interview at @ThingsExpo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Microservices are a very exciting architectural approach that many organizations are looking to as a way to accelerate innovation. Microservices promise to allow teams to move away from monolithic "ball of mud" systems, but the reality is that, in the vast majority of organizations, different projects and technologies will continue to be developed at different speeds. How to handle the dependencies between these disparate systems with different iteration cycles? Consider the "canoncial problem" ...
As businesses adopt functionalities in cloud computing, it’s imperative that IT operations consistently ensure cloud systems work correctly – all of the time, and to their best capabilities. In his session at @BigDataExpo, Bernd Harzog, CEO and founder of OpsDataStore, will present an industry answer to the common question, “Are you running IT operations as efficiently and as cost effectively as you need to?” He will expound on the industry issues he frequently came up against as an analyst, and...
Why do your mobile transformations need to happen today? Mobile is the strategy that enterprise transformation centers on to drive customer engagement. In his general session at @ThingsExpo, Roger Woods, Director, Mobile Product & Strategy – Adobe Marketing Cloud, covered key IoT and mobile trends that are forcing mobile transformation, key components of a solid mobile strategy and explored how brands are effectively driving mobile change throughout the enterprise.
After more than five years of DevOps, definitions are evolving, boundaries are expanding, ‘unicorns’ are no longer rare, enterprises are on board, and pundits are moving on. Can we now look at an evolution of DevOps? Should we? Is the foundation of DevOps ‘done’, or is there still too much left to do? What is mature, and what is still missing? What does the next 5 years of DevOps look like? In this Power Panel at DevOps Summit, moderated by DevOps Summit Conference Chair Andi Mann, panelists l...
In their Live Hack” presentation at 17th Cloud Expo, Stephen Coty and Paul Fletcher, Chief Security Evangelists at Alert Logic, provided the audience with a chance to see a live demonstration of the common tools cyber attackers use to attack cloud and traditional IT systems. This “Live Hack” used open source attack tools that are free and available for download by anybody. Attendees learned where to find and how to operate these tools for the purpose of testing their own IT infrastructure. The...
Keeping pace with advancements in software delivery processes and tooling is taxing even for the most proficient organizations. Point tools, platforms, open source and the increasing adoption of private and public cloud services requires strong engineering rigor - all in the face of developer demands to use the tools of choice. As Agile has settled in as a mainstream practice, now DevOps has emerged as the next wave to improve software delivery speed and output. To make DevOps work, organization...
My team embarked on building a data lake for our sales and marketing data to better understand customer journeys. This required building a hybrid data pipeline to connect our cloud CRM with the new Hadoop Data Lake. One challenge is that IT was not in a position to provide support until we proved value and marketing did not have the experience, so we embarked on the journey ourselves within the product marketing team for our line of business within Progress. In his session at @BigDataExpo, Sum...
The modern software development landscape consists of best practices and tools that allow teams to deliver software in a near-continuous manner. By adopting a culture of automation, measurement and sharing, the time to ship code has been greatly reduced, allowing for shorter release cycles and quicker feedback from customers and users. Still, with all of these tools and methods, how can teams stay on top of what is taking place across their infrastructure and codebase? Hopping between services a...
Virtualization over the past years has become a key strategy for IT to acquire multi-tenancy, increase utilization, develop elasticity and improve security. And virtual machines (VMs) are quickly becoming a main vehicle for developing and deploying applications. The introduction of containers seems to be bringing another and perhaps overlapped solution for achieving the same above-mentioned benefits. Are a container and a virtual machine fundamentally the same or different? And how? Is one techn...
SYS-CON Events announced today that MobiDev, a client-oriented software development company, will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place June 6-8, 2017, at the Javits Center in New York City, NY, and the 21st International Cloud Expo®, which will take place October 31-November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. MobiDev is a software company that develops and delivers turn-key mobile apps, websites, web services, and complex softw...
DevOps is often described as a combination of technology and culture. Without both, DevOps isn't complete. However, applying the culture to outdated technology is a recipe for disaster; as response times grow and connections between teams are delayed by technology, the culture will die. A Nutanix Enterprise Cloud has many benefits that provide the needed base for a true DevOps paradigm.
What sort of WebRTC based applications can we expect to see over the next year and beyond? One way to predict development trends is to see what sorts of applications startups are building. In his session at @ThingsExpo, Arin Sime, founder of WebRTC.ventures, will discuss the current and likely future trends in WebRTC application development based on real requests for custom applications from real customers, as well as other public sources of information,
Interoute has announced the integration of its Global Cloud Infrastructure platform with Rancher Labs’ container management platform, Rancher. This approach enables enterprises to accelerate their digital transformation and infrastructure investments. Matthew Finnie, Interoute CTO commented “Enterprises developing and building apps in the cloud and those on a path to Digital Transformation need Digital ICT Infrastructure that allows them to build, test and deploy faster than ever before. The int...