Welcome!

News Feed Item

Grades of up to 60.38% Carbon Graphite Confirmed At Callinex' Neuron Property

VANCOUVER, April 25, 2014 /PRNewswire/ - Callinex Mines Inc. (CNX-TSX.V) ( CLLXF – OTCQX) is pleased to announce that the third diamond drill hole of their recently completed campaign at their Neuron graphite property has intersected the highest grade of graphite mineralization to date, over minable widths.

Assays have confirmed that diamond drill hole NEU003 contains a 4.10 meter section grading 60.38% carbon graphite, which is part of a larger 56.00 meter intersection grading 5.91% carbon graphite.

The mineralized zone in NEU003 begins only 17.20 meters below surface, consisting of disseminated to solid mineralization in various concentrations, to a depth of 117.5 meters. The hole was drilled 20 metres from recently reported diamond drill holes NEU001 & NEU002, oriented at 102° and dipping at -70°. With the benefit of this intersection, Callinex' exploration team will be able to model the strike and dip of the rich graphitic intervals, and better delineate the orientation of the horizon.

Company Chairman and CEO Mike Muzylowski expressed satisfaction with the continuing emergence of this structure: "What we have uncovered here at Neuron appears to be unique. The high carbon content, coupled with large flake size is exactly what we had hoped for when we staked this area. The mineralization appears to be shallow and gently dipping."

The Neuron Property is located in Northern Manitoba near Thompson. A hydro-electric dam operated by the Manitoba Government is on the company's mineral tenure, and 220 kV power lines run the length of the 43,000 hectare property. As previously reported, preliminary analysis of the project's mineralogy by SGS labs determined that the mineralization occurs in coarse polycrystalline aggregates and layers, forming fine to coarse flakes ranging from 100 μm (micrometres) to 2 millimetres. Results from tests designed to suitably determine the liberation characteristics of the material are forthcoming.

Table 1 illustrates the most significant sections of NEU003.

DDH

From (m)

To (m)

Width

Cg%

NEU003

17.20

22.00

4.80

4.49

NEU003

24.90

30.90

6.00

4.27

NEU003

61.50

117.50

56.00

5.91

Including

61.50

65.60

4.10

60.38

Including

61.50

73.50

12.00

21.36

The drilling program was carried-out from late February to early April and consisted of 12 drill holes totaling 2,226 metres. Drilling successfully identified graphite mineralization in 10 of 12 drill holes. The zone of mineralization remains open along strike and down dip. The graphite mineralization textures vary from stringer to near solid. Mineralization occurs near surface in quartz-biotite schist. 

Logging and sampling of the core has recently been completed at a company facility, and samples are being shipped to SGS labs in Lakefield, Ontario for assay and mineralogy work. Assays from additional drill holes and results from metallurgical work are forthcoming.

Callinex Mines maintained a QA/QC program at all stages of exploration. Drill core recovery was calculated, measured and recorded at the Neuron property before being cut and sampled. Samples were sawed in half, one half of each sample being kept for storage and the other half placed in a pre-labeled plastic bag, tagged with the sample number and recorded in the log. Callinex QA/QC samples were inserted into the group of samples and shipped to SGS labs in Lakefield, ON, where they were crushed, split, pulverized to 250 g samples at 200 mesh and then assayed.  The lab employs internal quality control by assaying pulp duplicates and inserting quality control standards of predetermined values and a blank sample.

About the Neuron property:

The 43,000 hectare Neuron graphite exploration property was acquired by staking in 2013. A search of Manitoba government archives confirmed company Chairman and CEO Mike Muzylowski's knowledge of historic nickel exploration programs in the area that had encountered high-grade graphite incidentally. Following staking, the company conducted a 1,800 kilometer airborne survey which identified multiple drill targets (see company press release Jan 08, 2014).  This recent drilling program has tested the first two such targets. Eight targets remain un-tested.

About Callinex


Callinex is a Canadian mineral exploration company with projects in the Provinces of British Colombia and Manitoba, Canada. The company's exploration activities are designed to offer shareholders exposure to the discovery phase of the mining value cycle.

On Behalf of the Board of Directors,

Mike Muzylowski

Chairman and CEO

The technical information in this release was reviewed and verified by JJ O'Donnell, a qualified person as defined by National Instrument 43-101. Neither the TSX Venture Exchange nor its Regulation Services Provider (as that term is defined in the policies of the TSX Venture Exchange) accepts responsibility for the adequacy or accuracy of this release. Some statements in this news release contain forward-looking information. These statements include, but are not limited to, statements with respect to future expenditures. These statements address future events and conditions and, as such, involve known and unknown risks, uncertainties and other factors which may cause the actual results, performance or achievements to be materially different from any future results, performance or achievements expressed or implied by the statements. Such factors include, among others, the ability to complete contemplated work programs and the timing and amount of expenditures. Callinex does not assume the obligation to update any forward-looking statement.

SOURCE Callinex Mines Inc.

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
The revocation of Safe Harbor has radically affected data sovereignty strategy in the cloud. In his session at 17th Cloud Expo, Jeff Miller, Product Management at Cavirin Systems, discussed how to assess these changes across your own cloud strategy, and how you can mitigate risks previously covered under the agreement.
In his session at 21st Cloud Expo, Raju Shreewastava, founder of Big Data Trunk, provided a fun and simple way to introduce Machine Leaning to anyone and everyone. He solved a machine learning problem and demonstrated an easy way to be able to do machine learning without even coding. Raju Shreewastava is the founder of Big Data Trunk (www.BigDataTrunk.com), a Big Data Training and consulting firm with offices in the United States. He previously led the data warehouse/business intelligence and Bi...
Digital Initiatives create new ways of conducting business, which drive the need for increasingly advanced security and regulatory compliance challenges with exponentially more damaging consequences. In the BMC and Forbes Insights Survey in 2016, 97% of executives said they expect a rise in data breach attempts in the next 12 months. Sixty percent said operations and security teams have only a general understanding of each other’s requirements, resulting in a “SecOps gap” leaving organizations u...
Cell networks have the advantage of long-range communications, reaching an estimated 90% of the world. But cell networks such as 2G, 3G and LTE consume lots of power and were designed for connecting people. They are not optimized for low- or battery-powered devices or for IoT applications with infrequently transmitted data. Cell IoT modules that support narrow-band IoT and 4G cell networks will enable cell connectivity, device management, and app enablement for low-power wide-area network IoT. B...
While some developers care passionately about how data centers and clouds are architected, for most, it is only the end result that matters. To the majority of companies, technology exists to solve a business problem, and only delivers value when it is solving that problem. 2017 brings the mainstream adoption of containers for production workloads. In his session at 21st Cloud Expo, Ben McCormack, VP of Operations at Evernote, discussed how data centers of the future will be managed, how the p...
Transformation Abstract Encryption and privacy in the cloud is a daunting yet essential task for both security practitioners and application developers, especially as applications continue moving to the cloud at an exponential rate. What are some best practices and processes for enterprises to follow that balance both security and ease of use requirements? What technologies are available to empower enterprises with code, data and key protection from cloud providers, system administrators, inside...
Extreme Computing is the ability to leverage highly performant infrastructure and software to accelerate Big Data, machine learning, HPC, and Enterprise applications. High IOPS Storage, low-latency networks, in-memory databases, GPUs and other parallel accelerators are being used to achieve faster results and help businesses make better decisions. In his session at 18th Cloud Expo, Michael O'Neill, Strategic Business Development at NVIDIA, focused on some of the unique ways extreme computing is...
The Internet of Things will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform and how we integrate our thinking to solve complicated problems. In his session at 19th Cloud Expo, Craig Sproule, CEO of Metavine, demonstrated how to move beyond today's coding paradigm and sh...
With the proliferation of both SQL and NoSQL databases, organizations can now target specific fit-for-purpose database tools for their different application needs regarding scalability, ease of use, ACID support, etc. Platform as a Service offerings make this even easier now, enabling developers to roll out their own database infrastructure in minutes with minimal management overhead. However, this same amount of flexibility also comes with the challenges of picking the right tool, on the right ...
What are the new priorities for the connected business? First: businesses need to think differently about the types of connections they will need to make – these span well beyond the traditional app to app into more modern forms of integration including SaaS integrations, mobile integrations, APIs, device integration and Big Data integration. It’s important these are unified together vs. doing them all piecemeal. Second, these types of connections need to be simple to design, adapt and configure...
Traditional on-premises data centers have long been the domain of modern data platforms like Apache Hadoop, meaning companies who build their business on public cloud were challenged to run Big Data processing and analytics at scale. But recent advancements in Hadoop performance, security, and most importantly cloud-native integrations, are giving organizations the ability to truly gain value from all their data. In his session at 19th Cloud Expo, David Tishgart, Director of Product Marketing ...
More and more companies are looking to microservices as an architectural pattern for breaking apart applications into more manageable pieces so that agile teams can deliver new features quicker and more effectively. What this pattern has done more than anything to date is spark organizational transformations, setting the foundation for future application development. In practice, however, there are a number of considerations to make that go beyond simply “build, ship, and run,” which changes how...
Cloud computing delivers on-demand resources that provide businesses with flexibility and cost-savings. The challenge in moving workloads to the cloud has been the cost and complexity of ensuring the initial and ongoing security and regulatory (PCI, HIPAA, FFIEC) compliance across private and public clouds. Manual security compliance is slow, prone to human error, and represents over 50% of the cost of managing cloud applications. Determining how to automate cloud security compliance is critical...
Traditional IT, great for stable systems of record, is struggling to cope with newer, agile systems of engagement requirements coming straight from the business. In his session at 18th Cloud Expo, William Morrish, General Manager of Product Sales at Interoute, will outline ways of exploiting new architectures to enable both systems and building them to support your existing platforms, with an eye for the future. Technologies such as Docker and the hyper-convergence of computing, networking and...
Contextual Analytics of various threat data provides a deeper understanding of a given threat and enables identification of unknown threat vectors. In his session at @ThingsExpo, David Dufour, Head of Security Architecture, IoT, Webroot, Inc., discussed how through the use of Big Data analytics and deep data correlation across different threat types, it is possible to gain a better understanding of where, how and to what level of danger a malicious actor poses to an organization, and to determ...