SYS-CON MEDIA Authors: Xenia von Wedel, Peter Silva, Glenn Rossman, Ava Smith, Elizabeth White

News Feed Item

Exploration Program Initiated on Northern Superior's Lac Surprise Gold Property, Quebec

SUDBURY, ONTARIO -- (Marketwired) -- 08/20/14 -- Northern Superior Resources Inc. (TSX VENTURE: SUP) (the "Company" or "Northern Superior") is pleased to report the initiation of the 2014 summer/fall exploration program on its 100% owned Lac Surprise gold property, west-central Quebec. The exploration program is being funded by Northern Superior's option partner, Bold ventures Inc. (TSX VENTURE: BOL) ("Bold") as part of its option earn-in work commitment (see press release, June 5, 2014). This exploration program will consist of a prospecting, sampling and mapping program. Data derived from this program will further refine target areas previously defined and identified on the property by Northern Superior and Bold. Targets will then be prioritized for diamond drill testing later this year. The technical team participating in this program will include both Northern Superior and Bold personnel.

In addition to the exploration program, an additional 46 claims or approximately 2,566 hectares was applied for on July 22, 2014 and one additional claim was applied for, August 2, 2014. Upon acceptance of these claims, the Lac Surprise property will consist of 380 claims or approximately 21,200 hectares.

Dr. T. F. Morris, President and CEO states: "Northern Superior is pleased to announce the continuation of exploration on this highly prospective property. The value of this Property has only been enhanced by recent exploration and discovery by others with properties attached to Lac Surprise. The Company looks forward to sharing the results of this summer/fall exploration program with its shareholders as those results become available."

About Northern Superior

The Lac Surprise property is one of four mineral properties that Northern Superior is actively exploring. The other three properties (Croteau Est, Grizzly and Ti-pa-kaa-haa-ning ("TPK")) also represent regional-scale exploration programs, either 100% owned and operated by Northern Superior, or Northern Superior having the right to earn a 100% interest in the properties. Exploration to date has identified numerous drill-ready targets for gold, copper and silver mineralization on the TPK property in northwestern Ontario, gold/volcanic copper-zinc-silver and magmatic nickel-copper-platinum-palladium mineralization are targeted on the Grizzly property, and shear-hosted gold on the Company's Croteau Est property, both located in west-central Quebec.

The Qualified Person ("QP") for Northern Superior responsible for reviewing the scientific and technical information for this program is Mr. Scott Parsons (P.Geo), who has verified the data disclosed in this press release.

Northern Superior is a reporting issuer in British Columbia, Alberta, Ontario and Quebec, and trades on the TSX Venture Exchange under the symbol SUP.

For Investors

Forward looking statements: This news release includes certain "forward-looking information" within the meaning of Canadian securities legislation and "forward-looking statements" within the meaning of the United States Private Securities Litigation Reform Act or 1995 (collectively, "forward looking statements"). Forward looking statements include predictions, projections and forecasts and are often, but not always, identified by the use of words such as "seek", "anticipate", "believe", "plan", "estimate", "forecast", "expect", "potential", "project", "target", "schedule", "budget" and "intend" and statements that an event or result "may", "will", "should", "could" or "might" occur or be achieved or other similar expressions and includes the negatives thereof. All statements other than statements of historical fact included in this release, including, without limitation, statements regarding potential mineralization, exploration results, interpretation of results, the timing and success of exploration activities generally, the timing and results of future resource estimates, and future plans and objectives of Northern Superior are forward-looking statements that involve various risks and uncertainties. There can be no assurance that such statements will prove to be accurate and actual results and future events could differ materially from those anticipated in such statements. Forward looking statements are based on a number of material factors and assumptions. Important factors that could cause actual results to differ materially from Northern Superior's expectations include exploration risks, changes in project parameters as plans continue to be refined, results of future resources estimates, future metal prices, availability of capital and financing on acceptable terms, general economic, market or business conditions, uninsured risks, regulatory changes, defects in title, availability of personnel, materials and equipment on a timely basis, accidents or equipment breakdowns, delays in receiving government approvals, unanticipated environmental impacts on operations and costs to remedy same, and other exploration or other risks detailed herein and from time to time in the filings made by the Company with securities regulators. Although the Company has attempted to identify important factors that could cause actual actions, events or results to differ from those described in forward looking statements, there may be other factors that cause such actions, events or results to differ materially from those anticipated. There can be no assurance that forward looking statements will prove to be accurate and accordingly readers are cautioned not to place undue reliance on forward looking statements.

Neither the TSX Venture Exchange nor its Regulation Services Provider (as that term is defined in the policies of the TSX Venture Exchange) accepts responsibility for the adequacy or accuracy of this release.

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
Connected devices and the Internet of Things are getting significant momentum in 2014. In his session at Internet of @ThingsExpo, Jim Hunter, Chief Scientist & Technology Evangelist at Greenwave Systems, examined three key elements that together will drive mass adoption of the IoT before the end of 2015. The first element is the recent advent of robust open source protocols (like AllJoyn and WebRTC) that facilitate M2M communication. The second is broad availability of flexible, cost-effective ...
How do APIs and IoT relate? The answer is not as simple as merely adding an API on top of a dumb device, but rather about understanding the architectural patterns for implementing an IoT fabric. There are typically two or three trends: Exposing the device to a management framework Exposing that management framework to a business centric logic Exposing that business layer and data to end users. This last trend is the IoT stack, which involves a new shift in the separation of what stuff happe...
The Internet of Things will put IT to its ultimate test by creating infinite new opportunities to digitize products and services, generate and analyze new data to improve customer satisfaction, and discover new ways to gain a competitive advantage across nearly every industry. In order to help corporate business units to capitalize on the rapidly evolving IoT opportunities, IT must stand up to a new set of challenges. In his session at @ThingsExpo, Jeff Kaplan, Managing Director of THINKstrateg...
We are reaching the end of the beginning with WebRTC, and real systems using this technology have begun to appear. One challenge that faces every WebRTC deployment (in some form or another) is identity management. For example, if you have an existing service – possibly built on a variety of different PaaS/SaaS offerings – and you want to add real-time communications you are faced with a challenge relating to user management, authentication, authorization, and validation. Service providers will w...
Cultural, regulatory, environmental, political and economic (CREPE) conditions over the past decade are creating cross-industry solution spaces that require processes and technologies from both the Internet of Things (IoT), and Data Management and Analytics (DMA). These solution spaces are evolving into Sensor Analytics Ecosystems (SAE) that represent significant new opportunities for organizations of all types. Public Utilities throughout the world, providing electricity, natural gas and water,...
"Matrix is an ambitious open standard and implementation that's set up to break down the fragmentation problems that exist in IP messaging and VoIP communication," explained John Woolf, Technical Evangelist at Matrix, in this SYS-CON.tv interview at @ThingsExpo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
Want to enable self-service provisioning of application environments in minutes that mirror production? Can you automatically provide rich data with code-level detail back to the developers when issues occur in production? In his session at DevOps Summit, David Tesar, Microsoft Technical Evangelist on Microsoft Azure and DevOps, will discuss how to accomplish this and more utilizing technologies such as Microsoft Azure, Visual Studio online, and Application Insights in this demo-heavy session.
When an enterprise builds a hybrid IaaS cloud connecting its data center to one or more public clouds, security is often a major topic along with the other challenges involved. Security is closely intertwined with the networking choices made for the hybrid cloud. Traditional networking approaches for building a hybrid cloud try to kludge together the enterprise infrastructure with the public cloud. Consequently this approach requires risky, deep "surgery" including changes to firewalls, subnets...
DevOps is all about agility. However, you don't want to be on a high-speed bus to nowhere. The right DevOps approach controls velocity with a tight feedback loop that not only consists of operational data but also incorporates business context. With a business context in the decision making, the right business priorities are incorporated, which results in a higher value creation. In his session at DevOps Summit, Todd Rader, Solutions Architect at AppDynamics, discussed key monitoring techniques...
The Internet of Things will greatly expand the opportunities for data collection and new business models driven off of that data. In her session at @ThingsExpo, Esmeralda Swartz, CMO of MetraTech, discussed how for this to be effective you not only need to have infrastructure and operational models capable of utilizing this new phenomenon, but increasingly service providers will need to convince a skeptical public to participate. Get ready to show them the money!
One of the biggest challenges when developing connected devices is identifying user value and delivering it through successful user experiences. In his session at Internet of @ThingsExpo, Mike Kuniavsky, Principal Scientist, Innovation Services at PARC, described an IoT-specific approach to user experience design that combines approaches from interaction design, industrial design and service design to create experiences that go beyond simple connected gadgets to create lasting, multi-device exp...
P2P RTC will impact the landscape of communications, shifting from traditional telephony style communications models to OTT (Over-The-Top) cloud assisted & PaaS (Platform as a Service) communication services. The P2P shift will impact many areas of our lives, from mobile communication, human interactive web services, RTC and telephony infrastructure, user federation, security and privacy implications, business costs, and scalability. In his session at @ThingsExpo, Robin Raymond, Chief Architect...
High-performing enterprise Software Quality Assurance (SQA) teams validate systems that are ready for use - getting most actively involved as components integrate and form complete systems. These teams catch and report on defects, making sure the customer gets the best software possible. SQA teams have leveraged automation and virtualization to execute more thorough testing in less time - bringing Dev and Ops together, ensuring production readiness. Does the emergence of DevOps mean the end of E...
Scott Jenson leads a project called The Physical Web within the Chrome team at Google. Project members are working to take the scalability and openness of the web and use it to talk to the exponentially exploding range of smart devices. Nearly every company today working on the IoT comes up with the same basic solution: use my server and you'll be fine. But if we really believe there will be trillions of these devices, that just can't scale. We need a system that is open a scalable and by using ...
The Internet of Things is tied together with a thin strand that is known as time. Coincidentally, at the core of nearly all data analytics is a timestamp. When working with time series data there are a few core principles that everyone should consider, especially across datasets where time is the common boundary. In his session at Internet of @ThingsExpo, Jim Scott, Director of Enterprise Strategy & Architecture at MapR Technologies, discussed single-value, geo-spatial, and log time series dat...