secure

Hierarchical Graph-Grammar Model for Secure and Efficient Handwritten Signatures Classification

One important subject associated with personal authentication capabilities is the analysis of handwritten signatures. Among the many known techniques, algorithms based on linguistic formalisms are also possible. However, such techniques require a number of algorithms for intelligent image analysis to be applied, allowing the development of new solutions in the field of personal authentication and building modern security systems based on the advanced recognition of such patterns. The article presents the approach based on the usage of syntactic methods for the static analysis of handwritten signatures. The graph linguistic formalisms applied, such as the IE graph and ETPL(k) grammar, are characterised by considerable descriptive strength and a polynomial membership problem of the syntactic analysis. For the purposes of representing the analysed handwritten signatures, new hierarchical (two-layer) HIE graph structures based on IE graphs have been defined. The two-layer graph description makes it possible to take into consideration both local and global features of the signature. The usage of attributed graphs enables the storage of additional semantic information describing the properties of individual signature strokes. The verification and recognition of a signature consists in analysing the affiliation of its graph description to the language describing the specimen database. Initial assessments display a precision of the method at a average level of under 75%.




secure

Data dissemination and policy enforcement in multi-level secure multi-domain environments

Several challenges exist in disseminating multi-level secure (MLS) data in multi-domain environments. First, the security domains participating in data dissemination generally use different MLS labels and lattice structures. Second, when MLS data objects are transferred across multiple domains, there is a need for an agreed security policy that must be properly applied, and correctly enforced for the data objects. Moreover, the data sender may not be able to predetermine the data recipients located beyond its trust boundary. To address these challenges, we propose a new framework that enables secure dissemination and access of the data as intended by the owner. Our novel framework leverages simple public key infrastructure and active bundle, and allows domains to securely disseminate data without the need to repackage it for each domain.




secure

Robust and secure file transmission through video streaming using steganography and blockchain

File transfer is always handled by a separate service, sometimes it is a third-party service in videoconferencing. When sending files during a video session, file data flow and video stream are independent of each other. Encryption is a mature method to ensure file security. However, it still has the chance to leave footprints on the intermediate forwarding machines. These footprints can indicate that a file once passed through, some protocol-related logs give clues to the hackers' later investigation. This work proposes a file-sending scheme through the video stream using blockchain and steganography. Blockchain is used as a file slicing and linkage mechanism. Steganography is applied to embed file pieces into video frames that are continuously generated during the session. The scheme merges files into the video stream with no file transfer protocol use and no extra bandwidth consumed by the file to provide trackless file transmission during the video communication.




secure

Secure digital academic certificate verification system using blockchain

At present, there is a need for an authentic and fast approach to certificate verification. Which verifies and authenticates the certificates to reduce the extent of duplicity and time. An academic certificate is significant for students, the government, universities, and employers. Academic credentials play a vital role in the career of students. A few people manipulate academic documents for their benefit. There are cases identified where people produced fake academic certificates for jobs or higher education admission. Various research works are developing a secure model to verify genuine academic credentials. This research article proposed a new security model which contains several security algorithms such as timestamps, hash function, digital signature, steganography, and blockchain. The proposed model issues secure digital academic certificates. It enhanced security measures and automated educational certificate verification using blockchain technology. The advantages of the proposed model are automated, cost-effective, secured, traceable, accurate, and time-saving.




secure

Secure E-Examination Systems Compared: Case Studies from Two Countries

Aim/Purpose: Electronic examinations have some inherent problems. Students have expressed negative opinions about electronic examinations (e-examinations) due to a fear of, or unfamiliarity with, the technology of assessment, and a lack of knowledge about the methods of e-examinations. Background: Electronic examinations are now a viable alternative method of assessing student learning. They provide freedom of choice, in terms of the location of the examination, and can provide immediate feedback; students and institutions can be assured of the integrity of knowledge testing. This in turn motivates students to strive for deeper learning and better results, in a higher quality and more rigorous educational process. Methodology : This paper compares an e-examination system at FUT Minna Nigeria with one in Australia, at the University of Tasmania, using case study analysis. The functions supported, or inhibited, by each of the two e-examination systems, with different approaches to question types, cohort size, technology used, and security features, are compared. Contribution: The researchers’ aim is to assist stakeholders (including lecturers, invigilators, candidates, computer instructors, and server operators) to identify ways of improving the process. The relative convenience for students, administrators, and lecturer/assessors and the reliability and security of the two systems are considered. Challenges in conducting e-examinations in both countries are revealed by juxtaposing the systems. The authors propose ways of developing more effective e-examination systems. Findings: The comparison of the two institutions in Nigeria and Australia shows e-examinations have been implemented for the purpose of selecting students for university courses, and for their assessment once enrolled. In Nigeria, there is widespread systemic adoption for university entrance merit selection. In Australia this has been limited to one subject in one state, rather than being adopted nationally. Within undergraduate courses, the Nigerian scenario is quite extensive; in Australia this adoption has been slower, but has penetrated a wide variety of disciplines. Recommendations for Practitioners: Assessment integrity and equipment reliability were common issues across the two case studies, although the delivery of e-examinations is different in each country. As with any procedural process, a particular solution is only as good as its weakest attribute. Technical differences highlight the link between e-examination system approaches and pedagogical implications. It is clear that social, cultural, and environmental factors affect the success of e-examinations. For example, an interrupted electrical power supply and limited technical know-how are two of the challenges affecting the conduct of e-examinations in Nigeria. In Tasmania, the challenge with the “bring your own device” (BYOD) is to make the system operate on an increasing variety of user equipment, including tablets. Recommendation for Researchers: The comparisons between the two universities indicate there will be a productive convergence of the approaches in future. One key proposal, which arose from the analysis of the existing e-examination systems in Nigeria and Australia, is to design a form of “live” operating system that is deployable over the Internet. This method would use public key cryptography for lecturers to encrypt their questions online. Impact on Society : If institutions are to transition to e-examinations, one way of facilitating this move is by using computers to imitate other assessment techniques. However, higher order thinking is usually demonstrated through open-ended or creative tasks. In this respect the Australian system shows promise by providing the same full operating system and software application suite to all candidates, thereby supporting assessment of such creative higher order thinking. The two cases illustrate the potential tension between “online” or networked reticulation of questions and answers, as opposed to “offline” methods. Future Research: A future design proposition is a web-based strategy for a virtual machine, which is launched into candidates’ computers at the start of each e-examination. The new system is a form of BYOD externally booted e-examination (as in Australia) that is deployable over the Internet with encryption and decryption features using public key cryptography (Nigeria). This will allow lecturers to encrypt their questions and post them online while the questions are decrypted by the administrator or students are given the key. The system will support both objective and open-ended questions (possibly essays and creative design tasks). The authors believe this can re-define e-examinations as the “gold standard” of assessment.




secure

A novel IoT-enabled portable, secure automatic self-lecture attendance system: design, development and comparison

This study focuses on the importance of monitoring student attendance in education and the challenges faced by educators in doing so. Existing methods for attendance tracking have drawbacks, including high costs, long processing times, and inaccuracies, while security and privacy concerns have often been overlooked. To address these issues, the authors present a novel internet of things (IoT)-based self-lecture attendance system (SLAS) that leverages smartphones and QR codes. This system effectively addresses security and privacy concerns while providing streamlined attendance tracking. It offers several advantages such as compact size, affordability, scalability, and flexible features for teachers and students. Empirical research conducted in a live lecture setting demonstrates the efficacy and precision of the SLAS system. The authors believe that their system will be valuable for educational institutions aiming to streamline attendance tracking while ensuring security and privacy.




secure

LDSAE: LeNet deep stacked autoencoder for secure systems to mitigate the errors of jamming attacks in cognitive radio networks

A hybrid network system for mitigating errors due to jamming attacks in cognitive radio networks (CRNs) is named LeNet deep stacked autoencoder (LDSAE) and is developed. In this exploration, the sensing stage and decision-making are considered. The sensing unit is composed of four steps. First, the detected signal is forwarded to filtering progression. Here, BPF is utilised to filter the detected signal. The filtered signal is squared in the second phase. Third, signal samples are combined and jamming attacks occur by including false energy levels. Last, the attack is maliciously affecting the FC decision in the fourth step. On the other hand, FC initiated the decision-making and also recognised jamming attacks that affect the link amidst PU and SN in decision-making stage and it is accomplished by employing LDSAE-based trust model where the proposed module differentiates the malicious and selfish users. The analytic measures of LDSAE gained 79.40%, 79.90%, and 78.40%.




secure

Towards Building Secure Software Systems




secure

Framework on Hybrid Network Management System Using a Secure Mobile Agent Protocol




secure

Secure Software Engineering: A New Teaching Perspective Based on the SWEBOK




secure

Hybrid encryption of Fernet and initialisation vector with attribute-based encryption: a secure and flexible approach for data protection

With the continuous growth and importance of data, the need for strong data protection becomes crucial. Encryption plays a vital role in preserving the confidentiality of data, and attribute-based encryption (ABE) offers a meticulous access control system based on attributes. This study investigates the integration of Fernet encryption with initialisation vector (IV) and ABE, resulting in a hybrid encryption approach that enhances both security and flexibility. By combining the advantages of Fernet encryption and IV-based encryption, the hybrid encryption scheme establishes an effective and robust mechanism for safeguarding data. Fernet encryption, renowned for its simplicity and efficiency, provides authenticated encryption, guaranteeing both the confidentiality and integrity of the data. The incorporation of an initialisation vector (IV) introduces an element of randomness into the encryption process, thereby strengthening the overall security measures. This research paper discusses the advantages and drawbacks of the hybrid encryption of Fernet and IV with ABE.




secure

Avast Secure Browser 75.0.1447.81 Privacy and Security Tool for PC Windows

Avast Secure Browser strives to offer a ‘private, fast and secure’ service for Windows users. Simply put, this product has been built for privacy by security experts. It boasts an array of features to make sure that all cybersecurity bases are more t...




secure

Ecoscience secures RM2m EPC contract for black pellet plant in Kuantan

KUALA LUMPUR: Integrated palm oil milling services provider Ecoscience International Bhd (EIB), via its wholly-owned subsidiary Ecoscience Manufacturing & Engineering Sdn Bhd, has accepted a letter of award (LoA) for a RM200 million engineering, procurement, and construction (EPC) contract from renewable energy company, Wilhelmina Energy Malaysia Sdn Bhd (WEMSB).

Under the LOA, EIB will provide comprehensive EPC services for the TG2 black pellet plant in Kuantan, Pahang.

These services will include design and engineering, sourcing and quality assurance of equipment and materials, plant infrastructure construction, and testing and start-up activities to support commissioning and ensure operational standards are met.

The specific terms and conditions of the EPC works will be outlined in a binding EPC agreement, which is expected by November 30, 2024.

The LoA was built upon the collaboration agreement (CA) with WEMSB in March 2024, aimed at transforming agricultural waste into sustainable energy, thereby reducing coal consumption and carbon emissions.

EIB managing director Wong Choi Ong expressed confidence in delivering a robust waste-to-energy solution that aligns with WEMSB’s vision for sustainable energy transformation.

“This project is a strategic fit for our expansion into environmental and energy efficiency sectors, building on our core strengths in constructing palm oil mills, supporting facilities, and equipment fabrication.

“As the largest project to be undertaken in our corporate history, we see this as a valuable opportunity to broaden our customer base, enhance our project portfolio, and strengthen our market position.

“The LoA will significantly boost our order book, providing our group with healthy earnings visibility over the next two years,“ he said.

The TG2 black pellet plant will convert oil palm empty fruit bunch (EFB) waste into TG2 black pellets – a drop-in coal replacement fuel.

TG2 black pellets are an advanced type of biofuel pellet, providing benefits over traditional biomass pellets, including enhanced grindability, water resistance, and higher energy density.

As a drop-in fuel, it is renewable and can be used in existing pulverised coal power plants without requiring significant infrastructure modifications.

EIB will continue supporting WEMSB as it expands TG2 black pellet plants across the region.

“Beyond the EPC scope for the TG2 black pellet plant, the CA signed in March 2024 also outlined the possibility of WEMSB outsourcing the plant’s operation and maintenance (O&M) to EIB.

“We are currently exploring this opportunity, and both parties will decide in due course.

“This potential arrangement, if materialise, would create a new, recurring revenue stream for us, complementing our current project-based work,“ Wong added.

WEMSB is a subsidiary of the Netherlands-based renewable energy company Maatschappij Wilhelmina NV, specialising in converting agricultural waste streams into sustainable energy using TG2 black pellets.

The EPC works are expected to commence by December 2024, with an expected project completion timeline of 24 months from the commencement date.




secure

Blank And Secure 7.89

Portable tool to securely delete data. Securely deleting files is required to block the recovering of deleted data. Secure deletion is possible with this program, because Blank And Secure overwrites t... [License: Freeware | Requires: 11|10|8|7 | Size: 158 KB ]




secure

13 Steps To Keeping Your Email Safe and Secure

You can’t be too vigilant when it comes to computer security. It’s way too often that we hear of a new virus or another type of malware making the rounds. Email is often used to implant malware into a computer or direct the user to a malicious website. Once the computer has been compromised or […]

The post 13 Steps To Keeping Your Email Safe and Secure appeared first on Clark Howard.





secure

Pakistan hammer China to secure semifinal spot

The Green Shirts handed 5-1 defeat in the Asian Champions Trophy




secure

Indicted D.C. Council member Trayon White secures third term despite ongoing bribery case

Ward 8 voters on Tuesday sent incumbent Trayon White back to the D.C. Council for a third term, even as the embattled lawmaker faces a federal bribery case that clouds his political future.





secure

CertainTeed Secures Third-Party Verification of Ceiling Panels’ Environmental Performance

UL Environment has certified a pair of new Environmental Product Declarations for CertainTeed’s Symphony mineral fiber and VOC Compliant Symphony fiberglass ceiling panels.




secure

SmarterSecurity Solutions Secure 10,000-Foot Solar Farm Perimeter

With a nearly 10,000-foot perimeter to secure at its newly constructed solar farm in the Midwest, an independent power producer turned to SmarterFence and SmarterBeam solutions from SmarterSecurity Inc. Systems integrator MidCo Inc. took on the task of installing the solutions to help secure the owner’s investment and operations from intruders to allow the site to be routinely unmanned.




secure

New 'Cyber Trust Mark' Label to Promote Secure Smart Devices

The Biden administration’s new Energy Star-like labels are intended to make it easier for consumers to purchase secure IoT gear and help ward off cyberattacks.




secure

ONVIF Announces Draft Add-on for Secure Communications

The TLS Configuration (release candidate) is the first in a new category of add-ons, which are specifications that extend ONVIF conformance to product features that address a specific use case or end-user need.




secure

The Secure, Green Building Has Arrived

For convenience, cost and efficiency, building managers are looking for a single point of control for all systems that make up the security and building automation functions. The secure, “green” building has arrived.




secure

Turning Smartphones Into Secure Access Devices

Dave Engebretson explains feature sets made possible with the integration of Keri Systems’ Borealis cloud solution and Geokey.  




secure

Interface Shares Best Practices to Secure Mall-Based Retailers

The session is scheduled on May 1, 2023, at the Gaylord Rockies Resort and Convention Center in Aurora, Colo.




secure

The New DICE Awarded Patent for its Cybersecure Automated Network

This technology automates, streamlines  and manages on-site devices, delivering unparalleled security and ease-of-use for the security industry. The patent was issued on January 2, 2024.




secure

How You Can Use the Cloud to Secure More School Projects

As threats change and vulnerabilities present themselves, the cloud allows for easily adding new technologies to combat current and emerging threats.




secure

Native Smart Properties Secures Credit Facility With Alarm Financial Services

The relationship with Native marks Alarm Financial Services’ first venture into financing integrated smart security in the multi-dwelling property space. 




secure

How AI Is Making Smart Homes More Secure

Highlighted are benefits of AI-enabled automation and interoperability, while addressing key considerations for security integrators in managing vulnerabilities and optimizing smart home ecosystems.




secure

National Monitoring Center Secures Updated TMA Installation Quality Certification

Being IQ-certified formally recognizes a company’s dedication to saving lives and to reducing false alarms.




secure

Florida ECC Goes Live With TMA Automated Secure Alarm Protocol

TMA’s ASAP service is designed to increase the accuracy and efficiency of calls for service from alarm monitoring centers to emergency communication centers.




secure

Axon Announces Campbell P.D. Secured Waiver for 24/7 DFR Operations

According to the announcement, DFR programs are changing how emergencies are handled by providing real-time situational awareness that improves response times and safety.




secure

Genetec Helps Law Enforcement Securely Share Vehicle Data

The new evidence-sharing functionality will be included for all Cloudrunner customers, with no additional licensing required. Upon activation, subscribers will also receive six-month access to all Clearance functionalities.




secure

The Clinic: How Psychologically Insecure Atheists Comfort Themselves - Part 1




secure

Zenitel Launches Cyber Secure, Unified Critical Communication Solutions

The platform also allows Zentiels partner community to further add third-party services on top of functionalities in our core communication platform, further accelerating our development journey. 




secure

T. Hasegawa USA Secures USDA Certification for Meat and Poultry Flavor Manufacturing

USDA certification plays a vital role in ensuring the safety and quality of meat and poultry flavors and is required for food products when meat and poultry ingredients surpass a specific threshold in a recipe.




secure

Smartlift Outdoor Lift Provides Secure Maneuverability for Panel Installations

Smartlift's SL 609 Outdoor series is designed for mounting glass, marble, granite, and steel. 




secure

T. Hasegawa Secures USDA Certification for Meat and Poultry Flavor Manufacturing

The California-based company is adding equipment, resources and production space to accommodate production of USDA-certified meat and poultry-based products.




secure

Unilin Secures Patent for Eco-Friendly PET Flooring Technology

The technology, marketed as "P-SPC" (PET-based Solid Polymer Composite), offers manufacturers a PVC-free alternative that maintains the familiar characteristics of traditional SPC (Solid Polymer Composite) flooring products.




secure

Now is the Time to Secure Food Processing Facilities

The threats facing food processing facilities are already here, and there is no longer any time to delay implementing minimum protections for these sites.




secure

PRNEWS.IO Secures Spot at the eCommerce Expo 2024 in London

London is gearing up for one of the most significant events for all things eCommerce. Scheduled for September 18-19, the eCommerce Expo 2024 is set to welcome over 12,000 participants, key industry speakers and more than 300 technology providers.




secure

TOKEN secures authorisation from NBR and becomes a payment institution

Token Payment Services (TOKEN) has announced that it obtained its...




secure

Africhange secures IMTO licence to streamline remittance to Nigeria

Africhange has announced that its Nigerian branch, Currenzo,...




secure

Engineering Milestone Secures Progress for Key Lithium Project in Brazil

Source: Streetwise Reports 10/23/2024

Lithium Ionic Corp. (LTH:TSX.V; LTHCF:OTCQX; H3N:FSE) has announced the initiation of Engineering, Procurement, and Construction Management (EPCM) services for its flagship Bandeira Lithium Project. See why the CEO Blake Hyland says that the company's momentum towards production is stronger than ever.

Lithium Ionic Corp. (LTH:TSX.V; LTHCF:OTCQX; H3N:FSE) has announced the initiation of Engineering, Procurement, and Construction Management (EPCM) services for its flagship Bandeira Lithium Project in Minas Gerais, Brazil. Globally recognized engineering firm Hatch Ltd. will lead engineering and design services. Reta Engenharia, a leading Brazilian construction management firm, will manage construction. This significant milestone signals the project's progression into the construction and development phase as Lithium Ionic moves closer to production.

Key Highlights from the company press release:

  • Hatch Ltd. has been awarded engineering and design services. Hatch is an internationally recognized engineering firm with extensive global experience in several commodities and a local presence in Brazil, including offices in Belo Horizonte, the capital city of Minas Gerais state. Hatch's involvement will bring world-class expertise and innovative solutions to the Bandeira Project, ensuring a streamlined and efficient development process.
  • Reta Engenharia, a leading Brazilian construction management company, has been selected to provide construction management services for the Bandeira Project. With extensive experience in greenfield mining projects, Reta has supported both junior and large-cap producers, making them ideally suited to drive efficient and effective project outcomes. Their proven track record in managing greenfield projects, combined with their deep regional knowledge, will be instrumental in advancing the Bandeira Project towards production.
  • Growing the Owner's Team: To support this transition to project development and ensure a smooth transition into production, Lithium Ionic is expanding the technical capabilities of its owner's team by bringing in experienced professionals to guide the Bandeira Project through the construction and operational readiness phases.

In the company's news release, Blake Hylands, CEO of Lithium Ionic, noted the importance of this transition, "Our momentum towards production is stronger than ever as we kick off the engineering and construction management phase with our esteemed partners, Hatch and Reta."

The Bandeira Project is advancing through the permitting process at both state and federal levels, with key approvals expected soon. Initial production is scheduled to begin in the second half of 2026, following the approval of the Licença Ambiental Concomitante (LAC) and subsequent Mining Concession and Operating License.

Lithium Sector Gains Momentum Amid Growing Demand

Visual Capitalist reported on September 29 that despite the price drop, lithium-ion battery demand is projected to increase ninefold by 2040. This move is driven by the continued growth of the EV market and broader electrification trends.

Greg Jones of BMO Capital Markets described new drill results from the Bandeira project as continuing to "highlight the exploration potential at the property" and suggested that these results could present opportunities for optimization.

This long-term growth trajectory supports the ongoing development of lithium projects like Lithium Ionic's Bandeira Project in Brazil, which aims to meet this increasing global demand.

As Forbes reported on October 8, lithium prices had fallen by nearly 90% since their peak in 2022.

This is attributed to an oversupply of the commodity and slower-than-expected electric vehicle (EV) sales. Despite these challenges, industry experts indicated that the sector was showing early signs of recovery.

Also, on October 8, Barry Dawes of Martin Place Securities highlighted that "the lithium market is showing strong signs of upturn" and suggested that lithium shortages are likely after 2027, reinforcing the long-term potential of the sector. His comments reflected a growing optimism for the post-2027 period. It is then that demand for lithium is expected to outstrip supply.

Lithium Ionic's Catalysts

Lithium Ionic's Bandeira Project is positioned as a critical development in Brazil's Lithium Valley. According to the company's investor presentation, this project is expected to deliver significant output. A Feasibility Study projects a 14-year mine life, producing 178,000 tonnes of spodumene concentrate annually. The post-tax net present value (NPV) is projected at US$1.3 billion with an internal rate of return (IRR) of 40%.

The company's strategic partnerships with Hatch and Reta, combined with the strong regional infrastructure in Minas Gerais, which includes renewable hydroelectric power and proximity to export markets, are expected to accelerate the development of the project. These factors are key drivers of Lithium Ionic's goal to become one of Brazil's major lithium producers, contributing to the growing global demand for lithium in the electric vehicle market.

Analysts on Lithium Ionic

Analysts have shown optimism about Lithium Ionic Corp., particularly regarding the potential of its Bandeira Lithium Project. Katie Lachapelle from Canaccord Genuity, in her September 10, 2024, research note, highlighted the company's progress in securing approvals for the Final Exploration Reports for the Bandeira and Outro Lado lithium properties.

Lachapelle emphasized that the next major catalyst would be the approval of the Licença Ambiental Concomitante (LAC), which is needed to begin construction at the Bandeira project. She maintained a Speculative Buy rating with a target price of CA$2.50, representing a potential upside of 303% from the price at the time of the report. Lachapelle also noted the company's CA$35 million cash balance following recent financing transactions but indicated that additional funds would be required to cover the estimated US$266 million in initial capital costs.

On October 8, 2024, Greg Jones of BMO Capital Markets provided further positive insights into Lithium Ionic's development. He described new drill results from the Bandeira project as continuing to "highlight the exploration potential at the property" and suggested that these results could present opportunities for optimization. Jones maintained an Outperform rating on the stock, with a target price of CA$1.25, reflecting a 40% potential return. He also emphasized that the company traded below the peer median, with its lithium carbonate equivalent valued at US$40 per ton, compared to US$60 for peers, marking it as undervalued. He further pointed out that Lithium Ionic was one of BMO's preferred lithium developers. [OWNERSHIP_CHART-11098]

Ownership and Share Structure

According to the company, management and insiders own 20% of the Lithium Ionic.

One of the insiders, President & Director Helio Diniz, owns 5.52%, Director Michael Lawrence Guy owns 5.10%, Director David Patrick Gower owns 2.56%, and Andre Rezende Gumaraes owns 2.52%, according to Reuters.

30% is held by institutional investors. Reuters reports Waratah Captial Advisors owns 7.01%, JGP Gestao de Recursos Ltda owns 2.69%, RBC Global Asset Management Inc owns 1.94%, Sprott Asset Management LP owns 1.55%, BMO Asset Management owns 1.30%, and IXIOS Asset Management SA owns 1.20%. The rest is retail.

Lithium Ionic has 158.58 million shares outstanding and 131.15 million free-float traded shares.

The company's market cap is CA$135 million, and it trades in a 52-week range of CA$0.41 - 2.24 per share.

Sign up for our FREE newsletter at: www.streetwisereports.com/get-news

Important Disclosures:

  1. Lithium Ionic Corp. is a billboard sponsor of Streetwise Reports and pays SWR a monthly sponsorship fee between US$4,000 and US$5,000.
  2. James Guttman wrote this article for Streetwise Reports LLC and provides services to Streetwise Reports as an employee.
  3. This article does not constitute investment advice and is not a solicitation for any investment. Streetwise Reports does not render general or specific investment advice and the information on Streetwise Reports should not be considered a recommendation to buy or sell any security. Each reader is encouraged to consult with his or her personal financial adviser and perform their own comprehensive investment research. By opening this page, each reader accepts and agrees to Streetwise Reports' terms of use and full legal disclaimer. Streetwise Reports does not endorse or recommend the business, products, services or securities of any company.

For additional disclosures, please click here.

( Companies Mentioned: LTH:TSX.V; LTHCF:OTCQX; H3N:FSE, )




secure

Engineering Milestone Secures Progress for Key Lithium Project in Brazil

Lithium Ionic Corp. (LTH:TSX.V; LTHCF:OTCQX; H3N:FSE) has announced the initiation of Engineering, Procurement, and Construction Management (EPCM) services for its flagship Bandeira Lithium Project. See why the CEO Blake Hyland says that the company's momentum towards production is stronger than ever.



  • LTH:TSX.V; LTHCF:OTCQX; H3N:FSE

secure

School nurse secures lifesaving device for middle schools

Two Automated External Defibrillators (AEDs) were presented to Grandview Middle School and Northview Middle School at a basketball game between the two rivals on January 24. The AEDs were made possible though efforts of Catawba County Public Health school nurse Virginia Beisler, MS, RN. Beisler worked with Frye Regional Medical Center and each school�s booster and PTA clubs to raise the $3,200 necessary to purchase the AEDs.




secure

Airtel, Secure Meters to offer Narrow Band-IoT services

​​"IoT is one of the fastest-growing business segments for Airtel Business. This venture into NB-IoT strengthens our credentials as the largest cellular IoT player in the country and places us as a partner of choice for Discoms looking to invest in smart meters," said Ajay Chitkara, director and CEO, Airtel Business.




secure

Cisco launches Secure Networking approach in India

Organizations can apply controls to identify, set and enforce policy, and gain visibility across all users, devices, and entities on the network to empower and enable work from anywhere.




secure

API integration: Fueling business the secure way

At the ETCIO Annual Conclave 2024, top IT leaders converged to discuss the critical topic of API integration. This gathering of minds explored how APIs are not only catalysts for digital transformation but also a cornerstone for enterprise security.