iifl-logo

Kernex Microsystems (India) Ltd Book Closer

1,299.6
(0.08%)
Nov 4, 2025|09:39:55 AM

Kernex Microsys. CORPORATE ACTIONS

04/11/2024calendar-icon
04/11/2025calendar-icon
PurposeAnnouncement DateBook Closure Start DateBook Closure End Date
BookCloser5 Sep 202523 Sep 202529 Sep 2025
The Register of Members and Share Transfer Books of the Company will remain closed from Tuesday, 23rd September 2025 to Monday, 29th September 2025 (both days inclusive) for the purpose of this Annual General Meeting.

Kernex Microsys.: Related News

DFCCIL Awards ₹210 Crore Kavach Project to Kernex Microsystems

The scope also includes setting up signalling towers and related infrastructure across the corridor.

30 Aug 2025|07:30 PM
Read More
South Eastern Railway Awards ₹325 Crore Kavach Project to Kernex-MRT Consortium

As per the regulatory filing of Kernex Microsystems, this project incorporates both GO & GO routes, which aim at better safety mechanisms at vital railway stretches.

28 Feb 2025|02:32 PM
Read More
Read More

Invest wise with Expert advice

By continuing, I accept the T&C and agree to receive communication on Whatsapp

Knowledge Center
Logo

Logo IIFL Customer Care Number
(Gold/NCD/NBFC/Insurance/NPS)
1860-267-3000 / 7039-050-000

Logo IIFL Capital Services Support WhatsApp Number
+91 9892691696

Download The App Now

appapp
Loading...

Follow us on

facebooktwitterrssyoutubeinstagramlinkedintelegram

2025, IIFL Capital Services Ltd. All Rights Reserved

ATTENTION INVESTORS

RISK DISCLOSURE ON DERIVATIVES

Copyright © IIFL Capital Services Limited (Formerly known as IIFL Securities Ltd). All rights Reserved.

IIFL Capital Services Limited - Stock Broker SEBI Regn. No: INZ000164132, PMS SEBI Regn. No: INP000002213,IA SEBI Regn. No: INA000000623, SEBI RA Regn. No: INH000000248, DP SEBI Reg. No. IN-DP-185-2016, BSE Enlistment Number (RA): 5016
ARN NO : 47791 (AMFI Registered Mutual Fund Distributor)

ISO certification icon
We are ISO 27001:2013 Certified.

This Certificate Demonstrates That IIFL As An Organization Has Defined And Put In Place Best-Practice Information Security Processes.