iifl-logo

Power Sector

Invest wise with Expert advice

By continuing, I accept the T&C and agree to receive communication on Whatsapp

Download App
image

Energy demand reached an all-time peak of 236 GW on August 31.

image

The estimated timeline for the Engineering, Procurement, and Construction (EPC) phase is 12 months

image

The purpose of this funding is to support a waste-to-energy project situated in Karnataka, India

image

This solar initiative is poised to become the largest campus-based solar facility within the state, as confirmed through a regulatory filing by the company

image

AESL stated that this acquisition aligns with its strategy to enhance value for shareholders through both organic and inorganic opportunities

image

On Wednesday, JSW Investments sold 2.1 crore shares.

image

Consolidated revenue climbed 17.6% sequentially from Rs 12,737.37 crore in the previous quarter.

image

NHPC will need about Rs 5,000 crore to acquire NEEPCO, a wholly-owned subsidiary of NTPC

image

The funds will be used to meet the capex requirements.

image

A project of this size can supply electricity to 65,000 families.

Download App
Knowledge Center
Logo

Logo IIFL Customer Care Number
(Gold/NCD/NBFC/Insurance/NPS)
1860-267-3000 / 7039-050-000

Logo IIFL Capital Services Support WhatsApp Number
+91 9892691696

Download The App Now

appapp
Loading...

Follow us on

facebooktwitterrssyoutubeinstagramlinkedintelegram

2025, IIFL Capital Services Ltd. All Rights Reserved

ATTENTION INVESTORS

RISK DISCLOSURE ON DERIVATIVES

Copyright © IIFL Capital Services Limited (Formerly known as IIFL Securities Ltd). All rights Reserved.

IIFL Capital Services Limited - Stock Broker SEBI Regn. No: INZ000164132, PMS SEBI Regn. No: INP000002213,IA SEBI Regn. No: INA000000623, SEBI RA Regn. No: INH000000248, DP SEBI Reg. No. IN-DP-185-2016
ARN NO : 47791 (AMFI Registered Mutual Fund Distributor)

ISO certification icon
We are ISO 27001:2013 Certified.

This Certificate Demonstrates That IIFL As An Organization Has Defined And Put In Place Best-Practice Information Security Processes.