iifl-logo

Jyoti Structures Ltd Book Closer

17.12
(1.24%)
Apr 3, 2025|11:04:59 AM

Jyoti Structures CORPORATE ACTIONS

03/04/2024calendar-icon
03/04/2025calendar-icon
PurposeAnnouncement DateBook Closure Start DateBook Closure End Date
BookCloser18 Oct 20242 Nov 20249 Nov 2024
Intimation for Book Closure
BookCloser12 Jul 202427 Jul 20243 Aug 2024
Annual General Meeting
BookCloser16 Feb 20245 Mar 202412 Mar 2024
Intimation for Book closure

Jyoti Structures: Related News

Jyoti Structures Secures ₹389 Crore Order from Adani Energy
25 Feb 2025|10:21 PM

The order, valued at ₹389.36 crore, comprises supply of towers, survey, soil investigation, foundation, erection, stringing, testing and commissioning of a 765 kV DC transmission line (Boisar II-Pune III) on a turnkey basis.

Read More
Jyoti Structures secures ₹450 Crore order from Adani Energy
23 Oct 2024|03:30 PM

In August, the business secured a ₹106 Crore order from a renowned private developer to supply towers for a 765 kV transmission line.

Read More
Read More

Invest wise with Expert advice

By continuing, I accept the T&C and agree to receive communication on Whatsapp

Invest wise with Expert advice

By continuing, I accept the T&C and agree to receive communication on Whatsapp

Knowledge Center
Logo

Logo IIFL Customer Care Number
(Gold/NCD/NBFC/Insurance/NPS)
1860-267-3000 / 7039-050-000

Logo IIFL Capital Services Support WhatsApp Number
+91 9892691696

Download The App Now

appapp
Loading...

Follow us on

facebooktwitterrssyoutubeinstagramlinkedintelegram

2025, IIFL Capital Services Ltd. All Rights Reserved

ATTENTION INVESTORS

RISK DISCLOSURE ON DERIVATIVES

Copyright © IIFL Capital Services Limited (Formerly known as IIFL Securities Ltd). All rights Reserved.

IIFL Securities Limited - Stock Broker SEBI Regn. No: INZ000164132, PMS SEBI Regn. No: INP000002213,IA SEBI Regn. No: INA000000623, SEBI RA Regn. No: INH000000248

ISO certification icon
We are ISO 27001:2013 Certified.

This Certificate Demonstrates That IIFL As An Organization Has Defined And Put In Place Best-Practice Information Security Processes.