ZCCM Investments Holdings Plc (ZCCM.zm) 2005 Annual Report

first_imgZCCM Investments Holdings Plc (ZCCM.zm) listed on the Lusaka Securities Exchange under the Investment sector has released it’s 2005 annual report.For more information about ZCCM Investments Holdings Plc (ZCCM.zm) reports, abridged reports, interim earnings results and earnings presentations, visit the ZCCM Investments Holdings Plc (ZCCM.zm) company page on AfricanFinancials.Document: ZCCM Investments Holdings Plc (ZCCM.zm)  2005 annual report.Company ProfileZCCM Investments Holdings PLC is an investments holdings company with diversified interests in mining, energy and other sectors of the Zambian economy. The Company has a primary listing on the Lusaka Securities Exchange and secondary listings on the London Stock Exchange and the Euronext Stock Exchange in Paris.last_img read more

Read More →

Wasps Rugby move to the Ricoh Arena

first_img Same faces… but Tom Varndell & his team-mates will be playing on a different pitch soon I cannot believe what I am reading about @WaspsRugby – what an utterly heartless decision. No consideration of the fans or heritage.— Tim Fox-Godden (@TJFoxGodden) October 8, 2014 Some pros… Wasps have long been looking for a permanent home, and owners will be hoping that moving the club to the Ricoh Arena in Coventry will provide much-needed stability for the club, who previously played at Adams Park and Loftus Road.Wasps CEO Nick Eastwood explains the reasons for the move in the below video The side, which has shared a ground with Wycombe Wanderers FC since 2002, have been subject to well-documented financial troubles for a number of years, which came to a head two season ago when they narrowly avoided going into administration. A consortium took over ownership in 2012, led by Ken Moss, and then in 2013 Irish businessman Derek Richardson became the majority shareholder, and the ambition to move to their own ground has been in the forefront of their minds. Rumours of a ground share with Brentford RFC in west London, where Wasps originally laid their roots before the move to High Wycombe, surfaced last season, but instead Wasps announced the acquisition of a 50% share in in the Ricoh Arena in Coventry. The club will play their first home game there in December, against Castres or London Irish (TBC).New paddock: Coventry FC will still play at the RicohSome cons… Coventry is 83 miles from Adams Park, Wasps’ current ground, and there has been an angry backlash from the fans. Some have told RW they intend to cancel their season tickets, and there’s even been a petition started to keep the club in London. With gates of around 5,500 to 6,500 this season, the club’s priority will be expanding their fan base.Disappointment: some Wasps fans may cancel their season ticketsFurthermore, Wasps are now moving to the rugby hotbed of the midlands, and will be competing with Premiership giants Northampton and Leicester, as well as the Championship’s Worcester and National 1’s Coventry RFC for bums on seats. Furthermore, with the Ricoh Arena being in Worcester’s catchment area, the recruitment of players could become problematic for both clubs.Click here to watch a couple of Wasps take part in Pump Up The BallWorcester coach Dean Ryan said: “I can’t imagine we’re the loudest voice. There’d be two major players on the other side of Warwickshire with louder voices than us, who won’t be over the moon about it either. We’re investing a lot of money in the region, We’ve got an academy. We’re all working for the same thing. We have support that comes from that area and kids who come from that area. Warwickshire has been over the years a productive source for us. I can’t quite see the merits of this, other than purely commercial for Wasps’ first team.”Click here to find out what Simon Shaw has to say about Wasps’ move to Coventry. What you had to say about it…  @WaspsRugby surely these two statements are contradictory? #everyfancounts @Rugbyworldmag pic.twitter.com/h6N4JFp40t— Michael Agar (@michaelagar) October 7, 2014 This week Wasps have announced a move to the Ricoh Arena in Coventry. Here’s what you had to say about the club’s new chapter… Want to keep up to date with all the latest news & views? Why not subscribe to RW? Click here for the latest deals and discounts. LATEST RUGBY WORLD MAGAZINE SUBSCRIPTION DEALS https://twitter.com/justwotsit/status/519596081915498496 TAGS: Wasps last_img read more

Read More →

Almendro 22 House / Arqueodigma Estudio

first_img 2020 Save this picture!© Horacio Virissimo+ 26Curated by Clara Ott Share Houses Architects: Arqueodigma Estudio Area Area of this architecture project CopyHouses•Nuevo Mexico, Mexico “COPY” Mexico ShareFacebookTwitterPinterestWhatsappMailOrhttps://www.archdaily.com/937101/almendro-22-house-arqueodigma-estudio Clipboard Carlos Elizondo Valladares Photographs Manufacturers: AutoDesk, Cemex, 3D MAX, Adobe, CASTEL, ESTUDIO CORDOBA, EXPOCERAMICAS, Prisa, Tecnolite Area:  252 m² Year Completion year of this architecture project Almendro 22 House / Arqueodigma Estudio Design Team:Alexis Ayala, Gireh NavarroEngineering:Rodrigo VázquezStructural:Tatyana Herrera MartínezCarpentry:Estudio CórdobaCity:Nuevo MexicoCountry:MexicoMore SpecsLess SpecsSave this picture!© Horacio VirissimoRecommended ProductsResidential ApplicationsFastmount®Heavy Duty Panel Fastener at ‘Sandboxes’ HouseEnclosures / Double Skin FacadesRodecaRound Facade at Omnisport Arena ApeldoornDoorsStudcoAccess Panels – AccessDorWindowsKalwall®Facades – Window ReplacementsText description provided by the architects. The Project is located in one of the exponential and fastest growing áreas on the limits of Zapopan. It is located in a private condominium with privileged green áreas, wich allows the permeability between the exterior and interior, framing the visuales of its gardens.Save this picture!© Horacio VirissimoSave this picture!Ground Floor PlanSave this picture!© Horacio VirissimoThe house is a challenge for the geometry of its terrain and for the easement that must be respected.Save this picture!© Horacio VirissimoIn the first instance, the house is designed based in its exterior gardens, and its vertical circulation creating visuales that frame the exterior, and free the interior space, creating terraces and balconies along the entire route. These circulations divide the private área from the public área of the house. On the ground floor, the study and the bathroom are divided into the leisure área of the house, which is connected to the outside área.Save this picture!© Horacio VirissimoSave this picture!Transverse SectionSave this picture!© Horacio VirissimoSave this picture!© Horacio VirissimoSave this picture!© Horacio VirissimoOn the upper floor, the interiores are developed with terraces and overlooking garden áreas, to generate spaces for the reflection that connects with the vegetation.  A terrace is generated on the roof top, to free up all the built space and to take advantage of the views and tranquility that this privileged place offers us. A space for hang out and rest is created, allowing the house to be integrated with its surroundings.Save this picture!© Horacio VirissimoProject gallerySee allShow lessFabricating Personal Protective Equipment: Architecture in a Post-Virus WorldInterviewsSpotlight: Peter ZumthorArticles Share “COPY” Almendro 22 House / Arqueodigma EstudioSave this projectSaveAlmendro 22 House / Arqueodigma Estudio Lead Architect: Year:  ArchDaily Photographs:  Horacio Virissimo Manufacturers Brands with products used in this architecture project ShareFacebookTwitterPinterestWhatsappMailOrhttps://www.archdaily.com/937101/almendro-22-house-arqueodigma-estudio Clipboard Projects CopyAbout this officeArqueodigma EstudioOfficeFollow#TagsProjectsBuilt ProjectsSelected ProjectsResidential ArchitectureHousesNew MexicoMexicoPublished on April 26, 2020Cite: “Almendro 22 House / Arqueodigma Estudio” [Casa Almendro 22 / Arqueodigma Estudio] 26 Apr 2020. ArchDaily. Accessed 10 Jun 2021. ISSN 0719-8884Browse the CatalogBathroom AccessorieshansgroheBath & Shower ThermostatsGlass3MGlass Finish – FASARA™ NaturalPartitionsSkyfoldVertically Folding Operable Walls – Mirage®WindowsVitrocsaSliding Window – Mosquito NetSinksBradley Corporation USASinks – Verge LVG-SeriesMetal PanelsTrimoQbiss One in Equinix Data CentreSignage / Display SystemsGoppionDisplay Case – Q-ClassMetal PanelsLongboard®Aluminum Battens – Link & Lock – 4″Sports ApplicationsPunto DesignPunto Fit in Ekaterinburg Public SpaceWoodBlumer LehmannFree Form Structures for Wood ProjectsKnobsKarcher DesignDoor Knob K390 (50)TablesVitsœ621 Side TableMore products »Save世界上最受欢迎的建筑网站现已推出你的母语版本!想浏览ArchDaily中国吗?是否翻译成中文现有为你所在地区特制的网站?想浏览ArchDaily中国吗?Take me there »✖You’ve started following your first account!Did you know?You’ll now receive updates based on what you follow! Personalize your stream and start following your favorite authors, offices and users.Go to my streamlast_img read more

Read More →

Do charity mergers work?

About Howard Lake Howard Lake is a digital fundraising entrepreneur. Publisher of UK Fundraising, the world’s first web resource for professional fundraisers, since 1994. Trainer and consultant in digital fundraising. Founder of Fundraising Camp and co-founder of GoodJobs.org.uk. Researching massive growth in giving. AddThis Sharing ButtonsShare to TwitterTwitterShare to FacebookFacebookShare to LinkedInLinkedInShare to EmailEmailShare to WhatsAppWhatsAppShare to MessengerMessengerShare to MoreAddThis What happens to charities that merge? Nicola Hill finds out. Read her Let’s get together at SocietyGuardian.  18 total views,  1 views today AddThis Sharing ButtonsShare to TwitterTwitterShare to FacebookFacebookShare to LinkedInLinkedInShare to EmailEmailShare to WhatsAppWhatsAppShare to MessengerMessengerShare to MoreAddThis Do charity mergers work? Howard Lake | 26 February 2001 | News read more

Read More →

A FIST appeal to youth: Attend Workers World Party conference

first_imgThe looming global financial crisis has already hurt young people, leaving nearly 75 million young people unemployed around the world. When countries suffer economically, young workers are usually the last in and first out. From a lack of social services to slim opportunities for housing or jobs, it’s no shock that young people feel like they are left without any opportunities for prosperity or even stability.Many young people know in their guts that the capitalist system is corrupt and is failing them.  They provided on-the-ground leadership to the occupations of Zucotti Park that led to Occupy Wall Street and were on the front lines of the rallies, rebellions and protests following the acquittal of George Zimmerman for the murder of Trayvon Martin.As the revolutionary, working-class youth of Fight Imperialism, Stand Together (FIST), we are reminded of Dr. Martin Luther King’s indictment of economic inequities in the U.S.: “Socialism for the rich and free enterprise for the poor.” We are excited to have the opportunity to invite young activists and freedom fighters from across the country to the Nov. 16-17 Workers World Party national conference in New York City, as we have been invited to be a focus of this year’s gathering with our own workshop and plenary speakers. The FIST plenary session will take place at noon on Nov. 16 followed by the FIST lunchtime workshop at 1 p.m.   We aren’t content with the idea that our generation’s future can wait.  With the unique exuberance and revolutionary optimism of our generation, we are ready to lay the groundwork for organizing a society where people’s needs come first.The ruling class has its own schedule of meetings, summits and conferences to discuss how to divide and conquer the multinational working class here and abroad. From the United Nations to NATO to the Group of Eight, or G8 forum, leaders of imperialist countries, transnational corporations and military officials talk at length to build an analysis, strategy and plan on how to maintain and increase profits. That’s why it’s all the more necessary for working-class people of all nationalities, faith backgrounds, ages, gender identities, sexual orientations and abilities to come together and strategize our own united plans to take back our world from the ruling class.In a society where we are constantly told that we aren’t smart enough, good enough, beautiful enough or strong enough to deserve a life of happiness and dignity, many working-class people feel like they have nothing to contribute to the movement for liberation. FIST youth want to extend a welcoming and warm invitation to all young people. It’s a rare opportunity for us as young activists to get to share the stage at these important discussions on building people’s power, but we know that we represent a generation of creativity and innovation.  The youth need a revolution!For more information on conference registration, housing and a timeline of events, visit workers.org/wwp.FacebookTwitterWhatsAppEmailPrintMoreShare thisFacebookTwitterWhatsAppEmailPrintMoreShare thislast_img read more

Read More →

Encryption and anonymity are essential for freedom of information

first_img Online freedoms – Access- Amnesty International- Article 19- Association for Progressive Communications (APC)- Australian Privacy Foundation- Bytes for All, Pakistan- Center for Democracy & Technology (CDT)- Chaos Computer Club (CCC) e.V.- Digital Rights Foundation- Electronic Frontier Foundation- FIDH- Foundation for Internet and Civic Culture, Thailand- Global Voices Advocacy- Human Rights Watch- International Modern Media Institute (Iceland)- La Quadrature du Net- Media Matters for Democracy, Pakistan- OpenMedia.org- Panoptykon- PEN International- Privacy International- Reporters sans frontières (RSF)- SFLC.in- WITNESS- World Wide Web Foundation Online freedoms Organisation News RSF_en center_img Presented at the 29th Session of the UN Human Rights Council (15 June – 3 July), the report points out that human rights defenders, lawyers and journalists rely on these tools to encrypt their communications and protect their contacts and sources, and that any restrictions on these tools should therefore be strictly limited.Reporters Without Borders welcomes the report with particular enthusiasm as it has been defending digital encryption and online anonymity for years. In an open letter in 2002, when the French government wanted to restrict the use of encryption software, Reporters Without Borders wrote: “Our organization supports and encourages encryption. This science and the software it generates help free speech and media freedom to progress worldwide. In some countries such as China, Vietnam and Tunisia, using encryption is the only option for dissidents and journalists who want to protect the content of their emails and above all to protect their lives.”Reporters Without Borders has a Digital Survival Kit in eight languages containing tools, tips and techniques for circumventing censorship and securing digital communications and data. The kit is in the form of a wiki that can be freely accessed, copied, modified and redistributed. To help develop the kit, request access to the wiki by sending an email to email to [email protected]—-Promote Strong Encryption and Anonymity in the Digital AgeJoint Civil Society Statement, Submitted to the 29th Session of the UN Human Rights CouncilThe undersigned civil society organizations and independent experts work to promote human rights and press freedom online. We welcome the report of the Special Rapporteur on freedom of opinion and expression on the use of encryption and anonymity in digital communication (A/HRC/29/32), which was presented at the UN Human Rights Council on June 17.We urge all governments to promote the use of strong encryption technologies and to protect the right to seek, receive, and impart information anonymously online. Any laws or regulations that restrict the use of encryption or anonymity online should be revised to comply with the strict three-part test the Special Rapporteur sets out in the report. We also urge information and communications technology (ICT) companies to broadly adopt encryption and other privacy-enhancing measures to safeguard the security of users. The Internet has been enormously beneficial for the human rights movement and the work of journalists and independent civil society worldwide. Yet it has also created new risks for all users. As described in the 2014 report of the UN High Commissioner for Human Rights (A/HRC/27/37) on privacy in the digital age, digital technologies have enabled intrusive surveillance on an unprecedented scope and scale. Such surveillance can enable governments to violate professional confidentiality and identify journalistic sources, government critics, whistleblowers, or members of persecuted minority groups (such as LGBT people) and expose such individuals to retaliation. Ordinary users also face a range of online threats from overbroad state surveillance, identity thieves, and malicious actors.As the Special Rapporteur’s report recognizes, strong encryption and anonymity are fundamental for the protection of cybersecurity and human rights in the digital age. Encryption and anonymity, separately or together, “create a zone of privacy to protect opinion and belief” (para. 12). Both are critical to the enjoyment of freedoms of opinion, expression, and association, the press, the right to privacy, and other rights. Often without knowing it, Internet users rely on the security practices of ICT companies, including support for encryption, to shield their data from online threats. Human rights defenders, lawyers, and journalists use tools to encrypt their data and communications and protect their sources and contacts from reprisals. Indeed, many of the undersigned organizations and individuals rely on encryption in their daily work to ensure the safety of staff and associates. States have a duty to protect the right to privacy, and all Internet users should be able to experiment with and adopt client-to-client encryption and anonymity tools without obstruction by government regulation or corporate policies.Governments also have an obligation to investigate and prosecute crimes and prevent terrorist attacks. In recent years, however, some governments have sought to restrict access to strong encryption or limit anonymity online in the name of national security or public order. The Special Rapporteur’s report reiterated that any “restrictions on encryption and anonymity must be strictly limited according to principles of legality, necessity, proportionality, and legitimacy in objective” (para. 56). Any public debate on the legitimacy of specific, individualized restrictions on encryption must consider the critical role that encryption and anonymity play to protect and promote human rights, press freedom, and online security. The Special Rapporteur further states that “blanket prohibitions” on encryption and anonymity “fail to be necessary and proportionate.” States should also “avoid all measures that weaken the security that individuals may enjoy online, such as backdoors, weak encryption standards and key escrows” (para 60).Broad restrictions on the use of encryption and anonymity will not meet these criteria. For example, politicians and government officials in the US and UK have expressed concern that increased use of encryption in social media services or on mobile devices will make it more difficult to investigate terrorist threats. Some have urged companies to insert “back doors” or other vulnerabilities that would allow law enforcement to circumvent these protections. (See James B. Comey, Director, Federal Bureau of Investigation, “Going Dark: Are Technology, Privacy, and Public Safety on a Collision Course,” Speech at the Brookings Institution, Washington, DC, October 16, 2014, http://www.fbi.gov/news/speeches/going-dark-are-technology-privacy-and-p… Mark Scott, “British Prime Minister Suggests Banning Some Online Messaging Apps,” New York Times, January 12, 2015, http://bits.blogs.nytimes.com/2015/01/12/british-prime-minister-suggests… Robert Hannigan, “The web is a terrorist’s command-and-control network of choice,” Financial Times, November 3, 2014, http://www.ft.com/intl/cms/s/2/c89b6c58-6342-11e4-8a63-00144feabdc0.html.)Yet as the Special Rapporteur confirms, “In the contemporary technological environment, intentionally compromising encryption, even for arguably legitimate purposes, weakens everyone’s security online” (para. 8). Introducing weaknesses into digital architecture for the purposes of surveillance weakens the security of the Internet as a whole, undermining security rather than enhancing it, and conflicts with the state duty to protect the right to privacy.We urge states to adopt and implement the report’s core recommendations:1. States should promote and comprehensively protect strong encryption and anonymity. National laws should recognize that individuals are free to protect the privacy of their digital communications by using encryption technology and tools that enable anonymity online (paras 57-59). 2. States should avoid all measures that weaken the security that individuals may enjoy online. Such measures include mandated “backdoors,” weak encryption standards, key escrow arrangements, or generally forcing developers to design systems so they retain the capability to decrypt communications. Requiring companies to build vulnerabilities into secured products unavoidably and disproportionately undermines the security of all users of that product (paras 42, 60).3. Restrictions should be targeted on a case-specific basis and should be limited to only what is necessary and proportionate for a legitimate aim. Court-ordered decryption may only be permissible when it results from transparent and publicly accessible laws applied solely on a targeted case-by-case basis to individuals (i.e., not to a mass of people) and subject to judicial warrant and the protection of due process rights (paras 57, 60). 4. States should not impose blanket prohibitions on encryption and anonymity, as they are neither necessary nor proportionate. Such bans deprive all online users in the jurisdiction of the right to create private space for opinion and expression, without establishing that the encryption is used for unlawful ends. Some forms of regulation may, in practice, amount to a blanket prohibition—for example, requiring licenses for encryption, mandating weak technical standards for encryption, or controlling the import or export of encryption tools (paras 40-41). 5. States should refrain from making identification of users a condition for access to online services or SIM card registration for mobile users (real-name registration). States should also refrain from limiting access to anonymity tools. Anonymity facilitates the rights to privacy, opinion, and expression in significant ways online and states should protect it and generally not restrict the technologies that provide it. In some cases, anonymity tools may be the only mechanism for individuals to exercise a range of rights securely (paras 47-52). The Special Rapporteur also called on the private sector to review the adequacy of their practices with regard to the responsibility of business to respect human rights. Adequate human rights due diligence for ICT companies should involve assessing threats to the security of Internet users, including from overbroad state surveillance, and developing strategies to mitigate human rights harm. The security practices of ICT companies can significantly promote or compromise encryption and anonymity (along with human rights) online. In particular, the integration of encryption into everyday Internet services and products, such that it is ubiquitous and automatic, would dramatically improve the communications security of anyone who uses the Internet. Accordingly, we also call on ICT companies to:-# Refrain from blocking or limiting the transmission of encrypted communications;-# Permit anonymous communications and use of online services and refrain from imposing real-name registration requirements; -# Deploy end-to-end encryption by default in every online service and product;-# Support the development of other secure technologies for websites based on strong and open protocols; -# Resist efforts by governments to require them to compromise anonymity and encryption. Also resist requests from governments to decrypt specific communications or data except in accordance with a court-order resulting from transparent and publicly accessible laws applied on a targeted case-by-case basis;-# Effectively secure user data stored at rest through verifiable practices including encryption;-# Maintain the security of credentials and provide robust authentication safeguards; -# Initiate a breach notification and patching system for known, exploitable vulnerabilities; and-# Provide user education tools on the importance of digital security best practices.Submitted by: Human Rights WatchSignatories: June 18, 2015 – Updated on May 1, 2016 Encryption and anonymity are essential for freedom of information Reporters Without Borders joins 25 other civil society groups in hailing a report by David Kaye, the United Nations special rapporteur on the promotion and protection of the right to freedom of opinion and expression, that says the use of encryption and anonymity in digital communications deserves strong protection. Help by sharing this informationlast_img read more

Read More →

Quiet night Arctic ionospheric D region characteristics

first_imgVLF radio propagation recordings are used to determine the characteristics of the nighttime polar lower D region of the ionosphere. Recordings of both VLF phase and amplitude in the Arctic on days within ∼1‐2 weeks of the equinoxes enable their day‐to‐night changes to be determined. These changes are then combined with previously measured daytime polar D region characteristics to find the nighttime characteristics. The previously determined daytime characteristics were measured in the Arctic summer; the NRLMSISE atmosphere model is used to help determine the height change from daytime summer to daytime equinox (∼5 km lower). The principal path used was from the 16.4 kHz Norwegian transmitter JXN (67°N, 14°E) 1334 km northwards across the Arctic Ocean to Ny‐Ålesund (79°N, 12°E), Svalbard. Also used were the 2014‐km path from NRK (37.5 kHz, Grindavik, 64°N, Iceland) to Ny‐Ålesund, the 1655‐km path from JXN to Reykjavik (64°N, Iceland) and the 5302‐km path from JXN across the Arctic Ocean to Fairbanks (65°N) in Alaska. The night values of (the Wait parameters) H’ and β were found to average from ∼79 km at equinox down to 77 km near winter solstice (lower than the 85 km at low and mid‐latitudes by ∼7 km) and 0.6 km‐1 respectively. This lower height and its variability are shown to be consistent with the principal source of ionization being energetic electron precipitation.last_img read more

Read More →

UK: HMS Bulwark Hosts Battle of the Atlantic Reception

first_img View post tag: Bulwark UK: HMS Bulwark Hosts Battle of the Atlantic Reception View post tag: HMS Back to overview,Home naval-today UK: HMS Bulwark Hosts Battle of the Atlantic Reception May 28, 2013 View post tag: Navy Training & Education View post tag: News by topic View post tag: Naval View post tag: UKcenter_img View post tag: Defence View post tag: hosts Assault ship HMS Bulwark hosted the Battle of the Atlantic reception in Liverpool at the start of the commemorative long weekend.In attendance at the event were many survivors from the battle. The First Sea Lord, Admiral Sir George Zambellas was present along with Fleet Commander, Vice Admiral Philip Jones, and many other senior officers. Speeches were made by Captain Burns, the commanding officer of HMS Bulwark and the First Sea Lord, Admiral Sir George Zambellas. The reception gave current and former sailors the chance to swap stories and reflect on the past.Members of HMS Bulwark’s ship’s company and the Second Sea Lord, Vice Admiral David Steel CBE, spoke to veteran Rex Ayers during the Battle of the Atlantic (BOA) Reception. Rex Ayers found himself on the deck of HMS Lossie where he was a Lieutenant (signals officer). In this role he regularly found himself at the helm of the frigate as it rolled across the Atlantic on convoy escort missions.Now 97, he lives in Woolton Park, Liverpool, but recalls one particular encounter:“We were designated to pick up the survivors of a German U-boat that had sunk. The captain of the submarine was a most delightful man and I was assigned to look after him until Liverpool.”[mappress]Press Release, May 28, 2013; Image: Royal Navy View post tag: Atlantic View post tag: Defense View post tag: Battle View post tag: Reception Share this articlelast_img read more

Read More →

USCGC Alex Haley Back in Kodiak, Alaska

first_img Authorities View post tag: News by topic View post tag: back February 10, 2015 View post tag: Alaska View post tag: USCGC Alex Haley View post tag: americas View post tag: Navycenter_img View post tag: Naval The crew of US Coast Guard Cutter Alex Haley returned to Kodiak, Alaska, Sunday following a successful 70-day deployment patrolling more than 10,800 miles throughout the Bering Sea and Aleutian Islands.Alex Haley, known as the “Bulldog of the Bering,” departed Kodiak on Dec. 1, 2014, and spent the last 70 days conducting law enforcement and community outreach operations in the Bering Sea and Aleutian Islands. During the deployment, Alex Haley’s crew performed 41 at sea domestic fisheries enforcement boardings and covered more than 5,000 square miles in search efforts for the sunken Korean fishing vessel 501 Oryong.Alex Haley is a 282-foot medium endurance cutter that routinely conducts operations in the Bering Sea, the Aleutian Islands and the Gulf of Alaska. These operations occur under the tactical control of the 17th Coast Guard District in Juneau.[mappress mapid=”15090″]Image: USCG Share this article Back to overview,Home naval-today USCGC Alex Haley Back in Kodiak, Alaska USCGC Alex Haley Back in Kodiak, Alaska View post tag: Kodiaklast_img read more

Read More →

HAAKE, DAMAEL

first_img44, passed away on February 26, 2017 at the Bayonne Medical Center. He was born in Jersey City and was a resident of Bayonne. He was a self employed mechanic. He was predeceased by his parents Joann and Richard Haake. Husband of Angela (nee: Soprano) Haake. Father of Damael Haake. Son-in-law of Gail Soprano. Also survived by poppa cheech Francisco Poplet. Funeral arrangements by S. FRYCZYNSKI & SON Funeral Home, 32-34 E. 22nd St.last_img

Read More →