Benjamin Franklin Parkway
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
BRIDGES a Guide to Your Community
BRIDGES A Guide to Your Community 2016 A resource guide to the City of Philadelphia’s services for returning citizens freelibrary.org Bridges: A Guide to Your Community 2016 Compiled and Edited by Prison Services staff Free Library of Philadelphia About the Re-entry Guide The Free Library of Philadelphia Re-entry Guide offers returning citizens from jails and prisons information on resources available in Philadelphia. The guide has information on various agencies and their respective services to give you relevant information during re-entry. We have personally contacted the agencies to verify that the given information is correct. We also want to emphasize that because information changes quickly, we request that you confirm with each agency that their services have not changed. It is our hope that by reading this guide your re-entry will be successful, and you will be encouraged to use these resources. This guide is not a complete list of all the agencies that offer services in Philadelphia. We have specifically included agencies that are easy to contact. If you feel we missed any important agency, please let us know. If you are representing an organization that would like to be included in the Re-entry Guide, please contact us: Prison Services Parkway Central Library The Free Library of Philadelphia 1901 Vine Street, Philadelphia, PA 19103 Email: [email protected] Phone: 215-686-5392 1 Acknowledgments The Re-entry Guide is part of the Free Library of Philadelphia Prison Services project: Expanding Opportunities for Incarcerated Parents and Their Families at Neighborhood Libraries. This project was made possible in part by the Institute of Museum and Library Services SP-02- 15-0014-15. -
Know Before You Go
Know Before You Go NORWAY A Guide to Keep You Safe Abroad provided by: Pathways to Safety International Updated May 2019 KNOW BEFORE YOU GO: NORWAY 2 Let’s be perfectly clear, the number one way to prevent sexual assault is to not rape. While the responsibility of ending sexual gender based violence is on the perpetrators, this guide will offer general safety tips, country-specific information, and resources to help prevent and prepare travelers for the possibility of sexual assault abroad. GENERAL SAFETY TIPS: 1. Use the buddy system and travel with friends. 7 out of 10 2. Be aware of social and cultural norms. For example, looking at someone in rapes are the eyes when you speak to them is perfectly normal in the U.S., but in committed another country that could signify you’re interested in the person. by someone known to the 3. Recognize controlling behavior when entering a relationship. Most rape 1 survivors recall feeling “uncomfortable” about some of their partner’s behaviors victim such as degrading jokes/language or refusal to accept “no” as an answer, whether in a sexual context or otherwise.2 4. Avoid secluded places where you could be more vulnerable. Meet new people in public spaces and let a trusted friend know where you’ll be beforehand. Always have a backup plan in mind. 5. Trust your gut. Many victims have a “bad feeling” right before an assault takes place. It’s okay to leave a situation that is making you feel uncomfortable. Stay alert and aware in new social settings and places. -
2016 Calendar of Events
CALENDAR OF EVENTS OF EVENTS CALENDAR FEBRUARY 2 — MARCH 30, 2016 2 — MARCH 30, FEBRUARY EIGHT INSPIRED WEEKS OF DISCUSSIONS, PERFORMANCES, AND FILMS 2016 FEATURED TITLES FEATURED 2016 WELCOME 2016 FEATURED TITLES pg 2 WELCOME FROM THE CHAIR pg 3 YOUTH COMPANION BOOKS pg 4 ADDITIONAL READING SUGGESTIONS pg 5 DISCUSSION GROUPS AND QUESTIONS pg 6-7 FILM SCREENINGS pg 8-9 GENERAL EVENTS pg 10 EVENTS FOR CHILDREN, TEENS, AND FAMILIES pg 21 COMMUNITY PARTNERS pg 27 SPONSORS AND ACKNOWLEDGEMENTS pg 30 The centerpiece of 2016 One Book, One Philadelphia is author Charles Frazier’s historical novel Cold Mountain. Set at the end of the Civil War, Cold Mountain tells the heartrending story of Inman, a wounded Confederate soldier who walks away from the horrors of war to return home to his beloved, Ada. Cold Mountain BY CHARLES FRAZIER His perilous journey through the war-ravaged landscape of North Carolina Cold Mountain made publishing history when it topped the interweaves with Ada’s struggles to maintain her father’s farm as she awaits New York Times bestseller list for 61 weeks and sold 3 million Inman’s return. A compelling love story beats at the heart of Cold Mountain, copies. A richly detailed American epic, it is the story of a Civil propelling the action and keeping readers anxiously turning pages. War soldier journeying through a divided country to return Critics have praised Cold Mountain for its lyrical language, its reverential to the woman he loves, while she struggles to maintain her descriptions of the Southern landscape, and its powerful storytelling that dramatizes father’s farm and make sense of a new and troubling world. -
Wyncote, Pennsylvania: the History, Development, Architecture and Preservation of a Victorian Philadelphia Suburb
University of Pennsylvania ScholarlyCommons Theses (Historic Preservation) Graduate Program in Historic Preservation 1985 Wyncote, Pennsylvania: The History, Development, Architecture and Preservation of a Victorian Philadelphia Suburb Doreen L. Foust University of Pennsylvania Follow this and additional works at: https://repository.upenn.edu/hp_theses Part of the Historic Preservation and Conservation Commons Foust, Doreen L., "Wyncote, Pennsylvania: The History, Development, Architecture and Preservation of a Victorian Philadelphia Suburb" (1985). Theses (Historic Preservation). 239. https://repository.upenn.edu/hp_theses/239 Copyright note: Penn School of Design permits distribution and display of this student work by University of Pennsylvania Libraries. Suggested Citation: Foust, Doreen L. (1985). Wyncote, Pennsylvania: The History, Development, Architecture and Preservation of a Victorian Philadelphia Suburb. (Masters Thesis). University of Pennsylvania, Philadelphia, PA. This paper is posted at ScholarlyCommons. https://repository.upenn.edu/hp_theses/239 For more information, please contact [email protected]. Wyncote, Pennsylvania: The History, Development, Architecture and Preservation of a Victorian Philadelphia Suburb Disciplines Historic Preservation and Conservation Comments Copyright note: Penn School of Design permits distribution and display of this student work by University of Pennsylvania Libraries. Suggested Citation: Foust, Doreen L. (1985). Wyncote, Pennsylvania: The History, Development, Architecture and -
Nomination of Historic Building, Structure, Site, Or
NOMINATION OF HISTORIC BUILDING, STRUCTURE, SITE, OR OBJECT PHILADELPHIA REGISTER OF HISTORIC PLACES PHILADELPHIA HISTORICAL COMMISSION SUBMIT ALL ATTACHED MATERIALS ON PAPER AND IN ELECTRONIC FORM ON CD (MS WORD FORMAT) 1. ADDRESS OF HISTORIC RESOURCE (must comply with a Board of Revision of Taxes address) Street address: 401-411 S. Broad Street st Postal code: 19147 Councilmanic District: 1 District 2. NAME OF HISTORIC RESOURCE Historic Name: Young Men’s & Young Women’s Hebrew Association Common Name: Gershman Y 3. TYPE OF HISTORIC RESOURCE ☒ Building ☐ Structure ☐ Site ☐ Object 4. PROPERTY INFORMATION Condition: ☐ excellent ☒ good ☐ fair ☐ poor ☐ ruins Occupancy: ☒ occupied ☐ vacant ☐ under construction ☐ unknown Current use: Community center, offices, galleries 5. BOUNDARY DESCRIPTION SEE ATTACHED 6. DESCRIPTION SEE ATTACHED 7. SIGNIFICANCE Period of Significance (from year to year): 1924-present Date(s) of construction and/or alteration: 1923-24 Architect, engineer, and/or designer: Frank E. Hahn, S. Brian Baylinson (associate), Paul Philippe Cret (consultant) Builder, contractor, and/or artisan: Original owner: Young Men’s & Young Women’s Hebrew Association Other significant persons: Albert M. Greenfield CRITERIA FOR DESIGNATION: The historic resource satisfies the following criteria for designation (check all that apply): ☒ (a) Has significant character, interest or value as part of the development, heritage or cultural characteristics of the City, Commonwealth or Nation or is associated with the -
9101 Germantown Avenue St. Michael's Hall, Located on a Large
St. Michael’s Hall, aka Alfred C. Harrison Country Estate – 9101 Germantown Avenue St. Michael’s Hall, located on a large wooded lot at the corner of Germantown and Sunset Avenues in Chestnut Hill, served as a summertime country retreat for its first sixty years. Between the time the house was built in the late 1850s, and 1924, St. Michael’s Hall was owned by three wealthy industrialists—William Henry Trotter (ownership 1855-1868), Henry Latimer Norris (ownership 1868-1884), and Alfred Craven Harrison (ownership 1884-1924). The Convent of the Sisters of St. Joseph of Chestnut Hill purchased the site in 1927, using it first as a school and then as a residence hall for nuns. The nuns vacated the property in September 2020, although it is still currently maintained by the Sisters of St. Joseph. 9101 Germantown Avenue, ca. 1903-1910 Courtesy of Chestnut Hill Conservancy Site Details • Built between 1855 and 1857, the house was originally rectangular in shape, measuring 40 by 43 feet. No architect has been attributed to the original building. • A small wing in the Gothic Revival style was added to the southeast elevation at an unknown date. • A small bay was added to the southwest (Germantown Avenue) elevation in 1896. • In 1899 two large wings in the Italianate style were added to the southeast and northeast elevations by architects Cope & Stewardson. • The 27,500 sq.ft. building sits on a lot of approximately 4 acres zoned RSD3, with 420’ of frontage bounded by Green Tree, Hampton, E Sunset, and Germantown. • The property is considered a “Significant” property in the Chestnut Hill National Register Historic District, but not listed on the Philadelphia Register of Historic Places. -
View Nomination
NOMINATION OF HISTORIC BUILDING, STRUCTURE, SITE, OR OBJECT PHILADELPHIA REGISTER OF HISTORIC PLACES PHILADELPHIA HISTORICAL COMMISSION SUBMIT ALL ATTACHED MATERIALS ON PAPER AND IN ELECTRONIC FORM (CD, EMAIL, FLASH DRIVE) ELECTRONIC FILES MUST BE WORD OR WORD COMPATIBLE 1. ADDRESS OF HISTORIC RESOURCE (must comply with an Office of Property Assessment address) Street address:__________________________________________________________3910 Chestnut St ________ Postal code:_______________19104 Councilmanic District:__________________________3 2. NAME OF HISTORIC RESOURCE Historic Name:__________________________________________________________James A. Connelly House ________ Current/Common Name:________Casa Vecchia___________________________________________ ________ 3. TYPE OF HISTORIC RESOURCE Building Structure Site Object 4. PROPERTY INFORMATION Occupancy: occupied vacant under construction unknown Current use:____________________________________________________________Office space ________ 5. BOUNDARY DESCRIPTION See attached. 6. DESCRIPTION See attached. 7. SIGNIFICANCE Please attach the Statement of Significance. Period of Significance (from year to year): from _________1806 to _________1987 Date(s) of construction and/or alteration:_____________________________________1866; reconstructed 1896 _________ Architect, engineer, and/or designer:________________________________________Horace Trumbauer, architect _________ Builder, contractor, and/or artisan:__________________________________________Doyle & Doak, contractors _________ Original -
Proxy Auto-Config Files
APPENDIX B Proxy Auto-Config Files Revised: July 15, 2010 Overview Proxy Auto-Configuration (PAC) is a method used by Web browsers to select a proxy for a given URL. The method for choosing a proxy is written as a JavaScript function contained in a PAC file. This file can be hosted locally or on a network. Browsers can be configured to use the file either manually or, in Microsoft Windows environments, automatically using Group Policy Objects. This appendix explains the basics of using PAC files. How PAC Files Work A PAC file is referenced each time a new URL is loaded. The host, for example cnn.com, the URL, for example cnn.com/images/logo.jpg, and other information such as the local machine IP address can be evaluated and rules based on this information used to determine whether to send the traffic via a proxy or direct to the Internet. The following example compares the URL requested by the user, with the URL ipcheckit.com/data/. If the URLs match, the PAC file will instruct the browser to send the request direct to the Internet. This can be used if you need to exception a section of a Web site from going via the Web Scanning Services; if the user had requested only ipcheckit.com, this rule would not apply: if (shExpMatch(url,"ipcheckit.com/data/*")) return "DIRECT"; In the next example the local IP address of the machine making a Web request is evaluated. If the IP address falls within the IP address range 10.10.1.* then the PAC file will send the request to proxy182.scansafe.net. -
The Potential Harms of the Tor Anonymity Network Cluster Disproportionately in Free Countries
The potential harms of the Tor anonymity network cluster disproportionately in free countries Eric Jardinea,1,2, Andrew M. Lindnerb,1, and Gareth Owensonc,1 aDepartment of Political Science, Virginia Tech, Blacksburg, VA 24061; bDepartment of Sociology, Skidmore College, Saratoga Springs, NY 12866; and cCyber Espion Ltd, Portsmouth PO2 0TP, United Kingdom Edited by Douglas S. Massey, Princeton University, Princeton, NJ, and approved October 23, 2020 (received for review June 10, 2020) The Tor anonymity network allows users to protect their privacy However, substantial evidence has shown that the preponder- and circumvent censorship restrictions but also shields those ance of Onion/Hidden Services traffic connects to illicit sites (7). distributing child abuse content, selling or buying illicit drugs, or With this important caveat in mind, our data also show that the sharing malware online. Using data collected from Tor entry distribution of potentially harmful and beneficial uses is uneven, nodes, we provide an estimation of the proportion of Tor network clustering predominantly in politically free regimes. In particular, users that likely employ the network in putatively good or bad the average rate of likely malicious use of Tor in our data for ways. Overall, on an average country/day, ∼6.7% of Tor network countries coded by Freedom House as “not free” is just 4.8%. In users connect to Onion/Hidden Services that are disproportion- countries coded as “free,” the percentage of users visiting Onion/ ately used for illicit purposes. We also show that the likely balance Hidden Services as a proportion of total daily Tor use is nearly of beneficial and malicious use of Tor is unevenly spread globally twice as much or ∼7.8%. -
Technical and Legal Overview of the Tor Anonymity Network
Emin Çalışkan, Tomáš Minárik, Anna-Maria Osula Technical and Legal Overview of the Tor Anonymity Network Tallinn 2015 This publication is a product of the NATO Cooperative Cyber Defence Centre of Excellence (the Centre). It does not necessarily reflect the policy or the opinion of the Centre or NATO. The Centre may not be held responsible for any loss or harm arising from the use of information contained in this publication and is not responsible for the content of the external sources, including external websites referenced in this publication. Digital or hard copies of this publication may be produced for internal use within NATO and for personal or educational use when for non- profit and non-commercial purpose, provided that copies bear a full citation. www.ccdcoe.org [email protected] 1 Technical and Legal Overview of the Tor Anonymity Network 1. Introduction .................................................................................................................................... 3 2. Tor and Internet Filtering Circumvention ....................................................................................... 4 2.1. Technical Methods .................................................................................................................. 4 2.1.1. Proxy ................................................................................................................................ 4 2.1.2. Tunnelling/Virtual Private Networks ............................................................................... 5 -
\.\Aes Pennsylvania PA "It,- EL~PA S- ~
LYNNEWOOD HALL HABS NO. PA-t314f3 920 Spring Avenue Elkins Park Montgomery County \.\Aes Pennsylvania PA "it,- EL~PA s- ~ PHOTOGRAPHS WRITTEN HISTORICAL A.ND DESCRIPTIVE Historic American Buildings Survey National Park Service Department of the Intericn:· p_Q_ Box 37l2'i7 Washington, D.C. 20013-7127 I HABs Yt,r-" ... ELk'.'.PA,I HISTORIC AMERICAN BUILDINGS SURVEY $- LYNNEWOOD HALL HABS No. PA-6146 Location: 920 Spring Avenue, Elkins Park, Montgomery Co., Pennsylvania. Significance: Lynnewood Hall, designed by famed Philadelphia architect Horace Trumbauer in 1898, survives as one of the finest country houses in the Philadelphia area. The 110-room mansion was built for street-car magnate P.A.B. Widener to house his growing family and art collection which would later become internationally renowned. 1 The vast scale and lavish interiors exemplify the remnants of an age when Philadelphia's self-made millionaire industrialists flourished and built their mansions in Cheltenham, apart from the Main Line's old society. Description: Lynnewood Hall is a two-story, seventeen-bay Classical Revival mansion that overlooks a terraced lawn to the south. The house is constructed of limestone and is raised one half story on a stone base that forms a terrace around the perimeter of the building. The mansion is a "T" plan with the front facade forming the cross arm of the "T". Enclosed semi circular loggias extend from the east and west ends of the cross arm and a three-story wing forms the leg of the 'T' to the north. The most imposing exterior feature is the full-height, five-bay Corinthian portico with a stone staircase and a monumental pediment. -
How Speedy Is SPDY?
How Speedy is SPDY? Xiao Sophia Wang, Aruna Balasubramanian, Arvind Krishnamurthy, and David Wetherall, University of Washington https://www.usenix.org/conference/nsdi14/technical-sessions/wang This paper is included in the Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI ’14). April 2–4, 2014 • Seattle, WA, USA ISBN 978-1-931971-09-6 Open access to the Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI ’14) is sponsored by USENIX How speedy is SPDY? Xiao Sophia Wang, Aruna Balasubramanian, Arvind Krishnamurthy, and David Wetherall University of Washington Abstract provides only a modest improvement [13, 19]. In our SPDY is increasingly being used as an enhancement own study [25] of page load time (PLT) for the top 200 to HTTP/1.1. To understand its impact on performance, Web pages from Alexa [1], we found either SPDY or we conduct a systematic study of Web page load time HTTP could provide better performance by a significant (PLT) under SPDY and compare it to HTTP. To identify margin, with SPDY performing only slightly better than the factors that affect PLT, we proceed from simple, syn- HTTP in the median case. thetic pages to complete page loads based on the top 200 As we have looked more deeply into the performance Alexa sites. We find that SPDY provides a significant im- of SPDY, we have come to appreciate why it is chal- provement over HTTP when we ignore dependencies in lenging to understand. Both SPDY and HTTP perfor- the page load process and the effects of browser compu- mance depend on many factors external to the protocols tation.