Projects Live Desarrollos + Reyes Ríos + Larín arquitectos Project gallerySee allShow lessCasa Haus III / Staudt ArquitecturaSelected ProjectsSite AnalysisArchitecture BooksProject locationAddress:Av Huayacán, Cancún, Q.R., MexicoLocation to be used only as a reference. It could indicate city/country but not exact address. Share Save this picture!© Cèsar Bèjar+ 37Curated by Clara Ott Share Eugenia Wow Condos / Live Desarrollos + reyes ríos + larraín arquitectos “COPY” Eugenia Wow Condos / Live Desarrollos + reyes ríos + larraín arquitectosSave this projectSaveEugenia Wow Condos / Live Desarrollos + reyes ríos + larraín arquitectos City:CancúnCountry:MexicoMore SpecsLess SpecsSave this picture!© Cèsar BèjarRecommended ProductsGlassLibartLeanTo Retractable StructuresGlassSolarluxGlass Canopy – SDL AcubisMetallicsStudcoWall Stop Ends – EzyCapWindowsC.R. LaurenceCRL-U.S. Aluminum Unit-Glaze SystemText description provided by the architects. A commercial architectural project with a high level of design and cost-benefit balance, translated into a rational and accessible cost of production, reflected in a sale price below the average offered to the market of the mid-level housing niche.Save this picture!© Cèsar BèjarSave this picture!00 LevelSave this picture!© Cèsar BèjarThe building involves spaces of circulation, encounter and common amenities as part of the complex that have been specifically designed to foster a sense of community among its inhabitants. The private space is of high quality for its architectural characteristics: an individual scale relationship and intimate proportions. Natural light is captured generously and cross ventilation is incorporated, with the consequent minimum requirement of air conditioning and artificial lighting.Save this picture!© Cèsar BèjarThe industrial materials in contrast to organic materials from the region retain their local character when mixed together, age with dignity and require minimal maintenance over time. This commercial architectural project comprises added value by offering all the benefits of quality of life offered by high-level design architecture.Save this picture!© Cèsar BèjarSave this picture!02 LevelSave this picture!© Cèsar BèjarThe project is located in a private residential subdivision, mainly for medium-high level single-family houses. The master plan considers departmental lots of high density within the condominium with access to all its infrastructure, security control and common green areas. The economic impact has been immediate and very positive judging by the increase in the surplus-value of the properties within the residential condominium as a whole and the immediate increase in surplus-value in the multifamily building itself.Save this picture!© Cèsar BèjarThe social impact is also clear and has a positive role: a large sector of the middle/upper-middle-class population has had the opportunity to access two-bedroom apartments (ideal for young families, single senior citizens and foreigners, or for rent to students or professionals who temporarily move to Cancun), in conditions of safety and quality of life at a costs and purchase conditions below the average market prices.Save this picture!© Cèsar BèjarSave this picture!© Cèsar Bèjar Architects: Live Desarrollos, reyes ríos + larraín arquitectos Area Area of this architecture project ArchDaily Photographs CopyApartments•Cancún, Mexico 2018 Mexico Area: 1046 m² Year Completion year of this architecture project CopyAbout this officereyes ríos + larraín arquitectosOfficeFollowLive DesarrollosOfficeFollow#TagsProjectsBuilt ProjectsSelected ProjectsResidential ArchitectureHousingApartmentsCancúnOn FacebookMexicoPublished on May 13, 2020Cite: “Eugenia Wow Condos / Live Desarrollos + reyes ríos + larraín arquitectos” [Eugenia WowCondos / Live Desarrollos + reyes ríos + larraín arquitectos] 13 May 2020. ArchDaily. Accessed 10 Jun 2021.
Howard Lake | 2 March 2005 | News The National Council for Voluntary Organisations (NCVO) is not optimistic that the Charities Bill will make it onto the statute books this year.NCVO Chief Executive Stuart Etherington said: “It is disappointing and frustrating that the Charities Bill will almost certainly not make it onto the statute books this year, but this should be seen as delay not defeat. It looks like the voluntary sector will have to wait a bit longer for the much needed reform of its 400 year old law.“Having worked hard on this process for over five years, and more recently with the support of the Coalition for a Charities Act, NCVO will be calling for the re-introduction of the Bill by the next government. We hope that the high levels of cross party support we have already seen for this legislation and the thorough scrutiny it has already been subjected to will allow its rapid progress through the next Parliament.He welcomed the constructive support from Government, Conservative and Liberal Democrat front benches on the Committee Stage of the Bill. However, he felt that “the length of time spent by the House of Lords scrutinising a Bill that has already been subject to extensive consultation and pre-legislative scrutiny, in combination with the impending General Election, has been the Charities Bill’s undoing”.He added that “With fifteen months passing between the publication of the Strategy Unit’s report on charity law reform in 2002 and the announcement of the draft bill in the Queen’s Speech in November 2003, NCVO knew then that time would be tight. This was not helped by delays in the publication of both the draft bill and the Bill itself.”NCVO was putting its faith in its Election Manifesto, launched in February, which calls on parliamentary candidates and the next government to support the introduction of the Charities Bill in the first Queen’s Speech following the election if it fails to make it onto the statute books this year.www.ncvo-vol.org.uk Tagged with: Law / policy NCVO Charities Act unlikely to make it onto statute books in 2005, says NCVO AddThis Sharing ButtonsShare to TwitterTwitterShare to FacebookFacebookShare to LinkedInLinkedInShare to EmailEmailShare to WhatsAppWhatsAppShare to MessengerMessengerShare to MoreAddThis 34 total views, 1 views today AddThis Sharing ButtonsShare to TwitterTwitterShare to FacebookFacebookShare to LinkedInLinkedInShare to EmailEmailShare to WhatsAppWhatsAppShare to MessengerMessengerShare to MoreAddThis About Howard Lake Howard Lake is a digital fundraising entrepreneur. Publisher of UK Fundraising, the world’s first web resource for professional fundraisers, since 1994. Trainer and consultant in digital fundraising. Founder of Fundraising Camp and co-founder of GoodJobs.org.uk. Researching massive growth in giving.
Tagged with: Digital Giving/Philanthropy Recruitment / people Each text costs £1.50 with proceeds going into a central pot which the winning guru will be able to donate to one of the 1,000 charities that use Justgiving.com.The money available will be the cost of donations minus charges applied by mobile operators. 27 total views, 1 views today AddThis Sharing ButtonsShare to TwitterTwitterShare to FacebookFacebookShare to LinkedInLinkedInShare to EmailEmailShare to WhatsAppWhatsAppShare to MessengerMessengerShare to MoreAddThis Vote for your favourite fundraising guru by text AddThis Sharing ButtonsShare to TwitterTwitterShare to FacebookFacebookShare to LinkedInLinkedInShare to EmailEmailShare to WhatsAppWhatsAppShare to MessengerMessengerShare to MoreAddThis Howard Lake | 10 July 2005 | News Professional Fundraising magazine together with Justgiving have set up the Guru House, a humorous take on Big Brother, to see who is the most popular fundraising “guru”. Proceeds will be donated to charity.Gurus on the list are Steve Andrews, Simon Burne, Ken Burnett, Stephen Butler, Alan Clayton, Tony Elischer, Paul Farthing, Neil Henderson, Stephen Pidgeon and Bernard Ross.The relevant numbers to call were published in today’s Convention Daily, published by Professional Fundraising at the Institute of Fundraising’s National Convention in London. Advertisement About Howard Lake Howard Lake is a digital fundraising entrepreneur. Publisher of UK Fundraising, the world’s first web resource for professional fundraisers, since 1994. Trainer and consultant in digital fundraising. Founder of Fundraising Camp and co-founder of GoodJobs.org.uk. Researching massive growth in giving.
Reporters Without Borders (RSF) condemns the latest Taliban threat against the media in Afghanistan. Receive email alerts “We once again warn all parties to the conflict, both state and non-state actors, and remind them of their obligations as regards the protection of journalists,” said Reza Moini, the head of RSF’s Afghanistan desk. “Attacks on civilian targets, including media and journalists, constitute war crimes. We will hold Taliban delegations abroad, including their office in Doha, to account for every Taliban attack on journalists and media.” AfghanistanAsia – Pacific Media independence Armed conflictsPredatorsViolenceJihadism RSF_en AfghanistanAsia – Pacific Media independence Armed conflictsPredatorsViolenceJihadism Situation getting more critical for Afghan women journalists, report says News News Afghanistan is ranked 118th out of 180 countries in RSF’s 2018 World Press Freedom Index. According to RSF’s tally, a total of 36 journalists and media workers have been killed in Afghanistan since the start of 2016 in attacks by the Taliban and Islamic State (Daesh), the country two leading press freedom predators. This is not the first Taliban threat against the media. In a communiqué issued on 12 October 2015, they described Afghanistan’s two biggest privately-owned TV stations, Tolo TV and TV1, as “military targets.” The “consequence” came on 20 January 2016 in the form of the suicide bombing of a Kabura production company bus that killed seven Moby Group employees who worked at Tolo TV. RSF regards the Taliban as enemies of the press. Their goal is to create news and information black holes, and they have done this in the areas they control. Help by sharing this information June 20, 2018 New Taliban threat against Afghan media News to go further March 11, 2021 Find out more RSF asks International Criminal Court to investigate murders of journalists in Afghanistan Organisation News May 3, 2021 Find out more Follow the news on Afghanistan A communiqué was issued after the bombing of “voice of Sharia,” a Taliban propaganda outlet in the central province of Ghazni, by US-led coalition aircraft on 10 June: “Media financed by the occupiers will pay the consequences of the incorrect behaviour towards the Mujahedeen (Taliban) if it does not stop quickly,” the communiqué posted on the Taliban website on 12 June said. Afghanistan : “No just and lasting peace in Afghanistan without guarantees for press freedom” June 2, 2021 Find out more
Sears logo MIDLAND Sears Holdings has announced via a news release that it will be closing its Sears store location in Midland later this year.The location in Midland will be closing in early April and is one of 39 set to close, according to the news release.The Sears Auto Center is scheduled to close in early January.Sears Holdings closed the Odessa store last year and it is now the At Home store. Facebook Facebook WhatsApp Sears store in Midland to close year after Odessa location Local NewsBusiness WhatsApp Pinterest Previous articleI-20 passing lanes to be closed overnightNext articleOdessa teen honored for volunteer work admin Twitter Twitter By admin – January 4, 2018 Pinterest
Twitter Man in court charged with theft of musical equipment WhatsApp A 21-year-old man has appeared at Derry Magistrates court charged with a total of 20 offences including handling a stolen guitar that once belonged to murder victim Jim Gilchrist.Joseph Patrick McMullan, of no fixed abode, is accused of handling a stolen van, the stolen guitar as well as a series of road traffic offences and assaulting police officers which were said to have occurred in Derry and Strabane on Monday morning.In 2005 Jim Gilchrist was assaulted and murdered and his body dumped in the River Foyle.McMullan is due in court again next month. Twitter Google+ Pinterest Dail hears questions over design, funding and operation of Mica redress scheme Facebook PSNI and Gardai urged to investigate Adams’ claims he sheltered on-the-run suspect in Donegal Newsx Adverts By News Highland – January 25, 2011 Previous articleMary from Dungloe festival in JeopardyNext articleTwo people arrest in relation to Kieran Doherty murder News Highland WhatsApp Man arrested on suspicion of drugs and criminal property offences in Derry Dail to vote later on extending emergency Covid powers Google+ Man arrested in Derry on suspicion of drugs and criminal property offences released RELATED ARTICLESMORE FROM AUTHOR HSE warns of ‘widespread cancellations’ of appointments next week Facebook Pinterest
Previous Article Next Article Related posts: In safe hands?On 5 Feb 2002 in Military, Personnel Today The security of data systems should be a top priority fororganisations, in particular HR, writes Keith Rodgers. After all, there is alot at stake – not least, corporate integrityWhen a large financial company decided to roll out an employee portal forthe first time, it expected a certain amount of resistance from its workforce.Not everyone, after all, immediately takes a shine to the concept ofself-service HR. What it didn’t anticipate, however, was a blanket refusal from an entiresection of its IT department to participate in the initiative. Fearing theportal would expose personal data to both internal and external hackers, thecompany’s security experts refused to enter information into the portal untilthey had put the system through an exhaustive testing programme. Although their concerns were dealt with well before they were publicisedaround the company, the events illustrate the far-reaching implications of HRsystem security. The direct impact of breaches can be huge – unauthorisedaccess by external hackers or disgruntled employees can have major legal,public relations and regulatory repercussions, as well as undermining theintegrity of data and damaging electronic systems. But the indirect implications can also be costly. Loss of confidence in ITsecurity – even when it hasn’t been compromised – can jeopardise majorstrategic initiatives like self-service. Fuelled by fears of cyber-terrorismand ‘denial of service’ attacks that took out high-profile websites, thesekinds of security issues are rapidly climbing the corporate agenda. The growingadoption of internet-based HR technology, offering wider accessibility tocorporate information, has caused companies to question existing procedures andre-examine the integrity of their IT infrastructure. And software vendors aretaking note. At the start of the year, hard on the heels of negative publicity about thestability of its software and the privacy implications of one of its Netinitiatives, Microsoft chairman Bill Gates told employees security was a toppriority for the firm. But the problem facing most users is that IT budgets – already under severestrain – rarely accommodate major expenditure on security measures. Securing HRdata is a business priority, but companies are having to take a pragmatic viewof where and how to invest. As Mark Frear, head of enterprise portals at SAPUK, says: “Security must be commensurate with the risk.” Building a security strategy encompasses a range of technology, businessprocess and planning elements. Vendors and consultants alike stress that thestarting point for any initiative should be to draft a corporate policy – anobvious move in theory, but one that few organisations carry out in practice.As Simon Owen, partner in Andersen’s technology risk department, points out,organisations need to build a practical set of procedures and guidelinesspelling out their security policy. Templates are available on the Web, but it is important to ensure thedocuments are usable – not so unwieldy that end-users are put off from openingthem. High on the list of priorities is to establish levels of responsibilityand lines of communication. Andersen argues that overall responsibility forsecurity should be held at senior level, possibly a board member or the head ofIT, with duties delegated. Sensitivity test From HR’s perspective, the main concern is to establish which data is themost sensitive. “The danger with security is that you take the paranoidapproach – everything must be screwed down,” says Owen. “Someone inHR needs to do that – to work out what they care about – before they write outa large cheque for expensive security.” Personal payroll data, for example, is clearly highly sensitive, whileinformation on corporate salary scales is important, but less sensitive givenemployees can work out the guidelines by comparing notes. As well as preventative measures to guard critical data, a company’s actionplan should spell out the procedures when security is breached. That processcan be more complex than organisations first realise and requires input fromdepartments across the company, including media relations (in case the storyleaks), the legal department (to understand the company’s liability and toestablish what action to take if the intruder is identified) finance, IT,marketing and, of course, HR. Organisations that have suffered security breaches testify to the fact thatdefining responsibilities prior to the event makes a huge difference. Itensures that they have the resources at hand to weigh up the damage, prevent arecurrence and handle the technical and organisational fallout. Mike Richards, CEO of Snowdrop Systems, argues that security policyultimately ends up as a cost/benefit exercise – weighing up the costs ofsecurity, breaches, and data loss. These costs come in numerous forms,including the direct damage to the business or its reputation (particularly insecurity-conscious industries such as banking) and the potential impact onstaff morale. “To achieve a practical outcome it’s necessary to adopt a basicprinciple: that perfect security is not achievable in any environment,”Richards says. “What is important is to understand the risks and remediesand to take action appropriate to the situation. Even the Pentagon is hackedregularly, but the risks are controlled.” Most significantly, organisations need to recognise there is a balancing actbetween availability of information – either internally over an intranet or forexternal access – and security requirements. Defensive devices While operating system and network security are typically the domain of theIT department, HR should be heavily involved in defining application anddatabase security procedures. The building blocks for a comprehensive strategyfall into four core categories – authentication, encryption, firewall defencesand auditing. Authentication For most organisations, the authentication layer isrelatively straightforward, based around a user ID and recognised passwordsystem. Given that most IDs are easy to work out and passwords oftenunimaginative, however, some companies require higher levels of accesssecurity. Challenge Response Mechanisms, for example, generates an eight-digitnumber when users log in. The user enters the number into a pre-programmed‘calculator’, protected by a PIN, which generates a corresponding code that iskeyed back into the system. Other security devices tie users to certainconsoles, only allowing access to named individuals from named machines – auseful device if specialist access is required for an office-bound employee inareas such as HR or finance. Once identity is established, most HR software systems provide thefunctionality to tie the user to specific access privileges, depending on theirrole, function, seniority or geography. Historically, as SAP’s Frear pointsout, HR departments relied on e-mailing IT to request changes to privileges asindividuals shifted jobs or left the company. That process, which was prone tohuman error and time delays, has now been automated. The SAP system links security levels to an organisational chart, whichautomatically modifies privileges when HR staff enter personnel and contractorchanges. Lawson Software has a similar rules- and role-based system whichallows companies to build employee groups with specific access privileges. Ifan employee’s status shifts – for example, they go part-time and lose theirentitlement to certain benefits – they no longer match the group criteria andare denied access to the appropriate data. Encryption The second layer of defence, encryption ensures theconfidentiality of data as it passes through the system – an issue that growsin importance as organisations send more HTML-based data to employee Webbrowsers. Application vendors have adopted several encryption technologies,including Secure Sockets Layer (SSL), a ‘scrambling’ device used in an enhancedform for credit-card transactions on many consumer websites. The basic form of SSL – 40-bit encryption – can be cracked by moreexperienced hackers, but it still serves a useful purpose for many companies:organisations need to ask how far hackers will bother to go to find out basicHR information. Most vendors also offer links to specialist encryption enginesfor higher-security environments. Firewall Built to protect core servers and one of the prime targetsof professional hackers, firewalls have typically been viewed as the domain ofIT, but in reality their construction also requires input from HR. For manyorganisations, this is the Achilles heel. Andersen, which carries out ‘ethicalhacking’ to assess the security of clients’ systems, is successful in 90 percent of its attempts to penetrate systems – primarily because the firewall haseither not been configured properly to meet the organisation’s needs, or theconfiguration was out of date. Built on business rules that determine whattraffic is allowed through, the firewall needs to be constantly adjusted as newinformation comes into the public domain about security lapses in specificproducts – not least because that information is seized upon by hackers. “The IT department needs to know how to configure the firewall, and thebusiness needs to work out what it will allow through,” says Owen.”So HR and IT need a coordinated approach. And you have got to keepabreast [of new security weaknesses] and react accordingly.” Owen suggestsone inexpensive way organisations can test their security is to simply try tohack into the firewall themselves. Audit The final major piece of the security puzzle, the audit, is amonitoring process that tracks access to data and is critical to establishingongoing security and the extent of any breach of the system. Owen says one of the most expensive elements in the security process is theresource required to find out what went on when unauthorised access took place.Monitoring tools can also help organisations restore data after the event. SAP,for example, allows users to configure their auditing software to triggerspecific events seen as critical by the organisation. In military applications,that process extends as far as monitoring whether information has been viewed,not merely whether it has been altered. But for most commercial organisationsit is changes to records that will trigger most alarms. While these technical measures provide the security framework at systemlevel, the elements are only relevant if they are part of a broaderorganisational security policy. Much of that is common sense – ensuring, forexample, that individuals who make changes to payroll systems cannot trigger apay run without a managerial check-off. Much, too, is about disasterpreparedness. Del Dehn, technology product marketing manager at Lawson in theUS, argues that data storage and data management strategies are key toresolving a catastrophic security failure, allowing organisations to revert tosaved data if systems are violated. Again, regular testing is critical – muchof an organisation’s ability to recover from intrusion rests on the actions ittakes in advance to mitigate against damage. Perceived threats Just how great the threat is to HR systems is a matter of some debate. Manyvendors concede that the dangers are sometimes blown out of proportion, notjust by the software community but by users themselves. As Richards at Snowdropcomments: “Organisations are inclined to overstate how interesting theirdata is – the average HR database is not of great interest to techiehackers.” For that reason, many observers believe the biggest threatsremain ‘denial of service’ attacks and viruses. Both can be headed off to adegree by Web tools, and while security breaches in confidential areas such aspayroll may be a worry, the biggest issue most organisations face is thefailure of end-users to roll out virus-screening applications. While the emergence of employee self-service has raised fears aboutsecurity, in many respects they too are overstated. Richards suggests aWeb-based employee portal may well be more secure than a PC-based system, ifonly because the obvious threats to data integrity will have forcedorganisations to address security issues they might otherwise have ignored.Likewise, Diana Van Blaricom, international HR product manager at Lawson,argues that self-service systems are more secure than telephone-based interactivevoice response (IVR) mechanisms, where passers-by can watch numbers beingentered and employees can hear conversations, or an office’s internal mailsystem. That said, Andersen says the percentage of external security breaches,compared to internal, has risen from 20 per cent five years ago to 40 per centtoday. Meanwhile, Datasec, a UK-based computer forensic investigation firm,argues that while the greatest perceived threat to companies is cybercrime,employees remain the highest risk. Whatever the real threat today, the dangers are set to increase. As CateQuirk, analyst at AMR research, points out, security will become ever morepressing as organisations seek to collaborate with external partners, gainingaccess to their system, partners, suppliers and customers. In practical terms, companies need to assess for themselves where thebiggest threats are and address them as top priority. “Organisations needto understand that security should be thought of first, not last,” saysQuirk. Features list 2021 – submitting content to Personnel TodayOn this page you will find details of how to submit content to Personnel Today. We do not publish a… Comments are closed.
Brad James September 24, 2019 /Sports News – Local Anderson named player of the week; Badgers hold steady at No. 6 Written by Tags: Central Wyoming/Ellee Anderson/Southern Nevada/SWAC FacebookTwitterLinkedInEmailEPHRAIM, Utah-Snow College volleyball standout, freshman Ellee Anderson has been named the Scenic West Athletic Conference Player of the Week after leading her squad to three wins this past week.The Morgan, Utah native posted 75 assists in this span, averaging 8.3 assists per set. Under Anderson’s direction, the Snow College offense registered a 66.5 side-out percentage through three matches on the week, including a 67.7 side-out percentage against Central Wyoming.Anderson racked up seven more aces this past weekend, adding to her team leading total of 45. Anderson currently ranks fourth nationally in total aces.NATIONAL RANKINGFor the third straight week, the Snow College women’s volleyball team has been ranked No. 6 in the NJCAA Division-I Volleyball Rankings. The Badgers posted three wins this past week, including a 3-0 win over Northwest College and a pair of back-to-back, straight-set victories over Central Wyoming. At 19-2 on the season, the Badgers have won more matches than any team currently ranked in the top-10 of the nation.This week’s national rankings mark the 32nd straight week the Badgers have been ranked in the Top 20.Furthermore, this is the 28th time during that stretch the team has been ranked No. 10 or higher. Snow has won a total of 14 matches in three straight sets, including seven of its last eight matches.Snow College will next travel to Las Vegas to take on Southern Nevada on Saturday, Sept. 28. The Scenic West Conference opener for both teams will begin at 1 p.m. PDT.
70 Bikes Available for Public Use at Seven Locations Across EvansvilleCity officials and representatives from numerous area organizations launched a city-wide bike sharing program today, called Upgrade Bike Share, at a press conference on the University of Evansville campus.Beginning immediately, 70 cruiser bikes are available at seven stations across Evansville for members to use on demand. Anyone over the age of 18 can ride by purchasing a day pass or by enrolling in a monthly or annual membership. Rides for members are free for up to one hour, then three dollars per hour after that.Locations are as follows: University of Evansville campus, North Main Street, West Franklin Street, Downtown YMCA, Downtown Pagoda at the Evansville Convention and Visitor’s Bureau, Haynie’s Corner Arts District, and the Deaconess Sports Park on North Green River Road.Evansville mayor Lloyd Winnecke; University of Evansville president Thomas Kazee; Welborn Baptist CEO and executive director Kevin Bain; Don Jones, Evansville Area Trails Coalition president and UE’s vice president for marketing and communications; Darin Lander, Evansville Area Trails Coalition board member; and Angela Reisetter, Changemaker Challenge Team Coach all addressed the press conference crowd.In attendance were members of the Changemaker Challenge teams from the University of Evansville, Memorial High School, and Central High School. The Changemaker Challenge is dedicated to launching the world’s next wave of social entrepreneurs and innovators. The competition, put on by the Institute for Global Enterprise in Indiana at UE, began at the college level with UE students and was opened up to area high schools last year. The teams from Central and Memorial High Schools both proposed a bike sharing project separately and have since worked together on the project.“The installation and launch of this program marks the culmination of a collaborative effort between an impressive network of individuals committed to the progress of Evansville,” said Winnecke. “High school students, college students, and leaders from city organizations large and small are all on the forefront of making ideas happen, and I continue to be inspired by how great Evansville is and can be.”The Upgrade Bike Share program is fully funded by local sponsors including Deaconess Health System, St. Mary’s Health System, Toyota Motor Manufacturing Indiana, City of Evansville Department of Metropolitan Development, Evansville Convention and Visitors Bureau, Welborn Baptist Foundation, and Meritain Health.A representative from Zagster, the company providing the bike share system, was also in attendance.This initial network of seven stations and 70 bikes is expected to grow in the coming years. To become a member or for more information including a map of the stations, please visit http://bike.zagster.com/upgradeFacebookTwitterCopy LinkEmail