Tag: 南京 桑拿 攻略 体验

Ten South African human rights achievements

first_imgSouth Africa has made some astounding strides in recognising and achieving human rights in the past 23 years. In the run up to Human Rights Day, we look back at some milestones.South Africa is admired around the world for its human rights record. (Image: Flickr, Jeremy Schultz) Shamin ChibbaSince the advent of democracy in South Africa 23 years ago, human rights have played an important role in each of our lives. There have been numerous human rights achievements over the past two decades, the greatest being the Constitution, which was signed into law on 18 December 1996.We present 10 noteworthy feats that changed the country, one of which was the global acknowledgement of South Africa’s sophisticated understanding of human rights.1994: Free health care for pregnant women and children under the age of six is introduced.1995: The death penalty is abolished.Also in 1995: The South African Human Rights Commission is established in October to promote and protect human rights.1998: The government passes the Domestic Violence Act to curb the number of incidents and protect victims.Also in 1998: The government launches the child support grant to help children under the age of seven with R100 a month. Today all children under 18 are included and receive R350 a month.No-fee schools ensure every child has access to basic education, which is a right according to the Constitution. (Image: Shamin Chibba)2006: Same sex marriage is made legal on 30 November.2007: No-fee schools are introduced throughout the country. At the time, 5 million children were set to benefit.Navi Pillay’s appointment as UN High Commissioner for Human Rights was an indication that South Africa is highly regarded for its human rights. (Image: Flickr, Australian Human Rights Commission)2008: South African jurist Navi Pillay begins her term as UN High Commissioner for Human Rights on 1 September, a post she holds for six years. This was an indication that the world acknowledged South Africa’s sophisticated understanding of human rights.2016: NGO Operation Hydrate is established on 4 January to distribute water to drought stricken areas in South Africa. Within three months, the organisation donates 9 million litres of water.Operation Hydrate looks to collect R95-million by Nelson Mandela Day, 18 July 2016. (Image: Operation Hydrate Facebook)Would you like to use this article in your publication or on your website? See Using Brand South Africa material.last_img read more

Continue Reading

Why Verizon Just Spent $130 Billion On … Verizon

first_imgVerizon is laying claim to its name. The US phone company is spending $130 billion to buy the 45 percent of Verizon Wireless it didn’t already own from Vodafone, its longtime British partner.It’s a high price—$59 billion in cash, the rest in stock, and almost as much as Verizon itself is worth. That in itself suggests that the future of telecom is in wireless, since the market doesn’t seem to attribute much value to Verizon’s traditional wired phone business.The Very Local Phone BusinessIt also highlights how, in a rapidly globalizing age, the wireless business remains oddly local. Vodafone ultimately withdrew from the joint venture because Verizon retained control over it. While Vodafone’s been able to spread in Europe and emerging markets, its attempts to go into the United States and Japan foundered. Verizon Wireless threw off a lot of cash for Vodafone, but did little for it strategically.Verizon, meanwhile, gets control over an American wireless business. It is trying to enter the Canadian wireless market, drawing heavy criticism from the established players there.Consumers and developers, meanwhile, care less and less about the brand of the network their apps run on, and more about who makes the phone and who runs the app store. Apple, Samsung, and Nokia run global device businesses from California, South Korea, and Finland. And American companies—Apple, Google, and Microsoft—run the marketplaces that let app developers set up shop instantly in dozens of countries at once.Single-country telecom businesses, the legacies of monopolies either heavily regulated or owned by national governments, seem archaic in this context.Stop Branding, Start BuildingBut we still need telecommunications infrastructure. Every wireless connection must hit the wires at some point; the legacy fiber-optic backbones of AT&T, Sprint, and Verizon, once meant to link phones plugged into walls with copper lines, turn out to be very good at carrying wireless traffic, too. And the wireless data they transmit is increasingly just more bits in the sea of Internet traffic.To the extent that they must remain local, Verizon and the other legacy carriers should keep building on this infrastructure to accommodate the ever-growing demand for data. That should be their presence in the marketplace: the strength, resilience, and reliability of their network, not the particular lineup of devices they have.A particularly silly practice that they should end is the branding of devices with the carrier’s name. Remember the Verizon Droid? Incredibly, Motorola still plays along and makes these smartphones for Verizon. Do you buy the new Moto X or the Verizon Droid Maxx? Well, if you think Verizon is great at picking smartphone software for you, you might opt for the latter. Otherwise, there’s not much difference.All-In On The InternetThe consolidation of Verizon and Verizon Wireless should help with another move Verizon has been making: Replacing copper lines with wireless connections. In developing countries, the ability to leapfrog to high-speed wireless broadband, skipping old copper infrastructure, is seen as a positive. But in the United States, Verizon’s plans to abandon its old wired networks in some areas have proven controversial—particularly in Fire Island, New York, where Verizon is opting not to replace hurricane-damaged wiring.The universality of the old Bell network was a great thing in the 20th century. But in the 21st century, data wants to be fast, wireless, and ubiquitous, and it’s hard to see how copper fits.Verizon will be cash-constrained for a while as it pays down debt from buying out Vodafone. Something will likely have to go—and it’s likely copper lines. Good riddance.Photo by Shutterstock A Web Developer’s New Best Friend is the AI Wai… Top Reasons to Go With Managed WordPress Hosting owen thomas 8 Best WordPress Hosting Solutions on the Marketcenter_img Related Posts Why Tech Companies Need Simpler Terms of Servic… Tags:#acquisitions#Deals#verizon#Verizon Wireless#Vodafone#wireless#wireless carriers last_img read more

Continue Reading

These Are The Concerns Slowly Killing Ad-Tech

first_imgTime your ads: Since bot fraud is more active during specific times of the day, timing your ads properly can help to avoid the bulk of fraudulent traffic. Yoav Vilner Tags:#adtech#Trending View your site in incognito mode: This allows you to view how your website is displayed to the general public. You’ll also be able to see any sites which have stolen your domain, or ads which may have been injected.In addition to the previously mentioned action items, it’s also best to consider going with networks with a brand safety department which keeps media, programmatic and direct publishers clean and safe. Typically these networks have the technology to detect, monitor, and exclude invalid traffic. Additionally reputable companies have different categories for brand safety (adult and nudity, file sharing and illegal content, etc).An ongoing battleIn order to make sense of the continuously evolving landscape, it’s crucial to keep an eye out on industry trends so you always have a handle on where things are headed.While it’s impossible to fully eliminate ad fraud, the damages can be minimized by following industry best practices while also trusting your instincts when it comes to dealing with publishers and other entities. Related Posts Leveraging Big Data that Data Websites Should T… “Marketer to Watch” (Forbes). “Industry leader” (SAP). “Top 100 FinTech Influencer” . Tech blogger with exposure to millions. Advising startups across Europe, NYC, and Tel Aviv. center_img Constantly assess your traffic: Always review your campaigns in order to monitor where the best clicks come from, and adjust your campaigns accordingly. Internet of Things Makes it Easier to Steal You… How Data Analytics Can Save Lives AI: How it’s Impacting Surveillance Data Storage Black Mirror, recently bought by Netflix, is a hugely popular TV series that is a dark, twisted but spot-on portrayal of the possible ramifications of technology in the future. Advertisements for the show are ironically targeting ad block users, and some argue, are “intentionally creepy.” For better or worse, ad tech is an industry that somehow finds itself embroiled in controversy. Ad blocking was the controversy du jour, until recently when ad blocking rates have leveled out or even dropped. Ad tech’s explosion in recent years, due to the overwhelming user demand for free digital content, has caused the mighty backlash of ad blocking.Ad tech executives are finally taking a breath after ad blocking has stabilized, yet another monster (or two) have been slowly eating away at the industry: ad fraud and transparency issues.The International Advertising Bureau (IAB) estimates the economic cost of ad fraud to be around $8.2 billion annually. Most of this fraud comes from non-human traffic, which if eliminated would save more than $4 billion annually. A lack of transparencyToday, the ad tech industry is best described as being like the mortgage industry during the subprime days. Advertisers are spending money for short term goals, while not paying attention to whether they’re getting real long term value. A lack of transparency has enabled fraudsters to build companies based on sales teams, rather than actual technology. According to the Wall Street Journal, the Association of National Advertisers found that in 2015, between 3% to 37% of ad impressions were driven by bots, whereas in the previous study bot traffic ranged from 2% to 22%.Legitimate ad tech businesses meet a set of proven criteria. They gain their competitive advantages from one of three areas: they own or enable unique supply, have unique data, or own the advertiser relationships.On the other hand, fraudulent companies rely on arbitrage, and rent the traffic rather than owning it. Other cases involve compromising the user experience.Common ad fraud threatsModern ad fraud has evolved significantly from the days of click fraud where advertisers had to deal with fake clicks on their ad campaigns. Today, there’s a variety of technical exploits marketing professionals need to keep an eye on.Pixel stuffing and ad stackingPixel stacking occurs when ads are placed into tiny 1×1 pixels, making them virtually impossible to see. Despite this, when the page is loaded, the session counts as an impression. Ad stacking is fairly similar in that it involves ads being placed over each other so that while only one is seen, impressions still register for both ads.Ad injectionAd injection comes in a few different forms. Ads can be placed on top of existing ads (causing ad stacking), or they can completely replace existing ads. The most common form of ad injection is a fake warning telling the user their computer is infected with a virus or that their PC performance isn’t up to par.Domain launderingThis is when fraudsters take a low quality domain and make it look like it’s actually a more reputable publisher. When advertisers recognize the name, they’ll pay a premium. In addition to costing advertisers money, this threat also potentially leads to questionable ad placements which can harm the advertiser’s reputation.Best practices for preventionEven though automated systems are rapidly evolving to combat ad fraud, that doesn’t mean you can sit back and let technology solve the problem. Below are a few best practices you can follow to ensure ad fraud doesn’t harm your company.Request transparency from your publishers: Simply asking your publishers where their traffic originates from can significantly help to reduce fraud. If they aren’t straightforward with you, then that’s a potential red flag.last_img read more

Continue Reading