cons

DPH Reports Zero Cases of High Blood Lead Levels in Children Consuming Recalled Cinnamon Applesauce Pouches

The Food and Drug Administration (FDA) has received reports from multiple states that suggest children may have higher blood lead levels (BLLs) after consuming recalled cinnamon-containing applesauce products. The Delaware Division of Public Health (DPH) has received no reports of children with high BLLs in response to the recall of cinnamon-containing applesauce products. Signs and […]



  • Delaware Health and Social Services
  • Division of Public Health

cons

Delaware Cancer Consortium Hosts 2024 Biennial Retreat

On April 9, 150 Delaware Cancer Consortium (DCC) members gathered for their 2024 retreat for presentations by prominent local and national speakers, including four cancer survivors who shared their diagnosis, care, and experience living with cancer. The theme was Vision. Purpose. Action. Coming Together to Eliminate Cancer Disparities, aligning with DCC’s goal to implement culturally inclusive initiatives […]



  • Delaware Health and Social Services
  • Division of Public Health
  • News
  • Bureau of Cancer Prevention and Control
  • Cancer Control Month
  • Delaware Cancer Consortium
  • Delaware Cancer Registry
  • Delaware Cancer Treatment Program
  • Governor John Carney
  • Lieutenant Governor Bethany Hall-Long
  • Minority Cancer Awareness Month

cons

Electronic Speed Safety Program to Begin in I-95 Restore the Corridor Construction Zone

The Delaware Department of Transportation (DelDOT) in partnership with the Delaware State Police announce that beginning Monday, January 17, 2022, the pilot Electronic Speed Safety Program will be active only in the I-95 construction zone in Wilmington and will last until the end of the project. The goal of the pilot program is to reduce […]




cons

Electronic Speed Safety Program in I-95 Restore the Corridor Construction Zone to Begin Issuing Violations

The Delaware Department of Transportation (DelDOT) in partnership with the Delaware State Police announce the warning period for the Electronic Speed Safety Program in the I-95 construction zone in Wilmington ends on Sunday, April 17, 2022. Beginning Monday, April 18, 2022, first-time offenders will receive a warning and all subsequent violations will result in a […]




cons

In Another Likely Consequence of Pandemic, Delaware Overdose Deaths Increase 15% in 2021

Division of Forensic Science Annual Report Finds Fentanyl Still Involved in More Than 80% of Deaths; Cocaine Link on the Rise NEW CASTLE (May 24, 2022) – In what health officials fear is another consequence of the uncertainty associated with the COVID-19 pandemic, Delaware’s overdose deaths increased more than 15% in 2021 to a record […]



  • Delaware Health and Social Services
  • Department of Safety and Homeland Security
  • Division of Public Health
  • Division of Substance Abuse and Mental Health
  • News
  • Addiction
  • Delaware Hope Line
  • DHSS Secretary Molly Magarik
  • HelpIsHere
  • substance use disorder

cons

DNREC and Kent Conservation District Announce Fall Cover Crop Cost Share Sign-Up Period Through Aug. 30

The annual sign-up period for the Kent Conservation District’s popular Cover Crop Cost-Share Program – funded in part by DNREC – has opened and runs through Aug. 30. The program helps Kent County farmers offset seed, labor, and equipment costs when planting fall cover crops that help protect local water quality, build healthy soils, and capture carbon from the atmosphere.



  • Department of Agriculture
  • Department of Natural Resources and Environmental Control
  • Division of Watershed Stewardship
  • News
  • Aug. 30 application deadline
  • Chesapeake Bay Implementation Grant
  • Clean Water Act Section 319 grant
  • Cover crop cost share program
  • environmental benefits
  • fall planting
  • Kent Conservation District
  • seed
  • seed labor and equipment costs offset

cons

Electronic Speed Safety Program to begin in I-95/Route 896 Construction Zone

The Delaware Department of Transportation (DelDOT) in partnership with the Delaware State Police announce that beginning Monday, July 8, 2024, the Electronic Speed Safety Program (ESSP) will be active in the I-95/Route 896 construction zone in Newark and will last until the end of the project.



  • Department of Safety and Homeland Security
  • Department of Transportation
  • New Castle County
  • News
  • Office of Highway Safety
  • DelDOT
  • DelDOT -- News
  • ESSP
  • I-95
  • Newark

cons

Smyrna future educators bring home second consecutive national win

Smyrna High School was named the national champion at this year’s Educators Rising conference – the second consecutive national win and the first time any team has won two years in a row.




cons

Navarro Announces Eighth Consecutive Workers’ Comp Rate Decrease

Additionally, Workplace Safety Program eligibility changes will help more companies stay safe and save money Insurance Commissioner Trinidad Navarro announced today that workers’ compensation insurance rates will decrease for the eighth year in a row, effective December 1. The voluntary market is expected to decrease average loss costs by 8.4%, and the residual market will […]




cons

Delaware Faces Dry Conditions: Open Burning Ban Issued, Water Conservation Urged

Delaware is experiencing dry conditions with an open burning ban in effect.



  • Department of Agriculture
  • Department of Natural Resources and Environmental Control
  • Division of Air Quality
  • Division of Climate
  • Coastal and Energy
  • Division of Fish and Wildlife
  • Division of Parks and Recreation
  • Division of Waste and Hazardous Substances
  • Division of Water
  • drought
  • open burn ban
  • water conservation

cons

Exciting possibilities with text mining for consumer protection

It is increasingly possible to use text analytics to explore different types of data. When a news story this summer caught my eye, I decided to see if I could use SAS Visual Text Analytics (VTA) and SAS Visual Analytics (VA) on customer complaints to provide information that might be [...]

The post Exciting possibilities with text mining for consumer protection appeared first on Government Data Connection.




cons

Microsoft Xbox One S 500GB Console White Review

Read the in depth Review of Microsoft Xbox One S 500GB Console White Gaming. Know detailed info about Microsoft Xbox One S 500GB Console White configuration, design and performance quality along with pros & cons, Digit rating, verdict based on user opinions/feedback.





cons

AG Noorani, Noted Constitutional Expert, Lawyer, Author And More

Abdul Ghafoor Noorani, eminent constitutional expert, lawyer and author, died today at the age of 93. A noted scholar on Jammu and Kashmir, his absence is being felt in the Union Territory, where many are mourning him.




cons

Constitutional Court Shutdown Over Water Cuts Is an Embarrassing Low-Point for Collapsing Joburg Metro

[DA] It is a national embarrassment that the inability of the City of Johannesburg to supply water to its residents, business and public sector offices, has now led to the shutdown of operations at the Constitutional Court, on Constitution Hill in Braamfontein.




cons

Destructive form of "cons" - efficiently prepending an item to a procedure's argument which is a list

Hello,

I was looking to destructively and efficiently modify a list that was passed in as an argument to a procedure, by prepending an item to the list.

I noticed that cons lets you do this efficiently, but the operation is non-destructive. Hence this wouldn't work if you are trying to modify a function's list parameter in place.

Here is an example of trying to add "0" to the front of a list:

procedure( attempt_to_prepend_list(l elem)
    l = cons(elem l)
)
a = list(1 2 3)
==> (1 2 3)
attempt_to_prepend_list(a 0)
==> (0 1 2 3)
a
==> (1 2 3)
As we can see, the original list is not prepended.
Here is a function though which achieves the desired result while being efficient. Namely, the following function does not create any new lists and only uses fast methods like cons, rplacd, and rplaca
procedure( prepend_list(l elem)
    ; cons(car(l) cdr(l)) results in a new list with the car(l) duplicated
    ; we then replace the cdr of l so that we are now pointing to this new list
    rplacd(l cons(car(l) cdr(l)))

    ; we replace the previously duplicated car(l) with the element we want
    rplaca(l elem)
)
a = list(1 2 3)
==> (1 2 3)
prepend_list(a 0)
==> (0 1 2 3)
a
==> (0 1 2 3)
This works for me, but I find it surprising there is no built-in function to do this. Am I perhaps overlooking something in the documentation? I know that tconc is an efficient and destructive way to append items to the end of a list, but there isn't an equivalent for the front of the list?




cons

Constraining some nets to route through a specific metal layer, and changing some pin/cell placements and wire directions in Cadence Innovus.

Hello All:

I am looking for help on the following, as I am new to Cadence tools [I have to use Cadence Innovus for Physical Design after Logic Synthesis using Synopsys Design Compiler, using Nangate 45 nm Open Cell Library]: while using Cadence Innovus, I would need to select a few specific nets to be routed through a specific metal layer. How can I do this on Innovus [are there any command(s)]? Also, would writing and sourcing a .tcl script [containing the command(s)] on the Innovus terminal after the Placement Stage of Physical Design be fine for this?

Secondly, is there a way in Innovus to manipulate layout components, such as changing some pin placements, wire directions (say for example, wire direction changed to facing east from west, etc.) or moving specific closely placed cells around (without violating timing constraints of course) using any command(s)/.tcl script? If so, would pin placement changes and constraining some closely placed cells to be moved apart be done after Floorplanning/Powerplanning (that is, prior to Placement) and the wire direction changes be done after Routing? 

While making the necessary changes, could I use the usual Innovus commands to perform Physical Design of the remaining nets/wires/pins/cells, etc., or would anything need modification for the remaining components as well?

I would finally need to dump the entire design containing all of this in a .def file.

I tried looking up but could only find matter on Virtuoso and SKILL scripting, but I'd be using Innovus GUI/terminal with Nangate 45 nm Open Cell Library. I know this is a lot, but I would greatly appreciate your help. Thanks in advance.

Riya




cons

Quest for Bugs – The Constrained-Random Predicament

Optimize Regression Suite, Accelerate Coverage Closure, and Increase hit count of rare bins using Xcelium Machine Learning. It is easy to use and has no learning curve for existing Xcelium customers. Xcelium Machine Learning Technology helps you discover hidden bugs when used early in your design verification cycle.(read more)




cons

Randomization considerations for PCIe Integrity and Data Encryption Verification Challenges

Peripheral Component Interconnect Express (PCIe) is a high-speed interface standard widely used for connecting processors, memory, and peripherals. With the increasing reliance on PCIe to handle sensitive data and critical high-speed data transfer, ensuring data integrity and encryption during verification is the most essential goal. As we know, in the field of verification, randomization is a key technique that drives robust PCIe verification. It introduces unpredictability to simulate real-world conditions and uncover hidden bugs from the design. This blog examines the significance of randomization in PCIe IDE verification, focusing on how it ensures data integrity and encryption reliability, while also highlighting the unique challenges it presents. For more relevant details and understanding on PCIe IDE you can refer to Introducing PCIe's Integrity and Data Encryption Feature . The Importance of Data Integrity and Data Encryption in PCIe Devices Data Integrity : Ensures that the transmitted data arrives unchanged from source to destination. Even minor corruption in data packets can compromise system reliability, making integrity a critical aspect of PCIe verification. Data Encryption : Protects sensitive data from unauthorized access during transmission. Encryption in PCIe follows a standard to secure information while operating at high speeds. Maintaining both data integrity and data encryption at PCIe’s high-speed data transfer rate of 64GT/s in PCIe 6.0 and 128GT/s in PCIe 7.0 is essential for all end point devices. However, validating these mechanisms requires comprehensive testing and verification methodologies, which is where randomization plays a very crucial role. You can refer to Why IDE Security Technology for PCIe and CXL? for more details on this. Randomization in PCIe Verification Randomization refers to the generation of test scenarios with unpredictable inputs and conditions to expose corner cases. In PCIe verification, this technique helps us to ensure that all possible behaviors are tested, including rare or unexpected situations that could cause data corruption or encryption failures that may cause serious hindrances later. So, for PCIe IDE verification, we are considering the randomization that helps us verify behavior more efficiently. Randomization for Data Integrity Verification Here are some approaches of randomized verifications that mimic real-world traffic conditions, uncovering subtle integrity issues that might not surface in normal verification methods. 1. Randomized Packet Injection: This technique randomized data packets and injected into the communication stream between devices. Here we Inject random, malformed, or out-of-sequence packets into the PCIe link and mix valid and invalid IDE-encrypted packets to check the system’s ability to detect and reject unauthorized or invalid packets. Checking if encryption/decryption occurs correctly across packets. On verifying, we check if the system logs proper errors or alerts when encountering invalid packets. It ensures coverage of different data paths and robust protocol check. This technique helps assess the resilience of the IDE feature in PCIe in below terms: (i) Data corruption: Detecting if the system can maintain data integrity. (ii) Encryption failures: Testing the robustness of the encryption under random data injection. (iii) Packet ordering errors: Ensuring reordering does not affect data delivery. 2. Random Errors and Fault Injection: It involves simulating random bit flips, PCRC errors, or protocol violations to help validate the robustness of error detection and correction mechanisms of PCIe. These techniques help assess how well the PCIe IDE implementation: (i) Detects and responds to unexpected errors. (ii) Maintains secure communication under stress. (iii) Follows the PCIe error recovery and reporting mechanisms (AER – Advanced Error Reporting). (iv) Ensures encryption and decryption states stay synchronized across endpoints. 3. Traffic Pattern Randomization: Randomizing the sequence, size, and timing of data packets helps test how the device maintains data integrity under heavy, unpredictable traffic loads. Randomization for Data Encryption Verification Encryption adds complexity to verification, as encrypted data streams are not readable for traditional checks. Randomization becomes essential to test how encryption behaves under different scenarios. Randomization in data encryption verification ensures that vulnerabilities, such as key reuse or predictable patterns, are identified and mitigated. 1. Random Encryption Keys and Payloads: Randomly varying keys and payloads help validate the correctness of encryption without hardcoding assumptions. This ensures that encryption logic behaves correctly across all possible inputs. 2. Randomized Initialization Vectors (IVs): Many encryption protocols require a unique IV for each transaction. Randomized IVs ensure that encryption does not repeat patterns. To understand the IDE Key management flow, we can follow the below diagram that illustrates a detailed example key programming flow using the IDE_KM protocol. Figure 1: IDE_KM Example As Figure 1 shows, the functionality of the IDE_KM protocol involves Start of IDE_KM Session, Device Capability Discovery, Key Request from the Host, Key Programming to PCIe Device, and Key Acknowledgment. First, the Host starts the IDE_KM session by detecting the presence of the PCIe devices; if the device supports the IDE protocol, the system continues with the key programming process. Then a query occurs to discover the device’s encryption capabilities; it ensures whether the device supports dynamic key updates or static keys. Then the host sends a request to the Key Management Entity to obtain a key suitable for the devices. Once the key is obtained, the host programs the key into the IDE Controller on the PCIe endpoint. Both the host and the device now share the same key to encrypt and authenticate traffic. The device acknowledges that it has received and successfully installed the encryption key and the acknowledgment message is sent back to the host. Once both the host and the PCIe endpoint are configured with the key, a secure communication channel is established. From this point, all data transmitted over the PCIe link is encrypted to maintain confidentiality and integrity. IDE_KM plays a crucial role in distributing keys in a secure manner and maintaining encryption and integrity for PCIe transactions. This key programming flow ensures that a secure communication channel is established between the host and the PCIe device. Hence, the Randomized key approach ensures that the encryption does not repeat patterns. 3. Randomization PHE: Partial Header Encryption (PHE) is an additional mechanism added to Integrity and Data Encryption (IDE) in PCIe 6.0. PHE validation using a variety of traffic; incorporating randomization in APIs provided for validating PHE feature can add more robust Encryption to the data. Partial Header Encryption in Integrity and Data Encryption for PCIe has more detailed information on this. Figure 2: High-Level Flow for Partial Header Encryption 4. Randomization on IDE Address Association Register values: IDE Address Association Register 1/2/3 are supposed to be configured considering the memory address range of IDE partner ports. The fields of IDE address registers are split multiple values such as Memory Base Lower, Memory Limit Lower, Memory Base Upper, and Memory Limit Upper. IDE implementation can have multiple register blocks considering addresses with 32 or 64, different registers sizes, 0-255 selective streams, 0-15 address blocks, etc. This Randomization verification can help verify all the corner cases. Please refer to Figure 2. Figure 3: IDE Address Association Register 5. Random Faults During Encryption: Injecting random faults (e.g., dropped packets or timing mismatches) ensures the system can handle disruptions and prevent data leakage. Challenges of IDE Randomization and its Solution Randomization introduces a vast number of scenarios, making it computationally intensive to simulate every possibility. Constrained randomization limits random inputs to valid ranges while still covering edge cases. Again, using coverage-driven verification to ensure critical scenarios are tested without excessive redundancy. Verifying encrypted data with random inputs increases complexity. Encryption masks data, making it hard to verify outputs without compromising security. Here we can implement various IDE checks on the IDE callback to analyze encrypted traffic without decrypting it. Randomization can trigger unexpected failures, which are often difficult to reproduce. By using seed-based randomization, a specific seed generates a repeatable random sequence. This helps in reproducing and analyzing the behavior more precisely. Conclusion Randomization is a powerful technique in PCIe verification, ensuring robust validation of both data integrity and data encryption. It helps us to uncover subtle bugs and edge cases that a non-randomized testing might miss. In Cadence PCIe VIP, we support full-fledged IDE Verification with rigorous randomized verification that ensures data integrity. Robust and reliable encryption mechanisms ensure secure and efficient data communication. However, randomization also brings various challenges, and to overcome them we adopt a combination of constrained randomization, seed-based testing, and coverage-driven verification. As PCIe continues to evolve with higher speeds and focuses on high security demands, our Cadence PCIe VIP ensures it is in line with industry demand and verify high-performance systems that safeguard data in real-world environments with excellence. For more information, you can refer to Verification of Integrity and Data Encryption(IDE) for PCIe Devices and Industry's First Adopted VIP for PCIe 7.0 . More Information: For more info on how Cadence PCIe Verification IP and TripleCheck VIP enables users to confidently verify IDE, see our VIP for PCI Express , VIP for Compute Express Link for and TripleCheck for PCI Express For more information on PCIe in general, and on the various PCI standards, see the PCI-SIG website .




cons

Using "add net constraints" command in Conformal

Hi

I have tried using "add net constraints" command to place one-cold constraints on a tristate enable bus. In the command line we need to specify the "net pathname" on which the constraints are to be enforced.

The bus here is 20-bit. How should the net pathname be specified to make this 20-bit bus signals one_hot or one_cold.

The bus was declared as follows:
ten_bus [19:0]

The command I used was

add net constraints one_hot /ren_bus[19]

What would the above command mean?
Should we not specify all the nets' pathnames on the bus?
Is it sufficient to specify the pathname of one net on the bus?
I could not get much info regarding the functionality of this command. I would be obliged if anyone can throw some light.

Thanks
Prasad.


Originally posted in cdnusers.org by anssprasad




cons

Item constraint macro

The following macros encapsulates a design pattern that enables constraining data item fields by 'do' actions of a high level sequence. This can be done without presupposing anything about the sequence tree generated under the do-ing sequence.

The tar file consists of 4 files:
- item_constraint_macro.e - the 'item_constraint' and 'sequence_export' macros definition
- item_constraint_example.e and sequence_export_example.e - use examples (one per each new construct)
- packet_seq.e - an auxiliary definition file for the examples

This topic was discussed in a Club-T presentation (Israel, Sophia-Antipolis, Munich). The presentation is also publicly avaiable.


Originally posted in cdnusers.org by matanvax




cons

BoardSurfers: Managing Design Constraints Efficiently Using Constraint Sets

A constraint is a user-defined property, or a rule, applied to a physical object, such as a net, pin, or via in a design. There are a number of constraints that can be applied to an object based on its type and behavior. For example, you can define t...(read more)




cons

EVM and constellation of mixer

Hello,

I am trying to design an RF mixer for a TX.
Assume my input IF signal is at 1 GHz, my LO at 2 GHz and I want my RF at 3 GHz, and assume that the mixer fully works after testing it with HB.
How to simply set the envelope analysis to check the EVM ?
I read through the documentation but I couldn't get it (I couldn't fully understand the settings of the source, probe, analysis.)
Which source and probe to use? I want custom modulation with custom bandwidth and center frequency.
Is there some examples for the ENVLP analysis ?

I am using IC23.1 and spectre 20.1.354.




cons

How to set thru via hole to thru via hole spacing constraint?

Is there a way to set a thru via hole to thru via hole spacing constraint?

I need the hole to hole spacing, nit pad to pad spacing.

I can calculate the spacing using the via pad diameter, but this won't work for multiple via pad sizes.




cons

AllegroX. ConstraintManager: how to define an exemption inside a SPACING RULE ?

Hi

I have fixed a SPACING RULE (SP1) for a CLASS_DIFF_PAIR whereas for via associated to the net (DP_VIA), the DISTANCE > 60mils respect to ANY other vias (PTH, BB, TEST vias)

Now my problem is that this rules should NOT be applied for GND VIAS (STICHING VIA) which must be placed at a distance < 40mils respect to DP_VIA

How to create an exemption to the SPACING RULE (SP1)?




cons

Covid-19 likely to reverse Middle East consulting gains

Consulting firms in the Middle East are likely to take a hit in 2020 due to the coronavirus, after two strong years.




cons

Grab the Roku Ultra LT for over 50% off and consolidate your streaming apps

The Roku Ultra LT streaming device is $34 at Walmart, down from the list price of $79.99. That's a 57% discount.




cons

A-UKFTA gives UK consumers a taste of Australia’s premium cool-climate wines

The Australia-UK FTA will make Rathbone Wine Group’s award-winning cool-climate wines more affordable for consumers in the UK.




cons

‘This is punitive’: Kansas Senate committee considers poison pill wind energy bills

Senators heard three hours of testimony from anti-wind sources and just one hour from proponents of renewable energy




cons

NVIDIA and Global Consulting Leaders Speed AI Adoption Across Japan’s Industries

Consulting giants including Accenture, Deloitte, EY Strategy and Consulting Co., Ltd. (or EY Japan), FPT,  Kyndryl and Tata Consultancy Services Japan (TCS Japan) are working with NVIDIA to establish innovation centers in Japan to accelerate the nation’s goal of embracing enterprise AI and physical AI across its industrial landscape. The centers will use NVIDIA AI Read Article




cons

Wang in Russia for consultation

WANG Yi, director of the Office of the Central Commission for Foreign Affairs, will hold the 18th round of China-Russia strategic security consultation in Russia this week, China’s Foreign Ministry said




cons

Prayer: The Believer’s Constant Conversation (Ephesians 6:18-24)

Check here each week to keep up with the latest from John MacArthur's pulpit at Grace Community Church.




cons

Christian Deconstruction (John 6:60-71)

Check here each week to keep up with the latest from John MacArthur's pulpit at Grace Community Church.




cons

Christian Deconstruction, Part 2 (John 6:60-71)

Check here each week to keep up with the latest from John MacArthur's pulpit at Grace Community Church.




cons

My husband is my role model -Janet, etiquette consultant

Janet Temitope Adetu is a certified corporate etiquette and brand analyst as well as a professional image and international protocol consultant. The founder of JSK Etiquette Consortium, a thriving business etiquette, behavourial change and professional image enhancement firm, talks about her profession and how she juggles this with her marriage in this interview with QISMAT YINUS. Excerpts: What exactly do you do at JSK Etiquette Consortium? JSK Etiquette Consortium is a Corporate Etiquette, Professional Image and International Protocol Consultancy. We help corporate organisations leverage their human capital through personal and professional image projection, branding, impression management and leadership. Our objective […]




cons

Japan Considers a National Economic Council

Japan Considers a National Economic Council Japan Considers a National Economic Council
Anonymous (not verified) Fri, 02/01/2019 - 11:48

East-West Wire

Tagline
News, Commentary, and Analysis
East-West Wire

The East-West Wire is a news, commentary, and analysis service provided by the East-West Center in Honolulu. Any part or all of the Wire content may be used by media with attribution to the East-West Center or the person quoted. To receive East-West Center Wire media releases via email, subscribe here.

For links to all East-West Center media programs, fellowships and services, see www.eastwestcenter.org/journalists.

Explore

East-West Wire

Tagline
News, Commentary, and Analysis
East-West Wire

The East-West Wire is a news, commentary, and analysis service provided by the East-West Center in Honolulu. Any part or all of the Wire content may be used by media with attribution to the East-West Center or the person quoted. To receive East-West Center Wire media releases via email, subscribe here.

For links to all East-West Center media programs, fellowships and services, see www.eastwestcenter.org/journalists.

Explore




cons

Tree Planting and Cooking Fuel in Vietnam: A Case of Unintended Consequences

Tree Planting and Cooking Fuel in Vietnam: A Case of Unintended Consequences Tree Planting and Cooking Fuel in Vietnam: A Case of Unintended Consequences
Anonymous (not verified) Tue, 05/21/2019 - 12:44

East-West Wire

Tagline
News, Commentary, and Analysis
East-West Wire

The East-West Wire is a news, commentary, and analysis service provided by the East-West Center in Honolulu. Any part or all of the Wire content may be used by media with attribution to the East-West Center or the person quoted. To receive East-West Center Wire media releases via email, subscribe here.

For links to all East-West Center media programs, fellowships and services, see www.eastwestcenter.org/journalists.

Explore

East-West Wire

Tagline
News, Commentary, and Analysis
East-West Wire

The East-West Wire is a news, commentary, and analysis service provided by the East-West Center in Honolulu. Any part or all of the Wire content may be used by media with attribution to the East-West Center or the person quoted. To receive East-West Center Wire media releases via email, subscribe here.

For links to all East-West Center media programs, fellowships and services, see www.eastwestcenter.org/journalists.

Explore





cons

Bank survey reveals financial struggles of South African consumers




cons

Consumers remain burdened by debt despite mproving economic conditions, says DebtBusters




cons

National disaster! Water issues halts Constitutional Court in-person hearings




cons

JUI-F Chief Fazlur Rehman Alleges Conspiracy to Unsettle Country,

Jamiat Ulema-e-Islam Fazl (JUI-F) Chief Fazlur Rehman asserted on Saturday that a conspiracy was hatched to create unrest in the country. In Peshawar, Rehman stated, “The efforts were made to harm the country. But the JUI-F had fought the battle to save the country. We had dismantled the enemies by fighting for the sake of ... Read more

The post JUI-F Chief Fazlur Rehman Alleges Conspiracy to Unsettle Country, appeared first on Pakistan Tribune.





cons

South Africans urged to embrace water conservation measures amid water challenges




cons

NFO warning against consumers’ Black Friday impulse buying




cons

Desconstrucción cristiana, 1ª Parte A

La enseñanza bíblica en profundidad de John MacArthur lleva la verdad transformadora de la Palabra de Dios a millones de personas cada día.




cons

Desconstrucción cristiana, 1ª Parte B

La enseñanza bíblica en profundidad de John MacArthur lleva la verdad transformadora de la Palabra de Dios a millones de personas cada día.




cons

Desconstrucción cristiana, 2ª Parte A

La enseñanza bíblica en profundidad de John MacArthur lleva la verdad transformadora de la Palabra de Dios a millones de personas cada día.




cons

Desconstrucción cristiana, 2ª Parte B

La enseñanza bíblica en profundidad de John MacArthur lleva la verdad transformadora de la Palabra de Dios a millones de personas cada día.




cons

Egypt: Consequences of Morsi's Removal

The Egyptian Armed Forces' removal of President Morsi has created a number of challenges related to democracy, political stability and the role of Islam.