|By PR Newswire||
|November 18, 2012 09:00 AM EST||
OTTAWA, Nov. 18, 2012 /PRNewswire/ -- On the eve of a meeting between United States President Barack Obama and Myanmar President U Thein Sein, five women Nobel Peace Laureates of the Nobel Women's Initiative sent an open letter urging the heads of state to commit to bringing an end to the escalating and systematic violence in Rakhine State. This would include full access for humanitarian aid into affected areas and the creation of a reconciliation process led by local community leaders.
Full copy of the open letter follows:
November 18, 2012
President Barack Obama
The White House
1600 Pennsylvania Avenue NW
Washington DC 20500 USA
President U Thein Sein
Office of the President
In Support of Peace, Reconciliation and Development in Myanmar
Dear President Obama,
Dear President Thein Sein,
As you meet together in Myanmar this week, we are writing to urge your firm commitment to bring an end to the escalating and systematic violence in Rakhine State. We are deeply saddened by reports of the recent deaths of 170 people, and the displacement up to 110,000 people from their homes. We also encourage an end to the restrictions on humanitarian assistance, preventing survivors of the violence - including women and children - from getting much-needed medical help, food and shelter.
As peace leaders, we are following the conflicts in Kachin and Rakhine States with great concern. Our fellow Laureate and member of Myanmar's parliament Aung San Suu Kyi has recently called the ongoing violence "a huge international tragedy." This letter is an urgent call to prioritize in your discussions an end to the violence in both states and the protection of and the delivery of aid to vulnerable populations.
We cannot support the rationale of using violence to end violence. We hold the belief that violence that will not alleviate the suffering of Myanmar's people. The passive acceptance of the marginalization and discrimination of a minority group, thinking it will lead to peace, is flawed logic. It must not be catered to by national or international lack of political will. Furthermore, these violent conflicts, if not resolved, will continue to delay much needed reforms in economic development and may spread unrest and violence to other areas and destabilize the region.
Your priorities should include the creation of a fully inclusive reconciliation process in Rakhine State and the resumption of meaningful peace talks with the leaders of Kachin State. Women are an important part of such efforts and should be fully represented and meaningfully engaged in both processes. Additionally, lasting peace will require national and international commitments to ending the statelessness of the Rohingya people, with development efforts that improve livelihoods and education for all the people of Myanmar.
We appreciate the recent positive steps for democratic reform in Myanmar. However, to truly succeed, essential work is needed to ensure the genuine inclusion of all political, ethnic, and religious groups in the country's future development. The inability to govern a diverse people without oppression or violence will threaten development, peace and stability within Myanmar. It is our conviction, that the people of Myanmar have an opportunity to demonstrate the best qualities of a multi-ethnic nation with acceptance and protection of all religions and ethnicities. This is indeed possible and in alignment with your national interests.
Therefore we call for:
- Full access for humanitarian aid into affected areas.
- The creation of a reconciliation process led by local community and religious elders.
- And ultimately, your personal commitment to bring an end to the escalating and systematic violence in Rakhine State.
The government of Myanmar has the daunting task of preventing unresolved grievances from exploding into country-wide and regional violent conflict. We stand with you and the people of Myanmar to work towards advancing human freedom and supporting democratic and economic development so that all within the country and the region can thrive.
Nobel Peace Laureate, 1997
Nobel Peace Laureate, 2011
Nobel Peace Laureate, 1976
Rigoberta Menchu Tum
Nobel Peace Laureate, 1992
Nobel Peace Laureate, 2003
About The Nobel Women's Initiative
The Nobel Women's Initiative is an organization comprised of six women Nobel Peace Prize Laureates: Mairead Maguire, Rigoberta Menchu Tum, Jody Williams, Shirin Ebadi, Leymah Gbowee & Tawakkol Karman. Nobel Women's Initiative was created with the vision of helping strengthen work being done in support of women's rights around the world. The Nobel Women's Initiative uses the prestige of the Nobel Peace Prize and of courageous women peace laureates to magnify the power and visibility of women working in countries around the world for peace, justice and equality. Visit our website at http://nobelwomensinitiative.org
Manager, Media & Communications
SOURCE Nobel Women’s Initiative
SoftLayer operates a global cloud infrastructure platform built for Internet scale. With a global footprint of data centers and network points of presence, SoftLayer provides infrastructure as a service to leading-edge customers ranging from Web startups to global enterprises. SoftLayer's modular architecture, full-featured API, and sophisticated automation provide unparalleled performance and control. Its flexible unified platform seamlessly spans physical and virtual devices linked via a world...
May. 29, 2016 07:00 AM EDT Reads: 2,282
SYS-CON Events announced today that Alert Logic, Inc., the leading provider of Security-as-a-Service solutions for the cloud, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. Alert Logic, Inc., provides Security-as-a-Service for on-premises, cloud, and hybrid infrastructures, delivering deep security insight and continuous protection for customers at a lower cost than traditional security solutions. Ful...
May. 29, 2016 06:45 AM EDT Reads: 2,926
How will your company move to the cloud while ensuring a solid security posture? Organizations from small to large are increasingly adopting cloud solutions to deliver essential business services at a much lower cost. According to cyber security experts, the frequency and severity of cyber-attacks are on the rise, causing alarm to businesses and customers across a variety of industries. To defend against exploits like these, a company must adopt a comprehensive security defense strategy that is ...
May. 29, 2016 06:30 AM EDT Reads: 611
Companies can harness IoT and predictive analytics to sustain business continuity; predict and manage site performance during emergencies; minimize expensive reactive maintenance; and forecast equipment and maintenance budgets and expenditures. Providing cost-effective, uninterrupted service is challenging, particularly for organizations with geographically dispersed operations.
May. 29, 2016 06:00 AM EDT Reads: 2,152
As cloud and storage projections continue to rise, the number of organizations moving to the cloud is escalating and it is clear cloud storage is here to stay. However, is it secure? Data is the lifeblood for government entities, countries, cloud service providers and enterprises alike and losing or exposing that data can have disastrous results. There are new concepts for data storage on the horizon that will deliver secure solutions for storing and moving sensitive data around the world. ...
May. 29, 2016 06:00 AM EDT Reads: 1,334
SYS-CON Events announced today TechTarget has been named “Media Sponsor” of SYS-CON's 18th International Cloud Expo, which will take place on June 7–9, 2016, at the Javits Center in New York City, NY, and the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. TechTarget is the Web’s leading destination for serious technology buyers researching and making enterprise technology decisions. Its extensive global networ...
May. 29, 2016 05:15 AM EDT Reads: 3,268
The IoTs will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform. In his session at @ThingsExpo, Craig Sproule, CEO of Metavine, will demonstrate how to move beyond today's coding paradigm and share the must-have mindsets for removing complexity from the development proc...
May. 29, 2016 05:00 AM EDT Reads: 1,965
SYS-CON Events announced today that Commvault, a global leader in enterprise data protection and information management, has been named “Bronze Sponsor” of SYS-CON's 18th International Cloud Expo, which will take place on June 7–9, 2016, at the Javits Center in New York City, NY, and the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Commvault is a leading provider of data protection and information management...
May. 29, 2016 04:30 AM EDT Reads: 3,237
SYS-CON Events announced today that MangoApps will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. MangoApps provides modern company intranets and team collaboration software, allowing workers to stay connected and productive from anywhere in the world and from any device. For more information, please visit https://www.mangoapps.com/.
May. 29, 2016 03:30 AM EDT Reads: 971
The essence of data analysis involves setting up data pipelines that consist of several operations that are chained together – starting from data collection, data quality checks, data integration, data analysis and data visualization (including the setting up of interaction paths in that visualization). In our opinion, the challenges stem from the technology diversity at each stage of the data pipeline as well as the lack of process around the analysis.
May. 29, 2016 02:45 AM EDT Reads: 1,488
Many banks and financial institutions are experimenting with containers in development environments, but when will they move into production? Containers are seen as the key to achieving the ultimate in information technology flexibility and agility. Containers work on both public and private clouds, and make it easy to build and deploy applications. The challenge for regulated industries is the cost and complexity of container security compliance. VM security compliance is already challenging, ...
May. 29, 2016 02:30 AM EDT Reads: 1,337
Designing IoT applications is complex, but deploying them in a scalable fashion is even more complex. A scalable, API first IaaS cloud is a good start, but in order to understand the various components specific to deploying IoT applications, one needs to understand the architecture of these applications and figure out how to scale these components independently. In his session at @ThingsExpo, Nara Rajagopalan is CEO of Accelerite, will discuss the fundamental architecture of IoT applications, ...
May. 29, 2016 02:00 AM EDT Reads: 1,326
In the rush to compete in the digital age, a successful digital transformation is essential, but many organizations are setting themselves up for failure. There’s a common misconception that the process is just about technology, but it’s not. It’s about your business. It shouldn’t be treated as an isolated IT project; it should be driven by business needs with the committed involvement of a range of stakeholders.
May. 29, 2016 01:45 AM EDT Reads: 2,635
SYS-CON Events announced today that Tintri Inc., a leading producer of VM-aware storage (VAS) for virtualization and cloud environments, will exhibit at the 18th International CloudExpo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, New York, and the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
May. 29, 2016 01:30 AM EDT Reads: 2,476
Enterprise networks are complex. Moreover, they were designed and deployed to meet a specific set of business requirements at a specific point in time. But, the adoption of cloud services, new business applications and intensifying security policies, among other factors, require IT organizations to continuously deploy configuration changes. Therefore, enterprises are looking for better ways to automate the management of their networks while still leveraging existing capabilities, optimizing perf...
May. 29, 2016 01:15 AM EDT Reads: 1,354