|By PR Newswire||
|March 31, 2014 10:15 AM EDT||
MIDDLETOWN, Pa., March 31, 2014 /PRNewswire-USNewswire/ -- Three jackpot-winning Pennsylvania Lottery Cash 5 tickets worth $225,000 each were sold in Lehigh, Schuylkill and Berks counties for the March 28 and March 30 drawings.
Two Cash 5 tickets split the $450,000 jackpot from the Friday, March 28, drawing. Each ticket correctly matched all five balls, 08-19-33-39-40, to win individual prizes of $225,000, less 25 percent federal withholding. They were sold by the following retailers:
- Kim's Market, 501 N. Sixth St., Allentown, Lehigh County; and
- Hometown Mini Mart, 9 Mahanoy Ave., Tamaqua, Schuylkill County.
Each retailer will receive a $500 selling bonus.
A Cash 5 ticket worth $225,000 from the Sunday, March 30, drawing was sold at Turkey Hill, 2432 Morgantown Road, Reading, Berks County. It correctly matched all five balls, 07-17-30-33-34, to win a jackpot of $225,000, less 25 percent federal withholding. The retailer will receive a $500 selling bonus.
The prizes must be claimed and the tickets validated before the winners can be identified. Cash 5 winners have one year from the drawing date to claim prizes.
The Lottery encourages each holder of a winning ticket to sign the back of the ticket, call the Lottery at 717-702-8146 and file a claim at any of Lottery's seven area offices or at Lottery headquarters in Middletown, Dauphin County.
Claims may be filed Monday through Friday from 8:30 a.m. to 4:30 p.m. at area offices and from 8 a.m. to 4 p.m. at headquarters.
More than 88,000 other Cash 5 tickets won prizes of various amounts in the March 28, March 29 and March 30 drawings. Players should check every ticket, every time.
In the 2012-13 fiscal year, in addition to awarding more than $158.9 million in prizes to winners in Lehigh, Schuylkill and Berks counties, the Pennsylvania Lottery contributed more than $78 million to programs serving older residents of those counties.
How to play Cash 5: To play Cash 5, players pay $1 and select five numbers from 1 to 43. Players may select their own numbers using a Cash 5 playslip, or they may opt for computer-selected quick picks. Players must match all five numbers drawn to win the jackpot. Players also win prizes for matching two, three or four winning numbers. Cash 5 drawings are held seven nights a week, and tickets can be purchased up to seven draws (one week) in advance. Odds of winning the jackpot prize are 1-in-962,598; the overall odds of winning any prize are about 1-in-10.5.
About the Pennsylvania Lottery: The Pennsylvania Lottery remains the only state lottery that designates all its proceeds to programs that benefit older residents. Since its inception in 1971, the Pennsylvania Lottery has contributed nearly $23.7 billion to programs that include property tax and rent rebates; free transit and reduced-fare shared rides; the low-cost prescription drug programs PACE and PACENET; long-term living services; and the 52 Area Agencies on Aging, including full- and part-time senior centers throughout the state.
The Pennsylvania Lottery reminds its players to play responsibly and to check every ticket, every time. Players must be 18 or older.
For drawings results, winning numbers, winners' stories and to subscribe to the Lottery's RSS news feed, visit www.palottery.com. Also log in to Facebook and like us at www.facebook.com/palottery or follow us at www.twitter.com/palottery.
Media contact: Lauren Bottaro or Gary Miller, 717-702-8008
SOURCE Pennsylvania Lottery
Why do your mobile transformations need to happen today? Mobile is the strategy that enterprise transformation centers on to drive customer engagement. In his general session at @ThingsExpo, Roger Woods, Director, Mobile Product & Strategy – Adobe Marketing Cloud, covered key IoT and mobile trends that are forcing mobile transformation, key components of a solid mobile strategy and explored how brands are effectively driving mobile change throughout the enterprise.
Aug. 30, 2016 03:45 AM EDT Reads: 443
With so much going on in this space you could be forgiven for thinking you were always working with yesterday’s technologies. So much change, so quickly. What do you do if you have to build a solution from the ground up that is expected to live in the field for at least 5-10 years? This is the challenge we faced when we looked to refresh our existing 10-year-old custom hardware stack to measure the fullness of trash cans and compactors.
Aug. 30, 2016 02:30 AM EDT Reads: 1,854
The emerging Internet of Everything creates tremendous new opportunities for customer engagement and business model innovation. However, enterprises must overcome a number of critical challenges to bring these new solutions to market. In his session at @ThingsExpo, Michael Martin, CTO/CIO at nfrastructure, outlined these key challenges and recommended approaches for overcoming them to achieve speed and agility in the design, development and implementation of Internet of Everything solutions wi...
Aug. 30, 2016 02:00 AM EDT Reads: 2,232
Cloud computing is being adopted in one form or another by 94% of enterprises today. Tens of billions of new devices are being connected to The Internet of Things. And Big Data is driving this bus. An exponential increase is expected in the amount of information being processed, managed, analyzed, and acted upon by enterprise IT. This amazing is not part of some distant future - it is happening today. One report shows a 650% increase in enterprise data by 2020. Other estimates are even higher....
Aug. 30, 2016 01:30 AM EDT Reads: 3,048
With over 720 million Internet users and 40–50% CAGR, the Chinese Cloud Computing market has been booming. When talking about cloud computing, what are the Chinese users of cloud thinking about? What is the most powerful force that can push them to make the buying decision? How to tap into them? In his session at 18th Cloud Expo, Yu Hao, CEO and co-founder of SpeedyCloud, answered these questions and discussed the results of SpeedyCloud’s survey.
Aug. 30, 2016 01:15 AM EDT Reads: 2,338
Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more business becomes digital the more stakeholders are interested in this data including how it relates to business. Some of these people have never used a monitoring tool before. They have a question on their mind like “How is my application doing” but no id...
Aug. 30, 2016 01:00 AM EDT Reads: 1,934
Smart Cities are here to stay, but for their promise to be delivered, the data they produce must not be put in new siloes. In his session at @ThingsExpo, Mathias Herberts, Co-founder and CTO of Cityzen Data, will deep dive into best practices that will ensure a successful smart city journey.
Aug. 30, 2016 12:00 AM EDT Reads: 1,665
DevOps at Cloud Expo, taking place Nov 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 19th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long dev...
Aug. 29, 2016 10:00 PM EDT Reads: 2,489
Identity is in everything and customers are looking to their providers to ensure the security of their identities, transactions and data. With the increased reliance on cloud-based services, service providers must build security and trust into their offerings, adding value to customers and improving the user experience. Making identity, security and privacy easy for customers provides a unique advantage over the competition.
Aug. 29, 2016 08:30 PM EDT Reads: 2,444
Qosmos has announced new milestones in the detection of encrypted traffic and in protocol signature coverage. Qosmos latest software can accurately classify traffic encrypted with SSL/TLS (e.g., Google, Facebook, WhatsApp), P2P traffic (e.g., BitTorrent, MuTorrent, Vuze), and Skype, while preserving the privacy of communication content. These new classification techniques mean that traffic optimization, policy enforcement, and user experience are largely unaffected by encryption. In respect wit...
Aug. 29, 2016 08:15 PM EDT Reads: 1,873
SYS-CON Events announced today that StarNet Communications will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. StarNet Communications’ FastX is the industry first cloud-based remote X Windows emulator. Using standard Web browsers (FireFox, Chrome, Safari, etc.) users from around the world gain highly secure access to applications and data hosted on Linux-based servers in a central data center. ...
Aug. 29, 2016 08:00 PM EDT Reads: 921
SYS-CON Events announced today that 910Telecom will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Housed in the classic Denver Gas & Electric Building, 910 15th St., 910Telecom is a carrier-neutral telecom hotel located in the heart of Denver. Adjacent to CenturyLink, AT&T, and Denver Main, 910Telecom offers connectivity to all major carriers, Internet service providers, Internet backbones and ...
Aug. 29, 2016 07:00 PM EDT Reads: 1,983
Traditional on-premises data centers have long been the domain of modern data platforms like Apache Hadoop, meaning companies who build their business on public cloud were challenged to run Big Data processing and analytics at scale. But recent advancements in Hadoop performance, security, and most importantly cloud-native integrations, are giving organizations the ability to truly gain value from all their data. In his session at 19th Cloud Expo, David Tishgart, Director of Product Marketing ...
Aug. 29, 2016 06:45 PM EDT Reads: 849
StarNet Communications Corp has announced the addition of three Secure Remote Desktop modules to its flagship X-Win32 PC X server. The new modules enable X-Win32 to safely tunnel the remote desktops from Linux and Unix servers to the user’s PC over encrypted SSH. Traditionally, users of PC X servers deploy the XDMCP protocol to display remote desktop environments such as the Gnome and KDE desktops on Linux servers and the CDE environment on Solaris Unix machines. XDMCP is used primarily on comp...
Aug. 29, 2016 06:15 PM EDT Reads: 800
Almost two-thirds of companies either have or soon will have IoT as the backbone of their business in 2016. However, IoT is far more complex than most firms expected. How can you not get trapped in the pitfalls? In his session at @ThingsExpo, Tony Shan, a renowned visionary and thought leader, will introduce a holistic method of IoTification, which is the process of IoTifying the existing technology and business models to adopt and leverage IoT. He will drill down to the components in this fra...
Aug. 29, 2016 06:15 PM EDT Reads: 346