|By Marketwired .||
|July 2, 2014 10:01 AM EDT||
WINNIPEG, MANITOBA -- (Marketwired) -- 07/02/14 -- The facts: 13 cities. 18 Days. 11,000 kilometres. Half-a-million pounds of food. One epic fifth anniversary road trip starting in Newfoundland and ending in British Columbia.
Five Hole for Food founder, Richard Loat and his friends are setting off on a coast-to-coast tour for the fifth year, stopping in 13 cities along the way, and playing ball hockey to feed hungry Canadians. As it being the momentous fifth anniversary, FHFF's goal is to collect the 1 millionth pound of food for local community food banks during this year's road trip.
Winnipeg is the eighth stop of the road trip. The public is invited to bring their hockey stick to play in a drop-in ball hockey game and, if they dare, challenge Richard and his crew in the face-off circle. While there is no charge to play, participants and spectators are encouraged to bring a non-perishable food item or cash donation. Volunteers from the local food bank will be on site to collect donations.
WHO: Five Hole for Food WHAT: Charity ball hockey game to collect donations for local food banks WHEN: July 12, 2014, 3-7 p.m. WHERE: Corydon Avenue at Hugo Street WHY: Proceeds will benefit Siloam Mission
For more information, visit http://www.FiveHoleforFood.com.
Media inquiries, please contact:
Yvonne Yuen, FHFF media relations
Information technology is an industry that has always experienced change, and the dramatic change sweeping across the industry today could not be truthfully described as the first time we've seen such widespread change impacting customer investments. However, the rate of the change, and the potential outcomes from today's digital transformation has the distinct potential to separate the industry into two camps: Organizations that see the change coming, embrace it, and successful leverage it; and...
Dec. 3, 2016 03:15 PM EST Reads: 3,213
Without a clear strategy for cost control and an architecture designed with cloud services in mind, costs and operational performance can quickly get out of control. To avoid multiple architectural redesigns requires extensive thought and planning. Boundary (now part of BMC) launched a new public-facing multi-tenant high resolution monitoring service on Amazon AWS two years ago, facing challenges and learning best practices in the early days of the new service. In his session at 19th Cloud Exp...
Dec. 3, 2016 03:00 PM EST Reads: 442
Extracting business value from Internet of Things (IoT) data doesn’t happen overnight. There are several requirements that must be satisfied, including IoT device enablement, data analysis, real-time detection of complex events and automated orchestration of actions. Unfortunately, too many companies fall short in achieving their business goals by implementing incomplete solutions or not focusing on tangible use cases. In his general session at @ThingsExpo, Dave McCarthy, Director of Products...
Dec. 3, 2016 02:45 PM EST Reads: 470
Regulatory requirements exist to promote the controlled sharing of information, while protecting the privacy and/or security of the information. Regulations for each type of information have their own set of rules, policies, and guidelines. Cloud Service Providers (CSP) are faced with increasing demand for services at decreasing prices. Demonstrating and maintaining compliance with regulations is a nontrivial task and doing so against numerous sets of regulatory requirements can be daunting task...
Dec. 3, 2016 02:45 PM EST Reads: 668
Fact: storage performance problems have only gotten more complicated, as applications not only have become largely virtualized, but also have moved to cloud-based infrastructures. Storage performance in virtualized environments isn’t just about IOPS anymore. Instead, you need to guarantee performance for individual VMs, helping applications maintain performance as the number of VMs continues to go up in real time. In his session at Cloud Expo, Dhiraj Sehgal, Product and Marketing at Tintri, sha...
Dec. 3, 2016 02:45 PM EST Reads: 758
The Internet of Things (IoT) promises to simplify and streamline our lives by automating routine tasks that distract us from our goals. This promise is based on the ubiquitous deployment of smart, connected devices that link everything from industrial control systems to automobiles to refrigerators. Unfortunately, comparatively few of the devices currently deployed have been developed with an eye toward security, and as the DDoS attacks of late October 2016 have demonstrated, this oversight can ...
Dec. 3, 2016 02:45 PM EST Reads: 626
Dec. 3, 2016 02:15 PM EST Reads: 6,943
Dec. 3, 2016 02:00 PM EST Reads: 2,467
Dec. 3, 2016 02:00 PM EST Reads: 443
Dec. 3, 2016 01:30 PM EST Reads: 2,118
Dec. 3, 2016 01:15 PM EST Reads: 597
Dec. 3, 2016 01:00 PM EST Reads: 1,854
Dec. 3, 2016 01:00 PM EST Reads: 288
Dec. 3, 2016 12:45 PM EST Reads: 1,944
Dec. 3, 2016 12:45 PM EST Reads: 728