|By PR Newswire||
|August 6, 2014 06:00 AM EDT||
PHILADELPHIA, Aug. 6, 2014 /PRNewswire/ -- McDonald's® Restaurants of the Greater Philadelphia Region have announced the return of the Ronald McDonald Summer Library Tour. In an effort to support local libraries and encourage summer reading, McDonald's has dedicated time and resources to giving back to the community. As part of the tour, Ronald McDonald will visit four area libraries to perform his "It's Book Time with Ronald" show and make $1,000 donations to the children's sections of the libraries.
In addition to the tour, more than 160 libraries from across the region are participating in the annual Ronald McDonald Summer Reading Program, which features the distribution of McDonald's bookmarks to children with memberships to each participating library. When a child has read 10 books over the course of the summer, they will be able to take the bookmark to their local McDonald's to redeem it for a free Happy Meal™.
"Helping the young people of our communities is important to all of us, which is why McDonald's encourages children to read and value books," said John Durante, President, McDonald's Restaurants of the Greater Philadelphia Region Owner/Operator Association, "We are thrilled that so many local libraries are collaborating with us and participating in both our Summer Reading Program and Summer Library Tour." The tour will also include special guest readers from the community.
This year's library tour stops include:
- Torresdale Branch of the Free Library of Philadelphia – Philadelphia
August 8, 2014, 2:00 p.m.
- Wilmington Public Library – Wilmington, Del
August 20, 2014, 10:00 a.m.
- Mullica Hill Library – Mullica Hill, N.J.
August 22, 2014, 10:30 a.m.
- Upper Merion Township Library – King of Prussia, Pa
August 26, 2014, 6:30 p.m.
McDonald's USA, LLC, serves a variety of menu options, including wholesome choices, made from quality ingredients to more than 26 million customers every day. Nearly 89 percent of McDonald's 14,000 U.S. restaurants are independently owned and operated by businessmen and women. There are nearly 300 McDonald's restaurants in the Greater Philadelphia Region. For more information on McDonald's visit www.mcdonalds.com or log on at any of the 11,500 Wi-Fi enabled McDonald's U.S. restaurants. Visit www.mcstate.com for local restaurant, career and program information. Follow us on Twitter and Instagram @McDPhilly for the latest news, info, events and promotions, and find us on Facebook at www.facebook.com/mcdonalds.
FOR MORE INFORMATION:
SOURCE McDonald's Restaurants of the Greater Philadelphia Region
Enterprises have been using both Big Data and virtualization for years. Until recently, however, most enterprises have not combined the two. Big Data's demands for higher levels of performance, the ability to control quality-of-service (QoS), and the ability to adhere to SLAs have kept it on bare metal, apart from the modern data center cloud. With recent technology innovations, we've seen the advantages of bare metal erode to such a degree that the enhanced flexibility and reduced costs that cl...
Oct. 27, 2016 11:15 AM EDT Reads: 523
All clouds are not equal. To succeed in a DevOps context, organizations should plan to develop/deploy apps across a choice of on-premise and public clouds simultaneously depending on the business needs. This is where the concept of the Lean Cloud comes in - resting on the idea that you often need to relocate your app modules over their life cycles for both innovation and operational efficiency in the cloud. In his session at @DevOpsSummit at19th Cloud Expo, Valentin (Val) Bercovici, CTO of So...
Oct. 27, 2016 11:15 AM EDT Reads: 2,226
Intelligent machines are here. Robots, self-driving cars, drones, bots and many IoT devices are becoming smarter with Machine Learning. In her session at @ThingsExpo, Sudha Jamthe, CEO of IoTDisruptions.com, will discuss the next wave of business disruption at the junction of IoT and AI, impacting many industries and set to change our lives, work and world as we know it.
Oct. 27, 2016 11:00 AM EDT Reads: 190
With an estimated 50 billion devices connected to the Internet by 2020, several industries will begin to expand their capabilities for retaining end point data at the edge to better utilize the range of data types and sheer volume of M2M data generated by the Internet of Things. In his session at @ThingsExpo, Don DeLoach, CEO and President of Infobright, discussed the infrastructures businesses will need to implement to handle this explosion of data by providing specific use cases for filterin...
Oct. 27, 2016 11:00 AM EDT Reads: 3,047
Security, data privacy, reliability, and regulatory compliance are critical factors when evaluating whether to move business applications from in-house, client-hosted environments to a cloud platform. Quality assurance plays a vital role in ensuring that the appropriate level of risk assessment, verification, and validation takes place to ensure business continuity during the migration to a new cloud platform.
Oct. 27, 2016 11:00 AM EDT Reads: 2,083
In past @ThingsExpo presentations, Joseph di Paolantonio has explored how various Internet of Things (IoT) and data management and analytics (DMA) solution spaces will come together as sensor analytics ecosystems. This year, in his session at @ThingsExpo, Joseph di Paolantonio from DataArchon, will be adding the numerous Transportation areas, from autonomous vehicles to “Uber for containers.” While IoT data in any one area of Transportation will have a huge impact in that area, combining sensor...
Oct. 27, 2016 11:00 AM EDT Reads: 1,138
In his session at Cloud Expo, Robert Cohen, an economist and senior fellow at the Economic Strategy Institute, will provide economic scenarios that describe how the rapid adoption of software-defined everything including cloud services, SDDC and open networking will change GDP, industry growth, productivity and jobs. This session will also include a drill down for several industries such as finance, social media, cloud service providers and pharmaceuticals.
Oct. 27, 2016 10:30 AM EDT Reads: 2,076
DevOps is speeding towards the IT world like a freight train and the hype around it is deafening. There is no reason to be afraid of this change as it is the natural reaction to the agile movement that revolutionized development just a few years ago. By definition, DevOps is the natural alignment of IT performance to business profitability. The relevance of this has yet to be quantified but it has been suggested that the route to the CEO’s chair will come from the IT leaders that successfully ma...
Oct. 27, 2016 10:30 AM EDT Reads: 16,635
We are always online. We access our data, our finances, work, and various services on the Internet. But we live in a congested world of information in which the roads were built two decades ago. The quest for better, faster Internet routing has been around for a decade, but nobody solved this problem. We’ve seen band aid approaches like CDNs that attack a niche's slice of static content part of the Internet, but that’s it. It does not address the dynamic services-based Internet of today. It doe...
Oct. 27, 2016 10:15 AM EDT Reads: 2,036
Ask someone to architect an Internet of Things (IoT) solution and you are guaranteed to see a reference to the cloud. This would lead you to believe that IoT requires the cloud to exist. However, there are many IoT use cases where the cloud is not feasible or desirable. In his session at @ThingsExpo, Dave McCarthy, Director of Products at Bsquare Corporation, will discuss the strategies that exist to extend intelligence directly to IoT devices and sensors, freeing them from the constraints of ...
Oct. 27, 2016 10:15 AM EDT Reads: 3,212
What happens when the different parts of a vehicle become smarter than the vehicle itself? As we move toward the era of smart everything, hundreds of entities in a vehicle that communicate with each other, the vehicle and external systems create a need for identity orchestration so that all entities work as a conglomerate. Much like an orchestra without a conductor, without the ability to secure, control, and connect the link between a vehicle’s head unit, devices, and systems and to manage the ...
Oct. 27, 2016 10:15 AM EDT Reads: 1,398
DevOps is being widely accepted (if not fully adopted) as essential in enterprise IT. But as Enterprise DevOps gains maturity, expands scope, and increases velocity, the need for data-driven decisions across teams becomes more acute. DevOps teams in any modern business must wrangle the ‘digital exhaust’ from the delivery toolchain, "pervasive" and "cognitive" computing, APIs and services, mobile devices and applications, the Internet of Things, and now even blockchain. In this power panel at @...
Oct. 27, 2016 09:15 AM EDT Reads: 2,156
By now most people have either created their configuration management solution or are just embarking on this journey. In his session at @DevOpsSummit at 19th Cloud Expo, Marco Ceppi, a DevOps Engineer working at Canonical, will discuss how to take configuration management to the next level with modelling and orchestration. He will also discuss how and why people are moving from a machine-centric view to a service/application-oriented view of deployments, and how you can leverage the knowledge a...
Oct. 27, 2016 09:00 AM EDT Reads: 2,050
@ThingsExpo has been named the Top 5 Most Influential M2M Brand by Onalytica in the ‘Machine to Machine: Top 100 Influencers and Brands.' Onalytica analyzed the online debate on M2M by looking at over 85,000 tweets to provide the most influential individuals and brands that drive the discussion. According to Onalytica the "analysis showed a very engaged community with a lot of interactive tweets. The M2M discussion seems to be more fragmented and driven by some of the major brands present in the...
Oct. 27, 2016 08:45 AM EDT Reads: 11,585
In the 21st century, security on the Internet has become one of the most important issues. We hear more and more about cyber-attacks on the websites of large corporations, banks and even small businesses. When online we’re concerned not only for our own safety but also our privacy. We have to know that hackers usually start their preparation by investigating the private information of admins – the habits, interests, visited websites and so on. On the other hand, our own security is in danger bec...
Oct. 27, 2016 08:15 AM EDT Reads: 527