en

freemexy's blog

Police say a woman who was angered when she was kicked out of a Las Vegas-area casino intentionally drove her motorhome into the building, injuring a custodian.

North Las Vegas Police spokesman Eric Leavitt says the 50-year-old woman was ejected from the Cannery casino Friday morning and drove her Winnebago motorhome into the building.Leavitt says the woman hit a 66-year-old custodial worker who was outside the building. The Las Vegas Review-Journal reports the worker was critically injured but is expected to survive.month recommend casino

Leavitt told KVVU-TV that the woman kept hitting the gas and her vehicle was stuck in the building’s entrance. Employees had to remove the woman to get her to stop.

Leavitt says police who were already at the casino arrested the woman. Her identity was not immediately released.Online casino sites attract new players by offering them an additional amount of bonus money for signing up and making the first deposit.

We use thorough research to make sure you get the best first deposit offers at these sites and your money is safe and ready to use for playing your favorite slots or poker online.nline gambling has never been so much fun. More and more online casinos are opening for business and the best ones offer a multitude of great benefits. These range from top sign up bonuses, live dealer games, a massive choice of games and great software.

If you are struggling to know which online casino to choose from or where to deposit your money then don't fret because we have already done the hard work for you.            
Nov 1 '19 · 0 comments

Mayor Tom McNamara’s administration recommended to City Council Monday that it back Hard Rock International to receive the city’s sole casino license.

McNamara said Forest City Casino’s application for a far east side casino has uncertainties. And although Gorman & Co. officials say they identified a casino operator late last week, consultants for the city said the operator has not formally committed to the project.recommend casino

Hard Rock Casino Rockford would be located at the former Clock Tower Resort property on 25 acres at 7801 E. State St. Giovanni’s Restaurant & Convention Center, 610 N. Bell School Road, would house a temporary casino until the Hard Rock Casino is built.

McNamara said the city should send a single casino to the Illinois Gaming Board, and make the decision on which casino proposal is best for the city. He said Hard Rock’s “financing structure is credible” and includes “realistic and sustainable minimum gambling tax guarantees, along with additional revenue sharing payments to offset impacts to the city.”We believe Hard Rock has by far the most thorough and complete proposal delivered to the city,” McNamara said. “We believe the other proposals have some fairly glaring weaknesses, and we believe the greatest likelihood for the city to get a casino is with Hard Rock.”

Hard Rock International is proposing a casino with 1,500 slot machines and 55 table games, a Hard Rock Café and 1,600-seat Hard Rock Live entertainment venue at the I-90 exit.

The casino recommendation is now in the hands of the 14-member City Council, which must vote by Oct. 26 to certify one or more of the applicants to the Illinois Gaming Board, which ultimately decides who gets a casino license. McNamara said he recommends that aldermen find consensus among themselves and cast a final vote on Oct. 7.

Nov 1 '19 · 0 comments

One thrifty newlywed in the U.K. keeps reliving the magic of her big day by wearing her bridal gown time and time again — to the grocery store, on a paddleboarding trip, and even while doing chores around the house.www.eisenge.com

Though Dawn Winfield-Hunt tied the knot with husband Steve earlier in August, she hasn’t quite been ready to put the special dress behind her.

“Usually you only get to wear your dress once and then you put it in a box and forget about it,” the 57-year-old woman said of the gown, according to The Sun. “But I liked mine and decided to wear it the following day for a BBQ with friends and everyone loved it.”I plan on wearing it every now and then until my first anniversary next year,” she continued. “It will be covered in seaweed, wine stains and probably won’t even be white anymore but I don’t care.”

Winfield-Hunt, who lives on the Isle of Wight off the south coast of England, admitted that while her pals think the fashion statement is hilarious, the post-nuptials look is often confusing for strangers.

“The dress puts a smile on people's faces, many of which think it is my wedding day and congratulate me as they are passing by in the street,” the bride said.“When I arrived at the checkout in the supermarket, the lady said she had received a message through her earpiece saying ‘bride in aisle 12’ which is pretty funny,” she said.

Winfield-Hunt scooped up the dress for $365 at a thrift shop, and feels that the gown--which still had the $2,186 price tag on it, and appeared never to have been worn -- was a bargain. She then completed the alterations on the dress herself, and she's been sporting it around ever since

“I have definitely got my money’s worth by wearing it on the weekends," she said.But with a “bucket list of adventures”--including a kayaking trip -- to complete in her wedding dress, Winfield-Hunt’s new hubby thinks it’s a riot.

Nov 1 '19 · 0 comments

Whether you’re an ordinary netizen or advanced internet user, you ought to have an email account and probably use it for both personal and business communications. With a huge variety of mailing services like the popular Google or Yahoo, we need not look far to find a decent email provider. They mostly offer unlimited free email accounts, integrated office suite, cloud storage, and more. Big companies also provide a bunch of premium features to attract users.
Unfortunately, there’s this popular quote that applies well to free emails – If you’re not paying for the product, you are the product. Free email services are not as private as they should be. Luring new users with free email accounts, big companies identify them, collect their data, and build their online profiles. You can read more about the secrets of the most popular email providers in our previous article. 
According to The New York Times, lots of parents of school-age kids have expressed concern about their children’s email addresses for school Chromebook last year. They’ve stated that some email providers collected personal details from their kids’ school emails to create marketing profiles of them as young adults. If this makes you concerned about how to get an anonymous email address.
How to make your email anonymous
Highly secure encryption methods are the greatest weapon in your battle for the anonymity of your email account. Such a technology encrypts your email messages and account and ensures that no unauthorized third party will decode them. Encryption is not a new technology and lots of companies that develop security solutions have already implemented it in their services.

Google applies encryption for Gmail letters in particular, but not for the whole Gmail account in general. This means that Gmail services strive to protect your email letters, but collect and store your personal account data at the same time. That’s why even if you are the biggest Google fan and don’t want to give up on this email provider, you should at least secure it with a VPN application. And if you’re interested in the best security for your email service, you should protect your data in three steps: VPN
+ private browser + anonymous email account.

A VPN on the smartphone screen with a lock and a key on a wooden background - how to make email anonymous
Step 1: Get a VPN to use email account anonymously
In the era of numerous cyber threats, a best VPN application. Using this service is a fundamental precautionary measure that provides you with complete anonymity by establishing a highly secure encrypted tunnel between you and the rest of the internet. The VPN app keeps all your data secure and protects your online activity from obtrusive data analysis by email services.

What kind of analysis? Your emails can be identified via your real IP address. This allows anyone to link your emails to your identity and physical address. Unless you’re okay with that, you should certainly use a VPN. This security solution provides you with a virtual IP address and secures your real one. Even if a hacker or email company tries to identify your real location, they won’t be able to decode your data.

RitaVPN also offers you a highly secure AES-encryption method, super-fast VPN protocols, and a premium list of VPN server locations. Using this application, you can be sure that no cyber criminal can get your IP address or any other private data. VPN Unlimited is your first step towards getting an anonymous email account.

Step 2: Surf the web anonymously with a private browser
As you may know from our article about alternative browsers with enhanced security, the most popular mainstream browsers (which you probably use) don’t hide your online activity from the sites you visit, the owner of your network, and your internet service provider, even if you use the Incognito mode. Such browsers can protect your online activity only from the person you share your device with, but not the advertising companies or cyber criminals.

As a result, your email provider can still track your activity and IP. What we recommend is to use an alternative browser with advanced level of security like Private Browser. It was created specifically to expand your online freedom and ensure your complete anonymity. The app has certain built-in VPN features.
Step 3: Create an untraceable email account
Prior to this final step, we’ve completely protected your IP address and online activity. Now it’s time to make your email account untraceable. Unfortunately, this won’t work with an ordinary Gmail or Hotmail account, rendering the previous two steps useless if you keep using these services. These 3 steps work best only when combined.

A man with hoody cloth is typing on a laptop keyboard an anonymous email letter
With our email accounts’ protection relying on their providers, we can’t make them completely untraceable. Thus, we highly recommend use self-destructing disposable email accounts. An example of such is what Guerilla Mail offers, so let’s take a look at it. This service allows you to send and receive emails via a self-destructing address. Another benefit of this service is that it’s free and unlimited. The emails last for one hour and are accessible via guerrillamail.com. Also, you can attach up to 150MB of files and even send bitcoins. Android version included.

In the end, combining a VPN service
, Private Browser, and Guerilla Mail will help you set up an untraceable anonymous email account and safeguard your personal information. Stay safe!
http://www.fastritavpn.com/
http://www.buyvpns.net/
http://www.buyvpnservices.com/

Nov 1 '19 · 0 comments
How to Connect to Public WiFi on iPhone and iPad Securely
Imagine this scene: you cozily sit at a local coffee shop, sipping hot coffee and taking advantage of free WiFi to view pics on Instagram, read Facebook posts, or check emails on your iPhone. This picture is familiar to many of us. But however familiar and relaxing it sounds, this situation conceals a potential danger. If you haven’t spotted it, here: free public WiFi. 
When you connect your iPhone or iPad to a public wireless network, your iOS device becomes vulnerable to cyberattacks. And for hackers, stealing users’ data on such hotspots is as easy as one-two-three. 
If you are wondering if it’s possible to use public WiFi safely on iOS device, the answer is Yes. 
Risks of unsecured WiFi for your iPhone and iPad data
Unsecured WiFi hotspots don’t require a password to use it. This lack of authentication, as well as unencrypted connections, makes WiFi hotspots appealing for malicious users who strive to steal data. If you connect to an unsecured network on iPhone without any protection, it’s easy for hackers to steal your passwords, credit card details, and other information. 
One of the dangerous scenarios is a fake WiFi network, aka Evil Twin. A malicious user sets up their own WiFi network, using just a laptop. They give the network a seemingly trustworthy name to lure unsuspecting users into connecting to it. Once you do this with your iOS device, the hacker can direct you to malicious resources, a fake version of banking websites, etc. and get your credentials and other sensitive information.  
Another open WiFi network security risk is Man-in-the-middle attack (MITM). In this case, a hacker exploits security vulnerabilities of WiFi hotspots to sniff out information that is passed between the websites you visit and your iPhone or iPad. Same as in the first scenario, your account credentials and other sensitive information are put at risk, and all that – without you ever knowing about it. 
Sounds creepy? No worries, we’ll show you how to safely use public WiFi on iPhone and iPad. 
How to secure iPhone on public WiFi
Using unsecured WiFi on iPhone stops being dangerous if you follow the tips below.
Keep your iOS operating system up-to-date 
System updates are not all about delivering new features to your iPhone or iPad. They are released to fortify the OS, fix bugs, and eliminate vulnerabilities that can be exploited by hackers. 
So it’s vital to install iOS update on your iPhone or iPad as soon as it comes along. In case you’re concerned about storage space limits, sync or back up data to the cloud to free space. This tip is universal and doesn’t refer to WiFi networks only. 
Use two-factor authentication 
Once you’ve enabled two-factor authentication, or 2FA, besides your password you need to enter a special one time code for login. This code is sent to your device every time you access your account from an unknown location.  
Even if hackers intercept your credentials and try to access your account, this won’t be possible. They’ll possess your password only, which is not enough without the code. 
2FA is provided by many services and social media sites, and it will definitely boost your account’s security. However, be aware that your online activities after the sign-in can still be easily monitored by the owner of the network. Thus, two-factor authentication should definitely be combined with other measures to ensure your iPhone WiFi security.
Check the legitimacy of the WiFi network
In case you frequently visit a cafe or other location, you most probably know the name of its WiFi network. And if you notice multiple similar names in the WiFi list on your iPhone where there used to be one, the additional networks are potentially malicious. Ask an employee if they created another hotspot. If they didn’t, the network may be fake (so-called Evil Twin), and the owner of the location may want to take action in this regard. 
When in an unfamiliar location, don’t hurry up connecting to unsecured WiFi with iPhone just because it’s free. Check if the network is legitimate first. In some locations, like parks, this might be tricky. In this case, use other ways to ensure your iPhone security on public WiFi.
While this tip can help you avoid evil twins, other security threats, like MITM attacks, still remain. To combat it, make sure to follow our next advice. 
Enable VPN before connecting iPhone to public WiFi
VPN, or virtual private network, is an indispensable tool for securing your internet activities from any kind of watchful eyes, including man-in-the-middle attacks. Secure your iPhone or iPad on public networks by using a trustworthy VPN service.
RitaVPN routes all your internet traffic via an encrypted tunnel. So whatever sensitive information you enter online, be it your passwords, credit card details, etc. is protected with military-grade AES-256 bit encryption. 
http://www.buyexpressvpn.net/
http://www.buyvpnservice.net/
http://www.vpnsnetflix.com/
Nov 1 '19 · 0 comments

Although data breaches are a mainstay in the news, users still practice poor password habits. While not the lone factor in account compromisation, these bad tendencies leave users vulnerable. So, what are the best ways to secure your online accounts? Here’s a rundown.

1. Complexity is Key
Far too often, users ignore prompts to choose complex passwords. That’s how ‘123456’, ‘qwerty’, ‘111111’, ‘password’, and ‘987654321’ came to be some of the most commonly used passwords in the world.

All passwords, regardless of the platform’s requirements, should contain a steady mix of uppercase, lowercase, special characters, and numbers. An extremely random sequence such as ‘3DaS;FJBp!FiLNeqF@#57’ is ideal. To come up with your own complex password, use the IPVanish Password Generator.

2. There’s Strength in Numbers
So, having a complex password is a must, but a complex password is only strong if it is unique. Using the same password for all of your accounts is reckless. Every account you create should use a different password.

On the off chance that one of your accounts is compromised, using the same password for everything will give a hacker access to all of your accounts. And depending on the type of accounts you have, that could mean identity theft and banking fraud.

3. Two-Factor is the X Factor
Many logins simply require a username and password; enter those two fields, and you’re in. This is called one-factor authentication, and the single factor is your password. But when possible, you should enable two-factor authentication (2FA).

Two-factor authentication requires an additional piece of information to login. The second factor could be a variety of things, including a fingerprint or SMS verification code. When enabled, two factor authentication can prevent account compromisation, even if a hacker acquires your password.

4. Password Managers Are Crucial
2FA is important, and coming up with a diverse set of strong passwords is mandatory, but it’s a lot to keep track of. The average person cannot memorize dozens of lengthy, random passwords. That’s where password managers come into play.
%3C/a""> ">Passwords managers keep hold of all your account passwords and protect them with encryption. This keep everything organized in one secure, central location, but keep it accessible wherever you’ll need. Plus, many password managers allow for two-factor authentication.

5. Never Share Your Passwords
Your passwords should never end up in someone else’s hands. That principle includes sharing media streaming accounts with friends. Even if they’re trustworthy and you believe they won’t give your credentials to someone else, they can still fail you.

This is because not all web users practice sound password habits. Even if they have your best interest in mind, your friends could accidentally expose your credentials to hackers. A hacked Hulu account isn’t a big deal itself, but if you’re practicing other password security faux pas, it could translate to a major loss you can’t afford.

But while you shouldn’t share your passwords with your friends, you should pass along these five tips. Last year, identity theft was at an all-time high, and poor password hygiene certainly played a part.

Locking down your logins is vital, but it’s only one piece of the privacy puzzle. To protect your online activity
, you need to encrypt your internet connection. Thankfully, encryption is easily accessible with a VPN

Nov 1 '19 · 0 comments

Plugins (also known as ‘extensions’ and ‘add-ons’) are often useful sidekicks in the web browsing experience. Unfortunately, many have known, gaping security vulnerabilities. Some of these should never be used, while others should only be treated with the utmost caution. Here are three popular plugins you should reconsider:

Flash
Every discussion about unsafe plugins has to start with Adobe Flash. Steve Jobs was hypercritical of the extension and went so far as to ban its use on iOS. Elsewhere, Facebook bashed the add-on, and streaming sites such as YouTube stopped using it. But the internet wasn’t always so cold to Flash.

Before HTML5’s arrival, Flash was the standard. That made it a hotbed for hackers, who preyed on Flash’s security vulnerabilities and loaded various versions with malware. Adobe is officially killing the plugin in 2020, and with alternatives rightfully taking over, you should rarely be using Flash. Some streaming sites do still require it, so tread carefully. Just make sure your default setting blocks Flash, and only approve its use situationally.

Java
Java is another plugin with a poor reputation. This stems from the notorious Flashback Trojan exploit that infected more than 600,000 Mac devices. Because Macs are known for being less susceptible to viruses, the fiasco raised eyebrows. Oracle did patch the issue, but it took them four months to do so. This wasn’t the last time Oracle was slow to react to malware. In 2015, they warned users about a threat first discovered in 2010.

With such a poor track record, it makes no sense to trust Java. And truthfully, you don’t need the extension. Your best bet is to completely delete Java from your device. If you don’t have it downloaded, you’re one step ahead. No need to download it now. If you do have it installed and feel like you still need it, only use when strictly necessary. Tinker with your browser settings to approve its use on specific websites, or disable it globally and enable it when required.

Silverlight
Silverlight is an older plugin used for streaming that’s been phased out. Past code vulnerabilities lead to the undetected exploitation for over two and a half years. The exploit fooled users into using a compromised website, then attacked them. Although Silverlight’s popularity has drastically faded, it could still be vulnerable to malvertising (a portmanteau of ‘malware’ and ‘advertising’) and fake updates used to infect users.

You may no longer use Silverlight, but that doesn’t mean you’re safe. While Silverlight is no longer commonly employed, there’s a high chance you still have it installed if you’re a video streamer. Check to see if that’s the case. If you find Silverlight installed on your browser, uninstall immediately. No worries, you shouldn’t miss it or be prompted for it again. Most video is now deployed using HTML5.

Unfortunately, good plugin hygiene only goes so far. Applying skepticism when using browser extensions will help you avoid malware, but it won’t privatize your web traffic. For that, you need a VPN
. VPN service
encrypts your device’s internet connection and protects your activity from onlookers.
http://www.fastritavpn.com/
http://www.buyvpns.net/
http://www.buyvpnservices.com/

Nov 1 '19 · 0 comments

POSTED ON 01/02/2018 IN GENERAL
2017 taught us that you can’t trust your government entities, ISPs, or any other parties to protect your privacy by default. Confounding congressional acts, flawed FCC decision-making, corporate corruption, and rising cyber crime made that all too clear. Instead, you must take matters into your own hands. With that in mind, here are five privacy resolutions you should commit to for 2018, even if your other resolutions fall by the wayside.

1. Always update your software as soon as possible.
Apps and operating systems are constantly improving. That’s a positive, but unfortunately some improvements are necessitated by bugs and vulnerabilities. These deficiencies can render your devices unsafe to use until a software update is performed. While you don’t always have the bandwidth to dedicate to automatic updates, you should make an effort to update your software as early as conveniently possible. Using a device with known security risks is pure, avoidable recklessness.

2. Delete your data regularly.
You should try to store your most personal information offline, but understandably, that isn’t always realistic. To keep your sensitive data safe, make sure you regularly delete it when it’s no longer of use to you. This includes everything from texts messages and emails, to photos and videos; it also includes unused apps. Apps are highly sensitive because they have potential to share your information with other apps and third parties. For some files it may be necessary to delete twice. Photos, for example, are often temporarily still stored on your phone even after you delete them. To permanently erase, you must manually delete them a second time.

3. Use two-factor authentication (2FA) for all your accounts.
You should know by now that a strong password is a must for all of your online accounts. But no matter how long or complex your string of characters are, you can still do more to secure your logins. Two-factor authentication requires you to present two separate validation components before granting access to your account. With some services, such as Instagram, two-factor authentication is optional; you should consider it a privacy requirement. To extend two-factor authentication to all of your accounts, consider a password manager.

4. Actually read privacy policies.
You’ve probably signed up for an account or downloaded software and been asked to confirm that you’ve read and agreed to a policy. Even more, you probably checked to confirm you read that policy without hesitation. But did you actually read it? Likely not. Ditch that good-for-nothing that habit in 2017, and don’t look back. At the bare minimum, you should scan privacy policies and TOS agreements to see what data you’re consenting to share, and who it will be shared with. Many companies sell your data to third parties – and you’ve probably agreed to it blindly. If you take a closer look at privacy policies, you’ll know what data-sharing you’re agreeing to, and you may think twice about it.

5. Connect to a VPN daily
One privacy policy that may not be too revealing? Your broadband provider’s. In 2017, Congress agreed to let ISPs sell customer data without consent. Thankfully, you can combat this obscene invasion of privacy with encrypted VPN connections. VPN hides your web traffic, severely limiting the amount of data your ISP can collect and share. And it’s not just useful at home. VPN service also hides your online activity from snoopers and cybercriminals on public networks, so you can maintain your digital privacy wherever you are.
VPN download

http://www.buyexpressvpn.net/
http://www.buyvpnservice.net/
http://www.vpnsnetflix.com/

Nov 1 '19 · 0 comments
Authorities in the eastern Chinese province of Zhejiang have installed an "all-seeing eye" in a high-school classroom to spot students who aren't paying attention or are falling asleep in class, official media reported.international school in hangzhou

The new system at the Hangzhou No. 11 High School links up a surveillance camera to facial recognition software that tracks students' movements and facial expressions, according to the Zhejiang Daily newspaper.

The technology is part of a trial of software and surveillance systems that could be rolled out elsewhere as part of the development of "smart campuses," the paper said."The system ... can perform statistical analysis on students' behaviors and expressions in the classroom and provide timely feedback on abnormal behaviors," the report said.

Data collected by the system will be analyzed by the software, and overly inattentive or sleepy behavior will generate a prompt to the teacher to admonish the offender, it said.The data could also be used to evaluate teachers' performance in the classroom.

"This summer vacation, the system will be installed in all classrooms in the Hangzhou No. 11 High School," the report said.A teacher at the school surnamed Li said the system aims to improve the quality of teaching and learning.

"Installing this management system is mainly to show kids where they are concentrating the hardest, and where the problems are," Li told RFA on Friday. "It will indicate their levels of concentration in class, and in areas where they're not concentrating, it will make it easier for the teacher to go over sections again."

"It should be very useful for teachers; it's not just about monitoring the students," he said.Li also said the company that developed the system is installing it free of charge."It's a trial, and so it hasn't yet been installed in other schools," he said. "The aim is to improve the effectiveness of teaching and learning in the classroom."

"Maybe some kids think that it will be watching them the whole time, but they are maybe making too much out of it, because they will feel pressured, but that's not the point of it," he said."It's about getting the children to learn properly the whole time they are in class," he said.
Nov 1 '19 · 0 comments
China today boasts at least two of the world’s great cities on its mainland – Beijing and Shanghai. While these megacities, with populations well in excess of 20 million people, hog the limelight, so-called ‘second tier’ cities, such as Tianjin provide some light relief from the hectic pace of life. Tianjin may be the largest city most people have never heard of; it is China’s 4th largest city, with over 15 million people spread across its main urban centres. It is the former port city for Beijing, providing the capital with its access to the sea and the trade routes across the world.living in tianjin

Any visitor to Beijing or Shanghai cannot have failed to notice the scale of those cities, and with that vast size comes an almost inevitable compromise in terms of traffic jams, higher prices and crowds of tourists and locals alike. Tianjin, by contrast, has a rather less frenetic pace of life. Inhabitants can take long, peaceful walks along the beautiful HaiHe river or mooch around the former European concession areas in WuDaDao. It is a big city, but with the feel of a compact and connected centre – the ‘downtown’ areas of shopping, sporting and leisure facilities all sit within a few square kilometres of the CBD. Strolling, jogging or cycling around the city is remarkably easy and affords a chance to see the historic and cultural highlights whilst never being too far from a restorative coffee shop or restaurant.

The city’s traditional heart is around the Drum Tower, just a few minutes’ walk from the school. Here, arts and crafts’ shops rub shoulders with antique dealers and restaurants offering local Tianjin delicacies. Further along the river, and again within easy reach of the school, lie the former concessions, sections of the city which in the 19th Century were annexed by the major world powers, including Britain, Germany, the US and Japan. All saw in Tianjin the chance to exploit Chinese trade, and as a result, the city has developed some historic areas which reflect the architecture and ambitions of their former occupiers. A day spent wandering around WuDaDao, or the recently restored Italian concession area, makes for a fascinating journey into the city’s past. Venturing outside the city, Tianjin has its own stretch of the Great Wall, which makes for a scenic and peaceful two-hour hike: the crowded Wall sections around Beijing will seem a million mile away once you set foot on the Huangyaguan stretch of this UNESCO World Heritage site.

Like all China’s growing cities, Tianjin is far from rooted in the past, however. The pace of construction is astonishing, and the scale and ambition of the city’s leaders mean that dazzling new projects spring up each year. The city has an international airport, with flights connecting to Europe, Asia and Australasia. There are four vast train stations linking China’s fast-growing high-speed rail network with cities across the country. Beijing is just 33 minutes by bullet train, whilst Shanghai, once an overnight sleeper journey away, is now down to four hours by super-fast train. Around the city, a subway network of six lines serves the main downtown area with clean, frequent and remarkably cheap transport. Above ground, Tianjin’s fleet of buses and taxis have been joined in recent years by DiDi cars, an uber-equivalent which offers English-language services via its mobile app. Getting around, both within the city and from further afield, is fast, affordable and safe in Tianjin.

Moving to China may seem a daunting prospect. Language barriers appear insurmountable, and a reputation for poor air quality can be powerful deterrents, but Tianjin is a city working hard to overcome these stereotypes. The government has turned its full force to addressing the issues around air quality. Year-on-year reductions in harmful pollutants have made striking progress, with a 33% reduction in PM2.5 measurements in the past 12 months alone, according to Greenpeace East Asia, and further action has been promised over the coming years. In terms of language, the city is increasingly accessible to non-Chinese speakers, with mobile phone apps now so powerful that even the most monolingual individuals can make themselves understood.

The quality of life for an expatriate in Tianjin is excellent. Prices are lower than in the tier one cities; apartments are large and modern, fitted out to a very high specification; premium brand stores such as Apple, Zara, Nike and Prada proliferate in every mall; and western restaurants, bars and 5* hotel chains are all readily available. The arts and music scene, housed within the fantastic Tianjin Grand Theatre complex and other venues across the city, is vibrant and growing. Touring groups from across the world perform in Tianjin, and the proximity to Beijing means that even the most A-list tours of China are accessible.

In 2018, the Economist Intelligence Unit ranked Tianjin as China’s third most liveable city, ahead of the likes of Shanghai and Hangzhou. It is a city that provides an enviable standard of living, and as a base for living and exploring China and wider Asian destinations, it is hard to beat and we look forward to welcoming you to our home.
Nov 1 '19 · 0 comments
Pages: «« « ... 48 49 50 51 52 ... » »»