![]() ![]() Abu Hurairah, may Allah be pleased with him, narrated that the Messenger of Allah, sallallaahu ‘alaihi wa sallam, said: “‘Six are the rights of a Muslim over another Muslim.’ It was said to him, ‘O Messenger of Allah, what are these?’ Thereupon he said: ‘When you meet him, offer him greetings when he invites you to a feast accept it. It was narrated on the authority of Abu Jurayy al-Hujaymi, may Allah be pleased with him, that he said: “I came to the Messenger of Allah, sallallaahu ‘alaihi wa sallam, and said, ‘O Messenger of Allah, we are a people living in the desert, teach us something with which Allah The Almighty and Exalted may benefit us?’ He said: ‘Do not hold in contempt any act of goodness even if it is pouring water from your cup into the container of one seeking water and even talking to your brother with a cheerful countenance.’” Īmong other types of charity is paying the rights to their owners. Whoever walks with his brother in need until he establishes that for him, Allah will establish his feet firmly on the day when all feet would slip.” ![]() Whoever holds back his anger, Allah will cover his faults and whoever suppresses his fury while being able to execute it, Allah will fill his heart with satisfaction on the Day of Judgment. It is better for me to walk with my Muslim brother in his time of need than to stay secluded in this mosque of Madinah for a month. “‘O Messenger of Allah, who are the dearest people to Allah and the dearest deeds to Allah?’ The Messenger of Allah, sallallaahu ‘alaihi wa sallam, replied: ‘The dearest among people to Allah is the one who is most beneficial to people, and the dearest of deeds to Allah is to bring happiness to a fellow Muslim, or relieve him of distress, or pay off his debt or stave away hunger from him. Īmong the types of charity is what was mentioned in the Hadith of Ibn ‘Umar that a man came to the Prophet, sallallaahu ‘alaihi wa sallam, and said: Other acts whose benefit does not transcend the one who does them, include utterances of glorification of Allah The Almighty, utterances proclaiming His greatness, praise and professing His oneness, walking to prayers and praying the two Rak‘ahs (units of prayer) of Dhuha (mid-morning prayer). Saying good words which includes greeting and responding to a person who sneezes, removing a harmful thing from the pathways, enjoining good, forbidding evil, aiding the needy, helping the deaf to hear and the weak sighted to see and guiding the blind are some other good deeds that come under the same category. The good deeds mentioned by the Prophet, sallallaahu ‘alaihi wa sallam, include deeds with general benefit, such as reconciling people and helping a man concerning his riding animal by helping him to ride it by lifting his luggage onto it. To remove a harmful thing from the way is also a charity.” Every step taken on one’s way to offer the obligatory prayer (in the mosque) is also a charity. To help a man concerning his riding animal by helping him to ride it or by lifting his luggage on to it is also regarded as a charity, and (saying) a good word is also a charity. To judge justly between two persons is regarded as a charity. “There is a (compulsory) charity to be given for every joint of the human body (as a sign of gratitude to Allah) every day the sun rises. For example, Abu Hurairah, may Allah be pleased with him, narrated that the Messenger of Allah, sallallaahu ‘alaihi wa sallam, said: Many texts came to show us different kinds of good deeds. ![]() The Prophet, sallallaahu ‘alaihi wa sallam, informed us that: “Every act of goodness is a charity.” Thus, you are rewarded for every act of goodness you perform. ![]() Be keen on goodness to people through teaching knowledge, enjoining good such as maintaining ties of kinship, dutifulness to parents, reconciling people, offering some useful advice or a right opinion, co-operation in righteousness and piety, and forbidding evil or guiding to obtain an interest, whether religious or worldly.” He Says (what means): includes every good word, beautiful deed and perfect morals towards relatives and strangers. Allah The Exalted instructs His Prophet, sallallaahu ‘alaihi wa sallam, to enjoin his Ummah (Muslim nation) to practise goodness and make it their intrinsic quality and moral characteristic. ![]()
0 Comments
![]() ![]() Here are just a few ideas for great eats to complement your favorite bottle. But it can also be very easily matched with a wide range of your favorite snacks or dishes. Sure, Scotch is (and often should be) enjoyed solo, preferably in front of a roaring fire. The term can apply to any of your favorite beverages - especially the venerable Scotch. “Food pairings” doesn’t have to just mean whether you’re going to enjoy a glass of white or red wine with a meal. Give these scotch and food pairings a try and have a blast! Each course was a work of art, and the food was carefully and strategically placed on the plate to ensure we got the most out of every mouthful.Drinking and eating are both wonderful pleasures of life, specially if you pair them perfectly. Served with paired wines, this was one of the best meals I have had in a long time, never mind in a distillery. The first part of the experience was the five-course tasting menu in the brand’s very own fine dining brasserie, Elchies, where head chef Pawel Sowa, greeted my boyfriend and I and talked us through the menu we were about to devour. However, what I will say is this tour is worth its weight in gold. Invited to try the Macallan Mastery Experience, this is one tour that I think is aimed more so at those who really appreciate whisky, or would like to mark a special occasion due to its £250 per head price tag. The main visitor entrance is a feast for the eyes with a whisky wall taller than any other I have seen. I was very impressed with our tour guide Zoe who had a wealth of knowledge about the brand and its modern home. And all of the staff are very knowledgeable. The welcome from the team is warm, like a cosy fire. The walkway leading up to the entrance of the Macallan Distillery. Copy link A decentered black square over a white square. WhatsApp Messenger An icon of the Whatsapp messenger app logo. Facebook Messenger An icon of the Twitter app logo. Facebook Messenger An icon of the facebook messenger app logo. Loading Spinner An icon of a loading spinner. Success Tick Timeout An icon of a greyed out success tick. Information An icon of an information logo. Speech Bubble Icon A icon displaying a speech bubble WhatsApp An icon of the WhatsApp logo. Video Camera An icon of a video camera shape. Previous An icon of an arrow pointing to the left. Notice An explanation mark centred inside a circle. ![]() Next An icon of an arrow pointing to the right. Hamburger Menu Icon An icon used to represent a collapsed menu. Search Icon A magnifying glass icon that is used to represent the function of searching. Magnifying Glass An icon of a magnifying glass. Comments An icon of a speech bubble, denoting user comments. Close Icon An icon used to represent where to interact to collapse or dismiss a component Comment An icon of a speech bubble. Breaking An icon of an exclamation mark on a circular background. Pause Icon A two-lined pause icon for stopping interactions. Is Not Public An icon of a human eye and eyelashes with a diagonal line through it. Is Public An icon of a human eye and eyelashes. Telephone An icon of a traditional telephone receiver. Profile An icon that resembles human head and shoulders. Linked In An icon of the Linked In "in" mark. Facebook An icon of the Facebook "f" mark. Caret An icon of a block arrow pointing to the right. Cancel An icon of a circle with a diagonal line across. ![]() ![]() ![]() Jalapeno peppers have found countless uses in North American cuisine. The red peppers are typically used to make Chipotles (see below). As the growing season comes to an end, the jalapeños start to turn red. Throughout the growing season, green jalapenos will be picked from a plant several times. Mature Jalapeno plants are approximately three feet tall (or a little less). It has been their official state pepper since 1995. In fac, Texas has a special affiliation with the Jalapeno. Texas and New Mexico are the lead producing states in the U.S. Mexico has over 39,500 acres dedicated to Jalapeno cultivation and the U.S has over 5,500 acres. It gets its name after Jalapa, Veracruz where the pepper was traditionally grown (however, is not longer grown there). The Jalapeno has been around for thousands of year. In fact, Jalapenos have been known to cause skin irritation in some people. As a result, when using Jalapenos in a recipe, you can make the heat a little milder by removing the veins and seeds from the peppers (as a suggestion, you should wear latex gloves and not touch your eyes or areas). Most of the substance that causes the hot sensation (capsaicin) is concentrated in the veins of the peppers and the seeds (which are next to the veins. The heat intensity for these peppers ranges from 3,000 to 6,000 Scoville Units. Jalapeno pepper lovers enjoy the warm, burning sensation when eaten. They are green when ripe and red when fully or over-ripe. These peppers are usually 2 to 3 inches long and about an inch wide. Even people who are not pepper fans usually know of the Jalapeno. ![]() The Jalapeno (pronounced ha-la-PAY-nyo) was the first pepper ever taken into space (1982) and it may be the most popular pepper. ![]() ![]() It would be at least three years before Internet Service Providers (ISPs) started providing public access to the internet, in 1989. The very first iterations of the internet were relegated to governments and universities. In 1986, computing was still rudimentary (slow and not internet connected). Send in the Cloner! 1986: The first PC virus The virus would reside in memory and look for a clean floppy disk to infect. On the fiftieth boot, Elk Cloner would display a poem to the user:Įlk Cloner: The program with a personality This boot sector virus propagated whenever an infected disk was run. It was written by a then-15-year-old, who wrote such programs to play pranks on his friends. The intent was not for malicious or devious reasons, but to see if the “I’m the creeper, catch me if you can” message could propagate to other computers via ARPANET.Ĭontrary to what every non-technical person says, “Macs are not susceptible to viruses,” the first computer virus found in the wild, dubbed “Elk Cloner,” was designed to target Apple II computers. Like its modern worm successors, it spread via a network protocol. It spread through ARPANET computers and posted the following message: Based on a concept first articulated by German mathematician John von Neumann in the 1940s, it was built at BBN (an American research and development company later acquired by Raytheon) by engineer Bob Thomas. ![]() Ironically, 1971 also saw the premier of the world’s first virus Proof of Concept, dubbed “The Creeper.” Although credited and referenced by various entities as the world’s first computer virus, the Creeper actually exhibited the behavior of a worm. Its size (two inches rather than 12), price ($60), and performance (comparable to much larger and more expensive processors) ushered in a new era in computing It was the first commercially produced general-purpose CPU. In 1971, the first microprocessor was developed, the Intel 4004. NCP was the first network transport layer to enable data to flow from computer to computer. The first computers were connected in 1969, and one year later, the Network Control Program (NCP) was developed (the predecessor to the modern TCP/IP stack). ![]() ARPANET began in 1967 to try and connect remote computers. The early years 1971: The first Proof of Conceptīefore the internet existed, at least in the form we know today, there was the Advanced Research Projects Agency Network, or ARPANET, for short. Instead, we’ve highlighted many of the most notable examples and memorable events of the past 50 years. It would be impossible to cover all malware and events over the past 50 years in such a short blog post. Malware is a generic term that encapsulates all threats-viruses, worms, botnets, ransomware, etc.-anything malicious that is software-related.A worm does not require human interaction and can replicate on its own, tunnel deep into systems, and move between devices.A virus cannot replicate without human interaction, whether clicking a link, opening an attachment, launching an application, or downloading a file.To start, here is some basic terminology: So, in recognition of over 50 years since the first computer virus was discovered, we have decided to provide a brief historical insight into the history of computer malware from the pre-internet era to the current world of botnets, ransomware, viruses, worms, and more. And like its biological counterparts, a computer virus also replicates and can be transmitted from one host to another, creating problems ranging from annoying to downright destructive. Part of the reason is that we have all been exposed to the impact of viruses, such as the flu or the common cold. ![]() ![]() It is usually associated with something destructive to the technology we all rely on, whether it’s a laptop, smartphone, application, or gaming system, demonstrating how ubiquitous computers and technology have become in our daily lives. Regardless of socioeconomic background or age, everyone has an immediate negative connotation to that term. A “computer virus” is one of the few transcendent technical terms everyone understands, including children. ![]() ![]() ![]() The film's soundtrack album and musical score was composed by Christophe Beck and produced by Jake Monaco and was released on November 1, 2011, by Varèse Sarabande, Back Lot Music and Colosseum Records. Filming took place entirely in New York City on a budget of $75 million (after tax rebates), with several buildings provided by Donald Trump used to represent the eponymous tower. Ratner continued to develop the idea into what would eventually become Tower Heist, with Murphy later rejoining the production. As the script developed and changed into an Ocean's Eleven–style caper, Murphy left the project. Tower Heist began development as early as 2005, based on an idea by Murphy that would star him and an all-black cast of comedians as a heist group who rob Trump International Hotel and Tower. The plot follows employees of an exclusive apartment building who lose their pensions in the Ponzi scheme of a Wall Street businessman and enlist the aid of a criminal, a bankrupt businessman, and an immigrant maid to break into his apartment and steal back their money while avoiding the FBI agents in charge of his case. Interestingly, since the burglary scene takes place during the Macy’s Thanksgiving Day Parade in the movie, the production team had to tape a few portions of the actual parade and then recreate the set of the event a few days later to shoot more sequences for the film.Tower Heist is a 2011 American heist comedy film directed by Brett Ratner, written by Ted Griffin and Jeff Nathanson, based on a story by Bill Collage, Adam Cooper and Griffin and starring Ben Stiller and Eddie Murphy with Casey Affleck, Alan Alda, Matthew Broderick, Judd Hirsch, Téa Leoni, Michael Peña, and Gabourey Sidibe in supporting roles. Furthermore, the neighborhood of Astoria, Broadway and West 60th Street (near Columbus Circle), and 31st Street in Queens served as pivotal filming sites for the movie as well. A foot and car chase scene was recorded on Central Park West and Columbus Avenue. Javits Federal Building at 26 Federal Plaza in the Civic Center neighborhood of Manhattan.Ī few vehicle sequences were also lensed in some sound stages in Brooklyn. Additional scenes for ‘Tower Heist’ were recorded in Goldwater Memorial Hospital on One Main Street in Roosevelt Island, New York County Courthouse at 60 Centre Street, and Jacob K. The sequences involving Josh’s apartment were taped at 19 29th Street, between Broadway and 31st Avenue, in Queens. The bar scene between Josh and Special Agent Claire Denham was shot on location in Neir’s Tavern at 87-48 78th Street in the Woodhaven neighborhood of Queens. Some sections of the building were constructed on green screen sets to incorporate a few of the visual effects of the movie.ĭuring the filming schedule, the cast and crew members of the heist film were also spotted at 1514 Broadway and West 44th Street, where there was a Toys R Us store at the time of production. ![]() Trump Tower at 725 5th Avenue can also be spotted in a few scenes. The aerial shots of Shaw’s penthouse at the top were also taped on location. The Trump International Hotel & Tower at 1 Central Park West in Manhattan stood in for the exterior of the high-rise condo, which is managed by Josh Kovaks and where Arthur Shaw stays. Now, let’s head over to the specific locations that appear in the movie, shall we? New York City, New YorkĪll the pivotal sequences for ‘Tower Heist’ were lensed in New York City, the most populous city in the United States. By choosing to tape the movie in New York, where the story is set, the production team added an element of authenticity and enhanced the overall quality of the narrative. The principal photography for the Ben Stiller-starrer seemingly commenced in late October 2010 and wrapped up in February 2011. ‘Tower Heist’ was filmed in its entirety in New York, particularly New York City. In case you are one such curious soul, allow us to put your curiosities to bed! The comedic elements and the theme of heist work together to make for an entertaining watch, but the interesting use of locations throughout the movie is bound to make one curious to learn about the actual filming sites. Consequently, to reclaim the funds that Shaw stole from them, Josh bails out a petty crook, Slide, to get his help and break into Shaw’s luxurious penthouse along with a few of his co-workers. ![]() ![]() ![]() ![]() Red Wing Shoes also produces footwear that is static-dissipative in order to control the amount of electrical discharge from the body and electrical hazard in order to provide extra protection from accidental contact with electrically energized objects. In order to comply with ASTM F 2413-11 and M I/75 C/75 standards for impact and compression, Red Wing Shoes manufactures many of their styles with steel, non-metallic, and aluminum safety toes and offers puncture-resistant options that meet the ASTM F 2413-11 standard. These other Red Wing brands include a majority of models manufactured in Vietnam and Cambodia. In addition to manufacturing footwear under their own name, Red Wing Shoes also manufactures shoes under the Irish Setter Boots, Vasque, Carhartt (discontinued in 2011), and Worx brands. As of 2014, there are six sources of manufacture: completely made in the USA, made in the USA with imported materials, assembled in the USA with imported components, made in China, made in Korea, and made in Vietnam. The Red Wing Shoe brand is primarily handmade in the USA with American materials at the company's plants in Red Wing, Minnesota Potosi, Missouri, and Danville, Kentucky. Manufacturing īoots being made at a Red Wing Shoes factory in the U.S. While the core of Red Wing's focus is on work boots, in 2008 Red Wing Shoes added a Heritage catalog and also has experimented with more fashion-oriented shoes. The company produces Oxfords, chukkas, hiking boots, and logger styles, as well as 6-inch and 8-8 1/2 inch work boots. Though Red Wing Shoes is known primarily for their leather boots intended for heavy work, in recent years the company has expanded its line-up to include athletic-styled, work shoes and footwear designed for specific job applications such as slip-resistant shoes designed for the service industry and boots for the mining industry that utilize a metatarsal guard. Red Wing Shoes continued its tradition of producing footwear for wartime use by manufacturing boots for American soldiers during World War II. Within 10 years of its inception, Red Wing Shoes was producing more than 200,000 pairs of boots per year and was the primary company manufacturing footwear for American soldiers fighting in World War I. Red Wing Shoes (Red Wing Shoe Company, LLC) is an American footwear company based in Red Wing, Minnesota that was founded by Charles H. ![]() ![]() ![]() Generate Profits Vehicle Running A Blog - Can You.Blog Hatter Pro 2010 Review - Set Up Blogs To Gene.Simple Steps To Setting Up Your Wordpress Autopost.Massive Passive Profits Scam Review - Does Bill Mc.AutoBlog Samurai Review - A Real User's Perspective.Auto Blog Samurai Software Review - Is It Really S.Auto Blogging Software Program: Making Blogging A. ![]() Autoblog Syndicate Review - The Truth Behind This.My Shopping Genie - Free Online Price Comparison (.The Best Iphone Video Converter Software Review Fr.ERP Comparison Tips For Finding Your Ideal System.Comparison Shopping when Online Shopping.Though files can also be sent ahead of scheduled call via email but web videoconferencing software makes it possible for users to send and receive files during a conference call and gather user's feed back in real time. It allows users to receive and view the files on their own systems and use them throughout the video conference procedure. This high end interaction is designed for corporate use where large number of users can read, create and edit documents in different formats simultaneously.įew of the desktop video conferencing features like screen sharing and remote picture display do not work in the full screen visible to local users and it becomes necessary to send important files to remote users. While doing web video conferencing on Skype, Oovoo, iChat and Windows Live messenger, you can get a corporate feel. This kind of facility is available in sophisticated form of desktop video conferencing and requires additional equipments and experience but it has huge potential for small to large group collaboration. The advanced level of desktop sharing is known as remote collaboration where the remote users can take control of an image file or document displayed on your screen and start editing it. Remote Collaboration For File Sharing And Editing However, the shared desktop display turns out to be lower in quality than the actual display where texts appear large and details are not lost. It is live in nature and allows for whiteborading, annotation and display of not so easy to convert picture materials. The desktop sharing option in web video conferencing is targeted to make your system screen visible to other remote users either in part or full. Some of the desktop video conferencing software even allows remote users to see video clippings and timed slideshows. Through this feature, the live webcam image on desktop can be changed to a desirable picture any time and ready made presentations can also be delivered in real time. This is a kind of private setting that enables the user to remain invisible to others present in a desktop video conferencing. In fact, call participants can put questions to the presenter in written without disturbing people present in the office, library or neighborhood. ![]() With this feature, the users can feel free to send personalized messages to other call participants in web video conferencing without allowing the call group to see them. The desktop video conferencing users on Skype, iChat, Windows Live Messenger and Oovoo have the facility to send text messages instantly. Sometimes, audio or video chatting does not seem to be the right option. Below are given some of the extra features in desktop video conferencing that can make calls more interactive. These features can be activated during the set-up of web video conferencing so as to maximize the call effects. Apart from the real time video chat facilities, desktop video conferencing offers several other additional features that certainly make it more enjoyable call option for users. ![]() ![]() ![]() We also share information about your use of our website with our social media, advertising and analytics partners. We use cookies to personalize content and ads, provide social media features, and analyze the use of our website. ![]() Every achievement is a kind of requirement to unlock new stuff in the game. This helps us measure the effectiveness of our marketing campaigns. You can unlock various new items in WWE 2K Battlegrounds via achievements. Microsoft Advertising uses these cookies to anonymously identify user sessions. Players can get and share these locker codes by using two ways: through the game developer or by other third parties. It also serves behaviorally targeted ads on other websites, similar to most specialized online marketing companies. The new WWE 2K Battlegrounds brings a different style of professional wrestling game complete with zany arcade fighting and unique weapons. Fans of WWE can bring their favorite wrestlers into the ring by unlocking their superstar and special outfits in WWE 2k Battlegrounds. WWE 2K battleground players use the locker codes to unlock different free items for gameplay, such as free cosmetics, superstars, and several other features. The Facebook cookie is used by it's parent company Meta to monitor behavior on this website in order to serve targeted ads to its users when they are logged into its services. Google will use this information for the purpose of evaluating your use of the website, compiling reports on website activity for us and providing other services relating to website activity and internet usage. The purpose of Google Analytics is to analyze the traffic on our website. Many of Battlegrounds roster members can also be unlocked by playing through the campaign. Security (protection against CSRF Cross-Site Request Forgery) Stores login sessions (so that the server knows that this browser is logged into a user account) which cookies were accepted and rejected). Storage of the selection in the cookie banner (i.e. Battle Bucks can also be bought using Golden Bucks, a currency that can only be earned by spending actual money. Players will need to face and defeat wrestlers in order to unlock them should they want to fill out the roster this way. Becoming a SuperStar (Silver): Complete the Wrestlemania event. That's my signature (Bronze): Perform 20 signature moves. Thunderstorm (Bronze): Unlock the 'Thunderstorm' Power Up. being associated with traffic metrics and page response times. Many of Battlegrounds' roster members can also be unlocked by playing through the campaign. Zoologist (Bronze): Control the ram and feed your opponent to the alligator. Random ID which serves to improve our technical services by i.e. There is no literature or on-screen prompts within the game that tell you where or how to unlock Cena. Server load balancing, geographical distribution and redundancy ![]() ![]() Visual C++ Redistributable Packages for Visual Studio 2013 that matches the server architectureĪfter installing the cloud connector, you must open Firewall access from cloud connector to AWS/Azure that is used and configured on the Tenant creation on SAP BTP cockpit. Here is the download link for the Cloud Connector Installation: Here is an example for a windows installation: however, I’ve also installed it on a Linux Suse and the installation and configuration was almost the same. ![]() I was using Windows based Cloud connector. In this blog you can find the installation instruction, Prerequisites and downloads that are necessary to install cloud connector Regarding the permission to the API – the only permission needed is marked here:Īfter filling all of the necessary information, an authorization will be prompt to log in to the dedicated mailbox, after approving the authorization on Microsoft 365 Administration the status Deployed on CPI Security Material. User name will be the mailbox that is in use.Īuthorization URL, Token Service URL, Client ID a Client Secret is provided during the creation on the API in Microsoft Azure Active Directory. ![]() Note that the scope option is very important and must be written as shown in the picture. Once you get Authorized – the security material is ready to use and the name will be used for future configuration in the integration process. ![]() Important note is to determine the Redirect URL which is configured during the creation of the secret credential on the Security Material Section on the Integration suite – CPI access from the BTP Cockpit, so you must create your API on Azure alongside the creation of the Security Material. Let me recommend on this Blog written by Franz Forsthoferįollow Franz Forsthofer instructions on how to create it on Azure Cloud Services.
![]() Crystal Serenity Itineraries Will Feature Worldwide Sailingsįollowing the maiden cruise the ship will sail in northern Europe and the Baltics for the rest of the summer. The 12-night Mediterranean itinerary will include calls at Monte Carlo, Portofino, Barcelona, Ibiza and Malaga before the inaugural voyage ends in Lisbon. Crystal Serenity's Maiden Sailing is July 2023Ĭrystal Serenity will set sail from Marseille on July 31, 2023. On the top deck the ship has two full-sized paddle tennis and pickleball courts. The Crystal Life Spa offers a variety of treatments and has a sauna and steam room. The wellness program includes yoga, Pilates and spinning classes and Crystal Serenity has a dedicated fitness director with one-to-one advice and personal training available. They include a 3,000 plus square feet fitness center with panoramic views, which has a separate weight room and aerobics studio. Wellness areas were also upgraded during the ship's refurbishment at the Fincantieri shipyard in Italy. Crystal Serenity Will Include Health and Wellness Options The Connoisseur Club is the place to smoke cigars and sip cognac and other bars include the Avenue Saloon piano bar.Ĭrystal Serenity also has a movie theater, lecture room, computer room, shops, photo gallery, library, public laundries and areas for children and teens. ![]() Revue-style song and dance shows take place in the Galaxy Lounge and for night owls there is the Pulse venue. It hosts cabaret acts, music for dancing and themed events before and after dinner, and on select nights there is a supper club with dancing for up to 116 passengers. The Stardust Club and Supper Club is a dual purpose venue. The top deck Palm Court, a well-loved feature on both Crystal ships, is a social hub for afternoon tea, cocktails and dancing. There is also plenty of choice when it comes to bars and entertainment. There is a 24-hour room service menu and passengers staying in the top penthouse suites can also order off the menus in any of the specialty restaurants. Among the casual venues are the poolside Trident Grill, Tastes Kitchen & Bar serving tapas and the Scoops Ice Cream Bar. Specialty restaurants include the upscale Italian Osteria d'Ovido and the exclusive Vintage Room showcasing gourmet menus paired with wines and also offering chef-hosted dinners. The Waterside Restaurant is the main dining room, with the Marketplace providing an alternative for passengers preferring buffet-style dining. The renovation saw all suites on the ship reimagined, with fixtures and fittings including Italian marble and modern furnishings. Divided into areas including a lobby, lounge, dining room, bedroom and extra-large bathroom, these accommodations measure up to 1,065 square feet with a 107 square feet balcony. The largest suites on Crystal Serenity are the four Crystal Penthouse Suites on Deck 11. All of the suite categories from the 323-square-foot Aquamarine Veranda Suite and above have a separate bedroom and living area. Veranda suites begin at a similar size, plus a 54-square-foot balcony. The cabins, all of them outside, lead in with oceanview single and double staterooms measuring up to 215 square feet. ![]() As a result, the ship now has a high passenger to space ratio of one person per 93.1 cubic feet and almost one crew member per passenger. This has been achieved by remodelling and decreasing the number of suites, with some accommodations merged to create larger staterooms. In its previous guise Crystal Serenity carried 980 passengers and on the revamped vessel that number has gone down by nearly 250 to 740. Crystal Serenity Deck Plans Feature High Passenger Space Ratio and Multiple Venues ![]() Crystal fans can expect all the trademarks of the previous line on an enhanced ship. The ship was first launched in 2003 for the former Crystal Cruises, which ceased trading in early 2022 following the bankruptcy of the Genting Group parent company. The ship was acquired by the A&K Travel Group in 2022 - along with older and smaller fleetmate Crystal Symphony - and underwent a refurbishment that has seen the number of suites reduced and enlarged to carry a maximum of 740 passengers. The relaunch of Crystal Serenity in the summer of 2023 marks the return of the luxury Crystal brand. ![]() |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |