‘Where to Draw the Line’ on Eating Disorders

National Eating Disorders Awareness Week runs Feb. 23 through March 1. This year’s theme is “I Had No Idea: Food Issues, Emotional Eating & Eating Disorders . . . Where to Draw the Line?”

The purpose of the annual event, sponsored by the National Eating Disorders Association and now in its 27th year, is to bring public attention and support to the needs of those with eating disorders and their families. The events and initiatives of this week are meant to bring people together in communities across the country in raising awareness about the severity of eating disorders, which are bio-psycho-social illnesses. The signs may be hard to recognize but can be life-threatening.

There will be lots of events going on next week across the country. In and around Washington, D.C., there will be a few events open to the public. If you can’t attend any of the events listed below and want to find out more information about eating disorders, organizers will be hosting several webinars addressing a variety of issue surrounding eating disorders. Participants can sign up at www.nationaleatingdisorders.org. Below is a selection of events where you can learn more about eating disorders.

Presentation – Hungry for What? Empowerment Against Disordered Eating: Tuesday, Feb. 25, 7 p.m. to 8:30 p.m.

American University’s School of International Service, 4400 Massachusetts Ave., N.W., Founders Room. Join Rock Recovery and AU’s Active Minds chapter for Hungry for What?, an eye-opening presentation that de-mystifies and de-stigmatizes the issue of disordered eating by uncovering its true nature and causes. A $10 donation is suggested which will be donated to Rock Recovery’s programs in the D.C. community and nationwide. For more information, visit www.rockrecoveryed.org, or call 571-255-9906.

The Great Jeans Giveaway: Monday, Feb. 24, 10:30 a.m. to 3:30 p.m.

Kogan Plaza, 2121 I St. N.W. Hosted by Students Promoting Eating Disorder Awareness and Knowledge of George Washington University (SPEAK GW), this event is designed to persuade the public to think twice about trying to change our bodies to fit fashion trends and unattainable standards of beauty. Volunteers will be collecting gently used denim that will be donated to local charities.

Screening – “Someday Melissa”: Thursday, Feb. 27, 5:30 p.m. to 8:30 p.m.

George Mason University, Johnson Center Cinema, 4400 University Drive. Screening of “Someday Melissa: The Story of an Eating Disorder, Loss and Hope,” a documentary by filmmaker Judy Avrin, who was inspired by the journal writings of her daughter Melissa, who lost her life to an eating disorder. For more information, contact Tracy McClair at csab@icpnyc.org

Inaugural Fairfax NEDA Walk, themed NEDA Walk. Save a Life. Saturday, March 1, 9 a.m. to 11:30 a.m. (Registration/check-in begins at 8:30 a.m.)

George Mason University, Johnson Center North Plaza, 4400 University Drive, Fairfax, VA NEDA invites friends and family to help spread awareness of the seriousness of eating disorders so more people will receive the help they or their loved ones so desperately need. . For more information, contact Jordan White at jwhite17@masonlive.gmu.edu or 908-675-7613. To pre-register, visit www.nedawalks.org/fairfaxva2014 or call 212-575-6200. $25 per adult, $15 per student, $10 per child under 12, $5 per pet.

Previous
1
Next
Gravatar
Mar 1, 2014 at 6:04 AM unknown

Many have shared that these were not in a position to have any
loans this can bad or poor credit unknown choose credit that permits monthly
payments of just interest--but excluding principal--to improve your short-term cash
flow status.

Gravatar
Mar 14, 2014 at 12:00 AM Chase

You can view some screens of 'GTA 5' on the PS3 and Xbox 360, which launched last year, in the slideshow to the left
side of tbis article. Having NPCs worry about such things as weather and possiblee attacks are interesting, but GTA 5 also
adds more realism to the way NPCs act defensively against
your aggression. Like Mortal Kombat, it was incredibly violent
for its time whgen it was first released.

Gravatar
Mar 16, 2014 at 2:44 PM csr racing apk download

Cro-Mag Racing is a game I didn't think I would like until I played it.

Then our game designsrs go for real graphics and designs.
It lets you duel wirh another person who has the app, but otherwise it's a lot off the same stuff with different Star Wars characters and lightsabers.

Gravatar
Mar 17, 2014 at 9:25 PM cheat codes for gta 5

Collect 200 pigeons to unlock the helicopter with rockets.
For decades, public television and certain child-friendly cable
networks offeredd safe harbor from conventional television programming,
though in recent years the educational value of some of its programming has fallen under criticism, too.
In a similar light, there are codes that will give you infinite
ammunition, infinite health, and infinite air soo you can swijm without fear of drowning.

Gravatar
Mar 18, 2014 at 12:35 AM Phillip

12 ended up being the last up-date available for ipod
tohch next Age group due to thee technological limits of thhe gadget.
Thhe new Secc - Nav, who has only appeared on "NCIS" so far, assigned the team to find
the mole that tipped the cartel off, and tht meant Kensi and Deeks got to interview FBI Agets Jenkinns and
Ambrose, CIA Agent Lowell, and NCIS Ageht Carter, who had sleep apnea
thanks too his run-in with Kensi. A number of very easy
to use programs can get your routers encryption key and use your wireless Interrnet for free.

Gravatar
Mar 19, 2014 at 9:12 AM http://www.scribd.com

While cookies are basically used by websites to
keep track of your usage on the site, hackers can also use cookies for other
devious purposes, which can allow them to gather certain inforrmation about your computer
in addition to its security settings for latfer exploitation.
Position ass next, the program Hacker is probably the most useful programs to crack
a Wi-Fi system code. It is difficult to compare costs with so many variables, and
as some school districts opted not to purchase softwear, that brkught their costs down.
The IPads were to be assigned permanently to tthe students and every student from K up through high school
were to gget these IPads. You will nnot seee the unused drive anywhere in thhe window it has been hidden.

Gravatar
Mar 19, 2014 at 10:42 PM Windy

The NSA's business is 'information dominance,' the use oof other
people's secrets to shape events. Proxy servers, which are actually computers that are
located beyond thee firewall of the school or company's system,
can easily be accessed by anyone through the Internet.
19 on a trespasseing warrant stemming from a July incident, aftrer family members reported concerns for his safety in a 911 call.
For whatever reason, they don't have access to wireless Internet.
Your best bet is to only log into websites that are secure.

Gravatar
Mar 20, 2014 at 2:09 AM Mack

I have successfully used a Logitech security system app to view my Logitech
home securrity system on the MG so the system work wwell enough to view live video streaming over my network.
The MG does look like a smartphone but iit has no cell phone hardware so you connect to the internet over your Wi-Fi connection to
download games and apps from the Google Play Store. Thee incident waas
reported byy a witness to the Milan police
who launched an investigation. If you have a film series or web series you need too fund,
Kickstarter. Most apps like this have the option to become a permanent background process.

Gravatar
Mar 20, 2014 at 3:12 AM gta 5 xbox 360 cheats codes cards

Lastly, Rockstar teases that they have much more still planned for GTA 5 and GTA
Online. Bejeweled Blitz is played by more than 10 millions of active monthly users.
'It is great that consumers anticipate our titles, like they anticipate the next James Bond film.
Although not new, it should be said that these bad boys are still used.
It would be a lot easier for everyone if the money glitches existed in the single-player game rather than
the online one.

Gravatar
Mar 22, 2014 at 4:47 PM Lincoln

They can easily misuse the sensitive data after
tracking down the password for Wi - Fi network.
It can also inform you if it sees some unusual activity on your
device. Here is how to recover your Wi-Fi router's password.
Turing deserves to be remembered and recognized for his fantastic contribution to the war effort and his legacy to science," British Justice Secretary Chris Grayling said. Note: Foor more on government corruption, see the deeply revealing reports from rrliable major media sources available here.

Gravatar
Mar 24, 2014 at 3:07 PM Amee

It also can permit hackers impersonate cellphone towers and
eavesdropp on peoples phone calls. Open networks aree
those at coffee shops or airports tat have no special security
on them or home or business networks tht do not use WAP2 encryption service for
their network. Follow me on Twitter and Facebook and Subscribe for the latest in television news.

Gravatar
Mar 25, 2014 at 5:26 AM how to hack wifi password app

Every now and then, I run across some technically deficient end user handing out free advice about wifi hacking secjrity based
on things overheard and half-understood. The HSPA+ apply the MIMO
technology for data transfer. Many businesses
have their ecommerce websites where their customers enter credit card numbers to make purchases.

Gravatar
Mar 27, 2014 at 2:03 PM cheats for gta 5 ps3 code

Furthermore, the single-player campaign of 'GTA 5'
is also getting new missions. Despite no official announcement coming from Take-Two
or Rockstar Games, the retailer is extremely confident that GTA 5 will release for PS4.
(Granted, AC III's cities were based in the 1700s when they were
a bit smaller, but still, Ubisoft and the Assassin's Creed series are competition for Rockstar and GTA.
Before being acquired by the publisher of 'GTA 5' in 2008, Rockstar New
England was known as Mad Doc Software. Likewise, many video game analysts expect GTA
5 to fiund its way to PS4, Xbox One, and PC during the 2014 calendar year.

Gravatar
Mar 28, 2014 at 4:21 AM gta 5 cars by price

After all, if everyone cheated, everyone would be on equal
terms again. While players normally only have access to experience
user-created content that was published on the
same console that they play on, Rockstar Verified mission
are made available on cross-platform for all tto enjoy.
The developer posted thee full patch notes for the new title update on March 4, which
comes packaged will all of the new content from The Business Update as well as a long lixt
of other changes to the popular open-world title.

Expenses such as building permits, professional services,
and equipment rentals are also eligible. Simjilar too the previous DLC
releases forr the fifth main installment of the 'Grand Theft Auto' series, the new pack will be available at no additional costs.

Gravatar
Mar 29, 2014 at 9:57 AM wifi hacker app s60v3

On OS X, it will be called "stealth mode" and be under
your firewall's advanced settings (see below).
These days, it's not uncommon for us to connect to Wi-Fi wherever we go.
Generally , an accepted method of keeping the hackers at bay is frequently changing passwords.
To use this facility the customers arrive at the website
of the bank where they have got their accounts.
A list of wi fi anti-hacking tools are found onn an IT site
from Canada.

Gravatar
Mar 29, 2014 at 12:31 PM Wifi Password Cracker

Technoloy will always be a two-edged sword, and will ever require
vigilance in policing its negative uses. The investigation found that 200 people unknowingly logged on to counterfeit Wi - Fi networks within an
hour, risking the revelation of their private financial information
to hackers. Also, never try loggin from the page that received byy someone, obviously any good friend.
This phrase signifies that an i - Phone owner will have the ability
to download several additional applications than what
is available at the normal store and can also mod their devices much further.

Draw a prank on a single of your friends aand submmit something
humorous as them on their wall structure.

Gravatar
Mar 29, 2014 at 1:47 PM cheats for gta 5

My spouse and I absolutely love your blog and find most of
your post's to be just what I'm looking for. Does one offer guest writers too write content for you personally?
I wouldn't mind commposing a post or elaborating on most of thhe
subjects you write concerning here. Again, awesome web log!

Gravatar
Mar 29, 2014 at 9:17 PM Salvatore

It's tremendously advised that gamers search for different online games determined by flash online.
Citing a report by Dual - Shockers from earlier this month, Rockstar
Games seemingly had intentions of showing somethuing at
the recent Destination Play - Station retailer event, but opted out from doibg so.
Rockstar Games hasn't announced any plans to bring GTA 5 to PS4, Xbox One, or PC at thios time.
In previous games you could easily outrun police by speeding away in
a linwar fashion. Set in a resemblance to Southern California,
the cities are set with a number of gangs, prostitution, and drug dealers,
itts hard to go a second in the game with out looking aat
some form of violence.

Gravatar
Apr 2, 2014 at 9:51 AM wifi unlocker free download

as you might guess the Bright Setting is going to burn up the battery
the fastest. The new Sec - Nav, who has only appeared on "NCIS" so far, assigned the team to find the molke that tipped the cartel off,
and that meant Kensi and Derks got to interview FBI Agents
Jenkins and Ambrose, CIA Agent Lowell, and NCIS Agent Carter, who had sleep apbea
thanks to his run-in with Kensi. Computer Peripheral equipment
(also commonly referred to as input - output devices), is any equipment wired or wireless that
might be used to give a computrr orr a set of computers
on a computer network more functionality or
capability. When the girls grew trays of garden cress next to wifi routers, they found
that most of tthe seedlings died. A MAC address is much like a serial number hard coded into all multilevel devices.

Gravatar
Apr 2, 2014 at 2:47 PM How to get free Rp and ip in league of legends

Great itens from you, man. I have be aware
your stuff previous to and you're just too fantastic.
I actually like what you have received here, really like what you're statong and
the best way in which you assert it. You make it enjoyable and you continue to care for to stay it sensible.
I can't wait tto learn much more from you. This is actually a wonderful website.

Gravatar
Apr 7, 2014 at 6:06 AM gta 5 cheats

We are a group a group of volunteers and opening a brand new
scheme in our community. Your web site offered us with helpful
helpful information and work on . You made ​​an impressive task
and our whole community will grateful to you .

Unquestionably Account which you said . Your favorite justification
appeared to be on the internet easy factor to understand of .
I tell you , i definitely get annoyed think worries
just do not recognize about . You controlled more than
intelligently as out on all managed to hit the nail on the top no need side-effects , others could take a signal.
Will probably be again to get more. Thanks

Gravatar
Apr 8, 2014 at 3:38 PM Celesta

As a cybercrime, phishing necessitates the make an effort too
defraud an online user by posing as a trustd entitry or by blatantly lying of a situation, which can compel the person
to send money or goods. To discover a Wi - Fi cafe or a positioon that has
noo cost Wi - Fi, they can explain to you from onn the lookout at
the symptoms at the front door or talk to them
if they have no cost Wi - Fi. Sometimes a virus might just corrupt
data and files so they're irreparable, and sometimes they might just mudd the waters of
your computer too slow iit down and become frustrating and irritating for its operator
(aka you). In a word, yes, yes there is, but when compared to a wired network the security risk is not nor should it be worth the
ability of individuals to walk around thhe house or office with a laptop
in one hand typing with the other. By entering a Username and Password they
can adcess their own account and by using yet anotheer password can
transfer money in or out of that account.

Gravatar
Apr 9, 2014 at 9:31 AM Eunice

HTTPS relies on a system of easy-to-forge certificates. Hiding throughout simple sight certainly,
there To they could be especially laying best
suited with you or simply just as much ass More than two
hundred legs option. In Windows: Open your Control Panel, then browse
to Network and Internet -> Network and Sharing Center, then click Choose Homegroup and Sharing Options -> Change Advanced Shaeing Settings.
Viruses that can make your computer crash can
also be loaded to your phone by tthe hacker making your cell phone
unusable. A school policy informing staff that storage devices should not bbe kept in cars away from school
premises was however in place.

Gravatar
Apr 16, 2014 at 9:23 AM howtohackwifipassword225.blogs.experienceproject.

Within this option, you will notice that the Default browser configuration
is set to your network. This can be useful when traveling in small cities
or areas of larger cities that don't have connectivity. WPA-PSK
also empllys a pre-shared key similar to WEP and still uses the RC4 algorithm for encryption.
You need a specialist for open source customization.
Bring miniature trips among food items, a biig pplus happens
to be ease of use.

Post New Comment

Comments which are spam, off-topic, abusive, or use excessive foul language will be deleted.
No HTML markup is allowed. URLs will be turned into links automatically. 3000 character limit.

If you want a small picture next to your comments, get a gravatar.

 
Fri, 18 Apr 2014 19:18:34 -0400

Subscribe to our newsletter to receive the latest Georgetowner updates.