Access
The station lies a little to the east of the town centre, across Otley Road, There is no access directly from Otley Road: pedestrian access from town is either via a tunnel at the bottom of Station Road, or from Stead Street onto platform 1. Vehicular access is from the side away from town, under the bridge and up a long cobbled drive from Briggate, and there is a large car-park between the main station and platforms 1/2.
There are no bus stops on the station forecourt: bus connections are either on Briggate/Leeds Road, or in the Market Square. Nor is there a taxi rank within the station: again, passengers need to go into the town centre.
Read more about this topic: Shipley Railway Station
Famous quotes containing the word access:
“A girl must allow others to share the responsibility for care, thus enabling others to care for her. She must learn how to care in ways appropriate to her age, her desires, and her needs; she then acts with authenticity. She must be allowed the freedom not to care; she then has access to a wide range of feelings and is able to care more fully.”
—Jeanne Elium (20th century)
“Knowledge in the form of an informational commodity indispensable to productive power is already, and will continue to be, a majorperhaps the majorstake in the worldwide competition for power. It is conceivable that the nation-states will one day fight for control of information, just as they battled in the past for control over territory, and afterwards for control over access to and exploitation of raw materials and cheap labor.”
—Jean François Lyotard (b. 1924)
“The Hacker Ethic: Access to computersand anything which might teach you something about the way the world worksshould be unlimited and total.
Always yield to the Hands-On Imperative!
All information should be free.
Mistrust authoritypromote decentralization.
Hackers should be judged by their hacking, not bogus criteria such as degrees, age, race, or position.
You can create art and beauty on a computer.
Computers can change your life for the better.”
—Steven Levy, U.S. writer. Hackers, ch. 2, The Hacker Ethic, pp. 27-33, Anchor Press, Doubleday (1984)