Tiananmen Square - Access

Access

The Square, located in the center of the city, is readily accessible by public transportation. Line 1 of the Beijing Subway has stops at Tiananmen West and Tiananmen East, respectively, to the northwest and northeast of the Square on Chang'an Avenue. Line 2's Qianmen Station is directly south of the Square.

City bus routes 1, 5, 10, 22, 52, 59, 82, 90, 99, 120, 126, 203, 205, 210 and 728 stop north of the Square. Buses 2, 5, 7, 8, 9, 17, 20, 22, 44, 48, 53, 54, 59, 66, 67, 72, 82, 110, 120, 126, 301, 337, 608, 673, 726, 729, 901, 特2, 特4 and 特7 stop to the south of the Square.

Read more about this topic:  Tiananmen Square

Famous quotes containing the word access:

    Power, in Case’s world, meant corporate power. The zaibatsus, the multinationals ..., had ... attained a kind of immortality. You couldn’t kill a zaibatsu by assassinating a dozen key executives; there were others waiting to step up the ladder; assume the vacated position, access the vast banks of corporate memory.
    William Gibson (b. 1948)

    The last publicized center of American writing was Manhattan. Its writers became known as the New York Intellectuals. With important connections to publishing, and universities, with access to the major book reviews, they were able to pose as the vanguard of American culture when they were so obsessed with the two Joes—McCarthy and Stalin—that they were to produce only two artists, Saul Bellow and Philip Roth, who left town.
    Ishmael Reed (b. 1938)

    The Hacker Ethic: Access to computers—and anything which might teach you something about the way the world works—should be unlimited and total.
    Always yield to the Hands-On Imperative!
    All information should be free.
    Mistrust authority—promote decentralization.
    Hackers should be judged by their hacking, not bogus criteria such as degrees, age, race, or position.
    You can create art and beauty on a computer.
    Computers can change your life for the better.
    Steven Levy, U.S. writer. Hackers, ch. 2, “The Hacker Ethic,” pp. 27-33, Anchor Press, Doubleday (1984)