53 research outputs found

    The great western land pirate : John A. Murrell in legend and history

    Get PDF
    Includes indexBibliography: page 182-191John A. Murrell lived in Tennessee when Andrew Jackson was president. According to legend, he was an able man who had been raised to be a rascal by his unscrupulous mother. Flogged and imprisoned as a youth, he swore eternal vengeance against the society that had punished him. He became a highwayman and merciless killer, a horse thief, counterfeiter, and slave stealer. He often disguised himself as a clergyman and preached to congregations while confederates stole their horses. He scattered counterfeit money like confetti. This research was undertaken in a skeptical spirit akin to that of Marshall many years ago. This book is about the legend and about what really happened, but only in a secondary sense is its purpose to set the record straight. How was an indifferent thief transformed into a master criminal?The legend of John A. Murrell -- The historical Murrell -- A wholesale rascal: Stewart's Murrell -- The clan -- Rawhead and bloddy bones: the enlargement of Murrell -- THe Murrell conspiracy -- Virgil A. Stewart and the crisis -- Murrell's head -- A notorious scamp -- Essay on sourcesDigitized at the University of Missouri--Columbia MU Libraries Digitization Lab in 2012. Digitized at 600 dpi with Zeutschel, OS 15000 scanner. Access copy, available in MOspace, is 400 dpi, grayscale

    Dynamic Thermal Structure of Imported Fire Ant Mounds

    Get PDF
    A study was undertaken to characterize surface temperatures of mounds of imported fire ant, Solenopsis invicta Buren (Hymenoptera: Formicidae) and S. richteri Forel, and their hybrid, as it relates to sun position and shape of the mounds, to better understand factors that affect absorption of solar radiation by the nest mound and to test feasibility of using thermal infrared imagery to remotely sense mounds. Mean mound surface temperature peaked shortly after solar noon and exceeded mean surface temperature of the surrounding surface. Temperature range for mounds and their surroundings peaked near solar noon, and the temperature range of the mound surface exceeded that of the surrounding area. The temperature difference between mounds and their surroundings peaked around solar noon and ranged from about 2 to 10°C. Quadratic trends relating temperature measurements to time of day (expressed as percentage of daylight hours from apparent sunrise to apparent sunset) explained 77 to 88% of the variation in the data. Mounds were asymmetrical, with the apex offset on average 81.5 ± 1.2 mm to the north of the average center. South facing aspects were about 20% larger than north facing aspects. Mound surface aspect and slope affected surface temperature; this affect was greatly influenced by time of day. Thermal infrared imagery was used to illustrate the effect of mound shape on surface temperature. These results indicate that the temperature differences between mounds and their surroundings are sufficient for detection using thermal infrared remote sensing, and predictable temporal changes in surface temperature may be useful for classifying mounds in images

    Athenz: an open-source foundation for secure infrastructure

    No full text
    Authentication and authorization for humans is, more or less, a solved problem. However, how do you trust the identity of the hosts (instances) in your cloud? How can you be assured that in a world of man-in-the-middle attacks (arp spoofing, dns cache poisoning, etc) that a given instance really is who it claims to be? And how can we do this without requiring any manual intervention on the part of a human. At Oath, we’ve leveraged the power of Open Source to solve exactly this problem. We have developed and open sourced a service authentication and authorization system called Athenz. By leveraging the strengths of OpenStack and Athenz, we’ve created a solution called ‘Copper Argos’ to provide attestable identity in the form of a unique short lived x509 and SSH host certificate for every single instance in our cloud. In this talk we will describe the value and design of this system and its components as well as the potential it unlocks. About the speakers James Penick, IaaS/Cloud Architect, 13 years at Oath designing and building infrastructure with an eye on practical solutions for security and scale. Ric Allinson, VP IaaS, 12 years at Oath building industry leading solutions for Search, Big Data, Presentation &amp; Messaging Platforms, Membership, Edge, and Infrastructure. Together they've seen things you people wouldn't believe. NFS mounts spanning oceans. We've watched lead power junction blocks glitter and melt near a Hadoop cluster calculating pi. We share our experiences so those moments will not be lost in time, like tears in rain. Time to dynamically build infrastructure.</p

    The politics of American science 1939 to the present

    No full text
    vii, 287 p.; 23 cm

    A COMPUTER PROGRAM DESIGNED TO IDENTIFY BEHAVIOR PATTERNS IN OBSERVATIONAL DATA

    No full text
    The technique of macroanalysis has been developed to facilitate the process of examining patterns of behavior. In this technique, sequentially recorded observational data are computer-analyzed in units of three or more codes. Behavior patterns that have been identified from observational data are collected so that the sequence of individual behaviors (codes) is preserved. The analyst decides the pattern length, which may vary from groups of one to five or more successive codes in the data. He/she also has the option of formulating patterns which include repetitive codes or of collapsing the repetitive codes. Collapsing codes reduces strings of repetitive codes into a single code. The following kinds of information are provided in the pattern analysis: pattern identification, listing options according to frequency or beginning character in the pattern, frequency and percentage of patterns, and raw data when the collapsing option is specified. User information, summary sheet of program options, and a sample printout are included

    James H. Penick collection

    No full text
    This collection contains documents, printed material and photographs from the life and work of James H. Penick

    Ethics Simulation in Global Health Training (ESIGHT)

    Get PDF
    Introduction Many health care trainees and providers have reported feeling unprepared for the ethical dilemmas they faced while practicing in global health. Simulation is an effective teaching modality in the training of health care professionals. This resource describes the development, implementation, and assessment of an innovative simulation training program for global health ethics. Methods We conducted simulation training with trainees and professionals from various health care disciplines. After a didactic component in which general ethical principles were introduced, participants acted as either lead or observer in four simulations representing different ethical challenges. Participants interacted with simulated patients within a set designed to resemble a resource-constrained environment. Data on the participants' experiences and evaluations of the program's effectiveness were collected through pre-/postsession surveys and focus groups. Results All 53 participants (100%) agreed that the simulations “effectively highlighted ethical dilemmas I could face abroad,” and 98% agreed that the content “was useful in my preparation for an international elective.” Responses from surveys and focus groups stressed the importance of the realistic and emotional nature of the simulation in increasing confidence and preparedness, as well as a preference for simulation as the modality for teaching global health ethics. Discussion Simulation for global health ethics training can help to raise awareness of the complex ethical challenges one may face abroad. Incorporating simulation training within broader global health curricula can improve trainee preparedness and confidence in appropriately and effectively identifying, strategizing, and navigating through ethical dilemmas in the field
    • 

    corecore