569 research outputs found
Review of \u3ci\u3eValentine T. McGillycuddy: Army Surgeon, Agent to the Sioux\u3c/i\u3e by Candy Moulton
Valentine T. McGillycuddy is not famous, but he should be. His presence at many critical events in the 1870s and \u2780s compelled Candy Moulton to write this engaging biography. McGillycuddy worked as a doctor and surveyor on the Northern Boundary Survey and the 1875 Newton-Jenney Expedition into the Black Hills. He tended wounded soldiers as an army surgeon during the war with the Lakotas and Cheyennes in 1876 and served as an Indian agent on the Pine Ridge Reservation from 1879-86. He brushed shoulders with such iconic western figures as Calamity Jane, William F. Cody, Marcus Reno, Red Cloud, and Crazy Horse, the latter a good friend whom he tried desperately, but unsuccessfully, to save following the tragic confrontation with U.S. soldiers at Fort Robinson
Review of \u3ci\u3eValentine T. McGillycuddy: Army Surgeon, Agent to the Sioux\u3c/i\u3e by Candy Moulton
Valentine T. McGillycuddy is not famous, but he should be. His presence at many critical events in the 1870s and \u2780s compelled Candy Moulton to write this engaging biography. McGillycuddy worked as a doctor and surveyor on the Northern Boundary Survey and the 1875 Newton-Jenney Expedition into the Black Hills. He tended wounded soldiers as an army surgeon during the war with the Lakotas and Cheyennes in 1876 and served as an Indian agent on the Pine Ridge Reservation from 1879-86. He brushed shoulders with such iconic western figures as Calamity Jane, William F. Cody, Marcus Reno, Red Cloud, and Crazy Horse, the latter a good friend whom he tried desperately, but unsuccessfully, to save following the tragic confrontation with U.S. soldiers at Fort Robinson
Recommended from our members
"Dal'she deistvovat budem my" : the evolution of Viktor Tsoi's sociopolitical commentary during Perestroika
textThis report examines the themes presented over the course of Viktor Tsoi's (1962-1990) career during the 1980s. During his nearly 10 year career, the themes and sociopolitical messages of his music change drastically in specific areas, while remaining consistent over the duration of his career in other thematic areas. This change in thematic focus is most marked shortly after the introduction of the Glasnost reform by General Secretary Mikhail Gorbachev in 1985. The majority of his early work (1981- 1985) was overtly politically neutral, and those songs that did have a political statement layered into them did so in a subtle way, often commenting on sociopolitical problems through the lens of social issues such as feelings of isolation and disillusionment. These works tended to focus on fairly commonplace, though widely relatable, themes such as love, social isolation, and the search for meaning in life. Although these are not the works he would come to be most remembered for, and they initially received mixed reactions, there are critics who feel that these pieces render Tsoi's greatest and most personal messages. With the advent of Glasnost following Mikhail Gorbachev's appointment to General Secretary, Tsoi's music became much more politically charged, and music premiered at festivals and in films carried direct political themes, although it took a slightly longer time for these works to appear in published albums. The messages presented in these later works focused on the atmosphere of political and social upheaval present in the Soviet Union, the identity and strength of the young generation, and on the need for youth to call for political change in their country. This timely and identifiable message is a major reason for the massive success of the later part of his career, and part of the reason he and his work are still remembered and treated with respect more than a generation after his death.Russian, East European, and Eurasian Studie
Time theft: exposing a subtle yet serious driver of socioeconomic inequality
Socioeconomic inequality is perpetuated and exacerbated by an overlooked yet serious epidemic of time theft: the act of causing others to lose their time without adequate cause, compensation, or consent. We explain why time theft goes unnoticed, how it drives socioeconomic inequality, and what businesses and policymakers can do to address it
CAS : student engagement requires unambiguous advantages
Encouraging students to develop effective use of Computer Algebra Systems (CAS) is not trivial. This paper reports on a group of undergraduate students who, despite carefully planned lectures and CAS availability for all learning and assessment tasks, failed to capitalize on its affordances. If students are to work within the technical constraints, and develop effective use of CAS, teachers need to provide assistance with technical difficulties, actively demonstrate CAS\u27 value and unambiguously reward its strategic use in assessment.<br /
Enhanced Security for Preventing Man-in-the-Middle Attacks in Authentication, DataEntry and Transaction Verification
There is increasing coverage in the literature highlighting threats to online financial systems. Attacks range from the prevalent reverse social engineering technique known as phishing; where spam emails are sent to customers with links to fake websites, to Trojans that monitor a customer’s account log on process that captures authentication details that are later replayed for financial gain. This ultimately results in loss of monetary funds for affected victims. As technological advances continue to influence the way society makes payment for goods and services, the requirement for more advanced security approaches for transaction verification in the online environment increases. This paper has three main purposes. The first is to detail the current threats and vulnerabilities to online financial systems and in particular online banking, from the selected literature. The second is to present the known prevention techniques for protecting against these attacks. The third is to present a conceptual model for authentication, data entry and transaction verification. It is suggested that the design adds another layer of security to existing methods to either prevent a MitM attack or to make the procedure of capturing and reassembling customer log on and transaction details more computationally and time intensive than what it is worth to an attacker. The model is based on a graphical authentication application previously developed called Authentigraph
Involuted Matter
Rather than functioning as an icon, Involuted Matter dissolves into the background of commercial construction, conceals difference at the envelope, and orchestrates a succession of alternate environments. Accepting the unifying neutrality of a larger framework this project articulates difference at the individual site. But unlike iconic projects, the real force of this thesis unfolds through the interior. Identity is formed not at the level of district, but is centered on the individual occupation of a specific place.
The program for this project is a jimjilbang or Korean Bath House. The jimjilbang has the potential to become a new form of collective space not typical of the American metropolis. The bath house is simultaneously an intimate and egalitarian public venue and a private center for personal well being. Immersed in the same waters and ambient environments, clothed in matching jimjilbang attire, a plurality of classes, age groups, and social values congregate around a common program
- …