text stringlengths 59 1.12k |
|---|
1992). Seattle Weekly writer David Buerge described the timeless quality of life in the backstretch: "The backstretch, the world of stables and barns where trainers, grooms, and a host of |
other supporting characters played out this rustic drama, maintained a strong family feeling. Association with the track often spanned generations, and common hopes and needs bound everyone together. Typically, the |
backstretch awoke each morning when the grooms fed their horses and exercise boys led them out for a gallop. ... What the place lacked in amenities it made up for |
in romance" (August 19, 1992, p. 26). The track closed to live racing on September 21, 1992. The Seattle Post-Intelligencer reported, "Before the last race, announcer Gary Henson told the |
crowd, 'These horses belong to you. Listen to their final thunder.'" Then, for probably the first time in track history, the race was run in silence, without Henson's customary calls. |
(September 22, 1992). More than 23,000 fans crowded the stands to see Native Rustler, ridden by jockey Gary Stevens, win the final race. Boeing redeveloped the northern portion of the |
property into a large Customer Service Training Center. In December 1994, the City of Renton granted Boeing permits to demolish the Longacres grandstand and dozens of horse barns, sheds and |
other outbuildings. Demolition began immediately. Only the tall poplars trees that once edged the racetrack remain to mark the former location of Longacres. Miriam Sutermeister, B. Marcus Priteca, Shaping Seattle |
Architecture: A Historical Guide To Architects, ed. by Jeffrey Karl Ochsner (Seattle: University of Washington Press, 1998); Deloris Tarzan Ament, Iridescent Light: The Emergence Of Northwest Art (Seattle: University of |
Washington Press, 2002), p. 74; Shelby Scates, Warren G. Magnuson and the Shaping of Twentieth-Century America (Seattle: University of Washington Press, 1997); David Grant Best, Portrait of a Racetrack (Redmond, |
Washington: Best Editions, 1992); "Morrie Alhadeff, the 'Squire of Longacres,' Dies," Seattle Post-Intelligencer, November 9, 1994, p. A-1; Lenny Anderson, "Longacres Hits Age 50 Today," Ibid., August 3, 1983; "Looking |
Back," Ibid., September 17, 1992; "Longacres Race Track: 1933:1992 The Homestretch," Ibid., September 17, 1992; Steve Rudman, "Hard Times Hit Horse Racing," Ibid., March 27, 1985; Darrell Glover, "1991 Is |
Last Season For Longacres," Ibid., February 6, 1991; "Longacres' New Television Center Ultra-Sophisticated," Ibid., August 15, 1971; Lenny Anderson, "Wall-to-Wall Fans And A Blaze of Glory On The Final Day," |
Ibid., September 22, 1992; "Fast Field To Offer Thrills At Longacres," Ibid., August 2, 1933; Bob Schwarzmann, "Gottstein's Ideal Race, The Mile Is Special," Ibid., August 25, 1985; Lenny Anderson, |
"Computer Betting Coming To 'Acres," Ibid., April 5, 1981; E. B. Fussell, "Horse-Racing Bill Signed By Gov. Martin," Ibid., March 4, 1933; Joe Hernandez, "Horse Racing Starts Today At Longacres," |
Ibid., August 3, 1933; Bob Schwarzmann, "Joe Gottstein: Even the Rain Wouldn't Dare Fall," The Seattle Times, January 2, 1971; Bob Schwarzmann, "Slew's Here! Triple Crown Winner Given Police Escort," |
Ibid., July 7, 1977; Dick Rockne, "The History of Horse Racing In Sound Area," Ibid., June 16, 1996; George Erd, "Longacres Stand, Structures May Start Falling Today," Valley Daily News, |
December 7, 1994; Eric Lucas, "Getting Free Of the Bonds Of Slow Earth," Ibid., September 20, 1992, p. A-13; "Horse Racing: An Act relating to, providing for and authorizing" (March |
3, 1933) RCW Ch. 55; John McGrath, "Alhadeff: No Race Like The Mile," The Tacoma News Tribune, August 22, 1999, p. C-1; "Prohibiting Race Track Gambling: An Act relating to |
The Making and Unmaking of Joe Gottstein's Track of Dreams," Seattle Weekly, August 19, 1992, p. 20; Bruce Batson, "Longacres: The First Ten Years," The Washington Horse, April 1983; Bruce |
Batson, "Longacres: 1943-52," Ibid., May 1983; Bruce Batson, "Longacres: 1953-62," Ibid., June 1983; Bruce Batson, "Longacres: 1963-72," Ibid.,, July 1983; Bruce Batson, "Longacres: 1973-82," Ibid., August 1983; The Miracle Strip: |
A Story of Longacres Race Track, directed by Stephen Sadris (Perpetual Motion Pictures, 1993); Dan Mearns, Seattle Slew (Lexington, Kentucky: Eclipse Press, 2000), p. 14. < Browse to Previous Essay |
Browse to Next Essay > Licensing: This essay is licensed under a Creative Commons license that encourages reproduction with attribution. Credit should be given to both HistoryLink.org and to the |
author, and sources must be included with any reproduction. Click the icon for more info. Please note that this Creative Commons license applies to text only, and not to images. |
For more information regarding individual photos or images, please contact the source noted in the image credit. Major Support for HistoryLink.org Provided By: The State of Washington | Patsy Bullitt |
of Tacoma | King County | The Peach Foundation | Microsoft Corporation, Other Public and Private Sponsors and Visitors Like You Opening day advertisement for Longacres racetrack, August 13, 1933 |
Courtesy Seattle Post-Intelligencer Longacres racetrack clubhouse and grandstand, Renton, 1935 Courtesy MOHAI (Neg. No. P-I 1986.5.5318.2) Joseph Gottstein and William Edris, Seattle, 1935 Courtesy MOHAI (Neg. No. P-I WA51319) Aerial |
view of Longacres racetrack and Kent Valley, August 29, 1939 Courtesy UW Special Collections (Neg. P-I 1983-10-17928) Racing fans at Longacres, Renton, 1939 Courtesy UW Special Collections (Neg. P-I 23501) |
Morris Alhadeff (c.) and Joseph Gottstein (r.) outside Coliseum Theater, Seattle, 1967 Courtesy MOHAI (Neg. No. P-I 1986.5.12632.1) Longacres Racetrack, Renton, 1960s Paddock at Longacres, Renton, 1960s Longacres racetrack, Renton, |
1970s Seattle Slew, running at Longacres to support cancer research, 1977 Courtesy Washington Thoroughbred Breeders Association Longacres Park Jockey Building, Renton, May 1983 Photo by Tom Bartlett, Courtesy UW Special |
This course includes the e-book Foundations of Physical Activity and Public Health. The e-book format allows readers to bookmark, highlight, and take notes throughout the text. The e-book is accessed through a link embedded in the online course. Developed with the American College of Sports Medicine (ACSM) and the National Society of Physical Activity Practitioners in Public Health (NSPAPPH), this interactive online course will |
help you prepare for the Physical Activity in Public Health Specialist (PAPHS) certification exam. It’s also a perfect resource for health and fitness professionals looking to better understand the role of physical activity in public health. The course addresses six core competencies: partnerships, data and scientific information, planning and evaluating, intervention, organizational structure, and exercise science in public health settings. Featuring detailed case studies |
and real-world scenarios, it will help you develop your decision-making and problem-solving skills. Course for those preparing for the ACSM/NPAS Physical Activity in Public Health Specialist (PAPHS) exam; continuing education resource for health promotion specialists, public health practitioners, fitness professionals, and others interested in health promotion, especially at the population level. American College of Sports Medicine Council on Professional Standards for Kinesiotherapy |
A Quilt tells a storySince traditional quilts are usually created for a specific need and many have a social function, most quilts tell a story. A bridal quilt tells one such story, and exists in various forms all around the world.In Sweden, the oldest preserved bridal quilt can be traced back to the 18th century, passed down in the same |
family. In those days, the fabric was taken from quilted bonnets and shawls brought home from distant countries by their seafaring husbands. The bridal quilt was made a few days before the wedding, and all the women in the family were involved. The colorful shawls from the bride’s youth could be used for the bridal quilt since she would be |
dressing in more sober colors, preferably black, as a married woman.New World immigrants brought their traditions with them. The quilt in this picture, a typical star pattern (Touching Stars), is from the USA. It was made as a bridal quilt in 1963 in San Antonio, Texas, by eight women in a family, all gathered round the quilt frame. Three generations |
worked together to further the tradition that their ancestors had brought with them from Germany in the mid-19th century. The bride herself, Karey Bresenhan, remembers her grand-mother’s advice: “Now girls, learn to take real pretty little stitches ... because you’re going to wake up every morning of your life and look at them.” |
Examining Ancient Manuscripts in a Digital Age New imaging systems which will enable a more in-depth study of ancient artefacts will be available within a year. Dr Kirk Martinez at the University of Southampton’s School of Electronics and Computer Science (ECS) and Dr Graeme Earl at the School of Humanities are working on new technology for the digitization of ancient |
objects and documents to develop a Reflectance Transformation Imaging (RTI) System for Ancient Documentary Artefacts. RTI technology enables the capture of detailed surface properties from high-resolution still or video images. The RTI systems developed by the project will allow researchers to study documentary and other artefacts remotely in great detail without being restricted by fixed lighting angles. The result will |
be to ensure that high-quality digital versions of these materials can be consulted by scholars worldwide. “For example, we are going to take documents which were written by Roman soldiers on wooden tablets and find ways to allow people to study the writing,” said Dr Martinez. “Instead of having just one flat picture for people to look at, they will |
be able to use light to explore the images in greater detail.” The 12-month project, which is funded by the Arts and Humanities Research Council under the Digital Equipment and Database Enhancement for Impact scheme, is a collaboration between ECS and the University of Southampton Archaeological Computing Research Group, with Alan Bowman and Charles Crowther at the Centre for the |
Study of Ancient Documents, and Jacob Dahl at the Faculty of Oriental Studies, all at the University of Oxford. In the course of the next year, the team will develop a number of RTI systems to capture images of documentary texts and archaeological material. In the piloting phase of the project, which will begin in late summer, the project team |
will test RTI technology on a selection of documents including Vindolanda stilus tablets, stone inscriptions, Linear B and cuneiform tablets in the Ashmolean Museum, Oxford, and cuneiform tablets in other collections across the UK. They will also experiment with the tool on archaeological materials from important collections all over the world. Image: Amazon Head investigated using HP Labs polynomial texture |
Scientific Name: Pogonia ophioglossoides (L.) Ker. Common Name: Rose Pogonia or Snakemouth Plant gabrous, slender, 0.8-7 dm tall, propagating by means of root shoots. Stem green or brownish green. Leaf solitary, about halfway up the stem, ovate to elliptic or |
widely ovate-lanceolate, 2-12 cm long, 1-3 cm wide, obtuse to subacute. Floral bract foliaceous, oblong-elliptic to oblong lanceolate, 1-3 cm long, 3-8 mm wide. Flowers 1-3, terminating the stem, rose to white, of several days' duration, fragrant; sepals and petals |
oblong-elliptic to elliptic-obovate to linear-lanceolate, 13-27 mm long, 3-11 mm wide, widely rounded at apex; lip narrowly oblong-spatulate, 1.5-2.5 cm long, 8-10 mm wide near apex, narrowed at base, lacerate-toothed along apical margin, predominantly bearded along 3 central veins of |
the disc with short, fleshy, yellow-white bristles; column ca. 1 cm long, apically toothed. Capsule ellipsoid, 2-3 cm long. (n=9). May-June. Open bogs and seepage slopes. Infrequent. Rare in piedmont and mountains of N.C. You can see more information on |
this family, from the DELTA collection, on the Biodiversity and Biological Collections server, at the University of Kansas. To visit their server, use the triangular link below. Visit the DELTA Home Page Back to the Photo Gallery Back to the |
Hurricane and Emergency Preparation Hurricane Season runs June 1 through November 30. We should be careful not to let the last couple of years without storms lull us into complacency when it comes to hurricane preparation. Make plans with your family to prepare for a hurricane and other types of emergencies. Part I: Water, Food, and Supplies Start by designating |
an area in your home (a few shelves or plastic storage bins) for emergency food and supplies. Using storage bins will allow the supplies to be easily transported, should you have to leave your residence. Click here for a checklist that includes food, water, tools, gear, and other supplies. Having these items stored together is particularly important for use during |
an emergency that cannot be forecasted. Part II: Make a Family Emergency Plan Creating an emergency plan can protect your family in the event that disaster strikes your community or your home. Start by evaluating potential manmade and natural threats to your community and determining how they could affect your family. Create a plan for each type of emergency and |
share it with your family members. When creating your family plan, consider the following: - Identify the safest areas of your home for different types of threats. (Choose a room with no or small exterior openings for windstorms.) - Plan an escape route from your house and choose a place to meet, such as a neighbor's home. (This is an |
important part of fire safety.)Designate an out-of-area contact. - Choosing a friend or family member will give your extended family members and friends one point of contact. - Use the document checklist on page 3 of the Family Planand keep copies of these important documents in a waterproof, portable container. Make a plan for your pets. Add a three-day supply |
of food and water for your pet, along with needed medications, to your emergency supplies. Keep your pet's vaccination record with your important documents. Identify friends' or family members' homes or hotels, both locally and out of the area, in case your family must evacuate your home. Pet owners should also locate options that allow pets. Part III: Important Forms |
and Documents If you were evacuated from your house due to a disaster, what phone numbers and documents might be important to have with you? Insurance documents, information on your medication, phone numbers for your doctors, family, and neighbors, and local emergency numbers would be beneficial. Click here for the Family Plan for Disaster & Emergencies to guide you in |
gathering this important information. This helpful resource provides a checklist of documents that you should make copies of to keep in a waterproof, portable container. The plan also includes a place to write in important phone numbers that you may need during and after an emergency. Use the First Aid checklist to help you prepare a kit for your home |
and one for each of your vehicles. Part IV: When a Storm Occurs If a storm does occur, consider this important information: - Have a corded phone that does not require electricity to use during a power outage. - Monitor local media for flood/storm watches, warnings and evacuation announcements. - If flooding occurs, do not drive through or wade in |
floodwater. As little as one foot of moving water can move most cars off the road, and just six inches of fast-moving floodwater can sweep a person off his/her feet. Although standing water is tempting for children to play in, it can be unsafe, as it can hide dangerous debris and snakes. Stop by Public Safety at either the main |
Online Identity Protection Identity Theft encompasses a list of crimes, from unauthorized purchases on your credit card and withdrawals from your bank accounts to apartments leased in your name and |
defaulted loans marring your good credit. Approximately 9 million American identities are used fraudulently each year. That's about 4% of the adult population. Safeguarding yourself against identity theft is a |
good idea. Identity thieves gather personal information, such as your name, Social Security number, address, credit card number, or account passwords. They use that information, in a variety of ways, |
to steal money for which you are held responsible. The key to limiting your risk of identity theft is to keep your personal information as private as possible. Sources offer |
a variety of suggestions for specific actions, most of which fall into these categories: - Keep printed information out of other people's hands. - Keep electronic information secure. - Don't |
respond to queries from unknown sources. The best way to keep someone from stealing printed information is not to print it in the first place. Don't have your Social Security |
number, phone number, or driver's license number printed on your checks. Any time you are asked to provide your Social Security number, ask that a different identification number be used, |
instead. If a creditor will provide your statements online, take advantage of the offer; pay your bills electronically, as well. (Take steps to keep your computer secure, however, as described |
in the following section.) Invest in a paper shredder -- they can be purchased for as little as $29.99. Before you recycle account statements, paid bills, cancelled checks, credit offers |
-- anything containing your signature, Social Security number, medical or legal information, or any of your account numbers -- shred them. Shred old credit cards, or cut them up with |
scissors, and cancel all credit cards that you don't use. If you do pay your bills by mail, don't leave them in an unlocked mailbox or an office out box; |
deposit them in a secure mail slot. Consider installing a lock on your mailbox or get a P.O. box, so that incoming mail is secure, as well; at the very |
least, know when you're expecting new checks or credit cards to arrive in the mail, and be sure to notify the financial institution if the delivery is late. Carry as |
little personal information in your wallet or purse as necessary. If you can leave your checkbook at home, do so. Don't carry your Social Security card, and if you can |
do without your health insurance card, leave that out, too. Keep electronic information secure. Personal computers provide a convenient means for paying bills, viewing account statements, and conducting bank transactions. |
They can be a particularly safe means, as well, since they circumvent the "paper trail" of objects that identity thieves can take from your mailbox or your trash bin. Without |
proper protection, however, electronic information is susceptible to theft. If you're technically proficient, you may be able to implement the following recommendations yourself; if not, you may find it well |
worth a small expense to hire a professional to install these safeguards and show you how to maintain them. Firewalls and virus protection programs, updated as often as their manufacturers |
make improvements available, provide blanket protection for your files. In addition, many experts recommend password-protecting sensitive files. When you create passwords to access your private information online, don't be lazy: |
it's easiest for you, of course, to invent one simple, unchanging password and use it for all your accounts. But, by the same token, it's not so hard for a |
thief to discover that password either. Create different passwords for each of your accounts, and change them every 30 to 60 days. Don't construct your password from information a thief |
can find elsewhere, like your mother's maiden name, a portion of your Social Security number, or your phone number. Use combinations of upper-case letters, lower-case letters, digits and special characters. |
Secure the network, whether wired or wireless, that you use at home or at work, so that thieves can't access your computer through your network. Change your network connection settings |
so that you don't connect automatically to any available open network. If you do choose to use a public, open network -- the type that's available for your convenience in |
many coffee shops, airports, hotels, and other public places -- be careful what you transmit: don't shop, bank, or conduct any other activity that involves personal information over an open |
network. When you do shop online -- always over a secured network -- only use sites that provide transaction security protection. An additional safeguard for online purchases is to open |
an additional checking account just for your online purchases. Deposit only what you plan to spend for your online purchases into this account. If this account is compromised, you will |
only have to close this particular account and not an account that is connected with your mortgage auto-pay, direct deposit, etc. Beware of file-sharing and file-swapping programs; don't use them |
at all when you're connected to an open network. And, before you sell, trade or donate an old computer, use a "wipe" utility to erase data -- don't count on |
simple deletion of files to remove all personal information. Don't respond to queries or offers from unknown sources. Stories abound of particular scams used to steal identities through e-mail or |
by telephone. Despite the myriad of schemes employed, the advice on handling them is always the same: no matter how legitimate the source appears to be, do not provide personal |
information requested in an e-mail or telephone call. Legitimate financial institutions will never contact you requesting your personal information. If you receive such a request, do not respond to it. |
Instead, contact your financial institution and tell them about the phony request. Early detection of identity theft is very important. With most banks and credit card companies, you can view |
your accounts online: all charges and payments for the month, or deposits and withdrawals, as well as your current balance. We recommend that you use these online services (on a |
properly protected computer, of course). If you prefer to use paper, know when to expect your bills and statements to arrive. If they're more than a few days late, contact |
the financial institution: identity thieves may have changed the address on your account in the hopes that you would forget to monitor activity if you weren't reminded by a statement |
or bill arriving in the mail. However you view your statements, check them to be sure all entries are correct, and notify your financial institution immediately of any charges you |
believe you didn't make. If, after checking with your financial institution, you believe that fraudulent charges have been made to your account, take steps to report the crime. Monitoring bank |
and credit card activity enables you to catch identity thieves who are accessing your existing accounts. Thieves may also use your identity, however, to open new accounts or incur new |
debts in your name. These liabilities aren't detectable immediately, but you can find them once the bills are overdue, by checking your credit report. By law, you're entitled to one |
free credit report per year from each of the three major reporting agencies: TransUnion, Equifax, and Experian. We recommend staggering those three reports throughout the year, so that you receive |
one every four months. Order your credit reports from the following agency: THIS IS A NOTICE REQUIRED BY LAW. Read more at consumerfinance.gov/learnmore. You have the right to a free |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.