01 June 2010 by Published in: Battlefield preservation 4 comments

Today, I spoke to the owner of Headless Billy, who is the owner of the shopping center where Headless Billy resides. He informed me that it has always been his plan to repair Bill and to restore him to capitation and two-handedness. He also said that he plans to hold some sort of a dedication ceremony once the monument has been repaired. Finally, he indicated that he plans on sprucing up the area where Billy resides. All of that news really pleased me because all I have wanted since I discovered the presence of Headless Billy was to see him restored to dignity and to see him back in the public eye. All of that will happen.

I gave the owner Terry Jones’ contact information for the repairs, and told him about Ohio’s upcoming sesquicentennial of the Civil War programs, and he indicated that he would like to see Headless Billy’s re-dedication as part of the Sesquicentennial. I told him that I would be happy to try to help make that happen since I am a member of the Commission.

I will now sit back and watch, as I am confident that Headless Billy is in good hands and that his present steward has only Billy’s best interests in mind. I will keep you all posted as to his progress.

Scridb filter

Comments

  1. Wed 09th Jun 2010 at 4:39 am

    Nicely done, Eric, and good timing. Now you’ve given the owner a target date to meet, and let him know interested others will be anticipating repairs. Obviously, his spending (more) money on the statue was not a top priority, and there was no reason for that to change anytime soon.

    I wonder who has the head.

    David

  2. Fri 01st Nov 2013 at 10:52 am

    I don’t even know how I ended up here, but I thought this post was good.
    I don’t know who you are but definitely you are going to a famous
    blogger if you are not already ;) Cheers!

  3. Thu 20th Nov 2014 at 11:45 am

    Defense against Ch?turbate Token Hack and other sensitive information
    As the requirement for dependable and commanding secu?ity gains impo?tance and the principles and r?quirements set by th? Pa?ment Card Industry ?rogress to meet that need,
    the requirement for cutting e?ge resolutions will also upsurge.
    As hacker? find new wa?s to blunder tokens in a system like Chaturbate Token Hack, fresh ways to safeguard sensitive information al?o requires development.

    The se?urity fla?nts that are use?
    Conventional security is ?howing its dra?backs and proving itself to ?e inadequat? in this digital age which are used in the present scenario.
    This is becoming more and mo?e obvious as m?st people get more news about corporations that
    have been s?ffering from a hole of some kind or the
    other ???arding safety issues. Often thos? firms have been under
    the fact t?at mee? encryption is sufficient to defend sensitive
    token and other data like credit card data on their own sites.
    Unluckily, chaturbate token generator has lately become
    obvio?s th?t the c?ncept is not true anymore.

    In thi? scenario free chatur?ate tokens are one of the
    most essential prospects of this tool. Very frequ?ntly the data safety procedures are exploited or inadequately m?naged, and
    h?ckers can get a gri? over the encryption secrets or f?nd ?ther glitches and ca?se serious destruction and obvious dist?ess.

    Cre?it card tokenization is sw?ftly flattering one of
    the finest ways to contrivance proper safety and reach PCI
    obedience. The procedure works in this way, like a ?redit card, a token ?r debit card
    or ?ny other payment technique is used in a money tr?nsaction, either on the web or any other ?lectronic mean, and the original data is sent to the company
    which a?tually provides th? tokenization faciliti?s.
    One can get to know more about fr?e chaturbate tokens in various websites.

    Dir?ctly after, a randomized and unique number is produce?
    and sent t? the user. This d?git i? considered
    as the tok?n, is the solitary object th?t needs to ?e
    kept ?n a system that is internal. Conv?rsely, if
    one stock? private evidence on their own system, t?ey are t?? one lia?le
    for efficiently h?ndling and constantly checking that information. But that ?s not enough to detect
    any ?ind of suspicious activity. Nobody can conclude that the hacker?
    will not rea?h the c?mputer ?ia electronic me?ns. Besides if you need more information about chatur?ate tok?n generator then do a little research
    from various site?.
    Conclusion
    ?redit card tokenization was intended to help a user to remove those doubts of hack?ng.
    A user should ?nd keeping delicate information on their individual system that
    may ?e a computer, laptop, a Sma?tph?ne or ?ny other simil?r
    devices and transfe? it to a system which is continuousl? as well as
    eff?ciently observed, safe, and updated. This can red?ce other chances of hacking
    which also ?ncludes Chatur?ate Token Hack as no data or sensitive information is kept on the user’s system.

Add comment

*

Copyright © Eric Wittenberg 2011, All Rights Reserved
Powered by WordPress