1895 Massachusetts Aggies football team

The 1895 Massachusetts Aggies football team represented Massachusetts Agricultural College in the 1895 college football season. The team played its home games at Alumni Field in Amherst, Massachusetts. Massachusetts finished the season with a record of 15.

1895 Massachusetts Aggies football
ConferenceIndependent
1895 record15
Home stadiumAlumni Field
1895 Eastern college football independents records
Conf  Overall
TeamW L T  W L T
Penn      14 0 0
Yale      13 0 2
Princeton      10 1 1
Harvard      8 2 1
Lafayette      6 2 0
Syracuse      6 2 2
Army      5 2 0
Colgate      4 2 0
Tufts      8 5 0
Wesleyan      6 3 0
Amherst      6 5 0
Brown      7 6 1
Carlisle      4 4 0
Rutgers      4 4 0
Villanova      3 3 0
Penn State      2 2 3
Cornell      3 4 1
New Hampshire      2 3 1
Frankin & Marshall      3 5 1
Boston College      2 4 2
Lehigh      3 6 0
CCNY      2 5 1
Temple      1 4 1
MIT      1 4 0
Trinity (CT)      1 4 0
Massachusetts      1 5 0
Western Univ. Penn.      1 6 0

Schedule

DateOpponentSiteResult
September 18AmherstL 0–42
September 25Worcester Tech
  • Alumni Field
  • Amherst, MA
L 4–16
October 5Pittsfield A.C.
  • Alumni Field
  • Amherst, MA
W 6–0
October 11at Wesleyan
L 0–26
October 19Trinity (CT)
  • Alumni Field
  • Amherst, MA
L 0–22
October 23Williston Academy
  • Alumni Field
  • Amherst, MA
L 10–14
gollark: Anyone know where I can find a large dataset of privacy policies, for neural network training?
gollark: <@498244879894315027> Firstly, you could probably try and just use some existing packet capture tool for this. Secondly, seriously what are you doing?! I don't think trying to replay IP or Ethernet packets (whatever gets sent to the network card) has any chance of working to meddle with a higher-level service.
gollark: I suspect it's whatever you're doing to bptr after each broadcast. That looks dubious and the log says it's a "loadprohibited" error, which sounds like something memory.
gollark: I don't think this affects *me* very badly, since my configured disk encryption all runs in software without any weird TPM interaction, I don't use "secure" boot, and it seems like this would need physical access or unrealistically good timing, but it's still not very good.
gollark: I wonder if AMD's PSP has similar holes. In any case, they should really just not be sticking subprocessors with closed-source non-user-modifiable firmware and root access into every CPU.

References


    This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.