C.C. Cherry

C.C. Cherry was a small steam tug and general utility vessel that worked on Puget Sound from 1896 to 1930.

History
Name: C.C. Cherry
Route: Puget Sound
Completed: 1896
Out of service: 1930
Identification: US registry #127139[1]
Fate: Abandoned
General characteristics
Type: inland steam towboat
Tonnage: 54 gross; 37 registered
Length: 68.7 ft (20.94 m)[1]
Beam: 16.4 ft (5.00 m)[1]
Depth: 7.0 ft (2.1 m) depth of hold.[1]
Installed power: steam engine
Propulsion: propeller
Crew: six (6)[1]

Career

CC Cherry was built in 1896 for Capt. E.A. Smith. The first use of the vessel was hauling fish from the San Juan Islands to a Canadian cannery[2] One of the early masters of C.C. Cherry was the prominent steamboat man William Williamson (1859-1930), who later commanded the well-known steamship Flyer from 1896 to 1904.[2]

Explosion of the Virginia

C.C. Cherry was working as a tug in July 1928, when the small gasoline-powered tug Virginia exploded at the entrance to the Lake Washington Ship Canal. The engineer was killed, and the captain was blown through the roof of the pilot house and into the water. He was then rescued by the crew of C.C. Cherry.[2]

C.C. Cherry is reported to have been abandoned in 1930.[3]

Notes

  1. Annual List 1909, at 163.
  2. McCurdy Marine History, at 4, 389, and 407.
  3. Newell, Inland Sea, at 205.
gollark: Use Arch Linux, the superior Linux.
gollark: Isn't the market for high-powered VPSes/servers quite saturated at this point?
gollark: Even with computers they still managed to mess the phone network up so horribly.- calls appear to use an awful voice codec- multimedia messages are overcharged massively for- caller ID spoofing is a very common thing- mobile phones have stupidly complex modem chips with excessive access to the rest of their phone, closed source firmware and probably security bugs- SIM cards are self contained devices with lots of software in *Java*?! In a sane system they would need to store something like four values.- "eSIM" things are just reprogrammable soldered SIM cards because apparently nobody thought of doing it in software?!- phone towers are routinely spoofed by law enforcement for no good reason and apparently nobody is stopping this- phone calls/texts are not end to end encrypted, which is practical *now* if not when much of the development of mobile phones and whatever was happening- there are apparently a bunch of exploits in the protocols linking phone networks, like SS7
gollark: I think if a tick takes a few seconds or something.
gollark: <@221827050892296192> If TPS drops really really low it will stop.

References

This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.