William Starr

William Starr (March 3, 1821 April 18, 1879) was an American businessman, politician and active abolitionist.

About

Born in Middletown, Connecticut,[1] Starr moved to Ripon, Wisconsin Territory in 1845,[1] where he married Annie Strong (1824–1904).[1] His granddaughter was artist Ruth Starr Rose.[2]

He was a teacher, merchant, and farmer, and was in the lumber business. In 1860, he was placed under house arrest by U.S. Marshals for his refusal to comply with the fugitive slave laws.[2]

Starr served as a trustee for Ripon College. Starr also served on the Board of Regents of the Wisconsin Normal School from 1868 until his death and was the president of the board.[1] In 1863 and 1864, Starr served in the Wisconsin State Assembly as a member of the Republican Party.[1]

He died of erysipelas in Ripon, Wisconsin.[1][3][4]

Notes

  1. "Death of Hon. W. Starr of Ripon". Oshkosh Daily Northwestern. April 19, 1879. p. 4. Retrieved November 20, 2016 via Newspapers.com.
  2. Lauren, Melissa (2016-03-04). "Faces of the Arts: Ruth Starr Rose— An activist through art, she explored Maryland's cultural and historical diversity". What's Up? Media. Retrieved 2020-05-09.
  3. Collections of the State Historical Society of Wisconsin, volume 9, Wisconsin State Society: 1909, Biographical Sketch of William Starr, p. 434.
  4. General Catalogue of Ripon College 1851 to 1900, Ripon, Wisconsin: 1900, p. 7.
gollark: It *might* be.
gollark: Row ID? I forget.
gollark: The number the uninstaller prints?
gollark: The incident report system does actually work, by the way. All incidents are logged in SPUDNET. The only ones I know of are the test ones I triggered to test the system and various incident triggers. Incidents are reported when:- one known sandbox escape is detected- banned programs (Webicity) are executed- potatOS is uninstalled- invalid disk signing key
gollark: You can't make a program to fully autonomously uninstall potatOS from within it - ignoring sandbox escapes - because while sandboxed processes can use queueEvent to fake keypresses they cannot read the output of the uninstaller. The best they can do is, I don't know, guess what the random seed was when it was generating two primes, figure out what the primes were, and queue the key/char events accordingly.


This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.