Featured

View of the Week: US Army in Charge!!!!


The U.S. Army was in charge of exploring and mapping America.

The Lewis and Clark Expedition was an Army endeavor from beginning to end. President Thomas Jefferson turned to the Army for this important mission and authorized the recruitment of noncommissioned officers. Captains Lewis and Clark relied implicitly on the leadership of their noncommissioned officers. Click here to read about Sergeant Ordway, the senior sergeant who acted as the expedition’s first sergeant and in the absence of the two captains, Ordway commanded the expedition.

Featured

Museum Field Notes

An etching showing people transporting an inert body via cartLearning from the Art History of Epidemics

By M. Jordan LoveWhen medical students at the University of Virginia switched to remote learning, the school called in a curator from its campus art museum to contribute to a special course called “Confronting Epidemics.” Find out what artworks she suggested and what the students learned from them.

Read more »
Question of the Month An illustration of two overlapping speech bubbles, one with a "..." in the middle

Last month, we asked what museums or objects you were excited to visit when it’s safe to do so. The torrent of responses suggests museums have been dearly missed:
“Monet’s Water Lillies at the Museum of Modern Art” – Karen Kacen“@metmuseum to see the seated statue of Egyptian Pharaoh Hatshepsut.” -@aestheticvoyage“The Peacock Room in the [Freer Gallery of Art]” – @codyyblood“Tlacolulokos at MOLAA” – @buenleo“The crocheted trees at the Long Island Museum in Stony Brook!”
– @alexandria_dauria“Proust’s bedchamber at the @museecarnavalet…the bride stripped bare by her bachelors, even at @philamuseum…Le Déjeuner en fourrure at @MuseumModernArt” – @lgm_film“The Exploratorium” – @cavies_in_sf“A tiny landscape by John Everett Millais at the Delaware Art Museum!”
– @legomyreggo“Kluge Rhue in Charlottesville, Virginia [and] ICA in Richmond”
– @ccgrant“The Key Marco Cat at the Marco Island Historical Museum!”
– @austinjbell“Noguchi Museum, Queens” – @char.lotte.fleming“Museum of the City of New York!” – @ccbbenton“The Idaho State Museum and Old Idaho State Penitentiary!”- @emilita4“@newmuseum”- @keepingeye“The Montclair Art Museum!” – @shannoonh“Berlin-Neues Museum” – @dinalaa1“The Art Institute and the MCA Chicago” – @donthate_curate
Featured

On the Week That Was…..

Sgt. Henry Johnson

Graphic Novel Featuring SGT Johnson

Henry Johnson was the first American to receive the French Croix du Guerre, France’s highest award for bravery

Sgt. Henry Johnson, a member of the famed “Harlem Hellfighters,” is the subject of the newest graphic novel in the Association of the U.S. Army’s series highlighting Medal of Honor recipients.   Read more.

Featured

On The Week That Was….

This Week in Military History


1947 – Florence Blanchfield becomes first U.S. woman to hold a permanent military rank
 
1947 – In a ceremony held at the Pentagon in Arlington, Virginia, General Dwight D. Eisenhower appoints Florence Blanchfield to be a lieutenant colonel in the U.S. Army, making her the first woman in U.S. history to hold permanent military rank.  Read more.This Week in Military History


The Vietnam Service Medal 
 
The armed forces’ Vietnam Service Medal (VSM) was established by Executive Order 11231 from President Johnson’s desk on 8 July 1965.  Watch the VSM described, click here.
 


Today’s Number is 5



Medal of Honor recipient Florent Groberg
 

Medal of Honor recipient Capt. Florent “Flo” Groberg talks about the struggles that come from being wounded in battle ― and the elevation to the status of national “hero” for his actions.  Click here. 
Did You Know…


Proposed site of the National Desert Storm and Desert Shield Memorial

The National Desert Storm and Desert Shield Memorial is a new national monument that has been approved by Congress and President Trump (March 2017) to be built by 2021 on the National Mall in Washington,  DC.  Read more.
Featured
Museum Services Webinars header
Pointing at Laptop
How to Develop Effective Social Media Content to Engage Your VisitorsFree Webinar: Thursday, July 9, 10:00 a.m. CTJustin Minsker, Texas Historical CommissionJustin MinskerIs your museum effectively building visibility within your community and engaging potential visitors through social media? Learn strategies for developing partnerships with other organizations within your community to help build an audience who is passionate about the services and programs you provide. We will also discuss best practices for successful outreach campaigns and strategies for promoting museum exhibits, activities, and programs through Facebook and Instagram. Justin Minsker from the Texas Historical Commission will share insights on how to develop and leverage digital messages, create compelling visual assets, and effectively target your campaigns to build an engaged online audience.

Upcoming THC Museum Services WebinarsGrant Evaluation: Setting Goals and Measuring Impact, Wednesday, July 22, 2:00 p.m. CTBuilding a Collaborative Online Archive: A Case Study, Wednesday, August 5, 10:00 a.m. CT
Featured

Army Birthday Wreath Laying at Arlington National Cemetery.


Senior leaders celebrate Army’s diversity over past 245 years: At a cake-cutting ceremony to mark the service’s 245th birthday, the Army secretary said a cake is a remarkable, fitting symbol.  A cake is a combination of different ingredients that is placed under intense heat, he said, but later results in a spectacular creation.  Read more. 
Featured

#MovieMonday Courtesy US Naval Institute

Featured

Reminders on Staying Secure Online

This is courtesy of the Committee to Protect Journalist:

Secure your remote office

● Update your devices, including your phone, to the latest operating system. Updates often fix known vulnerabilities in the software that attackers could try to exploit. Configure your devices to update automatically.

● Update apps and browsers to the latest available version.

● Use a password manager to create long, unique passwords and secure your online accounts. Turn on two-factor authentication for all accounts wherever possible.

● Think about where you are storing your documents, especially if you are working on sensitive issues. Create a system for storing work while you are working from home so that you will be able to find it easily when you return to the office. Avoid downloading and storing documents on an ad hoc basis, or on multiple devices.

● Back up your data and research on a regular basis to avoid losing work. Create more than one copy—for example, back up your work to an external hard drive as well as saving it on your computer. If possible, protect your backup with a password, and store it away from your regular workstation.

● Use a virtual private network (VPN) if you are concerned about your internet service provider seeing your online activity, especially if you are carrying out sensitive research. Be aware that a VPN service may also record your internet activity, so research the best VPN service for you, depending on your location and your level ofrisk.

● Lock all your devices with a PIN or password to deter people from accessing them. Avoid sharing devices you use for work with other members of your household.

● Ensure that your home Wi-Fi is protected with a password.

Communicate more securely

Be aware that online communication services are often collecting personal data on you and the people that you are speaking with. This data can be sold, handed over to governments, or if the company does not secure the data properly, breached by criminals.

● Do an internet search on any online communication service you plan to use. Check for security vulnerabilities, privacy concerns, or if the company has suffered any data breaches. If possible, see if the company has been subpoenaed by a government and review what information the service handed over.

● Review the service’s privacy policy to see what they do with your data, how they store it, and how long they keep it.

● Check to see whether the service uses end-to-end encryption. Research the law in your country with regards to using encrypted communications methods.

● Be aware of your own risk profile, and that of the people you wish to speak with. If you or anyone you communicate with is likely to be a target of a government or of an adversary with sophisticated technology, consider whether using these services could put you at risk.

● Back up anything important contained in messaging apps regularly, and delete anything inessential.

● Be aware that many messaging apps store a copy of your messages, including photos and documents, either in a cloud account or on your device. Signal, the end-to-end encrypted messaging service, allows users to delete messages after a certain time set by the user.

● If you are working with low internet bandwidth and need to speak with more than one person at the same time, consider using end-to-end encrypted chat or voice messages instead of video conferencing.

Secure research, phishing, and COVID-19

● Do a regular internet search for common scams and misinformation about COVID-19. This will help you be more informed about documented attacks, including those that are less obvious and more sophisticated.

● Try and use one device for researching COVID-19. This will help limit exposure to malware.

● Avoid clicking on links or downloading documents about COVID-19 on your phone. The small screen makes it difficult to properly analyze the source.

● Think carefully before clicking or downloading information about COVID-19. Consider the source and whether it is reputable.

● Go directly to the source of the information instead of downloading documents sent to you via email, through SMS, or messaging apps. Look up the author of the information online to verify their identity and expertise.

● Research the authors of unexpected messages or requests to take action and verify their identity. Reach out to them directly to confirm they sent the message if possible.

● Use advanced search strategies, such as Boolean search methods, to look up information and confirm the source.

● Be aware that websites from legitimate sources should be encrypted. You can check this by looking for https and a padlock icon at the start of the URL, or web address, in your browser. This means that traffic between you and the site is encrypted.

● Be wary of information about COVID-19 shared in group chats on WhatsApp and other messaging services. There is a lot of misinformation being passed around and some of it may also contain malware.

Create your website with WordPress.com
Get started