Hiking southwestern Wyoming: Scott’s Bottom, buttes, and Wild Hairs in Butts

Since we got back from Colorado, Doug has been extremely busy with work (for those who were wondering, he passed his oral exams with flying colours) and I’ve settled into my new schedule of working on For the Love of Flying things in the morning and doing background research for my novel at the library in the afternoon.

Of course, life can’t be all work and no play! The weather’s been hot and sunny for the most part, so I make sure I get Riker out for his ‘big exercise’ first thing in the morning. Three times a week that means going for a jog around the neighbourhood, dodging the inevitable stray dogs and unsupervised children. The other mornings I take him on more off-road adventures and there are certainly oodles of off-road places nearby when you live in southwestern Wyoming.
One of our regular walking spots (and a popular place with other walkers and bikers) is down at Scott’s Bottom/FMC Park. With the rainy spring, the vegetation is in overdrive down there and thistles (like the one in this photo that a bee is trying to gather pollen from) grow as tall as a person. Just this morning I was down there and spotted at least five mule deer. Luckily Riker couldn’t see them over the abundant field grasses and wild flowers!
With a very Wyoming logic, the Scott’s Bottom nature preserve abutts (if you’ll pardon the pun) the archery and shooting ranges. If you continue on past there, however, there’s an access road that takes you to acres and acres of open scrubland. Doug and I headed over there with Riker last week on one of his rare days off. The circle of life is in plain view in this sometimes harsh landscape.
Last Tuesday I, in the local parlance, woke up with a wild hair/hare up my butt to do some hill climbing. So I packed my day bag, “borrowed” Doug’s sunglasses, and drove down to Scott’s Bottom. There, I took a side path (which might just be the dry bed of an intermittent stream) and followed the game trail to the left. It was still pretty early, but the sun was warm, and I was certainly feeling the exertion as I crested one hill. Then I looked up and saw this butte (above) and decided to try and climb it.
Luckily in this butte’s case, there was a back way up, so I picked my way along the trails the pronghorn antelopes and mule deer had made, observing the occasional scat from coyote and other animals as I tried not to look down.

What a view from the top, though! Riker and I paused for a drink and to watch the hawk that was circling (likely hunting the swallows and field mice we saw) heard it give three of those otherworldly cries that always awe me. When we turned around to start picking our way back down, I noticed a buck antelope that was keeping an eye on us. Then he started moving away, and I saw that he was standing guard over a group of at least five female antelope (his fall harem), making coughing noises to warn them of potential danger (i.e. me).

They don’t have anything to worry about from Riker and me, though, since they can reach speeds of almost 100km/h for several minutes (they evolved in North America when there were prehistoric cheetahs hunting them). Me, I’m happy putting one foot in front of another to explore the area while keeping my butt in shape!

577 thoughts on “Hiking southwestern Wyoming: Scott’s Bottom, buttes, and Wild Hairs in Butts

  1. This is all managed through a single interface, permitting full control over the network monitoring.
    What’s in Our Press Release?
    Why you should consider using Connectivity Toolkit?
    * Metrics collection, reporting, tracking, individual filtering and many other main functions available
    * Options for both remote and local hosts to be monitored
    * Support for both host ping and SNMP (IP, TCP, UDP, ICMP, PDU and names)
    * Longest distance tracing and https://desnighligi.weebly.com

    6add127376 prehenr

  2. More information about the security identifier is available in the “getsecurityidentity” function.

    For details on using the.NET Framework cryptography class in applications with regard to who is currently logged on, see.NET Networking Security with Credential Security: Confidentiality and Authentication.

    For details about the gpresult (for example, the current user’s security context) stored in the registry and used by this tool, see TechNet Script Center: Gpresult utility. https://kanncoommaoglow.weebly.com

    6add127376 kammilb

  3. · WhoIsSpeakingOnMyStatus
    · XMPP

    Mail Mule is a secure device for Windows operating systems. It provides solutions for the messenger services such as instant messengers, email, Web services, voice over the Internet, fax, voice and applications. Mail Mule also provides own kernel mail queuing system and it does not require any changes in the default configuration files of mail systems. Mail Mule is used to protect the security and privacy of your mail box. https://rgopdeszaysand.weebly.com

    6add127376 conquig

  4. Also, it can support CUE files (index files that allow you to put your MP3 soundtracks on audio CDs).
    What is new in this release:
    Version 1.0.4:
    – Deleted language keys in the settings to make the application run on Windows XP and Vista
    Version 1.0.2:
    – Added the possibility to play a single file in the format of choice. While converting, you can choose to show all the converted tracks or only the ones https://aticalphe.weebly.com

    6add127376 elwhasi

  5. Q:

    Is there any performance difference when switching to a sub-string from an actual string and how can we optimise it?

    When switching to a sub-string from an original string which is of 1-based index, is there any performance difference between
    $string = substr($original_string,1);

    and
    $string = substr($original_string,7);

    i.e, why we cannot use variables and use $original https://maubotabtann.weebly.com

    6add127376 estkai

  6. However, sometimes, when debugging with the debugger, this PDB Viewer will not
    be the most appropriate thing to use. In that case you can simply change the PDB Viewer into a print dialog and get yourself a way to view the contents of the PDB in printable format.
    The objective here is to provide you a simple and graphical PDB viewer that will expand the usage of the PDB Library package.
    Viewing database files

    View database https://maps.google.tt/url?sa=t&url=https://tranofnuibed.weebly.com

    6add127376 stagerm

  7. However, sometimes, when debugging with the debugger, this PDB Viewer will not
    be the most appropriate thing to use. In that case you can simply change the PDB Viewer into a print dialog and get yourself a way to view the contents of the PDB in printable format.
    The objective here is to provide you a simple and graphical PDB viewer that will expand the usage of the PDB Library package.
    Viewing database files

    View database https://maps.google.tt/url?sa=t&url=https://tranofnuibed.weebly.com

    6add127376 stagerm

  8. You can download it here.

    Unofficial Telegram plugins for Firefox could be used by spying software to monitor your conversations and steal your private message archives.
    The latest versions of “iron push”, “iron pop” and “iron seize” Telegram plugins available for Firefox could be used by spying software to monitor your conversations and steal your private message archives.
    According to a researcher from the cyber-security company Kaspersky Lab, malicious versions of the unofficial https://carcomede.weebly.com

    6add127376 celeyann

  9. But i’m having a really hard time to find the post that explain how to install the service and the executable file and how to configure service that start and stop in start up of my application.

    And i read the section that explain how to create and configure a config file for a single service. Now i’m curious, have any of you figured out the problem before??

    Thanks a lot guys!!!

    (NOTE : the section about creating and configuring the service config https://maps.google.tt/url?q=https://respslobterreans.weebly.com

    6add127376 flemzand

  10. Tuesday, May 25, 2007

    Only a few points worth mentioning. If you like GoPen you should look into learning how to draw. With the right pencils and paper you will be able to draw for 3 to 4 hours and then you will be exhausted. Once you draw something, pick it up with a paint program like Xara, paint shop pro or Photoshop and just play around with it. Try doing different things with it. If you are using photoshop then experiment and http://sibsvet.ru/bitrix/rk.php?goto=https://phepernessplaf.weebly.com

    6add127376 advikers

  11. Just like any other executable application that should not be removed, please download NoBeReader and educate yourself on how to use it.

    Licenses

    The software is open source and released under either the GNU General Public License version 3 (GPLv3) or Apache License version 2.0 for commercial/non-commercial use

    Developers and AUR

    main developers:

    Related software

    Adobe Acrobat Reader is the official, straight from http://images.google.ba/url?sa=t&url=https://isgiaspidex.weebly.com

    6add127376 nirevad

  12. Fighter Factory Ultimate is a compact application designed to help you create a character for the M.U.G.E.N. games. It includes a wide variety of tools that enable you to start from a blank template and customize all the character parameters.
    The application features a tabbed interface that allows you to work with multiple characters at the same time and compare the parameters of each project. The tools are grouped into menus which makes them easy to access when editing a character profile. https://exponcorpsa.weebly.com

    6add127376 bailsada

  13. What’s new

    2015-08-25

    Version 1.0.3The application underwent a major redesign and performance upgrade to support Android TV and Android Auto (formerly known as Android Auto Connect). In addition, some usability issues have been fixed, and we added some personalize filters.President Obama, showing his disappointment with the House Republicans over raising the debt ceiling, canceled a planned fundraiser in Chicago today, his spokeswoman said.

    The canceled fundraiser with Obama and Rah https://sumpcipornketp.weebly.com

    6add127376 cherand

  14. You can use it also for other useful hardwer. For example, I needed this application to register my athernet card driver at windows startup, so I registre this folder D:\Utilisateurs\Nick.. ://Documents//My Company//Projet JAVAEE

    Windows Registry Editor Version 5.00 is the application to do that tasks. It is similar to regedit application for your old windows to perform this.

    How to install Java Registrer 1 https://myinfancy.com/upload/files/2022/05/8RjstTDbG1E1RfhNLs81_19_d920c07e85741883c107a91dd2d5be33_file.pdf 05e1106874 rencala

  15. Installs as Microsoft Windows Service

    Versions 4.5.6 or 4.6.0 support Blu-ray Discs and audio/video clips such as AVI,.MKV, MP4 files. For Blu-ray to Xbox 360 or other region discs, you need version 4.6.2.
    Version 4.7.3 gives more options and numerous video formats are now supported, including M2TS,.MKV,.MP4,.M https://wakelet.com/wake/9fRu55NHQRvdU2704upUV 8cee70152a younfol

  16. The free software will offer a rich collection of features that will ensure success in the future, as well. Take some advantage of the huge number of users who already depend on its database management, while you can learn more about how HEC-HMS compares to other software available on the market. If you have any further questions, visit the Support section of the website to find answers to various questions and issues that could arise.
    Subtitle: Natural Disasters in the US, Puerto Rico, and https://www.cleartheairfoundation.org/profile/AutoCAD-For-Windows-2022Latest/profile
    99d5d0dfd0 faywal

Leave a Reply

Your email address will not be published.