Trapper's cache

Last updated
Trapper with some pelts. FoxAdirondackTrapper.jpg
Trapper with some pelts.

A trapper'scache is a type of temporary storage site or hiding place, [1] used since ancient times by primitive peoples, and, notably, by trappers in the North American fur trade. These caches were used to conceal supplies for the entire trapping season and to store the pelts collected in preparation for the return trip to distant markets. [2] This practice, likely derived from animal hoarding, has historical roots in Neolithic hunter-gatherer civilizations, and was also established among Native American communities before the arrival of European trappers.

Contents

Etymology

Trapper about to return to the cache. TrapperVisitingTraps.jpg
Trapper about to return to the cache.

The term " cache " comes from the French word " cache " derived from the verb " cacher " meaning to conceal or hide. Webster's 1911 dictionary defines cache as: "a hole in the ground, made for concealing and protecting materials which, for various reasons, one does not want to transport at the moment, and for returning to when convenient."

Reasons

Radisson's arrival at an indigenous camp in 1660. Arrival of Radisson in an Indian camp 1660 Charles William Jefferys.jpg
Radisson's arrival at an indigenous camp in 1660.

As stated earlier, there were a variety of reasons for hiding things in a cache. Among the types of items a trapper might have hidden in a cache, a rough list would include: beaver furs, traps, guns, gunpowder, rocks, lead bars, tobacco, knives, axes, coffee, sugar, salt, ham, pork, beans, corn, buffalo coats, wool blankets, cloth, Indian hardware, and an amount of other items. The mountain man 's reasons for using a cache varied depending on whether he was an explorer, a trader, or a trapper: [3]

Construction of a cache

Canadian fur trader at the end of the siglo XIX . Alberta 1890s fur trader.jpg
Canadian fur trader at the end of the siglo XIX .

Captain Meriwether Lewis, on June 9, 1805, describes it this way: [4]

First, you need to find a suitable location for the construction. It's very important that it be very dry and preferably on flat ground with no trees nearby to avoid roots that would make it difficult to dig the Hole in the ground.

A circle about twenty inches in diameter is drawn, and the turf or grass is carefully removed from this circle, removing as much as possible of the grass in one piece so that it can be replaced in the same position when the cache is completed and filled. This circular hole is then dug perpendicularly to a depth of one foot; if the ground is not very firm, a little deeper. Then, work is begun, widening it as you go toward the bottom, until the hole is about six or seven feet deep, giving it almost the shape of a teapot. The bottom is also made a little deeper toward the center.

The dimensions of the cache must be proportional to the quantity of items intended to be stored. As the excavation progresses, the soil is scooped out using a container and carefully placed on a skin or cloth. It is then taken to a place where it can be scattered in a concealed manner; generally, a nearby river ot water stream, where the water will disperse it without leaving any traces that could lead to the discovery of the cache.

Before the goods are stored, they must be very dry. Next, some small, dry branches are collected and a base is made by weaving them together, three or four inches thick, which is then covered with a little dry soil. The items are then deposited, taking care to prevent them from touching the walls, adding other dry branches as the merchandise is placed. When it is almost full, the goods are covered with a skin, then covered with soil and the previously removed piece of grass is disposed thoroughly. The cache must be concealed and leveled with the surrounding ground. In this way, the dried skins, merchandise, or dried foodstuffs can be kept unspoiled for several years.

Renowned traper's cache users

Manuel de Lisa Manuel Lisa.jpg
Manuel de Lisa

Computer cache

Modern computers use a technology that, due to its similarity to a trapper's cache, has been dubbed "cache". When the processor (CPU) needs data, it first looks for it in this faster-access cache (in this case, static memory that is faster than the system's dynamic RAM). If the data is not found there, it is retrieved from the system's slower memory, which can be about ten times slower than the cache's static RAM. This action has a strong similitude with a trapper's behavior: when a trapper needs supplies at the trap sites, he does not have to travel the long distance (800 km) that separates him from his home base. Instead, he only needs to cover the short distance (100 km) to a nearby cache where he has hidden his provisions. [8]

It is worth noting that, in computing, the term "cache" is very generic and does not necessarily refer to memory, but rather to a device or resource with a faster access time than the primary data source, which can be a disk, a progam or a web server [9] Examples include:

In these instances, then, a "cache" can even be located on a hard drive, or even a web server, which is why it cannot always be called a "memory cache", because it`s not a "memory" in the strict sense: [12]

See also

References

  1. The Utah Journey. Gibbs Smith. pp. 73–. ISBN   978-1-4236-2384-7.
  2. The Utah Journey. Gibbs Smith. ISBN   978-1-4236-2384-7 . Retrieved 2025-08-23.
  3. Meriwether Lewis; William Clark (1815). Travels of the Source of the Missouri River and Across the American Continent to the Pacific Ocean: Performed by Order of the Government of the United States, in the Years 1804, 1805, and 1806. Longman, Hurst, Rees, Orme, and Brown.
  4. 1 2 Meriwether Lewis; William Clark (1815). Travels of the Source of the Missouri River and Across the American Continent to the Pacific Ocean: Performed by Order of the Government of the United States, in the Years 1804, 1805, and 1806. Longman, Hurst, Rees, Orme, and Brown. pp. 350–.
  5. Willoughby, Robert J. (2012-11-01). The Brothers Robidoux and the Opening of the American West. University of Missouri Press. ISBN   978-0-8262-7291-1 . Retrieved 2025-08-23.
  6. Harris, Burton (1993-01-01). John Colter: His Years in the Rockies. U of Nebraska Press. ISBN   978-0-8032-7264-4 . Retrieved 2025-08-23.
  7. Barbour, Barton H. (2012-09-10). Jedediah Smith: No Ordinary Mountain Man. University of Oklahoma Press. ISBN   978-0-8061-8322-0 . Retrieved 2025-08-23.
  8. Hennessy, John L.; Patterson, David A. (1994). Computer Organization and Design. San Mateo, Calif: Morgan Kaufmann. ISBN   978-1-55860-282-3.
  9. Moulster, Ian (2006-04-06). "SuperFetch, ReadyBoost and ReadyDrive: some new feature names for you". MSDN Blogs. Microsoft . Retrieved 2015-07-11.
  10. Archer, Tom; Ayers, Matt (2006-06-02). "ReadyBoost Q&A". Tom Archer's Blog. MSDN Blogs . Retrieved 2008-01-11.
  11. Michael Meyers (2001). A+ Certification Exam Guide. McGraw-Hill. ISBN   978-0-07-913765-4.
  12. Oxforddictionaries:cache. Archived from the original on 2018-08-30. Retrieved 2018-08-30.

Bibliography