Sunday, May 16, 2010

Wild Flax


I finally got around to buying myself a wildflower field guide, so I can start identifying the many flowers I have come across and photographed over the years.

Of course this has turned out to be much harder than I thought it would be. Like birds and insects, wildflowers also have too many species to fit into a practically sized field guide. Like birds and insects, wildflowers can also look different at different times of the year or at different stages of their lives, and can look different in different parts of the country. Wildflowers can also have completely different colors within the same species.

But I am pretty sure the flower pictured above is Wild Flax (Linum lewisii). I found it in Red Rocks Park outside of Denver. Actually, the common name of this flower is Wild Blue Flax, but since it can also be found in white, yellow and red, I am going to simplify things for us wildflower newbies and just call it Wild Flax.

I was lucky to find such a bright blue specimen - the photo in the field guide and most of the photos I found online were pale blue. What gives it away as Wild Flax are the shape and number of petals and stamen (5 of each), the shape and color of the veins in the petals, the linear shaped leaves, and the drooping stems.

Wild Flax is the untamed uncle of Common Flax, the crop plant that gives us linen fibers, flax seed, and linseed oil. Here is a cross-sectional photo of a flax stem from Wikimedia. The white fibers just inside the outer layer (marked "BF") are the "bast fibers", which are used for making linen.


Bast fibers are the fibers that give structural support to the stems of some types of plants. Through a series of physical and chemical processes, the bast fibers are removed from the rest of the stem. Here is what the bast fibers look like (also from Wikimedia), ready to be spun into linen:


Linen is believed to be the first plant fiber used for making fabric, about 30,000 years ago. I think it is amazing that our ancestors figured out how to do this.

I can understand them making clothing out of fur or wool, since they saw how it kept animals warm. And I can understand why they would eat certain plants, possibly after watching animals safely eat them. But to look at a beautiful blue flower and say, "I bet I can extract the fibers from that stem and make myself a loincloth" is a great intellectual leap. We all owe that person a debt of gratitude!

61 comments:

  1. From the vogue earth, fake prada bags outfits has developed into a ‘trends’ with retail stores world wide. case outfits model is usually the favourite outfits in past times. fake ferrari watches never ever indicate effectively towards movements on the beyond; quite, they have a suggestions for mixture in addition to fit models intended for anything completely new and different. replica dior models can be built-into regular outfits models subsequently ıt had been modified to help building a absolutely current model. Pairing in addition to related replica chanel handbags in addition to Current outfits portions is usually an highly sought after core vogue tendency mainly because will probably be an exceptionally one of a kind model. This glam steel glimpse is usually a grungy model that is certainly relying on some sort of black medieval palette connected with blacks in addition to greys combined with steel celeb studding. The looks is usually hooked in concert by means of organizing spanning a parka such as fake handbags perfect for in the event the item establishes to help water! This purpose seriously isn't to help indicate effectively this movements on the beyond, although to reinforce modern-day ways by building a little classicism. Human history is usually loaded having one of a kind vogue.

    ReplyDelete
  2. enter the market of UK Replica watches the Swiss watch brand Chinese. Today’s Bovet bovei not only has a solid design tabulation process, handbag replica to watch other as a concept, and intentions in the decorative arts, faithfully reflect the history of Designer handbags the brand, distinctive character makes the style of some low-key brand, but have a lot of Watches Replica supporters loyal person. This is to introduce the flag in 2010 launched the first Amadeo series, with flip case Replica Rolex Watches .

    ReplyDelete
  3. This comment has been removed by the author.

    ReplyDelete
  4. this is really amazing. i really liked your blog.

    ReplyDelete
  5. I really liked your article. it was explained really well.

    ReplyDelete
  6. www.trendmicro.com/downloadme
    For Trend Micro Download , you must create a Trend Micro account from trend micro that can help you in smooth Trend Micro installation. Protect your systems and online data from multiple threats, including viruses, spyware, identity theft, malware, rootkits, Trojans, phishing attacks, ransomware, Adware, Worms, Bots, Horses, and other threats.You can activate the Trend Micro software by installing the Trend Micro download

    ReplyDelete
  7. office.com/setup - Setup and Install Office 365/2019 with your Product key or simply by logging into www.office.com/setup and downloading Office Setup.

    ReplyDelete
  8. the user must purchase a license of Avg antivirus from the retail store or online. Though download AVG software is the easiest process, your system must match the essential prerequisites of Avg antivirus. Once you will get AVG activation code and will create an AVG account , then you can install AVG with license number. install-avg-with-license-number | www.avg.com/activation | www.avg.com/retail

    ReplyDelete
  9. You can purchase the McAfee Antivirus software online or from the local Retail Store as it is available on all the retail store available near you. www.mcafee.com/activate | mcafee.com/activate

    ReplyDelete
  10. Norton is a reputed and cost-effective antivirus suite
    company which offers protection so that no virus can damage
    your computer. It also provides many other products and
    services apart from antivirus.

    norton.com/setup

    ReplyDelete
  11. Among the good sources of funds is retail stores, so it should be the first port of communication. Funds are often only disposed of when they are emptied and sometimes business owners have to pay to withdraw them,شركة نقل اثاث
    شركة نقل عفش بالخرج

    ReplyDelete
  12. AVG is compatible with almost all the devices, including computers, windows, laptops, and smartphones.
    www.avg.com/retail |
    avg.com/retail

    ReplyDelete
  13. "The violent and random nature of this assault against a senior citizen is unusual and troubling," Det. Sonja Wepruk said in the release. We said we were not playing soccer. Of the 25.6 million eye protectors in the stockpile, 15.9 million pairs had already been distributed across the system. The remaining 9.7 million are currently in quarantine. Hospitals have been told to immediately withdraw the goggles from the supply chain.

    Cheap Ray Ban Sunglasses, Totally looked after me, made me feel safe and comfortable. He always went above and beyond on our trips. Highly recommend this company great prices and service especially when your a solo person.. (a) Most existing databases, captured under both constrained and unconstrained (in the wild) conditions have been annotated using different mark ups and, in most cases, the accuracy of the annotations is low. (b) Most published works report experimental results using different training/testing sets, different error metrics and, of course, landmark points with semantically different locations. In this paper, we aim to overcome Cheap Jordan Shoes For Sale the aforementioned problems by (a) proposing a semi automatic annotation technique that was employed to re annotate most existing facial databases under a unified protocol, and (b) presenting the 300 Faces In The Wild Challenge (300 W), the first facial landmark localization challenge that was organized twice, in 2013 and 2015 {cheap yeezy shoes for sale}.

    ReplyDelete
  14. Trend Micro Get-max stand for Maximum Internet Security, is very popular for Home users in Australia in order to start Installation of Maximum security, Visit: www.trendmicro.com/bestbuypc

    ReplyDelete
  15. Norton gives this another option for downloading the complete Norton setup. The Steps are mostly same but with some changes in the downloading procedures. Visit: www.norton.com/setup

    ReplyDelete
  16. Webroot antivirus is one in all the simplest code to safeguard all digital devices one will get additional details on www webroot com secureanywhere. Visit: Webroot geek squad download

    ReplyDelete
  17. www.webroot.com/safe we are best in our Industry, In one click Install wsainstall exe from webroot.com/safe for Windows device. If want to Install Webroot in I-OS or Android do visit www.webroot.com/safe.

    ReplyDelete
  18. www.norton.com/setup – The digital world is mediated through the internet, and it is the main source of different information shared on the internet. In addition to these things, the Internet is also the source of various viruses and online scams.

    ReplyDelete
  19. www.trendmicro.com/bestbuypc: Computer security is the process of preventing and detecting unauthorized use of your computer. Prevention measures help you stop unauthorized users from accessing any part of your computer system.

    ReplyDelete
  20. www.trendmicro.com/downloadme – Computer security is the process of preventing and detecting unauthorized use of your computer. Prevention measures help you stop unauthorized users from accessing any part of your computer system.

    ReplyDelete
  21. www.malwarebytes.com/install – Malware may infect your computer when you click on a suspicious email attachment, but it is not restricted to that. Malware also comes from unsafe sources via software facilities and when you visit infected websites.

    ReplyDelete
  22. aol desktop gold download – What are you waiting for in your scheme to aol gold desktop download and start the interesting voyage of exploring this software’s unique characteristics. You can always refer to AOL Desktop Gold for all kinds of assistance where your query will be answered.

    ReplyDelete
  23. comcast email sign in – Xfinity Connect app is popular for its features and functions now available with all new users interface and advance security features. Xfinity Connect app can help you accessing your emails and for searching the content and even for browsing purpose you have to comcast email sign in. Xfinity Connect app is best among all web interfaces.

    ReplyDelete
  24. This is very informative post, good work, i like this content and wish to read more from you. Thanks for such a informative post. I also like to share
    www.norton.com/setup

    ReplyDelete
  25. Your method of telling the whole thing in this paragraph is in fact fastidious, every one can effortlessly understand it, Thanks a lot.
    www.webroot.com/safe

    ReplyDelete
  26. I like the helpful information you provide in your articles. I’ll bookmark your weblog and take a look at again here regularly. I’m quite sure I will learn many new stuff proper here! Best of luck for the next!
    www.norton.com/setup

    ReplyDelete
  27. That’s a great idea you have, and yes this would make a wonderful blog.
    www.trendmicro.com/bestbuypc

    ReplyDelete
  28. It is very helpful to secure your device and it is a very light weighted antivirus product.
    www.trendmicro.com/downloadme

    ReplyDelete
  29. I really happy found this website eventually. Really informative and inoperative, Thanks for the post and effort! Please keep sharing more such a blog.
    www.malwarebytes.com/install

    ReplyDelete
  30. Thanks for sharing the information. Your blog has always been a source of great tips.
    aol desktop gold download

    ReplyDelete
  31. I check your blog every day and try to learn something from your blog. Thank you and waiting for your new post.
    comcast email sign in

    ReplyDelete
  32. www.webroot.com/safe- The Webroot antivirus is one of the best Antivirus Software installed on the system.

    ReplyDelete
  33. www.norton.com/setup– As we know that cyber attacks are increasing in today’s time, in which hackers reach into our device

    ReplyDelete
  34. aol desktop gold download- AOL desktop is an internet suite produced by AOL that integrates a web browser with a media player and an instant messenger.

    ReplyDelete
  35. Try this: If MK Outlet Sale you're using regular oatmeal, grind it into a fine powder, Dr. Schaffran says. Put a cup of oats through a food processor until they dissolve easily into a glass of water. The Federal Trade Commission has issued a Consumer Alert, "File Sharing: A Fair Share? Maybe Not," that warns consumers about a number of risks associated with file sharing. Computer users who share Coach Outlet Purses On Clearance files online have access to a wealth of information including music, games, and software. Users simply download special software that connects the computer to an informal network of other computers Coach Outlet Clearance Sale running the same software.

    Birth defects: Sometimes, the outer ear canal appears malformed at birth. This is atresia. The ear Cheap Air Forces canal may also be missing or have failed to open at birth. Cookies help make our website work better and they allow Cheap Nike Air Force 1 us to provide you with content and personal promotions that are more relevant to you. Like many Coach Outlet Online 80 OFF other sites we collect data like click behaviour on our website, your Jordan Shoe Stores IP address and other information you share with us. When possible, we combine this with other personal customer data that we have already or will later collect.Get the Best Black Friday Deals of 2018 and be the first to know! Save the date: 23th of November and don't miss out on our biggest Black Friday deals.

    The adoption fee includes the spay or neuter surgery, age appropriate vaccinations, and a microchip. Gayle Anderson was live in Costa Mesa to see the 'foodraiser" CANSTRUCTION OC 2018.: Canstruction Orange County Combines the fun of a design build competition with an ingenious MK Outlet Online way to help feed hungry people. Local prominent architectural, engineering, planning, and design firms, and students mentored by these professionals, create phenomenal structures built entirely out of canned food..

    ReplyDelete