Submit your work, meet writers and drop the ads. Become a member
judy smith Sep 2016
In light of the recent flood of indie designers coming forth to call foul on fast fashion retailers for copying their designs (paired with a few not-so-fast fashion brands, which have been called out for copying, as well), a common question seems to be: Why is this ok? In particular, why is it perfectly acceptable for Zara to copy these designers’ work? How is this practice legal?

Well, put simply, copyright law is not necessarily a friend to fashion in the United States. This is a blanket statement, of course, but it bears quite a bit of truth, nonetheless. Since copyright law, the sect of intellectual property law that protects "original works of authorship,” such as books, paintings, sculptures, and songs, does not protect useful things, such as clothing and accessories, it provides little protection for those things in their entirety. Creative elements of a design that can be separated from the functional elements are subject to protection, which is why elements of a garment, such as a print that covers it, may be protected (as Pictorial, Graphic or Sculptural Works). This protection-by-separation method, however, does little to ward off copiers.

Moreover, unlike in most cases of the copying of garments, the copying of original jewelry designs often tends to give rise to legal ramifications as jewelry is afforded greater copyright protection in its entirety than garments are. However, as evidenced by Nasty Gal’s continuous sale of infringing jewelry designs, for instance, this also does little to deter copycats.

Other forms of intellectual property protection (think: trademark and patent protection) arguably are not ideal for fashion designs either. Trademark law only protects a designer’s name or logo – with some exceptions under the doctrine of trade dress which are relatively rare. Patent protection – namely, by way of design patents – is not terribly useful for designers because it is expensive (patent protection costs thousands of dollars to achieve) and takes a relatively long time (upwards of one year) to obtain. That’s simply too long for most fashion brands, whose business models depend on trends and season-specific wares. Taken together, this is why fast fashion retailers make hundreds of millions of dollars by copying high fashion designs and only are very rarely sued – let alone penalized – for doing so.

It is worth noting that this is not the case in other countries – namely, in the countries of the U.S.’s international fashion competitors. Copyright protection in the UK is not terribly dissimilar from that in the United States. However, the European Designs Directive introduced a unified system of industrial design rights for both registered and unregistered designs throughout the European Union. This allows for the protection of garments and accessories in their entirety.

Due to its history as the home of innovation in terms of high fashion, it is not surprising that France enjoys the most extensive and longstanding legal rights in connection with fashion designs. The country’s copyright system provides protection for garments and accessories. The same type of protection also applies to Italian designs.

So, it is within these loopholes that retailers like Zara, Forever 21, H&M;, and the like can operate legally (for the most part) and profit from the designs of others.Read more at:http://www.marieaustralia.com/bridesmaid-dresses | www.marieaustralia.com/****-formal-dresses
anastasiad Dec 2016
Software program designers ordinarily apply certain types of layer technological know-how to shield their software to avoid illegitimate apply. In addition need software layer software is permitted to obtain articles, to be able to boost product sales profit.

Software package encryption technology is split in accordance with whether or not the by using a devoted hardware-based encrypted sheild hardware as well as software-based security. Hardware-based layer, layer have to bind having a focused hardware unit, the particular electronics shield of encryption layer head of hair, typically referred to as the dongle. Software-based layer, encryption does not need focused electronics, typical executed digital camera permission while using the your fatal unit hardware and software data, also referred to as this electronic digital endorsement styles.

Simply consider drive-based electronics encryption stability when compared with software-based shield of encryption will not be suitable, as the more linked to program security, like encrypted sheild products and solutions, stability, encrypted sheild plan style, software, systems, , equipment, details marketing and sales communications, and the like, is really a detailed technological spots, not alone by a to discover whether protection.

Far away, the market industry promote of the digital permission along with security tresses are evenly coordinated. Behavior and also fantastic factors, the actual layer hair likewise enjoy a certain share of the market. File encryption hair, however, will be the network produced merchandise in the instances, can be a pure consumer technology, insufficient operations and also record capabilities, the inclusion of appliance manufacturing, strategic planning, driver installation annoyance, but not only the high cost, and might stop obtained multilevel submission and sales of your computer software, is definitely gradually diminish.

Enhancing the electronic acceptance that is certainly while in the ascendant. Electrical certificate protection approaches are getting to be progressively more included in the Internet technology, cloud computing and also SaaS thought is not just easier to make use of along with cope with computer software electric situation and be able to accomplish, but according to present day natural low-carbon improvement strategy, has got supplanted the encryption curly hair Outstanding software program encryption market trends. The more well-known businesses on the planet, Microsoft, Sun microsystems, Autodesk, SIEMENS, Adobe and various computer software are electronic consent safeguards function.

In the nation, using file encryption software package coders fasten greater premiums, along with international routines and also historic causes of the actual continuation with the next 2 reasons:

One particular every day producers typically regarded security encrypted sheild a lock electronic digital authorization.

There's not just about any readily available electronic digital licence products and solutions too big, the asking price of foreign electronic digital permission.

In reality, while using the rising betterment of your multi-level surroundings, your system triggering for the majority of home end users 's no trouble. And even brought up previously, which the point of view from the safety of layer head of hair electric permission on the sides completely wrong. From your reasonable mindset, this file encryption hair as a result of computer hardware copying much easier to crack, but accomplished piracy business sequence has been made. In its place, electronic digital endorsement because appliance is not replicated, but in addition should system arousal plus approval, in reality, have good safety outcome. Additionally, your every day has showed up in some accredited goods give electric 2-3 enterprise will have to improve while using growth of China's software package sector and grow up.

As a result, your layer computer software market styles hardware, web 2 ., and details technologies. Below, we speak about, in the application encryption approach specific to be able to detailed application encrypted sheild establishment plus progress craze of the marketplace.

Very first, the software encryption approach

As mentioned previously, it encrypted sheild technologies are divided into security hardware-based as well as software-based security.

Your hardware-based shield of encryption

Hardware-based encryption shield of encryption locks, many important info, like shield of encryption secrets to vulnerable information, consent paperwork, tailor made sets of rules, etcetera. can be stored in this dongle.

The layer fastener screen variety is split in to 2 kinds of synchronised slot and also Flash interface. This simultaneous port could be the very early technique type, because the propagation troublesome plus clash while using the printer's, and after this has less apply. A lot of builders employ tend to be USB slot dongle.

File encryption hair from the two kinds of CPU form, the microcontroller to get Pc and another with a clever minute card processor for the reason that Pc a microcontroller computer hardware by itself conveniently trouble area or content, therefore an increasing number of high-end file encryption a lock employing a intelligent credit card chips Central processing unit, to stop hardware break. Although a growing number of clever card dongle crack, initially, because processor might be more and even more leading-edge analytic techniques and devices; sensible card program to be written to the chips manufacturing unit to make during this time method may possibly trickle; encrypted sheild tresses of the identical manufacturer your Processor process is the same, merely various designers facts as well as major, in case most of these records are passed out there, you can easily clone.

Dongle features a specific level of security power, but you can also find a number of drawbacks:

One) apply at the regular one-time never ending license, can't assist in the achievements of your trial model along with on-demand invest in

3) the presence of electronics generation, logistics, assembly as well as upkeep charges

Three) is not achieved the issue with Internet-based electronic digital improvements, tracking along with control

Several) Once broke, may be burned huge, it is sometimes complicated to remedy

A pair of software-based encryption

Software-based encrypted sheild, digital acceptance, and certain in addition separated into home equity loans number plate along with licenses document:

In order to register code can be referred to as successive number or consent computer code, acquired using a alteration in the the program end user computer systems along with program facts, possible software and hardware facts, including: Cpu serial number, BIOS sequential amount, greeting card amount, harddisk sequential number, computer system brand, etc. . Completely transform formula made use of your customized protocol or maybe conventional shield of encryption algorithm formula. Customer as well as primary utilisation of the computer software installment practice, you might want to type in the enrollment value to confirm. Following verification, it can be employed typically. The particular strategy has got the good thing about this subscription computer code defense is easy to use, the downside is always that security is not really higher, not able to attain complicated endorsement demands.

Permission submit as well as the signing up code in order to situation the same computers plus software information, simply a registration signal period confines utilization of both software and hardware information, a permission record can use numerous hardware and software info. Also, the actual permission report can contain more info, to help you obtain the difficult agreement demands, and may perhaps retail outlet several customer facts. The average permission report way is to implement the private key in the asymmetric algorithm to hint your certificate data file, while the general public secret is embedded in the application value. Asymmetric shield of encryption plus understanding course of action, the private computer essential consent hosting server exists, it is hard to compromise from the investigation regarding endorsement paperwork.

Some great benefits of this electric endorsement safeguard doesn't require further electronics, and for that reason doesn't have to mount the motive force as well as buyer elements, electronic digital hardware issue. The disadvantage from the automated certificate safety mode just isn't networked buyers really need to hand remove your computer information, and then personally significance registration constraints or even permission, is not very easy to use. Additionally, the particular domestic electronic digital acceptance a few of the programmers from the product or service, that also limits your popularization and promotion connected with electric permit safeguard technology.

Subsequent, it encrypted sheild field advancement status

A single. File encryption curly hair

The main unusual dongle professional SafeNet, Corporation. in the usa in addition to Germany Wibu.

Security head of hair service deeply Supposrr que Luoke and also Feitian. The 2 main organizations due to the affordable prices, the first person to introduce the actual good minute card shield of encryption curly hair nearby perfectly so that you can enjoy some market place in the nation.

A pair of. Electric permission

Unfamiliar company certified merchandise to supply electronic digital Flexera Software and also SafeNet which will, Flexera Software program is focused entirely on the joy of digital permission, the actual device's ease of use along with features are doing superior, though the valuation on the item is additionally quite high.

This home-based electrical authorization goods enterprise a Beijing Biteansuo (BitAnswer), Shenzhen-use this (Euse) Safengine Organization.

There are only a few companies will acquire their very own electronic digital consent structure, even so the builders to cultivate their own plans commonly occur this inquiries:

One particular) the introduction of non-professionals, there are numerous loopholes while in the security

A pair of) is actually difficult to realize accommodating accreditation control, management and also precise functions simple or maybe simply no

Three) are often unveiled to be able to address the particular fast problem connected with short-term method, create far more than predicted in the foreseeable future as a result of protection, balance and also scalability challenges continued to get

Several) can not meet up with sector variations as a result of the modern demands on program certification model

Software program security marketplace movements

The software security field developments is closely connected with the increase development with the computer software marketplace. With the rise in popularity of cloud-computing plus Software, service with application products will be change in the direction of the multilevel plus system. Used in nearly all software programmers, Software items can not only spend less a great deal of hardware and software buy plus servicing charges, you can also get demand from customers, when decreasing the use of possibility, driving program vendors in order to consistently strengthen items plus improve services to be able to sustain consumers.

To the development of system and program improvement can also be a software package encrypted sheild technologies movements. The view around the present-day growth trend, the encryption locking mechanism technologies have designed really develop fully information mill approaching vividness, slower advancement. The actual everyday living and make use of on the equipment practice creates security head of hair are not able to conserve the speed regarding advancement of the Internet period, are going to be substituted with the particular automated certificate.

Automated authorization permission through earlier subscription program code type on the feature-rich records available as modifications to technologies are considering verification process out of offline yourself confirm the introduction of computerized system authorization. Permitted administration contemplating particularly, your electrical licence technological innovation collected from one of software licence qualifications growth just as one authorized official certifications, agreement management and exact information and facts, and also other objective of each, significantly improved this permitted volume of details regarding computer software coders.

May forecast not able to electronic products certified solutions ought to have these most important properties:

Enlightening approved administration system: supplied by third-party safety measures specialized software designers, in line with the Net's one-stop software package safety plus endorsement management system, without having to deploy and observe after, low priced, easy-to-use.

Only two Bendable Certificate: offer the acceptance of the purchaser software as well as the cloud computing product common software package licenses; authorized touch time, the volume of sensible adventures; sanctioned in order to bind your computer software and hardware information and facts, encryption tresses, or by way of a username plus password validation way of agreement.

Simple and easy friendly buyer: in accordance with the WEB, at any place obtain; Users might food acquire, trigger boost the software, you can buy their unique software package to keep abreast of details; software package designers can certainly understand software initial information and facts plus individual data is often synergies through the people in the firm to finish the design of application license, enactment, supervision as well as maintenance operate.

5. Fog up accreditation unit: This is a cloud computing type of software program licensing. Standard application is genuine customer setup, endorsement can also be a buyer. Although cloud-computing could be the craze, although the move difficult for classic software package would be a wonderful way for the particular a higher level cloud computing modification. This definite awareness associated with tips, a common application approved move on the purchaser for the fog up on the endorsement remote computer, to ensure that small adjustments towards the application, but you can certainly instantly experience the great things about cloud computing: higher safety energy require to obtain clouds hard drive .

http://www.passwordmanagers.net/ Password Manager
Nigel Morgan Nov 2012
There’s a film by John Schlesinger called the Go-Between in which the main character, a boy on the cusp of adolescence staying with a school friend on his family’s Norfolk estate, discovers how passion and *** become intertwined with love and desire. As an elderly man he revisits the location of this discovery and the woman, who we learn changed his emotional world forever. At the start of the film we see him on a day of grey cloud and wild wind walking towards the estate cottage where this woman now lives. He glimpses her face at a window – and the film flashes back fifty years to a summer before the First War.
 
It’s a little like that for me. Only, I’m sitting at a desk early on a spring morning about to step back nearly forty years.*
 
It was a two-hour trip from Boston to Booth Bay. We’d flown from New York on the shuttle and met Larry’s dad at St Vincent’s. We waited in his office as he put away the week with his secretary. He’d been in theatre all afternoon. He kept up a two-sided conversation.
 
‘You boys have a good week? Did you get to hear Barenboim at the Tully? I heard him as 14-year old play in Paris. He played the Tempest -  Mary, let’s fit Mrs K in for Tuesday at 5.0 - I was learning that very Beethoven sonata right then. I couldn’t believe it - that one so young could sound –there’s that myocardial infarction to review early Wednesday. I want Jim and Susan there please -  and look so  . . . old, not just mature, but old. And now – Gloria and I went to his last Carnegie – he just looks so **** young.’
 
Down in the basement garage Larry took his dad’s keys and we roared out on to Storow drive heading for the Massachusetts Turnpike. I slept. Too many early mornings copying my teacher’s latest – a concerto for two pianos – all those notes to be placed under the fingers. There was even a third piano in the orchestra. Larry and his Dad talked incessantly. I woke as Dr Benson said ‘The sea at last’. And there we were, the sea a glazed blue shimmering in the July distance. It might be lobster on the beach tonight, Gloria’s clam chowder, the coldest apple juice I’d ever tasted (never tasted apple juice until I came to Maine), settling down to a pile of art books in my bedroom, listening to the bell buoy rocking too and fro in the bay, the beach just below the house, a house over 150 years old, very old they said, in the family all that time.
 
It was a house full that weekend,  4th of July weekend and there would be fireworks over Booth Bay and lots of what Gloria called necessary visiting. I was in love with Gloria from the moment she shook my hand after that first concert when my little cummings setting got a mention in the NYT. It was called forever is now and God knows where it is – scored for tenor and small ensemble (there was certainly a vibraphone and a double bass – I was in love from afar with a bassist at J.). Oh, this being in love at seventeen. It was so difficult not to be. No English reserve here. People talked to you, were interested in you and what you thought, had heard, had read. You only had to say you’d been looking at a book of Andrew Wyeth’s paintings and you’d be whisked off to some uptown gallery to see his early watercolours. And on the way you’d hear a life story or some intimate details of friend’s affair, or a great slice of family history. Lots of eye contact. Just keep the talk going. But Gloria, well, we would meet in the hallway and she’d grasp my hand and say – ‘You know, Larry says that you work too hard. I want you to do nothing this weekend except get some sun and swim. We can go to Johnson’s for tennis you know. I haven’t forgotten you beat me last time we played!’ I suppose she was mid-thirties, a shirt, shorts and sandals woman, not Larry’s mother but Dr Benson’s third. This was all very new to me.
 
Tim was Larry’s elder brother, an intern at Felix-Med in NYC. He had a new girl with him that weekend. Anne-Marie was tall, bespectacled, and supposed to be ferociously clever. Gloria said ‘She models herself on Susan Sontag’. I remember asking who Sontag was and was told she was a feminist writer into politics. I wondered if Anne-Marie was a feminist into politics. She certainly did not dress like anyone else I’d seen as part of the Benson circle. It was July yet she wore a long-sleeved shift buttoned up to the collar and a long linen skirt down to her ankles. She was pretty but shapeless, a long straight person with long straight hair, a clip on one side she fiddled with endlessly, purposefully sometimes. She ignored me but for an introductory ‘Good evening’, when everyone else said ‘Hi’.
 
The next day it was hot. I was about the house very early. The apple juice in the refrigerator came into its own at 6.0 am. The bay was in mist. It was so still the bell buoy stirred only occasionally. I sat on the step with this icy glass of fragrant apple watching the pearls of condensation form and dissolve. I walked the shore, discovering years later that Rachel Carson had walked these paths, combed these beaches. I remember being shocked then at the concern about the environment surfacing in the late sixties. This was a huge country: so much space. The Maine woods – when I first drove up to Quebec – seemed to go on forever.
 
It was later in the day, after tennis, after trying to lie on the beach, I sought my room and took out my latest score, or what little of it there currently was. It was a piano piece, a still piece, the kind of piece I haven’t written in years, but possibly should. Now it’s all movement and complication. Then, I used to write exactly what I heard, and I’d heard Feldman’s ‘still pieces’ in his Greenwich loft with the white Rauschenbergs on the wall. I had admired his writing desk and thought one day I’ll have a desk like that in an apartment like this with very large empty paintings on the wall. But, I went elsewhere . . .
 
I lay on the bed and listened to the buoy out in the bay. I thought of a book of my childhood, We Didn’t Mean to Go to Sea by Arthur Ransome. There’s a drawing of a Beach End Buoy in that book, and as the buoy I was listening to was too far out to see (sea?) I imagined it as the one Ransome drew from Lowestoft harbour. I dozed I suppose, to be woken suddenly by voices in the room next door. It was Tim and Anne-Marie. I had thought the house empty but for me. They were in Tim’s room next door. There was movement, whispering, almost speech, more movement.
 
I was curious suddenly. Anne-Marie was an enigma. Tim was a nice guy. Quiet, dedicated (Larry had said), worked hard, read a lot, came to Larry’s concerts, played the cello when he could, Bach was always on his record player. He and Anne-Marie seemed so close, just a wooden wall away. I stood by this wall to listen.
 
‘Why are we whispering’, said Anne-Marie firmly, ‘For goodness sake no one’s here. Look, you’re a doctor, you know what to do surely.’
 
‘Not yet.’
 
‘But people call you Doctor, I’ve heard them.’
 
‘Oh sure. But I’m not, I’m just a lousy intern.’
 
‘A lousy intern who doesn’t want to make love to me.’
 
Then, there was rustling, some heavy movement and Tim saying ‘Oh Anne, you mustn’t. You don’t need to do this.’
 
‘Yes I do. You’re hard and I’m wet between my legs. I want you all over me and inside me.  I wanted you last night so badly I lay on my bed quite naked and masturbated hoping you come to me. But you didn’t. I looked in on you and you were just fast asleep.’
 
‘You forget I did a 22-hour call on Thursday’.
 
“And the rest. Don’t you want me? Maybe your brother or that nice English boy next door?’
 
‘Is he next door? ‘
 
‘If he is, I don’t care. He looks at me you know. He can’t work me out. I’ve been ignoring him. But maybe I shouldn’t. He’s got beautiful eyes and lovely hands’.
 
There was almost silence for what seemed a long time. I could hear my own breathing and became very aware of my own body. I was shaking and suddenly cold. I could hear more breathing next door. There was a shaft of intense white sunlight burning across my bed. I imagined Anne-Marie sitting cross-legged on the floor next door, her hand cupping her right breast fingers touching the ******, waiting. There was a rustle of movement. And the door next door slammed.
 
Thirty seconds later Tim was striding across the garden and on to the beach and into the sea . . .
 
There was probably a naked young woman sitting on the floor next door I thought. Reading perhaps. I stayed quite still imagining she would get up, open her door and peek into my room. So I moved away from the wall and sat on the bed trying hard to look like a composer working on a score. And she did . . . but she had clothes on, though not her glasses or her hair clip, and she wore a bright smile – lovely teeth I recall.
 
‘Good afternoon’, she said. ‘You heard all that I suppose.’
 
I smiled my nicest English smile and said nothing.
 
‘Tell me about your girlfriend in England.’
 
She sat on the bed, cross-legged. I was suddenly overcome by her scent, something complex and earthy.
 
‘My girlfriend in England is called Anne’.
 
‘Really! Is she pretty? ‘
 
I didn’t answer, but looked at my hands, and her feet, her uncovered calves and knees. I could see the shape of her slight ******* beneath her shirt, now partly unbuttoned. I felt very uncomfortable.
 
‘Tell me. Have you been with this Anne in England?’
 
‘No.’ I said, ‘I ‘d like to, but she’s very shy.’
 
‘OK. I’m an Anne who’s not shy.’
 
‘I’ve yet to meet a shy American.’
 
‘They exist. I could find you a nice shy girl you could get to know.’
 
‘I’d quite like to know you, but you’re a good bit older than me.’
 
‘Oh that doesn’t matter. You’re quite a mature guy I think. I’d go out with you.’
 
‘Oh I doubt that.’
 
‘Would you go out with me?’
 
‘You’re interesting.  Gloria says you’re a bit like Susan Sontag. Yes, I would.’
 
‘Wow! did she really? Ok then, that’s a deal. You better read some Simone de Beauvoir pretty quick,’  and she bounced off the bed.
 
After supper  - lobster on the beach - Gloria cornered me and said. ‘I gather you heard all this afternoon.’
 
I remembered mumbling a ‘yes’.
 
‘It’s OK,’ she said, ‘Anne-Marie told me all. Girls do this you know – talk about what goes on in other people’s bedrooms. What could you do? I would have done the same. Tim’s not ready for an Anne-Marie just yet, and I’m not sure you are either. Not my business of course, but gentle advice from one who’s been there. ‘
 
‘Been where?’
 
‘Been with someone older and supposedly wiser. And remembering that wondering-what-to-do-about-those-feelings-around-*** and all that. There’s a right time and you’ll know it when it comes. ‘
 
She kissed me very lightly on my right ear, then got up and walked across the beach back to the house.
Copycat, copycat.
Mimic all that I do,
Even though
you know
it's not good for you.

Copycat, copycat.
Do not be a fool.
You can fool
So many people.
But not me;
I will not drool
All over you.

Copycat, copycat.
Giveback my life.
No, I do not care if copying me is how you survive.
No, I hate you a lot... so goodbye.

Copycat, copycat.
I shouldn't call you so:
You're a *****, and I hope that you know.
I appoint you head ***** from now on.
Bam! Scram!
It's about time that you've gone.
Ahaha this is a phat mood
Nat Lipstadt Jun 2023
You Are the Texture

…………………………

~ for all of you,
you, you poet~



Impasto

is a technique used in painting,
where paint is laid on an area of
the surface thickly, usually thick
enough that the brush or  painting-
knife strokes are visible.

Paint can also be mixed right on
to the canvas. When dry, impasto
provides texture; the paint appears
as if, to be coming out of the canvas.


<1:47pm>

Cut & Paste

is a technique used in poetry writing,
we refer back to our visions,
heard words,
the eyeful, the earful, scents,
the reads read,
all in the mind’s palette blended,
thickly, but
when

the merging fused,
every word~in~coloration,
it is unique, reincarnation,
copying impossible.

The imagery, cut and pasted from thy heart and soul,
upon canvas,
your poems~pieces each appear

as you-are-texture,
you becoming out of, you,
the canvas.

<2:04pm>


Postscript*
………………

it is not lost on me that the
scars, our words, herein,
as we note all too frequently,
almost casually,
are, can be, those selfsame
words/painting-knife
employed
for our first and foremost canvas we utilize,

ourselves…
our bodies,
our
very selves
salved
Fri Jun 23
2023
Grant Mailo Nov 2012
I can be you, or I can be them
I can be she, or I can be him
but why be a con artist of someone else
like a shadow to my best friend, when I
can be my own person, a unique creation
created in the image of God but representin my own reflection
because I don't wanna see you, them, she, or him in the mirror
I wanna see me through my own eyes, 20/20 vision, but clearer
but the more I conform, the image of someone else draws nearer
and I begin to lose sight of myself, look back in the mirror, and see myself in the rear
a shadow to another figure, a copy of a personality
livin' out another person's dreamed out reality
copying what they think, and succumbing to conformity
but that ain't me....
what you see visually and how I appear physically
is what makes me comfortable, that's why I'm an independent, politically
I don't follow the norms and rules of what's most accepted socially
the only commandments I live by are the ones given Biblically
I ain't  the best saint though, I mean I do sin every day
but the only one I wanna copy is Jesus Christ, in every possible way
on the other hand, Satan is out there,
trynna tempt me on how to act and even what words I say
he's out offering me drinks, but I reply, "I'm okay"
cause I don't care if "everyone else is doin' it"
I just live how I like to live, that's what makes me a true non-conformist

I dress how I wish and not because it's in style
I keep my hair big, I do whatever makes me smile
I'm not trynna impress you or fit into your clique
I don't give women pick-up lines and act like I'm slick
I'm me, just me, no facades, just real
and if you can't accept that, then move forward but don't steal
the things that make me special, from my poems to my appeal
so don't try to change me and keep my uniqueness concealed
I could care less about your thoughts and any of your judgements
I refuse to give your words power, I can make your points become pointless
I'm not trynna be harsh, I just love to be different
I wanna be an original and keep my vibe realistic
not a second you, but a first me, no counterfeit
I try to keep up with what God said in Matt 26
verse 41, the spirit is willing, but the flesh is weak
so pray not to give into temptation and stay on your feet
I encourage us to keep our standards and what makes us unique
and accept anyone else who doesn't wanna repeat
everything you say, and everything you do
sometimes it's the people that are different that come off the most true
because they're not sayin or actin' in ways that you approve
they're given you their honest opinion, you should keep them closest to you
don't conform, forget what people want you to be
just be yourself, not a copy of reality TV.
spoken word piece I wrote for an event called "speak on, speak on it". the event was put on by 2 organizations I'm involved in at ASU, B.A.D. [black artists and designers] club and ASU NAACP. the topic was conformity. this is a piece I started and wrote just a couple hours before the event. I really procrastinated on this one. what I'm basically trying to say is this poem is a rushed job. please don't judge me too hard lol this isn't me at 100%! constructive criticism is more than welcome though.
Skylar Del Re  Sep 2015
copy rat
Skylar Del Re Sep 2015
They say copying is the highest form of flattery
but i think its because you have no originality
always replicating what i do
is it just me
is there any thoughts inside of you
everything you do
is because of someone else
can you really not see it
how can't you tell
we all see right through it
open your eyes and you will too
stop trying to be me
and start being you

copy cat copy cat
annoying little copy rat
copy cat copy cat
mindless spineless poison trap
copy cat copy cat
shady lame copy rat
copy cat copy cat
do you have a brain in tact

Now don't get me wrong i don't think i'm anything that great
not trying to be rude this is not something i want to debate
so now do you get the whole picture
why be a sheep
when you can bite just like a wolf
you've got so much to offer so why be another
a whole entire world out there
so why even care
just be the one you are
with nothing to loose you'll go so far
i know there's more to you
parts i can't see through
Johnny Noiπ Jul 2018
New York
                               after a trip to Mexico, & not finally explored
.
   In 1991, shortly before he died,
                                  Motherwell
  remembered a "conspiracy of silence"
                       regarding Paalen´s innovative role in the genesis of Abstract Expressionism.

Upon return from Mexico,                       Motherwell
              spent time developing his creative principle
              based on automatism:
   "what I realized was that Americans
     potentially could paint like angels,              but that there
     was no effective                        creative principle around,                
     so that everybody
     who liked modern art        was copying it;
                           Gorky was copying Picasso;
                         ******* was copying Picasso;
                  De Kooni
                                  ng was copying Picasso;
              I mean,          I say this unqualifiedly,    
              I was painting French intimate pictures or whatever:
            All we needed was a creative principle,
            I mean something that would mobilize this capacity
to paint in a creative way,                   & that's what Europe
                        had that we
                        hadn't had;                        
                        we had always followed in their wake
                        &       I thought of all the possibilities
            |               [                    ], [                 ]
   of free association—because I also had
   a psychoanalytic background
& I understood the implications of—let's just say it
might be the best chance
                          to really make something entirely
new which everybody agreed was the thing to do;"
Thus, in the early 1940s,          Robert Motherwell
played a significant role in laying the foundations
for the new movement of
Abstract Expressionism (or the New York School):
                 "Matta wanted to start a revolution,  m [a movement w/in
                   Surrealism].
                  He asked me to find some other
                  American artists that would help start   a new movement;
                  it was then that Baziotes
                                           & I went to see ******* & de Kooning
      & Hofmann & Kamrowski &     Busa & several other people;
     &                                           if we could come with something;
     Peggy Guggenheim, who liked us said that she
     would put on a show of this new business;
     ... so I went around explaining         the theory of automatism
     to everybody because the only way
     that you could have a move - - - ment
     was that it had some common
                                                        principle. It sort of all began that way."

In 1942 Motherwell began to exhibit
       his work in New York and in 1944
       he had his first one-man show at
       Peggy Guggenheim’s “Art of This Century” gallery;
                  that same year,                   the MoMA
                  was the first museum
                  purchase one of his works;   From the mid-1940s,
                  Motherwell [                   ], [                 ]. (            )
                  became the leading spokesman
                  for avant-garde art in America;
                  his circle coming to include                        
                  William Baziotes,
                  David Hare, Barnett Newman,                         & Mark Rothko,
with whom he eventually             started the Subjects of the Artist School (1948–49). In 1949 Motherwell divorced
            Maria Emilia Ferreira y Moyeros    and in 1950 he married Bettie
                                                                ­  Little,
                                                                ­  with whom he had two daughters
Directed by ****** O. Bradley
Nebuleiii Mar 2013
To my innocence, naivety, and viridity
Childish ways, high school days.
A mere three weeks, I say good bye
With a cry, a tear, a sigh.

To blue slacks, and a polo
Black shoes and white socks
To my pink skirt, and white blouse,
Pleated, soon to be folded.

To the OHS rooms of our first and second years:
The broken windows, and tantrum-kicked chairs,
The broom box behind the spider webbed chalkboard,
Messages on the wall hand printed in red and green.

The broken doorknobs, and broken floorboards,
Carved armchairs, and eaten chalks,
Missing brooms and dustpans and garbage cans and rugs
That show up in who knows where
Stolen by jani- we know who.

The witnesses and victims
To our random laughter (from some Chinese-looking girl’s corny joke).
Our random tears.
Our not so random learnings.
The pillars of our memories.

To the PF rooms of our third year:
The storage room turned gigantic garbage can and dressing room (maybe because ours keep being stolen)
The exploding socket causing sparks to fly (and us to fly away from it), and
The amazing “alambre” lock; who knows who installed (as if that could keep us away).
The earthquake resistant rooms would be missed.

To the New High School Building of our last years:
The kicked door (not our fault!), and cancerous blinds (like hairs falling after chemo),
The jigsaw floor (not sure if better than broken floorboards),
The “Halayan 2012”, and
The mind-boggling “no key needed” lockers.


The UTMT with its fair share of mango sentences,
The old guidance office now turned “tambayan”, and
The Computer lab with its fragile yellow chairs and bruised bums.

To Ibong Adarna plays, and the half cooked uncooked Teriyaki,
Generation X (and Generation NOW! and Generation Facebook),
Jai ** dances, and cheerleading,
Kalagon Kamo Namon,
And Mickey Mickey Mouse Kabit-bintana memories.

To the NikJep Tandem,
Kanlaon Boys Behind the Flowers,
D.H.A.I.N.G. (not sure if they remember this),
Fred vs Gino version
And DewBheRhieTart.

Keep the volcanoes of memories burning.

To blue paint, and blue shirts,
And Geometry teaching us
“There are a lot of solutions to a problem.
We just have to find one that suits us.”

To saying “***”,
And cooking imbutido.
And wearing (for some designing) reduced,
Reused, recycled clothing.
And dissecting.
And parrot-Filipino teachers (she gave me P30 for load though).

Keep the river of rumination flowing.

To being scared of one whole sheet of paper,
Two becoming one,
Party rocking to make up for the tears,
And knowing we should have won.

To the hand sanitizer girls,
The Cream-o-holics,
The Canterbury Crusaders,
The Valenciana eaters.

May our tree of friendship continue growing.

To our winnings!

The glow in the dark madness,
The Lakan at Mutya clutch-heart-moments,
The Sports Fest *******,
Basketball girls’ coronation!

To the fieldtrips and failed trips,
To air conditioned crammings,
And space and time bending
To comparing notes (and sometimes other things)
Copying notes, sometimes photocopying
(Not Xeroxing)
Sharing words, phrases, sentences
And giving pictures (via Bluetooth).

May you keep walking on the right direction,

To the expectations achived,
Broken, overtaken.
All the skepticism,
Constructive criticism.

All of it.

The in-your-face-we-did-it-baby-
We-are-awesome-you-can’t-bring-us-do­wn-
Coz-we-rise-back-up-attitude.

To Arielle
And Mhae

To Amica
Marie
Narzcisa
Cyan
Fred
Theo
Alvinson
Anthony
Faith
Karmil­la
Matt
Jeffson
Lourince

To Carolyn

To Makayla

To the thirty-five castaways in this room
The thirty-five castaways who struggled
The thirty-five castaways who persevered
The thirty-five castaways who fought, cried, made up, laughed, shared, gave, back-stabbed, and front-stabbed, celebrated, suffered, passed
Thirty-five
Thirty-five castaways who loved,
Thirty-five

Thirty-five castaways who made it, who did it.

To Nikki
Hazel
Alyssa
Gef
Veni
Alex
Jaykee
Bernard
Myra
Vince
Chanta­lle
Josen
Jerian
Shaira
J
Uriah
Ihra
Renz
Bless
Steffany
Angel
Fl­orey
Bernadine
Antonette
Rency
Owen
Majah
Gino
Marcelo
Ney
Keith
­Joselle
And Jessa,

We did it guys.
We really did.
TO MY CLASSMATES (IV-ILAWOD)
So many private jokes and inside thoughts. So many.
serch elen Mar 2013
Have you ever didn't remember Win 7 administration password? If so, then it's very annoying and irritating. This is often a avoidable problem a lot of the customers find. However, don't worry you will find plenty of solutions with this particular. A lot of the customers, who didn't remember their password either, choose formatting their hard disk or operating their system, but it's not needed in lots of of cases to do something.

Well, you might find the password hint in your mind. Whenever you produced it you had been motivated to record an argument for example "Password=my birthday!" Whenever you now enter the wrong password at logon time then your phrase "Password= my birthday" can look immediately underneath the password prompt. Unless of course you're as old like me, this can help remind you the correct password is "your birthday".

You might attempt to totally reset password from command prompt:
Command Prompt: The command internet user *** abc w ill set the password for user *** to abc. You are able to only put it on a free account apart from your personal for those who have admin rights.
Also, you might attempt to stick to the below steps to totally reset windows 7 password:
Step One. Turn on laptop and set the windows Compact disc within the Compact disc ROM.
Step Two. Your screen will highlight the content for startup the Compact disc. Now, press any crucial for start startup.
Step Three. When the process will end up, your screen can have the setup all of which indicate the strategy is being looked over and files are loaded.
Step Four. After you are can comprehend the message about welcoming within the fix screen then press ENTER key to begin.
Step Five. Now press F8 for accepting the license contracts.
Step Six. Now your screen create provides you with several choices, choose repair option.
Step 7. When the repair will begin, it will require a very long time because disk has been underneath the technique of checking, set up files are replicated.
Step 8. Restarting is essential in case your technique of copying files is finished. It'll start itself as well as have the ability to the progress bar on screen. It should take nearly only a couple of seconds.
Step 9. Please be aware that don't make mistake of pressing any type in between restarting process as well the Compact disc again. When restarting will most likely be achieved, screen will instantly show the conventional billboard screen and you'll watch that setting up home windows will be outlined.
Step 10. Press Change F9 after you will notice the unit progress bar for that extreme left side from the screen. ALAS! This is actually the security hole. Now, command console will probably be opened up for you and could provides you with the chance to achieve much of your entire body.
Step 11. Type NUSRMGR.CPL inside the prompt then you'll wish to press ENTER. Immediately, after entering you're getting access of user accounts in the control sections.
Step 12. Now, simply choose the account you will need to modify the password or get rid of the password whoever you hire to consider is way better for you. If you want to take away the password then enter control userpassword2 and select the chance for logging into sites without password. Now, close the home windows and exit out of your command box and keep using your projects of repairing.
Step 13. Whenever your repair is finished, you'll be able to login pc together with your new password or without password, pick one you've preferred.

After reading through the above mentioned lengthy instructions regarding how to admin password, would you understand? Or are you able to do Windows 7 reset password with no problem? If no, It is best to make reference to professional windows Password Recovery Tool!
Source from:http://www.passwordunlocker.com/knowledge/reset-windows-7-password.html
DaSH the Hopeful May 2016
As talent drained from every inch of my mind
I found reading other's work only made me jealous
                   I started to feel unpopular
          Not enough ideas left to create anything at all. Not a single drop of inspiration.

      As all of theses emotions and realizations mixed together

I became okay with copying your work.

       I can imagine you slaving in the dark
Racking your brain to find the perfect words to finish the last line


       Lucky for me I have it all right here, completed and ready to post
     Finished and polished and prepackaged with a message I didn't think of but everyone will commend me for.




    *I hope you enjoy it.
Not actually plagiarized. Just tired of seeing others plagiarize on here.
Amber Crystal  Jun 2018
Copycat.
Amber Crystal Jun 2018
Why are you copying me?
Doing everything I do.
I've seen the way you act,
And this will be nothing new.

Why are you copying me?
Doing everything I do.
What about my opinions and thoughts
Are you after those too?

Why are you copying me?
Doing everything I do.
I don't think you realize,
The hell I've gone through?

Why are you copying me?
Doing everything I do.
Even if you try as hard as you may,
What you portray will not be true.

Why are you copying me?
Doing everything I do.
I'm hurting and broken inside,
but I cannot pass that on to you.
I wrote this many years ago while at school. Someone was ruining everything by pretending to be me. Instead of intervening, I did this to get out the feeling of frustration. All is okay now and I couldn't be happier.

— The End —