Submit your work, meet writers and drop the ads. Become a member
anastasiad Dec 2016
Software program designers ordinarily apply certain types of layer technological know-how to shield their software to avoid illegitimate apply. In addition need software layer software is permitted to obtain articles, to be able to boost product sales profit.

Software package encryption technology is split in accordance with whether or not the by using a devoted hardware-based encrypted sheild hardware as well as software-based security. Hardware-based layer, layer have to bind having a focused hardware unit, the particular electronics shield of encryption layer head of hair, typically referred to as the dongle. Software-based layer, encryption does not need focused electronics, typical executed digital camera permission while using the your fatal unit hardware and software data, also referred to as this electronic digital endorsement styles.

Simply consider drive-based electronics encryption stability when compared with software-based shield of encryption will not be suitable, as the more linked to program security, like encrypted sheild products and solutions, stability, encrypted sheild plan style, software, systems, , equipment, details marketing and sales communications, and the like, is really a detailed technological spots, not alone by a to discover whether protection.

Far away, the market industry promote of the digital permission along with security tresses are evenly coordinated. Behavior and also fantastic factors, the actual layer hair likewise enjoy a certain share of the market. File encryption hair, however, will be the network produced merchandise in the instances, can be a pure consumer technology, insufficient operations and also record capabilities, the inclusion of appliance manufacturing, strategic planning, driver installation annoyance, but not only the high cost, and might stop obtained multilevel submission and sales of your computer software, is definitely gradually diminish.

Enhancing the electronic acceptance that is certainly while in the ascendant. Electrical certificate protection approaches are getting to be progressively more included in the Internet technology, cloud computing and also SaaS thought is not just easier to make use of along with cope with computer software electric situation and be able to accomplish, but according to present day natural low-carbon improvement strategy, has got supplanted the encryption curly hair Outstanding software program encryption market trends. The more well-known businesses on the planet, Microsoft, Sun microsystems, Autodesk, SIEMENS, Adobe and various computer software are electronic consent safeguards function.

In the nation, using file encryption software package coders fasten greater premiums, along with international routines and also historic causes of the actual continuation with the next 2 reasons:

One particular every day producers typically regarded security encrypted sheild a lock electronic digital authorization.

There's not just about any readily available electronic digital licence products and solutions too big, the asking price of foreign electronic digital permission.

In reality, while using the rising betterment of your multi-level surroundings, your system triggering for the majority of home end users 's no trouble. And even brought up previously, which the point of view from the safety of layer head of hair electric permission on the sides completely wrong. From your reasonable mindset, this file encryption hair as a result of computer hardware copying much easier to crack, but accomplished piracy business sequence has been made. In its place, electronic digital endorsement because appliance is not replicated, but in addition should system arousal plus approval, in reality, have good safety outcome. Additionally, your every day has showed up in some accredited goods give electric 2-3 enterprise will have to improve while using growth of China's software package sector and grow up.

As a result, your layer computer software market styles hardware, web 2 ., and details technologies. Below, we speak about, in the application encryption approach specific to be able to detailed application encrypted sheild establishment plus progress craze of the marketplace.

Very first, the software encryption approach

As mentioned previously, it encrypted sheild technologies are divided into security hardware-based as well as software-based security.

Your hardware-based shield of encryption

Hardware-based encryption shield of encryption locks, many important info, like shield of encryption secrets to vulnerable information, consent paperwork, tailor made sets of rules, etcetera. can be stored in this dongle.

The layer fastener screen variety is split in to 2 kinds of synchronised slot and also Flash interface. This simultaneous port could be the very early technique type, because the propagation troublesome plus clash while using the printer's, and after this has less apply. A lot of builders employ tend to be USB slot dongle.

File encryption hair from the two kinds of CPU form, the microcontroller to get Pc and another with a clever minute card processor for the reason that Pc a microcontroller computer hardware by itself conveniently trouble area or content, therefore an increasing number of high-end file encryption a lock employing a intelligent credit card chips Central processing unit, to stop hardware break. Although a growing number of clever card dongle crack, initially, because processor might be more and even more leading-edge analytic techniques and devices; sensible card program to be written to the chips manufacturing unit to make during this time method may possibly trickle; encrypted sheild tresses of the identical manufacturer your Processor process is the same, merely various designers facts as well as major, in case most of these records are passed out there, you can easily clone.

Dongle features a specific level of security power, but you can also find a number of drawbacks:

One) apply at the regular one-time never ending license, can't assist in the achievements of your trial model along with on-demand invest in

3) the presence of electronics generation, logistics, assembly as well as upkeep charges

Three) is not achieved the issue with Internet-based electronic digital improvements, tracking along with control

Several) Once broke, may be burned huge, it is sometimes complicated to remedy

A pair of software-based encryption

Software-based encrypted sheild, digital acceptance, and certain in addition separated into home equity loans number plate along with licenses document:

In order to register code can be referred to as successive number or consent computer code, acquired using a alteration in the the program end user computer systems along with program facts, possible software and hardware facts, including: Cpu serial number, BIOS sequential amount, greeting card amount, harddisk sequential number, computer system brand, etc. . Completely transform formula made use of your customized protocol or maybe conventional shield of encryption algorithm formula. Customer as well as primary utilisation of the computer software installment practice, you might want to type in the enrollment value to confirm. Following verification, it can be employed typically. The particular strategy has got the good thing about this subscription computer code defense is easy to use, the downside is always that security is not really higher, not able to attain complicated endorsement demands.

Permission submit as well as the signing up code in order to situation the same computers plus software information, simply a registration signal period confines utilization of both software and hardware information, a permission record can use numerous hardware and software info. Also, the actual permission report can contain more info, to help you obtain the difficult agreement demands, and may perhaps retail outlet several customer facts. The average permission report way is to implement the private key in the asymmetric algorithm to hint your certificate data file, while the general public secret is embedded in the application value. Asymmetric shield of encryption plus understanding course of action, the private computer essential consent hosting server exists, it is hard to compromise from the investigation regarding endorsement paperwork.

Some great benefits of this electric endorsement safeguard doesn't require further electronics, and for that reason doesn't have to mount the motive force as well as buyer elements, electronic digital hardware issue. The disadvantage from the automated certificate safety mode just isn't networked buyers really need to hand remove your computer information, and then personally significance registration constraints or even permission, is not very easy to use. Additionally, the particular domestic electronic digital acceptance a few of the programmers from the product or service, that also limits your popularization and promotion connected with electric permit safeguard technology.

Subsequent, it encrypted sheild field advancement status

A single. File encryption curly hair

The main unusual dongle professional SafeNet, Corporation. in the usa in addition to Germany Wibu.

Security head of hair service deeply Supposrr que Luoke and also Feitian. The 2 main organizations due to the affordable prices, the first person to introduce the actual good minute card shield of encryption curly hair nearby perfectly so that you can enjoy some market place in the nation.

A pair of. Electric permission

Unfamiliar company certified merchandise to supply electronic digital Flexera Software and also SafeNet which will, Flexera Software program is focused entirely on the joy of digital permission, the actual device's ease of use along with features are doing superior, though the valuation on the item is additionally quite high.

This home-based electrical authorization goods enterprise a Beijing Biteansuo (BitAnswer), Shenzhen-use this (Euse) Safengine Organization.

There are only a few companies will acquire their very own electronic digital consent structure, even so the builders to cultivate their own plans commonly occur this inquiries:

One particular) the introduction of non-professionals, there are numerous loopholes while in the security

A pair of) is actually difficult to realize accommodating accreditation control, management and also precise functions simple or maybe simply no

Three) are often unveiled to be able to address the particular fast problem connected with short-term method, create far more than predicted in the foreseeable future as a result of protection, balance and also scalability challenges continued to get

Several) can not meet up with sector variations as a result of the modern demands on program certification model

Software program security marketplace movements

The software security field developments is closely connected with the increase development with the computer software marketplace. With the rise in popularity of cloud-computing plus Software, service with application products will be change in the direction of the multilevel plus system. Used in nearly all software programmers, Software items can not only spend less a great deal of hardware and software buy plus servicing charges, you can also get demand from customers, when decreasing the use of possibility, driving program vendors in order to consistently strengthen items plus improve services to be able to sustain consumers.

To the development of system and program improvement can also be a software package encrypted sheild technologies movements. The view around the present-day growth trend, the encryption locking mechanism technologies have designed really develop fully information mill approaching vividness, slower advancement. The actual everyday living and make use of on the equipment practice creates security head of hair are not able to conserve the speed regarding advancement of the Internet period, are going to be substituted with the particular automated certificate.

Automated authorization permission through earlier subscription program code type on the feature-rich records available as modifications to technologies are considering verification process out of offline yourself confirm the introduction of computerized system authorization. Permitted administration contemplating particularly, your electrical licence technological innovation collected from one of software licence qualifications growth just as one authorized official certifications, agreement management and exact information and facts, and also other objective of each, significantly improved this permitted volume of details regarding computer software coders.

May forecast not able to electronic products certified solutions ought to have these most important properties:

Enlightening approved administration system: supplied by third-party safety measures specialized software designers, in line with the Net's one-stop software package safety plus endorsement management system, without having to deploy and observe after, low priced, easy-to-use.

Only two Bendable Certificate: offer the acceptance of the purchaser software as well as the cloud computing product common software package licenses; authorized touch time, the volume of sensible adventures; sanctioned in order to bind your computer software and hardware information and facts, encryption tresses, or by way of a username plus password validation way of agreement.

Simple and easy friendly buyer: in accordance with the WEB, at any place obtain; Users might food acquire, trigger boost the software, you can buy their unique software package to keep abreast of details; software package designers can certainly understand software initial information and facts plus individual data is often synergies through the people in the firm to finish the design of application license, enactment, supervision as well as maintenance operate.

5. Fog up accreditation unit: This is a cloud computing type of software program licensing. Standard application is genuine customer setup, endorsement can also be a buyer. Although cloud-computing could be the craze, although the move difficult for classic software package would be a wonderful way for the particular a higher level cloud computing modification. This definite awareness associated with tips, a common application approved move on the purchaser for the fog up on the endorsement remote computer, to ensure that small adjustments towards the application, but you can certainly instantly experience the great things about cloud computing: higher safety energy require to obtain clouds hard drive .

http://www.passwordmanagers.net/ Password Manager
anastasiad Nov 2016
Program web developers typically apply style of security technologies to guard the application in order to avoid against the law work with. Also need computer software encrypted sheild software packages are authorized to obtain written content, in order to increase the income profit.

Software encrypted sheild technologies are divided according to perhaps the by using a dedicated hardware-based file encryption hardware as well as software-based layer. Hardware-based layer, encryption have to emergency having a specific computer hardware device, this computer hardware encrypted sheild encrypted sheild hair, often called the dongle. Software-based file encryption, file encryption doesn't involve devoted computer hardware, common joining digital camera license while using the actual airport terminal device software and hardware details, also referred to as your automated acceptance sorts.

Just imagine drive-based appliance security safety in comparison with software-based encrypted sheild isn't right, because the much more included in program safety, which include layer goods, safety measures, encrypted sheild insurance plan design and style, software, operating systems, , appliance, data marketing communications, etc, is a extensive complex areas, besides by way of to ascertain no matter if safety.

In other countries, industry promote of your automated authorization and encryption tresses are consistently coordinated. Patterns and also famous explanations, this encryption head of hair additionally occupy a clear market share. File encryption a lock, nevertheless, could be the multi-level developed products with the moments, can be a natural customer technological innovation, deficit of control in addition to exact features, a good appliance creation, scheduling details, drivers installing irritation, but not only the high cost, and may stop achieved system circulation and purchasers from the software, is usually slowly decline.

The development of a electronic authorization that is certainly in the ascendant. Digital license safeguards procedures are becoming an increasing number of built into the world wide web know-how, cloud-computing in addition to SaaS strategy it isn't just easier to work with along with cope with software package digital situation and also accomplish, but will also according to present day environment friendly low-carbon advancement notion, possesses changed the shield of encryption hair Distinctive the software program encrypted sheild industry developments. The greater well-known organizations in the world, 'microsoft', Sun microsystems, Autodesk, SIEMENS, Adobe as well as other software package will be digital consent safety method.

In the united states, the utilization of layer application builders shut greater fees, with foreign behavior and historical causes of your continuation with the pursuing a couple reasons:

1 every day companies commonly deemed security encrypted sheild hair electronic agreement.

There are no longer just about any accessible digital license goods exorbitant, the price tag on foreign automated acceptance.

The truth is, with the expanding improvement of your circle surroundings, a community initial for many of us domestic users is not an difficulty. And also mentioned prior, how the viewpoint of your basic safety connected with encrypted sheild head of hair electrical permission sided incorrect. Coming from a authentic perspective, the shield of encryption curly hair as a result of components burning better to fracture, but accomplished piracy marketplace company has become produced. Instead, electrical consent since the electronics should not be cloned, but additionally must multi-level service in addition to affirmation, in fact, currently have excellent safeguard outcome. Moreover, your residential in addition has showed up in many registered goods supply automated 2-3 organization ought to improve while using the advancement of China's software field and also be upwards.

Hence, this encryption software package marketplace developments electronics, marketing, and details engineering. Down below, most people look at, through the software file encryption system distinct for you to elaborate program encrypted sheild establishment and also progression trend of this marketplace.

Primary, the program shield of encryption technique

As mentioned earlier, it shield of encryption technologies are divided into encrypted sheild hardware-based plus software-based file encryption.

A hardware-based encryption

Hardware-based file encryption encryption locks, many material, including layer fundamentals for vulnerable data, acceptance paperwork, made to order methods, and so on. could be trapped in a dongle.

Your security fastener interface style is divided directly into 2 kinds of parallel dock plus Flash harbour. The particular concurrent harbour would be the early on technique variety, because propagation inconvenient plus struggle together with the laser printer, and already has got much less employ. Almost all coders use are generally Flash user interface dongle.

Encryption hair on the two kinds of Computer kind, a microcontroller to get Cpu and another using a clever unit card processor for the reason that Pc the microcontroller appliance per se very easily trouble area or perhaps duplicate, so a lot more high-end security a lock utilizing a wise card processor Pc, to forestall computer hardware fracture. But a growing number of intelligent greeting card dongle split, primary, because processor chip is a bit more and a lot more sophisticated investigative methods along with resources; sensible greeting card method being composed to your chip manufacturing area to make within this program application could problem; file encryption hair of the exact same brand name the particular Cpu method is the identical, merely diverse builders facts along with critical, in the event that these types of data files are passed out and about, you can easily replicate.

Dongle carries a certain a higher level safety toughness, nonetheless in addition there are many drawbacks:

One) apply at the standard one-time constant permit, are unable to aid your results on the tryout release along with on-demand buy

A pair of) the use of hardware creation, scheduling details, installment in addition to routine maintenance charges

Three or more) is not realized the issue regarding Internet-based electronic enhancements, pursuing in addition to administration

Some) As soon as chipped, is usually ripped large quantities, it is hard to treat

A couple software-based shield of encryption

Software-based shield of encryption, electric endorsement, and certain as well separated into two types of registration plate along with permission file:

Enrollment rule is additionally referred to as the sequential range or perhaps permission rule, received by way of modification in the the software customer computer systems plus software program information and facts, the available hardware and software information, like: Computer successive number, BIOS serialized quantity, cards amount, disk drive sequential variety, computer title, and many others. . Completely transform algorithm employed your custom algorithm criteria or even normal layer algorithm formula. Customer and also first utilisation of the software package installing course of action, you might want to type in the enrollment value to make sure. Immediately after certification, software program may be used usually. The actual technique contains the advantage of your in order to register signal defense isn't hard to implement, the downside is usually that stability will not be large, struggle to achieve complicated consent needs.

Licence report and the subscription value for you to bind a similar computer hardware as well as software information, a subscription value time-span limits by using each hardware and software facts, a permission data file will use various hardware and software details. Additionally, the actual certificate file can contain details, so you're able to get the difficult authorization requirements, and might also retailer a number of end user information and facts. The typical certificate submit method to utilize the non-public major on the asymmetric protocol to help signal the permission record, as you move the general public key's baked into software program code. Uneven layer as well as decryption course of action, in which you crucial agreement hosting server is out there, it is not easy to break into throughout the study associated with acceptance docs.

What's so great about the particular digital agreement security does not require supplemental hardware, and as a consequence does not need to deploy the driver plus buyer components, electrical hardware issue. The disadvantage on the electric licenses safeguards method is just not networked people really need to manually remove your computer details, after which manually transfer subscription codes or even licenses, may not be convenient to use. On top of that, the actual domestic automated endorsement several of the designers with the products, which also limits a popularization and also campaign with electronic permission safeguard technological know-how.

Minute, it layer sector growth standing

A person. Security a lock

The main unusual dongle professional SafeNet, Inc. in the country as well as Australia Wibu.

Security tresses provider deep Supposrr que Luoke as well as Feitian. Both businesses due to the discount prices, the first one to create your intelligent minute card encryption tresses nearby well to be able to undertake a clear market place in the nation.

Only two. Digital acceptance

International business certified products and solutions to give electronic Flexera Application and also SafeNet which often, Flexera Applications are devoted to the realm of electronic digital agreement, this product's simplicity of use plus usefulness are accomplishing far better, though the expense of the item can also be very good.

A residential electric permission merchandise firm this China Biteansuo (BitAnswer), Shenzhen-use the actual (Euse) Safengine Corporation.

There are few companies will acquire his or her electrical consent plan, although the developers to cultivate their own programs normally are present the subsequent inquiries:

One) enhancing non-professionals, there are several loopholes inside stability

Two) is tough to obtain variable accreditation manage, management and mathematical functions very simple or virtually no

Several) could be introduced as a way to address the fast issue of short-term method, create far more than predicted in the future as a consequence of protection, stability along with scalability difficulties ongoing to pay

Four) are unable to fulfill market variations brought about by the revolutionary demands about software accreditation product

Application file encryption market developments

The program shield of encryption field developments is actually carefully involving the increase tendency with the software program business. Together with the interest in cloud computing and also Software, service of software package products and solutions will be alter in the way of the circle along with foundation. Used by the vast majority of software package builders, SaaS solutions will not solely save a great deal of hardware and software pay for and also servicing charges, you can also get requirement, although reducing the using chance, driving foundation providers to help continually develop solutions in addition to boost services for you to sustain shoppers.

For the roll-out of community in addition to system advancement can be another application shield of encryption technology fads. The scene about the present-day growth pattern, the actual shield of encryption secure technologies have created very experienced publication rack drawing near vividness, slowly growth. The lifetime and make use of in the hardware practice helps make shield of encryption curly hair are not able to take care of the velocity of development of online years, will be replaced by a electrical permit.

Electric agreement licence from very early sign up computer code sort to your feature-rich documents as modifications in technologies are considering authentication strategy coming from off-line yourself validate the growth of programmed community validation. Accepted control considering particularly, the electric licenses know-how from a single software package licence qualification development just as one authorized certification, consent management plus stats facts, along with other aim of equally, considerably elevated this sanctioned degree of details pertaining to program web developers.

Might forecast not able to consumer electronics accredited merchandise should have the subsequent principal features:

Good authorized managing podium: made available from third-party protection skilled software package programmers, in accordance with the Web's one-stop software package security and also permission operations foundation, without the need to install and sustain, affordable, easy-to-use.

Two Adaptable Licence: support the agreement of the purchaser software program as well as the cloud-computing model standard software package permission; approved press occasion, how many sensible web template modules; accepted so that you can hole the computer hardware and software data, encrypted sheild hair, and also using a user name and also private data verification way for consent.

Easy and warm and friendly buyer experience: in line with the World wide web, everywhere entry; Users could self serve buffet pay for, stimulate rrmprove the application, you can purchase their own software program to keep up-to-date with info; software program builders might discover more about application account activation details in addition to individual facts is usually synergies because of the individuals this company in order to complete the design of software licenses, implementation, supervision in addition to upkeep operate.

Five. Clouds licensing type: This is the cloud computing model of software program certification. Traditional software is natural purchaser rendering, permission can also be a purchaser. Whilst cloud computing could be the movement, though the transition difficult for common application will be a wonderful way for the certain amount of cloud-computing transformation. This definite realization regarding strategies, a common software program sanctioned shift in the buyer towards the cloud on the acceptance server, to make sure that small adjustments towards the software package, nevertheless, you can easily instantaneously have fun with the benefits associated with cloud-computing: higher security energy requirement to order foriegn safe-keeping .


http://www.passwordmanagers.net/products/Windows-Password-Recovery-Software-1.html Windows Password Recovery Software
Challenges and competition notified.
Every step codified.
Tears and sweat pacified.
Achievements and advancement glorified.
Regression and depression terrified.
Muscles and struggle verified.
Foes and conspirators mortified.
Plans of progress and purpose sanctified.
Grace and the Goodness of God testified.
Sweet pleasures of life.
Trials, Torment and Torture.
Eulogies and Elegies of visible characters.
Promising and decisive.
No conflicts, No dilemma.
Robin Carretti Aug 2018
We are not on a schedule
But we are working
Ivory skills of mastery hard
We can not afford to lose
The Elephants hearts diary
The Zen of topiary
      Details
  The good luck

The hard worker making
True buck the husk of fruit seed
The Peking God of duck
Superman of gifts of steel
The movie superstitious eyes
Everyday good earth cries
Elephant Trunk
Bring on the Holiday
The tuxedo the Elephant Tusk
Godly task the top rank

Anomalous

Questioning the situation not
so delicious
Sensual so moving vivacious
The comedy of errors
Ridiculous to the sublime

The compromising position
Waiting for the next
      "Crime"
Mens of romance
Holiday the gracious gray
Taking risks

*Gallivanting never separating love
Of the tusk, life holds too many risks

Smiles and baking
more loving
The harder you mix
    Wonderful Ivory
   An elephant is a true
   ingredient
Holding the whisk over creamed
Looking high up the
white feathers
Like a beauty, I have never seen

She loves to pick his holiday
Elephants circles the tie he's
her dream
There is no truth when its a holiday
when people
Laugh between there lies

Start running toward
Elephant Tusk
Moms homemade apple caramel
pecan pies
Conflicts subjects
to paint talk to the "Elephants"
With the dreamy ivory tusk

The fragrance of Ireland
Spicy Greens musk
King hand card player tough skin
*Holiday Queen got numbered in
The men million stars of
musk saved the day it flew in

You make me feel brand new
I never made a mistake
Never one that I couldn't explain
Running towards or afterward
Those love words
Before the Gods
The veal chops
Emperor of emails
The Cops and robbers

So modest and shy with demure 
 Holiday spirit world of hands galore
What allure dreamy contentment
She got holiday advancement

The contrast between
Holiday family love the honesty
but our government magical
mystery all bribery
Go for the tour just pour
your words
Quite a mystery white baking
flour messy
Moon and the Star handkerchief style
dressy

The Astronomy we need
to build a better
Here and the now
Wondering how?

Deep brown hazelnut
coffee royal bow
Seeing through the
Gray starting to pray
The parade of the Elephant
The day we can trust
This isn't a Fay Ray
not my kind
of town
The holiday comes and goes
too quick
There you are Rick and
his cousins
It felt like a holiday of
*Tombstones
The gathering with the finest
rhinestones

More sound of silence
Please no I phones
Shut them off enjoy the
Elephants tusk and
their home turf
Not the bluest sea
Make it the lovely
    (Earl Gray)
Bringing surf and turf
More conflicts those predictions
More spiritual afflictions

Just find your peace within
His Elephant pants win
You got the whole tusk
in your hand
"Snow White Huntsman"
Affection like a
housewarming
My holiday transformation

Neon Lion light of crystal ball
The spiritual Tree elephant
Touched a part of me the art
All the fine elements bring
us closer, not the copy
of an imposter

Something to smile about
The myriad
The full length of the camera
The Elephants has a heart
no drama
Flying so Ivory gown sheer
Moms roast will not
come next year
Red devil computer
Telling me there are
Ghostbusters and
travel gliders
I am the true
Elephant lover
More homestayers
music players

Men looking astronomically
Feeling silly
in their whiskers
The world is horrifying
But there is no denying
more praying
Her heart is very thick
Elephant skin close to her
heart is luck
What is happening
to our economy
The sad thing people are selling
Elephant's
Tusk for money we need
to stop this

Lucky Elephant tusk is
turning to good luck
We pray for the world
Holy bless
The holiday Spirit there is no Scrooge here this was done differently do you love Elephant husk please save them they are beautiful and good luck this cruel world is selling them we need to stop this
Kewayne Wadley Dec 2021
Through the red joysticks
And white & blue slap buttons.
Without the advancement of memory cards
Or weird split screens to
distract.
My last life is always the one
I save for you,
Through the experience points
and colorful gems
There’s much more to explore.
My first wow, my first time, my next again
& Again.
No matter how many times
I feel like I lose,
You’re the reason I always get back up.
My initials fill all ten slots of your heart,
Until you're decommissioned and pulled
Out of stock.
There they will always remain
Sachin Subedi Apr 2018
Technology
Has empowered humanity
Like humanity has been never been empowered
The concern
It has not only empowered humanity to a new level
Brings in the ill effects humanity might face
In the present and  future

The new concern for humanity
The use of technology in the wisest way possible
Earth and nature
The very root of humanity
Been in shade
Noblest thing that can be done
Is the wise use the of technological advancement
In the pathway of revival of nature
In the natural and earthly essence of life

Of course
In global scenario there are corporates
Big hulks
That only go for accumulating more and more
Whose concern
Is not the nature and humanity

Now the question arises
The history of humanity
We crave to discuss about now
Has it the future time frame long enough?
As the past time frame
We are talking about in interest
Or the ignorance and unconscious humanity
Lead to the path of eliminating its own race?
RAJ NANDY Sep 2015
RAJ NANDY
37 followers
AN INTRODUCTION TO THE ITALIAN RENAISSANCE IN VERSE
                                    By Raj Nandy
THE ITALIAN RENAISSANCE WAS A PERIOD OF TRANSITION
BETWEEN MEDIEVAL & THE MODERN  WORLD. I propose to
present in three installments my researched work for both the Art &
History lovers of this Site. Kindly take your time to read at leisure before commenting. Thanks, -Raj Nandy, New Delhi.

                   PART ONE: BACKGROUND
The Term Renaissance :
The word ‘Renaissance’ means ‘to be born again’ ,
Derives from French ‘renaistre’ and Latin ‘renascere’, -
both meaning the same !
Swiss historian Jacob Buckhardt by writing “The
Civilization of Renaissance in Italy”,
Helped to popularize this term during the 19th Century !
The Renaissance evolved out of ‘Christendom’ , which
was Medieval Europe ;
Ruled entirely by the Catholic Church and the Pope !
It formed a period of transition between the Medieval
and the Modern Age ,
And as a contrast to the preceding thousand years , -
Which the Latin scholar Petrarch christened as the
‘Dark Ages’ !
This era saw a revival of interest in classical learning
of Greek and Roman art and culture ;
Focused on individual’s life on earth , with a new spirit
of adventure !
Happiness was no longer shelved to an afterlife and
repentance for salvation ;
But it lay in the advancement of human beings on Earth , -
with secular contemplation !
Thus individualism , secularism , and humanism , were
chief characteristics of the Renaissance ;
With innovations in art, architecture , and a scientific
temper of thought !
Knowledge no longer remained confined within the cold
ecclesiastical walls ,
But it spread from Italy across Northern Europe , -
To distant English shores through France !
During the Renaissance era Humanism became its
dominant philosophy ;
And there begins our Renaissance Story, since knowledge
is no man’s monopoly !
Events leading up to the Renaissance were many ;
Let me now dwell upon some salient features which
shaped its History !

THE BLACK DEATH (Peaked between 1347-1352) :
It was brought by Genoese merchant ships from the Orient ,
The fatal bacillus of the bubonic plague carried in the blood
stream of rodents !
The plague from Sicily and Italy spread to Northern Europe ,
All medicines failed , and even the Church provided no hope !
After having raged for almost a decade it started to abate ;
But by then almost one-third of entire Europe’s population
lay dead !
This deadly plague which followed the Hundred Year’s War
between England and France ,
Created social , economic and political upheavals in Europe,
leaving little to chance !
People began to lose faith in the church and on sermons of
afterlife ,
Secular thoughts now prevailed in a world where only the
fittest could survive !
Shortages of labour brought an end to Medieval feudalism
and serfdom ,
And Europe gradually emerged out of those Dark Ages, -
to greet the rising Renaissance sun !
The meager labour force could now bargain for better
wages and individual rights ;
Later, merchant guilds protected specialized labour and
their human rights !
Cities got gradually built and a new social order began
to emerge ,
Historians say that Europe saw the rise of a new Middle
Class !
As Europe gradually begun to recover from the aftermath
of war , plague, and devastation ;
The City-States of Italy lit the torch of a new intellectual
emancipation !
But before moving onto the Italian city-states, I must
mention the Holy Crusades ;
Since the Crusades opened up the doors of knowledge
and trade ;
Helping this ‘New Learning’ of the Renaissance to spread !

THE HOLY CRUSADES (1095-1270) :
At the behest of Pope Urban II and his battle cry “God
Wills It! ” ;
The First Crusade was launched to recapture the Holy Land
from Muslim infidels !
Within a span of next two hundred years eight Crusades
were launched ,
The First one took Jerusalem , but the Second failed to make
Damascus fall !
The Third led by Richard the Lion Heart, made Saladin to
grant the rights , -
To Christian pilgrims to visit their Holy shrines in Palestine !
The Fourth Crusade had sacked Constantinople , - then a
commercial rival of the Italians !
Now cutting a long story short , let us see what History
has taught !
These Crusades helped in opening up the trade routes ,
For importing paper, spices, soap, silk and luxury goods !
Trade was carried out with the countries of Levant region ,
Which included the countries from Turkey to Egypt , -
Bordering the eastern seaboards of the Mediterranean !
These trade routes formed a major conduit of culture
and knowledge ,
And exchanges and interactions broadened the mental
horizon of the Italians !
From Constantinople, recently Christianized Spain , and
the Arab lands , -
The preserved ancient classical knowledge now reached
the Italian hands !
In their School of Salamanca the Arabs of  Spain ,
Had translated works of Aristotle and classical scholars
into Arabic , - thereby preserving the same !
Later scholars translated these precious works into Greek
and Italian ,
And thus the Ancient Classics saw a glorious revival !
The scientific, philosophical, and mathematical thoughts
of the Arabs had also entered Northern Italy ,
From Egypt and the Levant region , to enrich Pre-
Renaissance Italy !
And when Byzantine Empire fell to the Turks in 1453 ,
Its Greek scholars with their precious manuscripts flocked
into Italy !

THE CITY-STATES OF ITALY :
‘Italia’, once the epicenter of the mighty Roman Empire ,
Disintegrated into several small principalities breaking
up Italy entire !
Its mountainous rugged terrain was a barrier to effective
internal communication ;
And no strong unified monarchies emerged, as in other
parts of Europe !
Italy with its peninsula jutting out into the Mediterranean
Sea ,
Had begun to monopolize the trade routes, and also to
prosper economically !
During the time of the Renaissance , Italy had numerous
autonomous city-states and territories ;
Where a powerful leader called the Signore , ruled for
a fixed tenure initially ;
But later this post was declared as hereditary !
Kingdom of Naples controlled the south ;
Republic of Florence and the Papal States the center ;
Genoese and the Milanese the north and west respectively ;
And the Venetians the eastern part of Italy .
These Italian city-states prospered greatly from its growing
trade during the 14th century ;
Its cargo ships visiting Byzantine , and the cities bordering
the Mediterranean Sea !
It became a status symbol for rich families to patronize
art and culture ;
They vied with one another commissioning paintings
and architecture !
But the Italian city-state that had prospered the most ,
Was the city-state of Florence which became the host ;
And the ‘Cradle of European Renaissance’ !
...............................................................­­................................
* ALL COPY RIGHTS WITH THE AUTHOR -RAJ NANDY*
(My Part -II will contain the Story of Florence , - " Cradle of the
Italian Renaissance". Thanks for reading, do recommend this Verse to
your other poet friends!
Comments from Gita Ashok, an Educator, from ‘Poetfreak.com’:- A thoroughly researched erudite collection of historical facts presented in a very lucid and interesting manner. This write made me reminisce all those history lessons that I learnt in school many years ago - many of which I found boring as it was taught in an intimidating way. I feel like going back in time, becoming a student once again and learning history through such creatively written works of art. But I realize that we are all yet students of life and can still continue to learn and grow. I feel fortunate to have read this great piece of literary work and I look forward to reading the second part.-  by Gita Ashok | Reply
Edit poem

AN INTRODUCTION TO ITALIAN RENAISSANCE was added 21 hours ago.
‘Oinos.’

Pardon, Agathos, the weakness of a spirit new-fledged with
immortality!

‘Agathos.’

You have spoken nothing, my Oinos, for which pardon is to be
demanded. Not even here is knowledge a thing of intuition.
For wisdom, ask of the angels freely, that it may be given!

‘Oinos.’

But in this existence I dreamed that I should be at once
cognizant of all things, and thus at once happy in being
cognizant of all.

‘Agathos.’

Ah, not in knowledge is happiness, but in the acquisition of
knowledge! In forever knowing, we are forever blessed; but
to know all, were the curse of a fiend.

‘Oinos.’

But does not The Most High know all?

‘Agathos’.

That (since he is The Most Happy) must be still the
one thing unknown even to HIM.

‘Oinos.’

But, since we grow hourly in knowledge, must not at last
all things be known?

‘Agathos.’

Look down into the abysmal distances!—attempt to force
the gaze down the multitudinous vistas of the stars, as we
sweep slowly through them thus—and thus—and
thus! Even the spiritual vision, is it not at all points
arrested by the continuous golden walls of the
universe?—the walls of the myriads of the shining
bodies that mere number has appeared to blend into unity?

‘Oinos’.

I clearly perceive that the infinity of matter is no dream.

‘Agathos’.

There are no dreams in Aidenn—but it is here whispered
that, of this infinity of matter, the sole purpose is
to afford infinite springs at which the soul may allay the
thirst to know which is forever unquenchable within
it—since to quench it would be to extinguish the
soul’s self. Question me then, my Oinos, freely and without
fear. Come! we will leave to the left the loud harmony of
the Pleiades, and swoop outward from the throne into the
starry meadows beyond Orion, where, for pansies and violets,
and heart’s-ease, are the beds of the triplicate and triple-
tinted suns.

‘Oinos’.

And now, Agathos, as we proceed, instruct me!—speak to
me in the earth’s familiar tones! I understand not what you
hinted to me just now of the modes or of the methods of what
during mortality, we were accustomed to call Creation. Do
you mean to say that the Creator is not God?

‘Agathos’.

I mean to say that the Deity does not create.

‘Oinos’.

Explain!

‘Agathos’.

In the beginning only, he created. The seeming creatures
which are now throughout the universe so perpetually
springing into being can only be considered as the mediate
or indirect, not as the direct or immediate results of the
Divine creative power.

‘Oinos.’

Among men, my Agathos, this idea would be considered
heretical in the extreme.

‘Agathos.’

Among the angels, my Oinos, it is seen to be simply true.

‘Oinos.’

I can comprehend you thus far—that certain operations
of what we term Nature, or the natural laws, will, under
certain conditions, give rise to that which has all the
appearance of creation. Shortly before the final
overthrow of the earth, there were, I well remember, many
very successful experiments in what some philosophers were
weak enough to denominate the creation of animalculae.

‘Agathos.’

The cases of which you speak were, in fact, instances of the
secondary creation, and of the only species of
creation which has ever been since the first word spoke into
existence the first law.

‘Oinos.’

Are not the starry worlds that, from the abyss of nonentity,
burst hourly forth into the heavens—are not these
stars, Agathos, the immediate handiwork of the King?

‘Agathos.’

Let me endeavor, my Oinos, to lead you, step by step, to the
conception I intend. You are well aware that, as no thought
can perish, so no act is without infinite result. We moved
our hands, for example, when we were dwellers on the earth,
and in so doing we gave vibration to the atmosphere which
engirdled it. This vibration was indefinitely extended till
it gave impulse to every particle of the earth’s air, which
thenceforward, and forever, was actuated by the one
movement of the hand. This fact the mathematicians of our
globe well knew. They made the special effects, indeed,
wrought in the fluid by special impulses, the subject of
exact calculation—so that it became easy to determine
in what precise period an impulse of given extent would
engirdle the orb, and impress (forever) every atom of the
atmosphere circumambient. Retrograding, they found no
difficulty; from a given effect, under given conditions, in
determining the value of the original impulse. Now the
mathematicians who saw that the results of any given impulse
were absolutely endless—and who saw that a portion of
these results were accurately traceable through the agency
of algebraic analysis—who saw, too, the facility of
the retrogradation—these men saw, at the same time,
that this species of analysis itself had within itself a
capacity for indefinite progress—that there were no
bounds conceivable to its advancement and applicability,
except within the intellect of him who advanced or applied
it. But at this point our mathematicians paused.

‘Oinos.’

And why, Agathos, should they have proceeded?

‘Agathos.’

Because there were some considerations of deep interest
beyond. It was deducible from what they knew, that to a
being of infinite understanding—one to whom the
perfection of the algebraic analysis lay unfolded—
there could be no difficulty in tracing every impulse given
the air—and the ether through the air—to the
remotest consequences at any even infinitely remote epoch of
time. It is indeed demonstrable that every such impulse
given the air, must in the end impress every
individual thing that exists within the
universe;—and the being of infinite
understanding—the being whom we have imagined—
might trace the remote undulations of the impulse—
trace them upward and onward in their influences upon all
particles of all matter—upward and onward forever in
their modifications of old forms—or, in other words,
in their creation of new—until he found them
reflected—unimpressive at last—back from
the throne of the Godhead. And not only could such a being
do this, but at any epoch, should a given result be afforded
him—should one of these numberless comets, for
example, be presented to his inspection—he could have
no difficulty in determining, by the analytic
retrogradation, to what original impulse it was due. This
power of retrogradation in its absolute fulness and
perfection—this faculty of referring at all
epochs, all effects to all causes—is of
course the prerogative of the Deity alone—but in every
variety of degree, short of the absolute perfection, is the
power itself exercised by the whole host of the Angelic
Intelligences.

‘Oinos’.

But you speak merely of impulses upon the air.

‘Agathos’.

In speaking of the air, I referred only to the earth: but
the general proposition has reference to impulses upon the
ether—which, since it pervades, and alone pervades all
space, is thus the great medium of creation.

‘Oinos’.

Then all motion, of whatever nature, creates?

‘Agathos’.

It must: but a true philosophy has long taught that the
source of all motion is thought—and the source of all
thought is—

‘Oinos’.

God.

‘Agathos’.

I have spoken to you, Oinos, as to a child, of the fair
Earth which lately perished—of impulses upon the
atmosphere of the earth.

‘Oinos’.

You did.

‘Agathos’.

And while I thus spoke, did there not cross your mind some
thought of the physical power of words? Is not every
word an impulse on the air?

‘Oinos’.

But why, Agathos, do you weep—and why, oh, why do your
wings droop as we hover above this fair star—which is
the greenest and yet most terrible of all we have
encountered in our flight? Its brilliant flowers look like a
fairy dream—but its fierce volcanoes like the passions
of a turbulent heart.

‘Agathos’.

They are!—they are!—This wild
star—it is now three centuries since, with clasped
hands, and with streaming eyes, at the feet of my
beloved—I spoke it—with a few passionate
sentences—into birth. Its brilliant flowers are
the dearest of all unfulfilled dreams, and its raging
volcanoes are the passions of the most turbulent and
unhallowed of hearts!
SE Reimer  Jan 2015
the violin
SE Reimer Jan 2015
~

verse 1
in the town of Chateau Thierry,
along the banks of the Marne,
just up the road from Paris,
a’ fore it meets the Seine;
’twas here our soldiers fought
in nineteen-seventeen;
'twas here they took the Kaiser,
in the trenches, rain and mud.
the Great War, then they called it,
here the river ran with blood;
with bayonet and shovel,
here an Allied victory made;
to halt the enemy’s advancement,
here too many made their grave.

instrument of bow and strings,
in composition history sings.
if, one-day strings could talk like men,
if, we could sing like violin!
stories told will ne’er grow old,
tales of courage that build the soul,
of standing tall and shouldering on,
to play an orchestrated song.
all you archers raise your strings,
draw your bows despite the dark,
soldiers of a genteel king,
wield your power to strike the heart.

verse 2
near the town of Chateau Thierry
in a convent, St Joseph by name
a violin by Francois Barzoni,
a resident luthier by trade.
prized possession of the Sisters,
they tuned well it's strings.
their convent walls withstood the bombs,
though leaving here their mark;
defaced but not destroyed,
and so with grateful hearts,
the Sisters of St Joseph,
for brick and mortar trade,
gathered up their treasures
their convent to remake.

instrument of bow and strings,
with composure history sings.
if, only strings could talk like men,
if, we could sing like violin;
stories told will ne’er grow old,
tales of hope that build the soul,
of standing tall and shouldering on,
to play an orchestrated song.
all you archers raise your strings,
draw your bows to light the dark,
soldiers of a genteel king,
wield your power; rebuild the heart.

verse 3
from the town of Chateau Thierry,
they advertised their local gem,
“wanted: no strings attached;
no saint expected, no requiem.
just two hands to cherish,
and a patron of our instrument.”

this their prayer, “oh Lord, one wish,
may our search meet no resistance.
may we find a young apprentice,
please reward our long persistence.”

and so they found their debutant;
prayer answered in Saint Louis.
a boy who understood its voice,
with their strings again make music.

instrument of bow and strings,
of your journey history sings.
if, only strings could talk like men,
if, we could sing like violin;
stories told will ne’er grow old,
tales of old they build the soul,
of standing tall and shouldering on,
to play an orchestrated song.
all you archers raise your strings,
draw your bows and find your mark,
soldiers of a genteel king,
wield your power to soothe the heart.

verse 4
near the town of Chateau Thierry,
along the banks of the Marne;
ply this channel of the masters,
play us a river, Lowell Meyer;
once a boy, become grand-father,
then a treasure to receive;
heirloom placed within your trust,
your prize possession to bequeath
to yet another debutant,
its strings to pluck and bow to draw.
he a master of persistence,
who with practice met resistance;
yesterday’s grandson, beloved progeny;
tomorrow’s hope, an admired prodigy.

instrument of bow and strings,
with clarity your voice still sings.
if, only strings could talk like men,
if, we could sing like violin;
stories told will ne’er grow old,
for these are tales that build the soul,
of standing tall and shouldering on,
to play an orchestrated song.
all you archers raise your strings,
draw your bows and make your mark,
soldiers of a genteel king,
wield your power to touch the heart.

~

post script.

A violin…  an instrument of hollowed wooded frame, strung with five strings made of gut, played by the drawing of a bow of hair crosswise over strings tuned in perfect fifths; an instrument of song with uniquely, beautiful voice.  Whether played as a violin with symphonic overture in a seventy-piece orchestra in Carnegie Hall, or as a fiddle in a four-piece southern country band at a barn dance down in a Kentucky hollow, in the hands of a violinist… a master… a virtuoso… a fiddler, it becomes an hallowed instrument… of diplomacy… of peace.

When I heard the faint whisperings of story about a nephew’s instrument I pledged to learn the details of its journey.  Charlie obliged, allowing me to interview him one evening early this month.

The instrument came complete with an old typed letter from Lowell Meyer, Charlie’s maternal grandfather, whose family purchased the instrument on his behalf, from the Sisters of St. Joseph when he was yet in middle school in 1923.  An instrument in its own rite, the letter also acts as a legal document, sharing not only the violin’s European heritage and how it came to arrive in these United States, but also dictating its future journey, naming only three possibilities of conveyance.  First, while in the possession of his family, the violin is to be owned by all of Mr. Meyer’s children and their heirs rather than by any one single heir.  Second, it allows a method for its sale should an urgent financial need arise.  And third, it dictates the intent of Mr. Meyers for the violin’s return to its original owner into perpetuity, the Sisters of St. Joseph near Chateau Thierry.  Charlie scanned the letter and emailed it to me, giving me a greater sense of its history and helping to establish its authenticity.   Its making by well known French luthier Francois Barzoni, who unlike the Stradivari family made his hand-crafted instruments for the masses, its survival within the convent walls during the bombardment of the Battle of the Marne and its subsequent journey from Chateau Thierry, to Saint Louis, each detail carrying great significance. As an example of one detail among many, it did not escape the attention of this story lover, the significance of a journey from its setting on one river to a similar setting on another, from along  the banks of the Marne before it spills into the Seine, winding through the fertile rolling hills north of Paris, to the fertile banks of the Missouri at its confluence with the Mississippi in St Louis, two famous rivers, a half a world apart, each with their own folklore of simple people living a simple life, of battles fought by simple people with uncommon valor.

*This simple story of “the violin” is a story worth telling; just one facet of Charlie’s interesting heritage; one which has its own voice, and is a tale that begged to be written.
Wekoronshei Nov 2011
We were interstellar travellers,
children so interested in creating
our infinite microcosmic civilizations,
that we missed it. I saw it,
briefly, once, at night.

We jumped from rock to rock
in the grand pond of the
universe, swam between asteroid reefs
and through the turbulent vents
that were black holes. We
lived everywhere, nowhere,
all at once and for an eternity
at the fringes of galaxies,
and their centres (having burrowed
through the thick skins of dying suns).
We built, advanced, explored,
warred, and coexisted. We knew
everything. We thought.
We knew everything, we thought.

It began as a small blip,
an electromagnetic pulse at the
beginning of time which meta-
imposed itself into the rest of time:
a god, or something of
the sort, it grew and
shrank, and grew and
shrank; a heartbeat--
life. Death.
It ended as a small blip,
an electromagnetic pulse at the
end of time which meta-
imposed itself into the rest of time:
a god, or something of
the sort, it grew and
shrank, and grew and
shrank; a heartbeat--
life. Death.

From the former to the latter,
it sparked creation
and destruction
and advancement
and setback
and belief
and theory
and one
and none.

I saw it,
briefly, once, at night.
Emily Jones Sep 2012
Picketed, another generation pushing for advancement in the age of reason,
Logical, radical movement
Trying for less invasive measures of medication
To take the blinders off the prejudice of non-conformity and reach the masses
A promise to ease the pain, promote healing, the overall good
Met with violence, verbal slander, from mommies and daddies afraid of a world outside their white fence,
Fearing independence, the expansion of the mind, an openness in their youth to allow radical change.

The bloated belt bent backwards, white collar replaced by hedonistic practical libertarians in pursuit of happiness for all
Sick, disgusted with the man, the one behind the podium whom allows for this animosity on a group that did everything right, legally sound
Tired of hearing the whispers across a university, the hopeful gushing’s of elated individuals bright- eyes naive
Of a system that won’t allow something this controversial into the public, afraid to lose their hold on a potential capitol
On something that should be as easy to find in a free market as Captain Crunch, Coca-Cola, and Rice Krispy Treats.

Grinding down, fluffy-green-crystal bud
Dank yellow smoke smoldering out of pipes end, seeping out of closed lips billowing out of nostrils
Dragon fire down a throat coated with a week worth of soot, and experience
Choking, coughing, laughing away the misery
The disappointment in her fellow man to refuse to even consider the validity of a proven product
Knowing that if it was anything else a miracle drug composed of fairy dust, unicorn hair and the ***** of a thousand angels; approval would have been immediate.
Whip lash.

Flick, flame, fumigating
Baking myself into a calmer state, watching with ******* grace
Twitching with the need to take action
To control this negative reaction, to slap the of face limp **** conservatives
So consumed with themselves, blind to the pain of people who have lost hope in other forms of relief
Alternative therapy shut off by a system obsessed with its war on drugs.
In response to the Arkansas movement to get legalization of marijuana on the ballot, met with conservative group protest.
David Barr Mar 2014
The dictatorship of our state is profound in its mass propaganda, where the discernment of individuals seeps into an eternal chasm of self-sacrifice on the altar of political conformity.
Let us actively withstand the passivity of our conventional hypocrisy as we engage with this ontological sleepwalk through sinister passageways of presumed social advancement.
In our age of grandiose moralistic eclecticism where imperatives abound, I burn incense and contemplate the cosmopolitan artificiality which lavishes abundant gifts upon our self-opinion.
Criminality is the result of discovery.
So, oh thorn in my flesh, cover those rancid corpses by the veil of popularity, gain and pleasure.
Subconscious social conditioning is the scourge of lustful appearance, don’t you think?

— The End —