Submit your work, meet writers and drop the ads. Become a member
anastasiad Dec 2016
Software program designers ordinarily apply certain types of layer technological know-how to shield their software to avoid illegitimate apply. In addition need software layer software is permitted to obtain articles, to be able to boost product sales profit.

Software package encryption technology is split in accordance with whether or not the by using a devoted hardware-based encrypted sheild hardware as well as software-based security. Hardware-based layer, layer have to bind having a focused hardware unit, the particular electronics shield of encryption layer head of hair, typically referred to as the dongle. Software-based layer, encryption does not need focused electronics, typical executed digital camera permission while using the your fatal unit hardware and software data, also referred to as this electronic digital endorsement styles.

Simply consider drive-based electronics encryption stability when compared with software-based shield of encryption will not be suitable, as the more linked to program security, like encrypted sheild products and solutions, stability, encrypted sheild plan style, software, systems, , equipment, details marketing and sales communications, and the like, is really a detailed technological spots, not alone by a to discover whether protection.

Far away, the market industry promote of the digital permission along with security tresses are evenly coordinated. Behavior and also fantastic factors, the actual layer hair likewise enjoy a certain share of the market. File encryption hair, however, will be the network produced merchandise in the instances, can be a pure consumer technology, insufficient operations and also record capabilities, the inclusion of appliance manufacturing, strategic planning, driver installation annoyance, but not only the high cost, and might stop obtained multilevel submission and sales of your computer software, is definitely gradually diminish.

Enhancing the electronic acceptance that is certainly while in the ascendant. Electrical certificate protection approaches are getting to be progressively more included in the Internet technology, cloud computing and also SaaS thought is not just easier to make use of along with cope with computer software electric situation and be able to accomplish, but according to present day natural low-carbon improvement strategy, has got supplanted the encryption curly hair Outstanding software program encryption market trends. The more well-known businesses on the planet, Microsoft, Sun microsystems, Autodesk, SIEMENS, Adobe and various computer software are electronic consent safeguards function.

In the nation, using file encryption software package coders fasten greater premiums, along with international routines and also historic causes of the actual continuation with the next 2 reasons:

One particular every day producers typically regarded security encrypted sheild a lock electronic digital authorization.

There's not just about any readily available electronic digital licence products and solutions too big, the asking price of foreign electronic digital permission.

In reality, while using the rising betterment of your multi-level surroundings, your system triggering for the majority of home end users 's no trouble. And even brought up previously, which the point of view from the safety of layer head of hair electric permission on the sides completely wrong. From your reasonable mindset, this file encryption hair as a result of computer hardware copying much easier to crack, but accomplished piracy business sequence has been made. In its place, electronic digital endorsement because appliance is not replicated, but in addition should system arousal plus approval, in reality, have good safety outcome. Additionally, your every day has showed up in some accredited goods give electric 2-3 enterprise will have to improve while using growth of China's software package sector and grow up.

As a result, your layer computer software market styles hardware, web 2 ., and details technologies. Below, we speak about, in the application encryption approach specific to be able to detailed application encrypted sheild establishment plus progress craze of the marketplace.

Very first, the software encryption approach

As mentioned previously, it encrypted sheild technologies are divided into security hardware-based as well as software-based security.

Your hardware-based shield of encryption

Hardware-based encryption shield of encryption locks, many important info, like shield of encryption secrets to vulnerable information, consent paperwork, tailor made sets of rules, etcetera. can be stored in this dongle.

The layer fastener screen variety is split in to 2 kinds of synchronised slot and also Flash interface. This simultaneous port could be the very early technique type, because the propagation troublesome plus clash while using the printer's, and after this has less apply. A lot of builders employ tend to be USB slot dongle.

File encryption hair from the two kinds of CPU form, the microcontroller to get Pc and another with a clever minute card processor for the reason that Pc a microcontroller computer hardware by itself conveniently trouble area or content, therefore an increasing number of high-end file encryption a lock employing a intelligent credit card chips Central processing unit, to stop hardware break. Although a growing number of clever card dongle crack, initially, because processor might be more and even more leading-edge analytic techniques and devices; sensible card program to be written to the chips manufacturing unit to make during this time method may possibly trickle; encrypted sheild tresses of the identical manufacturer your Processor process is the same, merely various designers facts as well as major, in case most of these records are passed out there, you can easily clone.

Dongle features a specific level of security power, but you can also find a number of drawbacks:

One) apply at the regular one-time never ending license, can't assist in the achievements of your trial model along with on-demand invest in

3) the presence of electronics generation, logistics, assembly as well as upkeep charges

Three) is not achieved the issue with Internet-based electronic digital improvements, tracking along with control

Several) Once broke, may be burned huge, it is sometimes complicated to remedy

A pair of software-based encryption

Software-based encrypted sheild, digital acceptance, and certain in addition separated into home equity loans number plate along with licenses document:

In order to register code can be referred to as successive number or consent computer code, acquired using a alteration in the the program end user computer systems along with program facts, possible software and hardware facts, including: Cpu serial number, BIOS sequential amount, greeting card amount, harddisk sequential number, computer system brand, etc. . Completely transform formula made use of your customized protocol or maybe conventional shield of encryption algorithm formula. Customer as well as primary utilisation of the computer software installment practice, you might want to type in the enrollment value to confirm. Following verification, it can be employed typically. The particular strategy has got the good thing about this subscription computer code defense is easy to use, the downside is always that security is not really higher, not able to attain complicated endorsement demands.

Permission submit as well as the signing up code in order to situation the same computers plus software information, simply a registration signal period confines utilization of both software and hardware information, a permission record can use numerous hardware and software info. Also, the actual permission report can contain more info, to help you obtain the difficult agreement demands, and may perhaps retail outlet several customer facts. The average permission report way is to implement the private key in the asymmetric algorithm to hint your certificate data file, while the general public secret is embedded in the application value. Asymmetric shield of encryption plus understanding course of action, the private computer essential consent hosting server exists, it is hard to compromise from the investigation regarding endorsement paperwork.

Some great benefits of this electric endorsement safeguard doesn't require further electronics, and for that reason doesn't have to mount the motive force as well as buyer elements, electronic digital hardware issue. The disadvantage from the automated certificate safety mode just isn't networked buyers really need to hand remove your computer information, and then personally significance registration constraints or even permission, is not very easy to use. Additionally, the particular domestic electronic digital acceptance a few of the programmers from the product or service, that also limits your popularization and promotion connected with electric permit safeguard technology.

Subsequent, it encrypted sheild field advancement status

A single. File encryption curly hair

The main unusual dongle professional SafeNet, Corporation. in the usa in addition to Germany Wibu.

Security head of hair service deeply Supposrr que Luoke and also Feitian. The 2 main organizations due to the affordable prices, the first person to introduce the actual good minute card shield of encryption curly hair nearby perfectly so that you can enjoy some market place in the nation.

A pair of. Electric permission

Unfamiliar company certified merchandise to supply electronic digital Flexera Software and also SafeNet which will, Flexera Software program is focused entirely on the joy of digital permission, the actual device's ease of use along with features are doing superior, though the valuation on the item is additionally quite high.

This home-based electrical authorization goods enterprise a Beijing Biteansuo (BitAnswer), Shenzhen-use this (Euse) Safengine Organization.

There are only a few companies will acquire their very own electronic digital consent structure, even so the builders to cultivate their own plans commonly occur this inquiries:

One particular) the introduction of non-professionals, there are numerous loopholes while in the security

A pair of) is actually difficult to realize accommodating accreditation control, management and also precise functions simple or maybe simply no

Three) are often unveiled to be able to address the particular fast problem connected with short-term method, create far more than predicted in the foreseeable future as a result of protection, balance and also scalability challenges continued to get

Several) can not meet up with sector variations as a result of the modern demands on program certification model

Software program security marketplace movements

The software security field developments is closely connected with the increase development with the computer software marketplace. With the rise in popularity of cloud-computing plus Software, service with application products will be change in the direction of the multilevel plus system. Used in nearly all software programmers, Software items can not only spend less a great deal of hardware and software buy plus servicing charges, you can also get demand from customers, when decreasing the use of possibility, driving program vendors in order to consistently strengthen items plus improve services to be able to sustain consumers.

To the development of system and program improvement can also be a software package encrypted sheild technologies movements. The view around the present-day growth trend, the encryption locking mechanism technologies have designed really develop fully information mill approaching vividness, slower advancement. The actual everyday living and make use of on the equipment practice creates security head of hair are not able to conserve the speed regarding advancement of the Internet period, are going to be substituted with the particular automated certificate.

Automated authorization permission through earlier subscription program code type on the feature-rich records available as modifications to technologies are considering verification process out of offline yourself confirm the introduction of computerized system authorization. Permitted administration contemplating particularly, your electrical licence technological innovation collected from one of software licence qualifications growth just as one authorized official certifications, agreement management and exact information and facts, and also other objective of each, significantly improved this permitted volume of details regarding computer software coders.

May forecast not able to electronic products certified solutions ought to have these most important properties:

Enlightening approved administration system: supplied by third-party safety measures specialized software designers, in line with the Net's one-stop software package safety plus endorsement management system, without having to deploy and observe after, low priced, easy-to-use.

Only two Bendable Certificate: offer the acceptance of the purchaser software as well as the cloud computing product common software package licenses; authorized touch time, the volume of sensible adventures; sanctioned in order to bind your computer software and hardware information and facts, encryption tresses, or by way of a username plus password validation way of agreement.

Simple and easy friendly buyer: in accordance with the WEB, at any place obtain; Users might food acquire, trigger boost the software, you can buy their unique software package to keep abreast of details; software package designers can certainly understand software initial information and facts plus individual data is often synergies through the people in the firm to finish the design of application license, enactment, supervision as well as maintenance operate.

5. Fog up accreditation unit: This is a cloud computing type of software program licensing. Standard application is genuine customer setup, endorsement can also be a buyer. Although cloud-computing could be the craze, although the move difficult for classic software package would be a wonderful way for the particular a higher level cloud computing modification. This definite awareness associated with tips, a common application approved move on the purchaser for the fog up on the endorsement remote computer, to ensure that small adjustments towards the application, but you can certainly instantly experience the great things about cloud computing: higher safety energy require to obtain clouds hard drive .

http://www.passwordmanagers.net/ Password Manager
Em MacKenzie Oct 2018
All work, no play and neon screens
menial tasks even coat my dreams.
Overboard in bored and a silent phone,
oh no, I think I’ve evolved to drone.

Punch in, punch out, this is the wrong route.
Punch in, punch out, a life of drought.
This technological terror
has caused life to flash in error.
For lady dollar; I can’t bear her,
as the riches are even rarer.

I’ve become a machine, to crush numbers
with no log off for needed slumbers.
Now my brain’s racing, a million miles per hour,
oh no, I think I’ve gained A.I’s power.

Punch in, punch out, this is the wrong route.
Punch in, punch out, now what life is about.
This technological terror
has caused life to flash in error.
No sudden movements; don’t want to scare her,
she’s updating with no carer.

Learning binary,
a breathing library,
processing slowly
but still a finery.

I forgot what my hands were for
they used to write all that I adore.
Now fingertips type, each key a shot,
oh no, I think I’ve grown into a robot.

Punch in, punch out, this is the wrong route.
Punch in, punch out, no one hears me shout.
This technological terror
has caused life to flash in error.
Pure absorption; a simple stare,
life’s equation could be fairer.

Learning binary,
a breathing library,
walking geometry
complete machinery.
RAJ NANDY Jul 2017
THE LEGEND OF HOLLYWOOD IN VERSE
Dear Readers, I have tried to cover the salient features of this True Story in free flowing verse mainly with end rhymes. If you read it loud, you can hear the chimes! Due to the short attention span of my readers I had to cut short this long story, and conclude with the
Golden Era of Hollywood by stretching it up to the 1950's only. When TV began to challenge the Big Screen Cinema seriously! I have used only a part of my notes here. Kindly read the entire poem and don't hesitate to know many interesting facts - which I also did not know! I wish there was a provision for posting a few interesting photographs for you here. Best wishes, - Raj Nandy, New Delhi.  

                 THE LEGEND OF HOLLYWOOD :
                        THE AMERICAN  DREAM
                             BY RAJ NANDY

           A SHORT  HISTORICAL  BACKGROUND
Since the earliest days, optical toys, shadow shows, and ‘magic
lanterns’, had created the illusion of motion.
This concept was first described by Mark Roget in 1824 as  
the 'persistent of vision'.
Giving impetus to the development of big screen cinema with its
close-ups, capturing all controlled and subtle expressions!
The actors were no longer required to shout out their parts with
exaggerated actions as on the Elizabethan Stage.
Now even a single tear drop could get noticed easily by the entire
movie audience!
With the best scene being included and edited after a few retakes.
To Thomas Edison and his able assistant William Rogers we owe the invention of Kinetoscope, the first movie camera.
On the grounds of his West Orange, New Jersey laboratory, Edison
built his first movie studio called the ‘Black Maria’.   (1893)
He also purchased a string of patents related to motion picture
Camera; forming the Edison Trust, - a cartel that took control of
the Film Industry entire!

Fort Lee, New Jersey:
On a small borough on the opposite bank of the Hudson River lay
the deserted Fort Lee.
Here scores of film production crews descended armed with picture Cameras, on this isolated part of New Jersey!
In 1907 Edison’s company came there to shoot a short silent film –
‘Rescue From an Eagle’s Nest’,
Which featured for the first time the actor and director DW Griffith.
The independent Chaplin Film Company built the first permanent
movie studio in 1910 in Fort Lee.
While some of the biggest Hollywood studios like the Universal,
MGM, and 20th Century Fox, had their roots in Fort Lee.
Some of the famous stars of the silent movie era included ‘Fatty’
Arbuckle, Will Rogers, Mary Pickford, Dorothy and Lillian Gish,
Lionel Barrymore, Rudolph Valentine and Pearl White.
In those days there were no reflectors and electric arch lights.
So movies were made on rooftops to capture the bright sunlight!
During unpredictable bad weather days, filming had to be stopped
despite the revolving stage which was made, -
To rotate and capture the sunlight before the lights atarted to fade!

Shift from New Jersey to West Coast California:
Now Edison who held the patents for the bulb, phonograph, and the Camera, had exhibited a near monopoly;
On the production, distribution, and exhibition of the movies which made this budding industry to shift to California from
New Jersey!
California with its natural scenery, its open range, mountains, desert, and snow country, had the basic ingredients for the movie industry.
But most importantly, California had bright Sunshine for almost
365 days of the year!
While eight miles away from Hollywood lay the port city of Los Angeles with its cheap labour.

                        THE RISE  OF  HOLLYWOOD
It was a real estate tycoon Harvey Wilcox and his wife Daeida from
Kansas, who during the 1880s founded ‘Hollywood’ as a community for like-minded temperate followers.
It is generally said that Daeida gave the name Hollywood perhaps
due to the areas abundant red-berried shrubs also known as
California Holly.
Spring blossoms around and above the Hollywood Hills with its rich variety,  gave it a touch of paradise for all to see !
Hollywood was incorporated as a municipality in 1903, and during
1910 unified with the city of Los Angeles.
While a year later, the first film studio had moved in from New
Jersey, to escape Thomas Edison’s monopoly!    (1911)

In 1913 Cecil B. De Mille and Jesse Lasky, had leased a barn with
studio facilities.
And directed the first feature length film ‘Squaw Man’ in 1914.
Today this studio is home to Hollywood Heritage Museum as we get to see.
The timeless symbol of Hollywood film industry that famous sign on top of Mount Lee, was put up by a real estate developer in 1923.  
This sign had read as ‘’HOLLY WOOD LAND’’ initially.
Despite decades of run-ins with vandals and pranksters, it managed to hang on to its prime location near the summit of the Hollywood Hills.
The last restoration work was carried out in 1978 initiated by Hugh
Hefner of the ******* Magazine.
Those nine white letters 45 feet tall now read ‘HOLLYWOOD’, and has become a landmark and America’s cultural icon, and an evocative symbol for ambition, glamour, and dream.
Forever enticing aspiring actors to flock to Hollywood, hypnotised
by lure of the big screen!

                     GOLDEN AGE OF HOLLYWOOD
The Silent Movie Era which began in 1895, ended in 1935 with the
production of ‘Dance of Virgins’, filmed entirely in the island of Bali.
The first Sound film ‘The Jazz Singer’ by Warner Bros. was made with a Vitaphone sound-on-disc technology.  (October 1927)
Despite the Great Depression of the 1930s, this decade along with the 1940s have been regarded by some as Hollywood’s Golden Age.
However, I think that this Golden Age includes the decades of the
1940s and the 1950s instead.
When the advent of Television began to challenge the Film Industry
itself !

First Academy Award:
On 16th May 1929 in the Roosevelt Hotel on Hollywood Boulevard,
the First Academy Award presentation was held.
Around 270 people were in attendance, and tickets were priced at
$5 per head.
When the best films of 1927 & 1928 were honored by the Academy
of Motion Production and Sciences, or the AMPS.
Emil Jennings became the best actor, and Janet Gaynor the best actress.
Special Award went to Charlie Chaplin for his contribution to the
silent movie era and for his silent film ‘The Circus’.
While Warren Brothers was commended for making the first talking picture ‘The Jazz Singer’, - also receiving a Special Award!
Now, the origin of the term ‘OSCAR’ has remained disputed.
The Academy adopted this name from 1939 onwards it is stated.
OSCAR award has now become “the stuff dreams are made of”!
It is a gold-plated statuette of a knight 13.5 inches in height, weighing 8.5 pounds, was designed by MGM’s art director Cedric Gibbons.
Annually awarded for honouring and encouraging excellence in all
facets of motion picture production.

Movies During the Great Depression Era (1929-1941):
Musicals and dance movies starring Fred Astaire and Ginger Rogers provided escapism and good entertainment during this age.
“Ginger Rogers did everything Fred Astaire did. She just did it
backwards and in high heels,” - the Critics had said.
This compatible pair entertained the viewers for almost one and
a half decade.
During the ‘30s, gangster movies were popular starring James Cagey, Humphrey Bogart, and Edward G. Robinson.
While family movies had their popular child artist Shirley Temple.
Swashbuckler films of the Golden Age saw the sword fighting scenes of Douglas Fairbanks and Errol Flynn.
Flynn got idolized playing ‘Robin Hood’, this film got released in
1938 on the big screen!
Story of the American Civil War got presented in the epic ‘Gone With The Wind’ (1939) with Clarke Gable and Vivian Leigh.
This movie received 8 Oscars including the award for the Best Film, - creating a landmark in motion picture’s history!
More serious movies like John Steinbeck’s ‘Grapes of Wrath’ and
John Ford’s  ‘How Green Was My Valley’, were released in 1940 and 1941 respectively.
While the viewers escaped that depressive age to the magical world
of  ‘Wizard of Oz’ with its actress Judy Garland most eagerly!
Let us not forget John Wayne the King of the Westerns, who began
his acting career in the 1930s with his movie ‘The Big Trail’;
He went on to complete 84 films before his career came to an end.
Beginning of the 40s also saw Bob Hope and the crooner Bing Crosby, who entertained the public and also the fighting troops.
For the Second World War (1939-45) had interrupted the Golden Age of Hollywood.
When actors like Henry Fonda, Clarke Gable, James Stewart and
Douglas Fairbanks joined the armed forces temporarily leaving
Hollywood.
Few propaganda movies supporting the war efforts were also made.
While landmark movies like ‘Philadelphia Story’, ‘Casablanca’, ‘Citizen Kane’,
‘The Best Years of Our Lives’, were some of the most successful movies of that decade.  (The 1940s)
Now I come towards the end of my Hollywood Story with the decade  of the 1950s, thereby extending the period of Hollywood’s Golden Age.
Since having past the Great Depression and the Second World War,  the Hollywood movie industry truly matured and came of age.

                        HOLLYWOOD  OF  THE  1950s

BACKGROU­ND:
The decade of the ‘50s was known for its post-war affluence and
choice of leisure time activities.
It was a decade of middle-class values, fast-food restaurants, and
drive-in- movies;
Of ‘baby-boom’, all-electric home, the first credit cards, and new fast moving cars like the Ford, Plymouth, Buick, Hudson, and Chevrolet.
But not forgetting the white racist terrorism in the Southern States!
This era saw the beginning of Cold War, with Eisenhower
succeeding Harry S. Truman as the American President.
But for the film industry, most importantly, what really mattered  
was the advent of the Domestic TV.
When the older viewers preferred to stay at home instead of going
out to the movies.
By 1950, 10.5 million US homes had a television set, and on the
30th December 1953, the first Color TV went on sale!
Film industries used techniques such as Cinemascope, Vista Vision,
and gimmicks like 3-D techniques,
To get back their former movie audience back on their seats!
However, the big scene spectacle films did retain its charm and
fantasy.
Since fantasy epics like ‘The Story of Robin Hood’, and Biblical epics like ‘The Robe’, ‘Quo Vadis’, ‘The Ten Commandments’ and ‘Ben-Hur’, did retain its big screen visual appeal.
‘The Robe’ released on 16th September 1953, was the first film shot
and projected in Cinema Scope;
In which special lenses were used to compress a wide image into a
standard frame and then expanded it again during projection;
Resulting in an image almost two and a half times as high and also as wide, - captivating the viewers imagination!

DEMAND FOR NEW THEMES DURING THE 1950s :
The idealized portrayal of men and women since the Second World War,
Now failed to satisfy the youth who sought exciting symbols for rebellion.
So Hollywood responded with anti-heroes with stars like James Dean, Marlon Brando, and Paul Newman.
They replaced conventional actors like Tyron Power, Van Johnson, and Robert Taylor to a great extent, to meet the requirement of the age.
Anti-heroines included Ava Gardner, Kim Novak, and Marilyn Monroe with her vibrant *** appeal;
She provided excitement for the new generation with a change of scene.
Themes of rebellion against established authority was present in many Rock and Roll songs,
Including the 1954 Bill Hailey and His Comets’ ‘Rock Around the Clock’.
The era also saw rise to stardom of Elvis Presley the teen heartthrob.
Meeting the youthful aspirations with his songs like ‘Jailhouse Rock’!
I recall the lyrics of this 1957 film ‘Jailhouse Rock’ of my school days, which had featured the youth icon Elvis:
   “The Warden threw a party in the county jail,
     The prison band was there and they began to wail.
     The band was jumping and the joint began to sing,
     You should’ve heard them knocked-out jail bird sing.
     Let’s rock, everybody in the whole cell block……………
     Spider Murphy played the tenor saxophone,
     Little Joe was blowing the slide trombone.
     The drummer boy from Illinois went crash, boom, bang!
     The whole rhythm section was the Purple Gang,
      Let's rock,.................... (Lyrics of the song.)

Rock and Roll music began to tear down color barriers, and Afro-
American musicians like Chuck Berry and Little Richard became
very popular!
Now I must caution my readers that thousands of feature films got  released during this eventful decade in Hollywood.
To cover them all within this limited space becomes an impossible
task, which may kindly be understood !
However, I shall try to do so in a summarized form as best as I could.

BOX OFFICE HITS YEAR-WISE FROM 1950 To 1959 :
Top Ten Year-Wise hit films chronologically are: Cinderella (1950),
Quo Vadis, The Greatest Show on Earth, Peter Pan, Rear Window,
Lady and the *****, Ten Commandments, Bridge on the River
Kwai, South Pacific, and Ben-Hur of 1959.

However Taking The Entire Decade Of 1950s Collectively,
The Top Films Get Rated As Follows Respectively:
The Ten Commandments, followed by Lady and the *****, Peter Pan, Sleeping Beauty, Bridge on the River Kwai, Around the World in Eighty Days, This is Cinerama, The Greatest Show on Earth, Rear Window, South Pacific, The Robe, Giant, Seven Wonders of the World, White Christmas, Twenty Thousand Leagues Under the Sea, Sayonara, Demetrius and the Gladiator, Peyton Place, Some Like It Hot, Quo Vadis, and Auntie Mame.

Film Debuts By Rising Stars During The 1950s :
The decade of the ‘50s saw a number of famous film stars making
their first appearance.
There was Peter Sellers in ‘The Black Rose’, Marlon Brando in
‘The Men’, and actress Sophia Loren in ‘Toto Tarzan’.
Following year saw Charles Bronson in ‘You Are in the Navy Now’,
Audrey Hepburn in ‘Our Wild Oats’, and Grace Kelly, the future
Princess of Monaco, in her first film ‘Fourteen Hours’. (1951)
While **** Brigitte Bardot appeared in 1952 movie ‘Crazy for Love’; and 1953 saw Steve Mc Queen in ‘******* The Run’.
Jack Lemon, Paul Newman, and Omar Sharif featured in films
during 1954.
The following year saw Clint Eastwood, Shirley Mc Lean, Walter
Matthau, and Jane Mansfield, all of whom the audience adored.
The British actor Michael Cain appeared in 1956; also Elvis Presley
the youth icon in ‘Love Me Tender’ and as the future Rock and Roll
King!
In 1957 came Sean Connery, followed by Jack Nicholson, Christopher Plummer, and Vanessa Redgrave.
While the closing decade of the ‘50s saw James Coburn, along with
director, script writer, and producer Steven Spielberg, make their
debut appearance.

Deaths During The 1950s: This decade also saw the death of actors
like Humphrey Bogart, Tyron Power and Errol Flynn.
Including the death of producer and director of epic movies the
renowned Cecil B. De Mille!
Though I have conclude the Golden Age of Hollywood with the 50’s Decade,
The glitz and glamour of its Oscar Awards continue even to this day.
With its red carpet and lighted marquee appeal and fashion display!

CONTINUING THE HOLLYWOOD STORY WITH FEW TITBITS :
From Fort Lee of New Jersey we have travelled west to Hollywood,
California.
From the silent movie days to the first ‘talking picture’ with Warren
Bros’ film ‘The Jazz Singer’.  (06 Oct 1927)
On 31st July 1928 for the first time the audience heard the MGM’s
mascot Leo’s mighty roar!
While in July 1929 Warren Bros’ first all-talking and all- Technicolor
Film appeared titled - ‘On With The Show’.
Austrian born Hedy Lamarr shocked the audience appearing **** in a Czechoslovak film ‘Ecstasy’!  (1933)
She fled from her husband to join MGM, becoming a star of the
‘40s and the ‘50s.
The ‘Private Life of Henry VII’ became the first British film to win the  American Academy Award.  (1933)
On 11Dec 1934, FOX released ‘Bright Eyes’ with Shirley Temple,
who became the first Child artist to win this Award!
While in 1937 Walt Disney released the first full animated feature
film titled - ‘Snow White and the Seven Dwarf ‘.
The British film director Alfred Hitchcock who came to
Hollywood later;
Between 1940 and 1947, made great thrillers like 'Rebecca', ‘Notorious’, ‘Rear Window’, and ‘Dial M for ******’.
But he never won an Oscar as a Director!

THE GOLDEN GLOBE AWARD:
This award began in 1944 by the Foreign Correspondence Association at
the 20th Century Fox Studio.
To award critically acclaimed films and television shows, by awarding a
Scroll initially.
Later a Golden Globe was made on a pedestal, with a film strip around it.
In 1955 the Cecil B. De Mille Award was created, with De Mille as its first
recipient.

THE GRAMMY AWARD:
In 1959 The National Academy of Recording and Sciences sponsored the
First Grammy Award for music recorded during 1958.
When Frank Sinatra won for his album cover ‘Only The Lonely’, but he
did not sing.
Among the 28 other categories there was Ella Fitzgerald, and Count Basie
for his musical Dance Band Performance.
There was Kingston Trio’s song ‘Tom Dooly’, and the ‘Chipmunk Song’,
which brings back nostalgic memories of my school days!

CONCLUDING HOLLYWOOD STORY  WITH STUDIOS OF THE 1950s

Challenge Faced by the Movie Industry:
Now the challenge before the Movie Industry was how to adjust to the
rapidly changing conditions created by the growing TV Industry.
Resulting in loss of revenue, with viewers getting addicted to
their Domestic TV screen most conveniently!

The late 1950s saw two studios REPUBLIC and the RKO go out of business!
REPUBLIC from 1935- ‘59 based in Los Angeles, developed the careers of
John Wayne and Roy Rogers, and specializing in the Westerns.
RKO was one of the Big Five Studios of Hollywood along with Paramount,
MGM, 20th Century Fox, and Warner Brothers in those days.

RKO Studio which begun with Fred Astaire and Ginger Rogers in the ‘30s,
included actress Katherine Hepburn who holds the record for four Oscars
even to this day;
And later had Robert Mitchum and Carry Grant under an agreement.
But in 1948, RKO Studio came under the control Howard Hughes the
temperamental Industrialist.
Soon the scandal drive and litigation prone RKO Studio closed, while
other Big Four Studios had managed to remain afloat!


PARAMOUNT STUDIO:
Paramount Studio split into two separate companies in 1950.
Its Theatre chain later merged with ABC Radio & Television Network;
And they created an independent Production/Distribution Network.
Bing Crosby and Bob Hope had been Paramount’s two biggest stars.
Followed by actors like Alan Ladd, William Holden, Jerry Lewis, Dean
Martin, Charlton Heston, and Dorothy Lamour.
They also had the producer/director Cecil B. De Mille producing high-
grossing Epics like ‘Samson & Delilah’ and ‘The Ten Commandments’.
Also the movie maker Hal Wallis, who discovered Burt Lancaster and
Elvis Presley - two great talents!

20th CENTURY FOX:
Cinema Scope became FOX’s most successful technological innovation
with its hit film ‘The Robe’. (1953)
Its Darryl Zanuck had observed during the early ‘50s, that audience  
were more interested in escapist entertainments mainly.
So he turned to FOX to musicals, comedies, and adventure stories.
Biggest stars of FOX were Gregory Peck & Susan Hayward; also
stars like Victor Mature, Anne Baxter, and Richard Wind Mark.
Not forgetting Marilyn Monroe in her Cinema Scope Box Office hit
movie - ‘How to Marry a Millionaire’, which was also shown on
prime time TV, as a romantic comedy film of 1953.

WARREN BROTHERS:
During 1950 the studio was mainly a family managed company with
three brothers Harry, Albert, and Jack Warren.
To meet the challenges of that period, Warren Bros. released most of
its actors like James Cagney, Humphrey Bogart, Oliver de Havilland, -
Along with few others from their long-term contractual commitments;
Retaining only Errol Flynn, and Ronald Regan who went on to become
the future President.
Like 20th Century Fox, Warren Bros switched to musicals, comedies,
and adventure movies, with Doris Day as its biggest musical star.
The studio also entered into short term agreements with Gary Copper,
John Wayne, Gregory Peck, Patricia Neal, and Random Scott.
Warren Bros also became the first major studio to invest in 3-D
production of films, scoring a big hit with its 3-D  suspense thriller
‘House of Wax’ in 1953.

MINOR STUDIOS were mainly three, - United Artists, Columbia, and
The Universal.
They did not own any theatre chain, and specialized in low-budgeted
‘B’ Movies those days.
Now to cut a long story short it must be said, that Hollywood finally
did participate in the evolution of Television industry, which led to
their integration eventually.
Though strategies involving hardware development and ownership of
broadcast outlets remained unsuccessful unfortunately.
However, Hollywood did succeed through program supply like prime-
time series, and made-for-TV films for the growing TV market making
things more colorful!
Thus it could be said that the TV industry provided the film industry
with new opportunities,  laying the groundwork for its diversification
and concentration;
That characterized the entertainment industry during the latter half  
of our previous century.
I must now confess that I have not visited the movie theatre over the last
two decades!
I watch movies on my big screen TV and my Computer screen these days.
Old classical movies are all available on ‘You Tube’ for me, and I can watch
them any time whenever I am free!
Thanks for reading patiently, - Raj Nandy.
**ALL COPYRIGHTS ARE WITH THE AUTHOR RAJ NANDY OF NEW DELHI
Valerie Csorba Jul 2015
Tonight I missed a shot with nostalgia because of myself.
I've become such a slave to my phone that the flashing colours in the sky could not,
would not bother me.
Everything except for the device shining in my palms was blocked out like a voice I didn't want to hear in the first place,
Except I DID want to hear it.
I want know about everything that is happening around me without burying my face so deeply into Google to find the answers I'm searching for.
Nothing ever happens to me because I'm too busy in the comfort of my own home,
upon my own couch,
on my own phone worrying about the next Facebook status
and whether or not it will be entertaining
or in need of a dose of an opinion that is my own.

I recognize that I have my own personal "cell"-mate that will follow me wherever I go as long as I don't forget it on my kitchen counter.
I am shackled to my cellphone.
It takes me in handcuffs daily,
arresting me at my own free will.
A policemen of such small character,
yet so many brains.
And I already know my rights.
I already know my rights because I've researched them enough times with my mobile text book to have them memorized.
You have the right to post a status, anything you say can and will be taken out of context.
You have a right to an opinion, if you do not have an opinion one will be appointed to you by your desire to impress those whom share a friendship with you.

I am a servant to technology.
It's as though it is a part of my anatomy.
If it's not one item of electronics it's another and it has my full undivided attention.
As connected as we are, we have all become disconnected.
No one talks anymore.
Word of mouth has become word of texting.
Important pieces of information are shared via the internet because it's easier to get it out there all at once instead of saying it multiple times.
I sadly succumb to every chime I am beckoned with as it demands I answer whomever has interupted the surfing
and scrolling
and sharing
and liking
and commenting
and posting...
I put my phone down in disbelief.
Now tell me, "What's on your mind?"
brandon nagley Jul 2015
The irony of mankind,
They maketh technology to better their lives
And yet,
Their technology
Is ruining their lives....
The irony...
As tis they couldst use that wired technology for healing
They use it for bombing and killing..
As tis they couldst use it for connecting
The fact is
They've all gone unconnected!!!!!!
Hiding behind some screen,
Forgetting what an old fashioned phone call is.....
Connection, man thought this technological advance wouldst do.
Disconnection is what is hast really brought them......

The irony.....


©Brandon nagley
©Lonesome poet's poetry
Just Melz Aug 2014
You're a sight for sore eyes
Been blinded by the light
Too many times
Waves upon waves
Of color changing iconic notions
Fueled up emotions and sad faces
Shadows and shapes shining bright
At the height of the modern age

A different way to accentuate the names we put inside our minds
Digital rhymes change the journey we travel
When it unravels, we share, post and tag
A lag and we're lost in the dim lights of what we do next
Shifting through pages of endless faces, words and updates

Times alienate the importance of touch
Yet the ignorance has a much higher impact
Than the influence of how to overreact
Observe this society....
Is this how our lives were meant to be,
Staring at phones and computer screens?

**** this technology, for taking you away from me
Taking moms from children and dads from jobs
Making every other relationship lose trust and feel wrong
**** this technology for what it does to me
What it does to you, to society.
**** this technology, but don't you dare try to take my phone from me.
Brandon Whited Jan 2012
Technology has been essential for ages
From the wheel to the computer
Now instead of writing pages
I will type essays for the future of my career

Technology, however, has gotten out of hand
We use it to cover up for laziness.
The television is turned on with speed so grand.
Yet you could’ve gotten up and it would’ve been considered craziness.

Technology has turned us mad
We can’t seem to live without our technology
Day by day we may look glad,
But in the end it will take over angrily.
anastasiad Nov 2016
Program web developers typically apply style of security technologies to guard the application in order to avoid against the law work with. Also need computer software encrypted sheild software packages are authorized to obtain written content, in order to increase the income profit.

Software encrypted sheild technologies are divided according to perhaps the by using a dedicated hardware-based file encryption hardware as well as software-based layer. Hardware-based layer, encryption have to emergency having a specific computer hardware device, this computer hardware encrypted sheild encrypted sheild hair, often called the dongle. Software-based file encryption, file encryption doesn't involve devoted computer hardware, common joining digital camera license while using the actual airport terminal device software and hardware details, also referred to as your automated acceptance sorts.

Just imagine drive-based appliance security safety in comparison with software-based encrypted sheild isn't right, because the much more included in program safety, which include layer goods, safety measures, encrypted sheild insurance plan design and style, software, operating systems, , appliance, data marketing communications, etc, is a extensive complex areas, besides by way of to ascertain no matter if safety.

In other countries, industry promote of your automated authorization and encryption tresses are consistently coordinated. Patterns and also famous explanations, this encryption head of hair additionally occupy a clear market share. File encryption a lock, nevertheless, could be the multi-level developed products with the moments, can be a natural customer technological innovation, deficit of control in addition to exact features, a good appliance creation, scheduling details, drivers installing irritation, but not only the high cost, and may stop achieved system circulation and purchasers from the software, is usually slowly decline.

The development of a electronic authorization that is certainly in the ascendant. Digital license safeguards procedures are becoming an increasing number of built into the world wide web know-how, cloud-computing in addition to SaaS strategy it isn't just easier to work with along with cope with software package digital situation and also accomplish, but will also according to present day environment friendly low-carbon advancement notion, possesses changed the shield of encryption hair Distinctive the software program encrypted sheild industry developments. The greater well-known organizations in the world, 'microsoft', Sun microsystems, Autodesk, SIEMENS, Adobe as well as other software package will be digital consent safety method.

In the united states, the utilization of layer application builders shut greater fees, with foreign behavior and historical causes of your continuation with the pursuing a couple reasons:

1 every day companies commonly deemed security encrypted sheild hair electronic agreement.

There are no longer just about any accessible digital license goods exorbitant, the price tag on foreign automated acceptance.

The truth is, with the expanding improvement of your circle surroundings, a community initial for many of us domestic users is not an difficulty. And also mentioned prior, how the viewpoint of your basic safety connected with encrypted sheild head of hair electrical permission sided incorrect. Coming from a authentic perspective, the shield of encryption curly hair as a result of components burning better to fracture, but accomplished piracy marketplace company has become produced. Instead, electrical consent since the electronics should not be cloned, but additionally must multi-level service in addition to affirmation, in fact, currently have excellent safeguard outcome. Moreover, your residential in addition has showed up in many registered goods supply automated 2-3 organization ought to improve while using the advancement of China's software field and also be upwards.

Hence, this encryption software package marketplace developments electronics, marketing, and details engineering. Down below, most people look at, through the software file encryption system distinct for you to elaborate program encrypted sheild establishment and also progression trend of this marketplace.

Primary, the program shield of encryption technique

As mentioned earlier, it shield of encryption technologies are divided into encrypted sheild hardware-based plus software-based file encryption.

A hardware-based encryption

Hardware-based file encryption encryption locks, many material, including layer fundamentals for vulnerable data, acceptance paperwork, made to order methods, and so on. could be trapped in a dongle.

Your security fastener interface style is divided directly into 2 kinds of parallel dock plus Flash harbour. The particular concurrent harbour would be the early on technique variety, because propagation inconvenient plus struggle together with the laser printer, and already has got much less employ. Almost all coders use are generally Flash user interface dongle.

Encryption hair on the two kinds of Computer kind, a microcontroller to get Cpu and another using a clever unit card processor for the reason that Pc the microcontroller appliance per se very easily trouble area or perhaps duplicate, so a lot more high-end security a lock utilizing a wise card processor Pc, to forestall computer hardware fracture. But a growing number of intelligent greeting card dongle split, primary, because processor chip is a bit more and a lot more sophisticated investigative methods along with resources; sensible greeting card method being composed to your chip manufacturing area to make within this program application could problem; file encryption hair of the exact same brand name the particular Cpu method is the identical, merely diverse builders facts along with critical, in the event that these types of data files are passed out and about, you can easily replicate.

Dongle carries a certain a higher level safety toughness, nonetheless in addition there are many drawbacks:

One) apply at the standard one-time constant permit, are unable to aid your results on the tryout release along with on-demand buy

A pair of) the use of hardware creation, scheduling details, installment in addition to routine maintenance charges

Three or more) is not realized the issue regarding Internet-based electronic enhancements, pursuing in addition to administration

Some) As soon as chipped, is usually ripped large quantities, it is hard to treat

A couple software-based shield of encryption

Software-based shield of encryption, electric endorsement, and certain as well separated into two types of registration plate along with permission file:

Enrollment rule is additionally referred to as the sequential range or perhaps permission rule, received by way of modification in the the software customer computer systems plus software program information and facts, the available hardware and software information, like: Computer successive number, BIOS serialized quantity, cards amount, disk drive sequential variety, computer title, and many others. . Completely transform algorithm employed your custom algorithm criteria or even normal layer algorithm formula. Customer and also first utilisation of the software package installing course of action, you might want to type in the enrollment value to make sure. Immediately after certification, software program may be used usually. The actual technique contains the advantage of your in order to register signal defense isn't hard to implement, the downside is usually that stability will not be large, struggle to achieve complicated consent needs.

Licence report and the subscription value for you to bind a similar computer hardware as well as software information, a subscription value time-span limits by using each hardware and software facts, a permission data file will use various hardware and software details. Additionally, the actual certificate file can contain details, so you're able to get the difficult authorization requirements, and might also retailer a number of end user information and facts. The typical certificate submit method to utilize the non-public major on the asymmetric protocol to help signal the permission record, as you move the general public key's baked into software program code. Uneven layer as well as decryption course of action, in which you crucial agreement hosting server is out there, it is not easy to break into throughout the study associated with acceptance docs.

What's so great about the particular digital agreement security does not require supplemental hardware, and as a consequence does not need to deploy the driver plus buyer components, electrical hardware issue. The disadvantage on the electric licenses safeguards method is just not networked people really need to manually remove your computer details, after which manually transfer subscription codes or even licenses, may not be convenient to use. On top of that, the actual domestic automated endorsement several of the designers with the products, which also limits a popularization and also campaign with electronic permission safeguard technological know-how.

Minute, it layer sector growth standing

A person. Security a lock

The main unusual dongle professional SafeNet, Inc. in the country as well as Australia Wibu.

Security tresses provider deep Supposrr que Luoke as well as Feitian. Both businesses due to the discount prices, the first one to create your intelligent minute card encryption tresses nearby well to be able to undertake a clear market place in the nation.

Only two. Digital acceptance

International business certified products and solutions to give electronic Flexera Application and also SafeNet which often, Flexera Applications are devoted to the realm of electronic digital agreement, this product's simplicity of use plus usefulness are accomplishing far better, though the expense of the item can also be very good.

A residential electric permission merchandise firm this China Biteansuo (BitAnswer), Shenzhen-use the actual (Euse) Safengine Corporation.

There are few companies will acquire his or her electrical consent plan, although the developers to cultivate their own programs normally are present the subsequent inquiries:

One) enhancing non-professionals, there are several loopholes inside stability

Two) is tough to obtain variable accreditation manage, management and mathematical functions very simple or virtually no

Several) could be introduced as a way to address the fast issue of short-term method, create far more than predicted in the future as a consequence of protection, stability along with scalability difficulties ongoing to pay

Four) are unable to fulfill market variations brought about by the revolutionary demands about software accreditation product

Application file encryption market developments

The program shield of encryption field developments is actually carefully involving the increase tendency with the software program business. Together with the interest in cloud computing and also Software, service of software package products and solutions will be alter in the way of the circle along with foundation. Used by the vast majority of software package builders, SaaS solutions will not solely save a great deal of hardware and software pay for and also servicing charges, you can also get requirement, although reducing the using chance, driving foundation providers to help continually develop solutions in addition to boost services for you to sustain shoppers.

For the roll-out of community in addition to system advancement can be another application shield of encryption technology fads. The scene about the present-day growth pattern, the actual shield of encryption secure technologies have created very experienced publication rack drawing near vividness, slowly growth. The lifetime and make use of in the hardware practice helps make shield of encryption curly hair are not able to take care of the velocity of development of online years, will be replaced by a electrical permit.

Electric agreement licence from very early sign up computer code sort to your feature-rich documents as modifications in technologies are considering authentication strategy coming from off-line yourself validate the growth of programmed community validation. Accepted control considering particularly, the electric licenses know-how from a single software package licence qualification development just as one authorized certification, consent management plus stats facts, along with other aim of equally, considerably elevated this sanctioned degree of details pertaining to program web developers.

Might forecast not able to consumer electronics accredited merchandise should have the subsequent principal features:

Good authorized managing podium: made available from third-party protection skilled software package programmers, in accordance with the Web's one-stop software package security and also permission operations foundation, without the need to install and sustain, affordable, easy-to-use.

Two Adaptable Licence: support the agreement of the purchaser software program as well as the cloud-computing model standard software package permission; approved press occasion, how many sensible web template modules; accepted so that you can hole the computer hardware and software data, encrypted sheild hair, and also using a user name and also private data verification way for consent.

Easy and warm and friendly buyer experience: in line with the World wide web, everywhere entry; Users could self serve buffet pay for, stimulate rrmprove the application, you can purchase their own software program to keep up-to-date with info; software program builders might discover more about application account activation details in addition to individual facts is usually synergies because of the individuals this company in order to complete the design of software licenses, implementation, supervision in addition to upkeep operate.

Five. Clouds licensing type: This is the cloud computing model of software program certification. Traditional software is natural purchaser rendering, permission can also be a purchaser. Whilst cloud computing could be the movement, though the transition difficult for common application will be a wonderful way for the certain amount of cloud-computing transformation. This definite realization regarding strategies, a common software program sanctioned shift in the buyer towards the cloud on the acceptance server, to make sure that small adjustments towards the software package, nevertheless, you can easily instantaneously have fun with the benefits associated with cloud-computing: higher security energy requirement to order foriegn safe-keeping .


http://www.passwordmanagers.net/products/Windows-Password-Recovery-Software-1.html Windows Password Recovery Software
Nigel Morgan Oct 2012
There was a moment when he knew he had to make a decision.

He had left London that February evening on the ****** Velo Train to the South West. As the two hour journey got underway darkness had descended quickly; it was soon only his reflected face he could see in the window. He’d been rehearsing most of the afternoon so it was only now he could take out the manuscript book, its pages full of working notes on the piece he was to play the following afternoon. His I-Mind implant could have stored these but he chose to circumvent this thought-transcribing technology; there was still the physical trace on the cream-coloured paper with his mother’s propelling pencil that forever conjured up his journey from the teenage composer to the jazz musician he now was. This thought surrounded him with a certain warmth on this Friday evening train full of those returning to their country homes and distant families.

It was a difficulty he had sensed from the moment he perceived a distant gap in the flow of information streaming onto the mind page

At the outset the Mind Notation project had seemed harmless, playful in fact. He allowed himself to enter into the early experiments because he knew and trusted the research team. He got paid handsomely for his time, and later for his performance work.  It was a valuable complement to his ill-paid day-to-day work as a jazz pianist constantly touring the clubs, making occasional festival appearances with is quintet, hawking his recordings around small labels, and always ‘being available’. Mind Notation was something quite outside that traditional scene. In short periods it would have a relentless intensity about it, but it was hard to dismiss because he soon realised he had been hard-wired to different persona. Over a period of several years he was now dealing with four separate I-Mind folders, four distinct musical identities.

Tomorrow he would pull out the latest manifestation of a composer whose creative mind he had known for 10 years, playing the experimental edge of his music whilst still at college. There had been others since, but J was different, and so consistent. J never interfered; there were never decisive interventions, only an explicit confidence in his ability to interpret J’s music. There had been occasional discussion, but always loose; over coffee, a walk to a restaurant; never in the lab or at rehearsals.

In performance (and particularly when J was present) J’s own mind-thought was so rich, so wide-ranging it could have been drug-induced. Every musical inference was surrounded by such intensity and power he had had to learn to ride on it as he imagined a surfer would ride on a powerful wave. She was always there - embedded in everything J seemed to think about, everything J projected. He wondered how J could live with what seemed to him to be an obsession. Perhaps this was love, and so what he played was love like a wilderness river flowing endlessly across the mind-page.

J seemed careful when he was with her. J tried hard not to let his attentiveness, this gaze of love, allow others to enter the public folders of his I-Mind space (so full of images of her and the sounds of her light, entrancing voice). But he knew, he knew when he glanced at them together in darkened concert halls, her hand on J’s left arm stroking, gently stroking, that J’s most brilliant and affecting music flowed from this source.

He could feel the pattern of his breathing change, he shifted himself in his chair, the keyboard swam under his gaze, he was playing fast and light, playing arpeggios like falling water, a waterfall of notes, cascades of extended tonalities falling into the darkness beyond his left hand, but there it was, in twenty seconds he would have to*

It had begun quite accidentally with a lab experiment. J had for some years been researching the telematics of composing and performing by encapsulating the physical musical score onto a computer screen. The ‘moist media’ of telematics offered the performer different views of a composition, and not just the end result but the journey taken to obtain that result. From there to an interest in neuroscience had been a small step. J persuaded him to visit the lab to experience playing a duet with his own brain waves.

Wearing a sensor cap he had allowed his brainwaves to be transmitted through a BCMI to a synthesiser – as he played the piano. After a few hours he realised he could control the resultant sounds. In fact, he could control them very well. He had played with computer interaction before, but there was always a preparatory stage, hours of designing and programming, then the inevitable critical feedback of the recording or glitch in performance. He soon realised he had no patience for it and so relied on a programmer, a sonic artist as assistant, as collaborator when circumstances required it.

When J’s colleagues developed an ‘app’ for the I-Mind it meant he could receive J’s instant thoughts, but thoughts translated into virtual ‘active’ music notation, a notation that flowed across the screen of his inner eye. It was astonishing; more astonishing because J didn’t have to be physically there for it to happen: he could record I-Mind files of his thought compositions.

The reference pre-score at the top of the mind page was gradually enlarging to a point where pitches were just visible and this gap, a gap with no stave, a gap of silence, a gap with no action, a gap with repeat signs was probably 30 seconds away

In the early days (was it really just 10 years ago?) the music was delivered to him embedded in a network of experiences, locations, spiritual and philosophical ideas. J had found ways to extend the idea of the notated score to allow the performer to explore the very thoughts and techniques that made each piece – usually complete hidden from the performer. He would assemble groups of miniatures lasting no more than a couple of minutes each, each miniature carrying, as J had once told him, ‘one thought and one thought only’.  But this description only referred to the musical material because each piece was loaded with a web of associations. From the outset the music employed scales and tonalities so far away from the conventions of jazz that when he played and then extended the pieces it seemed like he was visiting a different universe; though surprisingly he had little trouble working these new and different patterns of pitches into his fingers. It was uncanny the ‘fit’.

Along with the music there was always rich, often startling images she conjured up for J’s compositions. At the beginning of their association J initiated these. He had been long been seeking ways to integrate the visual image with musical discourse. After toying with the idea of devising his own images for music he conceived the notion of computer animation of textile layers. J had discovered and then encouraged the work and vision of a young woman on the brink of what was to become recognised as a major talent. When he could he supported her artistically, revelling in the keenness of her observation of the natural world and her ability to complement what J conceived. He became her lover and she his muse; he remodelled his life and his work around her, her life and her work.

When performing the most complex of music it always seemed to him that the relative time of music and the clock time of reality met in strange conjunctions of stasis. Quite suddenly clock time became suspended and musical time enveloped reality. He found he could be thinking something quite differently from what he was playing.

Further projects followed, and as they did he realised a change had begun to occur in J’s creative rationale. He seemed to adopt different personae. Outwardly he was J. Inside his musical thought he began to invent other composers, musical avatars, complete minds with different musical and personal histories that he imagined making new work.

J had manipulated him into working on a new project that had appeared to be by a composer completely unknown to him. L was Canadian, a composer who had conceived a score that adhered to the DOGME movie production manifesto, but translated into music. The composition, the visuals, the text, the technological environment and the performance had to be conceived in realtime and in one location. A live performance meant a live ‘making’, and this meant he became involved in all aspects of the production. It became a popular and celebrated festival event with each production captured in its entirety and presented in multi-dimensional strands on the web. The viewer / listener became an editor able to move between the simultaneous creative activity, weaving his or her own ‘cut’ like some art house computer game. L never appeared in person at these ‘remakings’, but via a computer link. It was only after half a dozen performances that the thought entered his mind that L was possibly not a 24-year-old woman from Toronto complete with a lively Facebook persona.

Then, with the I-Mind, he woke up to the fact that J had already prepared musical scenarios that could take immediate advantage of this technology. A BBC Promenade Concert commission for a work for piano and orchestra provided an opportunity. J somehow persuaded Tom Service the Proms supremo to programme this new work as a collaborative composition by a team created specially for the premiere. J hid inside this team and devised a fresh persona. He also hid his new I-Mind technology from public view. The orchestra was to be self-directed but featured section leaders who, as established colleagues of J’s had already experienced his work and, sworn to secrecy, agreed to the I-Mind implant.

After the premiere there were rumours about how the extraordinary synchronicities in the play of musical sections had been achieved and there was much critical debate. J immediately withdrew the score to the BBC’s consternation. A minion in the contracts department had a most uncomfortable meeting with Mr Service and the Controller of Radio 3.

With the end of this phrase he would hit the gap  . . . what was he to do? Simply lift his hands from the keyboard? Wait for some sign from the I-Mind system to intervene? His audience might applaud thinking the piece finished? Would the immersive visuals with its  18.1 Surround Sound continue on the five screens or simply disappear?

His hands left the keyboard. The screens went white except for the two repeats signs in red facing one another. Then in the blank bar letter-by-letter this short text appeared . . .


Here Silence gathers
thoughts of you

Letters shall never
spell your grace

No melody could
describe your face

No rhythm dance
the way you move

Only Silence can
express my love

ever yours ever
yours ever yours



He then realised what the date was . . . and slowly let his hands fall to his lap.
mannley collins Jul 2014
Is such a big and impossible to miss step for a scribbler
of poetry free poems to trip over.
A step that cannot be ignored, except consciously and conscientiously.
Such a person as a scribbler of poetry less poems would be a person who cannot tell the difference between truth and truthfulness.
A person whose sole raison d,etre in pretending to be a poet is their lifelong angst in being unable to escape from being under the control of  their mind and its operating system --the Conditioned Identity.
The Conditioned Identity,which is the facetious and morally dishonest "I am a poet" mask that is the consciously adopted Conditioned Identity--the operating system for the Mind.
In the great scheme of things becoming just another member of the human GroupMind--one who doesn't count--not even on the fingers of one hand-.
One,who,in the grand scheme of things,never has counted and never will count-call them countless.
Shadows that flicker and dim on the walls of the Prison of political, racial,national,familial and religious conformity
And these worthless scribblers of poetry less poems do have an all consuming conditioned habit  of consciously ignoring truthfulness and integrity and substituting pathetic sub-teen lower middle class emo whinging "truth"--about their "art" and "insight"and "vision"and their "truth"--always their worthless "truth".
Sitting and mourning the fulfilling love that always evades them and always will evade them--unless they let go of the conditioned identity and the Mind--consigning them to the dustbin of history--where they rightfully belong.
Angst ridden whingers all--in love with their image in the mirror of Minds oh so believable deception.
Scribbling about a conditional possessive love that would have been a valueless truth but never can be the essence of truthfulness.
A conditional possessive love that never was and never will be unconditional and non-possessive.
Whinging about nothing more than conditional love and a truthfulness that never can be for them--- as we see openly here and there and everywhere there are scribblers of poetry less "poetry" who use sites such as this to scribble their pretentious infantile nonsense.
Poverty of values and integrity,orphaned from the Isness of the Universe, children of worthless technological consumerism and followers of false oligarchic hopes.
With their greedy gobs open for any crumbs falling from the rich peoples tables,like baby chicks in the nest--feed me feed me they screech.
Colluding with like minded betrayers of truthfulness,groupminds of
limp wristed bombastic poseurs.
Deluding themselves by babbling media made inane celebrities
empty insights and twisted conclusions--purveyors of puerile pettiness.
Oligarchic media celebrities noted only for the illusions between their ears,and the beguiling way they collude with each other to delude themselves.
Ludare!
Oh how they love to play mind games
Lives spent colluding with these babbling worthless celebrities who know the price of everything and the value of nothing,
Pompous posturing pretentious pissants of aesthetic poverty.
Bound together into a worldwide consumers Groupmind,
persuaded by perverts of PR into believing in the Illusion of Wealth and Demockery that the Oligarchy sells.
To step over the truthfulness threshold is,indeed, to  leave behind their
security blankets of "truth and beauty and revealed knowledge"
and the concomitment meaningless verbiage about "veracity" and "existence".
Shallow and unrequited attempts to own another that the weak and unwanted call "love".
Stomping through the quagmire of conditional love
up to their necks in the **** of consumer garbage.
The Conditional love of possessing another and grasping at thin air
as they submerge slowly in the seas of righteous stupidity .
poets cling to their misconceptions religiously,
poets cling to their ignorance avidly,
poets cling to their proto-fascist politics squeamishly,
with each word and stanza that they write.
Pouring out such pleasant and elegant and flowery and "deep"
words and verses(rhyming or not) that,at their core,
have only one meaning and aim.
Which is!.
To divert and confuse their readers with the"shallow beauty"
of endless strings of meaningless associated but fine sounding words .
To create a groupmind for their poetry business products.
Admire me--buy my product--join my groupmind--eulogise me,
let me rip off your energy--I need your praise,I need your lifes energy
gimme your money honey!.
The Publishing Oligarchy will bestow rewards and honours,
medals and diplomas--critiques fit only to wipe your **** on.
Book sales and the summer Poetry festival circuit--reciting and signing scribbles of narcissism--casting lecherous eyes over dripping **** or stiff wobbling **** in the adoring crowd of sycophants.
The  Media will fawn and adulate and cast its sly net
to entangle your desires in ---infamy awaits.
Come admire me and my use of other poets stolen words,
my criminality in even daring to think the word "poet" has any value.
These are my words about my inexperience and unknowingness they scream possessively in jaundiced teeny remembrance.
Remembrance of mediocre middle class homes and attitudes
of ingrained ignorance and wilful imagined self victimisation.
Eating societies poisoned dishes--.
Serve me up a burger of roasted babies on toast
from Vietnam--live on Channel Whatever.
Or chargrilled peasants from Afghanistan
with breathless commentary from
our "reporter on the spot".
Or homeless mental wrecks from the streets
of any Amerikan or World city big or small,
trailing acerbic criticism from the immoral majority.
Or dead celebrity  consumer junkies in 5 star hotels
complete with PR handouts and **** licking "friends"
positioning themselves for increased sales.
Or the children of the Oligarchs with their "I" newspapers
and inbuilt fascist attitudes.
Who spend their shallow lives hoping for the kind
of meaningless and worthless Honours and Validation
from those that do not have honour or validity..
Or the not just lame but crippled duck presidents with their finely crafted speeches that say nothing but I am a beard wearing  failure,
looking forward to penning lies and calling it a frank memoir
while holding out my hands  for the Oligarchies pennies.
Can anyone tell me where to get a bucket of truthfulness?.
A glass of honesty?.
A tumbler full of veracity?.
A beaker of back breaking honest labour?.
Can anyone tell me where I can find
a peaceful man or woman,of any of the 5 colours.
Not those merely observing a Cease-Fire
while they rearm their weapons of the lies of beauty and truth.
Oligarchy allowed social commentary.
Is there just one decent truthful man or woman out there?.
Judging by the world Id say not.
No Id say not.
Not.
There Ive said it.

www.thefournobletruthsrevised.co.uk
Thomas Davies Nov 2015
I'm explaining to the people of the world
What Fate of Ten stands for
And my persistent craving for books
Bur does it look as if they understand?
No
They don't
And that's the problem
Of the dark world I'm finding myself in
And that's the problem
Of a world full of people that doesn't read
Something I thought would've
Changed
When the things named 'e-books' arrived
Because everyone was crazy
That our world turned 'technological advanced'
And everyone turned a blind eye
From the comforts of the past
There was always this people
That said
'Technology will make your life so much better'
But now I've come to believe that
We act as if we're worshiping it
And cherishing the fact that
'Our life's made easier'
But rather
We are blinded
By the
Imminent
Torture
Of the
Future
P.S. I'm not expressing my hate towards technology...I just hate it that so few people read. Don't they understand that books are the best thing that ever happened to us??
Riptide  May 2014
Whatsapp
Riptide May 2014
Subconsciously,
I replaced your emotions
With emoticons
Your eyes
With profile pictures
Your voice
With fonts
Falling into this technological abyss
How could I be so stupid
Thinking whatsapp
Could compensate
For your aura.
And now consciously
I suffer...

— The End —