Submit your work, meet writers and drop the ads. Become a member
for leather accrues
The miracle of the streets
The scents & smogs &
pollens of existence

Shiny blackness
so totally naked she was
Totally un-hung-up

We looked around
lights now on
Top see our fellow travellers
~~~

I am troubled
Immeasurably
By your eyes

I am struck
By the feather
of your soft
Reply

The sound of glass
Speaks quick
Disdain

And conceals
What your eyes fight
To explain
~~~

She looked so sad in sleep
Like a friendly hand
just out of reach
A candle stranded on
a beach
While the sun sinks low
an H-bomb in reverse
~~~

Everything human
is leaving
her face

Soon she will disappear
into the calm
vegetable
morass

Stay!

My Wild Love!
~~~

I get my best ideas when the
telephone rings & rings. It’s no fun
To feel like a fool-when your
baby’s gone. A new ax to my head:
Possession. I create my own sword
of Damascus. I’ve done nothing w/time.
A little tot prancing the boards playing
w/Revolution. When out there the
World awaits & abounds w/heavy gangs
of murderers & real madmen. Hanging
from windows as if to say: I’m bold-
do you love me? Just for tonight.
A One Night Stand. A dog howls & whines
at the glass sliding door (why can’t I
be in there?) A cat yowls. A car engine
revs & races against the grain- dry
rasping carbon protest. I put the book
down- & begin my own book.
Love for the fat girl.
When will SHE get here?
~~~

In the gloom
In the shady living room
where we lived & died
& laughed & cried
& the pride of our relationship
took hold that summer
What a trip
To hold your hand
& tell the cops
you’re not 16
no runaway
The wino left a little in
the old blue desert
bottle
Cattle skulls
the cliche of rats
who skim the trees
in search of fat
Hip children invade the grounds
& sleep in the wet grass
’til the dogs rush out
I’m going South!
John F McCullagh Jan 2012
I think that I shall never see
a better Carbon Sink than M.I.T.’s

It helps keep green house gas at bay
By sequestering it away

The Carbon Sink works like a tree
but does it more efficiently

When trees in wintertime are bare
The Carbon Sink still cleans the air    

And trees can yield up carbon once again
When Forest fires make them burn

Poems are made by fools like me
But Carbon Sinks are made by M.I.T
Joyce Kilmer's "Trees" updated for the global warming era.   Carbon sinks are devices that capture and sequester green house gases underground.  A little parody mixed with homage to a great poet, Kilmer, who was taken from us too soon.
anastasiad Dec 2016
Software program designers ordinarily apply certain types of layer technological know-how to shield their software to avoid illegitimate apply. In addition need software layer software is permitted to obtain articles, to be able to boost product sales profit.

Software package encryption technology is split in accordance with whether or not the by using a devoted hardware-based encrypted sheild hardware as well as software-based security. Hardware-based layer, layer have to bind having a focused hardware unit, the particular electronics shield of encryption layer head of hair, typically referred to as the dongle. Software-based layer, encryption does not need focused electronics, typical executed digital camera permission while using the your fatal unit hardware and software data, also referred to as this electronic digital endorsement styles.

Simply consider drive-based electronics encryption stability when compared with software-based shield of encryption will not be suitable, as the more linked to program security, like encrypted sheild products and solutions, stability, encrypted sheild plan style, software, systems, , equipment, details marketing and sales communications, and the like, is really a detailed technological spots, not alone by a to discover whether protection.

Far away, the market industry promote of the digital permission along with security tresses are evenly coordinated. Behavior and also fantastic factors, the actual layer hair likewise enjoy a certain share of the market. File encryption hair, however, will be the network produced merchandise in the instances, can be a pure consumer technology, insufficient operations and also record capabilities, the inclusion of appliance manufacturing, strategic planning, driver installation annoyance, but not only the high cost, and might stop obtained multilevel submission and sales of your computer software, is definitely gradually diminish.

Enhancing the electronic acceptance that is certainly while in the ascendant. Electrical certificate protection approaches are getting to be progressively more included in the Internet technology, cloud computing and also SaaS thought is not just easier to make use of along with cope with computer software electric situation and be able to accomplish, but according to present day natural low-carbon improvement strategy, has got supplanted the encryption curly hair Outstanding software program encryption market trends. The more well-known businesses on the planet, Microsoft, Sun microsystems, Autodesk, SIEMENS, Adobe and various computer software are electronic consent safeguards function.

In the nation, using file encryption software package coders fasten greater premiums, along with international routines and also historic causes of the actual continuation with the next 2 reasons:

One particular every day producers typically regarded security encrypted sheild a lock electronic digital authorization.

There's not just about any readily available electronic digital licence products and solutions too big, the asking price of foreign electronic digital permission.

In reality, while using the rising betterment of your multi-level surroundings, your system triggering for the majority of home end users 's no trouble. And even brought up previously, which the point of view from the safety of layer head of hair electric permission on the sides completely wrong. From your reasonable mindset, this file encryption hair as a result of computer hardware copying much easier to crack, but accomplished piracy business sequence has been made. In its place, electronic digital endorsement because appliance is not replicated, but in addition should system arousal plus approval, in reality, have good safety outcome. Additionally, your every day has showed up in some accredited goods give electric 2-3 enterprise will have to improve while using growth of China's software package sector and grow up.

As a result, your layer computer software market styles hardware, web 2 ., and details technologies. Below, we speak about, in the application encryption approach specific to be able to detailed application encrypted sheild establishment plus progress craze of the marketplace.

Very first, the software encryption approach

As mentioned previously, it encrypted sheild technologies are divided into security hardware-based as well as software-based security.

Your hardware-based shield of encryption

Hardware-based encryption shield of encryption locks, many important info, like shield of encryption secrets to vulnerable information, consent paperwork, tailor made sets of rules, etcetera. can be stored in this dongle.

The layer fastener screen variety is split in to 2 kinds of synchronised slot and also Flash interface. This simultaneous port could be the very early technique type, because the propagation troublesome plus clash while using the printer's, and after this has less apply. A lot of builders employ tend to be USB slot dongle.

File encryption hair from the two kinds of CPU form, the microcontroller to get Pc and another with a clever minute card processor for the reason that Pc a microcontroller computer hardware by itself conveniently trouble area or content, therefore an increasing number of high-end file encryption a lock employing a intelligent credit card chips Central processing unit, to stop hardware break. Although a growing number of clever card dongle crack, initially, because processor might be more and even more leading-edge analytic techniques and devices; sensible card program to be written to the chips manufacturing unit to make during this time method may possibly trickle; encrypted sheild tresses of the identical manufacturer your Processor process is the same, merely various designers facts as well as major, in case most of these records are passed out there, you can easily clone.

Dongle features a specific level of security power, but you can also find a number of drawbacks:

One) apply at the regular one-time never ending license, can't assist in the achievements of your trial model along with on-demand invest in

3) the presence of electronics generation, logistics, assembly as well as upkeep charges

Three) is not achieved the issue with Internet-based electronic digital improvements, tracking along with control

Several) Once broke, may be burned huge, it is sometimes complicated to remedy

A pair of software-based encryption

Software-based encrypted sheild, digital acceptance, and certain in addition separated into home equity loans number plate along with licenses document:

In order to register code can be referred to as successive number or consent computer code, acquired using a alteration in the the program end user computer systems along with program facts, possible software and hardware facts, including: Cpu serial number, BIOS sequential amount, greeting card amount, harddisk sequential number, computer system brand, etc. . Completely transform formula made use of your customized protocol or maybe conventional shield of encryption algorithm formula. Customer as well as primary utilisation of the computer software installment practice, you might want to type in the enrollment value to confirm. Following verification, it can be employed typically. The particular strategy has got the good thing about this subscription computer code defense is easy to use, the downside is always that security is not really higher, not able to attain complicated endorsement demands.

Permission submit as well as the signing up code in order to situation the same computers plus software information, simply a registration signal period confines utilization of both software and hardware information, a permission record can use numerous hardware and software info. Also, the actual permission report can contain more info, to help you obtain the difficult agreement demands, and may perhaps retail outlet several customer facts. The average permission report way is to implement the private key in the asymmetric algorithm to hint your certificate data file, while the general public secret is embedded in the application value. Asymmetric shield of encryption plus understanding course of action, the private computer essential consent hosting server exists, it is hard to compromise from the investigation regarding endorsement paperwork.

Some great benefits of this electric endorsement safeguard doesn't require further electronics, and for that reason doesn't have to mount the motive force as well as buyer elements, electronic digital hardware issue. The disadvantage from the automated certificate safety mode just isn't networked buyers really need to hand remove your computer information, and then personally significance registration constraints or even permission, is not very easy to use. Additionally, the particular domestic electronic digital acceptance a few of the programmers from the product or service, that also limits your popularization and promotion connected with electric permit safeguard technology.

Subsequent, it encrypted sheild field advancement status

A single. File encryption curly hair

The main unusual dongle professional SafeNet, Corporation. in the usa in addition to Germany Wibu.

Security head of hair service deeply Supposrr que Luoke and also Feitian. The 2 main organizations due to the affordable prices, the first person to introduce the actual good minute card shield of encryption curly hair nearby perfectly so that you can enjoy some market place in the nation.

A pair of. Electric permission

Unfamiliar company certified merchandise to supply electronic digital Flexera Software and also SafeNet which will, Flexera Software program is focused entirely on the joy of digital permission, the actual device's ease of use along with features are doing superior, though the valuation on the item is additionally quite high.

This home-based electrical authorization goods enterprise a Beijing Biteansuo (BitAnswer), Shenzhen-use this (Euse) Safengine Organization.

There are only a few companies will acquire their very own electronic digital consent structure, even so the builders to cultivate their own plans commonly occur this inquiries:

One particular) the introduction of non-professionals, there are numerous loopholes while in the security

A pair of) is actually difficult to realize accommodating accreditation control, management and also precise functions simple or maybe simply no

Three) are often unveiled to be able to address the particular fast problem connected with short-term method, create far more than predicted in the foreseeable future as a result of protection, balance and also scalability challenges continued to get

Several) can not meet up with sector variations as a result of the modern demands on program certification model

Software program security marketplace movements

The software security field developments is closely connected with the increase development with the computer software marketplace. With the rise in popularity of cloud-computing plus Software, service with application products will be change in the direction of the multilevel plus system. Used in nearly all software programmers, Software items can not only spend less a great deal of hardware and software buy plus servicing charges, you can also get demand from customers, when decreasing the use of possibility, driving program vendors in order to consistently strengthen items plus improve services to be able to sustain consumers.

To the development of system and program improvement can also be a software package encrypted sheild technologies movements. The view around the present-day growth trend, the encryption locking mechanism technologies have designed really develop fully information mill approaching vividness, slower advancement. The actual everyday living and make use of on the equipment practice creates security head of hair are not able to conserve the speed regarding advancement of the Internet period, are going to be substituted with the particular automated certificate.

Automated authorization permission through earlier subscription program code type on the feature-rich records available as modifications to technologies are considering verification process out of offline yourself confirm the introduction of computerized system authorization. Permitted administration contemplating particularly, your electrical licence technological innovation collected from one of software licence qualifications growth just as one authorized official certifications, agreement management and exact information and facts, and also other objective of each, significantly improved this permitted volume of details regarding computer software coders.

May forecast not able to electronic products certified solutions ought to have these most important properties:

Enlightening approved administration system: supplied by third-party safety measures specialized software designers, in line with the Net's one-stop software package safety plus endorsement management system, without having to deploy and observe after, low priced, easy-to-use.

Only two Bendable Certificate: offer the acceptance of the purchaser software as well as the cloud computing product common software package licenses; authorized touch time, the volume of sensible adventures; sanctioned in order to bind your computer software and hardware information and facts, encryption tresses, or by way of a username plus password validation way of agreement.

Simple and easy friendly buyer: in accordance with the WEB, at any place obtain; Users might food acquire, trigger boost the software, you can buy their unique software package to keep abreast of details; software package designers can certainly understand software initial information and facts plus individual data is often synergies through the people in the firm to finish the design of application license, enactment, supervision as well as maintenance operate.

5. Fog up accreditation unit: This is a cloud computing type of software program licensing. Standard application is genuine customer setup, endorsement can also be a buyer. Although cloud-computing could be the craze, although the move difficult for classic software package would be a wonderful way for the particular a higher level cloud computing modification. This definite awareness associated with tips, a common application approved move on the purchaser for the fog up on the endorsement remote computer, to ensure that small adjustments towards the application, but you can certainly instantly experience the great things about cloud computing: higher safety energy require to obtain clouds hard drive .

http://www.passwordmanagers.net/ Password Manager
abby May 2015
how do you stop your throat from burning
from salty tear-stained gulps and gasps
for oxygen that is no longer there?
there is too much carbon dioxide in the air now
and i want to fast forward into a world
where i can breathe in sweet helium
and ask for it to stop.
because there are times
when it's impossible to breathe
and when my puffy red eyes
can't open more than a millimeter
because you have glued them shut
with your accusations.
i didn't want to be gas station concrete any longer
i didn't want dirtiness to be my middle name
i only wanted to cleanse myself of you and your fists,
you and your laughter
you and your hatred.
i wanted to be clean.

*(a.m.c.)
CommonStory Dec 2017
Diamonds are forever
Because they're carbon
And we're carbon

She wants to last forever
But she's going on 37

Honey I feel your pain
as my strength will wax and wane

That's why diamonds last forever
Because they're carbon
Heated carbon

She wants to smile forever
But today she's sad as ever

That's why diamonds are forever
Because they're carbon
Under pressure

Darling close your eyes
And smile one more time

And honey I feel your pain
As my joints begin to pain

That's why diamonds are forever
Because they're hardened

She just wants to remain beautiful
But that's a shallow pool to swim

And honey I feel your pain
As my love brings sorrow again

That's why diamonds are forever
Because they're diamonds
And we're diamonds

She just wants to learn
And that's no one else's concern

And honey I feel your pain 
As I stitch my scars again

And that's why diamonds are forever
Because they're diamonds
And we're


She just wants to take her time
And not be crowded by the lies

And honey I feel your pain
But I don't want to waste my time aga in

And that's why diamonds are forever
Because they're diamonds
And we're dying
Copyright Matthew Marquis Xavier Donald
12/23/2017
Joshua Haines Jun 2015
I see how white light startles.
I snapped a pic and she spun in circles.
She wanted a photograph
to cover her mother's epitaph,
so she could have a laugh.

She smoked to get away -
but this isn't what'd she say,
exhaling, "All we are is carbon
and a lack of empathy."

We blended into hues of
microwave dinners
and church alters.
I used to tell her to go
just to halt her.

We prayed to get away -
but that's not what we'd say,
whispering, "Help us be more
than carbon and a lack of empathy."
Joshua Haines Sep 2014
Xeroxed vitals on paperplanes
Crashing into window panes
Broken-heart blisters and voyeuristic veins
Appear and create transparent glass stains
Blue-Green grass on the other side
Laying there, our fathers died
Dreams and streams of alcohol
Run from their mouths with no control.
Shaking, breaking, no where to decompose
Skin peeling off of worn down toes.
Tell me where their love goes
Tell me where their love goes
Everything turned into gun-shy eyes
Blue-lipped Sunday surprise
Bodies breaking into waiting
This is nothing but carbon dating
Bottles breaking of ***** that's so clear
That I won't see until they're near
God and Jesus in picture frames
Suburban families with jungle brains
Broken homes and replacement Brad's
401 k's and missing ads
Finding our homes that aren't so black and white
Let us sleep in our dreams tonight
Validation through our existence
Is dead but still our resistance
jack of spades Dec 2015
buy me on the black market like the instability I am.
watch me hurtle through negative space backwards,
the planet-wide catastrophe of a sun-sized storm in me.
Call me Carbon-14.
it’s the latest piece of my galaxy-sized identity, another chemical
small enough to wage nuclear war.
you’re witnessing my radioactive decay,
the deterioration of everything I used to be into
everything I might be,
a kind of reaction that happens when one of my ‘downs’
becomes an ‘up,’
no aces up my sleeves or full houses of face cards in spades,
but I’ve got straight sevens,
protons neutrons electrons, carbon to nitrogen.
beta decay, the mass production of passive procrastination;
second in command, sidekick sidetracking heroes.
Call me Nitrogen standard 14.
watch me decay into the air that you breathe,
seventh most common gas in the Milky Way galaxy,
keeping things fresh and stainless like my steel armor,
try and make me combust but I’m fireproof, bulletproof,
balanced and on my toes in a defensive position,
fists raised for the fight that you’re going to put up.
my axis is more stable than yours. step into the rings of saturn,
ring the bells to start the rounds, champion takes home the stars,
wraps orion’s belt around their waist and buckles it tight with nuclear waste.
everyone loves an underdog story, but only when they know,
positively, that the underdog will win.
with you and me, it’s a 50/50 on who exactly has the upper hand
and who exactly is going to win, but I’ll make bets with the elements around me,
the carbon that I used to be hashing out 20’s and oxygen
claiming she’s not one for gambling.
baby, you’re in my lungs, you’re in my corner of the ring.
she’ll slip in a 50 like my chances, and I’ll pretend that I don’t notice.
phosphorus is too fiery to root for me,
he’s more of a heavyweight believer than me.
Call me contagious
when my knuckles bloom across your jaw and knock away
all of your sensibility, stability, bruises like moons
as the mirror shatters every reflection of who I used to be.
Call me Carbon-14, but know that I am radioactive,
actively changing, reigning champion of breaking perceptions,
and you’re just the impression of the death that I’m carbon-dating.
did u know that im a chemistry nerd
Even the sun-clouds this morning cannot manage such skirts.
Nor the woman in the ambulance
Whose red heart blooms through her coat so astoundingly ----

A gift, a love gift
Utterly unasked for
By a sky

Palely and flamily
Igniting its carbon monoxides, by eyes
Dulled to a halt under bowlers.

O my God, what am I
That these late mouths should cry open
In a forest of frost, in a dawn of cornflowers.
Jasmine Roper Feb 2017
I asked a variety of people to say the first word that came to mind when presented with the noun “Crisis”

I heard many different responses; “a problem” “a catastrophe” “an unbearable disaster”, and yet, never did I hear the biggest Crisis of all

Education.

E-D-U-C-A-T-I-O-N

Allow me to dissect that word for a second,

The abbreviation for education is made of the first three letters “E-D-U” you find it on website domains somewhere in your textbooks

However the first three letters are the least important.
When you drop that edu you’re left with a word, a word extremely crucial to the English language.
Caution

For people who don’t understand this word “caution” It means to be attentive, alert, to take enough care to best avoid error, danger, or making mistakes.

Uh, funny right, students are constantly punished in schools for mistakes, errors, not being attentive enough.

Constantly being told to “ be quiet’ and to “settle down” or
“Turn to page 155 and and stop looking around”


Let me change this path a little
Allow me to alter your focus for a second

We are speaking of a crisis, one larger than education as a whole. A part of education that has been belittled, spat on, or strapped on a leash and taken for a stroll.

Black education.

Every year our classrooms get larger, with larger quantities comes more diversity. And yet, our units get smaller, and the best education are given to those with the largest dollar.

The truth is, we no longer care about the information we are being taught.
Because it only presents the people and white wars that were being fought.  

It is hard for students to identify, accept and appreciate the information in front of them if it never directly relates to them.

I’m sure everyone in this room is aware of MLK’s “i had a dream speak” or Rosa parks famous word “nah.”

But what about the playstation, wii or xbox you used last night? Thank Jerry Lawson for that, and yes, he is black.

From such a young age we learn about the theories and discoveries that Benjamin Franklin gave
but not once are we told about Lewis Latimer, the man who invented the carbon filament,used in all light bulbs above our heads today

We’re held up to this standard of excellence, they expect us to be cautious, meticulous, and strive for nothing but perfection. Something said to be achieved by a proper education

However please explain how is that education rumored to be so proper when I try my best they say please God stop her.

Black education must be taught or it’ll enlarge as the crisis very soon to be fought.

While I calm down and allow that to sink in
Know and understand
Black education must never end

They say we're too violent that all we do is fight
And yet all we do is look for our ancestors in our textbooks every night

Every head shouldn’t turn towards me on the topic of slavery
If it weren’t so taboo; they wouldn’t have to be.

As i tie up my tongue and sit back in my seat
I continue to pray that history doesn’t repeat
Jimmy Hegan Nov 2015
World is moving on , & Globe is vanishing on,
World is developing on , & Globe and Glacier's  is  decreasing on,
World researches and expriement & Globe  eats carbon and carbon,
Imagine what happen if we eat  excess of carbon in human body,
Then  think what happens about Globe who eat carbon each nano seconds
Imagine  human body  never tolerate excess of carbon ,
Then how Globe  tolerate excess of carbon,
It  dies every nano seconds and generates "GLOBAL WARMING" &
Gives dangerous  threats and warning to the World.
And we all are sufuring from Changing Environment Season's.
Who will compromise from  Ultra Carbon Technology,
Carbon  is eating Globe day by day &
Earth is becoming hot like a Volcano's Lava.
Wade Redfearn Sep 2018
The first settlers to the area called the Lumber River Drowning Creek. The river got its name for its dark, swift-moving waters. In 1809, the North Carolina state legislature changed the name of Drowning Creek to the Lumber River. The headwaters are still referred to as Drowning Creek.

Three p.m. on a Sunday.
Anxiously hungry, I stay dry, out of the pool’s cold water,
taking the light, dripping into my pages.
A city with a white face blank as a bust
peers over my shoulder.
Wildflowers on the roads. Planes circle from west,
come down steeply and out of sight.
A pinkness rises in my breast and arms:
wet as the drowned, my eyes sting with sweat.
Over the useless chimneys a bank of cloud piles up.
There is something terrible in the sky, but it keeps breaking.
Another is dead. Fentanyl. Sister of a friend, rarely seen.
A hand reaches everywhere to pass over eyes and mouths.
A glowing wound opens in heaven.
A mirror out of doors draws a gyre of oak seeds no one watches,
in the clear pool now sunless and black.

Bitter water freezes the muscles and I am far from shore.
I paddle in the shallows, near the wooden jail.
The water reflects a taut rope,
feet hanging in the breeze singing mercy
at the site of the last public hanging in the state.
A part-white fugitive with an extorted confession,
loved by the poor, dumb enough to get himself captured,
lonely on this side of authority: a world he has never lived in
foisting itself on the world he has -
only now, to steal his drunken life, then gone again.

1871 - Henderson Oxendine, one of the notorious gang of outlaws who for some time have infested Robeson County, N. C., committing ****** and robbery, and otherwise setting defiance to the laws, was hung at Lumberton, on Friday last in the presence of a large assemblage. His execution took place a very few days after his conviction, and his death occurred almost without a struggle.

Today, the town square collapses as if scorched
by the whiskey he drank that morning to still himself,
folds itself up like Amazing Grace is finished.
A plinth is laid
in the shadow of his feet, sticky with pine,
here where the water sickens with roots.
Where the canoe overturned. Where the broken oar floated and fell.
Where the snake lives, and teethes on bark,
waiting for another uncle.

Where the tobacco waves near drying barns rusted like horseshoes
and cotton studs the ground like the cropped hair of the buried.
Where schoolchildren take the afternoon
to trim the kudzu growing between the bodies of slaves.
Where appetite is met with flood and fat
and a clinic for the heart.
Where barges took chips of tar to port,
for money that no one ever saw.

Tar sticks the heel but isn’t courage.
Tar seals the hulls -
binds the planks -
builds the road.
Tar, fiery on the tongue, heavy as bad blood in the family -
dead to glue the dead together to secure the living.
Tar on the roofs, pouring heat.
Tar is a dark brown or black viscous liquid of hydrocarbons and free carbon,
obtained from a wide variety of organic materials
through destructive distillation.
Tar in the lungs will one day go as hard as a five-cent candy.

Liberty Food Mart
Cheapest Prices on Cigarettes
Parliament $22.50/carton
Marlboro $27.50/carton

The white-bibbed slaughterhouse Hmong hunch down the steps
of an old school bus with no air conditioner,
rush into the cool of the supermarket.
They pick clean the vegetables, flee with woven bags bulging.
What were they promised?
Air conditioning.
And what did they receive?
Chickenshit on the wind; a dead river they can't understand
with a name it gained from killing.

Truth:
A man was flung onto a fencepost and died in a front yard down the street.
A girl with a grudge in her eyes slipped a razorblade from her teeth and ended recess.
I once saw an Indian murdered for stealing a twelve-foot ladder.
The red line indicating heart disease grows higher and higher.
The red line indicating cardiovascular mortality grows higher and higher.
The red line indicating motor vehicle deaths grows higher and higher.
I burn with the desire to leave.

The stories make us full baskets of dark. No death troubles me.
Not the girl's blood, inert, tickled by opiates,
not the masked arson of the law;
not the smell of drywall as it rots,
or the door of the safe falling from its hinges,
or the chassis of cars, airborne over the rise by the planetarium,
three classmates plunging wide-eyed in the river’s icy arc –
absent from prom, still struggling to free themselves from their seatbelts -
the gunsmoke at the home invasion,
the tenement bisected by flood,
the cattle lowing, gelded
by agriculture students on a field trip.

The air contains skin and mud.
The galvanized barns, long empty, cough up
their dust of rotten feed, dry tobacco.
Men kneel in the tilled rows,
to pick up nails off the ground
still splashed with the blood of their makers.

You Never Sausage a Place
(You’re Always a ****** at Pedro’s!)
South of the Border – Fireworks, Motel & Rides
Exit 9: 10mi.

Drunkards in Dickies will tell you the roads are straight enough
that the drive home will not bend away from them.
Look in the woods to see by lamplight
two girls filling each other's mouths with smoke.
Hear a friendly command:
boys loosening a tire, stuck in the gut of a dog.
Turn on the radio between towns of two thousand
and hear the tiny voice of an AM preacher,
sharing the airwaves of country dark
with some chords plucked from a guitar.
Taste this water thick with tannin
and tell me that trees do not feel pain.
I would be a mausoleum for these thousands
if I only had the room.

I sealed myself against the flood.
Bodies knock against my eaves:
a clutch of cats drowned in a crawlspace,
an old woman bereft with a vase of pennies,
her dead son in her living room costumed as the black Jesus,
the ***** oil of a Chinese restaurant
dancing on top of black water.
A flow gauge spins its tin wheel
endlessly above the bloated dead,
and I will pretend not to be sick at dinner.

Misery now, a struggle ahead for Robeson County after flooding from Hurricane Matthew
LUMBERTON
After years of things leaving Robeson County – manufacturing plants, jobs, payrolls, people – something finally came in, and what was it but more misery?

I said a prayer to the city:
make me a figure in a figure,
solvent, owed and owing.
Take my jute sacks of wristbones,
my sheaves and sheaves of fealty,
the smell of the forest from my feet.
Weigh me only by my purse.
A slim woman with a college degree,
a rented room without the black wings
of palmetto roaches fleeing the damp:
I saw the calm white towers and subscribed.
No ingrate, I saved a space for the lost.
They filled it once, twice, and kept on,
eating greasy flesh straight from the bone,
craning their heads to ask a prayer for them instead.

Downtown later in the easy dark,
three college boys in foam cowboy hats shout in poor Spanish.
They press into the night and the night presses into them.
They will go home when they have to.
Under the bridge lit in violet,
a folding chair is draped in a ***** blanket.
A grubby pair of tennis shoes lay beneath, no feet inside.
Iced tea seeps from a chewed cup.
I pass a bar lit like Christmas.
A mute and pretty face full of indoor light
makes a promise I see through a window.
I pay obscene rents to find out if it is true,
in this nation tied together with gallows-rope,
thumbing its codex of virtues.
Considering this just recently got rejected and I'm free to publish it, and also considering that the town this poem describes is subject once again to a deluge whose damage promises to be worse than before, it seemed like a suitable time to post it. If you've enjoyed it, please think about making a small donation to the North Carolina Disaster Relief Fund at the URL below:
https://governor.nc.gov/donate-florence-recovery
Next page