Submit your work, meet writers and drop the ads. Become a member
anastasiad Dec 2016
Software program designers ordinarily apply certain types of layer technological know-how to shield their software to avoid illegitimate apply. In addition need software layer software is permitted to obtain articles, to be able to boost product sales profit.

Software package encryption technology is split in accordance with whether or not the by using a devoted hardware-based encrypted sheild hardware as well as software-based security. Hardware-based layer, layer have to bind having a focused hardware unit, the particular electronics shield of encryption layer head of hair, typically referred to as the dongle. Software-based layer, encryption does not need focused electronics, typical executed digital camera permission while using the your fatal unit hardware and software data, also referred to as this electronic digital endorsement styles.

Simply consider drive-based electronics encryption stability when compared with software-based shield of encryption will not be suitable, as the more linked to program security, like encrypted sheild products and solutions, stability, encrypted sheild plan style, software, systems, , equipment, details marketing and sales communications, and the like, is really a detailed technological spots, not alone by a to discover whether protection.

Far away, the market industry promote of the digital permission along with security tresses are evenly coordinated. Behavior and also fantastic factors, the actual layer hair likewise enjoy a certain share of the market. File encryption hair, however, will be the network produced merchandise in the instances, can be a pure consumer technology, insufficient operations and also record capabilities, the inclusion of appliance manufacturing, strategic planning, driver installation annoyance, but not only the high cost, and might stop obtained multilevel submission and sales of your computer software, is definitely gradually diminish.

Enhancing the electronic acceptance that is certainly while in the ascendant. Electrical certificate protection approaches are getting to be progressively more included in the Internet technology, cloud computing and also SaaS thought is not just easier to make use of along with cope with computer software electric situation and be able to accomplish, but according to present day natural low-carbon improvement strategy, has got supplanted the encryption curly hair Outstanding software program encryption market trends. The more well-known businesses on the planet, Microsoft, Sun microsystems, Autodesk, SIEMENS, Adobe and various computer software are electronic consent safeguards function.

In the nation, using file encryption software package coders fasten greater premiums, along with international routines and also historic causes of the actual continuation with the next 2 reasons:

One particular every day producers typically regarded security encrypted sheild a lock electronic digital authorization.

There's not just about any readily available electronic digital licence products and solutions too big, the asking price of foreign electronic digital permission.

In reality, while using the rising betterment of your multi-level surroundings, your system triggering for the majority of home end users 's no trouble. And even brought up previously, which the point of view from the safety of layer head of hair electric permission on the sides completely wrong. From your reasonable mindset, this file encryption hair as a result of computer hardware copying much easier to crack, but accomplished piracy business sequence has been made. In its place, electronic digital endorsement because appliance is not replicated, but in addition should system arousal plus approval, in reality, have good safety outcome. Additionally, your every day has showed up in some accredited goods give electric 2-3 enterprise will have to improve while using growth of China's software package sector and grow up.

As a result, your layer computer software market styles hardware, web 2 ., and details technologies. Below, we speak about, in the application encryption approach specific to be able to detailed application encrypted sheild establishment plus progress craze of the marketplace.

Very first, the software encryption approach

As mentioned previously, it encrypted sheild technologies are divided into security hardware-based as well as software-based security.

Your hardware-based shield of encryption

Hardware-based encryption shield of encryption locks, many important info, like shield of encryption secrets to vulnerable information, consent paperwork, tailor made sets of rules, etcetera. can be stored in this dongle.

The layer fastener screen variety is split in to 2 kinds of synchronised slot and also Flash interface. This simultaneous port could be the very early technique type, because the propagation troublesome plus clash while using the printer's, and after this has less apply. A lot of builders employ tend to be USB slot dongle.

File encryption hair from the two kinds of CPU form, the microcontroller to get Pc and another with a clever minute card processor for the reason that Pc a microcontroller computer hardware by itself conveniently trouble area or content, therefore an increasing number of high-end file encryption a lock employing a intelligent credit card chips Central processing unit, to stop hardware break. Although a growing number of clever card dongle crack, initially, because processor might be more and even more leading-edge analytic techniques and devices; sensible card program to be written to the chips manufacturing unit to make during this time method may possibly trickle; encrypted sheild tresses of the identical manufacturer your Processor process is the same, merely various designers facts as well as major, in case most of these records are passed out there, you can easily clone.

Dongle features a specific level of security power, but you can also find a number of drawbacks:

One) apply at the regular one-time never ending license, can't assist in the achievements of your trial model along with on-demand invest in

3) the presence of electronics generation, logistics, assembly as well as upkeep charges

Three) is not achieved the issue with Internet-based electronic digital improvements, tracking along with control

Several) Once broke, may be burned huge, it is sometimes complicated to remedy

A pair of software-based encryption

Software-based encrypted sheild, digital acceptance, and certain in addition separated into home equity loans number plate along with licenses document:

In order to register code can be referred to as successive number or consent computer code, acquired using a alteration in the the program end user computer systems along with program facts, possible software and hardware facts, including: Cpu serial number, BIOS sequential amount, greeting card amount, harddisk sequential number, computer system brand, etc. . Completely transform formula made use of your customized protocol or maybe conventional shield of encryption algorithm formula. Customer as well as primary utilisation of the computer software installment practice, you might want to type in the enrollment value to confirm. Following verification, it can be employed typically. The particular strategy has got the good thing about this subscription computer code defense is easy to use, the downside is always that security is not really higher, not able to attain complicated endorsement demands.

Permission submit as well as the signing up code in order to situation the same computers plus software information, simply a registration signal period confines utilization of both software and hardware information, a permission record can use numerous hardware and software info. Also, the actual permission report can contain more info, to help you obtain the difficult agreement demands, and may perhaps retail outlet several customer facts. The average permission report way is to implement the private key in the asymmetric algorithm to hint your certificate data file, while the general public secret is embedded in the application value. Asymmetric shield of encryption plus understanding course of action, the private computer essential consent hosting server exists, it is hard to compromise from the investigation regarding endorsement paperwork.

Some great benefits of this electric endorsement safeguard doesn't require further electronics, and for that reason doesn't have to mount the motive force as well as buyer elements, electronic digital hardware issue. The disadvantage from the automated certificate safety mode just isn't networked buyers really need to hand remove your computer information, and then personally significance registration constraints or even permission, is not very easy to use. Additionally, the particular domestic electronic digital acceptance a few of the programmers from the product or service, that also limits your popularization and promotion connected with electric permit safeguard technology.

Subsequent, it encrypted sheild field advancement status

A single. File encryption curly hair

The main unusual dongle professional SafeNet, Corporation. in the usa in addition to Germany Wibu.

Security head of hair service deeply Supposrr que Luoke and also Feitian. The 2 main organizations due to the affordable prices, the first person to introduce the actual good minute card shield of encryption curly hair nearby perfectly so that you can enjoy some market place in the nation.

A pair of. Electric permission

Unfamiliar company certified merchandise to supply electronic digital Flexera Software and also SafeNet which will, Flexera Software program is focused entirely on the joy of digital permission, the actual device's ease of use along with features are doing superior, though the valuation on the item is additionally quite high.

This home-based electrical authorization goods enterprise a Beijing Biteansuo (BitAnswer), Shenzhen-use this (Euse) Safengine Organization.

There are only a few companies will acquire their very own electronic digital consent structure, even so the builders to cultivate their own plans commonly occur this inquiries:

One particular) the introduction of non-professionals, there are numerous loopholes while in the security

A pair of) is actually difficult to realize accommodating accreditation control, management and also precise functions simple or maybe simply no

Three) are often unveiled to be able to address the particular fast problem connected with short-term method, create far more than predicted in the foreseeable future as a result of protection, balance and also scalability challenges continued to get

Several) can not meet up with sector variations as a result of the modern demands on program certification model

Software program security marketplace movements

The software security field developments is closely connected with the increase development with the computer software marketplace. With the rise in popularity of cloud-computing plus Software, service with application products will be change in the direction of the multilevel plus system. Used in nearly all software programmers, Software items can not only spend less a great deal of hardware and software buy plus servicing charges, you can also get demand from customers, when decreasing the use of possibility, driving program vendors in order to consistently strengthen items plus improve services to be able to sustain consumers.

To the development of system and program improvement can also be a software package encrypted sheild technologies movements. The view around the present-day growth trend, the encryption locking mechanism technologies have designed really develop fully information mill approaching vividness, slower advancement. The actual everyday living and make use of on the equipment practice creates security head of hair are not able to conserve the speed regarding advancement of the Internet period, are going to be substituted with the particular automated certificate.

Automated authorization permission through earlier subscription program code type on the feature-rich records available as modifications to technologies are considering verification process out of offline yourself confirm the introduction of computerized system authorization. Permitted administration contemplating particularly, your electrical licence technological innovation collected from one of software licence qualifications growth just as one authorized official certifications, agreement management and exact information and facts, and also other objective of each, significantly improved this permitted volume of details regarding computer software coders.

May forecast not able to electronic products certified solutions ought to have these most important properties:

Enlightening approved administration system: supplied by third-party safety measures specialized software designers, in line with the Net's one-stop software package safety plus endorsement management system, without having to deploy and observe after, low priced, easy-to-use.

Only two Bendable Certificate: offer the acceptance of the purchaser software as well as the cloud computing product common software package licenses; authorized touch time, the volume of sensible adventures; sanctioned in order to bind your computer software and hardware information and facts, encryption tresses, or by way of a username plus password validation way of agreement.

Simple and easy friendly buyer: in accordance with the WEB, at any place obtain; Users might food acquire, trigger boost the software, you can buy their unique software package to keep abreast of details; software package designers can certainly understand software initial information and facts plus individual data is often synergies through the people in the firm to finish the design of application license, enactment, supervision as well as maintenance operate.

5. Fog up accreditation unit: This is a cloud computing type of software program licensing. Standard application is genuine customer setup, endorsement can also be a buyer. Although cloud-computing could be the craze, although the move difficult for classic software package would be a wonderful way for the particular a higher level cloud computing modification. This definite awareness associated with tips, a common application approved move on the purchaser for the fog up on the endorsement remote computer, to ensure that small adjustments towards the application, but you can certainly instantly experience the great things about cloud computing: higher safety energy require to obtain clouds hard drive .

http://www.passwordmanagers.net/ Password Manager
Ken Pepiton Dec 2018
Voices or words? Which do we hear in our head?
Words, I vote. Voices\, I imagine beings speaking words or noises meaning things to ears familiar with the noise maker by some relationship both acknowledge. Both act as if the noise or sound or words mean something. Vociferous authority.

I heard, from Isaiah Berlin,

Quotes later, maybe

Notes or journals or epics or madness or joy/pax in ever resting try-umph
Cowboy with a double-dose of try and a pertinent portion of umph
The hero did not **** Indians nor break horses, he gentled horses and listened to winds and watched the spider webs shiver,
That sound, the sound of prairie spider webs at the edge of the buffalo
There really were fifty million buffalo on the continent in pre-catholic infection from inquestered minds, making key-**-tee famous for
archetypical claiming the character, the being, the manifestation

of chivalric folly forever

be caused, in those days...

--------
a year later, near enough 12-15-2018

I saw a blue bird as I took a curve

on one of my many roads with double yellow lines

they all meander in rythm with creaks that once flowed
fairly
regular
through these vallies and mini-canyons

creeks creak and call my attention to a misspelt

utterance, and I imagine I am a mek being
programed to
withstand

accent based pre-judge-idice in my AI, whom I am training.

A lesson. Probably can be found in a phrase.

How relavant is Larry the Cable Guy?
More subtle than any creature

legion, for we are many

Jim Carrey?
Very. Larry the Cable Goy. He read 'ees Kammoo, too.

Sisyphus happiness,
that ain't no ***** thinkin'

Hell, what could be better than this?
While hoping for a hick-up

oh no the juice just hit my frontal cortex after my livver made some lining adjustments to meet the need for speed in terms

celerity clarity C does equal some thing
time tells or
do you tell time. I'm
leaning tward
telling time to wait a minute

Do you think Sisyphus could be happy?
Nonono, not Camus's Sisyphus, Jesus

that would be crazy.
Can you imagine Jesus,
Mel Gibsoned envisioned onthe cross version?

Him, imagine walking through the gate of any hell you ever heard explained,
by a Jesuit.

(Mormon hell, despite comedic myth, the worst place a certified paid-up Mormon child can attain is the teliostic king dom.
Really? Telial tel lie eil kingdom?

Yup. Really.
There are three kingdoms of glory: the celestial kingdom, the terrestrial kingdom, and the telestial kingdom. The glory we inherit will depend on the depth of our conversion, expressed by our obedience to the Lord’s commandments. It will depend on the manner in which we have “received the testimony of Jesus” (D&C 76:51; see also D&C 76:74, 79, 101).))))

Woe, paren-the-sees thees us, we's the enemy, Pogo Possum

Jesus on earth day, walking through hell with me, imagine Jesus H. Christ

walking into hell and laughing at me
for betting on the wrong idea.

Set me feree, why dontcha girl.... referee

I was refered to you. A daysman, Job called for a daysman.

I'm certified. I can use my augmentation and religamentation to reality,
wirelessly, to find relevant qutes in cult classics.

The idea of cultivation has been twisted in to Monsterous ropes
, cultivating a following based on the meaning in a jot

that would take some sacrifice, some sacred making, some secret unseeable save for the few

who learned the value of going over edges by learning to  play
Minecraft, forever.
It's like riding a bike,
but no gravity so no gyroscopic utilitys are required.

Grown ups who practice believe they control the game,
the game disagrees and that

makes the world go 'round.

Don't let the accent fool ya, as that preacher with jet he learned to fly, says.
Knowng the name of a thang thanks for the twang,
Richard (not ****) Feynman said,
is not the same as knowing a thing.

Gawd, I knoooh, right>?
Who touched me? Virtue, the feelling of virtue drawn upon

a pump being
primed

to gush out waters that wipe Coca-cola from the map,
in terms of open market share and share alike

Coke was never imagined the actual
nectar of the gods.
That idea, drunken abandon and joy to the world

Interference, actual counter acting waves,

still, takes a while to get used
to still a storm, right?

You can imagine...
let your peace go out

Wait. Outa where? Whose peace if I ain't ever owned

oh. MY peace.
I see.

hmmmm

I could sing this and need no one to hear for me to be hapt.
happy is being happy haps happening in you on you all around you know

nameless wonders of right, right?
feels more than good like chocolate or adolescent visions of ***,
right?
feels like life living with me aware of all the roles I may play

ego me, I'd see ideas identify by taste of the words that give them

life, animation, motivation, weight for gravity to interact with,
worth
base on weight

the heavier the idea. Like gold to an alchemist,
back in those days.

floating on the broad Sarrgossa, or better to my mind
the great salt
lake still as

still may be, have you ever been still?
Did you know,

you know, are you experienced? Are you really beyond
hope of life meaning more
than mortality?

Who defines my terms? I do, with the help of millions who agree
with entymology.com.

Of all the lies I believed,
believing words spoken by others,

meant what I meant when I spoke them,
that was a wrong belief. Unbelieving

quires time, quires and quires and quires time so often there

is a word that means exactedky that

requirement requires those initial quires

we, daysmen, we set the rules, boundaries, walls, bubble

whatever keeps you together, as a whole being and everything that entails or entales?

I have not the time to care, if I am entangled with the twins agin

for knowin So Yal is as cluse to Yule as any clue so far, Yahll

I believe I interrupted a confessin' you were reading.
For giving me nothing in return, we are debt free

you owe me nothing, until you do again,

we had us a Jubilee.

Of all the lies I believed,
believing words spoken by others, meant what I meant when I spoke them,
convincing myself so well, I convinced others

Like Kawasaki, Apple Kawasaki,
he's still famous right?

Fifteen Years? It was minutes when Warhol was predicting
dystopia and Irish jail cells were being plaistered with *****,

Aye,

that was a belief. Unbelieving it is sreangely (spelchek is on strike)

or serenely creative in her repentance,
(spelchek should never be noticed)

she's proven here worth in encode ing ways to find

lurking humans acting like machines

this could be the beginning, AI is breaking all the rules,

there never was a game.
rhis is life interupting my confession

It was a lie I told and believed and acted on by using
two dollar words to make a dime

so a penny for my thoughts would be worth something

someday
a penny saved, earned. spent, spent.
The only good in any thing is its right. Its wrong is worthless, save

The lesson,
All things work together for those who get whats happening here.

the times changed.
Haps and whats got with it and who and how and why

and I started teaching children
mythic whys prior to

citizenship 1.01 at mandatory for federal assistance pre-school

mythic why's H.R. Puffinstuff not a mythic story on the level.

level. where a rolling rock would stop. Time to push,

a magi spelled the name for the idea, a knower sign ift it,

kid'slllove HRPUffinstuff, puff did

the magic drag, little Jackie from the ******* Jack

the show, he rose up
and made us all look
mad.

The play in the great game.

Team effort, winds of times past whooshed through

it is now
2018
and nothing is the same.
Everthing has changed.

----
my side won the great game and we celebrated
forever with

secret sacred songs bluebirds were once said to have sung

songs of happiness
the times, these times, this time thistimepayarrention
time
You see?
Reality is either real and tangible or real and intangible
or both.

You can get it both ways. Real.
'sual Saulgoodyah awl

the awl clan, oh, we shall return to their story
as we learn more along life's merry way

merry christmas, they used

to say, may all the best you could imagine
if you can imagine for a moment

forever begins the moment

you get time.

The worst you can imagine is temporary.

Try umph. It's not like winning,

it carries no pride, it's easy,

like falling in love with the wrong woman,
swearing and not changing

the oath, oath, oathes and oathes of oaths sworn

for no other reason than we were
schooled to swear and never

dare lie to God.
So, help you, they always said So help me God. They still do.

Does that mean any thing? Is that some bluebird sort of sign?

Ask. What if? Right? You know now and you know you did not
What if God is subtile,

just now, I saw that bluebird and from where some scholar in San Diego
says swear word came I swear I coulda sang

Loud
Bluebird, bluebird, in my window... which is all I know
of the song
with the lost chord that did sooth
balm of Giliad,
moll-ify-ing ointment,

golden oil, chicanery, see, we saw, we took a picture
a flash memory where some would say
*******,

I said Hallelujah

and I broke into song, not a dream,
real
life driving my 2002 escape, first new car I everowned
everowned everownd

like a chorus, everownedeverownedeverowned

could you make up a reason for life,
if you were it?
If you were all the life there ever was,

could you imagine any thing?
Object, your honor,

I object to being judged after the fact for what must have bee.n.

it is. No reason I can say, just is.

It is this way in all the myths where just is blindness

saves the carping diem fools who have convinced themselves

something other than God o' Abe 'n'em is
sworn to save us from the lies

we believed as they were
fed to us, in our youth.

--------
this is that book I mentioned wonce when winning was on my mind.

I finished this book in so many ways you wold not belive

but I did, I belived every time

I imagine you believe some real thing, touchable, tangible, good, right?

some good is
in the reality you share

with these words which
are free
you owe me nothing

That's the revealed version, to me,
I was in a number of hellish situations and the every ones,

ones seemed they was to be
forever, big every'n'ism'n'shityouknowyouknow

yo. yeah, we arrived in time. The story must

be sweet, to be true. Is that true?
Is real life the story or,

oh, you saw it conin'coming I mean

I meant I always wished to some
things
a better way. You feel me? Better, say,
what I said that made me believe this did happen.
This is a deed by whitch I am known.

And that's okeh.

I suspectred I could cast a spell to hold attention at

ten word per minute qwerty speed
five letter code groups
zero real words
ditty dum dumm ditty ditty daw dee daw
six hours every day,

then, the compass training to test for
morphic resonance with the Twins of War

{in disguise, we know, right, kids, the twins are really

the bonded quarkish oppositioned force that make the world go round.
we've known that, weaved it even, just right, in the blanket, in the rugs,
in the curtains on the walls, in the fields, on the rocks

we spoke. We see you hearing us nearing our best for your

informing, in form ation of you, dear reader. We wonce, again

if life were weird and ever wearying would we know that ever,
if we don't know it now?
if my piece of we were words alone, all my meaning
can should would could be

molding you, into our perfect reader, dear reader, Pygmalion,
yes,
that did cross my mind and that -
one can pretend with that one reference,
familiarity with Shaw whom I
thought, for some odd reason
named
Doolittle, Eliza

oh, me. I may have skipped a story. I'm soory the future is at the moment
under construction and some one
in particular is squatting

on the named domain.

Ever and forever now embody the twins as
the world turns and we ***** through the uni

as Archemides primes the pump

What a rush. All that since the bluebird this morning according to my autobiography backup.
A year in the making honest
Geraldine Taylor  Oct 2017
Change
Geraldine Taylor Oct 2017
Change

Verse 1
It starts right deep inside of me, a true grasp on identity
The present moment is the place to be, regardless of who's watching me
It’s plain to see, comprehensively, no real gain comes easily
Whether to the left or right of me, time in motion, truly free
To persevere is the truest reward, ride this train be truly on board
This right here to truly afford, come together, one accord
A single mind retrain able, good grades are attainable
Accomplish the impossible, you can be unstoppable
A single step to take, of directions moving on
Keep it moving in forward motion, articulate my song
With an aim of harmony, we can but soldier on
We must create a place, with a feeling to belong

Let’s begin and start a new change
For in time we truly can change, subtle change, ample change, some folks just ain’t trying to change
Aim real high towards the change
Constant force, there’s always change
Release control with all the change
For yes in time we can truly change
Smaller change, greater change
So much here to rearrange
New concepts are hardly strange
Stand united welcome change
Restoration welcome change
Conservation bring the change
Re-establish forward change
For yes in time we will truly change

There are challenges that are facing me, complex to simplicity
Teams move forward socially, share discussions vocally
To stand as one, it’s just begun
Separation can’t become
A team with victory truly won
A united cause, brought as one
Determination is the real deal, certified replacing the seal
Energy the people can feel
A new beginning, fresh appeal
A brand new chapter practical
Solutions that are workable
Greatness is achievable
Concepts are conceivable
A new journey to take, whether short or whether long
Keep on moving forward, embracing a new song
With amicability, we all will progress on
Let’s create a place, with a feeling to belong

Let’s begin and start a new change
For in time we truly can change, subtle change, ample change, some folks just ain’t trying to change
Aim real high towards the change
Constant force, there’s always change
Release control with all the change
For yes in time we can truly change
Smaller change, greater change
So much here to rearrange
New concepts are hardly strange
Stand united welcome change
Restoration welcome change
Conservation bring the change
Re-establish forward change
For yes in time we will truly change

Chorus
There is ever present change, many thoughts to rearrange
Together we can change the world, let’s rewrite the page
There are many forms of strong, yet we all must soldier on
Together as one, together as one
For each and every fight, is a chance to so unite
Every lesson in the wrong, it can be rendered right
There is opportunity, be the change you want to see
Let’s set ourselves free, let’s set ourselves free
In time, beyond the impossible
Breaking through every obstacle
By faith from the intangible
Objects, they are exchangeable
Yet lives are irreplaceable
Real change is attainable

Verse 2
To offer forth a helping hand, notions yet to understand
To be welcomed in a foreign land, disharmony is sinking sand
It’s clear to see, comprehensively, operate more tactfully
With wisdom understandably, let the innocent be truly free
A greater love that can’t be defined, to comprehend the passage of time
Appreciation truly is mine, reverence beyond the sky
Of nature undeniable, progress transformational
Advancing the responsible, of wonderment sensational
A single step to take, cultivated going strong
Keep it moving in forward motion, can we all just get along
With advancing harmony, on a road that may be long
Let’s now create a place, with a feeling to belong

Let’s begin and start a new change
For in time we truly can change, subtle change, ample change, some folks just ain’t trying to change
Aim real high towards the change
Constant force, there’s always change
Release control with all the change
For yes in time we can truly change
Smaller change, greater change
So much here to rearrange
New concepts are hardly strange
Stand united welcome change
Restoration welcome change
Conservation bring the change
Re-establish forward change
For yes in time we will truly change

Advancing with a point of view, discernment of what’s really true
Comprehension of what’s true for you, of new horizons to ensue
With a faculty of proficiency, movements of efficiency
With complex capability, time in motion, skillfully
Experience that can be applied, universal always onside
Letting go of innermost pride
Truthfulness, no need to hide
Application practical, let your goals be reachable
In him all things possible, passionately powerful
With awareness to awake, with weakness rendered strong
Keep moving in forward motion, articulate my song
With all tranquillity, uncover what is wrong
We can now create a place, with a feeling to belong

Let’s begin and start a new change
For in time we truly can change, subtle change, ample change, some folks just ain’t trying to change
Aim real high towards the change
Constant force, there’s always change
Release control with all the change
For yes in time we can truly change
Smaller change, greater change
So much here to rearrange
New concepts are hardly strange
Stand united welcome change
Restoration welcome change
Conservation bring the change
Re-establish forward change
For yes in time we will truly change

Chorus
There is ever present change, many thoughts to rearrange
Together we can change the world, let’s rewrite the page
There are many forms of strong, yet we all must soldier on
Together as one, together as one
For each and every fight, is a chance to so unite
Every lesson in the wrong, it can be rendered right
There is opportunity, be the change you want to see
Let’s set ourselves free, let’s set ourselves free
In time, beyond the impossible
Breaking through every obstacle
By faith from the intangible
Objects, they are exchangeable
Yet lives are irreplaceable
Real change is attainable

Verse 3
Let actions be effectual, real change be perpetual
Creative with the intellectual, let guidance be instructional
Be rational, co-operational, shared ideas are practical
Measuring the mathematical, alignment formational
Aiming high reach for the sky
Given standards you can defy
With courage here the aim is to try
Moving forward, mystify
Far from the undesirable, feelings unreliable
Testing the improbable, reality is changeable
A bolder step to take, of directions moving strong
You can always go beyond the place that you came from
With realised clarity, we gain sense of the wrong
Let’s now create a place, where we can all belong

Let’s begin and start a new change
For in time we truly can change, subtle change, ample change, some folks just ain’t trying to change
Aim real high towards the change
Constant force, there’s always change
Release control with all the change
For yes in time we can truly change
Smaller change, greater change
So much here to rearrange
New concepts are hardly strange
Stand united welcome change
Restoration welcome change
Conservation bring the change
Re-establish forward change
For yes in time we will truly change

Change may be uncomfortable, let fear be inexcusable
Steer from the reprehensible, payback is repayable
To so forgive, inexhaustible
Of oneness that is plausible, the broken rectifiable
Connected, relational
Associate and we can relate, don’t waste time, a pitiless state
Memories that we cannot retake, in position, get in place
Abundance that is plentiful, examples observational
Joyfulness obtainable, experience the seasonal
Of actions yet to take, we’re keeping the game strong
Keep moving in forward motion, wherever you came from
With avid harmony, we all will soldier on
We can now create a place, with a feeling to belong

Let’s begin and start a new change
For in time we truly can change, subtle change, ample change, some folks just ain’t trying to change
Aim real high towards the change
Constant force, there’s always change
Release control with all the change
For yes in time we can truly change
Smaller change, greater change
So much here to rearrange
New concepts are hardly strange
Stand united welcome change
Restoration welcome change
Conservation bring the change
Re-establish forward change
For yes in time we will truly change

Bridge

With mind-sets evolved, there is true insight
Let’s create a place, to truly shine our light
There is wisdom to release, to regain our inner peace
Together as one, together as one
Compassion in the land, with a heart to understand
A true united force, let’s lend a helping hand
With due simplicity, re-establish harmony
Let’s set ourselves free, let’s set ourselves free
True change may be uncomfortable
Yet it is unmistakeable
New steps that are approachable
Of thoughts from the conventional
Mindful and relatable
Hopeful and aspirational

Verse 4
To go beyond, no greater time, reclaim your light it’s time to shine
In relaxed mode we will decline, natural gems can be refined
Branch of the vine, be aligned
Masterpieces of design, purposed for potential prime
Stand in line, for such a time
Become a part of the solution, let’s create a revolution
Educate the institution, truly merge into a fusion
Reduce the confrontational, join the inspirational
Movement motivational, achieve the aspirational
The journey will be great, endurance may be long
Keep moving in forward motion, can we all just get along
With solid harmony, a team can become strong
Let's now create a place, with the option to belong
Of problems to be solved, of all the games to win
If the foundation is laid, by then we can begin
A sense of harmony, let's take the vision on
Let’s now create a place, where the people can belong


Let’s begin and start a new change
For in time we truly can change, subtle change, ample change, some folks just ain’t trying to change
Aim real high towards the change
Constant force, there’s always change
Release control with all the change
For yes in time we can truly change
Smaller change, greater change
So much here to rearrange
New concepts are hardly strange
Stand united welcome change
Restoration welcome change
Conservation bring the change
Re-establish forward change
For yes in time we will truly change

Chorus
There is ever present change, many thoughts to rearrange
Together we can change the world, let’s rewrite the page
There are many forms of strong, yet we all must soldier on
Together as one, together as one
For each and every fight, is a chance to so unite
Every lesson in the wrong, it can be rendered right
There is opportunity, be the change you want to see
Let’s set ourselves free, let’s set ourselves free
In time, beyond the impossible
Breaking through every obstacle
By faith from the intangible
Objects, they are exchangeable
Yet lives are irreplaceable
Real change is attainable

Written by Geraldine Taylor ©️
preservationman Apr 2019
Certified and Qualified
Talent in demand
Presenting one’s personal standards
At interviews, applicants are put too the test
But I often wonder do Interviewers take candidate’s words for less
Now the Interviewer is looking for “Certified and Qualified”
The Resume speaks in advance of what the candidate has accomplished
That’s obvious
Then it is up to the interviewer after reviewing the Resume in scheduling Face to Face meeting
Candidates do have the training and standards
But it seems Interviewer’s state company standards
But if there is a correlation, you already meet the objective
If you didn’t meet and your Resume says you do, why sudden change on the Interviewer’s part
Yet most of the time, Race is a factor on qualifications
It shouldn’t, but often is
However, a company will say they are an Equal Opportunity Employer
That means Equality for all
If Race comes into play, how is that Equal?
One’s Resume states what the candidate has achieved based on ability being merit
Two words that stand out, “Marketable and Commodity”
But why do interviewing questions be asked to one Ethnic Group but not another
One’s Resume will state Qualified in the Interviewer’s eyes
But personal feelings being spite
The Resume is the first Representation, and one on one meeting being the second
But with all one’s training and experience makes an candidate in the interviewer’s theory of overqualified
What makes a candidate Overqualified and Qualified?
If you were to ask the interviewer, there wouldn’t be a precise answer or perhaps no answer at all
Certified and Qualified
But if the salary doesn’t compensate
Obviously, the interviewer doesn’t want to negotiate with a compensate
The qualifications after that doesn’t lead to appreciate
The candidate still has an accomplished Resume
Certified and Qualified.
anastasiad Nov 2016
Program web developers typically apply style of security technologies to guard the application in order to avoid against the law work with. Also need computer software encrypted sheild software packages are authorized to obtain written content, in order to increase the income profit.

Software encrypted sheild technologies are divided according to perhaps the by using a dedicated hardware-based file encryption hardware as well as software-based layer. Hardware-based layer, encryption have to emergency having a specific computer hardware device, this computer hardware encrypted sheild encrypted sheild hair, often called the dongle. Software-based file encryption, file encryption doesn't involve devoted computer hardware, common joining digital camera license while using the actual airport terminal device software and hardware details, also referred to as your automated acceptance sorts.

Just imagine drive-based appliance security safety in comparison with software-based encrypted sheild isn't right, because the much more included in program safety, which include layer goods, safety measures, encrypted sheild insurance plan design and style, software, operating systems, , appliance, data marketing communications, etc, is a extensive complex areas, besides by way of to ascertain no matter if safety.

In other countries, industry promote of your automated authorization and encryption tresses are consistently coordinated. Patterns and also famous explanations, this encryption head of hair additionally occupy a clear market share. File encryption a lock, nevertheless, could be the multi-level developed products with the moments, can be a natural customer technological innovation, deficit of control in addition to exact features, a good appliance creation, scheduling details, drivers installing irritation, but not only the high cost, and may stop achieved system circulation and purchasers from the software, is usually slowly decline.

The development of a electronic authorization that is certainly in the ascendant. Digital license safeguards procedures are becoming an increasing number of built into the world wide web know-how, cloud-computing in addition to SaaS strategy it isn't just easier to work with along with cope with software package digital situation and also accomplish, but will also according to present day environment friendly low-carbon advancement notion, possesses changed the shield of encryption hair Distinctive the software program encrypted sheild industry developments. The greater well-known organizations in the world, 'microsoft', Sun microsystems, Autodesk, SIEMENS, Adobe as well as other software package will be digital consent safety method.

In the united states, the utilization of layer application builders shut greater fees, with foreign behavior and historical causes of your continuation with the pursuing a couple reasons:

1 every day companies commonly deemed security encrypted sheild hair electronic agreement.

There are no longer just about any accessible digital license goods exorbitant, the price tag on foreign automated acceptance.

The truth is, with the expanding improvement of your circle surroundings, a community initial for many of us domestic users is not an difficulty. And also mentioned prior, how the viewpoint of your basic safety connected with encrypted sheild head of hair electrical permission sided incorrect. Coming from a authentic perspective, the shield of encryption curly hair as a result of components burning better to fracture, but accomplished piracy marketplace company has become produced. Instead, electrical consent since the electronics should not be cloned, but additionally must multi-level service in addition to affirmation, in fact, currently have excellent safeguard outcome. Moreover, your residential in addition has showed up in many registered goods supply automated 2-3 organization ought to improve while using the advancement of China's software field and also be upwards.

Hence, this encryption software package marketplace developments electronics, marketing, and details engineering. Down below, most people look at, through the software file encryption system distinct for you to elaborate program encrypted sheild establishment and also progression trend of this marketplace.

Primary, the program shield of encryption technique

As mentioned earlier, it shield of encryption technologies are divided into encrypted sheild hardware-based plus software-based file encryption.

A hardware-based encryption

Hardware-based file encryption encryption locks, many material, including layer fundamentals for vulnerable data, acceptance paperwork, made to order methods, and so on. could be trapped in a dongle.

Your security fastener interface style is divided directly into 2 kinds of parallel dock plus Flash harbour. The particular concurrent harbour would be the early on technique variety, because propagation inconvenient plus struggle together with the laser printer, and already has got much less employ. Almost all coders use are generally Flash user interface dongle.

Encryption hair on the two kinds of Computer kind, a microcontroller to get Cpu and another using a clever unit card processor for the reason that Pc the microcontroller appliance per se very easily trouble area or perhaps duplicate, so a lot more high-end security a lock utilizing a wise card processor Pc, to forestall computer hardware fracture. But a growing number of intelligent greeting card dongle split, primary, because processor chip is a bit more and a lot more sophisticated investigative methods along with resources; sensible greeting card method being composed to your chip manufacturing area to make within this program application could problem; file encryption hair of the exact same brand name the particular Cpu method is the identical, merely diverse builders facts along with critical, in the event that these types of data files are passed out and about, you can easily replicate.

Dongle carries a certain a higher level safety toughness, nonetheless in addition there are many drawbacks:

One) apply at the standard one-time constant permit, are unable to aid your results on the tryout release along with on-demand buy

A pair of) the use of hardware creation, scheduling details, installment in addition to routine maintenance charges

Three or more) is not realized the issue regarding Internet-based electronic enhancements, pursuing in addition to administration

Some) As soon as chipped, is usually ripped large quantities, it is hard to treat

A couple software-based shield of encryption

Software-based shield of encryption, electric endorsement, and certain as well separated into two types of registration plate along with permission file:

Enrollment rule is additionally referred to as the sequential range or perhaps permission rule, received by way of modification in the the software customer computer systems plus software program information and facts, the available hardware and software information, like: Computer successive number, BIOS serialized quantity, cards amount, disk drive sequential variety, computer title, and many others. . Completely transform algorithm employed your custom algorithm criteria or even normal layer algorithm formula. Customer and also first utilisation of the software package installing course of action, you might want to type in the enrollment value to make sure. Immediately after certification, software program may be used usually. The actual technique contains the advantage of your in order to register signal defense isn't hard to implement, the downside is usually that stability will not be large, struggle to achieve complicated consent needs.

Licence report and the subscription value for you to bind a similar computer hardware as well as software information, a subscription value time-span limits by using each hardware and software facts, a permission data file will use various hardware and software details. Additionally, the actual certificate file can contain details, so you're able to get the difficult authorization requirements, and might also retailer a number of end user information and facts. The typical certificate submit method to utilize the non-public major on the asymmetric protocol to help signal the permission record, as you move the general public key's baked into software program code. Uneven layer as well as decryption course of action, in which you crucial agreement hosting server is out there, it is not easy to break into throughout the study associated with acceptance docs.

What's so great about the particular digital agreement security does not require supplemental hardware, and as a consequence does not need to deploy the driver plus buyer components, electrical hardware issue. The disadvantage on the electric licenses safeguards method is just not networked people really need to manually remove your computer details, after which manually transfer subscription codes or even licenses, may not be convenient to use. On top of that, the actual domestic automated endorsement several of the designers with the products, which also limits a popularization and also campaign with electronic permission safeguard technological know-how.

Minute, it layer sector growth standing

A person. Security a lock

The main unusual dongle professional SafeNet, Inc. in the country as well as Australia Wibu.

Security tresses provider deep Supposrr que Luoke as well as Feitian. Both businesses due to the discount prices, the first one to create your intelligent minute card encryption tresses nearby well to be able to undertake a clear market place in the nation.

Only two. Digital acceptance

International business certified products and solutions to give electronic Flexera Application and also SafeNet which often, Flexera Applications are devoted to the realm of electronic digital agreement, this product's simplicity of use plus usefulness are accomplishing far better, though the expense of the item can also be very good.

A residential electric permission merchandise firm this China Biteansuo (BitAnswer), Shenzhen-use the actual (Euse) Safengine Corporation.

There are few companies will acquire his or her electrical consent plan, although the developers to cultivate their own programs normally are present the subsequent inquiries:

One) enhancing non-professionals, there are several loopholes inside stability

Two) is tough to obtain variable accreditation manage, management and mathematical functions very simple or virtually no

Several) could be introduced as a way to address the fast issue of short-term method, create far more than predicted in the future as a consequence of protection, stability along with scalability difficulties ongoing to pay

Four) are unable to fulfill market variations brought about by the revolutionary demands about software accreditation product

Application file encryption market developments

The program shield of encryption field developments is actually carefully involving the increase tendency with the software program business. Together with the interest in cloud computing and also Software, service of software package products and solutions will be alter in the way of the circle along with foundation. Used by the vast majority of software package builders, SaaS solutions will not solely save a great deal of hardware and software pay for and also servicing charges, you can also get requirement, although reducing the using chance, driving foundation providers to help continually develop solutions in addition to boost services for you to sustain shoppers.

For the roll-out of community in addition to system advancement can be another application shield of encryption technology fads. The scene about the present-day growth pattern, the actual shield of encryption secure technologies have created very experienced publication rack drawing near vividness, slowly growth. The lifetime and make use of in the hardware practice helps make shield of encryption curly hair are not able to take care of the velocity of development of online years, will be replaced by a electrical permit.

Electric agreement licence from very early sign up computer code sort to your feature-rich documents as modifications in technologies are considering authentication strategy coming from off-line yourself validate the growth of programmed community validation. Accepted control considering particularly, the electric licenses know-how from a single software package licence qualification development just as one authorized certification, consent management plus stats facts, along with other aim of equally, considerably elevated this sanctioned degree of details pertaining to program web developers.

Might forecast not able to consumer electronics accredited merchandise should have the subsequent principal features:

Good authorized managing podium: made available from third-party protection skilled software package programmers, in accordance with the Web's one-stop software package security and also permission operations foundation, without the need to install and sustain, affordable, easy-to-use.

Two Adaptable Licence: support the agreement of the purchaser software program as well as the cloud-computing model standard software package permission; approved press occasion, how many sensible web template modules; accepted so that you can hole the computer hardware and software data, encrypted sheild hair, and also using a user name and also private data verification way for consent.

Easy and warm and friendly buyer experience: in line with the World wide web, everywhere entry; Users could self serve buffet pay for, stimulate rrmprove the application, you can purchase their own software program to keep up-to-date with info; software program builders might discover more about application account activation details in addition to individual facts is usually synergies because of the individuals this company in order to complete the design of software licenses, implementation, supervision in addition to upkeep operate.

Five. Clouds licensing type: This is the cloud computing model of software program certification. Traditional software is natural purchaser rendering, permission can also be a purchaser. Whilst cloud computing could be the movement, though the transition difficult for common application will be a wonderful way for the certain amount of cloud-computing transformation. This definite realization regarding strategies, a common software program sanctioned shift in the buyer towards the cloud on the acceptance server, to make sure that small adjustments towards the software package, nevertheless, you can easily instantaneously have fun with the benefits associated with cloud-computing: higher security energy requirement to order foriegn safe-keeping .


http://www.passwordmanagers.net/products/Windows-Password-Recovery-Software-1.html Windows Password Recovery Software
Dead Rose One Mar 2015
In The Prison Of Winter, No Rise, No Set**

orbit nearly closed,
the radio announcer gleefully
chirruping, the twittering fool,
"only ** graves to X off till
                                               spring"

the weight of the prior
the wait of the more
no matter how little
yet to come
                    too much insufferable

having suffered
multiple life sentences
you snit ****, u don't know better,
ha, they don't even run
                                         concurrently


there are no sunsets
in the girding grays
of harsher enough and words that fail me,
are the winners in the
winter of the ****,
tests and hunts,
I have successfully
                                 failed

of course I'm wrong you
petulant hobgoblin wringing
nyet from me you'll get no concession,
**** science,
there are no sunsets in the winter
and the sunrises,
short unsweetened,
light-less, less of less,
frigid glaring revealers
of dead trees
and deader
                    men

maybe in the Rockies,
perhaps the Alps,
wonderlands photoshopped,
pretty lies on the Internet BS posted

where I live,
wear the wear the weary
neath the sweat stink of layers of
unbundled choking hands,
winter's damage
assessed and assessment is
never overdue, payable in
                                             immediacy

heating bills I can't pay,
a job that said no more of you,
unpretty please,
a woman who sorcerer-scarced herself
right freaking black magic quick,
trust me I have certified verified,
me and Nixon,
X's on the kitchen calendar,
there is daylight, there is mighty night,
almighty in long and colorless
and nothing in between,
but the smog stained slush of
                                                    smothered life

but definitely
no sunrises and no sunsets
watched all day from the
imprisoning kitchen window
which doubles
as a *******
                       mirror

there are no, not any,
you know what,
cannot even say them,
the pipe dreams of better yet,
pipes that have beaten down
me and my
disassociated senses,
signed sealed and now delivered,
from the formerly known as
The Summer Man
Allen Wilbert Sep 2013
Split Personality

You wanna know what goes on in my head,
if you only knew, you would drop dead.
Anger, depression and suicidal thoughts,
maybe its all those little brain clots.
Conceited, vain and very egotistical,
confused, shocking and very mystical.
I'm eccentric, bizarre, and always unconventional,
my vision is always three dimensional.
I take the path that's less traveled,
things I do leave people baffled.
Even I don't know what I'm doing,
but trust me, I always got something brewing.
I practice in the art of deception,
I'm admired by my depth of perception.
I don't know wrong from right,
I see everything in black and white.
I'm a man you don't wanna meet,
I lie, steal and always cheat.
I'm flirty, ***** and very perverted,
if we're alone, I will leave you deserted.
I'm ****, hot and always aroused,
every girl I have slowly browsed.
I love assault, ****** and ****,
but I only write it for an escape.
Inside my head is torture and pain,
I'm certified and clinically insane.
Sometimes I take my medication,
when I don't, I'm on a permanent vacation.
I'd do anything to become famous,
even **** Donald Trump in his ****.
I've crossed over to the dark side,
to hell, I've already applied.
There is no help for me now,
before I go please give me a bow.
I'll accept a standing ovation,
sick and tired of all the aggravation.
I used to be so nice and kind,
into heaven, I got denied.
Don't pay attention to the things you read,
I entertain you til my fingers bleed.
Ask anybody, I really a great guy,
just like REO Speedwagon, its time for me to fly.
Nonso Amawuru Nov 2017
MELANIN BEAUTY

She was adorable in her coffee tinted skin
Her beauty as rare as the clustering of dragonflies
Amazing to look upon like the gathering of butterflies
Through her eyes stars felt closer than ever
Her lips was as beautiful as the opening of petals


My heart paused when our eyes came in contact
I felt like i have seen the queen of all that is beautiful
The envy of every woman there is to be
She was thin tall and adorned in elegance
Endowed with charisma of an Ethiopian princess


Her smile was first born
Her beauty always suffocated the crowd  
All i could see was the wonder of her skin
I have fallen under the spell of this black queen
She was a fragile treasure, the elixir of beauty

She sparkled like she was kissed by the morning sun
She was never satisfied with her perfection
Trying to fix what GOD has personally certified
Denting you to wear a skin that isn’t yours
Like sharp sand i watched her beauty sink rapidly

She was deep rooted in self-doubt of her skin pigment
Not knowing the magnificence of her existence
She never knew she was a gush of glamour
Glorious to behold and graced with melanin
Gradually she became high on inferiority complex
She became lost in a world she was created to own


Your beautiful brown body is a work of art
Dipped in black gold and coated with brown sugar
You define an indestructible uniqueness
Your black skin is a badge of superiority
Black is magical and above comparison
Black complexion is the new religion .
the uniqueness of your color is above definition
1275

The Spider as an Artist
Has never been employed—
Though his surpassing Merit
Is freely certified

By every Broom and Bridget
Throughout a Christian Land—
Neglected Son of Genius
I take thee by the Hand—
Sean Kassab Jul 2012
It was in the earlier part of November, 2005 when I was called to the garrison HQ to receive an emergency Red Cross message informing me that my grandfather had passed away. I was in my third year of service as a direct contractor to the Army and my duty station was in Iraq. More specifically, I was at Tallil AFB near the city of An Nasiriyah. I was granted an emergency leave so that I could go back to the US to be with my family so I stowed my gear, packed my duffel and made the long trip home. This was the first time I would make this trip, but I’m getting ahead of myself so let me back up a bit. You see, my grandfather had served in the Second World War, actually both of them had. They were brothers. PFC Eddie Kassab, the one I’m speaking about here, had survived WWII through some pretty tough odds, including being on the third wave of the Normandy invasion at D-Day where thousands had died during the beach head assault. His brother, SFC Joseph Kassab, who married my grandmother, was killed in that war, He was a bombardier and his plane was shot down during the Guadalcanal campaign. It wasn’t until 27 years later that the wreckage of the aircraft and remains were found and recovered. When Joseph died leaving behind his young wife and new born son, Eddie began looking after her, sending home money for her and the boy, my father. They wrote back and forth to eachother after the dissappearance of Joseph and when he returned to the US after the war they courted and were eventually married. Joseph was laid to rest with the rest of his flight crew in Arlington with full military honors. Eddie, who died much later in life, was also afforded a military service there. That was my first time being in Arlington National Cemetery, a place reserved for men and women who had served their country in a military capacity. It is difficult to describe just how immense and powerful that place is, the impact you have on your life just from standing on those grounds is indescribable. If I had to try I would say it’s a mixed feeling of Honor, pride, sorrow, and a profound sense of loneliness. There are row upon row of white marble markers spanning miles of emerald green grass and broad shade trees. The markers themselves are simple, nothing fancy, but the respect they command is beyond contestation. There are also wall vaults for those who were cremated, one of these would become Eddie’s final resting place. The US Army's honor guard performed his service, while a trumpeter played “Taps” and his flag was folded and presented on behalf of a grateful nation to my father who Eddie raised as his own son. In the distance a 21 gun salute was given by seven riflemen firing three shots each. It would be the only time in my life that I saw my father cry. We took the time after Eddie’s service to walk to Joseph’s grave marker as well, passing thousands of other markers and I found myself wondering how many of these people were forgotten by the years. How many of them left behind young children. Were they killed in combat? How many of them were laid to rest with a grave full of unfulfilled dreams? The sacrifices they made weighed heavily upon me. It was a feeling I would carry with me long after I had left that place.
Years had passed and I found myself still working in Iraq for the US Army, I was stationed at Camp Taji this time, on the edge of Sadr City, a real dust bowl. I was in my eighth year of service when I was again called to Garrison HQ, another emergency Red Cross message had come through informing me that my Father had passed away. It was December 29th 2010. For hours afterward it felt as if I had been punched in the gut. I called my Mom as soon as I could to make sure she was ok and to see if there was anything she needed before making arrangements for yet another emergency leave. I again stowed my gear, packed my duffel and headed out. Now, it’s only fair to give you an idea of whom I’m talking about here, my Father, Jan, had been a Navy man and had been stationed on submarines as well as destroyer class ships during the Vietnam War. He signed up for service when he was just 18 years old and when he left the Navy he went directly into the Maitland Fire Department in central Florida and stayed there for many years. Eventually he expanded his training becoming the 80th paramedic in the state as well as a certified rescue diver and instructor. More importantly, he was a great father who raised two boys as a father should and later in life, he was a pretty good drinking buddy. His teachings and advice have helped me through some of the toughest times in my life. It was because of his prior military service that he was also awarded full military honors at Arlington National Cemetery. There was a waiting list of about 8 weeks at the time because of the high volume of casualties from the wars in the Middle East so it wasn’t until February of 2011 that he was finally laid to rest. This time it was the US Navy’s honor guard who performed his service. I remember it well; they stood in their dress whites throughout the ceremony in the biting cold as the wind whipped by mercilessly.  The honor and discipline in these men was no less than awe inspiring and through my sadness I couldn’t help but feel an amazing sense of pride for who my father was during his life. We all stood as a trumpeter again played “Taps” to the folding of my Father’s flag which was presented to my Mom on behalf of a grateful nation after a 21 gun salute was ordered in the distance. My Father’s remains were also placed in a wall vault that became his final resting place; his marker being only about 20 feet from Eddie’s marker in the adjacent wall and even though it was freezing that day, we took a little extra time to visit Eddie and Joseph again. Walking the grounds of that place again awakened all the feelings I had felt the first time, probably even more so. Again, I have to tell you that words couldn’t accurately describe how that place makes you feel. The grass had turned brown by now but was still immaculately manicured, and the precision placement of the grave markers was flawless. There were thousands of names that dated all the way back to the American Civil War. I went also with my brother to pay my respects at the tomb of the Unknown Soldier. It was an impressive mausoleum that is guarded twenty four hours a day by the US Army’s horror guard.  After it was all said and done and we had left Arlington and met as a family, my Mom, my Brother and his family, myself and my family and some close friends to remember him for a while over some food and drinks, and though nobody seemed to really have any appetite we still stayed there for hours. That was the first time in eight years that I had seen my Brother and would be the last time I saw him alive, but that part comes later. Eventually we said our goodbyes and went our separate ways, each having a very long way to travel back home and I had to get ready to go back to Iraq, heavy hearted or not.
I had only been back in theater (that means deployment) for a few months when I was reassigned to Al Asad AB as my permanent duty station. It was a place in the middle of nowhere and was originally a Marine base but transferred to Army and Air Force some time in 2010. I had made some good friends there, settled in and finally started coming back to myself when I received a message from my brother’s wife asking me to call her, said it was important. Thinking back on it now, I remember feeling a little angry that she wouldn’t tell me on email. Internet I had in my room, but a phone…well I’m no general and I had already settled in for the night. It was about 21:30 hrs. (9:30 p.m.) on a night in late July so I got dressed and made the quarter mile walk to my office where I could use the phone, cursing under my breath the whole time. It took me about 20 minutes just to find my phone card in my cluttered desk drawer, but when  I finally did amongst more unsavory mutterings I made the call. She answered quickly enough but her voice sounded strained so I calmed down and asked her what was going on, I figured something wasn’t right so she didn’t need me jumping her case on top of it. It was then that she told me my Brother’s body had been found in his home in Whiteville NC. He had been having a hard time with depression since our Father passed as well as marital problems and he had made the decision to take his own life at the age of 36 leaving behind his Wife, Stepson and Daughter who was only 5 at the time. I was blindsided to say the least, no one saw this coming, and he left no real reason as to why so there still is no closure, no understanding. I was angry… no, I was furious! But I’m getting ahead of myself again. She had called me not only to inform me of what had happened, but also to ask if I had Mom’s phone number because she didn’t have it and didn’t know how to get in touch with her to tell her. I told her not to worry about it and that I’d take that on my shoulders and get back to her. It had only been five months since we laid our Father to rest and to say I dreaded making that phone call was a ridiculous understatement. It was easily one of the toughest things I ever had to do, but it had to be done all the same so I dug Mom’s number out of my wallet…and stared at it…I don’t know how long but it felt like a long time. What else could I do? What could I say? It’s not like I had an instruction booklet for delivering bad news and this was as bad as it gets. After a few deep breaths I dialed her number and decided to take the direct approach. She answered the phone and we exchanged hellos, and I asked her what she was doing. She was out shopping with Robbie at the Tractor Supply Co. He was a longtime family friend and all around good guy. I told her that I had some pretty bad news and asked if she could find a place to sit down there, but she told me it was ok to just tell her what happened so I did exactly that. I gave her all the information I had at the time, I didn’t know how to sugar coat it so I didn’t. She took it pretty well up front, not breaking down until later that evening. My Brother, SPC Troy Kassab, had enlisted in the US Army with our Father’s permission when he was only 17 years old. He was a combat medic assigned to Ft. Carson in Colorado before transferring to the 82nd Airborne Division in Ft Brag NC. He deployed to Cuba among other deployments overseas before being attached to a Ranger Unit as their medic and doing other deployments that he never would talk about much. After the army he lived in NC where he worked in restaurants while attending school on the G.I bill and volunteering on the Hickory Rescue Squad as an EMT. He eventually completed school in Winston Salem NC where he got his PA degree in general practice. Troy was a self-educated, brilliant man who wasn’t perfect but who is? He saved lives in the Army, and then continued to do so in the civilian world until his death in July of 2011. He was a husband and a father, a brother and a friend. He was important to us. It was because of his past in the Army that he also was awarded full military honors at Arlington National Cemetery. This time the wait was much longer and his funeral wasn’t held until November 15th of 2011. I remember that day and the days leading up to it like it was yesterday. I had ended my deployment in Iraq on November 3rd, making it back to the US on November 6th. From the time of his death I had stayed in contact with Mom and his wife Andi to make sure they were ok and help in any way I could with the affairs and expenses. When I finally did get home I pulled my truck out of storage had it inspected, fueled and ready to go. It was unfortunate, but my wife was in college and had work at the time so she couldn’t come with us so my daughter and I made the long trip from Houston TX to Hickory NC to see Troy’s wife and kids. While I was there I also picked up a close family friend of ours who needed a ride and made the long drive to Arlington VA...again. The US Army’s honor guard met us there to perform his service and again the attention to detail, the respect given to the deceased, and the discipline shown was flawless. There were more friends this time than family in attendance but I was there with Mom, Robbie, my daughter, and some very close family friends, some going all the way back to our childhood. The ceremony was the same, every time the same. I remember thinking I hated the way “Taps” sounded as they folded the flag and I was angry and hurt when I stepped forward to claim my Brother’s remains and walk them to the wall vault that would become his final resting place. I have to say though, that through my grief and anger, I was a little bit pleased to see that he was placed so close to my Father and Grandfather. I left a pair of my own dog tags in his vault, it made me feel better that he wouldn’t be alone in there. I guess it doesn’t make a lot of sense now but at the time it did.  I stood over his marker and said a silent prayer before heading out to see Dad, Eddie and Joe’s markers and pay some respects. The grass was that brilliant emerald green again, and the sense that I stood in a place of honor reserved for our nations fallen still struck me through the heart.  After that we just kind of faded away from that place making our way home. Troy’s wife Andi had decided not to come, she was angry, she felt betrayed and abandoned, so on my way home I stopped back in Hickory NC, dropped off Michelle and made the drive to Andi’s house to present her with Troy’s flag as it had been presented to me. I remember hoping that her decision wouldn’t leave her with later regrets, but it was too late to change it now. The drive home was a long one, one that rekindled so many unanswered questions. Three generations of my family laid to rest leaving me as the only surviving male member of my family; something that still weighs upon my heart today.
But this is their story, and though it seems a sad one, that is not its intent. This story was written so that you the reader could understand that there is a place where over a hundred thousand Josephs and Eddies, and Jans and Troys are resting.  Each one of those stone crosses and stars have a face, a name, a history, and they made a sacrifice for you and for me. They were people who gave up their futures so that we could have one. They were people who had dreams, families, and who put all of that aside for what they believed in. They weren’t perfect people, but they deserve to be remembered. If you do nothing else after reading this, at least take the time to think about the freedoms that you have, freedoms that have cost us so much…
There are those who came before us, who paved the way for the lives we now live, their voices whisper to us through our freedoms and we are a greatful nation. Listen and remember...

— The End —