Submit your work, meet writers and drop the ads. Become a member
anastasiad Dec 2016
Software program designers ordinarily apply certain types of layer technological know-how to shield their software to avoid illegitimate apply. In addition need software layer software is permitted to obtain articles, to be able to boost product sales profit.

Software package encryption technology is split in accordance with whether or not the by using a devoted hardware-based encrypted sheild hardware as well as software-based security. Hardware-based layer, layer have to bind having a focused hardware unit, the particular electronics shield of encryption layer head of hair, typically referred to as the dongle. Software-based layer, encryption does not need focused electronics, typical executed digital camera permission while using the your fatal unit hardware and software data, also referred to as this electronic digital endorsement styles.

Simply consider drive-based electronics encryption stability when compared with software-based shield of encryption will not be suitable, as the more linked to program security, like encrypted sheild products and solutions, stability, encrypted sheild plan style, software, systems, , equipment, details marketing and sales communications, and the like, is really a detailed technological spots, not alone by a to discover whether protection.

Far away, the market industry promote of the digital permission along with security tresses are evenly coordinated. Behavior and also fantastic factors, the actual layer hair likewise enjoy a certain share of the market. File encryption hair, however, will be the network produced merchandise in the instances, can be a pure consumer technology, insufficient operations and also record capabilities, the inclusion of appliance manufacturing, strategic planning, driver installation annoyance, but not only the high cost, and might stop obtained multilevel submission and sales of your computer software, is definitely gradually diminish.

Enhancing the electronic acceptance that is certainly while in the ascendant. Electrical certificate protection approaches are getting to be progressively more included in the Internet technology, cloud computing and also SaaS thought is not just easier to make use of along with cope with computer software electric situation and be able to accomplish, but according to present day natural low-carbon improvement strategy, has got supplanted the encryption curly hair Outstanding software program encryption market trends. The more well-known businesses on the planet, Microsoft, Sun microsystems, Autodesk, SIEMENS, Adobe and various computer software are electronic consent safeguards function.

In the nation, using file encryption software package coders fasten greater premiums, along with international routines and also historic causes of the actual continuation with the next 2 reasons:

One particular every day producers typically regarded security encrypted sheild a lock electronic digital authorization.

There's not just about any readily available electronic digital licence products and solutions too big, the asking price of foreign electronic digital permission.

In reality, while using the rising betterment of your multi-level surroundings, your system triggering for the majority of home end users 's no trouble. And even brought up previously, which the point of view from the safety of layer head of hair electric permission on the sides completely wrong. From your reasonable mindset, this file encryption hair as a result of computer hardware copying much easier to crack, but accomplished piracy business sequence has been made. In its place, electronic digital endorsement because appliance is not replicated, but in addition should system arousal plus approval, in reality, have good safety outcome. Additionally, your every day has showed up in some accredited goods give electric 2-3 enterprise will have to improve while using growth of China's software package sector and grow up.

As a result, your layer computer software market styles hardware, web 2 ., and details technologies. Below, we speak about, in the application encryption approach specific to be able to detailed application encrypted sheild establishment plus progress craze of the marketplace.

Very first, the software encryption approach

As mentioned previously, it encrypted sheild technologies are divided into security hardware-based as well as software-based security.

Your hardware-based shield of encryption

Hardware-based encryption shield of encryption locks, many important info, like shield of encryption secrets to vulnerable information, consent paperwork, tailor made sets of rules, etcetera. can be stored in this dongle.

The layer fastener screen variety is split in to 2 kinds of synchronised slot and also Flash interface. This simultaneous port could be the very early technique type, because the propagation troublesome plus clash while using the printer's, and after this has less apply. A lot of builders employ tend to be USB slot dongle.

File encryption hair from the two kinds of CPU form, the microcontroller to get Pc and another with a clever minute card processor for the reason that Pc a microcontroller computer hardware by itself conveniently trouble area or content, therefore an increasing number of high-end file encryption a lock employing a intelligent credit card chips Central processing unit, to stop hardware break. Although a growing number of clever card dongle crack, initially, because processor might be more and even more leading-edge analytic techniques and devices; sensible card program to be written to the chips manufacturing unit to make during this time method may possibly trickle; encrypted sheild tresses of the identical manufacturer your Processor process is the same, merely various designers facts as well as major, in case most of these records are passed out there, you can easily clone.

Dongle features a specific level of security power, but you can also find a number of drawbacks:

One) apply at the regular one-time never ending license, can't assist in the achievements of your trial model along with on-demand invest in

3) the presence of electronics generation, logistics, assembly as well as upkeep charges

Three) is not achieved the issue with Internet-based electronic digital improvements, tracking along with control

Several) Once broke, may be burned huge, it is sometimes complicated to remedy

A pair of software-based encryption

Software-based encrypted sheild, digital acceptance, and certain in addition separated into home equity loans number plate along with licenses document:

In order to register code can be referred to as successive number or consent computer code, acquired using a alteration in the the program end user computer systems along with program facts, possible software and hardware facts, including: Cpu serial number, BIOS sequential amount, greeting card amount, harddisk sequential number, computer system brand, etc. . Completely transform formula made use of your customized protocol or maybe conventional shield of encryption algorithm formula. Customer as well as primary utilisation of the computer software installment practice, you might want to type in the enrollment value to confirm. Following verification, it can be employed typically. The particular strategy has got the good thing about this subscription computer code defense is easy to use, the downside is always that security is not really higher, not able to attain complicated endorsement demands.

Permission submit as well as the signing up code in order to situation the same computers plus software information, simply a registration signal period confines utilization of both software and hardware information, a permission record can use numerous hardware and software info. Also, the actual permission report can contain more info, to help you obtain the difficult agreement demands, and may perhaps retail outlet several customer facts. The average permission report way is to implement the private key in the asymmetric algorithm to hint your certificate data file, while the general public secret is embedded in the application value. Asymmetric shield of encryption plus understanding course of action, the private computer essential consent hosting server exists, it is hard to compromise from the investigation regarding endorsement paperwork.

Some great benefits of this electric endorsement safeguard doesn't require further electronics, and for that reason doesn't have to mount the motive force as well as buyer elements, electronic digital hardware issue. The disadvantage from the automated certificate safety mode just isn't networked buyers really need to hand remove your computer information, and then personally significance registration constraints or even permission, is not very easy to use. Additionally, the particular domestic electronic digital acceptance a few of the programmers from the product or service, that also limits your popularization and promotion connected with electric permit safeguard technology.

Subsequent, it encrypted sheild field advancement status

A single. File encryption curly hair

The main unusual dongle professional SafeNet, Corporation. in the usa in addition to Germany Wibu.

Security head of hair service deeply Supposrr que Luoke and also Feitian. The 2 main organizations due to the affordable prices, the first person to introduce the actual good minute card shield of encryption curly hair nearby perfectly so that you can enjoy some market place in the nation.

A pair of. Electric permission

Unfamiliar company certified merchandise to supply electronic digital Flexera Software and also SafeNet which will, Flexera Software program is focused entirely on the joy of digital permission, the actual device's ease of use along with features are doing superior, though the valuation on the item is additionally quite high.

This home-based electrical authorization goods enterprise a Beijing Biteansuo (BitAnswer), Shenzhen-use this (Euse) Safengine Organization.

There are only a few companies will acquire their very own electronic digital consent structure, even so the builders to cultivate their own plans commonly occur this inquiries:

One particular) the introduction of non-professionals, there are numerous loopholes while in the security

A pair of) is actually difficult to realize accommodating accreditation control, management and also precise functions simple or maybe simply no

Three) are often unveiled to be able to address the particular fast problem connected with short-term method, create far more than predicted in the foreseeable future as a result of protection, balance and also scalability challenges continued to get

Several) can not meet up with sector variations as a result of the modern demands on program certification model

Software program security marketplace movements

The software security field developments is closely connected with the increase development with the computer software marketplace. With the rise in popularity of cloud-computing plus Software, service with application products will be change in the direction of the multilevel plus system. Used in nearly all software programmers, Software items can not only spend less a great deal of hardware and software buy plus servicing charges, you can also get demand from customers, when decreasing the use of possibility, driving program vendors in order to consistently strengthen items plus improve services to be able to sustain consumers.

To the development of system and program improvement can also be a software package encrypted sheild technologies movements. The view around the present-day growth trend, the encryption locking mechanism technologies have designed really develop fully information mill approaching vividness, slower advancement. The actual everyday living and make use of on the equipment practice creates security head of hair are not able to conserve the speed regarding advancement of the Internet period, are going to be substituted with the particular automated certificate.

Automated authorization permission through earlier subscription program code type on the feature-rich records available as modifications to technologies are considering verification process out of offline yourself confirm the introduction of computerized system authorization. Permitted administration contemplating particularly, your electrical licence technological innovation collected from one of software licence qualifications growth just as one authorized official certifications, agreement management and exact information and facts, and also other objective of each, significantly improved this permitted volume of details regarding computer software coders.

May forecast not able to electronic products certified solutions ought to have these most important properties:

Enlightening approved administration system: supplied by third-party safety measures specialized software designers, in line with the Net's one-stop software package safety plus endorsement management system, without having to deploy and observe after, low priced, easy-to-use.

Only two Bendable Certificate: offer the acceptance of the purchaser software as well as the cloud computing product common software package licenses; authorized touch time, the volume of sensible adventures; sanctioned in order to bind your computer software and hardware information and facts, encryption tresses, or by way of a username plus password validation way of agreement.

Simple and easy friendly buyer: in accordance with the WEB, at any place obtain; Users might food acquire, trigger boost the software, you can buy their unique software package to keep abreast of details; software package designers can certainly understand software initial information and facts plus individual data is often synergies through the people in the firm to finish the design of application license, enactment, supervision as well as maintenance operate.

5. Fog up accreditation unit: This is a cloud computing type of software program licensing. Standard application is genuine customer setup, endorsement can also be a buyer. Although cloud-computing could be the craze, although the move difficult for classic software package would be a wonderful way for the particular a higher level cloud computing modification. This definite awareness associated with tips, a common application approved move on the purchaser for the fog up on the endorsement remote computer, to ensure that small adjustments towards the application, but you can certainly instantly experience the great things about cloud computing: higher safety energy require to obtain clouds hard drive .

http://www.passwordmanagers.net/ Password Manager
anastasiad Nov 2016
Program web developers typically apply style of security technologies to guard the application in order to avoid against the law work with. Also need computer software encrypted sheild software packages are authorized to obtain written content, in order to increase the income profit.

Software encrypted sheild technologies are divided according to perhaps the by using a dedicated hardware-based file encryption hardware as well as software-based layer. Hardware-based layer, encryption have to emergency having a specific computer hardware device, this computer hardware encrypted sheild encrypted sheild hair, often called the dongle. Software-based file encryption, file encryption doesn't involve devoted computer hardware, common joining digital camera license while using the actual airport terminal device software and hardware details, also referred to as your automated acceptance sorts.

Just imagine drive-based appliance security safety in comparison with software-based encrypted sheild isn't right, because the much more included in program safety, which include layer goods, safety measures, encrypted sheild insurance plan design and style, software, operating systems, , appliance, data marketing communications, etc, is a extensive complex areas, besides by way of to ascertain no matter if safety.

In other countries, industry promote of your automated authorization and encryption tresses are consistently coordinated. Patterns and also famous explanations, this encryption head of hair additionally occupy a clear market share. File encryption a lock, nevertheless, could be the multi-level developed products with the moments, can be a natural customer technological innovation, deficit of control in addition to exact features, a good appliance creation, scheduling details, drivers installing irritation, but not only the high cost, and may stop achieved system circulation and purchasers from the software, is usually slowly decline.

The development of a electronic authorization that is certainly in the ascendant. Digital license safeguards procedures are becoming an increasing number of built into the world wide web know-how, cloud-computing in addition to SaaS strategy it isn't just easier to work with along with cope with software package digital situation and also accomplish, but will also according to present day environment friendly low-carbon advancement notion, possesses changed the shield of encryption hair Distinctive the software program encrypted sheild industry developments. The greater well-known organizations in the world, 'microsoft', Sun microsystems, Autodesk, SIEMENS, Adobe as well as other software package will be digital consent safety method.

In the united states, the utilization of layer application builders shut greater fees, with foreign behavior and historical causes of your continuation with the pursuing a couple reasons:

1 every day companies commonly deemed security encrypted sheild hair electronic agreement.

There are no longer just about any accessible digital license goods exorbitant, the price tag on foreign automated acceptance.

The truth is, with the expanding improvement of your circle surroundings, a community initial for many of us domestic users is not an difficulty. And also mentioned prior, how the viewpoint of your basic safety connected with encrypted sheild head of hair electrical permission sided incorrect. Coming from a authentic perspective, the shield of encryption curly hair as a result of components burning better to fracture, but accomplished piracy marketplace company has become produced. Instead, electrical consent since the electronics should not be cloned, but additionally must multi-level service in addition to affirmation, in fact, currently have excellent safeguard outcome. Moreover, your residential in addition has showed up in many registered goods supply automated 2-3 organization ought to improve while using the advancement of China's software field and also be upwards.

Hence, this encryption software package marketplace developments electronics, marketing, and details engineering. Down below, most people look at, through the software file encryption system distinct for you to elaborate program encrypted sheild establishment and also progression trend of this marketplace.

Primary, the program shield of encryption technique

As mentioned earlier, it shield of encryption technologies are divided into encrypted sheild hardware-based plus software-based file encryption.

A hardware-based encryption

Hardware-based file encryption encryption locks, many material, including layer fundamentals for vulnerable data, acceptance paperwork, made to order methods, and so on. could be trapped in a dongle.

Your security fastener interface style is divided directly into 2 kinds of parallel dock plus Flash harbour. The particular concurrent harbour would be the early on technique variety, because propagation inconvenient plus struggle together with the laser printer, and already has got much less employ. Almost all coders use are generally Flash user interface dongle.

Encryption hair on the two kinds of Computer kind, a microcontroller to get Cpu and another using a clever unit card processor for the reason that Pc the microcontroller appliance per se very easily trouble area or perhaps duplicate, so a lot more high-end security a lock utilizing a wise card processor Pc, to forestall computer hardware fracture. But a growing number of intelligent greeting card dongle split, primary, because processor chip is a bit more and a lot more sophisticated investigative methods along with resources; sensible greeting card method being composed to your chip manufacturing area to make within this program application could problem; file encryption hair of the exact same brand name the particular Cpu method is the identical, merely diverse builders facts along with critical, in the event that these types of data files are passed out and about, you can easily replicate.

Dongle carries a certain a higher level safety toughness, nonetheless in addition there are many drawbacks:

One) apply at the standard one-time constant permit, are unable to aid your results on the tryout release along with on-demand buy

A pair of) the use of hardware creation, scheduling details, installment in addition to routine maintenance charges

Three or more) is not realized the issue regarding Internet-based electronic enhancements, pursuing in addition to administration

Some) As soon as chipped, is usually ripped large quantities, it is hard to treat

A couple software-based shield of encryption

Software-based shield of encryption, electric endorsement, and certain as well separated into two types of registration plate along with permission file:

Enrollment rule is additionally referred to as the sequential range or perhaps permission rule, received by way of modification in the the software customer computer systems plus software program information and facts, the available hardware and software information, like: Computer successive number, BIOS serialized quantity, cards amount, disk drive sequential variety, computer title, and many others. . Completely transform algorithm employed your custom algorithm criteria or even normal layer algorithm formula. Customer and also first utilisation of the software package installing course of action, you might want to type in the enrollment value to make sure. Immediately after certification, software program may be used usually. The actual technique contains the advantage of your in order to register signal defense isn't hard to implement, the downside is usually that stability will not be large, struggle to achieve complicated consent needs.

Licence report and the subscription value for you to bind a similar computer hardware as well as software information, a subscription value time-span limits by using each hardware and software facts, a permission data file will use various hardware and software details. Additionally, the actual certificate file can contain details, so you're able to get the difficult authorization requirements, and might also retailer a number of end user information and facts. The typical certificate submit method to utilize the non-public major on the asymmetric protocol to help signal the permission record, as you move the general public key's baked into software program code. Uneven layer as well as decryption course of action, in which you crucial agreement hosting server is out there, it is not easy to break into throughout the study associated with acceptance docs.

What's so great about the particular digital agreement security does not require supplemental hardware, and as a consequence does not need to deploy the driver plus buyer components, electrical hardware issue. The disadvantage on the electric licenses safeguards method is just not networked people really need to manually remove your computer details, after which manually transfer subscription codes or even licenses, may not be convenient to use. On top of that, the actual domestic automated endorsement several of the designers with the products, which also limits a popularization and also campaign with electronic permission safeguard technological know-how.

Minute, it layer sector growth standing

A person. Security a lock

The main unusual dongle professional SafeNet, Inc. in the country as well as Australia Wibu.

Security tresses provider deep Supposrr que Luoke as well as Feitian. Both businesses due to the discount prices, the first one to create your intelligent minute card encryption tresses nearby well to be able to undertake a clear market place in the nation.

Only two. Digital acceptance

International business certified products and solutions to give electronic Flexera Application and also SafeNet which often, Flexera Applications are devoted to the realm of electronic digital agreement, this product's simplicity of use plus usefulness are accomplishing far better, though the expense of the item can also be very good.

A residential electric permission merchandise firm this China Biteansuo (BitAnswer), Shenzhen-use the actual (Euse) Safengine Corporation.

There are few companies will acquire his or her electrical consent plan, although the developers to cultivate their own programs normally are present the subsequent inquiries:

One) enhancing non-professionals, there are several loopholes inside stability

Two) is tough to obtain variable accreditation manage, management and mathematical functions very simple or virtually no

Several) could be introduced as a way to address the fast issue of short-term method, create far more than predicted in the future as a consequence of protection, stability along with scalability difficulties ongoing to pay

Four) are unable to fulfill market variations brought about by the revolutionary demands about software accreditation product

Application file encryption market developments

The program shield of encryption field developments is actually carefully involving the increase tendency with the software program business. Together with the interest in cloud computing and also Software, service of software package products and solutions will be alter in the way of the circle along with foundation. Used by the vast majority of software package builders, SaaS solutions will not solely save a great deal of hardware and software pay for and also servicing charges, you can also get requirement, although reducing the using chance, driving foundation providers to help continually develop solutions in addition to boost services for you to sustain shoppers.

For the roll-out of community in addition to system advancement can be another application shield of encryption technology fads. The scene about the present-day growth pattern, the actual shield of encryption secure technologies have created very experienced publication rack drawing near vividness, slowly growth. The lifetime and make use of in the hardware practice helps make shield of encryption curly hair are not able to take care of the velocity of development of online years, will be replaced by a electrical permit.

Electric agreement licence from very early sign up computer code sort to your feature-rich documents as modifications in technologies are considering authentication strategy coming from off-line yourself validate the growth of programmed community validation. Accepted control considering particularly, the electric licenses know-how from a single software package licence qualification development just as one authorized certification, consent management plus stats facts, along with other aim of equally, considerably elevated this sanctioned degree of details pertaining to program web developers.

Might forecast not able to consumer electronics accredited merchandise should have the subsequent principal features:

Good authorized managing podium: made available from third-party protection skilled software package programmers, in accordance with the Web's one-stop software package security and also permission operations foundation, without the need to install and sustain, affordable, easy-to-use.

Two Adaptable Licence: support the agreement of the purchaser software program as well as the cloud-computing model standard software package permission; approved press occasion, how many sensible web template modules; accepted so that you can hole the computer hardware and software data, encrypted sheild hair, and also using a user name and also private data verification way for consent.

Easy and warm and friendly buyer experience: in line with the World wide web, everywhere entry; Users could self serve buffet pay for, stimulate rrmprove the application, you can purchase their own software program to keep up-to-date with info; software program builders might discover more about application account activation details in addition to individual facts is usually synergies because of the individuals this company in order to complete the design of software licenses, implementation, supervision in addition to upkeep operate.

Five. Clouds licensing type: This is the cloud computing model of software program certification. Traditional software is natural purchaser rendering, permission can also be a purchaser. Whilst cloud computing could be the movement, though the transition difficult for common application will be a wonderful way for the certain amount of cloud-computing transformation. This definite realization regarding strategies, a common software program sanctioned shift in the buyer towards the cloud on the acceptance server, to make sure that small adjustments towards the software package, nevertheless, you can easily instantaneously have fun with the benefits associated with cloud-computing: higher security energy requirement to order foriegn safe-keeping .


http://www.passwordmanagers.net/products/Windows-Password-Recovery-Software-1.html Windows Password Recovery Software
Miss Dan  Oct 2013
Peeling Layers
Miss Dan Oct 2013
Like an onion, I had layers.
And you peeled me away, one at a time.

One layer off.
You saw my favorites.
The food and drinks I crave for.
The wall paint I wanted for my room.
The perky dresses, nail polish, knee-high boots.
And the spot I always prefer to be- on the front seat.

One layer off.
You saw my hobbies.
The words I stitched together.
The stars that formed our zodiac sign.
The wallclimbing, badminton, volleyball.
And the guitar strings that strum our lullaby.

One layer off.
You saw my dreams.
The plane ticket to Paris.
The thrill of a bungee jump.
The candlelit dinner, fireworks, dancing fountain.
And the license as a medical physician.

One layer off.
You saw my strengths.
The smile behind the false judgements.
The tears I fought back with pride.
The temperance, confidence, adjustments.
And the self-love I have strongly magnified.

One layer off.
You saw my insecurities.
The missing dimple on my left cheek.
The pimples on my forehead.
The bitchface, fierce stare, strict walk.
And this prominently thin-but-tall body figure.

One layer off.
You saw my regrets.
The kisses I could have refused.
The friends I thought were true.
The false assumptions, unmet expectations.
And the trust I gave to the wrong person.

One layer off.
You saw my secrets.
The punches I had to take.
The bruises I covered with my sleeves.
The lies, frustrations, disappointments.
And the brokenness suppressed in my memory.

The last layer, off.
You saw through me.
The anxiousness escalating slowly.
The exposure feeling uneasy.
I felt stripped, explored, unguarded.
And in my nakedness - you had to choose:

To love or to leave me,
For who I really am.
Stephen E Yocum Sep 2016
It was my birthday,
Sixty Five years turned to grey hair.
My love and I, and two old school
friends on a breezy Fall day.

Over Tea and a lovely frosted
three layer cake, we cajoled
and joked about our age,
all turned senior citizens that year.
And yet in truth, we all agreed,
none of us had ever been as happy as then.

The cake was sliced onto china plates,
Each piece served flat on it's cut side.
I noticed something then as we all
took our first bites.

Our forks all started at the thinnest corner,
on the bottom layer's side, gradually
excavating the two lower levels of fluffy
cake, saving the best for last, the top layer
where all the sweet frosting remained.

It occurred to me then that indeed life
is like a three layer cake, the last top layer
can indeed contain the sweetest bites.
That rather than gobbling life hurriedly whole
it should be savored more like patiently eating
and enjoying a three layer cake.
It is not my birthday today but thanks
to those of you nice people for the good
BD wishes. It relates to everyone's aging.
More of a metaphorical assessment of
a universal theme. Actually, I'm a Taurus.
(If you know your signs, perhaps that explains
a lot about me.) :-) And sadly I'm well past
being 65.
Harmony  Nov 2015
Soul
Harmony Nov 2015
Animal Human
He creates
What he conceives
Once Created appears
Before him
He knows not where it came from
He believes it to be him

He who can witness
He who can reach the realm of the spirits,
Beyond all created,
Beyond all conceived,
Is not animal
But divine

Divine's realms only seen
When  creation the illusion understood
The layer of color and caste must go
The layer of status must go
The layer of religion must go
The layer of riches must go
The layer of  politics must go
For the All-encompassing Divine Needs None

All-encompassing Divine IS
Where all created a thin layer
Where color and caste thinner than thin layers
Where religion thinner than thin layer
Where riches thinner than thin layer
Where politics thinner than thin layer
Where Divine the Essence
Where Divine the Majesty
Where Divine the Immeasurable
Where Divine the Timeless
Where Divine the Stillness
Retracted Within
Rested Within
almanaK ab May 2018
******* gon’ hate on that fruit salad game
Cuz I don't want no money, I don't want no fame
Go say I’m a joke, say that I'm lame
This **** is a hobby straight outta the brain
So **** all y'all *******
All up in my britches
I think I need stitches
I know I need stitches
Down in the dirt
***** shirt
Pretty girl
Tilt a whirl
What a world
I keep in pocket
Scissors scissors
Open unlock it
By the lake
Big mistake
Hood rat hos
From the east earthquake
Third eye glowin’
Like a Force all knowin’
Like a full moon showin’
My ***** keep goin’
Wrote two rhymes in 24 hours
Spittin sweet while you gettin’ sour
Get cleaned up go take a shower
Nothin gon’ stop this inner power
**** you put out come back times three
I be on that wavy positivity
So I don't really care bout your beef w me
I'm lightin this L so humbly
Witch hunt
Sylph ****
***** mouth
Runnin’ out
Common era gotta common error
Looking for purpose
Shed a new layer
Don't it tear
No one is there
Fair is fair
Fair is fair
Shed a new layer
Shed a new layer
Fair is fair
Fair is fair
Cup up like scissors
***** I’m a wizard
Blew in like blizzard
I’m colder than winter
Fair is fair
Shed a new layer
Fair is fair
Shed a new layer
Fair is fair
Shed a new layer
Don’t let it tear
No one is there
Shed a new layer
Shed a new layer
https://soundcloud.com/almanakspeaks/shed-002
abby  Apr 2014
{layers}
abby Apr 2014
when i think back to the first punch
the nail and sting and two-week bruise
i don't think about the pain
or the sound of your fist against my ribs
i think of your face as you swung your arm
twisted and red but that was only layer one
layer two was remembering when you coached me in softball
layer three was my nine-year-old embrace
layer four was whispering, "she's your little girl."
layer five was your confusion as i grew up and became quiet
layer six hated yourself in that moment
as well as layers seven and eight
layer nine was your anger again, which caused you to hit
but layer ten was your apology
i forgave you one thousand and sixty eight times
will you ever forgive yourself?

*(a.m.c.)
singingghosts May 2016
triple layer chocolate cake (hint of coconut) with mint lime cream filling completely encased in chocolate.



WHAT YOU NEED

8oz cream cheese
1 and 1/4 stick of butter
possible 3 cups of powder sugar
2 limes
fresh mint
all purpose unbleached flour
white sugar
baking soda
Cocoa power
salt
2 eggs
coconut extract
buttermilk
vegetable oil
water
dark chocolate chips
whipping cream


I can't remember what else but I say what below in case I missed something








FILLING:
8oz cream cheese
1 stick butter
2.5 cups of powdered sugar
3 tablespoons lime juice
2 teaspoons lime zest
half handful of mint leaves

BLEND mint, lime juice & zest together. you want mint to be tiny tiny.

BEAT butter and cream cheese together. I leave them out, sometimes I heat them up to make it easier to beat.

BLEND lime mint mixture into cream cheese butter.

ADD powder sugar.

MIX all together by hand first.

get a hand mixer or beater or whatever and literally beat the **** outta that stuff. until it whips up as much as possible.

PUT it in the fridge for a few minutes. like 10. just to check how it does. if it's not a consistency like cream, beat it more and add half a cup of confectionary sugar.



CAKE MIX: (realistically you can just buy cake mix)

2 cups all purpose unbleached flour
2 cups white sugar
3/4 cup cocoa powder
2 teaspoons baking soda
1 tsp salt
2 eggs
1 cup buttermilk
1 cup vegetable oil (or any type of shortening you prefer)
1 cup water
2 teaspoon coconut extract

put all the dry ingredients into a bowl. MIX with a whisk or something. if you have sifter, use that to break up the flour. you wanna get all the dry ingredients mixed pretty well before you add wet.

ok, so flour, sugar, cocoa powder, baking soda, salt. all together. great job.

next, BEAT all the wet ingredients together NOT INCLUDING THE WATER.

you beat the eggs, buttermilk (don't replace this with regular milk), oil, and extract. once it's all blended all nice, add it to the dry and mix it together by hand.

you use an electric mixer or beater now. the reason you hand mix everything first is to avoid a bigger mess when the machine mixes because it can make the dry ingredients spread out like ****. and I hate messes. so I'm extremely **** in the kitchen.

ok now just beat it all baby. add the water slowly. a lot of people will tell you to use boiling water. you can but I don't suggest it to anyone who has never used boiling water in a batter before... so I'm not suggesting it.

it should be runny and also delicious. if it's not, uhm... oops? mine was great. you ****** up. let's continue.

GANACHE!!!!!: (wait until the cakes done AND COOLED to do this part tho!!!)

get a ***
add a bag of dark chocolate or milk chocolate whichever you want. I prefer dark chocolate while baking.
I really eye this so I'm throwing caution to the wind here and pour maybe 3/4 cup of heavy cream or whipping cream.
also, 2 tablespoons of butter. (you don't NEED the butter but I like what it does to the ganache)

ok now on low heat leave those things in the ***. mix it a little. DONT LET IT BURN. MEANING, DONT PUT IT ON HIGH HEAT. YOU WANT A SLOW MELT

Ok so. mix it until it's creamy and silky and soft. but seriously do this part at the very end.

get three 9 inch cake pans. spray, butter, coat, oil WHATEVER just grease the ******* pans.

use a measuring cup because you want each cake layer to be the same. do 1.5 cups of batter in each. if you have left over, divide it by three.

bake it at 300F for 30 minutes

don't open the door between those 30 minutes. when you do, poke middle with toothpick. if toothpick comes out clean, it's done.

let cool completely on a cooling rack.

some people cut the tops off to make the cake layer even. I **** at cutting things evenly unless it's ******* so I have my own method. I suggest cutting though. you can also cut the edges if they're crispy but I like it that way.

ok. the ganache. get a spoon and just coat the top layers of the bottom and soon to be middle layer.

you want all three layers lined up next to each other.

take the *** off the heat while you're doing this. just hold off for a moment. you come back to it.


let the ganache layers cool down. you'll know when it's cool. when this happens  get the cream and do a nice layer over the chocolate. now stack them.

it should be from the bottom up: cake, chocolate, cream, cake, chocolate, cream, cake. (try to stack in on a cooling rack)

take the rest of the cream and evenly spread it over the entire cake.

nice. the rest of the chocolate ganache? double check that it is POURABLE but also that it's NOT HOT. warm is ok but a little less than warm would be ideal.

pour. the. chocolate. over. the. entire. cake. if you can do this on a cooling rack, do it. it'll let the excess chocolate drip down. you can take a knife to spread it around nicely. I think that's it. I can't think of anything else.
st64 Apr 2013
delicate swirls
                              abstract motif
                                                             dainty spirals



I.
I see you as a wide sheet of fabric
Beautiful, paisley pattern
Highlighting your *odd
qualities
That I love, more than you could get.

How you shimmer and shine
So well.



II.
Yet, I knew not that there exists -
Very quietly bold and calmly geometric;
Another sheet beneath this visible one
A layer concealed, that only my oblivion feels.

How you shiver and hide
So well.



III.
So, as I learn and delve and discover
Burrowing passages and intense pathways
A myriad of tunnels within tunnels
Where is the real you?


How alone; thought I knew you
So well.



IV.
Am I thus lost?
Blinded so by the light in your patterns....

[said in one breath:
so, I try to brush ever lightly over artefacts of your stained existence,
ensuring I leave no trace of me...
there I go making a new layer (for me)
only to see...another layer....and yet
another....]

layer upon
         layer upon
                  layer upon
                           layer upon....
layerrrr.



V.
Into the icy face of wind, words are flung
Only, they come back...messier!

Disaster.....blast the blundering heart in dusty chokes
Love thrives not in intemperate climes.


At which point did you let your voice die?
Perhaps you hide in fear, of suffering alone....

So long.



VI.
There stands a figure in the circle of light....lonesome
We hover near the highly-charged cosmos of chance
Daring the winds to take us, off guard
To glide away on impossible parades....




S T, 28 April 2013
How many layers does one need to uncover, before learning *any* truth?

Hm, maybe should-a studied archeology way back...lol


oh, well..
Keith J Collard Apr 2013
In Japan, there was an ice cold assassin, that rose through the ranks of the Lin Kuei Clan.   Mid snow flurry, he could avoid every flake, and seize the brittle crystal without breaking it.  He could walk on snow without sinking in, japan's cold winter, is when he was unopposed and most ruthless--slaying debtee and their family.  His ice cold ego, came into contact with a shaolin warrior, who was trained to feel the cold, and never run away from it, nor get used to it, but feel the chill everytime without hardening his self.  Sub-Zero was defeated but not killed, and scorned to the Gods during a snowstorm, " I am the better, and was defeated by a lessor, I appeal to the powerful, give me the power of ice, so that no one shall adapt to my soul's chill, give me the power and my clan shall be in service to you."

Then a snow crystal fell, bigger than most, and he clutched it, and looked in his palm, the crystal was in the form of a pentagram.  The wind whispered, " The most cold and still realm of hell will be in your veins, if you partaketh of this crystal."  And the power of ice, that no man could withstand was at his disposal, and he was locked in a contract, that was unbreakable.

He rose to leader of the clan, and changed the color of the assasin uniform to the color of the cold region of hell, and he could not find the shaolin warrior who defeated him, and so slayed his mentor.
One hot day, his soldiers came back defeated, by a pearl diver, who refused to pay tribute to their mafia.  Sub-zero impaled the clan's soldiers who had their uniform in tatters--by raising jagged ice spears from hell.  The ice never thawed, and the men never fully died, but looked up at the high cieling from their bespearment to a mosaic of an icy and lonely realm-- a message to anyone who fails the clan--that you shall be pierced and preserved.  Sub-zero took the rest to pay a visit to the pearl diver who had stained the Clan's uniform with the blood color of disgrace.

The pearl diver, was in the bay diving down to the bottom for pearls.  He felt the water suddenly get cold, and swam upward to the surface, where he came in contact with the surface of the water, frozen over, and he saw the boots walking over the ice.  They were holding heads that leaked onto the clear ice underfoot and as the pearl diver struggled for air underneath, he saw the heads of his family dropped onto the ice.
Then Sub-zero kneeled down, holding his wife's head to the drowning pearl diver, and placed it on the ice, so he shall see the horrid picture as he drowned underneath.  The Clan took leave, from the bay.

The pearl diver did not fear death, but went mad, as he sank downward into oblivion, staring upward, rage took over his once good heart, and he turned away to look into the depths, shouting " Let me born again, so I shall live a life of fire, so that anyone who dares come close, shall be scolded, GOD OF REVENGE, LET ME BE BORN AGAIN."
The pearl diver breathed in the water unblinking, and his heart stopped, but still he lived as he sank reaching the bottom and there was a scorpion at his feet, and the depths spoke, " Let this scorpion sting both your eyes, and command the fire of hell, and be born again, to melt the ice."
He took the scorpion--who glowed hot in the dark depths-- and stung his eyes, his pupils went from his eyes, leaving milk swirls as his ovals of revenge.  " Now let it snip your lips and chin, so that you may breath the painfull sting of fire upon your enemies without singing your own flesh."

The scorpion greedily ate his lips, tongue and chin, giving him a mouth guard of skull.  " Now you are born again Scorpion, arise, and REVENGE."

Scorpion, screamed, no longer a human voice, but demonic, and grabbed the chain from his boat anchor, and climbed. Upon reaching the ice barrier, he touched his hands to it, and burned a hole and emerged forth.  He pulled up the chain with ease into the air from the depths, the metal barb on the end that served as an anchor, was now for impaling hearts and not the sea bottom.  He snapped his arm and the chain coiled around his arm, ready to sail out to impale and bring his enemies up to his eyes, so they can feel the painfull sting of fire up close, and see Scorpions eyes.
He walked to shore, his feet singing and melting Sub-zero's ice as he walked.
His walk was illusive, as a flickering flame, Scorpion could not be percieved directly without mesmerizing, as a fire in total darkness.

He reached shore, and found a Clan member, he harpooned him with his chain and barb, and brought him close to his face with his chained anchor, and melted the henchman's face with his hot breath.
He stripped him naked with his curved pearl knife, and donned the uniform of the Lin Kuei, ice blue, then the uniform turned yellow from his hot blood underneath, turning the uniform yellow as if it was boiled alive in a ***.  Scorpions' veins serpentined on his forearms, his muscles always a'sweat and full of blood .  The color of his revenge was yellow, mocking the blue Lin Kuei's uniform with the color of cowardice.

He tracked down Sub-Zero to his Clan hall that resembled the cold layer of hell with victims adorning his walls and floors that were pierced by ice sculpture and still a 'quarter alive staring at the cieling.  Sub-Zero felt the slight thaw of his ice, and knew the presence of Scorpion.  

Scorpion flickered from the torches that bedecked the walls, and burnt the guards throats with his hands so they crawled around uselessly.  When a clan member espied the demonic ninja, Scorpion was behind him, breathing on his neck, and the guard fell to the ground in three pieces.

Sub-Zero's throne room, had no torch, no fire, and Scorpion could only enter without his flame illusion through the front tall doors.  
" You have fought your way into my layer, just to realize it is a glacial tomb assassin," saithe Sub-Zero.

" Scorpions demonic voice echoed to him, " YOU HAVE MURDERED DOWN THE PATH OF LIFE, BUT THE PATH WAS THE THROAT OF A DRAGON, AND I AM ITS BELLY, YOUR TOMB OF STINGING ACID."

Scorpion took Sub-Zero's eye from him with his harpoon chain, and beat him mercilessly with kick and punch.  Sub-Zero's summoned ice but it only melted near Scorpions hatred.  But the water from the melt, slowed Scorpion--so it was hand to hand by their opposite powers, negating their satanicly endowed powers.  

But Sub-Zero was the creator of Scorpion, and so had the advantage.  Being beaten, and his face smashed, his nose flattened to his face, exposed rib slats, and his testicles smashed, Sub-Zero feigned mortal injury and non-defence as Scorpion walked up with his milky eyes to do his finishing move.

Sub-Zero's forearm protruded in injury from Scorpions kick before, and formed a sharp dagger, and this dagger sunk in Scorpions brain from beneath his chin.  Sub-Zero won with the treachery he knew best.  But Scorpion's body turned to hell's flames, and melted the layer completely drowning the wounded Sub-Zero, killing him, as Scorpion himself died the second death being extinguished in cold water of the clan layer.



They were sent back to hell, and forced to stand side by side of eachother, as Satan's servants of fire and ice--still donned in the Lin Kuei assassin robe,belt, and face-guard.
All of the magmatic, scolding statalactites dripped behind Scorpion who stood before the entrance to the fiery region of hell.  He stared forward with his scolding white phosphorus eyes.

Behind Sub-Zero, was the still and frozen layer.  He stood next to Scorpion, to the entrance of his own realm, with pupils bordered by ice frozen rivulets.  The proximity to eachother was their hell, and Satan was their master.  Scorpions pyscho hatred heat always attacking Sub-Zero's callous cruel cold, and vice versa, so as they never became adapted to the terms of hell and eternity.
Kendall Mallon Jul 2013
Book One


Prelude:

As Romans before them, they built the city upward—
layer ‘pon layer as the polar caps receded
layer by layer—preserving what they could, if someday
the waters may recede back into the former polar
ice caps; restoring the long inundated coastlines.


Home:

A man sat upon a tall pub stool stroking
his ginger beard while grasping a pint loosely
in his other hand. An elderly gent stood
next to him. The older gentleman noticed
that the ginger bearded man’s pint sat almost
quite near the bottom of its tulip glass.

A woman with eyes of amber and hair
as chestnut strolled through a vineyard amongst
the ripening grapes full of juice to soon
become wine. She clutched a notebook—behind (10)
thick black covers lay ideas and sketches
to bring the world to a more natural
state—balancing the wonders and the merits
of technology apace with the allure ‘n’
sanctity borne to the natural world.

When the ginger bearded man finished the
final drops of his stout, another appeared
heretofore him—courtesy owed to the elder
gentleman. “Notice dat ye got d’ mark
o’ a man accustom amid the seas,” (20)
he inferred; gesturing the black and blue
compass rose inscribed inside a ship’s wheel,
imbedded into the back of the ginger
bearded man’s weathered right hand.
                 “I have crewed
and skippered a many fine vessel, but I
am renouncing my life at sea—one final
voyage I have left inside of me:
one single terminal Irish-Atlantic
voyage t’ward home.” (30)
“Aye d’ sea can beh cold
‘nd harsh, but she enchants me heart. Ta where
are ye headed fer d’ place ye call home,
d’ere sonny boy?”
     “’tis not simply a where,
‘tis a who. Certain events have led me
to be separate from my wife. For five
eternal years I have been traveling—
waiting to be in her embrace. The force
of the Sea, she, is a cruel one. For (40)
it seams: at every tack or gybe the farther
off I am thrown from my homeward direction
to stranger and stranger lands… I have gone
to the graveyard of hell and the pearly gates
of (the so called) heaven; I have engaged
in foolhardy deals—made bets only a
gambling addict would place. All to just be
with Zara. I am homesick—Zara is my
home—it doesn’t matter where (physically)
we are located, my home is with Zara. I (50)
was advised to draw nigh the clove of Cork
and wait; wait for a man, but I was barely
given a clue as to who this man is,
only I must return him this:” the ginger
bearded man held out a dull silver pocket watch
with a frigate cut into the front cover
and two roses sharing a single stem
swirling upon themselves cut into
the back.
   “Can it be? ‘Tis meh watch dat meh (60)
fat’er gave t’ meh right before he died…
I lost it at sea many a year ago.
It left meh heartbroken—fer it was meh only
lasting mem’ry of him… Come to t’ink I
was told by a beggar in the street—I
do not remember how long ago—dat
I would happen across a man wit’ somet’ing
dear t’ meh, and I’d accomp’ny dis man
on a journey, and dis man would have upon
‘im d’ mark of a true sailor…” (70)
    “Dear elder man,
my name is Abraham; the mark you see
represents the control that I have on my
direction—thought it appears the Sea retains
some ascendancy… Yet now, it appears,
the Sea is upholding her bargain—though
a bit late... Do you, by chance, own a vessel
that can fair to Colorado?—all across
this mist’d island no skipper ‘ll uptake
my plea; they fear the sharp wrath of the Sea (80)
or (if they have no fear) simply claim my home
‘is not on their routes…’ i’tis a line I’ve
heard too often. I would’ve purchased a vessel,
but the Sea, she, has deprived me completely
of my identity and equity.”

Zara, with her rich chestnut hair sat upon
a fountain in a piazza—her half empty
heart longing to savor the hallow presence
of Abraham, and stroke his ginger beard…
Everyday she would look out at the sea (90)
whence he left…
     All encouraged her to: “forgo
further pursuit”; “he is likely deceased
by now”—his vessel (what left) scuttled amidst
the rocks of Cape Horn, yet Zara could feel
deep-seated inside her soul he is alive;
Alive (somewhere) fighting to return home.
Never would Zara leave; never would she
abandon post; she made that promise five
years ago as Abraham, ‘n’ his crew,
set out on their final voyage; and she (100)
would be ****** ere she broke her promise—a promise
of the heart—a promise of love. Abraham
said: “You are my lighthouse; your love, it, will guide
me home—keep me from danger—as long as you
remain my lighthouse, I’ll forever be
set to return home—return home to you.”

Out from Crosshaven did the old man take
steadfast Abraham en route to his home.
Grey Irish skies turned blue as they made their
way out on the Irish Sea, southwest, toward (110)
the southern end of the Appalachian Island.
The gentle biting spray of the waves breaking
over the bow and beam moistened the ginger
bearded face of Abraham; his tattooed
hands grasped the helm—his resolute stare kept him
and the old man acutely on course.
A shame,
it struck the old man, this would be the final
voyage of Abraham… he: the best crew
that the old man had ever came across; (120)
uncertain if simply the character
of Abraham or his pers’nal desire
to return home in the wake of five long
salty-cold years—a vassal to the Sea
and her changing whim. Never had the old
man seen his ship sail as fast as he did when
Abraham accorded its deck—each sail
set without flaw: easing and trimming sheets
fractions of an inch—purely to obtain
the slightest gain in speed; the display warmed (130)
the heart of the old man.
        And thus the elder
gent mused as he lightly puffed on his pipe
while sitting on the stern pulpit regarding
at Abraham’s passion to return home
(as he calls her):—maybe dis is d’ reason
d’ Sea has fought so hard, and lied, t’ keep
Abraham from returning home… Could not
bear t’ lose such fine a sailor from her
expanses—she is known t’ be quite a jealous (140)
mistress…
      But for all Abraham’s will and passion,
the old man insisted for the fellow
to rest; otherwise lack of sleep would cause
the REM fiddler to reap his debt—replace
clarity of mind with opacity.
Reluctantly stalwart Abraham gave
in and retire below deck—yet the old
man doubted the amount of rest that he
acquired in those moments out of his sight. (150)

For the days, then weeks, in the wake of their
departure from the port-island Crosshaven,
the seas were calm as open water can:
gentle azure rolling swells oscillated
and helped impel the vessel forward. The southern
craggy cape of the Appalachian
Island pierced the horizon. Like a threshold
it stood for Abraham—a major landmark;
the closest to home he had been in five
salty long years—his limbo was beginning                               (160)
to fade, his heart slowly—for the first time since
he left port in eastern Colorado—
started to feel replete again. The Great
Plains Sea—his final sea—he would not miss
the gleam of his lighthouse stalwart on shore.




Book Two

Oracle:**

Upon a beach, Abraham found himself alone—gasping
in gulps of moist air like that of a new born baby first (10)
experiencing the breathe of life; he felt as if he
would never become dry again… the salt burning his skin
as it crusted over when the water evap’rated
into the air; Abraham took the first night to rest, the
next day he set to make shelter and wait for a rescue
crew; out he stared at the crashing waves hoping for a plane
or faint form of a ship upon the horizon…days and
nights spun into an alternating display of day then
night: light then dark—light, dark, light, dark, grey, grey, grey…

Abraham (20)
gave up marking the days—realized the searches are done—
given up after looking in the wrong places (even
he did not know where he was…) the cold waves and currents took
him to a safe shore away from his ship and crew, in a
limp unconscious float…
From the trees, and what he could find on
the small  island, Abraham occupied himself with the
task of building a catamaran to rid himself of
the grey-waiting.
Out he cast his meager vessel into (30)
the battering surf; waves broke over his bows and centre
platform—each foot forward, the waves threatened to push him back
twofold… Abraham struck-beat the water with the oars he
fashioned; rising and falling with the energy of the
waves; Abraham stole brief looks back with hopes of a van’shing
shoreline—coast refused to vanish… his drenched arms grew tired;
yet he pushed on knowing he would soon be out passed the
breaking waves; then could relax and hoist sail; yet the waves grew
taller—broke with greater power… Abraham struck-beat the
water with his oars—anger welled—leading to splashes of (40)
ivory sea-froth instead of the desired progress
forward; eventually, his arms fell limp beyond the
force of will… waves tumbled him back to shore as he did the
first night upon the island…
Dejected Abraham lay
in the surf that night—the gentle ebb of the sea added
to insult, but hid the tears formed in the corner of his eyes—
salt water to salt water… the next day Abraham took
inventory of damage: the mast snapped in multiple
places, the rudders askew—the hulls and centre structure (50)
remained intact; the oars lost (or at least Abraham cared
not to search); over the next weeks he set to improve
the design and efficiency of his vessel—the first
had been hurried and that of a man desperate to leave;
the bare minimum that would suffice—he set to create
a vessel to ensure his departure from the des’late
accrue of sand and vegetation; Abraham laboured
to strengthen his body—pushing his arms further passed the
point his mind believed they could go—consuming the hearty,
protein-rich, mollusks, and small shellfish he could find inside (60)
tide pools or shallows—if lucky, larger fish that dared the
nearby reefs.
Patiently, Abraham observed the tides and
breaking water; he wanted to determine the correct
time to set off to ensure success—when the waves would not
toss him back to the beach; the day: a calm clear day—only
within few metres of soft beach did there exist any
breaking waves, and those that broke were barely a metre high;
loading provisions upon the vessel, Abraham bid
farewell to the island (out of wont for the sustenance (70)
it gave not for nostalgia) grasping his oars, he set forth
to find open sea—where the waves do not break and set you
gingerly on foreign shore(s); Abraham paddled passed the
first few breaking waves, his heart pounding with hope—he stifled
the thoughts (celebrate when the island is but a subtle
blue curve upon the horizon); as the island began
to shrink in his vision, the sky to his back grew darker…
the waves started to swell—moguls grew to hills—Abraham
stroked up and rode down; the cursèd Island refused to shrink…
if not begin to grow wider… stroke by stroke Abraham (80)
grew frustrated—stroke by stroke frustration advanced into
anger—stroke by stroke anger augmented into fiery
beating of the water!—Abraham struck and struck at the
Sea—eyes closed—white knuckles—trashing!—unsure which direction
he paddled…sky pitch-black, wind blowing on-shore Abraham
bellowed out to the Sea in inarticulate roars of:
hatefrustrationpitydesperationheartache!
Towards
Abraham’s in-linguistic roar, the sky let out a crack
of authority! a wave swept the flailing Abraham (90)
into the ocean—cool water only heated the rage
in Abraham’s mind—his half empty heart only wanted:
to sail home, become whole  again—sit under and olive
tree and stroke the chestnut hair of Zara as she drifted
off to sleep on his chest while he would whisper sweet verses
into her ear… Abraham’s rage, beyond reason, forgot
the boat and all clarity, he tried to swim away from
the cursèd island—scrambling up waves only to tumble
back with their breaking peaks—salt, the only taste in his mouth;
churning his stomach to *****; his kidney’s praying he (100)
would  not swallow anymore… his gasps stifled any curse
Abraham’s head wished to expel onto the Sea—yet she
swore she heard one final curse escape his lips! at that the
Sea tossed Abraham (head first) into his ghost-helmed vessel—
all went dark for hostile Abraham…

Contemplating back
at his rage—knowing the barbarian it makes of him,
Abraham peered into the band inscribed into his
ring-finger and saw the knot tying him to Zara—shame
at his arrogant-uncontrolled-fury sent Abraham (110)
into a meditative exile inside of his mind
(within the exile of the island…) in his mental
exile Abraham spun into deeper despair at his
two failures—even more at the prospect of failing the
vow he professed onto Zara: return home—home from this
final voyage, grow old with her on solid ground, never
to die apart and cause the pain of losing a loved one
without the closure of truly knowing the death is real,
to die by her side white, white with the purity of age…
Abraham’s destitution turned inward—his fury, the (120)
lack of control, the demon he becomes when rage surges
through his muscles; equiping him with untamed strength without
direction or self-possession—so much potential, yet
no productive way to use it… Abraham’s half-full-heart
burned, ached with passion and anguish—all desire
focused on home, his return, but the mind’s despondency
and insistent ‘what-ifs’ kept poor Abraham prostrate in
his mental cave—all his wishing for anger and vi’lence
to force his will, it did more to retain him upon the
cursèd island than bring his heart closer to fulfillment: (130)
his long awaited home…
Out of his mental exile did
Abraham’s irises dilate and contract with blinding
illumination—self-pity is not what make things happen—
it would only serve to anger Zara—nothing other
than I can be to blame for my continued absence; I
am stronger than that!—looking at the tattoo in his hand,
he remembered the reasons for the perennial brand—
the eight-spoke ship’s helm: the eight-fold-path—I must cut off my
desire for anger to be the solution and focus (140)
on the one path to Zara—the mind can push the body
further than the body believes is possible—the star:
the compass to guide me via celestial bodies
to where my heart can see the guiding beam of my lighthouse!
This is the Final Voyage epic thus far. I am converting Home into blank verse and it is taking longer than I thought to do; which is why that part is incomplete here. I also added line numbers. I changed The names as well.

— The End —