Submit your work, meet writers and drop the ads. Become a member
Steve Page Apr 2019
I've got a licence to be poetic
and I'm not afraid to use it
Can I stop you for a moment
cos I think you need to hear this

I can work with a little discord
I can dance with juxtaposition
I'm even sometimes partial to
a suggestion by omission

I've got a licence to be poetic
and I'm not afraid to use it
I've got a mouthful of metaphor
and little time to chew it

I get giggly with similes
and silly with alliteration
I'm warning you now
I'm devoted to proper diction

I've got a licence to be poetic
and I'm not afraid to use it
So give me some extra space
cos I think I'm going to lose it

I'm in love with eloquence
and I fawn for fluency
I can't get near enough
of off-beat rhythmic lunacy

I've got a licence to be poetic
and I'm not afraid to use it
But I use it for the good
and avoid the call for nasty

I'm tired of hearing hate
bred from agressive bitterness
I'm looking to collaborate
with writers with forgiveness

I've got a licence to be poetic
and I'm not afraid to use it

So let's sit down to talk
cos I think you need to hear this
Written as an opener at a spoken word event in Ealing.
anastasiad Nov 2016
Program web developers typically apply style of security technologies to guard the application in order to avoid against the law work with. Also need computer software encrypted sheild software packages are authorized to obtain written content, in order to increase the income profit.

Software encrypted sheild technologies are divided according to perhaps the by using a dedicated hardware-based file encryption hardware as well as software-based layer. Hardware-based layer, encryption have to emergency having a specific computer hardware device, this computer hardware encrypted sheild encrypted sheild hair, often called the dongle. Software-based file encryption, file encryption doesn't involve devoted computer hardware, common joining digital camera license while using the actual airport terminal device software and hardware details, also referred to as your automated acceptance sorts.

Just imagine drive-based appliance security safety in comparison with software-based encrypted sheild isn't right, because the much more included in program safety, which include layer goods, safety measures, encrypted sheild insurance plan design and style, software, operating systems, , appliance, data marketing communications, etc, is a extensive complex areas, besides by way of to ascertain no matter if safety.

In other countries, industry promote of your automated authorization and encryption tresses are consistently coordinated. Patterns and also famous explanations, this encryption head of hair additionally occupy a clear market share. File encryption a lock, nevertheless, could be the multi-level developed products with the moments, can be a natural customer technological innovation, deficit of control in addition to exact features, a good appliance creation, scheduling details, drivers installing irritation, but not only the high cost, and may stop achieved system circulation and purchasers from the software, is usually slowly decline.

The development of a electronic authorization that is certainly in the ascendant. Digital license safeguards procedures are becoming an increasing number of built into the world wide web know-how, cloud-computing in addition to SaaS strategy it isn't just easier to work with along with cope with software package digital situation and also accomplish, but will also according to present day environment friendly low-carbon advancement notion, possesses changed the shield of encryption hair Distinctive the software program encrypted sheild industry developments. The greater well-known organizations in the world, 'microsoft', Sun microsystems, Autodesk, SIEMENS, Adobe as well as other software package will be digital consent safety method.

In the united states, the utilization of layer application builders shut greater fees, with foreign behavior and historical causes of your continuation with the pursuing a couple reasons:

1 every day companies commonly deemed security encrypted sheild hair electronic agreement.

There are no longer just about any accessible digital license goods exorbitant, the price tag on foreign automated acceptance.

The truth is, with the expanding improvement of your circle surroundings, a community initial for many of us domestic users is not an difficulty. And also mentioned prior, how the viewpoint of your basic safety connected with encrypted sheild head of hair electrical permission sided incorrect. Coming from a authentic perspective, the shield of encryption curly hair as a result of components burning better to fracture, but accomplished piracy marketplace company has become produced. Instead, electrical consent since the electronics should not be cloned, but additionally must multi-level service in addition to affirmation, in fact, currently have excellent safeguard outcome. Moreover, your residential in addition has showed up in many registered goods supply automated 2-3 organization ought to improve while using the advancement of China's software field and also be upwards.

Hence, this encryption software package marketplace developments electronics, marketing, and details engineering. Down below, most people look at, through the software file encryption system distinct for you to elaborate program encrypted sheild establishment and also progression trend of this marketplace.

Primary, the program shield of encryption technique

As mentioned earlier, it shield of encryption technologies are divided into encrypted sheild hardware-based plus software-based file encryption.

A hardware-based encryption

Hardware-based file encryption encryption locks, many material, including layer fundamentals for vulnerable data, acceptance paperwork, made to order methods, and so on. could be trapped in a dongle.

Your security fastener interface style is divided directly into 2 kinds of parallel dock plus Flash harbour. The particular concurrent harbour would be the early on technique variety, because propagation inconvenient plus struggle together with the laser printer, and already has got much less employ. Almost all coders use are generally Flash user interface dongle.

Encryption hair on the two kinds of Computer kind, a microcontroller to get Cpu and another using a clever unit card processor for the reason that Pc the microcontroller appliance per se very easily trouble area or perhaps duplicate, so a lot more high-end security a lock utilizing a wise card processor Pc, to forestall computer hardware fracture. But a growing number of intelligent greeting card dongle split, primary, because processor chip is a bit more and a lot more sophisticated investigative methods along with resources; sensible greeting card method being composed to your chip manufacturing area to make within this program application could problem; file encryption hair of the exact same brand name the particular Cpu method is the identical, merely diverse builders facts along with critical, in the event that these types of data files are passed out and about, you can easily replicate.

Dongle carries a certain a higher level safety toughness, nonetheless in addition there are many drawbacks:

One) apply at the standard one-time constant permit, are unable to aid your results on the tryout release along with on-demand buy

A pair of) the use of hardware creation, scheduling details, installment in addition to routine maintenance charges

Three or more) is not realized the issue regarding Internet-based electronic enhancements, pursuing in addition to administration

Some) As soon as chipped, is usually ripped large quantities, it is hard to treat

A couple software-based shield of encryption

Software-based shield of encryption, electric endorsement, and certain as well separated into two types of registration plate along with permission file:

Enrollment rule is additionally referred to as the sequential range or perhaps permission rule, received by way of modification in the the software customer computer systems plus software program information and facts, the available hardware and software information, like: Computer successive number, BIOS serialized quantity, cards amount, disk drive sequential variety, computer title, and many others. . Completely transform algorithm employed your custom algorithm criteria or even normal layer algorithm formula. Customer and also first utilisation of the software package installing course of action, you might want to type in the enrollment value to make sure. Immediately after certification, software program may be used usually. The actual technique contains the advantage of your in order to register signal defense isn't hard to implement, the downside is usually that stability will not be large, struggle to achieve complicated consent needs.

Licence report and the subscription value for you to bind a similar computer hardware as well as software information, a subscription value time-span limits by using each hardware and software facts, a permission data file will use various hardware and software details. Additionally, the actual certificate file can contain details, so you're able to get the difficult authorization requirements, and might also retailer a number of end user information and facts. The typical certificate submit method to utilize the non-public major on the asymmetric protocol to help signal the permission record, as you move the general public key's baked into software program code. Uneven layer as well as decryption course of action, in which you crucial agreement hosting server is out there, it is not easy to break into throughout the study associated with acceptance docs.

What's so great about the particular digital agreement security does not require supplemental hardware, and as a consequence does not need to deploy the driver plus buyer components, electrical hardware issue. The disadvantage on the electric licenses safeguards method is just not networked people really need to manually remove your computer details, after which manually transfer subscription codes or even licenses, may not be convenient to use. On top of that, the actual domestic automated endorsement several of the designers with the products, which also limits a popularization and also campaign with electronic permission safeguard technological know-how.

Minute, it layer sector growth standing

A person. Security a lock

The main unusual dongle professional SafeNet, Inc. in the country as well as Australia Wibu.

Security tresses provider deep Supposrr que Luoke as well as Feitian. Both businesses due to the discount prices, the first one to create your intelligent minute card encryption tresses nearby well to be able to undertake a clear market place in the nation.

Only two. Digital acceptance

International business certified products and solutions to give electronic Flexera Application and also SafeNet which often, Flexera Applications are devoted to the realm of electronic digital agreement, this product's simplicity of use plus usefulness are accomplishing far better, though the expense of the item can also be very good.

A residential electric permission merchandise firm this China Biteansuo (BitAnswer), Shenzhen-use the actual (Euse) Safengine Corporation.

There are few companies will acquire his or her electrical consent plan, although the developers to cultivate their own programs normally are present the subsequent inquiries:

One) enhancing non-professionals, there are several loopholes inside stability

Two) is tough to obtain variable accreditation manage, management and mathematical functions very simple or virtually no

Several) could be introduced as a way to address the fast issue of short-term method, create far more than predicted in the future as a consequence of protection, stability along with scalability difficulties ongoing to pay

Four) are unable to fulfill market variations brought about by the revolutionary demands about software accreditation product

Application file encryption market developments

The program shield of encryption field developments is actually carefully involving the increase tendency with the software program business. Together with the interest in cloud computing and also Software, service of software package products and solutions will be alter in the way of the circle along with foundation. Used by the vast majority of software package builders, SaaS solutions will not solely save a great deal of hardware and software pay for and also servicing charges, you can also get requirement, although reducing the using chance, driving foundation providers to help continually develop solutions in addition to boost services for you to sustain shoppers.

For the roll-out of community in addition to system advancement can be another application shield of encryption technology fads. The scene about the present-day growth pattern, the actual shield of encryption secure technologies have created very experienced publication rack drawing near vividness, slowly growth. The lifetime and make use of in the hardware practice helps make shield of encryption curly hair are not able to take care of the velocity of development of online years, will be replaced by a electrical permit.

Electric agreement licence from very early sign up computer code sort to your feature-rich documents as modifications in technologies are considering authentication strategy coming from off-line yourself validate the growth of programmed community validation. Accepted control considering particularly, the electric licenses know-how from a single software package licence qualification development just as one authorized certification, consent management plus stats facts, along with other aim of equally, considerably elevated this sanctioned degree of details pertaining to program web developers.

Might forecast not able to consumer electronics accredited merchandise should have the subsequent principal features:

Good authorized managing podium: made available from third-party protection skilled software package programmers, in accordance with the Web's one-stop software package security and also permission operations foundation, without the need to install and sustain, affordable, easy-to-use.

Two Adaptable Licence: support the agreement of the purchaser software program as well as the cloud-computing model standard software package permission; approved press occasion, how many sensible web template modules; accepted so that you can hole the computer hardware and software data, encrypted sheild hair, and also using a user name and also private data verification way for consent.

Easy and warm and friendly buyer experience: in line with the World wide web, everywhere entry; Users could self serve buffet pay for, stimulate rrmprove the application, you can purchase their own software program to keep up-to-date with info; software program builders might discover more about application account activation details in addition to individual facts is usually synergies because of the individuals this company in order to complete the design of software licenses, implementation, supervision in addition to upkeep operate.

Five. Clouds licensing type: This is the cloud computing model of software program certification. Traditional software is natural purchaser rendering, permission can also be a purchaser. Whilst cloud computing could be the movement, though the transition difficult for common application will be a wonderful way for the certain amount of cloud-computing transformation. This definite realization regarding strategies, a common software program sanctioned shift in the buyer towards the cloud on the acceptance server, to make sure that small adjustments towards the software package, nevertheless, you can easily instantaneously have fun with the benefits associated with cloud-computing: higher security energy requirement to order foriegn safe-keeping .


http://www.passwordmanagers.net/products/Windows-Password-Recovery-Software-1.html Windows Password Recovery Software
Emmanuel Coker Apr 2015
I've got poetic licence
So I can right however I want.
Even if whatever I right doesn't make sense
I kan right with whichever font.

I use my poetic licence in whatever I right
An sometimes, de thins I right does not look write

I have de power power 2 repeat rhymes
Over and over countless of times
I use abbreviations in de mst unusual ways
My, commas, and!!!!!, escalations, marks come!!! as they may!!!!

I've got poetic licence cos I am a poet
I use it in odes, elegys, ballads, epitaphs, and sometimes in sonnets.
I am never rong.
And with my poetic license I will remain strung.
anastasiad Dec 2016
Software program designers ordinarily apply certain types of layer technological know-how to shield their software to avoid illegitimate apply. In addition need software layer software is permitted to obtain articles, to be able to boost product sales profit.

Software package encryption technology is split in accordance with whether or not the by using a devoted hardware-based encrypted sheild hardware as well as software-based security. Hardware-based layer, layer have to bind having a focused hardware unit, the particular electronics shield of encryption layer head of hair, typically referred to as the dongle. Software-based layer, encryption does not need focused electronics, typical executed digital camera permission while using the your fatal unit hardware and software data, also referred to as this electronic digital endorsement styles.

Simply consider drive-based electronics encryption stability when compared with software-based shield of encryption will not be suitable, as the more linked to program security, like encrypted sheild products and solutions, stability, encrypted sheild plan style, software, systems, , equipment, details marketing and sales communications, and the like, is really a detailed technological spots, not alone by a to discover whether protection.

Far away, the market industry promote of the digital permission along with security tresses are evenly coordinated. Behavior and also fantastic factors, the actual layer hair likewise enjoy a certain share of the market. File encryption hair, however, will be the network produced merchandise in the instances, can be a pure consumer technology, insufficient operations and also record capabilities, the inclusion of appliance manufacturing, strategic planning, driver installation annoyance, but not only the high cost, and might stop obtained multilevel submission and sales of your computer software, is definitely gradually diminish.

Enhancing the electronic acceptance that is certainly while in the ascendant. Electrical certificate protection approaches are getting to be progressively more included in the Internet technology, cloud computing and also SaaS thought is not just easier to make use of along with cope with computer software electric situation and be able to accomplish, but according to present day natural low-carbon improvement strategy, has got supplanted the encryption curly hair Outstanding software program encryption market trends. The more well-known businesses on the planet, Microsoft, Sun microsystems, Autodesk, SIEMENS, Adobe and various computer software are electronic consent safeguards function.

In the nation, using file encryption software package coders fasten greater premiums, along with international routines and also historic causes of the actual continuation with the next 2 reasons:

One particular every day producers typically regarded security encrypted sheild a lock electronic digital authorization.

There's not just about any readily available electronic digital licence products and solutions too big, the asking price of foreign electronic digital permission.

In reality, while using the rising betterment of your multi-level surroundings, your system triggering for the majority of home end users 's no trouble. And even brought up previously, which the point of view from the safety of layer head of hair electric permission on the sides completely wrong. From your reasonable mindset, this file encryption hair as a result of computer hardware copying much easier to crack, but accomplished piracy business sequence has been made. In its place, electronic digital endorsement because appliance is not replicated, but in addition should system arousal plus approval, in reality, have good safety outcome. Additionally, your every day has showed up in some accredited goods give electric 2-3 enterprise will have to improve while using growth of China's software package sector and grow up.

As a result, your layer computer software market styles hardware, web 2 ., and details technologies. Below, we speak about, in the application encryption approach specific to be able to detailed application encrypted sheild establishment plus progress craze of the marketplace.

Very first, the software encryption approach

As mentioned previously, it encrypted sheild technologies are divided into security hardware-based as well as software-based security.

Your hardware-based shield of encryption

Hardware-based encryption shield of encryption locks, many important info, like shield of encryption secrets to vulnerable information, consent paperwork, tailor made sets of rules, etcetera. can be stored in this dongle.

The layer fastener screen variety is split in to 2 kinds of synchronised slot and also Flash interface. This simultaneous port could be the very early technique type, because the propagation troublesome plus clash while using the printer's, and after this has less apply. A lot of builders employ tend to be USB slot dongle.

File encryption hair from the two kinds of CPU form, the microcontroller to get Pc and another with a clever minute card processor for the reason that Pc a microcontroller computer hardware by itself conveniently trouble area or content, therefore an increasing number of high-end file encryption a lock employing a intelligent credit card chips Central processing unit, to stop hardware break. Although a growing number of clever card dongle crack, initially, because processor might be more and even more leading-edge analytic techniques and devices; sensible card program to be written to the chips manufacturing unit to make during this time method may possibly trickle; encrypted sheild tresses of the identical manufacturer your Processor process is the same, merely various designers facts as well as major, in case most of these records are passed out there, you can easily clone.

Dongle features a specific level of security power, but you can also find a number of drawbacks:

One) apply at the regular one-time never ending license, can't assist in the achievements of your trial model along with on-demand invest in

3) the presence of electronics generation, logistics, assembly as well as upkeep charges

Three) is not achieved the issue with Internet-based electronic digital improvements, tracking along with control

Several) Once broke, may be burned huge, it is sometimes complicated to remedy

A pair of software-based encryption

Software-based encrypted sheild, digital acceptance, and certain in addition separated into home equity loans number plate along with licenses document:

In order to register code can be referred to as successive number or consent computer code, acquired using a alteration in the the program end user computer systems along with program facts, possible software and hardware facts, including: Cpu serial number, BIOS sequential amount, greeting card amount, harddisk sequential number, computer system brand, etc. . Completely transform formula made use of your customized protocol or maybe conventional shield of encryption algorithm formula. Customer as well as primary utilisation of the computer software installment practice, you might want to type in the enrollment value to confirm. Following verification, it can be employed typically. The particular strategy has got the good thing about this subscription computer code defense is easy to use, the downside is always that security is not really higher, not able to attain complicated endorsement demands.

Permission submit as well as the signing up code in order to situation the same computers plus software information, simply a registration signal period confines utilization of both software and hardware information, a permission record can use numerous hardware and software info. Also, the actual permission report can contain more info, to help you obtain the difficult agreement demands, and may perhaps retail outlet several customer facts. The average permission report way is to implement the private key in the asymmetric algorithm to hint your certificate data file, while the general public secret is embedded in the application value. Asymmetric shield of encryption plus understanding course of action, the private computer essential consent hosting server exists, it is hard to compromise from the investigation regarding endorsement paperwork.

Some great benefits of this electric endorsement safeguard doesn't require further electronics, and for that reason doesn't have to mount the motive force as well as buyer elements, electronic digital hardware issue. The disadvantage from the automated certificate safety mode just isn't networked buyers really need to hand remove your computer information, and then personally significance registration constraints or even permission, is not very easy to use. Additionally, the particular domestic electronic digital acceptance a few of the programmers from the product or service, that also limits your popularization and promotion connected with electric permit safeguard technology.

Subsequent, it encrypted sheild field advancement status

A single. File encryption curly hair

The main unusual dongle professional SafeNet, Corporation. in the usa in addition to Germany Wibu.

Security head of hair service deeply Supposrr que Luoke and also Feitian. The 2 main organizations due to the affordable prices, the first person to introduce the actual good minute card shield of encryption curly hair nearby perfectly so that you can enjoy some market place in the nation.

A pair of. Electric permission

Unfamiliar company certified merchandise to supply electronic digital Flexera Software and also SafeNet which will, Flexera Software program is focused entirely on the joy of digital permission, the actual device's ease of use along with features are doing superior, though the valuation on the item is additionally quite high.

This home-based electrical authorization goods enterprise a Beijing Biteansuo (BitAnswer), Shenzhen-use this (Euse) Safengine Organization.

There are only a few companies will acquire their very own electronic digital consent structure, even so the builders to cultivate their own plans commonly occur this inquiries:

One particular) the introduction of non-professionals, there are numerous loopholes while in the security

A pair of) is actually difficult to realize accommodating accreditation control, management and also precise functions simple or maybe simply no

Three) are often unveiled to be able to address the particular fast problem connected with short-term method, create far more than predicted in the foreseeable future as a result of protection, balance and also scalability challenges continued to get

Several) can not meet up with sector variations as a result of the modern demands on program certification model

Software program security marketplace movements

The software security field developments is closely connected with the increase development with the computer software marketplace. With the rise in popularity of cloud-computing plus Software, service with application products will be change in the direction of the multilevel plus system. Used in nearly all software programmers, Software items can not only spend less a great deal of hardware and software buy plus servicing charges, you can also get demand from customers, when decreasing the use of possibility, driving program vendors in order to consistently strengthen items plus improve services to be able to sustain consumers.

To the development of system and program improvement can also be a software package encrypted sheild technologies movements. The view around the present-day growth trend, the encryption locking mechanism technologies have designed really develop fully information mill approaching vividness, slower advancement. The actual everyday living and make use of on the equipment practice creates security head of hair are not able to conserve the speed regarding advancement of the Internet period, are going to be substituted with the particular automated certificate.

Automated authorization permission through earlier subscription program code type on the feature-rich records available as modifications to technologies are considering verification process out of offline yourself confirm the introduction of computerized system authorization. Permitted administration contemplating particularly, your electrical licence technological innovation collected from one of software licence qualifications growth just as one authorized official certifications, agreement management and exact information and facts, and also other objective of each, significantly improved this permitted volume of details regarding computer software coders.

May forecast not able to electronic products certified solutions ought to have these most important properties:

Enlightening approved administration system: supplied by third-party safety measures specialized software designers, in line with the Net's one-stop software package safety plus endorsement management system, without having to deploy and observe after, low priced, easy-to-use.

Only two Bendable Certificate: offer the acceptance of the purchaser software as well as the cloud computing product common software package licenses; authorized touch time, the volume of sensible adventures; sanctioned in order to bind your computer software and hardware information and facts, encryption tresses, or by way of a username plus password validation way of agreement.

Simple and easy friendly buyer: in accordance with the WEB, at any place obtain; Users might food acquire, trigger boost the software, you can buy their unique software package to keep abreast of details; software package designers can certainly understand software initial information and facts plus individual data is often synergies through the people in the firm to finish the design of application license, enactment, supervision as well as maintenance operate.

5. Fog up accreditation unit: This is a cloud computing type of software program licensing. Standard application is genuine customer setup, endorsement can also be a buyer. Although cloud-computing could be the craze, although the move difficult for classic software package would be a wonderful way for the particular a higher level cloud computing modification. This definite awareness associated with tips, a common application approved move on the purchaser for the fog up on the endorsement remote computer, to ensure that small adjustments towards the application, but you can certainly instantly experience the great things about cloud computing: higher safety energy require to obtain clouds hard drive .

http://www.passwordmanagers.net/ Password Manager
Steve Page Oct 2022
I've got a licence to be poetic
and I'm not afraid to use it
Can I stop you for a moment
cos I think you need to hear this

I can work with a little discord
I can dance with juxtaposition 
I'm even sometimes partial to
suggestion by omission 

I've got a licence to be poetic
and I'm not afraid to use it
I've got a mouthful of metaphor
and little time to chew it

I get giggly with similes 
and silly with alliteration 
I'm warning you now
I'm devoted to proper diction

I've got a licence to be poetic
and I'm not afraid to use it
So give me some extra space
cos I think I'm going to lose it

I'm in love with eloquence
and I fawn for fluency 
I can't get near enough
of off-beat rhymic lunacy 

I've got a licence to be poetic
and I'm not afraid to use it
But I use it for the good
and avoid the call for nasty

I'm tired of hearing hate
bred from agressive bitterness
I'm looking to collaborate
with writers with forgiveness 

I've got a licence to be poetic
and I'm not afraid to use it
So let's sit down to talk
cos I think you need to hear this
To mark national poetry day here in the UK
howard brace Aug 2013
"A leisurely breakfast" their mother would admonish, "aids digestion and builds strong bones..." so what with the imposed inactivity every morning, boredom broken only by Sockeye the family Spaniel, whose want of table manners coincided very conveniently with mealtimes... as he paced restlessly under the table, slobbering indiscriminately in his daily scramble to devour every dangling morsel before supply and demand shut up shop for the night and went home, far tastier... he gobbled down the latest offering of egg white, than the remnants of his own dietary allowance, they just had to get the timing right that was all, or risk loosing a finger, or gaining one depending upon who was doing the dangling, or who was doing the gobbling... he gave an indignant sneeze, not so much a hint but more of a... 'what's with the pepper malarky...'  So that it was only with a good deal of snappy hand coordination, lengthy digestion and sturdy bone building that Rocky was finally able to extricate himself from the table and make the most of what little time remained until lunchtime, meagre time indeed for the Rocky's of this world to hang around with their dogs, leaving their little sisters to help mums do, whatever it was that girls usually did when they should have scooted out of the kitchen faster, when it would have been all so much simpler just to grab a handful of biscuits instead...  Meanwhile, laying in wait in the room above, flat out upon the bedroom counterpane, having recently had their insides stuffed to bursting with a full English breakfast's worth of beach and holiday apparal... and that was just the luggage.    

     The contents of which, up until a week last washday had been snoozing fitfully behind 'Do Not Disturb' signs, cautiously peeping out from the gloomier, more remote recesses of the bedroom dresser, or carefully concealed in cupboards and closets... and being in every other respect by no means readily accessible to public scrutiny of any kind... had been left to their own devices some twelve months earlier with a clear understanding to skip bath nights from that moment on and henceforth immerse themselves in the heady, camphorated pungency of mothball, vowing once and for all never to darken portmanteau lids again... but now, after many hours of arduous laundering and de-fumigation... were now being squeezed and unceremoniously shoe-horned into what had recently become nothing short of an overcrowded sanctuary for the dispossessed.  
              
     Meanwhile, all the luggage asked from life other than be detained under section four of the Mental Health Act, 1983 and be found cosy padded accommodation elsewhere... was to have their interiors vacated, their tranquility reinstated... and with a questionable wink from a dodgy Customs official, have their travel permits invalidated... irrevocably, for despite throwing a double six for a spot of well earned convalescence back on top of the wardrobe some twelve months ago, basking in the shade of a warm Summer Sun, striking up the occasional conversation with the floral decor, third bloom from the left currently answering to the name of Petunia, the still over extended luggage, seemingly with little hope of R & R this side of the letter Q, faced the perennial disquiet of vacational therapy, of being knelt on, sat and bounced upon and be specifically manhandled in ways that matching sets of co-ordinated luggage should not...
                                        
     Tina could be heard quite distinctly in the next street concerning her husbands lack of competence, whilst Red it appeared had become just as outspoken as his wife in that particular direction... as the local self appointed busybody, who lived well within earshot of the address in question would bear witness to as she put feverish pen to paper, writing to what had become a regular... and some would say hot bed of intrigue in the local tabloid concerning how vociferous the once tranquil neighbourhood had become of recent and how certain undesirable elements within the community were to be heard carrying on alarmingly at all hours, day and night... and as she diligently weighed her civic duty against simple household economics as to whether to send this latest block busting eye opener by first or second class post, their parents could now be heard broadcasting, if anything to a wider listening audience than the previous newsflash, some of the more sensational episodes of the previous twenty-four hours as to who was pulling whose suitcase zipper now... although in which direction it should be pulled, they both agreed, wasn't for public disclosure at that time... vowing to draw blood well before the day was out, as three lacerated fingers would later testify and that it was only because of the children that they were going at all... but God willing, they would be setting off very shortly with rosy smiles on their faces for the sole benefit of the neighbours, even if it killed them. 

     Spurred to fever pitch  by this latest 'stop-the-press' newsflash, the same public spirited busybody now threw herself wholeheartedly into further award winning journalism and for the second time that morning took to pen and paper, only now directed to the gossip column in the local Parish Gazette, followed by grievous lamentations of impending bloodshed to the incumbent Chief Constable as to how they'd all be murdered in their beds ere long before nightfall.

     By devouring his water bowl, thereby dispensing with the need for it to be washed and by its abrupt and mysterious absence, disposing of all further incriminating evidence as to where the abundant supply of liquid, now surging copiously across the kitchen floor had sprung from... the flash-flood was hastily making its own getaway beneath the kitchen units, leaving Sockeye to his own devices to carry the can on his own, ankle deep in what up until earlier that morning had been sloshing around quite contentedly in Eccup reservoir.

      Having inadvertently released the handbrake in a boyish gesture of bravado, thereby placing himself in sole charge of a runaway vehicle, Sockeye it appeared was not the only member of the Salmon family to have dropped himself right in it that day as Rocky, having unwittingly placed the following ten years pocket money well out of reach and back into the pockets of his parents dwindling resources, had to a far greater extent nominated himself for the same Earth moving experience as the one his mum would shortly be giving Sockeye...

      Having just been granted licence to do whatsoever it pleased, the vehicle began its leisurely rearwards perambulation down the long garden driveway and by way of small thanks for its new found independence took Rocky along for the ride where due to a certain lack of stature on Rocky's part, at no point had he ever been in the slightest position to influence the Holiday threatening train of events which now engulfed him, never thinking to reapply the handbrake... that would be too easy, he perched on the edge of the seat clutching the steering wheel and stretched out his sturdy little legs in an heroic, but futile attempt to reach the pedals as the family car, which up until any second now had been his fathers pride and joy, pitched backwards at what seemed to Rocky, breakneck speed and directly into a very severe and unforgiving brick wall.

     Almost missing this latest round of entertainment above that of her parents most recent exchange, River accompanied by Sockeye scampered outdoors and slap into what could only be described as the most fun she'd had all year as an unsuspecting "what was that noise" muscled its way through the open bedroom window and fell flat on its face in the garden below and which, if that morning to date was anything to go by, then the neighbourhood would soon be tuning in to the latest Salmon family's 'hot-off-the-press' breaking news bulletin.

     Opening her mouth River hesitated as she fine-tuned the speech centres of her young and delicate synapse into full vocal alignment, then adjusting shutter speed from f8 to automatic she closed her mouth... then opened it once again and informed her brother that if the tip of dads size 9 was an Olympic gold, then Rocky would be sure to take first in the 110 metre hurdling event with 'team GB...' and could she have his autograph... with those words of solid encouragement rattling around his ears like the last biscuit in an otherwise empty tin box, River went skipping back into the house to announce the latest newsflash of her parents next financial happening... which she felt certain would prompt further rounds of thought provoking front page journalism.

     A steady two hours drive away, over on the east coast, the inhabitants of a sleepy fishing community were gainfully employed, pretty much as any other, going about their daily business, one such denizen... a baby crustacean, currently marooned by the tide had taken up temporary accommodation in a beachfront rock-pool property of certain distinction, was as yet unaware of a completely different and obscure set of circumstances that would shortly be rearing his slobbering jowls and bring all four paws, the size of dinner plates, crashing down upon the unsuspecting seashore fauna... was determined while she waited to catch the next high tide home, that until such time that the right wave rolled along, would potter about in the little rock-pool, perhaps indulge herself in a leisurely bathe... and catch up on a spot of therapeutic knitting.

     So, placing the days events since breakfast into perspective...  [i]  the vehicle indemnity provider, henceforth to be named 'the party of the first part', who currently weren't cognisant of an impending claim to date, would shortly be laying eggs attempting to squirm out of all liability, due to  [ii]  the automobile, driven by a minor, fortunately for Salmon senior on private land and henceforth, the aforementioned to be called 'the third party, to the party of the second part...' which urgently needed rigorous cosmetic attention to the rear tail light cluster and surrounding bodywork so as to maintain a favourable resale mark-up price.  [iii]  Having been dragged kicking and screaming from the top of the wardrobe, the luggage had rapidly developed cold feet and cried sudden illness in the family, but were being taken to the Wake anyway.  [iv]  Wrapped around the hot water cylinder since the previous Summer, the various sundry items of holiday apparel stood united, resolute as a Union Picket line not be seen dead looking as though they'd never so much as seen the bottom of a flat-iron.  [v]  Both Red and his wife, Tina, despite wearing the same anaemic smile as the one show to the neighbours as they departed, travelling counter clockwise along the crescent so as not to unduly advertise their recent misadventure with the garage wall, were only going for the sake of the children, whilst  [vi]  River and her errant brother didn't want to go anyway dismayed at leaving the television set behind, were already missing their favourite programs, which only really left  [vii]  'mans-best-friend' who, when he wasn't actually hanging over the front seat giving dad big sloppy licks as though... 'are we nearly there yet' or perhaps... 'I need to stop and spend a penny... or you'll all know about it if you don't,' was more than content to be taking up the majority of the rear seating arrangements and with a delinquent wag of his tail, was deliriously happy to be wherever his family were.**

                                                        ­                             ...   ...   ...

a work in progress.                                                        ­                                                                 ­  1862
Oscar Wilde  Jul 2009
Humanitad
It is full winter now:  the trees are bare,
Save where the cattle huddle from the cold
Beneath the pine, for it doth never wear
The autumn’s gaudy livery whose gold
Her jealous brother pilfers, but is true
To the green doublet; bitter is the wind, as though it blew

From Saturn’s cave; a few thin wisps of hay
Lie on the sharp black hedges, where the wain
Dragged the sweet pillage of a summer’s day
From the low meadows up the narrow lane;
Upon the half-thawed snow the bleating sheep
Press close against the hurdles, and the shivering house-dogs creep

From the shut stable to the frozen stream
And back again disconsolate, and miss
The bawling shepherds and the noisy team;
And overhead in circling listlessness
The cawing rooks whirl round the frosted stack,
Or crowd the dripping boughs; and in the fen the ice-pools crack

Where the gaunt bittern stalks among the reeds
And ***** his wings, and stretches back his neck,
And hoots to see the moon; across the meads
Limps the poor frightened hare, a little speck;
And a stray seamew with its fretful cry
Flits like a sudden drift of snow against the dull grey sky.

Full winter:  and the ***** goodman brings
His load of ******* from the chilly byre,
And stamps his feet upon the hearth, and flings
The sappy billets on the waning fire,
And laughs to see the sudden lightening scare
His children at their play, and yet,—the spring is in the air;

Already the slim crocus stirs the snow,
And soon yon blanched fields will bloom again
With nodding cowslips for some lad to mow,
For with the first warm kisses of the rain
The winter’s icy sorrow breaks to tears,
And the brown thrushes mate, and with bright eyes the rabbit peers

From the dark warren where the fir-cones lie,
And treads one snowdrop under foot, and runs
Over the mossy knoll, and blackbirds fly
Across our path at evening, and the suns
Stay longer with us; ah! how good to see
Grass-girdled spring in all her joy of laughing greenery

Dance through the hedges till the early rose,
(That sweet repentance of the thorny briar!)
Burst from its sheathed emerald and disclose
The little quivering disk of golden fire
Which the bees know so well, for with it come
Pale boy’s-love, sops-in-wine, and daffadillies all in bloom.

Then up and down the field the sower goes,
While close behind the laughing younker scares
With shrilly whoop the black and thievish crows,
And then the chestnut-tree its glory wears,
And on the grass the creamy blossom falls
In odorous excess, and faint half-whispered madrigals

Steal from the bluebells’ nodding carillons
Each breezy morn, and then white jessamine,
That star of its own heaven, snap-dragons
With lolling crimson tongues, and eglantine
In dusty velvets clad usurp the bed
And woodland empery, and when the lingering rose hath shed

Red leaf by leaf its folded panoply,
And pansies closed their purple-lidded eyes,
Chrysanthemums from gilded argosy
Unload their gaudy scentless merchandise,
And violets getting overbold withdraw
From their shy nooks, and scarlet berries dot the leafless haw.

O happy field! and O thrice happy tree!
Soon will your queen in daisy-flowered smock
And crown of flower-de-luce trip down the lea,
Soon will the lazy shepherds drive their flock
Back to the pasture by the pool, and soon
Through the green leaves will float the hum of murmuring bees at noon.

Soon will the glade be bright with bellamour,
The flower which wantons love, and those sweet nuns
Vale-lilies in their snowy vestiture
Will tell their beaded pearls, and carnations
With mitred dusky leaves will scent the wind,
And straggling traveller’s-joy each hedge with yellow stars will bind.

Dear bride of Nature and most bounteous spring,
That canst give increase to the sweet-breath’d kine,
And to the kid its little horns, and bring
The soft and silky blossoms to the vine,
Where is that old nepenthe which of yore
Man got from poppy root and glossy-berried mandragore!

There was a time when any common bird
Could make me sing in unison, a time
When all the strings of boyish life were stirred
To quick response or more melodious rhyme
By every forest idyll;—do I change?
Or rather doth some evil thing through thy fair pleasaunce range?

Nay, nay, thou art the same:  ’tis I who seek
To vex with sighs thy simple solitude,
And because fruitless tears bedew my cheek
Would have thee weep with me in brotherhood;
Fool! shall each wronged and restless spirit dare
To taint such wine with the salt poison of own despair!

Thou art the same:  ’tis I whose wretched soul
Takes discontent to be its paramour,
And gives its kingdom to the rude control
Of what should be its servitor,—for sure
Wisdom is somewhere, though the stormy sea
Contain it not, and the huge deep answer ‘’Tis not in me.’

To burn with one clear flame, to stand *****
In natural honour, not to bend the knee
In profitless prostrations whose effect
Is by itself condemned, what alchemy
Can teach me this? what herb Medea brewed
Will bring the unexultant peace of essence not subdued?

The minor chord which ends the harmony,
And for its answering brother waits in vain
Sobbing for incompleted melody,
Dies a swan’s death; but I the heir of pain,
A silent Memnon with blank lidless eyes,
Wait for the light and music of those suns which never rise.

The quenched-out torch, the lonely cypress-gloom,
The little dust stored in the narrow urn,
The gentle XAIPE of the Attic tomb,—
Were not these better far than to return
To my old fitful restless malady,
Or spend my days within the voiceless cave of misery?

Nay! for perchance that poppy-crowned god
Is like the watcher by a sick man’s bed
Who talks of sleep but gives it not; his rod
Hath lost its virtue, and, when all is said,
Death is too rude, too obvious a key
To solve one single secret in a life’s philosophy.

And Love! that noble madness, whose august
And inextinguishable might can slay
The soul with honeyed drugs,—alas! I must
From such sweet ruin play the runaway,
Although too constant memory never can
Forget the arched splendour of those brows Olympian

Which for a little season made my youth
So soft a swoon of exquisite indolence
That all the chiding of more prudent Truth
Seemed the thin voice of jealousy,—O hence
Thou huntress deadlier than Artemis!
Go seek some other quarry! for of thy too perilous bliss.

My lips have drunk enough,—no more, no more,—
Though Love himself should turn his gilded prow
Back to the troubled waters of this shore
Where I am wrecked and stranded, even now
The chariot wheels of passion sweep too near,
Hence!  Hence!  I pass unto a life more barren, more austere.

More barren—ay, those arms will never lean
Down through the trellised vines and draw my soul
In sweet reluctance through the tangled green;
Some other head must wear that aureole,
For I am hers who loves not any man
Whose white and stainless ***** bears the sign Gorgonian.

Let Venus go and chuck her dainty page,
And kiss his mouth, and toss his curly hair,
With net and spear and hunting equipage
Let young Adonis to his tryst repair,
But me her fond and subtle-fashioned spell
Delights no more, though I could win her dearest citadel.

Ay, though I were that laughing shepherd boy
Who from Mount Ida saw the little cloud
Pass over Tenedos and lofty Troy
And knew the coming of the Queen, and bowed
In wonder at her feet, not for the sake
Of a new Helen would I bid her hand the apple take.

Then rise supreme Athena argent-limbed!
And, if my lips be musicless, inspire
At least my life:  was not thy glory hymned
By One who gave to thee his sword and lyre
Like AEschylos at well-fought Marathon,
And died to show that Milton’s England still could bear a son!

And yet I cannot tread the Portico
And live without desire, fear and pain,
Or nurture that wise calm which long ago
The grave Athenian master taught to men,
Self-poised, self-centred, and self-comforted,
To watch the world’s vain phantasies go by with unbowed head.

Alas! that serene brow, those eloquent lips,
Those eyes that mirrored all eternity,
Rest in their own Colonos, an eclipse
Hath come on Wisdom, and Mnemosyne
Is childless; in the night which she had made
For lofty secure flight Athena’s owl itself hath strayed.

Nor much with Science do I care to climb,
Although by strange and subtle witchery
She drew the moon from heaven:  the Muse Time
Unrolls her gorgeous-coloured tapestry
To no less eager eyes; often indeed
In the great epic of Polymnia’s scroll I love to read

How Asia sent her myriad hosts to war
Against a little town, and panoplied
In gilded mail with jewelled scimitar,
White-shielded, purple-crested, rode the Mede
Between the waving poplars and the sea
Which men call Artemisium, till he saw Thermopylae

Its steep ravine spanned by a narrow wall,
And on the nearer side a little brood
Of careless lions holding festival!
And stood amazed at such hardihood,
And pitched his tent upon the reedy shore,
And stayed two days to wonder, and then crept at midnight o’er

Some unfrequented height, and coming down
The autumn forests treacherously slew
What Sparta held most dear and was the crown
Of far Eurotas, and passed on, nor knew
How God had staked an evil net for him
In the small bay at Salamis,—and yet, the page grows dim,

Its cadenced Greek delights me not, I feel
With such a goodly time too out of tune
To love it much:  for like the Dial’s wheel
That from its blinded darkness strikes the noon
Yet never sees the sun, so do my eyes
Restlessly follow that which from my cheated vision flies.

O for one grand unselfish simple life
To teach us what is Wisdom! speak ye hills
Of lone Helvellyn, for this note of strife
Shunned your untroubled crags and crystal rills,
Where is that Spirit which living blamelessly
Yet dared to kiss the smitten mouth of his own century!

Speak ye Rydalian laurels! where is he
Whose gentle head ye sheltered, that pure soul
Whose gracious days of uncrowned majesty
Through lowliest conduct touched the lofty goal
Where love and duty mingle!  Him at least
The most high Laws were glad of, he had sat at Wisdom’s feast;

But we are Learning’s changelings, know by rote
The clarion watchword of each Grecian school
And follow none, the flawless sword which smote
The pagan Hydra is an effete tool
Which we ourselves have blunted, what man now
Shall scale the august ancient heights and to old Reverence bow?

One such indeed I saw, but, Ichabod!
Gone is that last dear son of Italy,
Who being man died for the sake of God,
And whose unrisen bones sleep peacefully,
O guard him, guard him well, my Giotto’s tower,
Thou marble lily of the lily town! let not the lour

Of the rude tempest vex his slumber, or
The Arno with its tawny troubled gold
O’er-leap its marge, no mightier conqueror
Clomb the high Capitol in the days of old
When Rome was indeed Rome, for Liberty
Walked like a bride beside him, at which sight pale Mystery

Fled shrieking to her farthest sombrest cell
With an old man who grabbled rusty keys,
Fled shuddering, for that immemorial knell
With which oblivion buries dynasties
Swept like a wounded eagle on the blast,
As to the holy heart of Rome the great triumvir passed.

He knew the holiest heart and heights of Rome,
He drave the base wolf from the lion’s lair,
And now lies dead by that empyreal dome
Which overtops Valdarno hung in air
By Brunelleschi—O Melpomene
Breathe through thy melancholy pipe thy sweetest threnody!

Breathe through the tragic stops such melodies
That Joy’s self may grow jealous, and the Nine
Forget awhile their discreet emperies,
Mourning for him who on Rome’s lordliest shrine
Lit for men’s lives the light of Marathon,
And bare to sun-forgotten fields the fire of the sun!

O guard him, guard him well, my Giotto’s tower!
Let some young Florentine each eventide
Bring coronals of that enchanted flower
Which the dim woods of Vallombrosa hide,
And deck the marble tomb wherein he lies
Whose soul is as some mighty orb unseen of mortal eyes;

Some mighty orb whose cycled wanderings,
Being tempest-driven to the farthest rim
Where Chaos meets Creation and the wings
Of the eternal chanting Cherubim
Are pavilioned on Nothing, passed away
Into a moonless void,—and yet, though he is dust and clay,

He is not dead, the immemorial Fates
Forbid it, and the closing shears refrain.
Lift up your heads ye everlasting gates!
Ye argent clarions, sound a loftier strain
For the vile thing he hated lurks within
Its sombre house, alone with God and memories of sin.

Still what avails it that she sought her cave
That murderous mother of red harlotries?
At Munich on the marble architrave
The Grecian boys die smiling, but the seas
Which wash AEgina fret in loneliness
Not mirroring their beauty; so our lives grow colourless

For lack of our ideals, if one star
Flame torch-like in the heavens the unjust
Swift daylight kills it, and no trump of war
Can wake to passionate voice the silent dust
Which was Mazzini once! rich Niobe
For all her stony sorrows hath her sons; but Italy,

What Easter Day shall make her children rise,
Who were not Gods yet suffered? what sure feet
Shall find their grave-clothes folded? what clear eyes
Shall see them ******?  O it were meet
To roll the stone from off the sepulchre
And kiss the bleeding roses of their wounds, in love of her,

Our Italy! our mother visible!
Most blessed among nations and most sad,
For whose dear sake the young Calabrian fell
That day at Aspromonte and was glad
That in an age when God was bought and sold
One man could die for Liberty! but we, burnt out and cold,

See Honour smitten on the cheek and gyves
Bind the sweet feet of Mercy:  Poverty
Creeps through our sunless lanes and with sharp knives
Cuts the warm throats of children stealthily,
And no word said:- O we are wretched men
Unworthy of our great inheritance! where is the pen

Of austere Milton? where the mighty sword
Which slew its master righteously? the years
Have lost their ancient leader, and no word
Breaks from the voiceless tripod on our ears:
While as a ruined mother in some spasm
Bears a base child and loathes it, so our best enthusiasm

Genders unlawful children, Anarchy
Freedom’s own Judas, the vile prodigal
Licence who steals the gold of Liberty
And yet has nothing, Ignorance the real
One Fraticide since Cain, Envy the asp
That stings itself to anguish, Avarice whose palsied grasp

Is in its extent stiffened, moneyed Greed
For whose dull appetite men waste away
Amid the whirr of wheels and are the seed
Of things which slay their sower, these each day
Sees rife in England, and the gentle feet
Of Beauty tread no more the stones of each unlovely street.

What even Cromwell spared is desecrated
By **** and worm, left to the stormy play
Of wind and beating snow, or renovated
By more destructful hands:  Time’s worst decay
Will wreathe its ruins with some loveliness,
But these new Vandals can but make a rain-proof barrenness.

Where is that Art which bade the Angels sing
Through Lincoln’s lofty choir, till the air
Seems from such marble harmonies to ring
With sweeter song than common lips can dare
To draw from actual reed? ah! where is now
The cunning hand which made the flowering hawthorn branches bow

For Southwell’s arch, and carved the House of One
Who loved the lilies of the field with all
Our dearest English flowers? the same sun
Rises for us:  the seasons natural
Weave the same tapestry of green and grey:
The unchanged hills are with us:  but that Spirit hath passed away.

And yet perchance it may be better so,
For Tyranny is an incestuous Queen,
****** her brother is her bedfellow,
And the Plague chambers with her:  in obscene
And ****** paths her treacherous feet are set;
Better the empty desert and a soul inviolate!

For gentle brotherhood, the harmony
Of living in the healthful air, the swift
Clean beauty of strong limbs when men are free
And women chaste, these are the things which lift
Our souls up more than even Agnolo’s
Gaunt blinded Sibyl poring o’er the scroll of human woes,

Or Titian’s little maiden on the stair
White as her own sweet lily and as tall,
Or Mona Lisa smiling through her hair,—
Ah! somehow life is bigger after all
Than any painted angel, could we see
The God that is within us!  The old Greek serenity

Which curbs the passion of that
nivek  Aug 2014
licence
nivek Aug 2014
I cannot dance like John Travolta
and I havnt a pilots licence
what I do have is two legs
and a drivers licence
THE PROLOGUE. 1

Experience, though none authority                  authoritative texts
Were in this world, is right enough for me
To speak of woe that is in marriage:
For, lordings, since I twelve year was of age,
(Thanked be God that is etern on live),              lives eternally
Husbands at the church door have I had five,2
For I so often have y-wedded be,
And all were worthy men in their degree.
But me was told, not longe time gone is
That sithen* Christe went never but ones                          since
To wedding, in the Cane
of Galilee,                               Cana
That by that ilk
example taught he me,                            same
That I not wedded shoulde be but once.
Lo, hearken eke a sharp word for the *****,
                   occasion
Beside a welle Jesus, God and man,
Spake in reproof of the Samaritan:
"Thou hast y-had five husbandes," said he;
"And thilke
man, that now hath wedded thee,                       that
Is not thine husband:" 3 thus said he certain;
What that he meant thereby, I cannot sayn.
But that I aske, why the fifthe man
Was not husband to the Samaritan?
How many might she have in marriage?
Yet heard I never tellen *in mine age
                      in my life
Upon this number definitioun.
Men may divine, and glosen* up and down;                        comment
But well I wot, express without a lie,
God bade us for to wax and multiply;
That gentle text can I well understand.
Eke well I wot, he said, that mine husband
Should leave father and mother, and take to me;
But of no number mention made he,
Of bigamy or of octogamy;
Why then should men speak of it villainy?
     as if it were a disgrace

Lo here, the wise king Dan
Solomon,                           Lord 4
I trow that he had wives more than one;
As would to God it lawful were to me
To be refreshed half so oft as he!
What gift
of God had he for all his wives?     special favour, licence
No man hath such, that in this world alive is.
God wot, this noble king, *as to my wit,
              as I understand
The first night had many a merry fit
With each of them, so well was him on live.         so well he lived
Blessed be God that I have wedded five!
Welcome the sixth whenever that he shall.
For since I will not keep me chaste in all,
When mine husband is from the world y-gone,
Some Christian man shall wedde me anon.
For then th' apostle saith that I am free
To wed, a' God's half, where it liketh me.             on God's part
He saith, that to be wedded is no sin;
Better is to be wedded than to brin.                              burn
What recketh* me though folk say villainy                 care *evil
Of shrewed* Lamech, and his bigamy?                     impious, wicked
I wot well Abraham was a holy man,
And Jacob eke, as far as ev'r I can.
                              know
And each of them had wives more than two;
And many another holy man also.
Where can ye see, *in any manner age,
                   in any period
That highe God defended* marriage                           forbade 5
By word express? I pray you tell it me;
Or where commanded he virginity?
I wot as well as you, it is no dread,
                            doubt
Th' apostle, when he spake of maidenhead,
He said, that precept thereof had he none:
Men may counsel a woman to be one,
                              a maid
But counseling is no commandement;
He put it in our owen judgement.
For, hadde God commanded maidenhead,
Then had he ******
wedding out of dread;
           condemned *doubt
And certes, if there were no seed y-sow,                          sown
Virginity then whereof should it grow?
Paul durste not commanden, at the least,
A thing of which his Master gave no hest.                      command
The dart* is set up for virginity;                             goal 6
Catch whoso may, who runneth best let see.
But this word is not ta'en of every wight,
But there as* God will give it of his might.             except where
I wot well that th' apostle was a maid,
But natheless, although he wrote and said,
He would that every wight were such as he,
All is but counsel to virginity.
And, since to be a wife he gave me leave
Of indulgence, so is it no repreve                   *scandal, reproach
To wedde me, if that my make
should die,                 mate, husband
Without exception
of bigamy;                          charge, reproach
All were it* good no woman for to touch            though it might be
(He meant as in his bed or in his couch),
For peril is both fire and tow t'assemble
Ye know what this example may resemble.
This is all and some, he held virginity
More profit than wedding in frailty:
(Frailty clepe I, but if that he and she           frailty I call it,
Would lead their lives all in chastity),                         unless

I grant it well, I have of none envy
Who maidenhead prefer to bigamy;
It liketh them t' be clean in body and ghost;                     *soul
Of mine estate
I will not make a boast.                      condition

For, well ye know, a lord in his household
Hath not every vessel all of gold; 7
Some are of tree, and do their lord service.
God calleth folk to him in sundry wise,
And each one hath of God a proper gift,
Some this, some that, as liketh him to shift.
      appoint, distribute
Virginity is great perfection,
And continence eke with devotion:
But Christ, that of perfection is the well,
                   fountain
Bade not every wight he should go sell
All that he had, and give it to the poor,
And in such wise follow him and his lore:
                     doctrine
He spake to them that would live perfectly, --
And, lordings, by your leave, that am not I;
I will bestow the flower of mine age
In th' acts and in the fruits of marriage.
Tell me also, to what conclusion
                          end, purpose
Were members made of generation,
And of so perfect wise a wight
y-wrought?                        being
Trust me right well, they were not made for nought.
Glose whoso will, and say both up and down,
That they were made for the purgatioun
Of *****, and of other thinges smale,
And eke to know a female from a male:
And for none other cause? say ye no?
Experience wot well it is not so.
So that the clerkes
be not with me wroth,                     scholars
I say this, that they were made for both,
That is to say, *for office, and for ease
                 for duty and
Of engendrure, there we God not displease.                 for pleasure

Why should men elles in their bookes set,
That man shall yield unto his wife her debt?
Now wherewith should he make his payement,
If he us'd not his silly instrument?
Then were they made upon a creature
To purge *****, and eke for engendrure.
But I say not that every wight is hold,                        obliged
That hath such harness* as I to you told,                     equipment
To go and use them in engendrure;
Then should men take of chastity no cure.
                         care
Christ was a maid, and shapen
as a man,                      fashioned
And many a saint, since that this world began,
Yet ever liv'd in perfect chastity.
I will not vie
with no virginity.                              contend
Let them with bread of pured
wheat be fed,                    purified
And let us wives eat our barley bread.
And yet with barley bread, Mark tell us can,8
Our Lord Jesus refreshed many a man.
In such estate as God hath *cleped us,
                    called us to
I'll persevere, I am not precious,
                         over-dainty
In wifehood I will use mine instrument
As freely as my Maker hath it sent.
If I be dangerous
God give me sorrow;            sparing of my favours
Mine husband shall it have, both eve and morrow,
When that him list come forth and pay his debt.
A husband will I have, I *will no let,
         will bear no hindrance
Which shall be both my debtor and my thrall,                     *slave
And have his tribulation withal
Upon his flesh, while that I am his wife.
I have the power during all my life
Upon his proper body, and not he;
Right thus th' apostle told it unto me,
And bade our husbands for to love us well;
All this sentence me liketh every deal.
                           whit

Up start the Pardoner, and that anon;
"Now, Dame," quoth he, "by God and by Saint John,
Ye are a noble preacher in this case.
I was about to wed a wife, alas!
What? should I bie
it on my flesh so dear?                  suffer for
Yet had I lever
wed no wife this year."                         rather
"Abide,"
quoth she; "my tale is not begun             wait in patience
Nay, thou shalt drinken of another tun
Ere that I go, shall savour worse than ale.
And when that I have told thee forth my tale
Of tribulation in marriage,
Of which I am expert in all mine age,
(This is to say, myself hath been the whip),
Then mayest thou choose whether thou wilt sip
Of *thilke tunne,
that I now shall broach.                   that tun
Beware of it, ere thou too nigh approach,
For I shall tell examples more than ten:
Whoso will not beware by other men,
By him shall other men corrected be:
These same wordes writeth Ptolemy;
Read in his Almagest, and take it there."
"Dame, I would pray you, if your will it were,"
Saide this Pardoner, "as ye began,
Tell forth your tale, and spare for no man,
And teach us younge men of your practique."
"Gladly," quoth she, "since that it may you like.
But that I pray to all this company,
If that I speak after my fantasy,
To take nought agrief* what I may say;                         to heart
For mine intent is only for to play.

Now, Sirs, then will I tell you forth my tale.
As ever may I drinke wine or ale
I shall say sooth; the husbands that I had
Three of them were good, and two were bad
The three were goode men, and rich, and old
Unnethes mighte they the statute hold      they could with difficulty
In which that they were bounden unto me.                   obey the law
Yet wot well what I mean of this, pardie.
                       *by God
As God me help, I laugh when tha
ryn  Jul 2016
Poetic Licence
ryn Jul 2016
Let us speak only in tongues
For all that wasn't made obvious
May present its true meaning in the unintelligible

Let us converse in stanzas
For what wasn't clearly heard
May perhaps show itself between these lines

Let us exaggerate and romanticise
For all that was spouted bland
May be heightened to receive some light

Let us exchange and trade through poetry
For all that's lacking in common words
May secure a foothold in the readers' hearts
Mr Bigglesworth Apr 2013
Poetry ban, ****** abomination
Made error on poetic licence application
nivek Feb 2016
I escaped from Alcatraz
with a poets licence to freedom.

— The End —