Submit your work, meet writers and drop the ads. Become a member
anastasiad Dec 2016
Software program designers ordinarily apply certain types of layer technological know-how to shield their software to avoid illegitimate apply. In addition need software layer software is permitted to obtain articles, to be able to boost product sales profit.

Software package encryption technology is split in accordance with whether or not the by using a devoted hardware-based encrypted sheild hardware as well as software-based security. Hardware-based layer, layer have to bind having a focused hardware unit, the particular electronics shield of encryption layer head of hair, typically referred to as the dongle. Software-based layer, encryption does not need focused electronics, typical executed digital camera permission while using the your fatal unit hardware and software data, also referred to as this electronic digital endorsement styles.

Simply consider drive-based electronics encryption stability when compared with software-based shield of encryption will not be suitable, as the more linked to program security, like encrypted sheild products and solutions, stability, encrypted sheild plan style, software, systems, , equipment, details marketing and sales communications, and the like, is really a detailed technological spots, not alone by a to discover whether protection.

Far away, the market industry promote of the digital permission along with security tresses are evenly coordinated. Behavior and also fantastic factors, the actual layer hair likewise enjoy a certain share of the market. File encryption hair, however, will be the network produced merchandise in the instances, can be a pure consumer technology, insufficient operations and also record capabilities, the inclusion of appliance manufacturing, strategic planning, driver installation annoyance, but not only the high cost, and might stop obtained multilevel submission and sales of your computer software, is definitely gradually diminish.

Enhancing the electronic acceptance that is certainly while in the ascendant. Electrical certificate protection approaches are getting to be progressively more included in the Internet technology, cloud computing and also SaaS thought is not just easier to make use of along with cope with computer software electric situation and be able to accomplish, but according to present day natural low-carbon improvement strategy, has got supplanted the encryption curly hair Outstanding software program encryption market trends. The more well-known businesses on the planet, Microsoft, Sun microsystems, Autodesk, SIEMENS, Adobe and various computer software are electronic consent safeguards function.

In the nation, using file encryption software package coders fasten greater premiums, along with international routines and also historic causes of the actual continuation with the next 2 reasons:

One particular every day producers typically regarded security encrypted sheild a lock electronic digital authorization.

There's not just about any readily available electronic digital licence products and solutions too big, the asking price of foreign electronic digital permission.

In reality, while using the rising betterment of your multi-level surroundings, your system triggering for the majority of home end users 's no trouble. And even brought up previously, which the point of view from the safety of layer head of hair electric permission on the sides completely wrong. From your reasonable mindset, this file encryption hair as a result of computer hardware copying much easier to crack, but accomplished piracy business sequence has been made. In its place, electronic digital endorsement because appliance is not replicated, but in addition should system arousal plus approval, in reality, have good safety outcome. Additionally, your every day has showed up in some accredited goods give electric 2-3 enterprise will have to improve while using growth of China's software package sector and grow up.

As a result, your layer computer software market styles hardware, web 2 ., and details technologies. Below, we speak about, in the application encryption approach specific to be able to detailed application encrypted sheild establishment plus progress craze of the marketplace.

Very first, the software encryption approach

As mentioned previously, it encrypted sheild technologies are divided into security hardware-based as well as software-based security.

Your hardware-based shield of encryption

Hardware-based encryption shield of encryption locks, many important info, like shield of encryption secrets to vulnerable information, consent paperwork, tailor made sets of rules, etcetera. can be stored in this dongle.

The layer fastener screen variety is split in to 2 kinds of synchronised slot and also Flash interface. This simultaneous port could be the very early technique type, because the propagation troublesome plus clash while using the printer's, and after this has less apply. A lot of builders employ tend to be USB slot dongle.

File encryption hair from the two kinds of CPU form, the microcontroller to get Pc and another with a clever minute card processor for the reason that Pc a microcontroller computer hardware by itself conveniently trouble area or content, therefore an increasing number of high-end file encryption a lock employing a intelligent credit card chips Central processing unit, to stop hardware break. Although a growing number of clever card dongle crack, initially, because processor might be more and even more leading-edge analytic techniques and devices; sensible card program to be written to the chips manufacturing unit to make during this time method may possibly trickle; encrypted sheild tresses of the identical manufacturer your Processor process is the same, merely various designers facts as well as major, in case most of these records are passed out there, you can easily clone.

Dongle features a specific level of security power, but you can also find a number of drawbacks:

One) apply at the regular one-time never ending license, can't assist in the achievements of your trial model along with on-demand invest in

3) the presence of electronics generation, logistics, assembly as well as upkeep charges

Three) is not achieved the issue with Internet-based electronic digital improvements, tracking along with control

Several) Once broke, may be burned huge, it is sometimes complicated to remedy

A pair of software-based encryption

Software-based encrypted sheild, digital acceptance, and certain in addition separated into home equity loans number plate along with licenses document:

In order to register code can be referred to as successive number or consent computer code, acquired using a alteration in the the program end user computer systems along with program facts, possible software and hardware facts, including: Cpu serial number, BIOS sequential amount, greeting card amount, harddisk sequential number, computer system brand, etc. . Completely transform formula made use of your customized protocol or maybe conventional shield of encryption algorithm formula. Customer as well as primary utilisation of the computer software installment practice, you might want to type in the enrollment value to confirm. Following verification, it can be employed typically. The particular strategy has got the good thing about this subscription computer code defense is easy to use, the downside is always that security is not really higher, not able to attain complicated endorsement demands.

Permission submit as well as the signing up code in order to situation the same computers plus software information, simply a registration signal period confines utilization of both software and hardware information, a permission record can use numerous hardware and software info. Also, the actual permission report can contain more info, to help you obtain the difficult agreement demands, and may perhaps retail outlet several customer facts. The average permission report way is to implement the private key in the asymmetric algorithm to hint your certificate data file, while the general public secret is embedded in the application value. Asymmetric shield of encryption plus understanding course of action, the private computer essential consent hosting server exists, it is hard to compromise from the investigation regarding endorsement paperwork.

Some great benefits of this electric endorsement safeguard doesn't require further electronics, and for that reason doesn't have to mount the motive force as well as buyer elements, electronic digital hardware issue. The disadvantage from the automated certificate safety mode just isn't networked buyers really need to hand remove your computer information, and then personally significance registration constraints or even permission, is not very easy to use. Additionally, the particular domestic electronic digital acceptance a few of the programmers from the product or service, that also limits your popularization and promotion connected with electric permit safeguard technology.

Subsequent, it encrypted sheild field advancement status

A single. File encryption curly hair

The main unusual dongle professional SafeNet, Corporation. in the usa in addition to Germany Wibu.

Security head of hair service deeply Supposrr que Luoke and also Feitian. The 2 main organizations due to the affordable prices, the first person to introduce the actual good minute card shield of encryption curly hair nearby perfectly so that you can enjoy some market place in the nation.

A pair of. Electric permission

Unfamiliar company certified merchandise to supply electronic digital Flexera Software and also SafeNet which will, Flexera Software program is focused entirely on the joy of digital permission, the actual device's ease of use along with features are doing superior, though the valuation on the item is additionally quite high.

This home-based electrical authorization goods enterprise a Beijing Biteansuo (BitAnswer), Shenzhen-use this (Euse) Safengine Organization.

There are only a few companies will acquire their very own electronic digital consent structure, even so the builders to cultivate their own plans commonly occur this inquiries:

One particular) the introduction of non-professionals, there are numerous loopholes while in the security

A pair of) is actually difficult to realize accommodating accreditation control, management and also precise functions simple or maybe simply no

Three) are often unveiled to be able to address the particular fast problem connected with short-term method, create far more than predicted in the foreseeable future as a result of protection, balance and also scalability challenges continued to get

Several) can not meet up with sector variations as a result of the modern demands on program certification model

Software program security marketplace movements

The software security field developments is closely connected with the increase development with the computer software marketplace. With the rise in popularity of cloud-computing plus Software, service with application products will be change in the direction of the multilevel plus system. Used in nearly all software programmers, Software items can not only spend less a great deal of hardware and software buy plus servicing charges, you can also get demand from customers, when decreasing the use of possibility, driving program vendors in order to consistently strengthen items plus improve services to be able to sustain consumers.

To the development of system and program improvement can also be a software package encrypted sheild technologies movements. The view around the present-day growth trend, the encryption locking mechanism technologies have designed really develop fully information mill approaching vividness, slower advancement. The actual everyday living and make use of on the equipment practice creates security head of hair are not able to conserve the speed regarding advancement of the Internet period, are going to be substituted with the particular automated certificate.

Automated authorization permission through earlier subscription program code type on the feature-rich records available as modifications to technologies are considering verification process out of offline yourself confirm the introduction of computerized system authorization. Permitted administration contemplating particularly, your electrical licence technological innovation collected from one of software licence qualifications growth just as one authorized official certifications, agreement management and exact information and facts, and also other objective of each, significantly improved this permitted volume of details regarding computer software coders.

May forecast not able to electronic products certified solutions ought to have these most important properties:

Enlightening approved administration system: supplied by third-party safety measures specialized software designers, in line with the Net's one-stop software package safety plus endorsement management system, without having to deploy and observe after, low priced, easy-to-use.

Only two Bendable Certificate: offer the acceptance of the purchaser software as well as the cloud computing product common software package licenses; authorized touch time, the volume of sensible adventures; sanctioned in order to bind your computer software and hardware information and facts, encryption tresses, or by way of a username plus password validation way of agreement.

Simple and easy friendly buyer: in accordance with the WEB, at any place obtain; Users might food acquire, trigger boost the software, you can buy their unique software package to keep abreast of details; software package designers can certainly understand software initial information and facts plus individual data is often synergies through the people in the firm to finish the design of application license, enactment, supervision as well as maintenance operate.

5. Fog up accreditation unit: This is a cloud computing type of software program licensing. Standard application is genuine customer setup, endorsement can also be a buyer. Although cloud-computing could be the craze, although the move difficult for classic software package would be a wonderful way for the particular a higher level cloud computing modification. This definite awareness associated with tips, a common application approved move on the purchaser for the fog up on the endorsement remote computer, to ensure that small adjustments towards the application, but you can certainly instantly experience the great things about cloud computing: higher safety energy require to obtain clouds hard drive .

http://www.passwordmanagers.net/ Password Manager
anastasiad Nov 2016
Program web developers typically apply style of security technologies to guard the application in order to avoid against the law work with. Also need computer software encrypted sheild software packages are authorized to obtain written content, in order to increase the income profit.

Software encrypted sheild technologies are divided according to perhaps the by using a dedicated hardware-based file encryption hardware as well as software-based layer. Hardware-based layer, encryption have to emergency having a specific computer hardware device, this computer hardware encrypted sheild encrypted sheild hair, often called the dongle. Software-based file encryption, file encryption doesn't involve devoted computer hardware, common joining digital camera license while using the actual airport terminal device software and hardware details, also referred to as your automated acceptance sorts.

Just imagine drive-based appliance security safety in comparison with software-based encrypted sheild isn't right, because the much more included in program safety, which include layer goods, safety measures, encrypted sheild insurance plan design and style, software, operating systems, , appliance, data marketing communications, etc, is a extensive complex areas, besides by way of to ascertain no matter if safety.

In other countries, industry promote of your automated authorization and encryption tresses are consistently coordinated. Patterns and also famous explanations, this encryption head of hair additionally occupy a clear market share. File encryption a lock, nevertheless, could be the multi-level developed products with the moments, can be a natural customer technological innovation, deficit of control in addition to exact features, a good appliance creation, scheduling details, drivers installing irritation, but not only the high cost, and may stop achieved system circulation and purchasers from the software, is usually slowly decline.

The development of a electronic authorization that is certainly in the ascendant. Digital license safeguards procedures are becoming an increasing number of built into the world wide web know-how, cloud-computing in addition to SaaS strategy it isn't just easier to work with along with cope with software package digital situation and also accomplish, but will also according to present day environment friendly low-carbon advancement notion, possesses changed the shield of encryption hair Distinctive the software program encrypted sheild industry developments. The greater well-known organizations in the world, 'microsoft', Sun microsystems, Autodesk, SIEMENS, Adobe as well as other software package will be digital consent safety method.

In the united states, the utilization of layer application builders shut greater fees, with foreign behavior and historical causes of your continuation with the pursuing a couple reasons:

1 every day companies commonly deemed security encrypted sheild hair electronic agreement.

There are no longer just about any accessible digital license goods exorbitant, the price tag on foreign automated acceptance.

The truth is, with the expanding improvement of your circle surroundings, a community initial for many of us domestic users is not an difficulty. And also mentioned prior, how the viewpoint of your basic safety connected with encrypted sheild head of hair electrical permission sided incorrect. Coming from a authentic perspective, the shield of encryption curly hair as a result of components burning better to fracture, but accomplished piracy marketplace company has become produced. Instead, electrical consent since the electronics should not be cloned, but additionally must multi-level service in addition to affirmation, in fact, currently have excellent safeguard outcome. Moreover, your residential in addition has showed up in many registered goods supply automated 2-3 organization ought to improve while using the advancement of China's software field and also be upwards.

Hence, this encryption software package marketplace developments electronics, marketing, and details engineering. Down below, most people look at, through the software file encryption system distinct for you to elaborate program encrypted sheild establishment and also progression trend of this marketplace.

Primary, the program shield of encryption technique

As mentioned earlier, it shield of encryption technologies are divided into encrypted sheild hardware-based plus software-based file encryption.

A hardware-based encryption

Hardware-based file encryption encryption locks, many material, including layer fundamentals for vulnerable data, acceptance paperwork, made to order methods, and so on. could be trapped in a dongle.

Your security fastener interface style is divided directly into 2 kinds of parallel dock plus Flash harbour. The particular concurrent harbour would be the early on technique variety, because propagation inconvenient plus struggle together with the laser printer, and already has got much less employ. Almost all coders use are generally Flash user interface dongle.

Encryption hair on the two kinds of Computer kind, a microcontroller to get Cpu and another using a clever unit card processor for the reason that Pc the microcontroller appliance per se very easily trouble area or perhaps duplicate, so a lot more high-end security a lock utilizing a wise card processor Pc, to forestall computer hardware fracture. But a growing number of intelligent greeting card dongle split, primary, because processor chip is a bit more and a lot more sophisticated investigative methods along with resources; sensible greeting card method being composed to your chip manufacturing area to make within this program application could problem; file encryption hair of the exact same brand name the particular Cpu method is the identical, merely diverse builders facts along with critical, in the event that these types of data files are passed out and about, you can easily replicate.

Dongle carries a certain a higher level safety toughness, nonetheless in addition there are many drawbacks:

One) apply at the standard one-time constant permit, are unable to aid your results on the tryout release along with on-demand buy

A pair of) the use of hardware creation, scheduling details, installment in addition to routine maintenance charges

Three or more) is not realized the issue regarding Internet-based electronic enhancements, pursuing in addition to administration

Some) As soon as chipped, is usually ripped large quantities, it is hard to treat

A couple software-based shield of encryption

Software-based shield of encryption, electric endorsement, and certain as well separated into two types of registration plate along with permission file:

Enrollment rule is additionally referred to as the sequential range or perhaps permission rule, received by way of modification in the the software customer computer systems plus software program information and facts, the available hardware and software information, like: Computer successive number, BIOS serialized quantity, cards amount, disk drive sequential variety, computer title, and many others. . Completely transform algorithm employed your custom algorithm criteria or even normal layer algorithm formula. Customer and also first utilisation of the software package installing course of action, you might want to type in the enrollment value to make sure. Immediately after certification, software program may be used usually. The actual technique contains the advantage of your in order to register signal defense isn't hard to implement, the downside is usually that stability will not be large, struggle to achieve complicated consent needs.

Licence report and the subscription value for you to bind a similar computer hardware as well as software information, a subscription value time-span limits by using each hardware and software facts, a permission data file will use various hardware and software details. Additionally, the actual certificate file can contain details, so you're able to get the difficult authorization requirements, and might also retailer a number of end user information and facts. The typical certificate submit method to utilize the non-public major on the asymmetric protocol to help signal the permission record, as you move the general public key's baked into software program code. Uneven layer as well as decryption course of action, in which you crucial agreement hosting server is out there, it is not easy to break into throughout the study associated with acceptance docs.

What's so great about the particular digital agreement security does not require supplemental hardware, and as a consequence does not need to deploy the driver plus buyer components, electrical hardware issue. The disadvantage on the electric licenses safeguards method is just not networked people really need to manually remove your computer details, after which manually transfer subscription codes or even licenses, may not be convenient to use. On top of that, the actual domestic automated endorsement several of the designers with the products, which also limits a popularization and also campaign with electronic permission safeguard technological know-how.

Minute, it layer sector growth standing

A person. Security a lock

The main unusual dongle professional SafeNet, Inc. in the country as well as Australia Wibu.

Security tresses provider deep Supposrr que Luoke as well as Feitian. Both businesses due to the discount prices, the first one to create your intelligent minute card encryption tresses nearby well to be able to undertake a clear market place in the nation.

Only two. Digital acceptance

International business certified products and solutions to give electronic Flexera Application and also SafeNet which often, Flexera Applications are devoted to the realm of electronic digital agreement, this product's simplicity of use plus usefulness are accomplishing far better, though the expense of the item can also be very good.

A residential electric permission merchandise firm this China Biteansuo (BitAnswer), Shenzhen-use the actual (Euse) Safengine Corporation.

There are few companies will acquire his or her electrical consent plan, although the developers to cultivate their own programs normally are present the subsequent inquiries:

One) enhancing non-professionals, there are several loopholes inside stability

Two) is tough to obtain variable accreditation manage, management and mathematical functions very simple or virtually no

Several) could be introduced as a way to address the fast issue of short-term method, create far more than predicted in the future as a consequence of protection, stability along with scalability difficulties ongoing to pay

Four) are unable to fulfill market variations brought about by the revolutionary demands about software accreditation product

Application file encryption market developments

The program shield of encryption field developments is actually carefully involving the increase tendency with the software program business. Together with the interest in cloud computing and also Software, service of software package products and solutions will be alter in the way of the circle along with foundation. Used by the vast majority of software package builders, SaaS solutions will not solely save a great deal of hardware and software pay for and also servicing charges, you can also get requirement, although reducing the using chance, driving foundation providers to help continually develop solutions in addition to boost services for you to sustain shoppers.

For the roll-out of community in addition to system advancement can be another application shield of encryption technology fads. The scene about the present-day growth pattern, the actual shield of encryption secure technologies have created very experienced publication rack drawing near vividness, slowly growth. The lifetime and make use of in the hardware practice helps make shield of encryption curly hair are not able to take care of the velocity of development of online years, will be replaced by a electrical permit.

Electric agreement licence from very early sign up computer code sort to your feature-rich documents as modifications in technologies are considering authentication strategy coming from off-line yourself validate the growth of programmed community validation. Accepted control considering particularly, the electric licenses know-how from a single software package licence qualification development just as one authorized certification, consent management plus stats facts, along with other aim of equally, considerably elevated this sanctioned degree of details pertaining to program web developers.

Might forecast not able to consumer electronics accredited merchandise should have the subsequent principal features:

Good authorized managing podium: made available from third-party protection skilled software package programmers, in accordance with the Web's one-stop software package security and also permission operations foundation, without the need to install and sustain, affordable, easy-to-use.

Two Adaptable Licence: support the agreement of the purchaser software program as well as the cloud-computing model standard software package permission; approved press occasion, how many sensible web template modules; accepted so that you can hole the computer hardware and software data, encrypted sheild hair, and also using a user name and also private data verification way for consent.

Easy and warm and friendly buyer experience: in line with the World wide web, everywhere entry; Users could self serve buffet pay for, stimulate rrmprove the application, you can purchase their own software program to keep up-to-date with info; software program builders might discover more about application account activation details in addition to individual facts is usually synergies because of the individuals this company in order to complete the design of software licenses, implementation, supervision in addition to upkeep operate.

Five. Clouds licensing type: This is the cloud computing model of software program certification. Traditional software is natural purchaser rendering, permission can also be a purchaser. Whilst cloud computing could be the movement, though the transition difficult for common application will be a wonderful way for the certain amount of cloud-computing transformation. This definite realization regarding strategies, a common software program sanctioned shift in the buyer towards the cloud on the acceptance server, to make sure that small adjustments towards the software package, nevertheless, you can easily instantaneously have fun with the benefits associated with cloud-computing: higher security energy requirement to order foriegn safe-keeping .


http://www.passwordmanagers.net/products/Windows-Password-Recovery-Software-1.html Windows Password Recovery Software
Mateuš Conrad Aug 2016
i like looking up these shadow-people, the labourers
away from the spotlight, away from easy reference conclusions,
Ludovico Arrighi is among them, as is
the high jumper **** Fosbury - no belly-flop in
the competition after... after 1968 the road signs
told every jumper to expose the back and ***
when overpowering the heights -
Philippe Petit is outside the world, the ultimate
expression of solipsism, what grandeur (previous
attempts, the dyslexic source: the graphemes, æ,
previously i wrote grandeur as: grandeaur,
grandaeur, etc., somehow the syllables of only
vowels can leave you momentarily dyslexic,
when we're talking pure consonant graphemes
we have an aesthetic performed,
sheering can become šeering, whereby the diacritical
input overpowers excess spelling of graphemes,
such examples arise from what became the silent H...
or the surd H... ping-pong with the tetragrammaton...
e.g. dhal - which is said with a macron over the a:
dāl... but the trinity of spelled words gives rise
of neurosis... unless it's a word as conjunction,
the tribunal of aesthetic in keeping language beautiful
will prefer the spelling dhal or even daal rather than
what i proposed). concerning Ludovico Arrighi's
italics type... the skewed rhombus alignment /    /
is prescribed for emphasis... i need something to introduce
something that doesn't stress emphasis, but
sarcasm / ridicule... when i write something,
as i did in Christianity 2.0 (two point oh),
i'd change the direction of the ~wind, i.e. instead of
/    /    for emphasis, i'd like to stress ridicule in the
following direction:    \     .
but that's beside the point, it's like a western with
English not applying noticeable stresses...
for example the English trill, or the French hark...
they should be equipped with diacritical marks
of distinction... some sort of uniformity
of suggestion... the northerners trill (roll)
their R, the French used to, now anything but
a puddle of phlegm... but indeed, easy dyslexia from
pure vowel graphemes... cutting up graphemes
with diacritical incisions (safety, in a persistent vocabulary,
following the method of philosophical methodology -
hence my casual use of diacritics and graφemes -
i.e. when graphemes can't be constructed due
to a lacking of grapheme intention - unlike θ and φ -
supported by their alignment of a twin sound,
the Greeks would never consider applying diacritical
marks on p, t, h - unlike in Polish, where the h
is distinguished into a ch for aesthetic purposes -
e.g. chleb - bread and huj - **** -
but overpowering the vowel graphemes produced
their disappearance and the emergence of diacritical
vowels, e.g. the acute o (ó), which is a U, i treat
the diacritical mark as an incision point for the parabola,
cutting up the omicron, and that seems natural
given that the Greeks already did it without the acute
sign, i.e. the omega (the double u) - ω - again,
aesthetic reasons, the forgotten gallery of words
is there, you just have to forget Chomsky for a while.
but indeed, breaking up graphemes provides us
the necessity for diacritical marks,
the ancient Roman graphemes might have disappeared,
but they're still digitally present: mostly concerning
major words, like onomatopoeia - or encyclopaedia -
graphemes behave differently with the barbarians,
the latter encyclo- example is obviously nostalgic,
the ono- example does a reverse grapheme variation
of oe... but modernity expresses these couples
with individual distinctions - i.e. encyclopaedia
could be written utilising... well not a caron - not quiet
***, and more p'eh - the resurrection of the tetragrammaton
is necessary, i'd have inserted the variation without
minding French, i.e. grave accent on e eating away
the last vowel... or vowels... i.e. encyclopaèdia -
so avoiding the French usage that would cut off the -ia,
i'd insert it for reasons of interacting with a h, p'eh.
Joyce's Finnegan's Wake should have been written like this...
instead, it was written without noticing the diacritical
marks, and therefore made it's pompousness known
by omitting diacritical marks, therefore succumbing to
excessive spelling... or the ruin of Delmore Schwarzt -
nurse! scalpel: sch(sh /sz / š)- -wä(łä)- r(z)'t - drum-kit
wet snare tss't like in jazz.
still i need to define the R being trilled (rolling ball)
akin to the å - but of course the umlaut would do the job
likewise - but it's the aesthetic purpose that's necessary,
i guess umlaut designates an eased concept of
arithmetic included above the sound: i.e. prolonged,
count +2.

but these are but minor points of consideration,
obviously it would take decades to implement, and knowing
human endeavours in this realm, once fixed, once
fixated, nothing will hardly change - due to the already
existing utilisation, whereby it works perfectly to segregate
people... and the fact that there's no linguistic bible to
mind... but talking about orthodoxy and meddling with
dogma, i'm still bothered about the Malachi heresy,
how could it have been implemented?
i mean, a polytheistic concept of reincarnation is the oldest
form of identity theft, isn't it?
monotheism is incompatible with the concept of reincarnation,
this is the weakest spot / the blemish in Judaism...
Malachi is the actual inventor of Christianity and Islam,
he introduced the concept of reincarnation with
the return of Elijah, as mentioned in the New Testament
where Jesus is compared with Elijah...
it's a monotheistic heresy... reincarnation has no place
in monotheism, yet there it is, glaring at everyone from
the page... it was Malachi's error that gave rise to
schism... the litmus test of a monotheism is it's inability to
succumb to schism... well, Christianity is poly-schismatic,
Islam suffered an infection of schism early on...
Jewish schism?  you either practice or don't...
you either don the full attire of a Hasidic jews or you simply
turn your opinions toward earthly matters...
and so much rigour just because they didn't care to
roll the ******* back during ***, all that much work
from snipping the *******... early intervention did the job,
snip the skin off and we have the most ridiculously
funny god in the thought of man, an entire Mongolian
horde of intellectuals have been spawned from his existence...
imagine if god intervened when plastic surgery came around...
wouldn't be so ******* funny by my count.
****! listening to the radio and standing up between sentences
then realising there's no go-back button... it's live...
sometimes the oddities of not being your own d.j. can be
petrifying, when you're working against the river-current
like a Salmon of rhythm.

lastly... i guess this is a major point, in a magazine article
some dung-heap of opinion wrote something
about poetry, in ditto:
a policeman shoots dead Michael Brown in Ferguson,
Missouri in August 2014, Maggie Smith's poem
Good Bones goes viral, it wasn't about Ferguson,
it was about life being short and often terrible -
continues with: poetry is the language of crisis, of
profound thought and deep emotion, it may not be
much read these days, but it is certainly felt...

is that all true? is poetry the language of crisis?
i think that assertion is a load of *******...
it's a bit like using a hammer to paint the civil room's
walls (living room, i call it the civil room) -
if i'm reading poetry i'm not commuting or lying in bed,
i'm perched on the windowsill in a quasi-akimbo pose,
sipping a glass of bourbon with coca-cola and
smoking a cigarette, mindful of never wanting to
wear contact lenses or eyeglasses,
poetry is more than this idealism about it,
that you read poetry to savour the moment of critical needs,
i read poetry because newspaper articles **** me off...
poetry is like newspaper articles when those monstrous
literary ****** get going for months of necessary
attention to finish them... poetry, when drinking
bourbon, smoking a cigarette, quasi-akimbo on the windowsill,
perfect use of spacing, i bet most people who stick
to poetry will have better eyesight when they grow older.
Jaslin Goh  Jul 2017
Windows
Jaslin Goh Jul 2017
Windows high or low, windows sing or woe (if they could effect sounds)
Windows are protestants of peace; often the mediator between the inside and the out
They tirelessly shield us from the rain and sun, the dust and even noise, sometimes the wind itself too; so things don't topple over
There are times you open them, when you look out and think of an adventure out
There are also times you close them, when you seek some respite
Windows, if anything, are the forgotten heroes of time
They are your guides, your decision-making helpers, as is the Spirit
Their panes (pains) are to be taken care of, wiped regularly for absolute clarity
They nudge, with the help of wind sometimes, dying not to be ignored
They crave interaction with its user, oh if only our owners knew they cry
Knowing how to operate them for full utilisation is truly, a skill
Notes on the Holy Spirit
Mateuš Conrad Aug 2016
as with any plaster work, or draping muscles and bones and
organs in skin - i knew i reached a zenith of some sort:
forever introspective, that chance momentum
that never reaches a museum of retrospective
finalised banalities -
and with that's happening in America,
i get a chance glimpse into that part of the world
so bogus, so *****-like, so haphazardly
put together - the chance to see the rats (artists)
jump ship and head to Tangiers, Paris, London
(for the pillars of the movement to come,
London especially, but might i suggest Edinburgh?
the capital of the offshoot that's to come
from Scandinavian novels?) -
i wouldn't suggest heading to Prague -
or Budapest - never to tourist hot-spots, obscurity is
what you need - Edinburgh out of season,
then the theatrical circus isn't there -
***** poetics: poncy monologues and Annabel
art-house flea markets... but that's the beauty,
flea markets in France, charity shops in England...
but i did exhaust this one musical avenue,
i dropped the ᚱᚢᚾᛖᛋ - it got boring after a while:
all that charged up mythological feeling -
the way we always wanted: myths to feel with,
to eat, rather than the sterile scientific facts...
i've learned enough to later ditch them,
even a Professor of Chemistry will have a postcard
of Edward Hopper's painting by his desk,
that window to view the world that doesn't
necessarily encompass sun moon and constellations...
how anyone would be foolish to scrub off
some inspiration from such things bemuses me,
the lowest of the low of poetic expressions is
sung to things that manage too much: the moon
and the sea tides, the sun and the seasons and
phototropism - it's a double edged sword...
only from one art to another do we get to see
our labourers of attention, else the same old deficit:
god... who in his glee took offence at anyone
having more awe-inspiring sense to please such
things... no alone can you master contemplating
both the beauty and the utilisation behind such
objects as a single man... however well...
it's impossible... you're sharing the bronze platform
with those that simply wrote of the shallow
beauty, and those that found these objects
were not simply aesthetic, but meaningful in
the machinery of things... it was never up to
us to find that electric genius of combining the aesthetics
with the machinery as one...
for in that sense god is a form as fraction
of 9/1, 8/1, 7/1, 6/1, 5/1, 4/1...
the fraction of wholeness... a complete set to start with...
man has already proved the limit as a fraction
with the base 3... 9/3, and that didn't really end well...
at best man is composed of a fraction base of 2...
by sharing the world through marriage to a woman,
or through a learned devotion, a crumb of what a woman
is, a philia (love) of his interests, a soloist voyage...
some just say: you will either take to being faithful
to philology and yourself as its devotee,
or you'll take up a wife... oddly enough chemists are
defilers of marriage having any purpose other than
to distract... but as i said: you can rarely write
decent things when trying to admire celestial spheres...
more ambition comes from the distraction of the zodiac
"prophets" and astrologers... a poem about the moon
is just a poem that is levelled with a poem
about a dustbin... but hey... Top Cat lives in the dustbin,
Neil Armstrong bopped along the lessened gravity
surface... but which is easier to acquire for a smile?
Benny... cue the violin theatrics of lamenting to a comic
end.
well... we have to juggle each other's impressions,
taking at hacking the raw meat will not give any of us
medium-rare barbecue steaks marinated...
taking the moon as something else is: nice...
and you know how nice things end up as... as tacky
suburban *******... if you're going to tackle the
thing with all the rawness... i'd first spend looking
looking at that thing of your attention in a graveyard...
just to get the feel to the idea: well... my fellow daisies
sniffed from the roots up would probably have
said something sulky similar.
but it's like that, you get to exhaust certain musical avenues...
i'm currently at a period where i have enough
stash of jazz records to rekindle my interest in it...
on today's menu? the real McCoy (McCoy Tyner,
Joe Henderson, Ron Carter and Elvin Flynn -
Flynn makes his mark, even though not the star
of the album, Art Blakey has a match) -
then onto the tragedy of Sonny Clark with his
cool struttin' alongside Art Farmer, Jackie McLean,
Paul Chambers and Philly Joe Jones...
i must admit that after watching the film whiplash
my ear-buds staged a coup to move from a certain
type of music into this... and even though
i already said that the climate in America at the moment
is very a second attempt at a Beat movement...
it's very much different... i guess jazz makes all the sense
in a pure urban environment...
jazz and urbanity, the hipster parties where wine flows
like poetry and people get to do their wild marijuana
******... but Bukowski changed everything
by bringing a taste of the classical into the scene...
it feels just like that these days...
there's no jazz on the radio...
going back to watches and radios, mono-utility things
that are the glamours of the inoffensive cluttering of a room...
no digital screen... the radio position at the back
of my head, behind me, the little fly-eye Rubik cube
ahead of me...
that's the odd thing with coming with jazz these days...
it's like Bukowski in the shadows of the beat movement
back when it was the beaten track...
so i said that jazz and urbanity are perfect partners...
well... take jazz from an urban environment and put it
in a outer-suburban environment, in a place
about 30 minute walk from farming fields with bulls
and horses... foxes the thieves rummaging in people's
trash... and... as classical music took to
teaching us the language of celestial bodies,
Holst... in this kind of environment jazz does the same...
jazz becomes equal to classical music with celestial
bodies... i'm just wondering if there are enough
instruments to arrange the solar system...
Mercury the Trumpet...
         Venus the Double Bass
Earth the Piano
                       Mars the Drums
Jupiter the Tenor Sax                                   (comparatively,
                Saturn the Soprano Sax                using a Holst
                                                           ­        schematic, the reverse,
                                             yet citing Jupiter, not as a planet,
                                           well, the bellowing voice of paternal fury)
Uranus the Clarinet
                                           (takes sheer magic to play that thing)
so that just leaves us with an Neptune as either
   Alto Sax or Trombone...
but that's how jazz morphed since it last came across
poetry... someone stole it from its urban environment
of busy streets and ugly manners and quick quick snappy
and the millionth time i could compare it to a spontaneous
encounter with someone in a bar... jazz lost its cool there...
people said the same thing about jazz
as Kaiser Joseph II did of Mozart... "too many notes"...
translate this urbanity into an outer-suburban environment
and put it against that kind of backdrop?
well... personally, there are just enough notes in each piece...
you looked outside the window? you could hear
a **** from a mile away and no tree would even sway
in nodding approval even with a galeforce wind slapping
them... jazz lost its synchronisation with the urban environment
it emerged from... but in so doing, it managed to mature
like good wine on the outskirts of large cities,
where it literally became the only thing that could ably
make a Kandinsky moment from semi-detached houses.
NEWSFLASH... what is this concern about art being
subjective? i don't see where these arguments go...
i thought art was about revealing the intimate,
not revealing the objective shallows of a method...
of limited scope like any philosophical systematisation...
if Christopher Columbus ever did things
objectively he might have discovered Lisbon or the Canary Islands...
art can't be objective... trying to argue that art is
"only a subjective" expression... well, if it was to be
a "greater" expression objectively, an artist would
walk into an art gallery, take all the paintings from
the canvases, and turn to the public and say:
now let's see your subjectivity, otherwise go ponce
off the art critics to take something they said to your
date about how: the light contorts the features of expressions
blah blah blah blah blah... the point of art being
superior as a subjective vehicle is so that i can feel someone
else's feelings... as opposed to thinking someone else's thoughts...
art is the sensual, not the premeditated dogmatic funeral -
which all philosophers attend: they're objective to the
point that they're afraid of having a personal attachment
to their outputs - they will hardly ever want to invite
a criticism of their objectivity, because they're such emotional
paupers - they fear criticism of their subjectivity to such
a point, that you can simply look at their pronoun usage
strategy, they really do use these words like kings -
but when Mozart is criticised by the Kaiser... he thought
nothing of it... he actually thought, nothing of it,
perhaps his vanity was wounded, but his virtue wasn't...
which is why he remains with us...
for the fatal wound incurred is not that of virtue,
but that of vanity... and true virtue is unafraid of criticism,
there's this cognitive blockage that enriches the
heart and leaves the mind blank... the sort of blank
that accommodates the Pyramid of Vanity:
bishops, priests, doctors, kings, queens, portrait artists,
Versailles... such things are so ****** void of anything
but scare-mongers, sycophants, leeches and finally tourists...
for whatever you take from the realm of Hades,
there's a stamp-duty on each precious element from that
realm... each thing is stamped: worthless...
you couldn't extract penicillin from Hades...
changing gold into a ring is worthless if such symbolism
of a union of monogamy end with the ring being
nothing more than a thing disputed over the divorce settlement.
Mateuš Conrad Apr 2016
maxim utilisation does not necessarily
create a symbiosis between
the unitary appropriation of universals
and particulars, old Socrates knew this,
he knew the problem well recorded
by Plato: a rich man can have all the needles
and camels he wants...
maxim utilisation works miracles
for the rich, handy truth being:
i have life insurance and a pension,
but i'm still stuck in a trench with
high-school memories and a house with
20 bathrooms but only 3 bedrooms,
hence i'm the Chieftain of Microsoft...
the rich know the best maxims,
the poor know the best narrative...
i'd rather hear the narratives than the maxims...
maxims are utilised by the rich
in a way that does not allow success,
they speak fluently in terms of success stories,
but they sell them, meaning there's a limited
success rate; meaning their narrative sounds
are a bit like: if i ****** this guy over, and this one,
i cup-caked this one into a half-baked scene;
yep, ****** this one, and this one, and this one,
and this one over twice... but hey! i'm rich!
Mateuš Conrad May 2017
by my count?
                                eight knuckles;
and two folded thumbs;
i can't believe i have to
make language thought,
worthy to cushion
the violence, in the language
said, and then acted upon;
there's seems to be no bravery
for speaking in public these days:
people have seemed to
have forgotten the "pleasure"
in thinking;
     and by any danes' state of
affirming the maximum economy
utilisation of a maxim...
there's more freedom in thinking,
than there ever will be...
in speaking, and defending that
sort of "right"...
you have a right to think,
and use up the pacifist canvas of a
blank page...
          amendement 0...
the freedom to think, and to have no
need to transcend the mental realm
and, utilise calories,
worthy of a worthwhile engagement
in a pish-poor reengagement in
the socratic, long lost and forgotten
art of dialectics;
if plato would be to have woken
up yesterday... dialectics to him
would be a single expression:
why are they shouting over each other?!
people want to rekindle the concept
of dialectics... but in a language base
that employs no diacritical utilisation...
no wonder they're going to succumb
to mob rule... no diacritical inspection...
    no dialectics; just mob rule...
and the "sharpest" idiot shouting
the loudest, but hopefully, the least;
it's just that, the argument for
the need for free speech...
    it's like the little dogs barking too much...
and little dogs do bark too much...
you want to hear a rottweiler bark?
oh sure... you can stomach a poodle's bark...
come... let's have a riot...
            and hear a rottweiler bark.
Mateuš Conrad Feb 2017
of said god, can't i complicate language to the point where it can even remotely contrast with some science? i just want to explain an antithesis of language having the cursor, torjan horse character of being useful... for one thing only: some exploit. can't language become as complex as the person, that language can only become complex with a person throwing themselves into some activity, and subsequently abstracting language, for the basis of per se? i can't use language to define the need for the concept of debt... or... money... mythical beasts akin to the Minotaur? sure, they pass my gaze almost everyday... could it ever not be a case of one instance, that applies complexity to language per se, rather than as language with complete utilisation in a nieche subject area? surely if there was no language per se mechanisation of someone thinking about it, there would also be no dyslexia... language as a per se complexity doesn't require specific areas of interest to "complicate" it further: hands already do what hands are capable of... rarely do tongues turn into egos that later hands are capable of when practising table manners; or for that matter... seeking audience in a parliament; can't language be complex for the basis of per se? evidently some of us would like for language to have this element when it is concerned... couldn't the language's per se then be nothing less than a cursor, or a motivational factor, to upkeep it, to invoke a survival instinct, to continue using it? indeed, philosophers speak of the term per se, or clarifying it with the noumenon.... the same is true for poets, and metaphor; you put something in it, something else comes out, notably counter to your original expectation.

i once brought a hedgehog home
and showed it to my cat,
like when i built a theme park for a mouse
i was chasing for my girlfriend to
see, dangling it by the tail once caught,
to later see the mouse commit suicide,
running off the stairs in an Edinburgh tenement...
in a bedroom, a whole theme park
of worth sketch, the dire death of thrill
seekers, subsequently happened (as that i am,
quick to tango to the song Beorn);

   call it: language as not intended to give
instructions... not adept to caste concepts...
        language as something appropriating
experimenting with lysergic acid...
     i never cared to write my knot of language
as if it might make someone else
        use their limbs... put up a table...
last time i checked, language wasn't about
being oppressive...

i once owned a jaculus jaculus...
   this ugly ******* told me that if i dropped
it from a height it would survive...
i dropped it, and the joke subsequently went:
the parachute didn't open...
    the trauma seems to have bloomed...
right about not people can stop talking
or have anything meaningful to say to me...
it's not that i'm pretending to be deaf,
i'm just deaf concerning what they have to say...
just so happens: if the devil isn't listening
then there's no need for a god either.

these moments! these moments are real!
they're the only things that matter...
and when they shout
allahu akbar, is saddens me,
because i swear i just learnt
the *shahada
of la ilaha il allah...
only by heart's command,
and do, what only the heart cares to will...
for then you will something
meaningful, and so much less ordinary...
or just allow a Turk to speak...
and a Mamluk to listen...
we have to borrow from history,
to actually address it, keep it, face up to it...
existentialist philosophers are thieves,
Judases...
          we need no "    " zoo to teach us
the second lesson of acquring words
and having no mathematic clarity,
   so it's all left on the care for flimsy...
and only a turk, can say the word
shaitan to then see me weep...
it just so happens, that you can write
something and cry over it...
         and the people, and the world,
and all that heidegger *******,
simply becomes: a hush....
         it just dies off, it a symphony with
a deaf person "peering" into it,
instead the sound of a violin,
all he gets is wet ****... and sloppy ****
for seconds...
or a blind man asking for glasses when
reading homer...
                i'd love to pity them,
but our culture has too much concern
for stating a delay in sympathy,
and too little, immediate empathy...
   i don't cry because i'm unhappy,
i cry because of the memories i have,
and that's what's sad... well... "sad"...
i listen to a kultur shock akin to
zumbul, shaitan and sarajevo,
and i weep...
              the myth goes,
had the devil a limb to stretch out,
the forbidden fruit of eden would
have been his heart:
you give people an apple, they come back
with cider... so what's new?
oh man, and in need of a fathered stock...
boundless in your neglect,
   perpetuating your fore
    by ascribing so much onto abandon
and: isn't oliver twist just as much a myth
as god?
            what, then, mana?
some deeply desired energy that eventually
alienates you from others?
           if language can be anything,
it can at least leave you reading something
that has no need to instruct...
                 back in the 1960s they took too many
drugs and wrote too much about them...
now that psychadelic drug experiments
having a running narrative, what's the point,
of even taking them? i'm part of the dodo project,
and i wish those hippies didn't write so much
about their experiences....
  it sorta makes me not want to have the experiences,
how they defiled the original premise,
hiow god (words), shouldn't be grounded in these
trans- experiences...
               oh ****, have then, take those cactus extracts...
but please don't write about them!
that's precisely me, reinventing drunk...
   watching billions with only one eye
open... because if i look at the t.v. with
two eyes i'm dazed, swimming under water,
who the **** turned on this carousel?!
    i so wish they had their beat generation moments
and didn't exploit to have to write about
psychedelic drungs...
    i'd like to have taken them...
             now i can't...
  i'll be paranoid when i'm unable to write a poem
about the experience... back to drunk me...
turning panicky watching a television with
only one eye open to stop the imitation "dizzy";
might as well be a fish in water...
     mate, what a bother...
      i rarely experience being drunk...
           but when i do i know that impromptu cyclops
allows you to concentrate on a t.v.,
and nothing is really spinning.
Mateuš Conrad Jan 2016
you can't learn intelligence,
you must be born with it,
you can learn from rhetoric
to imitate intelligence on the sly,
but eloquent speeches
are only orated once all the facts
happen, and such eloquence
ought to be used to predict calamities
ever happening, or if happening,
ousting a humbleness and immersion
in being anointed by them happening
for pride's self-worth as a welcome
emotional utilisation (for
a better accumulation of predictable
thought): better than a broom
to sweep old vacant apathetic dust i say;
god, this almost sounds like a self-help
book... got to surd it... gnome (g is a surd
in this e.g.), psychology (p is a surd in this e.g.):
so if other european languages used the latin
alphabet with stressors / diacritical marks,
there's an unspoken surd system in e'ng-galosh.
Rainbows for chasing,
the moon for the aiming,
forming in clouds, faces
for inspiration,
beckoning, is life ahead
full of credible opportunity,
beside empty promises creating,
truthful reality.
Standing tall, girding *****
I, reached for the unreachable
so - distantly close,  impulsive forward, surges.
without doubt,
or plan,
missing by the - conceivably smallest,
actually - furthest amount,
yet still moving through,
pushing the immovable, climbing
the inaccessible,
falling - frequently,
never reaching nethermost depth,
buoyed by a recognition,
realising - all this fighting - striving
failing - miserably,
doing it all - wrong,
was not failure, but a justified lesson
on coping in the mire of existence.
The rainbows beauty explained in science,
gives it simplicity. A reality water and sunlight,
nothing really to chase,
or catch.
Moon - oh moon - my most favourite, still my dreamstone,
is but a stark beautiful presence,
removing sunlight reveals a satellite bleak,
nothing is here to seek,
or take aim,
likewise our cloud perceived faces,
expectations are best - unexpected.
If controlled by endeavour and aquasition
disappointment may be somewhat - repositioned,
attainment of skills formerly devoid of utilisation
revived, re-given to make something, that in truth,
can be ameliorated.
if only to yours truly
.
Still Chasing Rainbows . Michael C Crowder 10th March 2019 @scorsby
one day at a time
Mateuš Conrad Nov 2017
i bow before the humbled one, for i abide by no credo of a torture instrument; better bestow my hopes on the hopeless one, than entertain the audacity of those who bypass him, un-humbled, not guardian of the attire of a hunchback's garb in body, or shadow... i pledged my allegiance to the one seeking solace in ensuring the lie was but a joke, the one who nourishes my tongue to flourish, bloom and be a gift of flowers, upon a barren sea of striking grass... may i consider myself to be his second apostle in this verse of tongue, and may i receive the same proof of guidance, by being blinded, akin to my predecessor; unless i be blinded twice-over, by having reached a stage of writing: the most ugly choice of words, worthy of nothing more than, a place in a newspaper.

i believe in facts, oh yeah,
facts are important -
but not when they're
paced to an encyclopedic
barrage's worth of
regurgitation...
             this whole **** about
writing history
without actually making any?
that kills the greyest of
the grey matter in a person's
brain.
    i truly think that
we've become vultures of
the past,
           we're sucker-punching
the dead into waking up
once more...
            fist-******* the dead
into staying awake,
when they're clearly dead-asleep,
championing the warrior
in a society of incubated
violence surrounded by
         pacifism and dead-weight
**** -
          strange,
female genitals were always
considered a currency,
while the male genitals always
the warring mechanisation
where the other organs
managed to congregate -
           what's worth celebrating
the "warrior" these days?
probably about as much worth
celebrating filling a shoe
  with 200 peanuts...
               sure, bulging,
sure this that and the other -
they should at least allow these
gym freaks to produce electricity
by allowing them to work
that hamster wheel of the tread...
they could generate about a day's
worth of light-bulb energy in
an hour session at the bulging
protein parlour.
                 point is,
i feel that i have no place in history,
just a tomorrow and
a yesterday...
   i hardly think there's a today when
i think of today in the cofines
of a tomorrow or a, yesterday...
just another hour,
  with another "hour" added to a day,
a month, a year...
                  and it can only
be said is that the most honesty
you find in people,
is in their dishonesty...
but i am under the impression,
in Milton's terms:
that lying ought to begin with a joke,
be attired in mischievousness -
to tell a lie is to also tell a joke...
  *dico mendacia etiam est dico iocus
,
how the satanic "lie" of eden is
now misrepresented, and taken toward
the heights of overt-seriousness...
for all our quests in understanding
of the originality of a sin that's
without any originality to abide by:
a mere plagiarism of the gods...
                  the court jester is riddled
in what was no lie, but a mere joke;
when an angel lies, he jokes...
it is unlike the same utilisation of
lying that a man makes use of -
there is no humour in a man lying,
only the hidden hand, the strings,
and a puppet.
                       man is no liar for
the chance of a good joke,
man lies for the desire to manipulate...
which is why i deem, akin to Milton,
satan, the father of my narrative,
as well as the much respected heckler
in a crowd of: mutes.
Mateuš Conrad Apr 2018
Mozart, as the easy way out...
to be honest, it's not that it's not that
great... and not because
I'm hardly a snob...
but I'm also hardly a pleb...
but necrophilic sycophancy goes like
this...
a dozen leeches...
stuck to a tapeworm...
    to the current man...
  an eclipse of the genius dawns...
minor composers,
those entrenched in movies...
         a dozen leeches strapped
to a tapeworm,
sycophancy post scriptum...
         which means: the worst kind...
came I with anonymous,
not the subjective I
but the objective I...
    counterfeit strings and
puppeteer, be it closer to sigma
than a soul and... puff...
a damp thing exploding...
like a Pavlov man's eye
drooled off the salivating canine
tip of tongue...
zest, or anticipation of lemon...
or rather a naked corpulance
one might ******* to
appreciate the ***** tasks
of 18th century, woman...
              no go zones are:
Mozart, slums of Vienna...
Malmo, slums of Schveeden...
     every time i hear
an ode to someone dead,
I sometimes think about the ode
as: and may he remain so,
may he remain as dead and dedicated
to no second example akin, ever...
but then again this
necrophilic sycophancy has
a natural utilisation for
the onlooker...
namely the modern concept of
fame...
            if there can be
an art for "art's sake"...
   why can't other areas
be allowed a per se...
an the absurd jack-in-a-box?
******* seems like
a morbid inversion of shying
away from, what becomes of
a woman... the blossoming of
biological mechanisation in
retreat of, the hidden hybrid
manifest in youth...
just a thought...
as ever,  surprised...
beer in hand, a man in middle
age walking door to door giving
out leaflets... suddenly a door
opens and a foot emerges
kicking him in the face...
the sight of...
a ******* rehabilitation
programme...
funny...
              there is no,
rehabilitation programme...
not when there's mob rule...
akin to this spectcle...
imagine, walking down a street,
a man is walking ahead of you,
knocks on a door, and receives
a ******* kick to the head...
******* or no *******...
******* stood his ground
like a copper statue of Joseph...
in Stalingrad.

— The End —