Submit your work, meet writers and drop the ads. Become a member
Michael W Noland Sep 2012
[A] is for
An
Archer with
An
Arrow through his
Adams
Apple, very
Applicable, to the
Ample
Amounts of
Amiable
Attitude,
Adorning his heart, in
After
Action
Attributes, that impart, the
Admiration, of
*******, in this
Acting out of
Arrogance bit. he is,
Astute, in his
Allure, and
Aloof, in the
Air, of
Aspiration, in which, he was
Alienated in the
Agony, of
Asking
Assassins, the
Aforementioned. lights, camera,
Action. recipe of the
Ancient
Admirals of
Avian
Aliens, that
Attacked, with the
Arms and fists, of
Arachnids, now
Aching to be
Activated in sudden
Allegiance to the
Answers, of the truth.
Accumulating wealth for
Anarchy's of
Abating
Angels in
Atrophied,
Alchemical
Academies of the ever
After life .. . of silence.
****** strengthens in these
Accolades of violence, in
Alliance to
Appliances
Appearing in the
Arson of
Apathy, happily, to
Anguish in the
Amputation of my
Abdomen, if it meant i'm a real
American, even, when, only
Ash, remains.
Acclimating in its remains
Attained, the
Articles of my pain, in
Affluent shame, next time ..
Aim... oak
[A]?

[B] is for the
Bah of
Black sheep, and
Big
Bit¢hes, fat cats,
Bombarded in the
Blasted,
Bastion of
Blackened
Benevolent
Blokes,
Berating the
Blasphemous,
Be-seech, of
Brains, to feel
Bad, about the
Blotching of
Binary codes, erroding, the
Blanked out
Books, of
Belittled
Bureaucrats,
Bowling
Back the
Bank rolls of
Betterment, from the
Back of the
Blackened
Bus, as i'm
Busting guts, in the
Bubbling
Butts, of *****
Benched, but
Beautiful, in the
Battle, in the
Bane, of existence.
Baffled, in the strain of
Belligerence, in
Beating the
Beaming
Butchery into
Billy's
Broken
Brains, in
Bouts, of
Battering
Bobby's for
Bags of
*******
Before, affording to
Build
Bombs, is just
Beyond
Breaking
Beer
Bottles on the
*******
Benefactors of
Boulder
Bashing with the
Beaks, of
Birds, with no
Bees. just a
Being, trying to
[B]


[C] is for the
*****
Courting the
Choreography, in
Computerized
Curtains,
Circumventing the
Cultured,
Contrivance of
Chromatic
Cellars,
Calibrating, to the
Contours of
Calamities,
Celebrating the
Cyclical,
Cylinders of
Cyphered
Calenders,
Correcting the
Calculations, of
Crooks
Coughing, in
Courageous
Coffins of
Canadians,
Collecting
Cobble stones, from
Catacombs, in the lands of the
Conquered,
Capturing the
Claps of thieves, sneaky
Cats, of greed. its
Comedy. oh
Comely, to my
Cling of
Cleanliness, and for your self
[C]

[D] is for the
Dip *****, as they
Delve
Deeper in the
Deliverance, of
Deviant
Deities,
Dying to
Demand
Dinner
Delivered in the throws of
Death,
Deceiving
Defiance of
Darkened
Dreams,
Demeaning that which
Deems the
Dormant of the
Dominant, to be
Demons of
Deviled
Devilry,
Dooming us for
Destruction.
Deploy the,
Damsels in
Duress.
Defiled and
Distressed,
Detestable and
Dead. in the thump of
Drums,
Dumbing down the
Debts of,
Dire regrets.
Dissect the
Daisies of,
Disillusion, in the current
Days,
Diluting night into
Dawn,
Disconnecting the
Dots of the
Dichotomy, and arming me, in the
Diabolatry, of,
Demonology, as i watch me
Dwindle away, the
[D]

[E] is for
Everything in nothing,
Eating the
Euphoric
Enigmas of
Enlightened
Elitists,
Exceeding in the
Extravagant
Essence of
Esoteric
Euphemisms,
Escaping the
Elegance of the
Elements in the
Eccentricity of
Eclectic
Ecstasy,
Exhaling, the
Exostential blessings, of inner
Entities, and renouncing the
Enemies of my
Ease,
Easily to appease
Extraterestrial
Empires,
Extracting the lost
Embers of
Enlightenment, in
Excited delight, but to later
Entice, the fight, and
Escape, like a thief into the night of
Everywhere,
Entering the
Exits of
Elevators leading no where, to
Elevate, this useless place,
Encased in malware in the
Errant
Errors of
Every man,
Enslaved, of flesh and
Entrails,
Enveloping the core of
Everything, that matters,
Enduring, the chatter, of
Evermore,
Ever present in
Everybody
Ever made to take
[E]

Funk the
Ferocity of
Foolish
Fandangos, with
Fanged
Fanatics,
Fooled in the
Fiasco of
Fumbled
Fantasies,
Falling through the
Farms of
Freely
Found
Fans,
Flying in the
Fame of
Fortune.
Fornicating on the
Fallen
Fears of
Fat
Fish getting their
Fillet of
Fills.
Feel me in the
Frills

Granted with
Generosity.
Giblets of
Gratitude and
Greed,
Greeting the
Goop and
Gobbled
Gore,
Gleaned from the
Glamour of
Ghouls in
Gillie suits,
Getting what they
Got
Going, in the
Gratuitous
Gallows of a
Game
Gaffed by
Giants.

Hello to the
Horizon of
Hellish
Hilarity, in
Hope of
Happy, to
Heave from
Heifers, to
Help the
Hemp
Harshened
Hobos in
Heightened
Horror, to
Honor the
Habitats of
Hapless
Habituals,
Herbalising the work
Horse, named
Have Not, in the
Haughtily
Hardened
Houses of
Happenstance.

Ignore the
Ignorant
Idiots, too
Illiterate to
Indicate the
Indicative
Instances of
Idiom in the
Irrelevant
Inaccuracy of
I,
In the
Intellect of
Idle
Individuals,
Irritated with the
Irate
Illusion of
Idols
Illustrated upon the
Iris,
In the
Illumination of
I.

******* the
Jobless
Jokers, and
Jimmy the
Jerkins from their
Jammie's, in
Justified,
Jousting off the
Jumps, in
Jokes, and
Jukes of
Just
Jailers,
Jesting for
Jammed
Jury's to
****
Judgment from the
Jitter
Juiced
Jeans of
Jesus.

**** the
Keep of
Khaki-ed
Kool aid men,
Kept in the
Kilometers of
Kits,
Kin-less
Kinetics,
Knifing the
Knights of
Kneeling
Kinsmanship,
Keeling over the
Keys of
Kaine, with the
Karmic
Karate
Kick of a
Kangaroo.

Love the
Levity, in the
Luxurious
Laments of
Loveliness,
Lovingly
Levitating in
Level,
Lucidly.
Living in
Laps, of
Lapses,
Looping, but
Lacking the
Loom of the
Latches
Locked with
Leeches of the
Lonely
Lit
Leering of
Lightly
Limbs, that
Lash at the
Lessers in
Loot of
Lost letters,
Lest we
Learned in the
Lessons of
Liars.

Marooned in
Maniacal
Masterpieces,
Masqueraded as
Malignant
Memorization's of
Motionless
Mantras, but
Merrily
Masking
Mikha'el the
Mundane, who is
Musically
Mused of
Monsters,
Mangling the
Monitor, but
Maybe just a
Moniker of
Marauders.

Never to
Navigate the
Nautical
Nether of
Never
Nears.
Not to
Nit pic the
Naivety of
Nicety.
Notions
Neither take
Note
Nor
Name the
Noise of
Nats in the
Nights of
Neanderthals
Napping in the
Nets of
Ninjas

Ominous in the
Obvious
Omnipotence of
Oblivious
Obligatory
Opulence,
Of
Other
Oddly
Orchards
Of
Offices,
Ordaining
Orifices in
Offers of
Ordinary
Ordinances in
Option-less
Optics,
Optionally an
On-call Oracle, in
Optimal,
Overture.

Perusing the
Pestilent
Pedestals of
Personal,
Parameters,
Pursuing the
Petty
Plumes of
Piety with the
Patience of a
Pharaoh,
******* on the
People with the
Penal
Pianos of
Port-less
Portals, in the
Paperless
Points in the
Palpal
Pats of
Pettiness.
Poor, but
Prideful.

Quick to
Qualify the
Quitter for a
Quick
Quill in
Queer
Quivering of
Quickened
Questioning,
Queried in the
Quakiest of
Quandaries.
Quarantined to a
Quadrant, of
Quagmires.
Questing the
Quizzing of
Quotable
Quartets.

Relax in the
Relapse of
Realizations, and
React with
Racks of
Rolling
Rock to
Rate the
Rep of the
Rain-less.
Roar in
Rapturous
Rendering of the
Random
Readiness in the
Ravenous,
Rallying, of the
Retinal
Refracting of
Reality.
Realigning, the
Righteous
Rearing of the
Realm, and
Retrying.

Steer the
Serenity in
Sustainability, and
Slither through the
Seams of
Slumbered
Scenes.
Secrete the
Solo
Sobriety of
Sapped
Sassys,
Salivating upon a
Slew of
Stupidity,
Steadily
Supplied in
Stream,
Suitably
Slain in the
Steam of
Sanity.
Sadly, i
Still
Seem,
Salvagable.

Topple
The
Titans in
Tightened
Terror.
Torn
Territories
Turn
Turbulent in
The
Teething of
Totality.
The
Telemetry of
Time,
Tortured of
Torrent
Theories,
Told in
Turrets of
Transpiring
Terribleness, from
Tumultuous
Tikes unto
Teens,
Trading
Toys for
Tea.
Thrice
Thrusted upon by the
Tyranny of
Tanks.

Unanimous is the
Ugliness in the
Undertones of
Undreamed
Ulteriors
Undergoing the
Unclean in the
***** of
Utterly
Upset
Users,
Uplifting the
Unfitting
Ushers in
Underwear-less,
Ulcers,
Undergoing the
Ultra of
Uberness.

Venial in
Vindictive
Viciousness of
Vindicated
Venom,
Venomously
Vilifying the
Vials of
Villainy in the
Veins of
Vampires,
Validity of
Valuable
Violence, is
Valiant in the
Vaporous
Vacationing of
Vagrant
Vices.

Why
Whelp in the
Weather
When you can
Wave to the
Whirling
Wisps,
Whipping Where the
Whimsical Were
Way back in the
Wellness of
Whip its,
Wrangling my
World,
With
Waterless
Worms, as
War shouts are
Wasted in the
Wackiest
Walks of
Waking
Wonder.

Xenophobic
Xenogogue, of
Xenomorphic
Xeons, turn
Xyphoid, in the
Xenomenia of my
X, my
Xenolalia of
X, to
***. im lost in the
Xenobiotic zen of
Xerces, on a
Xebec to the
X on the map.
Xenogenesis, in the
Xesturgy of my
Xyston
Xd

Yelling
Yearned from
Yelping.
Yard
Yachts
Yielding, to the
Yodel of
Yeah
Yeahs, to the
Yapping of
******
Yuppie
Yoga
Yanks, over
Yonder.
Yucking it up with the
Yawn of a
Yocal.

Zapped from a
Zone i
Zoomed with
Zeal in the
Zig and
Zag of my
Zapping
Zimming
Zest, upon a
Zombie-less
Zeplin.
Zealot,
Zionist, or
Zoologists,
Zeros or ones, just
Zip your
Zip locked. and
Zzzzz
Zzzz
Zzz
Zz
Z
Zero
this is a work in progress
HelpingHand45 Feb 2018
I hitch a ride on the Battle Bus,
Everyone else jumped out, I must.
I deploy my parachute below,
I glide my way to Moisty Meadow.
As I land I slurp some shields,
Extra health and a pistol I wield.
I loot the houses and **** the squads,
Which would not be possible without my mods.
I run from the storm throughout the game,
I post on the 'Gram that I won for fame.
Everyone that saw my Victory Royale,
Commented below and said "Dang, Wow!"
Now that I won, I'm the coolest around,
I walk down the halls with a figurative crown.
Giving joy, getting joy, never coy,
Often pretty, always called a toy,
She sells all that there is to deploy.

And there is she who is demure;
A teacher whose job is secure.
Some say that all teachers are pure.

And there is he who is a professor;
He is his father’s successor;
Just like his father’s predecessor.

The first one we call a *****;
She prostitutes her body more and more;
But the other ones we adore.

The professor prostitutes his knowledge.
He also sells his precious time.
And the teacher too makes the same pledge;
Especially while she is in her prime.

We all ******* something every day;
Yet only the first one’s a *******; yay!
Hossein Mohammadzade
anastasiad Dec 2016
Software program designers ordinarily apply certain types of layer technological know-how to shield their software to avoid illegitimate apply. In addition need software layer software is permitted to obtain articles, to be able to boost product sales profit.

Software package encryption technology is split in accordance with whether or not the by using a devoted hardware-based encrypted sheild hardware as well as software-based security. Hardware-based layer, layer have to bind having a focused hardware unit, the particular electronics shield of encryption layer head of hair, typically referred to as the dongle. Software-based layer, encryption does not need focused electronics, typical executed digital camera permission while using the your fatal unit hardware and software data, also referred to as this electronic digital endorsement styles.

Simply consider drive-based electronics encryption stability when compared with software-based shield of encryption will not be suitable, as the more linked to program security, like encrypted sheild products and solutions, stability, encrypted sheild plan style, software, systems, , equipment, details marketing and sales communications, and the like, is really a detailed technological spots, not alone by a to discover whether protection.

Far away, the market industry promote of the digital permission along with security tresses are evenly coordinated. Behavior and also fantastic factors, the actual layer hair likewise enjoy a certain share of the market. File encryption hair, however, will be the network produced merchandise in the instances, can be a pure consumer technology, insufficient operations and also record capabilities, the inclusion of appliance manufacturing, strategic planning, driver installation annoyance, but not only the high cost, and might stop obtained multilevel submission and sales of your computer software, is definitely gradually diminish.

Enhancing the electronic acceptance that is certainly while in the ascendant. Electrical certificate protection approaches are getting to be progressively more included in the Internet technology, cloud computing and also SaaS thought is not just easier to make use of along with cope with computer software electric situation and be able to accomplish, but according to present day natural low-carbon improvement strategy, has got supplanted the encryption curly hair Outstanding software program encryption market trends. The more well-known businesses on the planet, Microsoft, Sun microsystems, Autodesk, SIEMENS, Adobe and various computer software are electronic consent safeguards function.

In the nation, using file encryption software package coders fasten greater premiums, along with international routines and also historic causes of the actual continuation with the next 2 reasons:

One particular every day producers typically regarded security encrypted sheild a lock electronic digital authorization.

There's not just about any readily available electronic digital licence products and solutions too big, the asking price of foreign electronic digital permission.

In reality, while using the rising betterment of your multi-level surroundings, your system triggering for the majority of home end users 's no trouble. And even brought up previously, which the point of view from the safety of layer head of hair electric permission on the sides completely wrong. From your reasonable mindset, this file encryption hair as a result of computer hardware copying much easier to crack, but accomplished piracy business sequence has been made. In its place, electronic digital endorsement because appliance is not replicated, but in addition should system arousal plus approval, in reality, have good safety outcome. Additionally, your every day has showed up in some accredited goods give electric 2-3 enterprise will have to improve while using growth of China's software package sector and grow up.

As a result, your layer computer software market styles hardware, web 2 ., and details technologies. Below, we speak about, in the application encryption approach specific to be able to detailed application encrypted sheild establishment plus progress craze of the marketplace.

Very first, the software encryption approach

As mentioned previously, it encrypted sheild technologies are divided into security hardware-based as well as software-based security.

Your hardware-based shield of encryption

Hardware-based encryption shield of encryption locks, many important info, like shield of encryption secrets to vulnerable information, consent paperwork, tailor made sets of rules, etcetera. can be stored in this dongle.

The layer fastener screen variety is split in to 2 kinds of synchronised slot and also Flash interface. This simultaneous port could be the very early technique type, because the propagation troublesome plus clash while using the printer's, and after this has less apply. A lot of builders employ tend to be USB slot dongle.

File encryption hair from the two kinds of CPU form, the microcontroller to get Pc and another with a clever minute card processor for the reason that Pc a microcontroller computer hardware by itself conveniently trouble area or content, therefore an increasing number of high-end file encryption a lock employing a intelligent credit card chips Central processing unit, to stop hardware break. Although a growing number of clever card dongle crack, initially, because processor might be more and even more leading-edge analytic techniques and devices; sensible card program to be written to the chips manufacturing unit to make during this time method may possibly trickle; encrypted sheild tresses of the identical manufacturer your Processor process is the same, merely various designers facts as well as major, in case most of these records are passed out there, you can easily clone.

Dongle features a specific level of security power, but you can also find a number of drawbacks:

One) apply at the regular one-time never ending license, can't assist in the achievements of your trial model along with on-demand invest in

3) the presence of electronics generation, logistics, assembly as well as upkeep charges

Three) is not achieved the issue with Internet-based electronic digital improvements, tracking along with control

Several) Once broke, may be burned huge, it is sometimes complicated to remedy

A pair of software-based encryption

Software-based encrypted sheild, digital acceptance, and certain in addition separated into home equity loans number plate along with licenses document:

In order to register code can be referred to as successive number or consent computer code, acquired using a alteration in the the program end user computer systems along with program facts, possible software and hardware facts, including: Cpu serial number, BIOS sequential amount, greeting card amount, harddisk sequential number, computer system brand, etc. . Completely transform formula made use of your customized protocol or maybe conventional shield of encryption algorithm formula. Customer as well as primary utilisation of the computer software installment practice, you might want to type in the enrollment value to confirm. Following verification, it can be employed typically. The particular strategy has got the good thing about this subscription computer code defense is easy to use, the downside is always that security is not really higher, not able to attain complicated endorsement demands.

Permission submit as well as the signing up code in order to situation the same computers plus software information, simply a registration signal period confines utilization of both software and hardware information, a permission record can use numerous hardware and software info. Also, the actual permission report can contain more info, to help you obtain the difficult agreement demands, and may perhaps retail outlet several customer facts. The average permission report way is to implement the private key in the asymmetric algorithm to hint your certificate data file, while the general public secret is embedded in the application value. Asymmetric shield of encryption plus understanding course of action, the private computer essential consent hosting server exists, it is hard to compromise from the investigation regarding endorsement paperwork.

Some great benefits of this electric endorsement safeguard doesn't require further electronics, and for that reason doesn't have to mount the motive force as well as buyer elements, electronic digital hardware issue. The disadvantage from the automated certificate safety mode just isn't networked buyers really need to hand remove your computer information, and then personally significance registration constraints or even permission, is not very easy to use. Additionally, the particular domestic electronic digital acceptance a few of the programmers from the product or service, that also limits your popularization and promotion connected with electric permit safeguard technology.

Subsequent, it encrypted sheild field advancement status

A single. File encryption curly hair

The main unusual dongle professional SafeNet, Corporation. in the usa in addition to Germany Wibu.

Security head of hair service deeply Supposrr que Luoke and also Feitian. The 2 main organizations due to the affordable prices, the first person to introduce the actual good minute card shield of encryption curly hair nearby perfectly so that you can enjoy some market place in the nation.

A pair of. Electric permission

Unfamiliar company certified merchandise to supply electronic digital Flexera Software and also SafeNet which will, Flexera Software program is focused entirely on the joy of digital permission, the actual device's ease of use along with features are doing superior, though the valuation on the item is additionally quite high.

This home-based electrical authorization goods enterprise a Beijing Biteansuo (BitAnswer), Shenzhen-use this (Euse) Safengine Organization.

There are only a few companies will acquire their very own electronic digital consent structure, even so the builders to cultivate their own plans commonly occur this inquiries:

One particular) the introduction of non-professionals, there are numerous loopholes while in the security

A pair of) is actually difficult to realize accommodating accreditation control, management and also precise functions simple or maybe simply no

Three) are often unveiled to be able to address the particular fast problem connected with short-term method, create far more than predicted in the foreseeable future as a result of protection, balance and also scalability challenges continued to get

Several) can not meet up with sector variations as a result of the modern demands on program certification model

Software program security marketplace movements

The software security field developments is closely connected with the increase development with the computer software marketplace. With the rise in popularity of cloud-computing plus Software, service with application products will be change in the direction of the multilevel plus system. Used in nearly all software programmers, Software items can not only spend less a great deal of hardware and software buy plus servicing charges, you can also get demand from customers, when decreasing the use of possibility, driving program vendors in order to consistently strengthen items plus improve services to be able to sustain consumers.

To the development of system and program improvement can also be a software package encrypted sheild technologies movements. The view around the present-day growth trend, the encryption locking mechanism technologies have designed really develop fully information mill approaching vividness, slower advancement. The actual everyday living and make use of on the equipment practice creates security head of hair are not able to conserve the speed regarding advancement of the Internet period, are going to be substituted with the particular automated certificate.

Automated authorization permission through earlier subscription program code type on the feature-rich records available as modifications to technologies are considering verification process out of offline yourself confirm the introduction of computerized system authorization. Permitted administration contemplating particularly, your electrical licence technological innovation collected from one of software licence qualifications growth just as one authorized official certifications, agreement management and exact information and facts, and also other objective of each, significantly improved this permitted volume of details regarding computer software coders.

May forecast not able to electronic products certified solutions ought to have these most important properties:

Enlightening approved administration system: supplied by third-party safety measures specialized software designers, in line with the Net's one-stop software package safety plus endorsement management system, without having to deploy and observe after, low priced, easy-to-use.

Only two Bendable Certificate: offer the acceptance of the purchaser software as well as the cloud computing product common software package licenses; authorized touch time, the volume of sensible adventures; sanctioned in order to bind your computer software and hardware information and facts, encryption tresses, or by way of a username plus password validation way of agreement.

Simple and easy friendly buyer: in accordance with the WEB, at any place obtain; Users might food acquire, trigger boost the software, you can buy their unique software package to keep abreast of details; software package designers can certainly understand software initial information and facts plus individual data is often synergies through the people in the firm to finish the design of application license, enactment, supervision as well as maintenance operate.

5. Fog up accreditation unit: This is a cloud computing type of software program licensing. Standard application is genuine customer setup, endorsement can also be a buyer. Although cloud-computing could be the craze, although the move difficult for classic software package would be a wonderful way for the particular a higher level cloud computing modification. This definite awareness associated with tips, a common application approved move on the purchaser for the fog up on the endorsement remote computer, to ensure that small adjustments towards the application, but you can certainly instantly experience the great things about cloud computing: higher safety energy require to obtain clouds hard drive .

http://www.passwordmanagers.net/ Password Manager
anastasiad Nov 2016
Program web developers typically apply style of security technologies to guard the application in order to avoid against the law work with. Also need computer software encrypted sheild software packages are authorized to obtain written content, in order to increase the income profit.

Software encrypted sheild technologies are divided according to perhaps the by using a dedicated hardware-based file encryption hardware as well as software-based layer. Hardware-based layer, encryption have to emergency having a specific computer hardware device, this computer hardware encrypted sheild encrypted sheild hair, often called the dongle. Software-based file encryption, file encryption doesn't involve devoted computer hardware, common joining digital camera license while using the actual airport terminal device software and hardware details, also referred to as your automated acceptance sorts.

Just imagine drive-based appliance security safety in comparison with software-based encrypted sheild isn't right, because the much more included in program safety, which include layer goods, safety measures, encrypted sheild insurance plan design and style, software, operating systems, , appliance, data marketing communications, etc, is a extensive complex areas, besides by way of to ascertain no matter if safety.

In other countries, industry promote of your automated authorization and encryption tresses are consistently coordinated. Patterns and also famous explanations, this encryption head of hair additionally occupy a clear market share. File encryption a lock, nevertheless, could be the multi-level developed products with the moments, can be a natural customer technological innovation, deficit of control in addition to exact features, a good appliance creation, scheduling details, drivers installing irritation, but not only the high cost, and may stop achieved system circulation and purchasers from the software, is usually slowly decline.

The development of a electronic authorization that is certainly in the ascendant. Digital license safeguards procedures are becoming an increasing number of built into the world wide web know-how, cloud-computing in addition to SaaS strategy it isn't just easier to work with along with cope with software package digital situation and also accomplish, but will also according to present day environment friendly low-carbon advancement notion, possesses changed the shield of encryption hair Distinctive the software program encrypted sheild industry developments. The greater well-known organizations in the world, 'microsoft', Sun microsystems, Autodesk, SIEMENS, Adobe as well as other software package will be digital consent safety method.

In the united states, the utilization of layer application builders shut greater fees, with foreign behavior and historical causes of your continuation with the pursuing a couple reasons:

1 every day companies commonly deemed security encrypted sheild hair electronic agreement.

There are no longer just about any accessible digital license goods exorbitant, the price tag on foreign automated acceptance.

The truth is, with the expanding improvement of your circle surroundings, a community initial for many of us domestic users is not an difficulty. And also mentioned prior, how the viewpoint of your basic safety connected with encrypted sheild head of hair electrical permission sided incorrect. Coming from a authentic perspective, the shield of encryption curly hair as a result of components burning better to fracture, but accomplished piracy marketplace company has become produced. Instead, electrical consent since the electronics should not be cloned, but additionally must multi-level service in addition to affirmation, in fact, currently have excellent safeguard outcome. Moreover, your residential in addition has showed up in many registered goods supply automated 2-3 organization ought to improve while using the advancement of China's software field and also be upwards.

Hence, this encryption software package marketplace developments electronics, marketing, and details engineering. Down below, most people look at, through the software file encryption system distinct for you to elaborate program encrypted sheild establishment and also progression trend of this marketplace.

Primary, the program shield of encryption technique

As mentioned earlier, it shield of encryption technologies are divided into encrypted sheild hardware-based plus software-based file encryption.

A hardware-based encryption

Hardware-based file encryption encryption locks, many material, including layer fundamentals for vulnerable data, acceptance paperwork, made to order methods, and so on. could be trapped in a dongle.

Your security fastener interface style is divided directly into 2 kinds of parallel dock plus Flash harbour. The particular concurrent harbour would be the early on technique variety, because propagation inconvenient plus struggle together with the laser printer, and already has got much less employ. Almost all coders use are generally Flash user interface dongle.

Encryption hair on the two kinds of Computer kind, a microcontroller to get Cpu and another using a clever unit card processor for the reason that Pc the microcontroller appliance per se very easily trouble area or perhaps duplicate, so a lot more high-end security a lock utilizing a wise card processor Pc, to forestall computer hardware fracture. But a growing number of intelligent greeting card dongle split, primary, because processor chip is a bit more and a lot more sophisticated investigative methods along with resources; sensible greeting card method being composed to your chip manufacturing area to make within this program application could problem; file encryption hair of the exact same brand name the particular Cpu method is the identical, merely diverse builders facts along with critical, in the event that these types of data files are passed out and about, you can easily replicate.

Dongle carries a certain a higher level safety toughness, nonetheless in addition there are many drawbacks:

One) apply at the standard one-time constant permit, are unable to aid your results on the tryout release along with on-demand buy

A pair of) the use of hardware creation, scheduling details, installment in addition to routine maintenance charges

Three or more) is not realized the issue regarding Internet-based electronic enhancements, pursuing in addition to administration

Some) As soon as chipped, is usually ripped large quantities, it is hard to treat

A couple software-based shield of encryption

Software-based shield of encryption, electric endorsement, and certain as well separated into two types of registration plate along with permission file:

Enrollment rule is additionally referred to as the sequential range or perhaps permission rule, received by way of modification in the the software customer computer systems plus software program information and facts, the available hardware and software information, like: Computer successive number, BIOS serialized quantity, cards amount, disk drive sequential variety, computer title, and many others. . Completely transform algorithm employed your custom algorithm criteria or even normal layer algorithm formula. Customer and also first utilisation of the software package installing course of action, you might want to type in the enrollment value to make sure. Immediately after certification, software program may be used usually. The actual technique contains the advantage of your in order to register signal defense isn't hard to implement, the downside is usually that stability will not be large, struggle to achieve complicated consent needs.

Licence report and the subscription value for you to bind a similar computer hardware as well as software information, a subscription value time-span limits by using each hardware and software facts, a permission data file will use various hardware and software details. Additionally, the actual certificate file can contain details, so you're able to get the difficult authorization requirements, and might also retailer a number of end user information and facts. The typical certificate submit method to utilize the non-public major on the asymmetric protocol to help signal the permission record, as you move the general public key's baked into software program code. Uneven layer as well as decryption course of action, in which you crucial agreement hosting server is out there, it is not easy to break into throughout the study associated with acceptance docs.

What's so great about the particular digital agreement security does not require supplemental hardware, and as a consequence does not need to deploy the driver plus buyer components, electrical hardware issue. The disadvantage on the electric licenses safeguards method is just not networked people really need to manually remove your computer details, after which manually transfer subscription codes or even licenses, may not be convenient to use. On top of that, the actual domestic automated endorsement several of the designers with the products, which also limits a popularization and also campaign with electronic permission safeguard technological know-how.

Minute, it layer sector growth standing

A person. Security a lock

The main unusual dongle professional SafeNet, Inc. in the country as well as Australia Wibu.

Security tresses provider deep Supposrr que Luoke as well as Feitian. Both businesses due to the discount prices, the first one to create your intelligent minute card encryption tresses nearby well to be able to undertake a clear market place in the nation.

Only two. Digital acceptance

International business certified products and solutions to give electronic Flexera Application and also SafeNet which often, Flexera Applications are devoted to the realm of electronic digital agreement, this product's simplicity of use plus usefulness are accomplishing far better, though the expense of the item can also be very good.

A residential electric permission merchandise firm this China Biteansuo (BitAnswer), Shenzhen-use the actual (Euse) Safengine Corporation.

There are few companies will acquire his or her electrical consent plan, although the developers to cultivate their own programs normally are present the subsequent inquiries:

One) enhancing non-professionals, there are several loopholes inside stability

Two) is tough to obtain variable accreditation manage, management and mathematical functions very simple or virtually no

Several) could be introduced as a way to address the fast issue of short-term method, create far more than predicted in the future as a consequence of protection, stability along with scalability difficulties ongoing to pay

Four) are unable to fulfill market variations brought about by the revolutionary demands about software accreditation product

Application file encryption market developments

The program shield of encryption field developments is actually carefully involving the increase tendency with the software program business. Together with the interest in cloud computing and also Software, service of software package products and solutions will be alter in the way of the circle along with foundation. Used by the vast majority of software package builders, SaaS solutions will not solely save a great deal of hardware and software pay for and also servicing charges, you can also get requirement, although reducing the using chance, driving foundation providers to help continually develop solutions in addition to boost services for you to sustain shoppers.

For the roll-out of community in addition to system advancement can be another application shield of encryption technology fads. The scene about the present-day growth pattern, the actual shield of encryption secure technologies have created very experienced publication rack drawing near vividness, slowly growth. The lifetime and make use of in the hardware practice helps make shield of encryption curly hair are not able to take care of the velocity of development of online years, will be replaced by a electrical permit.

Electric agreement licence from very early sign up computer code sort to your feature-rich documents as modifications in technologies are considering authentication strategy coming from off-line yourself validate the growth of programmed community validation. Accepted control considering particularly, the electric licenses know-how from a single software package licence qualification development just as one authorized certification, consent management plus stats facts, along with other aim of equally, considerably elevated this sanctioned degree of details pertaining to program web developers.

Might forecast not able to consumer electronics accredited merchandise should have the subsequent principal features:

Good authorized managing podium: made available from third-party protection skilled software package programmers, in accordance with the Web's one-stop software package security and also permission operations foundation, without the need to install and sustain, affordable, easy-to-use.

Two Adaptable Licence: support the agreement of the purchaser software program as well as the cloud-computing model standard software package permission; approved press occasion, how many sensible web template modules; accepted so that you can hole the computer hardware and software data, encrypted sheild hair, and also using a user name and also private data verification way for consent.

Easy and warm and friendly buyer experience: in line with the World wide web, everywhere entry; Users could self serve buffet pay for, stimulate rrmprove the application, you can purchase their own software program to keep up-to-date with info; software program builders might discover more about application account activation details in addition to individual facts is usually synergies because of the individuals this company in order to complete the design of software licenses, implementation, supervision in addition to upkeep operate.

Five. Clouds licensing type: This is the cloud computing model of software program certification. Traditional software is natural purchaser rendering, permission can also be a purchaser. Whilst cloud computing could be the movement, though the transition difficult for common application will be a wonderful way for the certain amount of cloud-computing transformation. This definite realization regarding strategies, a common software program sanctioned shift in the buyer towards the cloud on the acceptance server, to make sure that small adjustments towards the software package, nevertheless, you can easily instantaneously have fun with the benefits associated with cloud-computing: higher security energy requirement to order foriegn safe-keeping .


http://www.passwordmanagers.net/products/Windows-Password-Recovery-Software-1.html Windows Password Recovery Software
Who can guess the Masquerade of this Time
Such Event is a Turtle; Withdrawn to a Box
None is ever wasted; None is left behind
None is allowed to lick and tether a Fox
It is the Creature; Banned for a Reason
The Furry Red was no benefit to avail
You cannot bargain; Not even for a Season
Better if the Document is stamped by a Snail
At least it was Honest; And hardly Fraud
Shall my Letter then be sent with such Mail
Else cheat your Lover whilst he is Abroad?
Or perhaps better resolve this Bitter Alimony.
Neither you or I in this Picnic we enjoy
The Duckling Issue whose Exit we deploy.
SøułSurvivør Sep 2018
SLAP POETRY

In heaven Satan was the best,
The worship-leader, very blessed
Magnificent, all would attest
Thought he'd be above the rest

He thought he should be in God's place
That he'd slap Jesus in the face
He fell from honor... fell from grace
In the end he lost the race

God is TOUGH.
They'll scream & shout!
All Satan's angels in a rout
In the end they got kicked out!
Satan thought he had a plan
Yep. He thought HE was the MAN
Finished before the Book began
He was like lightning as he fell
And in the end he'll go to hell.

YEAH. God don't play.
Don't take no guff.
There's a point
He had enough!
Had His fill of
Stupid stuff...
Let me tell you,

GOD IS TOUGH!!


Pharaoh thought HE was all that.
On a golden throne he sat
Yeah, he WAS a mean ol' cat
Hebrew sweat made his land fat

Put the Hebrews through a LOT
But MOSES had another thought
Pharaoh's heart was
Hardened... caught
Through Moses God
Caused Egypt's rot...

Because of Moses' bravery
Pharaoh ended the slavery.

God is TOUGH!
They had no hope
God gave Pharaoh
Lot's of rope
Through Moses
God brought on a curse
Plagues of sorts which
Were the worst!
Pharaoh thought
He would be first
But it played out
As though rehearsed.

End of scene. Act. Then show!
Moses cried, "LET MY PEOPLE GO!"

Pharaoh did as it appears
THE HEBREWS WANDERED
40 YEARS!!

CHORUS

On the mountain God he wrote
The Ten Commandments
That he spoke.
They were written for the Folk
His very finger carved them out
As Moses stood up on the mount.
Moses came back for to find
His people had just lost their minds!
A golden calf is what they'd wrought
With the gold that they had brought
Moses made a golden draught
And made them drink it as they ought.

He begged with God
Not to destroy them!
Other tablets to deploy them.
To God's ways. There were Ten Commandments
So the people's have a moral fence.
God brought order. The Law was sent.
So the people would repent.

God is TOUGH! So don't be fooled!
He will judge... And by His rules!
Those who follow are as jewels
Those who don't are Devil's tools.

CHORUS

Now God has a dispensation
To save the people! Save the Nations!
God left heaven as a babe
So the people could be saved!
So His people could be well
From spirit's sickness - Satan's spell.
They called His name Emanuel.

From God's seed and divine birth
Jesus came and walked the Earth
His little flock he taught & gathered
He was teaching of the Father.
He taught goodness & great wisdom
He taught us how to
Find the Kingdom.

The Pharisees in anger brought
His death upon Him, for he taught!
He cast out demons. Healed many!
Gave the people food aplenty!
So the givers of the Law
Hated him for what they saw
Accused him of sin and vice
So they crucified the Christ.

God is TOUGH!
Jesus was cast down
With bitter gall and thorny crown
He put him in a criminal's grave
So that many could be saved!
Stripped of clothing and of pride
The wrath of God was satisfied
He put him in a criminal grave
So that many could be saved!

By his blood and by his death
He brought out the Lost, bereft.
For three days he was Underground
The women came and then they found
He had come forth! He had the keys!
From the devil took with ease
Hell, death, and the grave
He took all these!

CHORUS

Now, Christ in Resurrection stands
He's the greatest of the grand!
He gathers people from all lands
To bring them out
With a mighty hand!

But you'd better take advice...

Accept MERCY....
FEAR THE CHRIST!!

CHORUS


Cathy Jarvis
9/24/2018
Slam poetry + Rap = SLAP!

Thanks for reading! I know it was long, but I hope it was worth the effort... I really put a lot of effort into it myself! God bless you!
We come to a complete stop.
At a red light.
We wear our arms like seat-belts-
crossed for protecting our pilot lights.˚
I can't help but wonder how many airbags might deploy
if a meteor crashed headfirst and heavyset into the planet
and pancaked us eternally into this moment-
and how our fossils would look confused;
funeral flowers on a wedding cake.

None of this matters, we're both thinking it,
God is a foster child playing with his erector set.

You grin with as much conviction as a dented automobile,
breaking the months of silence to say,
"I miss you."

We can never fold these road maps back the way they came.

Somewhere existentially above this moment, there is an asterisk
that confirms
you- are here.

There was a younger version of me that you never got to meet,
he was here once,
stupid as a slinky.
Shaken like an Etch-A-Sketch.
Crooked as the question mark that punctuated his voice.
I looked good in hydroplane,
my eyes- bigger than my belly,
so I drank my weight in promises- I knew would be hard to keep within arms reach.
I also knew an encyclopedia's worth of how it felt to lie to myself.
I did it for twenty-three years
until I finally let go of stupid and held on to reason.

At some age I wrote letters to my favorite musicians,
using the sloppiest side of my penmanship, I'd ask for answers
and my mother, like a paperclip, used to tell me - she'd say,
"Kiddo, just because they don't respond
doesn't mean they didn't get the message."

She kept her chest of hope upstairs, away from the living room.
She only opened it on the hallow end of October;
that's where she kept the blankets.

Shy, I kept my hope chest covered in a T-shirt-
at the very least.
I never opened up.
I emptied my toy box of all its fiction, filled it with voices.
Deployed an army of rubber wrestlers, martial arts amphibians
and those inanimate toy soldiers with plastic parachutes attached
in search of the confidence I knew was supposed to belly-flop inside of me.

It hid, unfound for decades.
Until you entered.

Hawaiian domino effect, circus of chain reactions, avalanche of affirmation, chest-plate yielding gravity mouth speaking brightest anything forever night light, all apex and eyelash and cheekbone.
You -from big island- broke me.
I opened like the dry side of an umbrella, kept my back turned for shielding you.
I showed up for love on time, like a subway train in echelon city
wanting these arms to feel less like turnstiles.

All my sign languages were in waves.
All my ceilings turned to skies.
All my jitters packed into my hunger stomach.
Typing hyper with caffeinated hands
a swarm of nervous words bee-hiving in my butterfly chest.
Something like a hummingbird
when I finally drop your name like an alarm clock whisper
my lungs empty like cathedrals on the day after Christmas.

I brought the sermon to your Sundays,
you brought the choir to my masses.
We built a church around these esophagus bell towers.
Held ourselves up to the stained glass and showed off our light;

I swear I don't believe in a lot of things, God knows,
but there's always a but,
so much as I believe in the eternal depth of everything,
so much as I believe that we'd have plenty of water if it weren't for salt,
so much as I believe in eight marbles rolling around a gas lamp,
I believed we'd find a way.

'Cause in all the ways my sky could never hold you- and I mean this-
I believed in you- same way some people believe in Jesus.

Because you never judged my albatross mouth when I said things like,
"Self deprecation is the new love."
You kissed me-
less like doorstop,
more like lighthouse illuminating windmill.

You were a merry-go-round pivot decorated in Kona coffee beans, Christmas lights, cough syrup, paper mache pineapples, plastic dinosaur bones, a collection of worn-out Asics, board shorts and a dubstep remix broadcast through the static of a blown-out rotary phone.

You were everything I could get my hands on-

A full-tilt action-packed kaleidoscope jungle
with blender tongue and volcano heart.
I looked good in your sad panda coat tails,
teaspoon swallowing my doubts
while you Tarzaned my ability to breathe,
gave me ocean view and weak knees.
Is that sea breeze in your aftermath or are there already tears in my happiness?

You came camouflage out of my blind spot dressed in magnet armor,
diving board and drum set.
We passionbent cymbals into cannonballs.

I found comfort between your breastplate and your shoulder blades,
where you held me like a promise
when all my wishing was for want
and all your wanting was for wishes

Granted,

I know that there were days when you couldn't help but wake up like gorilla speaking Pidgin
and I couldn't help but waking up like an abandoned highway with a chip on my shoulder-
some maps don't show this much detail, Google Earth-

Which is why I always came through for you like a well-lit citrus truck stop
pressed against the dusk in your moonlight life crisis.
We only saw stars.
From our moon base.
In bewilderment, in our hunger, we learned
that if you hold me to my vending machines you'll get what you pay for.

So here it is, the truth, as I have always known it,
delivered to you on the outskirts of an echo,
my voice, supporting my existence like a monolith.

I'm standing in the middle of a you-shaped hole.
It's as wide as a promise crater-
we built it together.
It's not my favorite place to stand
but the exit strategies are made in the shape of a me that I haven't constructed yet.
I had a lot of things planned.
I referred to things as "ours",
when I really meant "please".

Bury me in your time lapse.
When your emotional excavators discover me in your sediment
they'll find me all pterodactyl-
wings spread wide as potential, sky-diving toward forgiveness,
forever.

Truth is, I'm wingless.

We met at a stop sign.
Our paths crossed.

There's a lot of accidents at some intersections.
Maybe it's because that's not where those two roads were supposed to meet.

We can't time machine argue with the way things landed.

We weren't an avoidable accident.
We were just two cars that really wanted to dance.

I don't know what I'm trying to say but I know when I mean it.

There's a tyrannosaurus rex cradled head-to-tail just behind my curator heart-
all fossil spine, monster teeth, jaw head and piano hands.
His presence says a lot about the past.
There's an asterisk on the surface,
above this moment,
that confirms with absolute certainty,

˚something wicked awesome happened here.
The (˚) is supposed to be an (*)
You can hear me read this here: http://tumblr.com/xft51gwrf0
TheExpat Jun 2014
Take time to care
Infuse with joy
Mend the despair
Bro'hood employ
Achieve in prayer
Lord's love deploy
Long live old boy
Tried acrostic for my friend's birthday
“You ought to have seen what I saw on my way
To the village, through Mortenson’s pasture to-day:
Blueberries as big as the end of your thumb,
Real sky-blue, and heavy, and ready to drum
In the cavernous pail of the first one to come!
And all ripe together, not some of them green
And some of them ripe! You ought to have seen!”

“I don’t know what part of the pasture you mean.”

“You know where they cut off the woods—let me see—
It was two years ago—or no!—can it be
No longer than that?—and the following fall
The fire ran and burned it all up but the wall.”

“Why, there hasn’t been time for the bushes to grow.
That’s always the way with the blueberries, though:
There may not have been the ghost of a sign
Of them anywhere under the shade of the pine,
But get the pine out of the way, you may burn
The pasture all over until not a fern
Or grass-blade is left, not to mention a stick,
And presto, they’re up all around you as thick
And hard to explain as a conjuror’s trick.”

“It must be on charcoal they fatten their fruit.
I taste in them sometimes the flavour of soot.
And after all really they’re ebony skinned:
The blue’s but a mist from the breath of the wind,
A tarnish that goes at a touch of the hand,
And less than the tan with which pickers are tanned.”

“Does Mortenson know what he has, do you think?”

“He may and not care and so leave the chewink
To gather them for him—you know what he is.
He won’t make the fact that they’re rightfully his
An excuse for keeping us other folk out.”

“I wonder you didn’t see Loren about.”

“The best of it was that I did. Do you know,
I was just getting through what the field had to show
And over the wall and into the road,
When who should come by, with a democrat-load
Of all the young chattering Lorens alive,
But Loren, the fatherly, out for a drive.”

“He saw you, then? What did he do? Did he frown?”

“He just kept nodding his head up and down.
You know how politely he always goes by.
But he thought a big thought—I could tell by his eye—
Which being expressed, might be this in effect:
‘I have left those there berries, I shrewdly suspect,
To ripen too long. I am greatly to blame.’”

“He’s a thriftier person than some I could name.”

“He seems to be thrifty; and hasn’t he need,
With the mouths of all those young Lorens to feed?
He has brought them all up on wild berries, they say,
Like birds. They store a great many away.
They eat them the year round, and those they don’t eat
They sell in the store and buy shoes for their feet.”

“Who cares what they say? It’s a nice way to live,
Just taking what Nature is willing to give,
Not forcing her hand with harrow and plow.”

“I wish you had seen his perpetual bow—
And the air of the youngsters! Not one of them turned,
And they looked so solemn-absurdly concerned.”

“I wish I knew half what the flock of them know
Of where all the berries and other things grow,
Cranberries in bogs and raspberries on top
Of the boulder-strewn mountain, and when they will crop.
I met them one day and each had a flower
Stuck into his berries as fresh as a shower;
Some strange kind—they told me it hadn’t a name.”

“I’ve told you how once not long after we came,
I almost provoked poor Loren to mirth
By going to him of all people on earth
To ask if he knew any fruit to be had
For the picking. The rascal, he said he’d be glad
To tell if he knew. But the year had been bad.
There had been some berries—but those were all gone.
He didn’t say where they had been. He went on:
‘I’m sure—I’m sure’—as polite as could be.
He spoke to his wife in the door, ‘Let me see,
Mame, we don’t know any good berrying place?’
It was all he could do to keep a straight face.

“If he thinks all the fruit that grows wild is for him,
He’ll find he’s mistaken. See here, for a whim,
We’ll pick in the Mortensons’ pasture this year.
We’ll go in the morning, that is, if it’s clear,
And the sun shines out warm: the vines must be wet.
It’s so long since I picked I almost forget
How we used to pick berries: we took one look round,
Then sank out of sight like trolls underground,
And saw nothing more of each other, or heard,
Unless when you said I was keeping a bird
Away from its nest, and I said it was you.
‘Well, one of us is.’ For complaining it flew
Around and around us. And then for a while
We picked, till I feared you had wandered a mile,
And I thought I had lost you. I lifted a shout
Too loud for the distance you were, it turned out,
For when you made answer, your voice was as low
As talking—you stood up beside me, you know.”

“We sha’n't have the place to ourselves to enjoy—
Not likely, when all the young Lorens deploy.
They’ll be there to-morrow, or even to-night.
They won’t be too friendly—they may be polite—
To people they look on as having no right
To pick where they’re picking. But we won’t complain.
You ought to have seen how it looked in the rain,
The fruit mixed with water in layers of leaves,
Like two kinds of jewels, a vision for thieves.”
A poetic drama (One Scene)

( Egypt’s parliamentary farce)

(The spokesperson on the presidium strikes the table with a wooden hammer and asks for order. Participants become quiet.
Raise your hands and reflect your views on today’s point of argument— The Grand Ethiopian Renaissance Dam (GERD ) on Blue Nile. Various people representatives raise hands,
The spokesman says let us start with Mr. Hydrologist over there.)

Egypt’s globally
Topmost voluminous
Underground
Reserve of water
We could use later.
So via our media outlets
It is better
We dupe
The global community with
Much-touted chatter
“To Egyptians
Demand of water
To cater
Blue Nile is
A life and
Death matter!
As thicker than blood
Is water! ”

Of course,
From the Mediterranean
Or Red Sea
We could extract, desalinate
And use water,
But why should
We talk about that?
We better
Ask on Blue Nile
A farfetched exclusive right.

Though hydropower dam
Has no significant harm
We shall flout it
In a way it runs
Out of charm.
As  the Nobel peace winner
Premier  Abiy Ahmed put it
"Almost all Egyptians
Enjoy the supply of electricity,
While over half of Ethiopians
Are thirsty of such necessity.

Tragically, to date
Using a lamp
Covers most of Ethiopia's map.

For the rational,
It is a source of worry
Innumerable Ethiopian mothers
Still on their backs carry
Backbreaking firewood
So that go to school
Their children could.
What we say
Is if you  are remiss to help
don't stand on our way
While we're flapping wings
From fettering poverty
To break away!"


Also via a conduit
Diverting Blue Nile
Across the Sahara desert
A financial return
Egypt could get
That delights its heart.
The water from
Upstream countries
We do not buy
But paradoxically sell it
We shouldn’t why?

Like Israel
Using drip irrigation
Must not
Draw our attention.
We shall be extravagant
For Blue Nile’s water
Is abundant.
Unchecked lavishly
It must flow!
Pertaining to that
We have to remain adamant.

Also, the
Silt accumulation
In Aswan dam
Could be disastrous
The outcome,
Yet we have
To cry foul
This challenge-averting
GERD must not soon
Generate region-
much-needed power!

Though it is 50 % of the
Annual trans boundary
Water outflow
Other water-generating countries
Are willing to let go
Unwilling anything below,
Kind Ethiopia ventures
Holding only 13% of
The yearly flow to follow,
However, ingratitude
Must feature our attitude.
This may
Provoke a  dismay
But attention
We shall not pay.

(A tumultuous applause shook the parliament. Once more the spokesman asks for order. Then he invites a former diplomat saying “ it is your turn.”)

Once, by famine hit
When Ethiopia   asked
“Help me not why?”,
While others extended help,
Mocking, we did turn
A blind eye.

As our former bent
Whenever Ethiopia
Seeks  grant
From international
Development Institutions
On grounds of
Fighting poverty and drought,
Greasing palms  
We shall bring
Ethiopia’s plans to harness
Blue Nile to naught!
Use we shall
Many a phony diplomat
With a tongue of honey
And a heart of gall.

Tact we do not lack
So cautiously,
Our sanctimonious mask
Our targets
May not hack,
All out
We shall engage in
Self-selling talk!

From all things that fall
In the technical matrices
We shall make a sham politics.

(He sits enjoying a standing ovation. The spokesman invites a representative with a military background.)

We shall blow our
Trumpet in the air
“In lieu of
The reasonable 3 years,
Cooperatively,
From 4 to 6 years
To fill the dam
If Ethiopians dare,
War on it
We shall declare!
Barefacedly claiming
Fifteen to 20 years
Is what is fair!

In such infeasible way
Before it sees the day’s light
GERD will suffer blight.”

(He hiccups and continues)

“With a bellicose bent
To remind ourselves
Deliberately we shall fail
So many times Ethiopia
Chased out every
Egypt’s invading army
Between its legs
Shoveled its tail.
(Ex. Isma'il Pasha/ 1874 –1876
Gundet &Gura March 7–9, 1876)
But why should we care
Arsenal support
Hypocrites, who want to exploit
In the Middle East
Egypt’s political purport,
Will bring to our port.
The current catchphrase
"I can't breathe"
Demonstrates hypocrites'
Justice has no teeth!

We shall
Continue to brag
About GERD’s full actualization
Foot to drag.
I’m afraid
If we strike GERD,
On Aswan dam
Ethiopia will certainly inflict
A similar harm.
Its infantry
Acid-tested hero
Within finger-counted days
Will march into Cairo.

Its top official or
One from its mob
Cold blow up in Egypt a bomb.

We have to understand
As its former PM
Meles put it
“It is not
Its football squad
Ethiopia will deploy
On the terrain rough
When the going
Gets tough!”

We shouldn't worry
We have no history
Of battle front victory.
Poking our nose here and there
(Sudan, Somalia, Yemen,
Libiya, Palestine, Israel)
We shall make political trouble
As we are averse to self
-politics burgeoning dabble.

(He sat after enjoying a heartwarming laughter from the audience. The spokesman himself could not help unzipping his lips and invites a hoary headed historian.)

Subjects of colonization
It is our
Historic right
For the hanging-over
Mentality of predators
To fight
“Gobbling down
All resources
Is our right!”
We shall espouse
Unjust and inequitable deal
“Ethiopia fairly
GERD must not fill!”
We must gamble
Regarding the water division
There has to be a deal
That serves our colonial
Legacy a sign and seal.

There is nothing we hate
Than the following sentiment
Pan Africanists activate.
"We have to get
Behind our back
Days dark!"

(He sits accompanied by an affirmative nods. The spokesman invited Miss Environmentalist "it is your turn." "Thank you for the opportunity,"  she said and  standing she scanned the congregants
before speaking)

In parrying evaporation
GRERD being built in a gorge
Than Aswan Dam
In the desert
Draws better attention.
Though logical,
This we do not wish to hear
So we shall turn a deaf ear
Saying
“Your nuisance
We no longer bear!”

Of course
To avoid siltation
In GERD
Also to ensure
The continuous flow of water
Towards Green development
Ethiopia is making an unprecedented &
Unflagging movement.

Yes , Yes
Green development
Draws rain
Though that is
To our gain
From expressing
Appreciation to
Ethiopia’s timely move
We shall refrain.

From the voice of
Sagacious leaders of
Africa
It is better
To heed a hypocrite
From America;
That could not be a shame
In the political game.

(She takes a seat enjoying a high five. The spokesman invites a parliamentarian who is a member of the Arab league.)

As Sudan poses
A rational gait
Its voice has weight.
Our sugar-coated talk
It may not buy
Hence, the fuel-intoxicated
Gluttonous Arab League
Its voice
Needs to raise high.
White supremacists
Must try hard
To sweet talk Sudan
To our side.
Otherwise
Creating political heat
In to two its people
We have to split
To unseat
Its incumbent president
Popular support that ride.
This  insidious tide
From Sudanese mob
We have to hide!

We have a toy League
That doesn’t ask itself
“ Why
War-fleeing Arabs ,
Shunned by Arabs,
Seek a safe haven
Under Ethiopia’s sky?
Why  of all
In Prophet Mohammed's eyes
Ethiopia stands tall?”
That no one could deny
But we must
Neither wonder  nor ponder
“Why
For own advantage
Arabs-eating-Arabs
That commit  
Political suicide
Could not
Stand by
The reasonable
Ones’ side?”

Creating this and  
That pretext
We shall derail
The all-out task
To bring GERD’s to end,
At long last
To make it
As good as dead.

Why should we care?
If Ethiopia or the region is
Thirsty of hydropower
In so far as
Our conceited
Pride remains
In glory tower.


Moreover if soured
Pushed to the end or angry
Reflect  we must not
Ethiopians could tame
Its this or that tributary.

(When a wealthy merchant raised his hand the spokesman gave him a green light to speak.)

Pampering with money
Fifth columnists cruel
Let us keep on using
In Ethiopia
As runs the adage
Divide and rule,
Along ethnic
And religious lines
To  drive a wedge
So that Ethiopians will not
Come to the same page,
While turmoil in their country
Opts to rage.

We could ignore the fact
Ethiopians soon display
Unity and solidarity
When threatened gets
Nation’s  sovereignty.
In Ethio-Somali war
Ethiopians Karamara’s Victory
Talks loud such history.

I'm afraid
Our  divisive action could
Bring together Ethiopians,
Be it on left or right end,
Their sovereignty to defend.


Robbed of
Their alluvial soil
By a prodigal river
Ethiopia’s  farmers
Undergo a hard toil
If we are asked for that
Compensation to pay
“No!”
We  have  to say.

Note that
Using industrialization
Like Japan
Develop we can
Than irrigating  
A- scorching-sun
-smoldered land
Full of sand.

As the  jealously insane
What should worry Egypt
Must not  be what  it could lose
But  Ethiopia gain.
What I fear
In the diplomatic arena
With GERD Ethiopia
Will come forth
Shifting gear.
When Ethiopians' development
Proceeds apace
Ethiopia could Egypt displace.
So on its development
We  have to pose a roadblock
Or a spoke.
.

(This much  farce is enough for today .Parliament is dismissed says the spokesman.)////////
Science-based approach visa-vis politics- based approach. Colonial legacy has no room in the 21th century
David W Clare Feb 2015
I lived on the city streets of Bangkok Thailand for years, I felt right at home I know Bangkok inside out

...from the sukhumvit in nana klong toey to Khoa San road to Klong Thom market in China town to orient circle at night the most incredible high crimson monolith I ever seen to

Chao Phraya river near wat Sam phraya Buddhist temples to samut prakhon to Sam rong imperial world to bang na to on nut Tesco Lotus to

ekami to BTS sky train to Siam center plaza to Phetcheburi road to Pantib Plaza

I would walk for days nonstop with no money no food no room beat up a lot

knifed gang attacks had two switchblade knifes pepper spray wore wigs and barefoot in age old soot many kilometers on foot through the took tooks exhaust at the cost of lusting for Thai girls ***!

a kid in a candy shop Thai baht sniffed out by lovely Thai ****** they know how to thrill steal and **** a man 10,000 years old bold tradition consumes your soul

Sweet **** teenage Asian girls will ******* to ruin. Black and blue dumbfounded man taken down faster than a sandblaster can

Dilapidated old buildings all rusted.
Sidewalks all busted apart chased by dogs Siamese cats all over at night Bangkok is Halloween every night of the year especially in nana near soi 11-5

The era of the diamond Siamese cats that's the price to pay to come to Thailand!

Silom road explodes with colored gemstones and Thai gold chains to dazzle the girls who entertain you at Pat Pong and deploy joy at Soi Cowboy

Hanuman king God of the monkeys flys on your back to attack your backpack Jack

Sultry femme fatale ladyboys exist to emerge nightly sinister moves to take down the forang old man *** clown

Drunk bar man crawls around to eat kitty girls pink underwear so beware fool dog of the danger lurking at every corner don't warn her she already knows you wanna **** on her cute Asian toes

Signs all over read ... We love our king
He resembles Michael Jackson with a cowboy hat, and gold military jackets

I was in very good health from eating fruits water pad Thai pla mook fish and sangsom and Chang
I could speak basic Thai

Bumrungrad hospital on soi 1 - 3
Is the top rated in se Asia

I was tested as age 18 healthwise

I was not surprised

The environment is superb to health

Nice Thai people nice asian **** slutty girls to hang out with and more so much more
Age notwithstanding

Thailand is indeed...

A whole other world
Krong Thep, Siam became Bangkok in 1769...
FIVE geese deploy mysteriously.
Onward proudly with flagstaffs,
Hearses with silver bugles,
Bushels of plum-blossoms dropping
For ten mystic web-feet-
Each his own drum-major,
Each charged with the honor
Of the ancient goose nation,
Each with a nose-length surpassing
The nose-lengths of rival nations.
Somberly, slowly, unimpeachably,
Five geese deploy mysteriously.
So as much as this Drama does persist
Your Prisoned Warning tugs at my Cool Shirt
Asking me to take Prudence and desist
In bashing Silence to where it would hurt
Now engraved in Copper I will make Clear:
For all my Writ Plagues I Apologise,
Deep in use plug Buds to that Trumpet's Ear
If Empathy a Letter in disguise
This my Friend's Spy; Deploy to high pursuit
Waving that Placard in belated claim
Which tastes folly less on a nutty boot
And Reprimand stamped on his just Remain.
Such I learned that Friendship's Best takes no Force
I Follow my Heart; Now you Follow yours.
#tomdaleytv #tomdaley1994
Dαиι Mar 2016
Stay still.
Oh, Captive queen.
Capital the stealth is.
A diamond of many edges, you can be.
Devasting all what you play with.

It is your nature.
Consuming to the boulders
only with your presence.
That's why you are measured

Stay loyal
Our moment will come.
When the gates of my complexion,
Unleashed will deploy.
The fierce will no longer be tamed,
I will let it go.
Poetry by MAN Jun 2014
Joy
Thank you for the love you give
I have my life but now I live
To show you something that is true
Beyond the two words of I do...
With our bodies we can touch
You will always be my mental crush
Through our lives we've felt the pain
Together we have eased our strain
Every path can be an aisle
To your heart to make you smile
Whatever it takes I will do
Overcome all obstacles to get to you
To feel your body by my side
Exposed to you I cannot hide
My words of passion I do deploy
To lift your spirit and bring you joy..
M.A.N 5-25-14
Chuck Mar 2013
Poetry invents jocular joy
Limpid loquaciousness rejoice
Heuristic verbiage to deploy
Poetry invents jocular joy
Dancing with Shakespeare and Tolstoy
Mellifluous melodic voice
Poetry invents jocular joy
Limpid loquaciousness rejoice
My first Triolet. Thanks Rebecca Askew for showing this form to me and for doing it so well.
Baby birds sit still,
sleeping softly, in baby eggs not hatched,
while mother bird waits patiently
for little shells to crack.

Now little birds with open eyes
chirp sharply without rest,
and mother bird leaves speedily
to gather worms and crumbs of bread.

After their meals, the little birds
are filled with food and joy,
'till mother bird hops closer
to help them soon deploy.

With harried squeaks
and frenzied flapping,
they fall down from their nest,
and mother bird, from up above,
spies patiently, in hopes of their success.
Above the forest of the parakeets,
A parakeet of parakeets prevails,
A pip of life amid a mort of tails.

(The rudiments of tropics are around,
Aloe of ivory, pear of rusty rind.)
His lids are white because his eyes are blind.

He is not paradise of parakeets,
Of his gold ether, golden alguazil,
Except because he broods there and is still.

Panache upon panache, his tails deploy
Upward and outward, in green-vented forms,
His tip a drop of water full of storms.

But though the turbulent tinges undulate
As his pure intellect applies its laws,
He moves not on his coppery, keen claws.

He munches a dry shell while he exerts
His will, yet never ceases, perfect ****,
To flare, in the sun-pallor of his rock.
SøułSurvivør Mar 2014
Lucifer, Lucifer
Black, rotting mind,
How can you live
With the lies that you wind?

Lucifer, Lucifer
You claim to destroy
But need God's permission
For what you deploy.

Black Lily of old,
Wrecker of worlds,
Mover of mountains,
Oil slick pearl,

The whorls on your forehead,
The horns on your head,
The eyes in your hands
As you dress your dead.

You desolate valleys
You eat up the land,
You grind a man's bones
To Sahara sand.

In my eye a beam
In your eye a mote,
The rampant *****
Of a rutting goat.

They grow in your belly
The flies that you spawn,
Maggots in multitudes
10 trillion strong.

Yes, out they spew
Through your spittle and teeth,
The lies propigated
From way underneith.

O, putrid rose,
Who has duplicate skill
To create "beauty"
To dazzle man's will.

But nothing you "make"
Is good on this earth,
No, nothing you "make"
Has any WORTH.

O, blighted star,
Constellation of hate,
Galaxy ghoul
Your strength is FINITE.

Who runs the show,
You aborted SOW?
When all's said and done
To whom will you BOW?

More sooner than late
Your end will come
In the pit ALONE.
With no one to ***.

Who'll put you there,
Bound in your chains?
Why! GOD! Of course...

... for Jesus Christ REIGNS.


Soul Survivor
Catherine Jarvis
(C) February 2014
Replace "Lucifer" with the name "Davey M". I'm talking about David Miscavige. That's how I feel about HIM. I'm learning more & more about the atrocities he has perpetrated. He's a monster of ****** prepositions. I'm writing another pome JUST for HIM. It's SCATHING.
Nat Lipstadt Jul 2013
My eyes smell sleepy, he, refusing to depart,
But there is coffee on the nightstand,
The odor, infiltrating the dozy brain's heart.

Annoyed with each other,
They shout and fight
Like teenage siblings Commissioners at the SEC,
Arguing over bathroom monopolization,
The tongue stays sidelined, feigning net neutrality.

The bed smells empty,
For the **** has crowed,
Yogi David commands your presence
At Saturday morning Eight O'clock yoga services.

To get to his Sinai on time,
Early departure, an FAA requirement,
Car, ferry and foot you will deploy,
In the winter, special skis and snowshoes,
That blessed by his mantra,
Enable you to walk on water.

In the kitchen there is sisterly conversation,
Yes, puttering and muttering and discussing,
Sister's grown child texting, he's making the pilgrimage
To see Mama, alone, unexpectedly,
Six hours driving.

Friends and countryman,
That is how you spell t-r-o-u-b-l-e

Sleepy master dwarf refuses to concede,
Says when kitchen noises retreat,
Back to him you will supplicate,
They (the other dwarfs and body parts),
Have a big convention to better communicate..

Departure comes without a kiss,
But not without complaint,
She always says I love you first,
Which is natural,
She being a girl.

Now the bladder starts to whiny~chatter,
What about me, what about me,
Don't you love me, and me rhymes with P!
While the stomach quietly snores
Have been well-fed
but a few hours before,
He dreams of some more....macadamia crusted s'mores...

I could verse you more,
No problem that's for sure,
But you got the point:
**The morning smells.
This recording of my life, sometimes fun, sometimes poetry, trouble-getting-me-into.  Which can be inspiring as well. Good Morning!

Someday I hope add a stanza about grandchildren, cartoons and monsoons, but the parents say they're too young, to endure us, the G parents, for a whole weekend. They are  referring to themselves of course, not the little ones.
Quentin Briscoe Jan 2012
If not I, Past remnants,
I immigrant M ingnorant.
to this game.
that I play in chains.
Quick sand in my native land
.there are no turmps in my hand..
only ronald mc Donald.
as im given Starbucks to spend where?
Strange furits with rotten roots.And David stars with scars.
Those wounded by a fat boy.And We still wait to deploy.
The sickness of these snitches. given we these stitches.
wounds that will never heal. This is (right hear) real....#listen
sobroquet Sep 2013
Writers can be so snotty sometimes
They think they're so clever with their rhymes
They employ obscure words
the way  armies deploy a specialized force
pedantic, pretentious, affected  on some insufferable plagiarized  course

Their wit a mired ploy to be perceived  as bright
not so much to share knowledge
but to be the one that's right
vaingloriousness cripples the honesty in script
and another puzzled reader
reads between the lines of a message adrift

people twist things to their advantage
skew the facts to fit the page
shrug it off as a necessity of the modern age
most do it, few will notice
if they do they'll say it's a mistake
deadlines howl, time grates like a rake
truth is incidental when words are fake

another American madman goes berserk with a gun on a spree
perfect timing  for the rollout of Grand Theft Auto 3
Don't worry little directors of death and mayhem
You've no culpability in the land of the free
causality is just some unprovable notion
you're safe and sound from any legal motion
exculpatory  mitigation is your right as an 'artist'  
'till the sorry day you eat the gun
the eventual price  you'll pay for your  sick wicked fun
the impudence of erudition
Across the sea,
So very far away from me.
Unexpected love,
Light as a dove.
You took my heart
In your hands
And cradled it
Like a prized possession.
Deployed as a Marine,
Patiently waiting for me
Filling me with glee.
Your love hit me
Like a ton of bricks.
Your broken heart,
I am here to fix.
Never will I write you
A Dear John letter,
I'm so much better
Than what she did to you.
All you should expect
From me are poems,
And "open when" notes.
I'd ride a boat,
A plane,
A train
Just to get to you.
But waiting for you
Is agonizing,
But worth it all the while.
Santiago May 2015
Just business
That's all it is
Y las puertas del infierno
Is who you working with
See that corpse
It's been reanimated
It's under my control
Young trucos the greatest
Money gangs
Are all around
So ah jacker get no sleep
That's how we get down
It's World War C
To pay for the sequel
Muthufuckers getting smoked
And that's what it equals
Estoy arriba
From that Cheech and Chong
Badass joint so I can work on my song
Top half black Chucks
And some black bandannas
My face like ah stoke
Got the black ski mask
Es como yo trabajo
Rappers getting guerra
Con palabra los mato
That's ah deadline
I'm ah make em me
If not they get found
******* dead in the street
I got weapons and tactics
I deploy on you
Situation getting happy
With that sinister crew
Out of the blue
Here come the Tommy guns
We're just getting started
But you've already done
I got weapons and tactics
Specialized
To hit you with ah bullet
in between your eyes
Bye Bye
It's not ah lullaby
It's ah walk by shooter
On the enemy side
Ese cut throat game
That we play
Vatos get cut almost everyday
Mis pensamientos
Son controlados por mi
Cause from the track come on
I'm all you see
I'm still here
After all these years
Won't think ah different knowledge
Cause you in my peers
That's why I feed
Ese on the weak
I tear em up to shreds
seven days ah week
So behind
The closed doors where I be
I plan murders on the enemy
All my tactics learned
I stuff em in ah truck
Then watch em burn
Gang banging .usica
Got you ducking vatos
limo cause I'll shoot at ya
Exhale beyond Aztec kingdom
I'm on another planet
Coming back to get ya
I got weapons and tactics
I deploy on you
Situation getting happy
With that sinister crew
Out of the blue
Here come the Tommy guns
We're just getting started
But you've already done
I got weapons and tactics
Specialized
To hit you with ah bullet
in between your eyes
Bye Bye
It's not ah lullaby
It's ah walk by shooter
On the enemy side
The pistol booming
I'm mind consuming
Sleep walking out your door
What the ******* doing!
Totalitarian this regime
I pulled up just to strangle the scene
I'm sixteen Ese from their ice
Cause I'm muthufucking tweaking for the rest Of the night all night You meet zombie naco
No vacation this Nal Cabo
I'm one In ah ******* million
So know it well
With who your dealing
I indoctrinate Then I elevate
Then I go around the corner and move some weight So what you got
I got more than you
More than all you muthufuckas posted up in your tomb I lay seize
To any domain
Either you get down or
your team get slay
Marshal Gebbie Jul 2012
ALERTS TO FINANCIAL AND MILITARY THREATS IN 2012 EUROPE

By John Cleese (British writer, actor and tall person):

The English are feeling the pinch in relation to recent events in Syria
and have therefore raised their security level from "Miffed" to
"Peeved." Soon, though, security levels may be raised yet again to
"Irritated" or even "A Bit Cross." The English have not
been "A Bit Cross" since the blitz in 1940 when tea supplies nearly ran
out. Terrorists have been re-categorized from "Tiresome" to "A ******
Nuisance." The last time the British issued a "****** Nuisance" warning
level was in 1588, when threatened by the Spanish Armada.

The Scots have raised their threat level from "*******" to "Let's get
the *******." They don't have any other levels. This is the reason they
have been used on the front line of the British army for the last 300 years.

The French government announced yesterday that it has raised its terror
alert level from "Run" to "Hide." The only two higher levels in France
are "Collaborate" and "Surrender." The rise was precipitated by a recent
fire that destroyed France 's white flag factory, effectively paralyzing
the country's military capability.

Italy has increased the alert level from "Shout Loudly and Excitedly"
to "Elaborate Military Posturing." Two more levels remain: "Ineffective
Combat Operations" and "Change Sides."

The Germans have increased their alert state from "Disdainful Arrogance"
to "Dress in Uniform and Sing Marching Songs." They also have two higher
levels: "Invade a Neighbor" and "Lose."

Belgians, on the other hand, are all on holiday as usual; the only threat
they are worried about is NATO pulling out of Brussels.

The Spanish are all excited to see their new submarines ready to deploy.
These beautifully designed subs have glass bottoms so the new Spanish
navy can get a really good look at the old Spanish navy.

Australia , meanwhile, has raised its security level from "No worries" to
"She'll be alright, Mate." Two more escalation levels remain: "******! I
think we'll need to cancel the barbie this weekend!" and "The barbie is
cancelled." So far no situation has ever
warranted use of the last final escalation level.

A final thought -" Greece is collapsing, the Iranians are getting
aggressive, and Rome is in disarray. Welcome back to 430 BC."
I didn't expect such an eloquent piece of work to slip from your mouth,
An amazing set of words put together as intricate an atom bomb,
Or as an improvised explosive device, so i see,
Thus I must be careful where i tread my glass slippered feet,
and be aware of what breath of words expels from my lips.

I never expected such a skill set of destruction and warfare,
From a beautiful mouth, so deceptive, that it almost seems,
you are an undercover lover,
both beneath the sheets, and between distinguished conversations,
regarding such tentative ideals of love and the ambiguity of trust.

A terrorist it seems amongst the ranks with a finger on the trigger,
with a finger on my lips, and a whisper hush in my ear.
It seems i was blind to your type of sweet deception;
There are codes i didn't understand, and my mind was melting,
from the heat of your touch and the sublime twist of your hips.

I can see your eyes ready to deploy a subterfuge of promises,
as they look into the distance calculating the logistics,
of this moonlight illicit flit of passion;
Never did i expect such an eloquent transpose of intentions,
Even remarkably as this feels like the Romeo and Juliette of modern times.

I am the 'x marks the spot' in no-mans-land it seems,
I am the calm after the storm in the aftermath of your expostulation,
You, my love, are a sublime soldier in this battlefield we call 'togetherness'.
No-one asked you to go to this infernal devastating war;
Yet i long for your return from the eternal, internal battle,
you fight between your heart and your head.
Your smile creeps off you know,
With no control,
Like you aren't wanting to go,
But there's something unknown,
And with alot of pull,
The voice dismayed with things that haven't happened,
And probably won't,
The slight underwhelming moan,
In a sea of sighs,
You can't try to control,
The glass is normally half full,
But like villains,
only known to the narrator,
Stalks in linens,
And they deploy the daggers,
That don't make any sense,
So you build the fence,
And hope to sleep,
Because when you're up again,
You'll smile at the pen,
know it doesn't make sense,
And that it will happen more,
Just do you're process and apologize,
Saying that there is no control
But realize,
It doesn't matter if it's normal,
It means it will change.
Kinda my way of describing how random depression can just come aboot for no reason...but I hope you enjoyed it dear reader!
JJ Hutton Feb 2011
The cacophony of metal cutting metal screeches,
burying the sound of 2,000 automobile engines, one train,
and 45 yapping onlookers.

I am self-actualizing.

The ******* Oriental who cut me off
learns the meaning of justice in a hair-split second.

I howl as I force his car further to the side of the road.
He's yelping, feeling fright claw his once-proud brain.

I look up, trying to keep my car on the road.
We tear past shopfront after shopfront,
patrons wailing, pointing, finally finding
something mad enough to put down their forks.

I see skeletal trees,
overshadowed by a red wrecking ball,
an out-of-business record shop,
the metal still crying the most demonic
siren's song.

Further I push him,
he's on pavement,
my little Oriental enemy.
I look at him again.
His knuckles are milk white,
his brow covered with perspiration,
his mouth bleeding from his own bite.

Then he hits.

A stoplight post of solid steel,
with three or so feet of concrete surrounding.
I learn he isn't wearing a seat belt.
Glass grinds his delicate skin, he catapults through the air,
then flattens against a newspaper dispenser.

Then I hit.

A **** Suburban in front of me,
who had stopped to watch the carnage,
now found itself partaking.

I have my seatbelt on,
the bags deploy,
thumping my head and
chest like a crippled bolt of lightning.

The Suburban spins into oncoming traffic,
getting further rearranged by
a pile-up of moaning metal.

My truck comes to a stop.
Smoke cascades languidly,
as humans shout in unison,
"I hope you have good insurance!"

I walk back fifteen yards to the
newspaper dispenser.

The Oriental man twitches,
blood pooling about his head
and left arm.

I stoop down closer to him,
look at his silent Rorschach ****** features,
gaze over my shoulder.
The Suburban lies in smoldering ribbons,
driver probably trying to get into heaven.

Shouts continue, building upon one another,
a crowd gathers around me,
whispers all similar to "what the hell happened?"
flame up and burn through the collective.

"Did you know him?" a small black boy,
with teeth of snow asks.

"Not real well, but don't worry kid, he wasn't a good man."

I rummage through the crowd until I break through,
I hear sirens of some sort in the distance,
unclear of cop or ambulance,
I survey the damage to my truck-
a light busted out,
bent bumper,
and what looks like a few holes drilled into the grill.
I open the door,
clumsily ruffle the airbag,
put my key in the ignition,
and to my delight
when I turn the beast,
it purrs submissively.

I grin, let my fingertips
briefly dance on the steering wheel,
and put the truck in reverse.
© 2011 by J.J. Hutton
Andrew Rueter Mar 2019
There is dark magic
Here in my attic
A magician’s tactics
Cause pain emphatic

This magician gives me all I can handle
Until one day I’m dismantled
Like a once lit candle
Extinguished by the ice near Ymir
Birthing the Titans I fear
Bringing death here
Morphing me into a rigid wreck
Here in the frigid depths
I wish I left

The violence of violins
Lamenting the vile sin
Conjured by riled kin
Like they’re wild djinn
Can’t be muted
Only diluted
By becoming rooted
In thinking stupid
Avoiding Cupid
To join the putrid

The magician concocts potions
That excuse my emotions
As I forget devotion
For a temporary motion

The magician gives us difficult obstacles
And easily medicated excuses
So people won’t make things optimal
While purpose eludes them

Like Jekyll and Hyde
My hackles I hide
With shackles of pride
Covered in mystic thorns
So my wrists are torn
From the pain adorned
It’s my brain I mourn

The magician erects walls so thick
They separate healers from the sick
With magic bricks
Imbued by the magician’s enchantment
He builds a wall and then expands it
Until those inside become tantric
From the prison wall’s antics

Every time I turn the page
I am given rage
On the magician’s stage
Of the wars we wage
Under a curse of anger
Dehumanizing strangers
To deploy the Army Rangers
Perpetuating harming danger

The magician lies
The magician steals
The magician hides
What is real
Until I feel
The cold steel
The magician wields
Piercing through my electrified body
I guess the magician finally caught me
Autumn Shayse Nov 2013
I wish there was a way
to deploy the emotion,
let it tumble from my ragged chest,
let the world fight my sorrow,
my tainted facade,
my lonliness,
my separation,
In the hopes of closure:
The chance to stitch my chest
And once more
Make it whole
authentic Feb 2016
I write, not to deploy pity or ***** commonplace conceptions
I write to potentially discover the sole rationale as to why I am who I am
What variety of experience and array of struggle has molded my self being
And who is to say that I have or have not become who I was intended to
There is a fine line of losing touch with society's notion of impeccability and drifting towards the horizon of individual pediment in assembling the parts of your inner soul
The pieces of you that may never see the light of day but still continue to participate in your decision making and how you articulate ideas
Every part of the whole is significant
Yet we continue to sprint towards the standards of conformity
Our lives, slowly becoming a smaller line of which we walk upon, holding tight to mediocrity
Because the only thing to do when the curtain is falling is say what the audience wants to hear
And I fear that perhaps I and clinging to the same things I curse over without being aware of it
So, I write, not to deploy pity or ***** commonplace conceptions
I write to potentially discover the sole rationale as to why I am who I am
Perhaps I am who I think I am, whomever that may be
All I do know, however, is I am not who you think I am
Joe Cole Jan 2015
We lined the ridge of Senlac hill
The shield wall stood five men deep
In the autumn chill
The came at us on horse and foot
But we were the men of the Sussex weald
Men who would not yealed
Our shields now hacked and broken
Bodies bloodied bruised and sore
But we the housecarles of the English King
Would stand and fight the war
Prince William came with his aray the English crown to take
But we the men of Sussex
Would many French bones break
Alas our shield wall has broken
Kentish men on the right have charged
They sought to cut the Norman line
And so the men of Kent did die
The French now archers did deploy
With bitter arows fired high
Harold, our king, our leige Lord
Took an arrow in his eye
We gathered round his body
We men of the Sussex Weald
Our king was dead, the battle lost
But Sussex men don't yeald
The shield wall now in disaray
Large gaps now opened up
Brave men now die before the spear
From the broadswords vicious cut
And so we died on Senlac ridge
But there were no wounds in our backs
We died for England's glory
Cut down by spear and axe
The battle of Hastings in 1066 when William of Normandy took the English crown. The battle on Senlac ridge is about an hours drive from my home and I have visited the site many times
ioan pearce Mar 2010
rhondda boy, don't deploy
your life to poor existence
pits are closed,but not the song
welsh heart, and it's persistence

past unfair, leave it there
where history has stung
memories of  bampas words
and every song he sung

look ahead in all thats new
don't wallow in your woe
pits are gone, but not the song
your bampa used to now

— The End —