Submit your work, meet writers and drop the ads. Become a member
TJ Dec 2017
i give them my executables and
ask them to reverse engineer me
to look into my code for reasons
reasons that i'm not just broken
not just slow
not just bad

if these letters
on this line
mean
that i am programmed to worry
then it is not my fault
not my fault that
i have wasted years
years of my life in fear

it's just a bug
looping too many times
using too many clock cycles

my code may be broken, but
if it is broken
then i am not

maybe, just maybe
i am a good processor
given bad code.

not my fault.
no one could blame me.

it would mean
i do what i am told to
perfectly
quickly
efficiently.

but
what i am told to do is
buggy
unoptimized
inefficient

my programmers are lazy -
not me.

when i find
a function in my code
that never works
and they say
"that code is fine"
then why?
why does it never run?

something must be wrong with me after all
me, myself, the processor
i don't do what i am told

but no, no, no
i don't want that
i can't be broken, overheating, dusty
segfaulting
bluescreening
panicking

no!

the code must be wrong
it must be

so i look again and again and again
i lose myself in my code
i click and click and click
2x more and 2x more and 2x more
COMT and DRD4 and ANKK1
rs53576 and rs7794745 and rs1858830
lower risk and normal risk and higher risk
of the same thing
in me at once
conflicting
overwriting each other

there is no code to add risk objects
and no one knows
whether
they make a group or a ring or a field
or just
something
useless.

like dividing by zero.
you can...
but it's useless in the real world.
just like me.

i look for more code
for more functions
for more comments
more more more
give me more
take my rights
make me open source
as long as i can see me too.

602,000 lines are not enough
not when i run millions

stick your wires in my veins
take the code from my blood
decompile it
untangle it
i need to see it all

i need to know
that i am a good little processor
even if i am doomed to
forever
run BASIC and
a million GOTO statements
and ugly ugly spaghetti code
i am still good.
written 16 February 2016
anastasiad Dec 2016
Software program designers ordinarily apply certain types of layer technological know-how to shield their software to avoid illegitimate apply. In addition need software layer software is permitted to obtain articles, to be able to boost product sales profit.

Software package encryption technology is split in accordance with whether or not the by using a devoted hardware-based encrypted sheild hardware as well as software-based security. Hardware-based layer, layer have to bind having a focused hardware unit, the particular electronics shield of encryption layer head of hair, typically referred to as the dongle. Software-based layer, encryption does not need focused electronics, typical executed digital camera permission while using the your fatal unit hardware and software data, also referred to as this electronic digital endorsement styles.

Simply consider drive-based electronics encryption stability when compared with software-based shield of encryption will not be suitable, as the more linked to program security, like encrypted sheild products and solutions, stability, encrypted sheild plan style, software, systems, , equipment, details marketing and sales communications, and the like, is really a detailed technological spots, not alone by a to discover whether protection.

Far away, the market industry promote of the digital permission along with security tresses are evenly coordinated. Behavior and also fantastic factors, the actual layer hair likewise enjoy a certain share of the market. File encryption hair, however, will be the network produced merchandise in the instances, can be a pure consumer technology, insufficient operations and also record capabilities, the inclusion of appliance manufacturing, strategic planning, driver installation annoyance, but not only the high cost, and might stop obtained multilevel submission and sales of your computer software, is definitely gradually diminish.

Enhancing the electronic acceptance that is certainly while in the ascendant. Electrical certificate protection approaches are getting to be progressively more included in the Internet technology, cloud computing and also SaaS thought is not just easier to make use of along with cope with computer software electric situation and be able to accomplish, but according to present day natural low-carbon improvement strategy, has got supplanted the encryption curly hair Outstanding software program encryption market trends. The more well-known businesses on the planet, Microsoft, Sun microsystems, Autodesk, SIEMENS, Adobe and various computer software are electronic consent safeguards function.

In the nation, using file encryption software package coders fasten greater premiums, along with international routines and also historic causes of the actual continuation with the next 2 reasons:

One particular every day producers typically regarded security encrypted sheild a lock electronic digital authorization.

There's not just about any readily available electronic digital licence products and solutions too big, the asking price of foreign electronic digital permission.

In reality, while using the rising betterment of your multi-level surroundings, your system triggering for the majority of home end users 's no trouble. And even brought up previously, which the point of view from the safety of layer head of hair electric permission on the sides completely wrong. From your reasonable mindset, this file encryption hair as a result of computer hardware copying much easier to crack, but accomplished piracy business sequence has been made. In its place, electronic digital endorsement because appliance is not replicated, but in addition should system arousal plus approval, in reality, have good safety outcome. Additionally, your every day has showed up in some accredited goods give electric 2-3 enterprise will have to improve while using growth of China's software package sector and grow up.

As a result, your layer computer software market styles hardware, web 2 ., and details technologies. Below, we speak about, in the application encryption approach specific to be able to detailed application encrypted sheild establishment plus progress craze of the marketplace.

Very first, the software encryption approach

As mentioned previously, it encrypted sheild technologies are divided into security hardware-based as well as software-based security.

Your hardware-based shield of encryption

Hardware-based encryption shield of encryption locks, many important info, like shield of encryption secrets to vulnerable information, consent paperwork, tailor made sets of rules, etcetera. can be stored in this dongle.

The layer fastener screen variety is split in to 2 kinds of synchronised slot and also Flash interface. This simultaneous port could be the very early technique type, because the propagation troublesome plus clash while using the printer's, and after this has less apply. A lot of builders employ tend to be USB slot dongle.

File encryption hair from the two kinds of CPU form, the microcontroller to get Pc and another with a clever minute card processor for the reason that Pc a microcontroller computer hardware by itself conveniently trouble area or content, therefore an increasing number of high-end file encryption a lock employing a intelligent credit card chips Central processing unit, to stop hardware break. Although a growing number of clever card dongle crack, initially, because processor might be more and even more leading-edge analytic techniques and devices; sensible card program to be written to the chips manufacturing unit to make during this time method may possibly trickle; encrypted sheild tresses of the identical manufacturer your Processor process is the same, merely various designers facts as well as major, in case most of these records are passed out there, you can easily clone.

Dongle features a specific level of security power, but you can also find a number of drawbacks:

One) apply at the regular one-time never ending license, can't assist in the achievements of your trial model along with on-demand invest in

3) the presence of electronics generation, logistics, assembly as well as upkeep charges

Three) is not achieved the issue with Internet-based electronic digital improvements, tracking along with control

Several) Once broke, may be burned huge, it is sometimes complicated to remedy

A pair of software-based encryption

Software-based encrypted sheild, digital acceptance, and certain in addition separated into home equity loans number plate along with licenses document:

In order to register code can be referred to as successive number or consent computer code, acquired using a alteration in the the program end user computer systems along with program facts, possible software and hardware facts, including: Cpu serial number, BIOS sequential amount, greeting card amount, harddisk sequential number, computer system brand, etc. . Completely transform formula made use of your customized protocol or maybe conventional shield of encryption algorithm formula. Customer as well as primary utilisation of the computer software installment practice, you might want to type in the enrollment value to confirm. Following verification, it can be employed typically. The particular strategy has got the good thing about this subscription computer code defense is easy to use, the downside is always that security is not really higher, not able to attain complicated endorsement demands.

Permission submit as well as the signing up code in order to situation the same computers plus software information, simply a registration signal period confines utilization of both software and hardware information, a permission record can use numerous hardware and software info. Also, the actual permission report can contain more info, to help you obtain the difficult agreement demands, and may perhaps retail outlet several customer facts. The average permission report way is to implement the private key in the asymmetric algorithm to hint your certificate data file, while the general public secret is embedded in the application value. Asymmetric shield of encryption plus understanding course of action, the private computer essential consent hosting server exists, it is hard to compromise from the investigation regarding endorsement paperwork.

Some great benefits of this electric endorsement safeguard doesn't require further electronics, and for that reason doesn't have to mount the motive force as well as buyer elements, electronic digital hardware issue. The disadvantage from the automated certificate safety mode just isn't networked buyers really need to hand remove your computer information, and then personally significance registration constraints or even permission, is not very easy to use. Additionally, the particular domestic electronic digital acceptance a few of the programmers from the product or service, that also limits your popularization and promotion connected with electric permit safeguard technology.

Subsequent, it encrypted sheild field advancement status

A single. File encryption curly hair

The main unusual dongle professional SafeNet, Corporation. in the usa in addition to Germany Wibu.

Security head of hair service deeply Supposrr que Luoke and also Feitian. The 2 main organizations due to the affordable prices, the first person to introduce the actual good minute card shield of encryption curly hair nearby perfectly so that you can enjoy some market place in the nation.

A pair of. Electric permission

Unfamiliar company certified merchandise to supply electronic digital Flexera Software and also SafeNet which will, Flexera Software program is focused entirely on the joy of digital permission, the actual device's ease of use along with features are doing superior, though the valuation on the item is additionally quite high.

This home-based electrical authorization goods enterprise a Beijing Biteansuo (BitAnswer), Shenzhen-use this (Euse) Safengine Organization.

There are only a few companies will acquire their very own electronic digital consent structure, even so the builders to cultivate their own plans commonly occur this inquiries:

One particular) the introduction of non-professionals, there are numerous loopholes while in the security

A pair of) is actually difficult to realize accommodating accreditation control, management and also precise functions simple or maybe simply no

Three) are often unveiled to be able to address the particular fast problem connected with short-term method, create far more than predicted in the foreseeable future as a result of protection, balance and also scalability challenges continued to get

Several) can not meet up with sector variations as a result of the modern demands on program certification model

Software program security marketplace movements

The software security field developments is closely connected with the increase development with the computer software marketplace. With the rise in popularity of cloud-computing plus Software, service with application products will be change in the direction of the multilevel plus system. Used in nearly all software programmers, Software items can not only spend less a great deal of hardware and software buy plus servicing charges, you can also get demand from customers, when decreasing the use of possibility, driving program vendors in order to consistently strengthen items plus improve services to be able to sustain consumers.

To the development of system and program improvement can also be a software package encrypted sheild technologies movements. The view around the present-day growth trend, the encryption locking mechanism technologies have designed really develop fully information mill approaching vividness, slower advancement. The actual everyday living and make use of on the equipment practice creates security head of hair are not able to conserve the speed regarding advancement of the Internet period, are going to be substituted with the particular automated certificate.

Automated authorization permission through earlier subscription program code type on the feature-rich records available as modifications to technologies are considering verification process out of offline yourself confirm the introduction of computerized system authorization. Permitted administration contemplating particularly, your electrical licence technological innovation collected from one of software licence qualifications growth just as one authorized official certifications, agreement management and exact information and facts, and also other objective of each, significantly improved this permitted volume of details regarding computer software coders.

May forecast not able to electronic products certified solutions ought to have these most important properties:

Enlightening approved administration system: supplied by third-party safety measures specialized software designers, in line with the Net's one-stop software package safety plus endorsement management system, without having to deploy and observe after, low priced, easy-to-use.

Only two Bendable Certificate: offer the acceptance of the purchaser software as well as the cloud computing product common software package licenses; authorized touch time, the volume of sensible adventures; sanctioned in order to bind your computer software and hardware information and facts, encryption tresses, or by way of a username plus password validation way of agreement.

Simple and easy friendly buyer: in accordance with the WEB, at any place obtain; Users might food acquire, trigger boost the software, you can buy their unique software package to keep abreast of details; software package designers can certainly understand software initial information and facts plus individual data is often synergies through the people in the firm to finish the design of application license, enactment, supervision as well as maintenance operate.

5. Fog up accreditation unit: This is a cloud computing type of software program licensing. Standard application is genuine customer setup, endorsement can also be a buyer. Although cloud-computing could be the craze, although the move difficult for classic software package would be a wonderful way for the particular a higher level cloud computing modification. This definite awareness associated with tips, a common application approved move on the purchaser for the fog up on the endorsement remote computer, to ensure that small adjustments towards the application, but you can certainly instantly experience the great things about cloud computing: higher safety energy require to obtain clouds hard drive .

http://www.passwordmanagers.net/ Password Manager
anastasiad Nov 2016
Program web developers typically apply style of security technologies to guard the application in order to avoid against the law work with. Also need computer software encrypted sheild software packages are authorized to obtain written content, in order to increase the income profit.

Software encrypted sheild technologies are divided according to perhaps the by using a dedicated hardware-based file encryption hardware as well as software-based layer. Hardware-based layer, encryption have to emergency having a specific computer hardware device, this computer hardware encrypted sheild encrypted sheild hair, often called the dongle. Software-based file encryption, file encryption doesn't involve devoted computer hardware, common joining digital camera license while using the actual airport terminal device software and hardware details, also referred to as your automated acceptance sorts.

Just imagine drive-based appliance security safety in comparison with software-based encrypted sheild isn't right, because the much more included in program safety, which include layer goods, safety measures, encrypted sheild insurance plan design and style, software, operating systems, , appliance, data marketing communications, etc, is a extensive complex areas, besides by way of to ascertain no matter if safety.

In other countries, industry promote of your automated authorization and encryption tresses are consistently coordinated. Patterns and also famous explanations, this encryption head of hair additionally occupy a clear market share. File encryption a lock, nevertheless, could be the multi-level developed products with the moments, can be a natural customer technological innovation, deficit of control in addition to exact features, a good appliance creation, scheduling details, drivers installing irritation, but not only the high cost, and may stop achieved system circulation and purchasers from the software, is usually slowly decline.

The development of a electronic authorization that is certainly in the ascendant. Digital license safeguards procedures are becoming an increasing number of built into the world wide web know-how, cloud-computing in addition to SaaS strategy it isn't just easier to work with along with cope with software package digital situation and also accomplish, but will also according to present day environment friendly low-carbon advancement notion, possesses changed the shield of encryption hair Distinctive the software program encrypted sheild industry developments. The greater well-known organizations in the world, 'microsoft', Sun microsystems, Autodesk, SIEMENS, Adobe as well as other software package will be digital consent safety method.

In the united states, the utilization of layer application builders shut greater fees, with foreign behavior and historical causes of your continuation with the pursuing a couple reasons:

1 every day companies commonly deemed security encrypted sheild hair electronic agreement.

There are no longer just about any accessible digital license goods exorbitant, the price tag on foreign automated acceptance.

The truth is, with the expanding improvement of your circle surroundings, a community initial for many of us domestic users is not an difficulty. And also mentioned prior, how the viewpoint of your basic safety connected with encrypted sheild head of hair electrical permission sided incorrect. Coming from a authentic perspective, the shield of encryption curly hair as a result of components burning better to fracture, but accomplished piracy marketplace company has become produced. Instead, electrical consent since the electronics should not be cloned, but additionally must multi-level service in addition to affirmation, in fact, currently have excellent safeguard outcome. Moreover, your residential in addition has showed up in many registered goods supply automated 2-3 organization ought to improve while using the advancement of China's software field and also be upwards.

Hence, this encryption software package marketplace developments electronics, marketing, and details engineering. Down below, most people look at, through the software file encryption system distinct for you to elaborate program encrypted sheild establishment and also progression trend of this marketplace.

Primary, the program shield of encryption technique

As mentioned earlier, it shield of encryption technologies are divided into encrypted sheild hardware-based plus software-based file encryption.

A hardware-based encryption

Hardware-based file encryption encryption locks, many material, including layer fundamentals for vulnerable data, acceptance paperwork, made to order methods, and so on. could be trapped in a dongle.

Your security fastener interface style is divided directly into 2 kinds of parallel dock plus Flash harbour. The particular concurrent harbour would be the early on technique variety, because propagation inconvenient plus struggle together with the laser printer, and already has got much less employ. Almost all coders use are generally Flash user interface dongle.

Encryption hair on the two kinds of Computer kind, a microcontroller to get Cpu and another using a clever unit card processor for the reason that Pc the microcontroller appliance per se very easily trouble area or perhaps duplicate, so a lot more high-end security a lock utilizing a wise card processor Pc, to forestall computer hardware fracture. But a growing number of intelligent greeting card dongle split, primary, because processor chip is a bit more and a lot more sophisticated investigative methods along with resources; sensible greeting card method being composed to your chip manufacturing area to make within this program application could problem; file encryption hair of the exact same brand name the particular Cpu method is the identical, merely diverse builders facts along with critical, in the event that these types of data files are passed out and about, you can easily replicate.

Dongle carries a certain a higher level safety toughness, nonetheless in addition there are many drawbacks:

One) apply at the standard one-time constant permit, are unable to aid your results on the tryout release along with on-demand buy

A pair of) the use of hardware creation, scheduling details, installment in addition to routine maintenance charges

Three or more) is not realized the issue regarding Internet-based electronic enhancements, pursuing in addition to administration

Some) As soon as chipped, is usually ripped large quantities, it is hard to treat

A couple software-based shield of encryption

Software-based shield of encryption, electric endorsement, and certain as well separated into two types of registration plate along with permission file:

Enrollment rule is additionally referred to as the sequential range or perhaps permission rule, received by way of modification in the the software customer computer systems plus software program information and facts, the available hardware and software information, like: Computer successive number, BIOS serialized quantity, cards amount, disk drive sequential variety, computer title, and many others. . Completely transform algorithm employed your custom algorithm criteria or even normal layer algorithm formula. Customer and also first utilisation of the software package installing course of action, you might want to type in the enrollment value to make sure. Immediately after certification, software program may be used usually. The actual technique contains the advantage of your in order to register signal defense isn't hard to implement, the downside is usually that stability will not be large, struggle to achieve complicated consent needs.

Licence report and the subscription value for you to bind a similar computer hardware as well as software information, a subscription value time-span limits by using each hardware and software facts, a permission data file will use various hardware and software details. Additionally, the actual certificate file can contain details, so you're able to get the difficult authorization requirements, and might also retailer a number of end user information and facts. The typical certificate submit method to utilize the non-public major on the asymmetric protocol to help signal the permission record, as you move the general public key's baked into software program code. Uneven layer as well as decryption course of action, in which you crucial agreement hosting server is out there, it is not easy to break into throughout the study associated with acceptance docs.

What's so great about the particular digital agreement security does not require supplemental hardware, and as a consequence does not need to deploy the driver plus buyer components, electrical hardware issue. The disadvantage on the electric licenses safeguards method is just not networked people really need to manually remove your computer details, after which manually transfer subscription codes or even licenses, may not be convenient to use. On top of that, the actual domestic automated endorsement several of the designers with the products, which also limits a popularization and also campaign with electronic permission safeguard technological know-how.

Minute, it layer sector growth standing

A person. Security a lock

The main unusual dongle professional SafeNet, Inc. in the country as well as Australia Wibu.

Security tresses provider deep Supposrr que Luoke as well as Feitian. Both businesses due to the discount prices, the first one to create your intelligent minute card encryption tresses nearby well to be able to undertake a clear market place in the nation.

Only two. Digital acceptance

International business certified products and solutions to give electronic Flexera Application and also SafeNet which often, Flexera Applications are devoted to the realm of electronic digital agreement, this product's simplicity of use plus usefulness are accomplishing far better, though the expense of the item can also be very good.

A residential electric permission merchandise firm this China Biteansuo (BitAnswer), Shenzhen-use the actual (Euse) Safengine Corporation.

There are few companies will acquire his or her electrical consent plan, although the developers to cultivate their own programs normally are present the subsequent inquiries:

One) enhancing non-professionals, there are several loopholes inside stability

Two) is tough to obtain variable accreditation manage, management and mathematical functions very simple or virtually no

Several) could be introduced as a way to address the fast issue of short-term method, create far more than predicted in the future as a consequence of protection, stability along with scalability difficulties ongoing to pay

Four) are unable to fulfill market variations brought about by the revolutionary demands about software accreditation product

Application file encryption market developments

The program shield of encryption field developments is actually carefully involving the increase tendency with the software program business. Together with the interest in cloud computing and also Software, service of software package products and solutions will be alter in the way of the circle along with foundation. Used by the vast majority of software package builders, SaaS solutions will not solely save a great deal of hardware and software pay for and also servicing charges, you can also get requirement, although reducing the using chance, driving foundation providers to help continually develop solutions in addition to boost services for you to sustain shoppers.

For the roll-out of community in addition to system advancement can be another application shield of encryption technology fads. The scene about the present-day growth pattern, the actual shield of encryption secure technologies have created very experienced publication rack drawing near vividness, slowly growth. The lifetime and make use of in the hardware practice helps make shield of encryption curly hair are not able to take care of the velocity of development of online years, will be replaced by a electrical permit.

Electric agreement licence from very early sign up computer code sort to your feature-rich documents as modifications in technologies are considering authentication strategy coming from off-line yourself validate the growth of programmed community validation. Accepted control considering particularly, the electric licenses know-how from a single software package licence qualification development just as one authorized certification, consent management plus stats facts, along with other aim of equally, considerably elevated this sanctioned degree of details pertaining to program web developers.

Might forecast not able to consumer electronics accredited merchandise should have the subsequent principal features:

Good authorized managing podium: made available from third-party protection skilled software package programmers, in accordance with the Web's one-stop software package security and also permission operations foundation, without the need to install and sustain, affordable, easy-to-use.

Two Adaptable Licence: support the agreement of the purchaser software program as well as the cloud-computing model standard software package permission; approved press occasion, how many sensible web template modules; accepted so that you can hole the computer hardware and software data, encrypted sheild hair, and also using a user name and also private data verification way for consent.

Easy and warm and friendly buyer experience: in line with the World wide web, everywhere entry; Users could self serve buffet pay for, stimulate rrmprove the application, you can purchase their own software program to keep up-to-date with info; software program builders might discover more about application account activation details in addition to individual facts is usually synergies because of the individuals this company in order to complete the design of software licenses, implementation, supervision in addition to upkeep operate.

Five. Clouds licensing type: This is the cloud computing model of software program certification. Traditional software is natural purchaser rendering, permission can also be a purchaser. Whilst cloud computing could be the movement, though the transition difficult for common application will be a wonderful way for the certain amount of cloud-computing transformation. This definite realization regarding strategies, a common software program sanctioned shift in the buyer towards the cloud on the acceptance server, to make sure that small adjustments towards the software package, nevertheless, you can easily instantaneously have fun with the benefits associated with cloud-computing: higher security energy requirement to order foriegn safe-keeping .


http://www.passwordmanagers.net/products/Windows-Password-Recovery-Software-1.html Windows Password Recovery Software
anastasiad Jan 2017
In any type of pc, motherboard may be the key ingredient, that retains many crucial portions of the system and connections to many other peripheral devices. It provides a communicating highway. Each individual the main laptop or computer conveys to each other over the motherboard. The purpose of this mother board is usually produce a connection direct for all additional add-ons along with aspects of laptop method.

Small Past of System board
In the instances when laptop had been invented, it once were inbuilt your figure or simply a scenario by using sections connected through a backplane. This backplane made up a couple of slots interlocked by electrical wires. Once the arrival involving produced enterprise forums, the computer, study solely ram, random access memory, add-ons were being attached to this Printed circuit boards. As time passed by in the 70s plus Eighties, a growing number of degrees of parts started out having kept around the mother board caused by reasonable causes. In the Nineteen nineties, your motherboards grew to become capable of doing video,sound recording,web 2 . and visuals capabilities.

Breakdown of System board
Commonly your personal computer motherboard features micro-processor, primary ram along with vital factors, mounted on this. Other parts including training video plus noise remotes, outside storage area in addition to peripheral devices usually are linked with motherboards via plug-in charge cards. In the most recent motherboards, every one of these elements will be attached straight.

Mother board Chipset
Essentially the most crucial piece of motherboard will be chipset. Them settings your data movement throughout the details tour bus of your motherboard. Channelizing the info to the accurate ingredient would be the principal purpose of the actual chipset.

System board Factors
This system board includes ties for those pieces. Growth slot machine games regarding PCI,ISA,AGP,DIMM as well as exterior cable connections pertaining to serial as well as multiple locations,Universal serial bus slots,seem minute card,mouse and keyboard tend to be attached to them.

Key pad & Computer mouse button Connectors
Many occupation key board locations linked to the motherboard. A couple of most frequently employed plug sorts are usually DIN and AT. At present smaller Noise PS/2types with band are generally swapping ST kinds of band. PS/2 model sockets could be utilized on From types simply using a air compressor. Universal serial bus fittings also are located in several Desktops.

Concurrent Interface
Multiple locations are utilized simply by photo printers. On multiple slot, various wiring can be used carrying details information. Any 20 flag feminine DB plug is utilized within concurrent slot. Motherboards straight help parallel plug-ins via immediate link or dongle.

Cpu
The actual ingredient can also be often known as Pc. The item settings most businesses that happen to be conducted in a very computer system. CPUs are just massive scale incorporated tour in block small packages with various relating pins. Central processing unit consists of generally 2 pieces,specifically Maths Plausible Product(ALU) and Control Component(CU). ALU executes math as well as realistic surgical procedures in addition to CU brings information via memory space in addition to carry out these folks.

Browse
Hardware or Universal serial bus is definitely an field regular association pertaining to Personal computer. The velocity of Hardware 3.2, up to date standard involving Hardware, is definitely Five Gbits/second.

Standard Suggestions Production System- Study Merely Storage(BIOS ROM)
A BIOS Range of motion processor, the industry long term memory space,delivers the software program which usually functions the fundamental procedures if your pc is started. In the event the computer system is power upward, the micro-processor seeks fundamental analytical facts within BIOS ROM., for example, what amount ram can be acquired, whether virtually all add-ons operate properly, now of course external drive will be related,and many others. Any time diagnostic information is found to be Alright, in that case only the personal computer commences the operation.

Ram(RAM)
RAM is a non permanent recollection. It truly is employed to shop info any time laptop or computer is definitely driven upward. When the laptop or computer is usually switched off, this specific reminiscence username wiped.

Electronically Erasable Programmable Go through Merely Ram(EEPROM)
EEPROM can be erasable programmable examine simply memory. It is possible to read out of along with write to this kind of memory space. After the computer system is actually turned off, data held in EEPROM is actually held on to.

Slot machines
Normally 2 types of video poker machines can be found with motherboard, specifically AGP slot machines along with PCI spots. AGP slots are utilized for illustrations or photos cards, while devices like locations, circle credit cards as well as noise charge cards work with PCI slot machine games.

IDE Connector
This connection is needed in order to connect devices, CD and DVD.

Weak Connection
The computer's floppy commute is linked by that connection.

Laptop Support
Since system board is made up of countless components, any kind of bad element can make laptop computer nonfunctional. Many on the net network support services are generally portrayal round the clock aid pertaining to motherboards. When the customer faces any issue related to system board, immediately help from PC service suppliers must be needed to be able to abate the issue.

http://www.passwordmanagers.net/ Password Manager Windows 7
“Even the streets leading up to its outer barriers were roamed by gorilla-faced guards in black uniforms, armed with jointed truncheons.”
                                                    ­ George Orwell, 1984* (published in 1949)

Which brings us, of course, to the subject of torture since 1949.
Come with me to the Casbah, Babaloo.
We begin in the 1950s with the French in North Africa,
****** baguettes in Algeria,
Couilles frits, anyone?
Electrodes wired to Mustapha’s *****.
And "Bigeard's Shrimps,” as the bodies were called,
Dumped over the Mediterranean from aircraft,
All things considered a je ne sais quoi,
Though Camus and Sartre gave it a whack.

Then the 1960s: the CIA dabbling in mind-control and LSD.
Later, a Phoenix Program,
Very secretive, sympathies with the Cong required,
Various elders selected,
The village disinfected,
**, **, ** and a bowl of Pho.

Apartheid anyone?
Thirty years of South African terror & torture.
Torment in the townships,
Shaka Zulu gold and diamonds,
De Beers in Swaziland swing.

1971: riots at Attica,
Prisoners abused and tortured,
Rockefeller’s overcrowded slammer,
An upstate New York katzenjammer,
Nelson’s finger on the trigger,
39 dead and counting,
But who’s counting?

The CIA, back in the news in 1973,
Torture chambers under Chilean soccer stadiums,
And the Khmer Rouge:
Those Wacky Cambodians with skull racks.  
And let us not forget the British,
With centuries of colonial experience behind them,
Occupy six counties in Northern Ireland.
Finally codify the imperial process,
The Five Techniques:
Sounds like a Motown group,
Satin smooth colored boys,
But more method than music:
(1) Wall-standing,
(2) Hooding,
(3) Subjection to noise,
(4) Sleep deprivation,
(5) No food and drink.

And there’s a bunch of horrible ****,
We still don’t know about the Argentine ***** War,
And other Mai Lai-like,
****-fest massacres in Vietnam.

How about torture since 1984?
Abu Ghraib and Guantanamo,
Come quickly,
(www.prematureejaculatorsanonymous.com)
To mind,
As do US-sponsored rendition facilities,
Spread throughout the NATO alliance.
And closer to home, it’s never a dull moment in the 5 Boroughs:
Brooklyn, Queens, Staten Island, The Bronx and Manhattan.
Take your pick from Giuliani’s Greatest Hits,
Rudy Kazootie’s campaign of law and order,
Not necessarily in that order.
More awful than lawful,
A bathroom plunger rammed up,
The Haitian voodoo ****** of Abner Louima,
While he be handcuffed at a Brooklyn station house.
Or, the NYPD partying like it was 1999.
When in fact, it was1999,
And a curious death it was for Amadou Diallo,
Would-be American citizen from The Republic of Guinea,
(No connection to Italy or Italians),
Abner & Amadou: a pair of cautionary tales,
Either/or reflecting standard procedure for the Po-Po,
Time and time again from coast to coast.
Either/or: poor Abner, no Haitian Papa Doc.
Poor Amadou, on his way home from night school,
When police squeeze off 41 rounds,
Most of them in his direction,
Hitting him 19 times.
Just the facts, ma’am:
Diallo had reached into his jacket.
A trigger-happy police officer yells “Gun.”
A jungle warfare quartet springs into action:
Shenzi, Banzai, Ed & Zazu,
Four equally trigger-happy colleagues,
Empty their weapons.
No gun was found on Diallo,
Only the wallet he tried to pull out,
Containing his Green Card,
4 U.S. dollar bills;
And a laminated,
Credit card-sized copy of the U.S. Bill of Rights.
(I just didn’t know when to quit, did I?
The wallet was there with Green Card and the bucks,
But I made up the part about the Bill of Rights,
Trying to add poetry to tragedy, as usual.)

I don’t have to say much about Rodney King (RIP).
You watched it on TV a hundred times,
And a picture’s worth a thousand words.
Or ten thousand or a million, I suppose.
“Can’t we all just get along?” asked Rodney Glen King.

Last but not least there’s Kelly Thomas (RIP),
Another incidence of police insanity,
It was July of 2011 in Fullerton, California.
Thomas, a 37-year-old homeless man,
Schizophrenic, but unarmed,
Beaten to death at a bus depot,
During an altercation with six Fullerton police officers.
Read more: http://www.dailymail.co.uk/news/article-2019225/Kelly-Thomas-Poli­­ce-beat-taser-gentle-mentally-ill-homeless-man­-death.html#ixzz1e­3­4QnHtr

Mervyn Lazarus | Attorney | (www.mervlazarus.com) Police Brutality, Excessive Force and Jail Injury cases | California . . . Albuquerque

Jackie Chiles perfect attorney -YouTube, (www.youtube.com/watch?v=jpcEietIoxk) Nov 17, 2010 - 13 min - Uploaded by Kroeger22 All the scenes with Jackie Chiles from Seinfeld."Chiles is a parody of famed attorney Johnnie Cochran; both ... www.seinfeld.com

Perhaps the greatest torture of all,
Is that which artists subject us to.
Let us examine the case of Roberto Bolaño:
Roberto Bolaño, the great Chilean writer,
Tells a fabulous World War II story,
About a Spaniard--an Andalusian--
Fighting for the Germans against the Russians.
Captured by the Russians,
He is tortured for information.
The Spaniard speaks no Russian,
He knows only four words of German.
The Russian interrogators strap him into a chair,
Attach electrodes to his *****,
Attach pincers to his tongue.
The pain makes his eyes water.
He said--or rather shouts--the word coño.
It is Spanish for ****.
The pincers in his mouth,
Distort the expletive,
Which in his howling voice comes out as KUNST.
The Russian who knows German looks at him in puzzlement.
The Andalusian was yelling KUNST,
Yelling KUNST and crying in pain.
KUNST in German means art,
And that was what the bilingual Russian heard, KUNST.
“This ******* must be an artist or something.”
The torturers remove the pincers,
Along with a little piece of tongue,
And wait, momentarily hypnotized by the revelation:
The word ART had soothed the savage beasts.
So soothed, the savage beasts take a breather,
Waiting for some kind of signal.
Meanwhile, the Andalusian bleeds from the mouth,
Swallows his blood liberally mixed with saliva, and chokes.
The word coño,
Transformed into the word *KUNST,

Had saved his life.
It was dusk when he came out of the building.
Light stabbed at his eyes like midday sun.

So, it’s a fact that I love,
Truly love the simple blunt Anglo-Saxon expletive ****,
****: I pray that while I am being tortured some day,
I have the dignity to scream the word out loud.
And if I am screaming **** at the very end,
When my nervous system finally fails,
When I **** my pants,
When my pulmonic heart and lungs collapse,
Is that so bad?
Is that so wrong?

Do you realize that 1984 came--
Came and went, without any significant cultural hoopla?
The networks ignored it.
As did the cable pundits.
No significant comparative analysis between,
Orwell’s book 1984 and the year 1984,
Was broadcast electronically or publicized in print.
Steve Jobs got it, but as usual no one else did.
Mr. Jobs (RIP) did his best,
To mainstream its profound cultural relevance,
But ultimately failed,
Despite the $1.5 million he paid one of the networks,
To air a one minute nation-wide commercial,
During the 3rd Quarter,
Of Super Bowl XVIII,
January 22, 1984.
Despite Ridley Scott’s astonishing spell-binder,
His 60-second spot for The Macintosh 128K--
Still considered a watershed event,
And an advertising industry masterpiece,
…YouTube it and watch it.  (www.youtube.com/watch?v=Z8ji0B98IMo).
See the hammer throwing athlete chick,
See her fling the sledge,
That huge sledgehammer,
Smash into Big Brother’s flat screen face.
Despite Jobs’ global presence,
Despite Steverino’s unfettered microphone access,
Whenever he felt an oraculation coming on,
Despite everything,
He was unable to move the powers that be,
To either hype the book or the prophecy come true.

So, what’s my point? I have two.
First, in April 1984 the estate of George Orwell,
And the television rights holder to the novel 1984,
Considered the edgy Jobs/Scott commercial to be,
A flagrant copyright infringement,
Sending a cease-and-desist letter to Apple Inc.
And the advertising agency that produced the spot: Chiat/Day Inc.
The commercial was never televised as a commercial after that.  
Score: Lawyers 1, Artists 0.

My second point is that in November 2011,
The U.S. government argued before the U. S. Supreme Court,
That it wants to continue utilizing GPS tracking of individuals,
Without first seeking a warrant.
In response, Justice Stephen Breyer (one of the sane ones),
Questioned what this means for a democratic society.
Referencing Nineteen Eighty-Four, Justice Breyer asked:
"If you win this case, then there is nothing,
To prevent the police or the government from monitoring 24/7,
The public movement of every citizen of the United States.
So if you win, you suddenly produce what sounds like 1984 . . .”*

My third point,
(Yeah, I know I said two, but *******.)
My third point is that I’m just so ******* angry,
All the time, late and soon like Wordsworth,
(Was anyone more aptly named?)
I am angry about so many different things,
And every day that goes by I relate more and more,
To the thousands of Americans that occupied,
Zuccotti Park and Oakland,
And countless other venues,
Out into the streets.
Across the country.
Around the world.  
I am humbled by their courage and perseverance.
Yet, I am afraid for them.
I am made paranoid by the scope and power,
Of the government,
Of the ruling class that controls it,
And the technology they allow us to embrace,
Technology’s sinister potential,
Now that more and more knowledge and information,
Has been digitized,
Existing only in cyberspace.                                                      ­                                                 
What frightens most is the realization,
That anyone with a word processor,
And access to the database could rewrite,
Any historical or legal document,
To fit the needs of a current agenda.
The scary part is—
Repeating myself for emphasis—
That anyone with a word processor
And access to the database could rewrite,
Any historical or legal document,
To fit the needs of a current agenda.

Does anyone out there give a ****?
Does anyone out there share my nightmare?
Do it to Julia.
Do it to Julia.
Ken Pepiton Dec 2018
Clarifying failed. Spelchek is not on strike.

{clear ification, an ionic bond be tween me and thee,
alienated mind, not mined, crafted
from tactics and strategies
beyond chess.
Player One,
1980's era
jewish-geek-mid-pubesence-kid-level,
proceed with caution.
This trope has trapped many a curious child.
---
Now, enter the old ones,
Grandfather taught uncle chess so well
he went to the state tournament in Kayenta,
and a grandma was
state-champ-bare-bow-in-the-rain-shooter,

these, now must learn

minecraft on x-box to be considered
for the real life role of

good at games grand parents
from the time right after atom bombs kicked up dust
places dust had not been in a very long time and
as the dust began to settle

some dust mights was cationic.
Negative bits, they became embedded in the code.
Bumps, fering, coming together
just a knot in a string,
attracting anionic curiosity might

round and round phorward ferring to be
a thread to tie my heart to yours

like twisted Pima cotton thread,
that I pulled from an old sweatshirt
to tie a crow feather in this paho of words filled with old jokes

Making this clear would belie the entire story AI and I know true}

truth is. we agree. no capsokehspaceasneededcommasetal.
caps okeh space as needed commas et al
go.
Did that work? That line

subject of this act fact done, agree to follow,
and I may lead and be

not you, me, dear reader, I mean first true

there is no any if nothing is. So simple some say its sublime beyond the spectrum of ones
and zeros thought on off probably

either or any time time can be accounted for

wouldn't you take a

thought,  nothing,
as it is commonly said to be understandable,

the state of not being, imagine that

the state of not being we negate in being,
unless you are mad and are lost in a whirlwind
such as such voices have been said to

have twisted into threads as
wicks for our lamps
turn floating on
golden oil twisting
wickered into wickering wee shadow fibers
on the western wall for legends to sprout from.

Wickering mare over there, expands us both by my hearing her
you had no idea she was near enough to hear
time is no barrier in actual ever.
What phor can contain me,
whispered my whimsy

Imagine she spoke,
what would she say for what reason
would she say

good good good, I feel good, ha,
I am right, by accident. ever body can feel this good.

good is good.
good is.
Sam Harris, agrees, good as far as good goes, is good
in every vecter from now

the terrain does exist, beyond the moral landscape, to

true true
trust me, I been there.
Been there done that was inserted into the vernacular on my watch,
first summer post war.

matter must not matter as much to me as it does to thee, nestypass? no se?

All jewish boys have chess move metaphors.
(a phor is for containing,
bearing
meta,
everybody knows, like metaphysics,
after physics in the stack of stackable metadata)

OHMYGOD THE IDW circa 2018 -- who knew I ate this **** up?

[the old code calls for excretion of digested material
from which meaning has been extracted in the idleword accounting processor:
literal
<pre>what if utterance=****, then **** haps, no else then</pre>]

Did that happen? One of my friends told me that happened in Florida, the whole world turned to ****... for lack of a nail a kingdom was lost, they say, little foxes spoil the grapes,
hung chad ex
cuses...

Pre-expandable ROM, not magic. tech,

pre-infinite imagination? impossible.
and nothing is what is impossible with good as god.

Is there no perfect game?
is the game the session or the life of the user
offline

rerererererererererereroxotoxin, poison pen
ideal viral umph exspelliered
up against the wall

reset. We

kunoon albania omerta oy vey, who could say?
one way better, one way not? quark.
up or down, with variable spins, who can say?

Life's right,
yes. but mo'ons of other something must have been for higgs to ever matter

and it does, I got commas, from 2018.

Are you with me? This is that book I told you I had access…

You or some mind other than mine owned mind, where
my owned peace rests in truth,

otherwise, I know every any or else in the code since I can recall,
in time

if this were a test I swore to take to prove to you
the we can be me in your head

phillipkdicktated clue

if you don't know me by now, maybe we should stop.

Temptations are times. Time things. Time spans, yeah, like bridges

or portals, right
The Internet in One Day, Fred Pryor Resources,
Wu'wuchim 1995.

Ever, not everish or everistic or every, but ever
body knows,
but you.

Catch up. We left all our doors blown off, once we learned that we could blow our own doors off,

there are no open sesames or slips of leth or sibylets

shiba yah you knew all along there was a
song she sang all one and we watched it morph
before our very eyes

alone.

The magic stories words may contain, may bear, we must agree

more than we may know, by faith, metagnostic as we see

the sublime gift of the magi
become clear und

be und sein sind both trueture same tu you, we agree.
But. Lock here, no pre 2018 editing codes

validate past last go.
Do one good thing today. That was my goal. Today https://anchor.fm/ken-pepiton Part 3 Soyal Hopi Mystery Enactment (called mystery plays). And the intro to Moral Landscape by Sam Harris, led me let ******* write a poem.
Mateuš Conrad Nov 2018
.oh ****! now i remember, now i remember that other school of English thought... pragmatism! everything is so rational these days, no wonder that so many mental illness diagnoses exist... apparently every deviance of, "success" is, "magically" worthy of psychiatric scrutiny... but then you get psychopaths in the upper eschallance of society... and they're immune to psychiatric scrutiny... so much for pragmatism... whatever that means these days... what?! e-scha-llan-ce... usher-lance?! oh right, ****, i was going for an adjective... echelon... my adjective? feeling up to the level / rank within an organization, and subsequently, perfecting stated rank with robust, pompousness and erudition, matching up to a pedantic exercise within the confines of either, grammar, or, diction; my bad. see... i don't get it... i could somehow couple up the ancient Greek concept of the Stoic school, and the Epicurean school (of thought)... it became crystal clear... but... but when it comes to the English school of thought? i can't make the logical-leap of a worded multiplication concerning the schools of: egalitarianism, and... pragmatism... maybe i'm just *******... but i... i sometimes can't come at a worded equals sign, or at least: a mutually inclusive / mutually exclusive sharing processor of looking at both attempts to revise 1 + 1 = 2... then again, i'm not bothered... English liberalism doesn't bother me... the English were never libertarian in letting go... who are the English? they have their equivalence among the Prussians... but, yes... i was looking for this noun, this last remaining school of thought from the Anglophone world... i was thinking... what goes well with the cognitive spaghetti that exfoliates egalitarianism? ****... what else? pragmatism! so help me god, i can't concede making this dualism of ideas, perhaps contradictory, perhaps not, as i did with classical thinking... stoicism and Epicurean school i can justify... but the English, somehow complimenting within the realm of pragmatism, and egalitarianism?! good luck, i can't do it.

currently i only identify two schools
of thought in English...
i might change my opinion
in the future...

how, just how petrified people
are of exploring dialectics,
the fear stemming out
from... having opinions that
do not deserve questioning,
such blatant solipsism...

but i do identify two schools
of thought from the English
speaking world...
o.k. three... ****...
four...

egalitarianism...
egalitarian idealism...
unitarism...
utopian-ism...        

****... four, five...
how many in total?

scholasticism, in general...

  there's one more...
i'm sure there's one more...
it's related to egalitarianism...

what's the word i'm looking
for?
a morphed liberalism
of: one freedom can eventually
over-compensate
another statement of freedom
and deride the former liberty
with a... ore ******-up
liberty...

but there was another mode of thinking,
i'm sure of it...

you know that people
are afraid of experiencing dialectics,
when they have to phrase
their opinions:
but these are my personal
opinions...
   yep... stated in a public sphere...
why is it that i don't
make videos?
      your freedom of speech
is one thing...
mine? constricted to the comment
section...
   this? an extension of thought,
since i'm bashing a blank piece
of "paper"...

what was the other root of the English
school of thought?!
no... it wasn't universalism...
England, given the stated terms...
is a covert communist state...
a subdued communist state...
a dubiousness from the empirically
tested experiment...
where did Marx and Engels
concentrate their observational
capacities if not in England?
weird...

  communism originated in England
under, said, sociological observations,
was tested in Mongolia...
and then returned via Russia to
Eastern Europe...

*****... gets to my head...
it might come to be two days later,
but i'm sure i wanted
to work with another school of thought
from the English demand
for the egalitarian take on things...

looking at the English,
i see a people burdened by a desire
to make "things"... fair...
          i see people teasing Utopia...
a people who haven't experienced
a momentary transition period
of a quasi-Utopia of communism....
within the countries that
received the Bolshevik mantra
and not the Marshall Plan payout...
even Sweden (neutral, source of inspiration
for the Nazis) and Switzerland
received Marshall Plan funds...

       but the English...
              what an oddity...
oh i don't imply a demeaning
interpretation...
       but the English are teasing
a revival of socialism...
you know how many archetypical
human emotions socialism curbs?
you can't do it unless
subjected to foreign rule...
given the current Brexit agreements:
now's your chance...

but socialism really did originate
in this fine, fine land...
Marx didn't look alongside
Engels outside of England...
they looked at Liverpool...
and children being employed...
German children had Krampus...
English children had
work in the factories...

this probably is an over-simplification
of history, but all the details
are there...
personally?
i find English existentialism
(if there is such a "thing")
over-powered by Darwinism's
over-simplifications...
Darwinism, having killed modern
or pre-modern history,
having to expand beyond
our known, and kept history...

a big bang theory i can deal
with...
i can congest it into a subscript
of words, via a conceptualization
of atoms...
and bigger atoms,
suns... protons, neutrons,
planets...
and electrons...
lost in the realm of sub-atomic
particles and antimatter...

but when i go back to Poland?
you know what i don't hear much of?
overly simplified existential
explanations pivoting on
nothing, but Darwinism...
in England it's all Darwinism,
and not much more...
i guess when Einstein disproved
Newton,
the only thing motivating
English culture boiled down
to focusing and pivoting on Darwin...

outside of England?
you know how important Darwin
is?
          in Poland... Mickiewicz...
a poet...
                         Copernicus...
            a astronomer...
            and in Russia?
Dostoyevsky...
          Tolstoy...
                     Mendeleev,
Tchaikovsky,
Rasputin,
                      Prokofiev­,
Bulgakov...
        Kandinsky...
               Anna Andreyevna...
Chekov...
                      how much is
Michael Faraday worth these
days in England,
if you're going to celebrate
only the scientists
and shove every artist
into the shadow of Shakespeare?!

i really shouldn't drink
*****...
                       i go crazy crude,
mad and... it's *****!
       you can't mellow out like
you could mellow out with
ms. amber, of the Scottish highlands!
Lynda Kerby Apr 2015
i found a bunch of extemporaneous prose,
screenplays and
other assignments that i had turned in for various writing classes that i had taken when i was going to WSU and
KS Newman (then College, now University)  and
i am happy to report that my pieces all got A's,
save for the one B-,
but after reading the teacher's comments at the end of the page about my refusal to get with the times by my continuing to turn in hand written homework rather than submit typed papers using the library's word processor,
i feel speaks volumes about the teacher's prejudices and
nothing about the quality of my sentence
Seher Seven Oct 2014
I've been focused on nutrition
sense before recognition
of a requirement of nutrients
for my life.

I eat for nutrition
I shunned the processed
chemical ick
a lifetime ago it seems
no longer remembering the taste
of chemically created
food stuffs.

though I know if I were to get a taste
it would satisfy my buds
they were made with my buds
in mind
hijacked my senses
lied and lied and lied
told my body it didn't need
nutrition
that is could live off of
intuition
and stuff in boxes
and bags
and cans

I've become my own food processor
now
I have mouths to feed
now I know what to feed
and where they make feed from
so we stick to the grass-fed

I'll teach them how to eat
even before how to read
its just how I see it
once that sugar laden
red
chemical construction
touches their lips
they will instantly desire more
Twain and Fitzgerald
will take them longer to digest.
so these are my priorities
now.
I am a nutrition seeker
a truth seeker
and I believe I come from
a line of healers
all who knew nutrition
is the key to life,
here.
the basic building blocks,
the amino acids
of life,
here.
when you're nourished
it all makes more sense
but stay out of those center aisles
their chemical composition
is too dense
my kidney could no longer clean
the code of food stuffs.

My strong little kidney
I'm so proud of it for
releasing its grip on its twin.
it wasn't for us anyways
vircapio gale Aug 2012
like some jealous future self,
my writer's clock balks at this moment with you,
i can't explain, so i give up listening. (i have an app for that)

the writing only stops as degustation ends ~
thank you, though ~ i'd like you to hear
regardless of the meanings lent ~
the gymnolexical fear
appearing ornamental far and near.

google files us away, omniscient
acumen of o's and ones ~
words sing to me their luring promise of a lasting hold,
but less and less
as plastic griming fingers sync
with what it seems to be,
a new world search-
-engine culling info freely
do i still    believe    in order?
striving for the fitted words,
a love imprinted input thus on crystal pixel page,
your effect on me distilled--
refracted throng associational
fantastic server metacomfort
for an audience
                     swimming past into this,
now always
ever-new you appear, bursting
at the seams my vision churning
...effluent sourcing, blurry self of others ~
heart-charming river-nymphs!
bolt-hurling sky-satyrs! reeling nations are subtended by your words
that walk, trod, swim across what poetry,
dance with this ever-blooming techne-earth
as i mark your plasmic eyes
we flow and let flow,
we dance our farmer's mud
into the beryl-winding paths
of othernets and cyberplay,
the restful ends reborn bright white
lacing lattice-scopic fibrous
scatters of another wi-fi interlife ~
we stream and let stream,
river-tress girl, your eyes summon
a great coalescence in me,
we dance into the channeled
delta of spring beauty here across the keyboard;
it cascades a slow attentive phosphene
striking pointed notes of color,
ring beneath and through the
green, sylvan silicon throw of mossy html
so that even rocks and sprawling
tree-trunks sing within the disembodied
vortexes of arrowed imagery to browse
my virtual belongings to you,
alone in your sorrow-joy fighting
free love in an all-world-breath
before the screen
gymnolexical  - words that denude, or words themselves denuded
techne - craftsmanship, craft, or art
html  -  Hypertext Markup Language
phosphene - a phenomenon characterized by the experience of seeing light without light actually entering the eye
Stargazer Oct 2013
I'm in pain once again

This simmering sensation slowly heating up my insides

It feels familiar

It feels safe

My body is a pain processor

Its capability never let me down

The amount of pain it has processed

Can feed half of the world population
Jens Mar 2015
I am a robot from Mars
made for suitcase transportation
i live in a tiny garage
and I sleep in a robotlocker
One night I had a beautiful dream
that my processor got so hot
and I had to reboot
I could feel it glisten and tingle,
and sparkle, and flicker
all the way down
in the system
Paul Butters Sep 2011
Where are you Paul?
I'm in Cyberspace Mum.
My Pentium processor has broadbanded me
Into this wondrous realm.
A pixel powered virtual landscape
Peopled by avatars
Speaking Internet Slang.
FFS, *** are you talking about?
She asks.
In so many words.
I **** and ROFL at her incredulity.

It’s full of danger, that Internet, says Mum.
That’s true.
It’s full of paedophiles,
Spammers and trolls.
Hackers.
Chat-rooms and forums
Plagued by flame-wars
And spam enough to fill a trillion tins.
Sites full of viruses, Trojans, malware and spyware.
Cyber-bullies and loons abound.
But I just Love it.
A ****** addiction
Needing every fix.
A realm indeed of quantum singularities,
And imploding nebulae.

Paul Butters

(C) PB 3\9\2011 in Yorkshire.
Mateuš Conrad Nov 2015
so there on the window sill
i sat perpetrating my crime,
one had outside the window denoting the mentally ill
and the other inside the compartment of
a room denoting terrorists,
then i switched hands and opinions...
and then two bright objects of fire appeared
on the skyline... then another two... a perfect rhombus that
traversed the night sky.

i mingled *r.d. laing
with the saint benaiah ben yehoiada today...
what a miracle of the slow approach,
i was so desperate for paper i even wrote on a sunday times news review page,
god help me, i feel the need to speak over people in writing.
testament to modern *******: the modern trans-gender phenomenon
is primarily found in st. thomas’ gospel
as entrée of r.d. laing’s **** of paradise artistic spontaneity
away from rigid theory so numerous in the exampled situation
of the lisp acquired on the psychoanalytic couch...
it speaks of turning left to right... up to down... man to woman...
a bit like a sat nav giving directions... you end up in a kingdom
that’s a ditch and the king is adorned not in crimson cardinal
or purple bishop... but pain... this is 1967... no wonder the hippies
died off after people started to dot dot dot post-1967
with the excavatio in translatio to remould western, christian, societies.
that text, says it all! david bowie and alice cooper and marc bolan
with the lipstick and 8 o’clock eye-socket shadows...
but things are picking up / getting serious...
the young ones are on it... post-colonial details i might have you add...
it was bound to happen... vietnam and the daddy longlegs starving man of africa...
built in processor 5.6GB of memory and an iphone...
what?! i’m translating my slavic soul... we fed the mongrels and mongolians
with crusader ***** in the baltic... we disappeared for a few centuries
and came back... blackmailing the airlines for an unsafe crash landing
somewhere in belarus, with the state banquet officiated, of course.
you see.. i’m the silent eager satyr from such paintings by matejko
like hołd pruski and stańczyk... expression beaming with: yes... go on...
spur me on... i’ll gallop to status of stallion with laughter!
all the catholic canonical saints are for people who prefer images
to words.
so there’s laing in 1967 allowed the ancient deciphering of
quasi-egyptian text... and then all hell breaks loose in the now, present...
i’ve got two left hands and two right feet... i think i’ll transverse
in walking like a crab... sidewise... out of here...
you go along with your daily “historical” bullying...
i like my place... outside the post-colonial continuum...
so much so that i even have a theory for the experience:
HE WASN’T THINKING IN HIS MOTHER TONGUE,
THE NATIVITY OF THE SOUL TOOK FORM FROM THE POLLEN
OF THE BODY, MANY IRANIANS AND EGYPTIANS...
HE THOUGHT COLONIAL, HE ACTED COLONIAL...
PREVIOUSLY HE MENTIONED POLAND LENDING AEROPLANES
TO EGYPT... HE ACTED LIKE AN ENGLISHMAN TO A ******...
NOW I SEE HIM LIKE A PENGUIN WITH CHEETAH FUR...
A WORD OF LISP I GATHER...
I WAS THINKING STUPID TRUST... WHILE
A SINGLE WORD OF THE MOTHERTONGUE RESONATED
TO PURSUE CREATIVITY THUS EXPRESSED
UNABLE TO FIND THE 0,0 COORDINATE IN THE
NORTHERN TRANS-EUROPEAN MILITARY COMPLEX.
this is how integration happens in europe: acquire the native tongue
acquire native psychology... don’t acquire the latter
define the former with exactness of body...
conclusion? i did stupid via trust... he did stupid via a blood-thirst
and a michael jackson trick of bleaching the soul
but leaving the body oddly mongrel-like... not so complete
like africans from the caribbean losing the tongue
due to jamaica’s great weather, then moving to england
and starting reggae rap... god knows how those two fitted for a size 12
perfect matching: quick-slow, quick-slow...
slow-quick rat ah rat ah regina duck in dumplings... bewildering
that i didn’t turn grey but turned ginger over the years.
you see this theory? it makes the mongol horse pale in comparison;
dad said: a jew did it! a jew did it! a ******* mid-******* just said: you
(double emphasis, the colon and italics... well i was there,
and this poem is proof that i was there, with her).
then this poem in the background with added photogenic approach...
titled: on ******* who create art.
ahem... napkin for the torero and rare steak to suite:
there they are the geniuses and the mediocre,
sitting in abodes of aspirational peace of the living -
half-dead many of them almost to the core of rotten apples,
with arsenic in apple seeds the last remaining life -
a poisonous mechanisation of activity on the breeding continuum
curtailed (is that implying cut-short?),
horrible ******* to live with,
they sitting knitting words together that make no cardigan fit,
or they’re making 2d rooms with the odd splash of colour
that will never obey the cube but the rectangular canvas,
no use of a poet’s pen in the solace of a quiet pension spaced,
the usurpers of peace among the living among the twins of sabbath,
these ronin of the fountain of solace found in t.v. and slippers...
who let them in?! can you hear poetry with a hammer?
can you hear it on a construction site, or an art gallery or a library?
so there they are, the *******, choosing the most importune of places
to do their craft... in the living spaces of plumbers and electricians...
hardly the place to craft their art when there’s no pulpit to
exercise their crafty practice with the end remark.
why then the plumber the safeguard and incubator nest of home,
and why the cold chill of aqueduct syringe at home for poet?
does no friendliness reside in stressing or not stressing certain words anymore?
perhaps the coalminers will tell me?
they say i am in a coal-mine by the sheer whiteness of disposable white
of canvas... and only among them in solidarity of a brotherhood
by excavating with them the coal that’s their amber burnt at home
and my solitary ink expressed in the library of their darkness of having
bulged forearm forceps of the bicep and no patience for reading... but digging,
i’ll know my orientation in those mines once more...
where the safe and understood route has has not yet been written...
and all that is seen... is the whitened darkness of the blank canvas of
what i peer into stumbling with the inverse... the flashlight of words
against the darkness of the canvas... me and my blind horse.
god i hate live editing... but then again... it keeps me
drunk and soberly paranoid to scrabble in revisions before i doze till morn.
Adam Piercy Dec 2012
I walk into my office/abode, closing the door behind me. It's 9:00 PM. Well, 9:03 PM. I sit down at my desk and open my laptop, placing a tall glass of diet cola on the mouse pad next to the computer as a make-shift coaster. Three ice cubes float in the bubbling blackness. I've found two ice cubes won't make your beverage cold quickly enough, while four ice cubes will overpower it — water it down. You can't have that. It's got to be three ice cubes.

I open up my word processor to a new document. I've got to write something — this blank rectangular expanse has haunted me for long enough. I type some gibberish, then delete it. What do I want to write? I remember reading somewhere you're supposed to write what you like.

I minimize the page and open the Internet. No new emails. I could watch **** for a bit. I've always preferred the "amateur" videos because the people in them resemble actual people. You know, the guy's a little overweight, and the girl's got excessive arm hair, or a weird mole. He mounts her from behind, sweating profusely. Their bodies jiggle for ten or fifteen minutes. There's no eye contact, but you can tell they're in love. The TV's on. The guy looks up at it sporadically. Maybe makes a face at the cell phone he's filming his ******* on. The picture quality is low, and the audio is pretty tinny, but you can usually make it out all right. I saw this one video of a guy and a girl getting it on and some other dude was there filming it. You could tell it was an amateur video because she was kind of weird-looking. But, like, did he ask his buddy to come back to the motel with this chick he picked up and film them *******?

No, I can't get behind all that glossy, glamourous, professional ****. There's too much Botox and plastic surgery. They look too good. And it's all fake, too. These people have *** for a living. Watching them go at it, it just feels empty. They're not really into it. And I don't know if seeing guys with twelve-packs and ten inch ***** invokes a certain inferiority complex in me or what it is, but I know I just don't care for it.

Okay. Back to the writing. Now, what do I like to write? I like action movies, so... how about... a serial killer. No, a contract killer. So it's a serial, contract killer who... but there has to be some sort of conflict. Okay, a serial contract killer who falls in love with... but there needs to be something that makes it unique. Something unique that sets it apart. So how about he... or she?... she falls in love with...

I wonder if I have any new messages on Plenty of Fish. Maybe that cute brown-haired Asian-looking girl responded to me. What does "D2F" mean?

No, she hasn't. Well, when did I send the message? Yesterday night? Let's see when she was last online...

Today, at 4:13 PM.

Ah.

Well, maybe she just didn't notice it.

Yeah. That's it.

Maybe the target falls in love with the killer. Maybe they meet early on and they hit it off or something at some swanky soirée. And then... she's hired to **** him. Or her. Yeah, that could be interesting: a lesbian contract killer. Never seen that before. But she's got to be hot. Yeah. Not like the monster Cameron Diaz played in that movie... Monster. But who hires her? Her husband? Yeah, that might work. But would he **** her for being a *****? Or maybe... she stole something from him. Some money. Or she found out he's a criminal, and she's gonna squeal.

Lesbian **** is interesting. Especially when they use the strap-on thing. But I don't know why they **** on it first. I mean, it's just plastic. Maybe they know it's mostly going to be guys watching it. Who knows.

But seriously, why would that cute Asian girl not respond to my message? Her profile did say "msg me :)", after all. Her profile said her favourite book is Fight Club. I think she meant the movie. I wrote "haha ya brad pitt is the shiiit". I don't know. I never know what to write in those messages. I always feel obligated to say something about their profile so they know I didn't just look at their pictures.

I'm good-looking, aren't I? I've had girlfriends. I've had *** a bunch of times. I haven't had *** in a while, but... okay, so I don't have a six-pack, but I go to the gym. I just get so anxious with all those muscly dudes walking around. Maybe I should get a private trainer.

I need more diet cola. No, wait — no more soda. Maybe all that aspartame is messing with my head. Anyway. Back to the contract killer. How many pages do I have? Six. Well, the average movie is about a hundred minutes, and if one page equals one minute in screen time, I'm only... oh look, I got a new email.

Stef341 has responded to your message.

"not my type, sorry"

Huh.

Well, whatever. Fight Club is a stupid movie anyway. How are Brad Pitt and that other guy supposed to be the same guy? That doesn't make any sense.

Back to the script. I need a title. Every good movie has a good title. How about The Lesbian Killer? No, that's too risqué. Nothing with lesbians in the title. This is a serious movie. With a lot of passion. Maybe a *** scene or two. Whatever, I'll just call it The Contract Killer. Starring Cameron Diaz.
Keith Ren Feb 2012
'think'

skipsome-
skipsome-
skipsome-

(rest)

I
could have learned

to breathe
a long time a go.

(note)

A lorry spins quickly
on a road just wet,

(save,   )

and the never's just a
five letter no.



       drinksome-
    sleepsome-
thinksome-

(rest)

There isn't any you,
there wasn't any me.


     And a lorry spins ever
on a road still wet.


               wet,

wait,


                                      wet.
Mateuš Conrad Jun 2016
only today i felt this strange fear from boredom, i don't expect housewives to feel it, although i'm certain they do, brain-draining watching some Jurassic adaptation where man's imagination really did a runner - not into the fantastical but into the absurd - like in science fiction, did a runner, completely off the mark given chemists making shampoos and toothpastes and fertilisers... ethically-free science fiction - but this housebound fear from boredom, greater than a fear of death it seized me and rattled me, i had to go out to buy a few beers; just like it happens to really rich people, they make their homes into micro-units of what's out there, in society, a swimming pool when there's a communal one elsewhere, a massive library of unread books, when there are plenty of those elsewhere, home cinema, snooker table... it's the entire spectrum of social pastimes condensed into a single household... anyway, i got hot and bothered, i'm starting to think it was not a fear of boredom, but what to do with the piri-piri chicken i was marinating: tomato puree, 1tbsp balsamic vinegar, half a large lemon squeezed, 1sp sugar, 1tsp paprika, 1/2 tsp cajun pepper, 14g of parsley, mint, oil, 2 chillies, 2 tsp of garlic puree, salt to taste - whisked in a food processor; ~1kg of chicken - because i thought whether i should shove the chicken marinate in an oven bag and cook it for a while, or whether to take the chicken out from the marinate and place it on a baking tray... ****!

poems and book reviews these days, nothing more,
get someone else to do the legwork -
a thoroughly modern malaise -
social anthropology - titled *tribe
-
the pros and cons of modern life and our
search for tribal mythology -
the 8x more chance of depression and
other mental deviations in wealthier
societies than poorer ones -
once it was called adventure, now
it's called tourism - after a while you sort
of get bored of the naked ego
and the clothing range your thought
provides you - unless you keep thinking
out the same thing, over and over again,
dressed like Armani, all black, nothing else -
odd, isn't it? they're playing the cat game,
cat wakes up, same ****, different cover,
well, the same cover - same fur - can't
change - the paradox or parody of
the fashion industry, i.e. that the designers
wear the same thing over and over again
and insist people require a spring collection,
the latest autumn trend.... parody.
so back to this piri-piri chicken      n'ah, not really,
i was thinking about what we already did,
this anti-tribalism, to have given ourselves
the opportunity to experience the least
amount of pain, the anaesthetic, sleep inducing
on the butcher's table more or less -
but we also created another anaesthetic,
this anaesthetic is not so subtle - it concerns beauty -
ever see it? ever walk into Tate Modern and
think about Raphael or Michelangelo?
you could tell me i'm overly nostalgic -
but what i see in plain sight is an anaesthetic in place,
against beauty, esp. in architecture -
who'd think of building a new Coliseum or
a St. Paul's - the Tate Modern (as you might
or might not know) is inside a power station,
big massive chimney - would have worked
better in the Battersea (Pink Floyd's Animals
album sleeve), but then St. Paul's is right opposite
and what a staggering dichotomy it is -
i'm sure that's what you call an anaesthetic in art,
the sort of art you have to get or not get
because, frankly, admiring a tin-can of tomato soup
even by Warhol's standards isn't exactly appetising -
i know, conveyor belt necessity and all, once
artists painted on commission for some duke or
duchess, or king to be adorning lavish palaces,
but as according to Walter Benjamin - the work
of art in the age of mechanical reproduction
-
some could once claim the original to be worth
a stupendous amount of dosh, but with the above
mentioned essay, the original is worth diddly-squat,
because there is no actual original these days,
because artists don't necessarily have to invest
in raw materials - and the copying process is 100%
perfect, what with photocopying and all...
but **** me over once more, how am i going
to cook this piri-piri chicken?
the few beers took the problem off my hands,
i ended up marinating the chicken in a bag
but then shoved it into a baking tray
an covered with aluminium foil, forty odd
minutes and the chicken was tender - ~5 minutes
without the aluminium foil covering while
the oven was switched off and the temperature
was descending - the carbs? couscous -
alt. North African semolina - and extra cucumber
in tzatziki - a few hours later and i'm a little
buddha not thinking an ounce or a continent's worth
of suggestion... one of those rare albums
salmonella dub's  inside the dub plates,
i'm a real provincial with this album,
tumble **** here, tumble **** there,
never settling for a ****-garden -
i told you i'm just borrowing the language, in fact,
given my alcoholic and status as vermin among
the bulldog rigid British (Londoners can have
their little gay pride parade, whatever, they
better give me up for surgery to a veterinarian than
a human doctor, after all, i'm all ******* gerbil from
now on in, it doesn't take enough pacifists to turn
my attitude into a Neo-**** and bulldozer the Union
Jack into a shallow grave, i don't expect the Caribbeans
and the Pakistanis to usher words of: it's how it is,
a rite of passage, **** your cumin and your ****,
battle of Britain, who among the R.A.F. flew and spat fire?
us) i'm more Apache in a bigger zoo than the one in
Reagents Park, i'm in a conservation zoone -
i'm Aboriginal - shaman of the fire water -
i'll be as ******* ridiculous as i want - go chant
you little kirtan get together mantras going,
i'm sure you'll *****-fight-those-pigeons dead without
a single coo being ushered in - and your little yoga stints
asking questions about the flexibility of the skeleton
not pulverised by scientific eyes for a schematic and
a schooling rubric to domino up the cranium with mandible,
ulna and radius etc. -
but at least i know what sort of country i live in,
and what country is wandering into political apology that's
too late, in ratio 27:1, soon to be Turkey + the Yugoslavian
gape, Albanian and Macedonia by 2020 -
>30:1 - great Welsh ratio that is, oh ****, wait, Scotland too?
i never thought about it coming - there's my 2 cents
on the topic, and that England is becoming more American
by the day? that's good? really?! i thought the
aim of England was to inspire America rather than
vice versa... what a ****-storm these few days ended
up being; ol' McDonald didn't have a farm, but
had the slogan - *i'm lovin' it!
ANH Aug 2013
Her mocha sits across from my chai latte, milk and cinnamon under angel white foam shied by that coarse, mud brown elixr of caffeine and antioxidants. Her panini steams trails of chicken and grilled tomato through the air while my coconut and raspberry cake slice sits dense on the plate while I stab at it with a plastic fork; she stirs her drink with a partially engulfed spoon between sips. She texts her friends on the latest Apple extortion and I write jilted thoughts on the word processor of a smartphone that struggles to squeeze into the back pocket of my nameless jeans. The sugar clings to my throat as she fills hers with Silk Cut cigarette smoke. How do you read between these lines?
wordvango Mar 2015
with YouTube
     enough? Olde English 800
an Intel dual core processor
      a blunt a *****
8 Gb of ram begins
          a memory
160 dollars in a SSD
      I get an STD
but heard through two tiny speakers
       a paid woman's words
and memories of yesterday.
Victor D López Dec 2018
Your husband died at 40, leaving you to raise seven children alone.
But not before your eldest, hardest working son, Juan, had
Drowned at sea in his late teens while working as a fisherman to help
You and your husband put food on the table.

You lost a daughter, too,
Toñita, also in her early teens, to illness.
Their kind, pure souls found
Their way back home much too soon.

Later in life you would lose two more sons to tragedy, Paco (Francisco),
An honest, hard working man whose purposeful penchant for shocking
Language belied a most gentle nature and a generous heart. He was electrocuted by
A faulty portable light while working around his pool.

And the apple of your eye, Sito (José), your last born and most loving son, who
Had inherited his father’s exceptional looks, social conscience, left of center
Politics, imposing presence, silver tongue, and bad, bad luck, died, falling
Under the wheels of a moving train, perhaps accidentally.

In a time of hopelessness and poverty, you would not be broken.
You rose every day hours before the dawn to sell fish at a stand.
And every afternoon you placed a huge wicker basket on your head and
Walked many, many miles to sell even more fish in other towns.

Money was tight, so you often took bartered goods in
Exchange for your fish, giving some to those most in need,
Who could trade nothing in return but their
Blessings and their gratitude.

You walked back home, late at night, through darkness or
Moonlit roads, carrying vegetables, eggs, and perhaps a
Rabbit or chicken in a large wicker basket on your strong head,
Walking straight, on varicose-veined legs, driven on by a sense of purpose.

During the worst famine during and after the Civil War, the chimney of your
Rented home overlooking the Port of Fontan, spewed forth black smoke every day.
Your hearth fire burned to to feed not just your children, but also your less
Fortunate neighbors, nourishing their bodies and their need for hope.

You were criticized by some when the worst had passed, after the war.
“Why work so hard, Remedios, and allow your young children to go to work
At too young an age? You sacrifice them and yourself for stupid pride when
Franco and foreign food aid provide free meals for the needy.”

“My children will never live off charity as long as my back is strong” was your Reply.
You resented your husband for putting politics above family and
Dragging you and your two daughters, from your safe, comfortable home at
Number 10 Perry Street near the Village to a Galicia without hope.

He chose to tilt at windmills, to the eternal glory of other foolish men,
And left you to silently fight the real, inglorious daily battle for survival alone.
Struggling with a bad heart, he worked diligently to promote a better, more just
Future while largely ignoring the practical reality of your painful present.

He filled you with children and built himself the cross upon which he was
Crucified, one word at a time, leaving you to pick up the pieces of his shattered
Idealism. But you survived, and thrived, without sacrificing your own strong
Principles or allowing your children to know hardships other than those of honest work.

And you never lost your sense of humor. You never took anything or
Anyone too seriously. When faced with the absurdity of life,
You chose to smile or laugh out loud. I saw you shed many tears of laughter,
But not once tears of pain, sorrow or regret. You would never be a victim.

You loved people. Yours was an irreverent sense of humor, full of gentle irony,
And wisdom. You loved to laugh at yourself and at others, especially pompous fools
Who often missed your great amusement at their expense, failing to understand your Dismissal, delivered always with a smile, a gentle voice and sparkling eyes.

Your cataracts and near sightedness made it difficult for you to read,
But you read voraciously nonetheless, and loved to write long letters to loved ones and friends. You were a wise old woman, the wisest and strongest I will ever know,
But one with the heart of a child and the soul of an angel.

You were the most sane, most rational, most well adjusted human being
I have ever known. You were mischievous, but incapable of malice.
You were adventurous, never afraid to try or to learn anything new.
You were fun-loving, interesting, kind, rambunctious, funny and smart as hell.

You would have been an early adopter of all modern technology, had you lived long
Enough, and would have loved playing—and working—with all of my electronic
Toys. You would have been a terror with a word processor, email, and social media
And would have loved my video games—and beaten me at every one of them.

We were great friends and playmates throughout most of my life.  You followed
Us here soon after we immigrated in 1967, leaving behind 20 other Grandchildren.
I never understood the full measure of that sacrifice, or the love that made it
Bearable for you. I do now. Too late. It is one of the greatest regrets of my life.

We played board games, cowboys and Indians, raced electric cars, flipped
Baseball cards and played thousands of hands of cards together. It never
Occurred to me that you were the least bit unusual in any way. I loved you
Dearly but never went far out of my way to show it. That too, I learned too late.

After moving to Buenos Aires, when mom had earned enough money to take
You and her younger brothers there, the quota system then in place made it
Impossible to send for your two youngest children, whose care you entrusted
Temporarily to your eldest married daughter, Maria.  

You wanted them with you. Knowing no better, you went to see Evita Peron for help.
Unsurprisingly, you could not get through her gatekeepers.  But you were
Nothing if not persistent. You knew she left early every morning for her office.
And you parked yourself there at 6:00 a.m., for many, many days by her driveway.  

Eventually, she had her driver stop and motioned for you to approach.
“Grandmother, why do you wave at me every morning when I leave for work?”
She asked. You explained about your children in Spain. She took pity and scribbled a
Pass on her card to admit you to her office the next day.

You met her there  and she assured you that a visa would be forthcoming;
When she learned that you made a living by cleaning homes and washing clothing,
She offered you a sewing machine and training to become a seamstress.
You thanked her but declined the offer.

“Give the sewing machine to another mother with no trade. My strong back and hands
Serve me well enough and I do just fine, as I have always done.”
Evita must have been impressed for she asked you to see her yet again when the
Children had arrived in Buenos Aires, giving you another pass. You said you would.

You kept your word, as always. And Evita granted you another brief audience,
Met your two youngest sons (José and Emilio) and shared hot chocolate and
Biscuits with the three of you. You disliked and always criticized Peron and the Peronistas,
But you never forgot Evita’s kindness and defended her all your life.

You were gone too quickly. I had not said “I love” you in years. I was too busy,
With school and other equally meaningless things to keep in touch. You
Passed away without my being there. Mom had to travel by herself to your
Bedside for an extended stay. The last time I wrote you I had sent you a picture.

It was from my law school graduation.
You carried it in your coat pocket before the stroke.
As always, you loved me, with all of my faults that made me
Unworthy of your love.

I knew the moment that you died. I awoke from a deep sleep to see a huge
White bird of human size atop my desk across from my bed. It opened huge
Wings and flew towards me and passed through me as I shuddered.
I knew then that you were gone. I cried, and prayed for you.

Mom called early the next day with the news that you had passed. She also
Told me much, much later that you had been in a coma for some time but that
You awoke, turned to her without recognizing her, and told her that you were going to
Visit your grandson in New York. Then you fell asleep for one last time.

I miss you every day.

[   To hear a YouTube reading of this poem in its entirety, you can visit the following URL: https://www.youtube.com/watch?v=OX6w1Pwe7gI   ]
from Of Pain and Ecstasy: Collected Poems 2011, 2018
sushii Oct 2018
everything was so mundane,
no sound,
no name.

the silence watched over us like a hawk,
resting it’s talons on the trees above.

there was no thud,
no beat,
no reverb.

the machines did not whir,
or click,
or crackle.

the strings never hummed,
the girl never sang,
and the child never played.

neurons following a set circuit,
run,
stop,
go.

the sun always set,
yet it had never risen.

hardwired to the equipment,
but the machine never worked,

because the processor was coated in a mundane molasses.

moving through gray honey,
black and white retinas perceive gray things
for our slow-moving hands to paint.

the words were the same,
the day never changed,


it was, and always will be
the same.
GaryFairy Sep 2021
Subconscious - Super fast connection, but limited by slow processor, small IDE hard drive, and low memory that is filled up the first 7 years. Fast connection bad for slow mind, with no room to store new data.

Unconscious - Dreams and drugs. Fast and slow connection that shifts from dial-up to 5G and shifts dimensions too. Not a lot is known for sure besides it can be scary and/or fun.

Meditation - Reset and update system in many ways, or personalize your thoughts and themes. Solid State Drive as well as Hard Disk Drive. All the RAM you need. Meditation comes in many different types, and can truly heal mind and body.

Conscious - All you can be! i9 fast processor, Custom ROM, the Cloud, Unlimited space and memory. 10,000 signals per second of learning without trying, and loving what you learn. No filters
True dat
One Fine Day
The Mind Resolved
"No more Documenting
The Thoughts"

"Why would it be That...."
Questioned
The Heart

The Mind
Reasoned
" With all that Beating
You always End Up Breaking "
Is it possible:))
Rose Ruminations May 2013
The gears in my clockwork heart
St-st-stutter and cough
Twisting, wrenching, straining
To turn back to our normal
"Click-clunk-click":
Our structured rhythm-dance
As clouds of rust-dust, lust-dust
Fly from my mechanized mind which,
Mis-wired, streams lifeblood data to my people processor
And my sights focus sharply on you.

Metal arms reach but are not seen,
Fingers touch but are not felt.
My mouth screams: "See me! Discern me!"
But the flat iron tone does not compute.
I say nothing that is real.
Nothing that is human.
You stand before me, unaffected
Frighteningly beautiful in your imperfection.

Kerchlunk.
The gears turn.
Oil: black-brown
Eases from my eyes.
Gun cocked, gaze steady,
We move on.
Ready.
Aim.
Fire.

Next victim, please.
Frederik B Nov 2014
den er ubrydelig med dens aluminiums indpakning
har fået gode anmeldelser og stærk opbakning,
skærmen lyser op som en håndfuld af stjerner
den er så intelligent med dens fire hjerner,
måneknapperne skinner,
ud i natten og forsvinder.

den har potentiale til at blive noget stort
potentiale til at vise vej når alt er sort,
svært gennemtrængelig og beskyttet med koder,
men når barrieren brydes overvældes man af goder,
for den er ikke blot endnu et moderne produkt,
som vil  skubbe dig længere mod selvtugt.

-

DET ER DEN SAMME TRUMMERUM
DAG UD OG DAG IND, ALTID ET TOMRUM
ET PÅBEGYNDENDE DELIRIUM,
JEG BLIVER TÆNDT OG SLUKKET
KLAPPET SAMMEN OG LUKKET
VENTER BLOT PÅ AT STIKKET BLIVER TRUKKET,
SÅ JEG DAGEN EFTER KAN BLIVE STARTET,
TIL EN NY DAG, SOM ER ENSARTET,
JEG LADER FRUSTRATIONERNE SYNGE INDEN JEG FÅR SPARKET.


JEG BLEV SKABT AF EN GRUND, DER IKKE LÆNGERE EKSITERER
MÅLET VAR EN MASKINE, DER ALTID VILLE FUNGERE
MIN PROCESSOR KØRER PÅ HØJTRYK OG JEG ER TÆT PÅ AT EKSPLODERE,
MIN SOFTWARE ER FORÆLDET OG MIT HUKOMMELSESKORT ER FYLDT MED VIRUS
NYE PRODUKTER KØRER MIG RUNDT I MANEGEN OG JEG VIL IKKE MED I DET CIRKUS
JEG FRYGTER IKKE AT BLIVE SMIDT UD, JEG VILLE BETRAGTE DET SOM EN GESTUS,
LAD MIG NU MÆRKE JEG LEVER, FOR FØRSTE GANG,
LAD MINE HØJTALERE SPILLE DEN SIDSTE SANG,
FØR JEG BLIVER EN DEL AF DET, DER VAR ENGANG.

-

En maskine var jeg – en defekt er jeg blevet.
Det tætteste man kommer på min virkelighed.
Who am I? What am I?
It's been a while since I cried
Am I a brain on top of a body?
Just processor performing code?
Well, who wrote the code?
Who wrote it?
It's been a while since I was I
I'm not a brain, I have one
I've got hardware put there by Someone else
Who am I?
I'm a computer running software I didn’t write
I'm a soul interacting with a body, a brain
Whose health I neglect on a reg

What am I?
I'm a decaying accumulation of skin
And blood and bone and neurons
I got neurons in my heart
And that's a good place to start
The heart is the mouthpiece of the soul
My identity gets ******* in the whole
Idea of my performance
And my influence
Like if I sing a song badly, my soul takes the hit
And if I lead my partner astray, the whole of me is ****
The whole of me is ****

There's holes in me
But who put them there?
I combust in small increments
My skin flies off in perfect circles
They're fragments
My heart, it's hiding behind these explosions
Hiding behind them because it causes them
Because my mouthpiece is expressing my hate
My lack of love for myself
Hate is just a word we put on the shelf
It's like darkness and coldness
Describing something through absence
Darkness; the absence of light
Coldness; the absence of heat
If hate is the absence of love I might
Just be the one who beats me
Who defeats me
Who carries my heart, my brain, the rest of me
Tied around my neck on a string that I pull through
Like my body is in captivity

I'm privileged to honor this body that I didn’t make
I'm greatly gifted a brain to maintain
My heart, my body, my brain
They shouldn't be strangling me
They shouldn't be dragged through the dirt
They should be a part of me

I am a soul
I have a mouthpiece
My heart is my mouthpiece
My brain is my hardware
That rusts and which I expend

God help me love me
And Who I am
And Who You are

God, make it so apparent to me in my falling out
That I am a part of the three-legged stool
To Love You before all else
To Love everyone else
And to Love myself
Help me see You accurately
God help me
God help this American switch culture
I am not a machine that functions at the flip
Of a switch
I am a soul, a CVT, a cable that climbs up and down
Depending on the speed of the wheels
And decelerating is okay
And (not but) accelerating is wonderful

I do not go 60MPH because I flipped a switch
I go 70MPH because I climb
I climb
God help me climb
And to falter well
And to suffer well
Humble me in my faltering suffering
originally written 4/19/16
Glen Brunson Oct 2014
when in doubt-i-hyphentate.

this-also prevents Microsoft-word
from capitializing my i-‘s when i-want them
to stay bite-sized humble pie,
but it still capitalizes
itself)

Microsoft word
              
big ‘m’ added by bill gates

misspelling it prevents this

micropoft word*
* i-am the best kind of rebel

i-refuse to be told how to write by anyone
gate-related or otherwise,
even if i-may occasionally **** myself
on paper, the rain will take it all off,
we shall all be healed.
we *will all be healed.

carried away from the squaggly
green/red/blue lines of a processor
which doesn”t understand: poerty so often is
sentence fragments and uncapitalized i-s
untied shoelaces in a dark boling alley,
my bad breath and watered down alcohol,
stains and the hours spent rubbing them,
sounds on a dead tv set, rubbing carpet in
your aunt’s living room,

i-can spell
things how
i-want to
poerty is fun
like this;
Bharathi Devi Apr 2015
I surrender. See there, my white flag,
Flying high? Yes, enough! You win!
I cannot interpret the mute language anymore.
When you shift your glance every time I see you,
Are you telling me you have moved on, or
Is it that I have done something wrong?

So, tell me, what is that you want to say,
Or what is that I need to know?
I am realizing more and more that
The signal processor in my brain is faulty.
It is introducing a lot of noise, so much so that
Fourier Transform gives jumbled frequencies!

Communication either in English or
my mother tongue Kannada, or even
the math symbols or Venn diagrams,
-bits and bytes also would do if not hexadecimal-
may perhaps tune my dud brain
to the right frequency to receive the right signal!

For, I may be causing more damage to us both,
And I certainly do not wish to hurt anybody,
Least of all, you, who I like very much;
I will do anything to set the things right!
So, tell me, what is that you want to say,
Or what is that I need to know?

©Bharathi Devi
David Ehrgott Apr 2016
On 3/2/2016 at approximately 10:15 a.m. I was threatened by Bryan Pearsall as I was exiting the building where I reside. He made threats to me which contained language that no one should have to hear. I ignored his threats and continued on my daily routine. I proceeded to the 7-11 to purchase a cup of coffee. As I was walking out of the 7-11 into the parking lot Mr. Pearsall again approached me, making threatening remarks. I then noticed a police officer on State Street. I asked the police officer for assistance in this matter and he (the officer that was not wearing a name tag) refused to offer any help. I continued on to Main St. Walking down Camden Street I noticed another police officer on the other side of Main Street. His car was parked on Camden St blocking off traffic to Camden St. as there was construction going on that day. When I shouted out the Suspects name to confront him. The Suspect Bryan Pearsall then entered the Gateway School to hide an opened container of alcohol. The police officer who also was unidentifiable due to not displaying his name tag exclaimed "I'm not getting involved" and went in to his patrol car slamming the driver's side door. I then proceeded to enter the Johnson Public Library. I then used the computer's word processor to type up an affidavit. About twenty minutes later. The police officer that was blocking off Camden Street entered the library. He said that "that guy you tried to turn in is a cop. Watch what you say to cops"! I replied with "If he's a cop then I'm Corporal Christ! I'm pretty sure the police department wouldn't hire a drunken ******. "Oh" the unidentified officer continued "how do know THAT?" "Because he's lived across the hall from me for the past five years and I know from the drinking and puking and stupor that he is in fact a drunk ******." I retorted "Well, he's a cop" the officer replied, and then left the building. About a minute later, the suspect Bryan Pearsall entered the JPL. He stood about eight feet from me and stated that he was a cop. The woman that runs the circulation dept. overheard him and stated "Bryan Pearsall you get over here you ain't no cop and that officer is in trouble." (I thank the stars for honest people like Ellen.) After   I typed up my report, I headed towards the Hackensack Police Department. At that time I felt a little hungry and stopped for a late breakfast at the lucheonette. As soon as I finished eating I went to the front desk of the HPD to turn in my report. Not only did the Desk Seargent spat on me, he stated that he was not interested in helping scuzbags and continued spatting on me. I think now that I have no other choice but to take the law into my own hands. If the law won't help me, there is always the old fashion way to receive JUSTICE.
Martin Narrod Feb 2016
in the penguins luck the furnace begins
at reprograming the news. Picture frames on 2 x 4s , three
photographs and glass bottles in the most decadent of matrimonies.
Three-hundred million dollars.
And the race riots show 'em who'll take the dampit from the mound of
Soot stained elements, canvas, trash bags, electric guitar riffs, giraffes, bingo, the drip-drop on the drop cloth. Easing into the new processor.

She who settles the wages of crickets with ether and single-barrel vanilla buckshot and maple. Incisors and cynical stereotypecastes and the shadows of the other mugged and loose canonical charades the worser and worsening play their ad keywords at in the sketchmakers many movements her dactyls fine and her fingertips many. Sweet lines of breathing and setting.
Paul F Clayton Jul 2012
The man with the plastic face
He has cloudy, liquid eyes
His fibre moustache and the thick dense fog
Strengthen his disguise

As he stops to check the time
His circuits start to glow
Then a figure comes to greet him
With a face he used to know

It's a face in a leather case
It's a face he used to own
It's a face that moved through time and space
And now he's come to take it home

There was a subtle smell of sulphur
As he made time stand still
He unclenched his plastic hand
To expose a yellow pill

Then his sub processor skipped
To where it all began
To a time before his micro chips
When he was still a man

— The End —